Open Access. Powered by Scholars. Published by Universities.®

Forensic Science and Technology Commons

Open Access. Powered by Scholars. Published by Universities.®

1,110 Full-Text Articles 1,490 Authors 1,150,337 Downloads 78 Institutions

All Articles in Forensic Science and Technology

Faceted Search

1,110 full-text articles. Page 47 of 47.

Table Of Contents, 2010 Embry-Riddle Aeronautical University

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Table Of Contents, 2010 Embry-Riddle Aeronautical University

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


The Prüm Regime: Situated Dis/Empowerment In Transnational Dna Profile Exchange, Barbara Prainsack, Victor Toom 2010 King's College London

The Prüm Regime: Situated Dis/Empowerment In Transnational Dna Profile Exchange, Barbara Prainsack, Victor Toom

victor toom

This paper takes critique of surveillance studies scholars of the shortcomings of the panoptic model for analysing contemporary systems of surveillance as a starting point. We argue that core conceptual tools, in conjunction with an under-conceptualization of agency, privilege a focus on the oppressive elements of surveillance. This often yields unsatisfying insights to why surveillance works, for whom, and at whose costs. We discuss the so-called Prüm regime, pertaining to transnational data exchange for forensic and police use in the EU, to illustrate how—by articulating instances of what we call ‘situated dis/empowerment’—agency can be better conceptualized, sharpening our gaze for …


Qualitative And Quantitative X-Ray Diffraction Analysis For Forensic Examination Of Duct Tapes, Rebecca E. Bucht 2010 The Graduate Center, City University of New York

Qualitative And Quantitative X-Ray Diffraction Analysis For Forensic Examination Of Duct Tapes, Rebecca E. Bucht

Dissertations, Theses, and Capstone Projects

Duct tapes are an increasingly important class of forensic evidence. This research has studied the value of using x-ray diffraction (XRD) to extend the ability of evidence examiners to gain additional information about a duct tape specimen.

Duct tapes are composed of five different layers. Starting from the non-adhesive side, these layers are the release coating, backing, scrim, primer and adhesive. The release coating assists in reducing unwind tension and preventing the tape from sticking to itself when on a roll. The backing layer serves as a support for the adhesive, and is usually based on polyethylene. The scrim is …


Clustering Spam Domains And Destination Websites: Digital Forensics With Data Mining, Chun Wei, Alan Sprague, Gary Warner, Anthony Skjellum 2010 University of Alabama, Birmingham

Clustering Spam Domains And Destination Websites: Digital Forensics With Data Mining, Chun Wei, Alan Sprague, Gary Warner, Anthony Skjellum

Journal of Digital Forensics, Security and Law

Spam related cyber crimes have become a serious threat to society. Current spam research mainly aims to detect spam more effectively. We believe the identification and disruption of the supporting infrastructure used by spammers is a more effective way of stopping spam than filtering. The termination of spam hosts will greatly reduce the profit a spammer can generate and thwart his ability to send more spam. This research proposes an algorithm for clustering spam domains extracted from spam emails based on the hosting IP addresses and tracing the IP addresses over a period of time. The results show that many …


Table Of Contents, 2010 Embry-Riddle Aeronautical University

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Forensic Analysis Of The Windows 7 Registry, Khawla A. Alghafli, Andrew Jones, Thomas A. Martin 2010 Khalifa University of Science, Technology and Research (KUSTAR)

Forensic Analysis Of The Windows 7 Registry, Khawla A. Alghafli, Andrew Jones, Thomas A. Martin

Journal of Digital Forensics, Security and Law

The recovery of digital evidence of crimes from storage media is an increasingly time consuming process as the capacity of the storage media is in a state of constant growth. It is also a difficult and complex task for the forensic investigator to analyse all of the locations in the storage media. These two factors, when combined, may result in a delay in bringing a case to court. The concept of this paper is to start the initial forensic analysis of the storage media in locations that are most likely to contain digital evidence, the Windows Registry. Consequently, the forensic …


Table Of Contents, 2010 Embry-Riddle Aeronautical University

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Generating System Requirements For A Mobile Digital Evidence Collection System: A Preliminary Step Towards Enhancing The Forensic Collection Of Digital Devices, Ibrahim Baggili 2010 University of New Haven

Generating System Requirements For A Mobile Digital Evidence Collection System: A Preliminary Step Towards Enhancing The Forensic Collection Of Digital Devices, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

Collecting digital devices in a forensically sound manner is becoming more critical since 80% of all cases have some sort of digital evidence involved in them (Rogers, 2006, p. 1) .The process of documenting and tagging digital devices is cumbersome and involves details that might not apply to other types of evidence, since each evidence item has unique physical characteristics (Hesitis & Wilbon, 2005, p. 17). The process becomes less manageable when a large number of digital devices are seized. This paper examines the information and issues investigators should be aware of when collecting digital devices at crime scenes. Furthermore, …


Forensic Analysis Of A Playstation 3 Console, Scott Conrad, Greg Dorn, Philip Craiger 2010 University of Central Florida

Forensic Analysis Of A Playstation 3 Console, Scott Conrad, Greg Dorn, Philip Craiger

Publications

The Sony PlayStation 3 (PS3) is a powerful gaming console that supports Internet-related activities, local file storage and the playing of Blu-ray movies. The PS3 also allows users to partition and install a secondary operating system on the hard drive. This “desktop-like” functionality along with the encryption of the primary hard drive containing the gaming software raises significant issues related to the forensic analysis of PS3 systems. This paper discusses the PS3 architecture and behavior, and provides recommendations for conducting forensic investigations of PS3 systems.


Forensic Analysis Of A Playstation 3 Console, Scott Conrad, Greg Dorn, Philip Craiger 2009 University of Central Florida

Forensic Analysis Of A Playstation 3 Console, Scott Conrad, Greg Dorn, Philip Craiger

J. Philip Craiger, Ph.D.

The Sony PlayStation 3 (PS3) is a powerful gaming console that supports Internet-related activities, local file storage and the playing of Blu-ray movies. The PS3 also allows users to partition and install a secondary operating system on the hard drive. This “desktop-like” functionality along with the encryption of the primary hard drive containing the gaming software raises significant issues related to the forensic analysis of PS3 systems. This paper discusses the PS3 architecture and behavior, and provides recommendations for conducting forensic investigations of PS3 systems.


Digital Commons powered by bepress