Open Access. Powered by Scholars. Published by Universities.®

Forensic Science and Technology Commons

Open Access. Powered by Scholars. Published by Universities.®

2019

Series

Discipline
Institution
Keyword
Publication

Articles 1 - 21 of 21

Full-Text Articles in Forensic Science and Technology

Founding The Domain Of Ai Forensics, Ibrahim Baggili, Vahid Behzadan Dec 2019

Founding The Domain Of Ai Forensics, Ibrahim Baggili, Vahid Behzadan

Electrical & Computer Engineering and Computer Science Faculty Publications

With the widespread integration of AI in everyday and critical technologies, it seems inevitable to witness increasing instances of failure in AI systems. In such cases, there arises a need for technical investigations that produce legally acceptable and scientifically indisputable findings and conclusions on the causes of such failures. Inspired by the domain of cyber forensics, this paper introduces the need for the establishment of AI Forensics as a new discipline under AI safety. Furthermore, we propose a taxonomy of the subfields under this discipline, and present a discussion on the foundational challenges that lay ahead of this new research …


Catching Killers With Consumer Genetic Information, Angela Hackstadt Nov 2019

Catching Killers With Consumer Genetic Information, Angela Hackstadt

University Libraries Faculty Scholarship

In April 2018, Joseph James D'Angelo was arrested as a suspect in the Golden State Killer case. DNA evidence collected at a 1980 crime scene finally shed light on the murderer's identity in early 2018 when investigators turned to GEDMatch, a service that allows users to upload and share DNA data obtained from consumer genetic tests. Consumer genetic testing, DNA collection, and familial DNA searching all raise ethical and privacy concerns. If investigators are using genetic genealogy to solve cold cases, where does that leave consumers?


Haplotype Analysis For Irish Ancestry, Heather Miller Coyle, Robert Whiting Sep 2019

Haplotype Analysis For Irish Ancestry, Heather Miller Coyle, Robert Whiting

Forensic Science Publications

Forensic haplotype analysis of the male Y chromosome is currently used to establish the number of male donors in sexual assaults, the number of male bleeders in blood pattern analysis, and for ancestry correlation to genetic founder populations in biogeographic studies. In forensic laboratory applications, its primary use is for DNA profile generation with trace amounts of male DNA in the presence of excess female DNA (e.g. spermatozoa identification, male component of fingernail scrapings). Our study supports the potential use of the Y chromosome in a “dragnet” approach (most haplotypes are unique) similar to that described by Kayser in 2017 …


Recent Trends, Current Research In Cyberpsychology: A Literature Review, Amarjit Kumar Singh, Pawan Kumar Singh Aug 2019

Recent Trends, Current Research In Cyberpsychology: A Literature Review, Amarjit Kumar Singh, Pawan Kumar Singh

Library Philosophy and Practice (e-journal)

Cyberpsychology refers to the study of the mind and behavior in the context of interactions with technology. It is an emerging branch, which has focused on the psychological aspects connected to the increasing presence and usages of technology in modern lives. This paper traces recent advancement and trends of Cyberpsychology is an emerging domain of knowledge and goes on the give a literature review of the same. An analysis of the recent research and literature covering 300 most relevant research papers from the period of 2012 to 15, August 2019 was conducted to determine and shape the research pattern based …


Map My Murder: A Digital Forensic Study Of Mobile Health And Fitness Applications, Courtney Hassenfeldt, Shabana Baig, Ibrahim Baggili, Xiaolu Zhang Aug 2019

Map My Murder: A Digital Forensic Study Of Mobile Health And Fitness Applications, Courtney Hassenfeldt, Shabana Baig, Ibrahim Baggili, Xiaolu Zhang

Electrical & Computer Engineering and Computer Science Faculty Publications

The ongoing popularity of health and fitness applications catalyzes

the need for exploring forensic artifacts produced by them. Sensitive

Personal Identifiable Information (PII) is requested by the applications

during account creation. Augmenting that with ongoing

user activities, such as the user’s walking paths, could potentially

create exculpatory or inculpatory digital evidence. We conducted

extensive manual analysis and explored forensic artifacts produced

by (n = 13) popular Android mobile health and fitness applications.

We also developed and implemented a tool that aided in the timely

acquisition and identification of artifacts from the examined applications.

Additionally, our work explored the type of …


Iot Ignorance Is Digital Forensics Research Bliss: A Survey To Understand Iot Forensics Definitions, Challenges And Future Research Directions, Tina Wu, Frank Breitinger, Ibrahim Baggili Aug 2019

Iot Ignorance Is Digital Forensics Research Bliss: A Survey To Understand Iot Forensics Definitions, Challenges And Future Research Directions, Tina Wu, Frank Breitinger, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

Interactions with IoT devices generates vast amounts of personal data that can be used as a source of evidence in digital investigations. Currently, there are many challenges in IoT forensics such as the difficulty in acquiring and analysing IoT data/devices and the lack IoT forensic tools. Besides technical challenges, there are many concepts in IoT forensics that have yet to be explored such as definitions, experience and capability in the analysis of IoT data/devices and current/future challenges. A deeper understanding of these various concepts will help progress the field. To achieve this goal, we conducted a survey which received 70 …


The Development And Use Of Computational Tools In Forensic Science, Dennis E. Slice Jul 2019

The Development And Use Of Computational Tools In Forensic Science, Dennis E. Slice

Human Biology Open Access Pre-Prints

Modern computational resources make available a rich toolkit of statistical methods that can be applied to forensic questions. This toolkit is built on the foundation of statistical developments dating back to the 19th century. To fully and effectively exploit these developments, both the makers and users of software must be keenly aware of the quality, i.e., the accuracy and precision, of the data being modeled or analyzed, and end-users must be sufficiently familiar with the underlying theory to understand the process and results of any analysis or software they use. This is especially important for medico-legal personnel who might be …


Correcting Forensic Dna Errors, Greg Hampikian Jul 2019

Correcting Forensic Dna Errors, Greg Hampikian

Biology Faculty Publications and Presentations

DNA mixture interpretation can produce opposing conclusions by qualified forensic analysts, even within the same laboratory. The long-delayed publication of the National Institutes of Standards and Technology (NIST) study of 109 North American crime laboratories in this journal demonstrates this most clearly. This latest study supports earlier work that shows common methods such as the Combined Probability of Inclusion (CPI) have wrongly included innocent people as contributors to DNA mixtures.The 2016 President’s Council of Advisors on Science and Technology report concluded,“In summary, the interpretation of complex DNA mixtures with the CPI statistic has been an inadequately specified—and thus inappropriately subjective—method. …


Analysis Of Error Within Forensic Measurements And Photogrammetry Programs, Amy Douglas May 2019

Analysis Of Error Within Forensic Measurements And Photogrammetry Programs, Amy Douglas

Honors Theses

Digital images and photography have been considered commonplace in forensic science since the late 1990’s. Photogrammetry is a tool used in forensic science to measure objects within photographs that contain a scale or programs that are able to measure items in 3D images. Items at crime scenes often need to be measured and forensic scientists may not know what the best option is for their situation. This research will be conducted to show which type of measurement technique is most accurate, calculated against NIST traceable measurements, at various sizes of objects. The measurement techniques that will be tested are standard, …


On Efficiency Of Artifact Lookup Strategies In Digital Forensics, Lorenz Liebler, Patrick Schmitt, Harald Baier, Frank Breitinger Apr 2019

On Efficiency Of Artifact Lookup Strategies In Digital Forensics, Lorenz Liebler, Patrick Schmitt, Harald Baier, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

In recent years different strategies have been proposed to handle the problem of ever-growing digital forensic databases. One concept to deal with this data overload is data reduction, which essentially means to separate the wheat from the chaff, e.g., to filter in forensically relevant data. A prominent technique in the context of data reduction are hash-based solutions. Data reduction is achieved because hash values (of possibly large data input) are much smaller than the original input. Today's approaches of storing hash-based data fragments reach from large scale multithreaded databases to simple Bloom filter representations. One main focus was put on …


Determination Of Vehicle Speed From Recorded Video Using Reverse Projection Photogrammetry And File Metadata, Brandon Epstein, Bryce Westlake Mar 2019

Determination Of Vehicle Speed From Recorded Video Using Reverse Projection Photogrammetry And File Metadata, Brandon Epstein, Bryce Westlake

Faculty Publications

The prevalence of security and in‐car video has increased the number of motor vehicle accidents captured on digital video. However, inconsistencies in how to accurately determine time and distance for vehicle speed has led to examinations with varying results. A potential solution for calculating time intervals is to use frame timing contained within many digital video file's metadata, recorded with 0.000001 sec precision. This paper examines a fatal motor vehicle accident where frame timing information was used with distance measurements from reverse projection photogrammetry to calculate vehicle speed. A margin of error was then calculated based on the accuracy in …


Immersive Virtual Reality Attacks And The Human Joystick, Peter Casey, Ibrahim Baggili, Ananya Yarramreddy Mar 2019

Immersive Virtual Reality Attacks And The Human Joystick, Peter Casey, Ibrahim Baggili, Ananya Yarramreddy

Electrical & Computer Engineering and Computer Science Faculty Publications

This is one of the first accounts for the security analysis of consumer immersive Virtual Reality (VR) systems. This work breaks new ground, coins new terms, and constructs proof of concept implementations of attacks related to immersive VR. Our work used the two most widely adopted immersive VR systems, the HTC Vive, and the Oculus Rift. More specifically, we were able to create attacks that can potentially disorient users, turn their Head Mounted Display (HMD) camera on without their knowledge, overlay images in their field of vision, and modify VR environmental factors that force them into hitting physical objects and …


Frameup: An Incriminatory Attack On Storj: A Peer To Peer Blockchain Enabled Distributed Storage System, Xiaolu Zhang, Justin Grannis, Ibrahim Baggili, Nicole Lang Beebe Mar 2019

Frameup: An Incriminatory Attack On Storj: A Peer To Peer Blockchain Enabled Distributed Storage System, Xiaolu Zhang, Justin Grannis, Ibrahim Baggili, Nicole Lang Beebe

Electrical & Computer Engineering and Computer Science Faculty Publications

In this work we present a primary account of frameup, an incriminatory attack made possible because of existing implementations in distributed peer to peer storage. The frameup attack shows that an adversary has the ability to store unencrypted data on the hard drives of people renting out their hard drive space. This is important to forensic examiners as it opens the door for possibly framing an innocent victim. Our work employs Storj as an example technology, due to its popularity and market size. Storj is a blockchain enabled system that allows people to rent out their hard drive space …


The Potential Interference Of Body Products And Substrates To The Identification Of Ignitable Liquid Residues On Worn Clothing, Gina Guerrera, Erika Chen, Robert Powers, Brooke Weinger Kammrath Mar 2019

The Potential Interference Of Body Products And Substrates To The Identification Of Ignitable Liquid Residues On Worn Clothing, Gina Guerrera, Erika Chen, Robert Powers, Brooke Weinger Kammrath

Forensic Science Publications

The question of whether deposits on clothing as well as their chemical composition are being mistaken for ignitable fluids is a concern for forensic analysts. Body products and oil secretions can have similar chemical profiles to ignitable liquid residues (ILRs) as a result of comparable chemical compounds that may be found in both sources. This study investigated whether substrates of unworn and worn clothing, with endogenous body secretions and body products could interfere with ILR analysis. Sample extraction was completed by passive headspace concentration with activated charcoal strips (ACS) and desorption with carbon disulfide followed by analysis with gas chromatography-mass …


A Practitioner Survey Exploring The Value Of Forensic Tools, Ai, Filtering, & Safer Presentation For Investigating Child Sexual Abuse Material, Laura Sanchez, Cinthya Grajeda, Ibrahim Baggili, Cory Hall Jan 2019

A Practitioner Survey Exploring The Value Of Forensic Tools, Ai, Filtering, & Safer Presentation For Investigating Child Sexual Abuse Material, Laura Sanchez, Cinthya Grajeda, Ibrahim Baggili, Cory Hall

Electrical & Computer Engineering and Computer Science Faculty Publications

For those investigating cases of Child Sexual Abuse Material (CSAM), there is the potential harm of experiencing trauma after illicit content exposure over a period of time. Research has shown that those working on such cases can experience psychological distress. As a result, there has been a greater effort to create and implement technologies that reduce exposure to CSAM. However, not much work has explored gathering insight regarding the functionality, effectiveness, accuracy, and importance of digital forensic tools and data science technologies from practitioners who use them. This study focused specifically on examining the value practitioners give to the tools …


Optical Tweezers As An Effective Tool For Spermatozoa Isolation From Mixed Forensic Samples, Nicole Auka, Michael Valle, Bobby D. Cox, Peter D. Wilkerson, Tracey Dawson Cruz, Joseph E. Reiner, Sarah J. Seashols-Williams Jan 2019

Optical Tweezers As An Effective Tool For Spermatozoa Isolation From Mixed Forensic Samples, Nicole Auka, Michael Valle, Bobby D. Cox, Peter D. Wilkerson, Tracey Dawson Cruz, Joseph E. Reiner, Sarah J. Seashols-Williams

Forensic Science Publications

A single focus optical tweezer is formed when a laser beam is launched through a high numerical aperture immersion objective. This objective focuses the beam down to a diffraction-limited spot, which creates an optical trap where cells suspended in aqueous solutions can be held fixed. Spermatozoa, an often probative cell type in forensic investigations, can be captured inside this optical trap and dragged one by one across millimeter-length distances in order to create a cluster of cells which can be subsequently drawn up into a capillary for collection. Sperm cells are then ejected onto a sterile cover slip, counted, and …


The Effect Of Electronic Cigarette User Modifications And E-Liquid Adulteration On The Particle Size Profile Of An Aerosolized Product, Haley A. Mulder, Jesse L. Patterson, Matthew S. Halquist, Leon Kosmider, Joseph B. Mcgee Turner, Justin L. Poklis, Alphonse Poklis, Michelle R. Peace Jan 2019

The Effect Of Electronic Cigarette User Modifications And E-Liquid Adulteration On The Particle Size Profile Of An Aerosolized Product, Haley A. Mulder, Jesse L. Patterson, Matthew S. Halquist, Leon Kosmider, Joseph B. Mcgee Turner, Justin L. Poklis, Alphonse Poklis, Michelle R. Peace

Forensic Science Publications

Electronic cigarettes (e-cigarettes) are an alternate nicotine delivery system that generate a condensation aerosol to be inhaled by the user. The size of the droplets formed in the aerosol can vary and contributes to drug deposition and ultimate bioavailability in the lung. The growing popularity of e-cigarette products has caused an increase in internet sources promoting the use of drugs other than nicotine (DOTNs) in e-cigarettes. The purpose of this study was to determine the effect of various e-cigarette and e-liquid modifications, such as coil resistance, battery voltage, and glycol and drug formulation, on the aerosol particle size. E-liquids containing …


Rethinking Digital Forensics, Andrew Jones, Stilianos Vidalis Jan 2019

Rethinking Digital Forensics, Andrew Jones, Stilianos Vidalis

Research outputs 2014 to 2021

In the modern socially-driven, knowledge-based virtual computing environment in which organisations are operating, the current digital forensics tools and practices can no longer meet the need for scientific rigour. There has been an exponential increase in the complexity of the networks with the rise of the Internet of Things, cloud technologies and fog computing altering business operations and models. Adding to the problem are the increased capacity of storage devices and the increased diversity of devices that are attached to networks, operating autonomously. We argue that the laws and standards that have been written, the processes, procedures and tools that …


Analysis Of Over-The-Counter Antihistamines Through Raman Spectroscopy And Density Functional Theory Calculations, Lyric Wyan Jan 2019

Analysis Of Over-The-Counter Antihistamines Through Raman Spectroscopy And Density Functional Theory Calculations, Lyric Wyan

Honors College Theses

No abstract provided.


Inception: Virtual Space In Memory Space In Real Space, Peter Casey, Rebecca Lindsay-Decusati, Ibrahim Baggili, Frank Breitinger Jan 2019

Inception: Virtual Space In Memory Space In Real Space, Peter Casey, Rebecca Lindsay-Decusati, Ibrahim Baggili, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

Virtual Reality (VR) has become a reality. With the technology's increased use cases, comes its misuse. Malware affecting the Virtual Environment (VE) may prevent an investigator from ascertaining virtual information from a physical scene, or from traditional “dead” analysis. Following the trend of antiforensics, evidence of an attack may only be found in memory, along with many other volatile data points. Our work provides the primary account for the memory forensics of Immersive VR systems, and in specific the HTC Vive. Our approach is capable of reconstituting artifacts from memory that are relevant to the VE, and is also capable …


Quantitative Analysis Of Xylene Mixtures Using A Handheld Raman Spectrometer, Lauren Reilly Jan 2019

Quantitative Analysis Of Xylene Mixtures Using A Handheld Raman Spectrometer, Lauren Reilly

Honors College Theses

No abstract provided.