Open Access. Powered by Scholars. Published by Universities.®
Social Control, Law, Crime, and Deviance Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Embry-Riddle Aeronautical University (73)
- Selected Works (3)
- Claremont Colleges (2)
- Gettysburg College (2)
- Montclair State University (2)
-
- Universitas Indonesia (2)
- University of Nebraska - Lincoln (2)
- American University in Cairo (1)
- Bowdoin College (1)
- California State University, San Bernardino (1)
- Chapman University (1)
- Edith Cowan University (1)
- James Madison University (1)
- SIT Graduate Institute/SIT Study Abroad (1)
- Sarah Lawrence College (1)
- US Army War College (1)
- University of Arkansas, Fayetteville (1)
- University of Denver (1)
- Western University (1)
- Keyword
-
- Center for Public Service (2)
- Gettysburg College (2)
- Gun control (2)
- Hugo Chávez (2)
- New social movements (2)
-
- Power (2)
- Publics (2)
- Surge (2)
- Surge Gettysburg (2)
- Surveillance (2)
- Terrorism (2)
- Torture (2)
- Venezuela (2)
- 9/11 (1)
- Alt-right (1)
- Antigovernment militias (1)
- Aryan Nations (1)
- Atomic bomb (1)
- Atomic bomb literature (1)
- Australia (1)
- Boogaloo Bois (1)
- Brazil (1)
- Brunei (1)
- Brunei Darussalam (1)
- Campus (1)
- Campus Policing (1)
- Capitalism (1)
- Catastrophe (1)
- Civil Rights Movement (1)
- Class (1)
- Publication Year
- Publication
-
- Annual ADFSL Conference on Digital Forensics, Security and Law (72)
- CMC Senior Theses (2)
- Journal of Terrorism Studies (2)
- SURGE (2)
- Anthony Spanakos (1)
-
- Brian J. Gibbs (1)
- Department of Justice Studies Faculty Scholarship and Creative Works (1)
- Department of Political Science and Law Faculty Scholarship and Creative Works (1)
- Electronic Theses, Projects, and Dissertations (1)
- Electronic Thesis and Dissertation Repository (1)
- Emma R. Norman (1)
- Honors Projects (1)
- Human Rights & Human Welfare (1)
- Independent Study Project (ISP) Collection (1)
- International Bulletin of Political Psychology (1)
- Mario Scalora Publications (1)
- Political Science Student Papers and Posters (1)
- Research Projects (1)
- Research outputs pre 2011 (1)
- Selected Undergraduate Works (1)
- Senior Honors Projects, 2020-current (1)
- The US Army War College Quarterly: Parameters (1)
- Theses and Dissertations (1)
- University of Nebraska Public Policy Center: Publications (1)
- Publication Type
- File Type
Articles 1 - 30 of 98
Full-Text Articles in Social Control, Law, Crime, and Deviance
Strategic Pathways To Minimal Deterrence And Counter-Terrorism: Enhancing Brunei’S Defense Capabilities, Brice Tseen Fu Lee, Filip Komšić, Juan Pablo Sims
Strategic Pathways To Minimal Deterrence And Counter-Terrorism: Enhancing Brunei’S Defense Capabilities, Brice Tseen Fu Lee, Filip Komšić, Juan Pablo Sims
Journal of Terrorism Studies
This paper explores the strategic enhancement of Brunei’s military capabilities under the guidelines of the Brunei Defense White Paper 2021, focusing on establishing a robust minimal level deterrence. It emphasizes transitioning from conventional defense paradigms to an integrated, technologically advanced military structure tailored to contemporary and future security challenges. The significance of minimal level deterrence is analyzed, illustrating how a proportionate and efficient military force not only deters potential aggressors but also supports counter-terrorism efforts. This approach underscores the dual benefits of ensuring national security while facilitating economic stability and growth, allowing Brunei to allocate resources more effectively between defense …
Police Flight Oversight: Lapd Drone As First Responder Implementation, Nathaniel Worley
Police Flight Oversight: Lapd Drone As First Responder Implementation, Nathaniel Worley
CMC Senior Theses
This thesis explores the feasibility of implementing a Drone as First Responder (DFR) program within the Los Angeles Police Department (LAPD), analyzing the operational, social, and financial implications compared to traditional police helicopter usage. The thesis investigates helicopter flight patterns, demographic correlations, and the potential for drones to provide a less invasive and more cost-effective aerial support system. Key findings include the use of incorrect identifying hex codes by LAPD helicopters, suggesting potential transparency issues in aerial operations. The thesis recommends DFR due to substantial cost savings and enhanced surveillance transparency and asserts that a DFR program can mitigate negative …
Exploring The Factors That Influence Female Offending In The U.S. And Mexico, Dana Villasenor
Exploring The Factors That Influence Female Offending In The U.S. And Mexico, Dana Villasenor
CMC Senior Theses
Hollywood has painted a picture of the criminal woman as a sexy, sneaky, and often psychotic female fatale. This is because men run Hollywood. Much like movies, research on why women offend had historically focused on men as their stellar. However, towards the turn of the century and with the disproportionate rise in female incarceration, literature caught up to the fact that women and men do not experience the same socialization, standards, or reality and, therefore, have different reasons for and ways of offending. This research explores those reasons for women in the U.S. and Mexico and paints the picture …
Power Projection And Counter-Terrorism: Strategies For Small States Like Brunei Darussalam, Brice Tseen Fu Lee, Gulshan Bibi Ms
Power Projection And Counter-Terrorism: Strategies For Small States Like Brunei Darussalam, Brice Tseen Fu Lee, Gulshan Bibi Ms
Journal of Terrorism Studies
This study delves into the intricacies of power projection strategies and counter-terrorism measures, emphasizing their relevance to small states, with a specific focus on Brunei Darussalam. Using a dual matrix model, the research categorizes various strategies based on risk-reward parameters, offering a structured insight into potential approaches these states can employ against potential aggressors. The counter-terrorism matrix is the initial focal point, recognizing the contemporary significance of terror threats and their unique challenges for small nations. Subsequently, the power projection matrix offers a broader view of defense tactics beyond counter-terrorism. By synthesizing information from primary academic sources, the study aims …
Historical Trauma: Literary And Testimonial Responses To Hiroshima, Mariam Ghonim
Historical Trauma: Literary And Testimonial Responses To Hiroshima, Mariam Ghonim
Theses and Dissertations
The concept of trauma is controversial in literature. While one may be able to come up with ways to describe trauma in fiction, representing historical trauma is a hard task for writers. Some argue that trauma can not be described through those who did not experience it, while others claim that, provided some elements are added, one can represent trauma to the reader. This thesis focuses on twentieth-century historical traumas related to a nuclear catastrophe and explores the different literary and testimonial responses to the catastrophic man-made event of Hiroshima (1945). In this thesis, Kathleen Burkinshaw’s historical fiction The Last …
Wanderscaping: Stirring Agitated Reflections Into Our Home The Campus, K. Annie Bingham
Wanderscaping: Stirring Agitated Reflections Into Our Home The Campus, K. Annie Bingham
Selected Undergraduate Works
Wanderscaping is a two part project completed over the 2021-2022 school year. The first portion, "Wanderscaping Our Home The Campus" meanders through the physical space of Sarah Lawrence College, as a landscape and an institution, while the second, "Stirring An Agitated Reflection" floats that knowledge in the psychic space of an interconnected host of guides, through books, conversations, and other media. As a whole this project is a process-oriented wrangling of freedom, connection, and their borders. It has culminated in practices of public participatory performance, photography, mapping, iconography, audio recording, and writing. Wanderscaping aims to share a space to dream …
Seditious Conspiracy Charges In The American Terrorism Study (Ats), Katie Ratcliff
Seditious Conspiracy Charges In The American Terrorism Study (Ats), Katie Ratcliff
Research Projects
In January 2022, the U.S. Department of Justice announced Seditious Conspiracy charges against members of the anti-government extremist group Oath Keepers in connection to the January 6th (2021) siege of the U.S. Capitol Building. Several have entered not guilty pleas and a trial is expected in July 2022.
To provide context, this brief offers an overview of 11 Seditious Conspiracy cases included in the American Terrorism Study (ATS) since 1980. In total, these cases involve nine groups (a.k.a."cells" or "plots") and 78 defendants charged with Seditious Conspiracy (18 USC§ 2384), a relatively rare charge that comprises less than one half …
The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan
The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan
Annual ADFSL Conference on Digital Forensics, Security and Law
In this work, we aim to better understand outsider perspectives of the hacker community through a series of situation based survey questions. By doing this, we hope to gain insight into the overall reputation of hackers from participants in a wide range of technical and non-technical backgrounds. This is important to digital forensics since convicted hackers will be tried by people, each with their own perception of who hackers are. Do cyber crimes and national security issues negatively affect people’s perceptions of hackers? Does hacktivism and information warfare positively affect people’s perception of hackers? Do individual personality factors affect one’s …
Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd
Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd
Annual ADFSL Conference on Digital Forensics, Security and Law
Fuzzing techniques are applied to reveal different types of bugs and vulnerabilities. American Fuzzy Lop (AFL) is a free most popular software fuzzer used by many other fuzzing frameworks. AFL supports autonomous mode of operation that uses the previous step output into the next step, as a result fuzzer spends a lot of time analyzing minor code sections. By making fuzzing process more focused and human controlled security expert can save time and find more bugs in less time. We designed a new module that can fuzz only the specified functions. As a result, the chosen ones will be inspected …
Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha
Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha
Annual ADFSL Conference on Digital Forensics, Security and Law
The increasing availability of smartphones allowed people to easily capture and share images on the internet. These images are often associated with metadata, including the image capture time (timestamp) and the location where the image was captured (geolocation). The metadata associated with images provides valuable information to better understand scenes and events presented in these images. The timestamp can be manipulated intentionally to provide false information to convey a twisted version of reality. Images with manipulated timestamps are often used as a cover-up for wrongdoing or broadcasting false claims and competing views on the internet. Estimating the time of capture …
Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik
Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik
Annual ADFSL Conference on Digital Forensics, Security and Law
Uber is a ride-hailing smartphone application (app) that allows users to order a ride in a highly efficient manner. The Uber app provides Mobility as a Service and allows users to easily order a ride in a private car with just a few clicks. Uber stores large amounts of data on both the mobile device the app is being used on, and in the cloud. Examples of this data include geolocation data, date/time, origin/destination addresses, departure/arrival times, and distance. Uber geolocation data has been previously researched to investigate the privacy of the Uber app; however, there is minimal research relating …
Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd
Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd
Annual ADFSL Conference on Digital Forensics, Security and Law
Windows OS is facing a huge rise in kernel attacks. An overview of popular techniques that result in loading kernel drivers will be presented. One of the key targets of modern threats is disabling and blinding Microsoft Defender, a default Windows AV. The analysis of recent driver-based attacks will be given, the challenge is to block them. The survey of user- and kernel-level attacks on Microsoft Defender will be given. One of the recently published attackers’ techniques abuses Mandatory Integrity Control (MIC) and Security Reference Monitor (SRM) by modifying Integrity Level and Debug Privileges for the Microsoft Defender via syscalls. …
Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik
Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik
Annual ADFSL Conference on Digital Forensics, Security and Law
Smart homes are becoming more common as more people integrate IoT devices into their home environment. As such, these devices have access to personal data on their homeowners’ networks. One of the advantages of IoT devices is that they are compact. However, this limits the incorporation of security measures in their hardware. Misconfigured IoT devices are commonly the target of malicious attacks. Additionally, distributed denial-of-service attacks are becoming more common due to applications and software that provides users with easy-to-use user interfaces. Since one vulnerable device is all an attacker needs to launch an attack on a network, in regards …
A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow
A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow
Annual ADFSL Conference on Digital Forensics, Security and Law
Deepfake has brought huge threats to society such that everyone can become a potential victim. Current Deepfake detection approaches have unsatisfactory performance in either accuracy or efficiency. Meanwhile, most models are only evaluated on different benchmark test datasets with different accuracies, which could not imitate the real-life Deepfake unknown population. As Deepfake cases have already been raised and brought challenges at the court, it is disappointed that no existing work has studied the model reliability and attempted to make the detection model act as the evidence at the court. We propose a lightweight Deepfake detection deep learning approach using the …
Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik
Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik
Annual ADFSL Conference on Digital Forensics, Security and Law
With a growing number of images uploaded daily to social media sites, it is essential to understand if an image can be used to trace its origin. Forensic investigations are focusing on analyzing images that are uploaded to social media sites resulting in an emphasis on building and validating tools. There has been a strong focus on understanding active manipulation or tampering techniques and building tools for analysis. However, research on manipulation is often studied in a vacuum, involving only one technique at a time. Additionally, less focus has been placed on passive manipulation, which can occur by simply uploading …
Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk
Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk
Annual ADFSL Conference on Digital Forensics, Security and Law
The Internet’s underlying vulnerable protocol infrastructure is a rich target for cyber crime, cyber espionage and cyber warfare operations. The stability and security of the Internet infrastructure are important to the function of global matters of state, critical infrastructure, global e-commerce and election systems. There are global approaches to tackle Internet security challenges that include governance, law, educational and technical perspectives. This paper reviews a number of approaches to these challenges, the increasingly surgical attacks that target the underlying vulnerable protocol infrastructure of the Internet, and the extant cyber security education curricula; we find the majority of predominant cyber security …
A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang
A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang
Annual ADFSL Conference on Digital Forensics, Security and Law
Network intrusion is a well-studied area of cyber security. Current machine learning-based network intrusion detection systems (NIDSs) monitor network data and the patterns within those data but at the cost of presenting significant issues in terms of privacy violations which may threaten end-user privacy. Therefore, to mitigate risk and preserve a balance between security and privacy, it is imperative to protect user privacy with respect to intrusion data. Moreover, cost is a driver of a machine learning-based NIDS because such systems are increasingly being deployed on resource-limited edge devices. To solve these issues, in this paper we propose a NIDS …
The Alt-Right Movement And National Security, Matthew Valasik, Shannon E. Reid
The Alt-Right Movement And National Security, Matthew Valasik, Shannon E. Reid
The US Army War College Quarterly: Parameters
Identifying the January 6 insurrection at the US Capitol as an inflection point, this article analyzes the historical relationship between White supremacy and the US military from Reconstruction after the Civil War to the present. The article posits causes for the disproportionate number of current and former members of the military associated with White power groups and proposes steps the Department of Defense can take to combat the problems posed by the association of the US military with these groups.
Analyzing The Onset And Resolution Of Nonstate Conflict In The Middle East & North Africa, Emily A. Barbaro
Analyzing The Onset And Resolution Of Nonstate Conflict In The Middle East & North Africa, Emily A. Barbaro
Senior Honors Projects, 2020-current
By applying structural-functionalist theories of deviance and opposition, this thesis deconstructs nonstate mobilization in the Middle East, North Africa, Afghanistan, and Pakistan. Using data from the Armed Conflict Location and Event Dataset, the quantitative analysis interpreted both group and leader behavior in conflict situations to determine factors that influenced conflict onset and resolution. The quasipoisson regression analysis of group behavior suggested that polity and state capacity were both significant predictors of violent and nonviolent mobilization. The negative binomial regression of regime behavior suggested that civilian casualties were the most significant predictor of a government response to nonstate mobilization. Ultimately, the …
Citizen Chávez: The State, Social Movements, And Publics, Anthony Peter Spanakos
Citizen Chávez: The State, Social Movements, And Publics, Anthony Peter Spanakos
Anthony Spanakos
Scholars are divided over whether the emancipatory politics promised by new social movements can be attained within civil society or whether seizure of the state apparatus is necessary. The Bolivarian Revolution led by President Hugo Chávez presents a crucial case for examining this question. Chávez’s use of the state apparatus has been fundamental in broadening the concept of citizenship, but this extension of citizenship has occurred alongside the deliberate exclusion of others. This has not only limited its appeal as a citizenship project but created counterpublics that challenge the functioning of the government and its very legitimacy. Analysis of Bolivarianism …
Forensic Analysis Of Spy Applications In Android Devices, Shinelle Hutchinson, Umit Karabiyik
Forensic Analysis Of Spy Applications In Android Devices, Shinelle Hutchinson, Umit Karabiyik
Annual ADFSL Conference on Digital Forensics, Security and Law
Smartphones with Google's Android operating system are becoming more and more popular each year, and with this increased user base, comes increased opportunities to collect more of these users' private data. There have been several instances of malware being made available via the Google Play Store, which is one of the predominant means for users to download applications. One effective way of collecting users' private data is by using Android Spyware. In this paper, we conduct a forensic analysis of a malicious Android spyware application and present our findings. We also highlight what information the application accesses and what it …
Contents, Adfsl
Contents, Adfsl
Annual ADFSL Conference on Digital Forensics, Security and Law
No abstract provided.
Front Matter, Adfsl
Front Matter, Adfsl
Annual ADFSL Conference on Digital Forensics, Security and Law
No abstract provided.
Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth
Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth
Annual ADFSL Conference on Digital Forensics, Security and Law
Data Protection and Computer Forensics/Anti-Forensics has now become a critical area of concern for organizations. A key element to this is how data is sanitized at end of life. In this paper we explore Hybrid Solid State Hybrid Drives (SSHD) and the impact that various Computer Forensics and Data Recovery techniques have when performing data erasure upon a SSHD.
Knowledge Expiration In Security Awareness Training, Tianjian Zhang
Knowledge Expiration In Security Awareness Training, Tianjian Zhang
Annual ADFSL Conference on Digital Forensics, Security and Law
No abstract provided.
Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle
Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle
Annual ADFSL Conference on Digital Forensics, Security and Law
In this paper we introduce a new software concept specifically designed to allow the digital forensics professional to clearly identify and attribute instances of LSB image steganography by using the original cover image in side-by-side comparison with a suspected steganographic payload image. The “CounterSteg” software allows detailed analysis and comparison of both the original cover image and any modified image, using sophisticated bit- and color-channel visual depiction graphics. In certain cases, the steganographic software used for message transmission can be identified by the forensic analysis of LSB and other changes in the payload image. The paper demonstrates usage and typical …
Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba
Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba
Annual ADFSL Conference on Digital Forensics, Security and Law
Cloud computing has revolutionized the methods by which digital data is stored, processed, and transmitted. It is providing users with data storage and processing services, enabling access to resources through multiple devices. Although organizations continue to embrace the advantages of flexibility and scalability offered by cloud computing, insider threats are becoming a serious concern as cited by security researchers. Insiders can use authorized access to steal sensitive information, calling for the need for an investigation. This concept paper describes research in progress towards developing a Neo4j graph database tool to enhance client forensics. The tool, with a Python interface, allows …
Non-Use Of A Mobile Phone During Conducting Crime Can Also Be Evidential, Vinod Polpaya Bhattathiripad Ph D
Non-Use Of A Mobile Phone During Conducting Crime Can Also Be Evidential, Vinod Polpaya Bhattathiripad Ph D
Annual ADFSL Conference on Digital Forensics, Security and Law
Cyber-clever criminals who are aware of the consequence of using mobile phones during conducting crimes often stay away from their phones while involved in crimes. Some of them even change their handset and SIM card, subsequently. This article looks into how, intentional disassociation (and even unintentional non-use) of mobile phone in (non-cyber) crimes, can become evidential clues of the perpetrators’ involvement in criminal acts. With the help of a recent judicial episode, this article reveals how extremely careful and masterful handling of extensive and voluminous Call Details Records and tower dumps by a cyber-savvy investigating official can unearth evidential clues …
Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac
Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac
Annual ADFSL Conference on Digital Forensics, Security and Law
Drones (also known as Unmanned Aerial Vehicles – UAVs) are a potential source of evidence in a digital investigation, partly due to their increasing popularity in our society. However, existing UAV/drone forensics generally rely on conventional digital forensic investigation guidelines such as those of ACPO and NIST, which may not be entirely fit-for-purpose. In this paper, we identify the challenges associated with UAV/drone forensics. We then explore and evaluate existing forensic guidelines, in terms of their effectiveness for UAV/drone forensic investigations. Next, we present our set of guidelines for UAV/drone investigations. Finally, we demonstrate how the proposed guidelines can be …
Detection And Recovery Of Anti-Forensic (Vault) Applications On Android Devices, Michaila Duncan, Umit Karabiyik
Detection And Recovery Of Anti-Forensic (Vault) Applications On Android Devices, Michaila Duncan, Umit Karabiyik
Annual ADFSL Conference on Digital Forensics, Security and Law
Significant number of mobile device users currently employ anti-forensics applications, also known as vault or locker applications, on their mobile devices in order to hide files such as photos. Because of this, investigators are required to spend a large portion of their time manually looking at the applications installed on the device. Currently, there is no automated method of detecting these anti-forensics applications on an Android device. This work presents the creation and testing of a vault application detection system to be used on Android devices. The main goal of this work is twofold: (i) Detecting and reporting the presence …