首页 > 最新文献

Journal of Digital Forensics Security and Law最新文献

英文 中文
Viability of Consumer Grade Hardware for Learning Computer Forensics Principles 消费级硬件学习计算机取证原理的可行性
IF 0.3 Pub Date : 2022-01-01 DOI: 10.15394/jdfsl.2022.1683
Lazaro A. Herrera
We propose utilizing budget consumer hardware and software to teach computer forensics principles and for non-case work, research and developing new techniques. Consumer grade hardware and free/open source software is more easily accessible in most developing markets and can be used as a first purchase for education, technique development and even when developing new techniques. These techniques should allow for small forensics laboratories or classroom settings to have the tooling and framework for trying existing forensics techniques or creating new forensics techniques on consumer grade hardware. We’ll be testing how viable each individual piece of hardware is as well as combinations along with seeing at which point utilizing forensics-grade hardware becomes necessary in order to proceed.
我们建议利用预算消费硬件和软件来教授计算机取证原理,并用于非案例工作,研究和开发新技术。消费级硬件和免费/开源软件在大多数发展中市场更容易获得,可以作为教育、技术开发甚至开发新技术时的首次购买。这些技术应该允许小型取证实验室或教室设置使用工具和框架来尝试现有取证技术或在消费级硬件上创建新的取证技术。我们将测试每个单独的硬件以及组合的可行性,并看到在什么时候使用取证级硬件成为必要的,以便继续进行。
{"title":"Viability of Consumer Grade Hardware for Learning Computer Forensics Principles","authors":"Lazaro A. Herrera","doi":"10.15394/jdfsl.2022.1683","DOIUrl":"https://doi.org/10.15394/jdfsl.2022.1683","url":null,"abstract":"We propose utilizing budget consumer hardware and software to teach computer forensics principles and for non-case work, research and developing new techniques. Consumer grade hardware and free/open source software is more easily accessible in most developing markets and can be used as a first purchase for education, technique development and even when developing new techniques. These techniques should allow for small forensics laboratories or classroom settings to have the tooling and framework for trying existing forensics techniques or creating new forensics techniques on consumer grade hardware. We’ll be testing how viable each individual piece of hardware is as well as combinations along with seeing at which point utilizing forensics-grade hardware becomes necessary in order to proceed.","PeriodicalId":43224,"journal":{"name":"Journal of Digital Forensics Security and Law","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67058920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Digital Detective's Discourse - A toolset for forensically sound collaborative dark web content annotation and collection 数字侦探的话语-一个工具集法医声音协作暗网内容注释和收集
IF 0.3 Pub Date : 2022-01-01 DOI: 10.15394/jdfsl.2022.1740
J. Bergman, O. Popov
In the last decade, the proliferation of machine learning (ML) algorithms and their application on big data sets have benefited many researchers and practitioners in different scientific areas. Consequently, the research in cybercrime and digital forensics has relied on ML techniques and methods for analyzing large quantities of data such as text, graphics, images, videos, and network traffic scans to support criminal investigations. Complete and accurate training data sets are indispensable for efficient and effective machine learning models. An essential part of creating complete and accurate data sets is annotating or labelling data. We present a method for law enforcement agency investigators to annotate and store specific dark web content. Using a design science strategy, we design and develop tools to enable and extend web content annotation. The annotation tool was implemented as a plugin for the Tor browser. It can store web content, thus automatically creating a dataset of dark web data pertinent to criminal investigations. Combined with a central storage management server, enabling annotation sharing and collaboration, and a web scraping program, the dataset becomes multifold, dynamic, and extensive while maintaining the forensic soundness of the data saved and transmitted. To manifest our toolset’s fitness of purpose, we used our dataset as training data for ML based classification models. A five cross-fold validation technique was used to evaluate the classifiers, which reported an accuracy score of 85 96%. In the concluding sections, we discuss the possible use-cases of the proposed method in real-life cybercrime investigations, along with ethical concerns and future extensions.
在过去的十年中,机器学习(ML)算法的激增及其在大数据集上的应用使不同科学领域的许多研究人员和从业者受益。因此,网络犯罪和数字取证的研究依赖于机器学习技术和方法来分析大量数据,如文本、图形、图像、视频和网络流量扫描,以支持刑事调查。完整、准确的训练数据集对于高效、有效的机器学习模型是必不可少的。创建完整和准确的数据集的一个重要部分是注释或标记数据。我们提出了一种方法,执法机构的调查人员注释和存储特定的暗网内容。使用设计科学策略,我们设计和开发工具来启用和扩展web内容注释。注释工具是作为Tor浏览器的插件实现的。它可以存储网络内容,从而自动创建与刑事调查相关的暗网数据集。与中央存储管理服务器相结合,允许注释共享和协作,以及网络抓取程序,数据集变得多元,动态和广泛,同时保持保存和传输数据的法医健全。为了显示我们的工具集的目的适应度,我们使用我们的数据集作为基于ML的分类模型的训练数据。使用五交叉验证技术来评估分类器,其准确率评分为85 96%。在结语部分,我们讨论了该方法在现实生活中的网络犯罪调查中的可能用例,以及伦理问题和未来的扩展。
{"title":"The Digital Detective's Discourse - A toolset for forensically sound collaborative dark web content annotation and collection","authors":"J. Bergman, O. Popov","doi":"10.15394/jdfsl.2022.1740","DOIUrl":"https://doi.org/10.15394/jdfsl.2022.1740","url":null,"abstract":"In the last decade, the proliferation of machine learning (ML) algorithms and their application on big data sets have benefited many researchers and practitioners in different scientific areas. Consequently, the research in cybercrime and digital forensics has relied on ML techniques and methods for analyzing large quantities of data such as text, graphics, images, videos, and network traffic scans to support criminal investigations. Complete and accurate training data sets are indispensable for efficient and effective machine learning models. An essential part of creating complete and accurate data sets is annotating or labelling data. We present a method for law enforcement agency investigators to annotate and store specific dark web content. Using a design science strategy, we design and develop tools to enable and extend web content annotation. The annotation tool was implemented as a plugin for the Tor browser. It can store web content, thus automatically creating a dataset of dark web data pertinent to criminal investigations. Combined with a central storage management server, enabling annotation sharing and collaboration, and a web scraping program, the dataset becomes multifold, dynamic, and extensive while maintaining the forensic soundness of the data saved and transmitted. To manifest our toolset’s fitness of purpose, we used our dataset as training data for ML based classification models. A five cross-fold validation technique was used to evaluate the classifiers, which reported an accuracy score of 85 96%. In the concluding sections, we discuss the possible use-cases of the proposed method in real-life cybercrime investigations, along with ethical concerns and future extensions.","PeriodicalId":43224,"journal":{"name":"Journal of Digital Forensics Security and Law","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67059019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
TECHNICAL BEHAVIOURS OF CHILD SEXUAL EXPLOITATION MATERIAL OFFENDERS 儿童性剥削的技术性行为
IF 0.3 Pub Date : 2022-01-01 DOI: 10.15394/jdfsl.2022.1794
Chad M. S. Steel, Emily Newman, S. O'Rourke, E. Quayle
An exploration of the technological behaviours of previously convicted child sexual exploitation material (CSEM) offenders provides a foundation for future applied research into deterrence, investigation, and treatment efforts. This study evaluates choices and transitions of individuals previously convicted of CSEM offenses. Based on their inclusion in two sex offender registries, anonymous survey results (n=78) were collected from English-speaking adults within the United States. CSEM offenders chose technologies based on both utility and perceived risk; peer-to-peer and web-browsers were the most common gateway technologies and showed substantial sustained usage; a substantial minority of users never stored CSEM and only viewed it; most respondents used more than one technology to view CSEM; CSEM offenders used more countermeasures than the public but did not use encryption at higher rates; almost all CSEM consumers started viewing adult SEM first; and countermeasures were used primarily to reduce psychological strain (anxiety).
对先前被定罪的儿童性剥削材料(CSEM)犯罪者的技术行为的探索为未来在威慑、调查和治疗方面的应用研究奠定了基础。本研究评估了先前被判犯有性侵罪的个体的选择和转变。根据他们在两个性犯罪者登记处的记录,从美国讲英语的成年人中收集了匿名调查结果(n=78)。CSEM违规者根据效用和感知风险选择技术;点对点和网络浏览器是最常见的网关技术,并显示出大量的持续使用;少数用户从未存储过CSEM,只是浏览过;大多数受访者使用不止一种技术来查看CSEM;CSEM罪犯比公众使用更多的对策,但使用加密的频率并不高;几乎所有的成人SEM消费者都是首先观看成人SEM的;并以减轻心理紧张(焦虑)为主要对策。
{"title":"TECHNICAL BEHAVIOURS OF CHILD SEXUAL EXPLOITATION MATERIAL OFFENDERS","authors":"Chad M. S. Steel, Emily Newman, S. O'Rourke, E. Quayle","doi":"10.15394/jdfsl.2022.1794","DOIUrl":"https://doi.org/10.15394/jdfsl.2022.1794","url":null,"abstract":"An exploration of the technological behaviours of previously convicted child sexual exploitation material (CSEM) offenders provides a foundation for future applied research into deterrence, investigation, and treatment efforts. This study evaluates choices and transitions of individuals previously convicted of CSEM offenses. Based on their inclusion in two sex offender registries, anonymous survey results (n=78) were collected from English-speaking adults within the United States. CSEM offenders chose technologies based on both utility and perceived risk; peer-to-peer and web-browsers were the most common gateway technologies and showed substantial sustained usage; a substantial minority of users never stored CSEM and only viewed it; most respondents used more than one technology to view CSEM; CSEM offenders used more countermeasures than the public but did not use encryption at higher rates; almost all CSEM consumers started viewing adult SEM first; and countermeasures were used primarily to reduce psychological strain (anxiety).","PeriodicalId":43224,"journal":{"name":"Journal of Digital Forensics Security and Law","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67058786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Digital Evidence In Appeals Of Criminal Cases Before The U.S. Courts Of Appeal: A Review Of Decisions And Examination Of The Legal Landscape From 2016 – 2020 美国上诉法院刑事案件上诉中的数字证据:对2016 - 2020年法律格局的审查和审查
IF 0.3 Pub Date : 2022-01-01 DOI: 10.15394/jdfsl.2022.1734
M. Novák
This study is a follow-up to Digital Evidence in Criminal Cases before the U.S. Courts of Appeal: Trends and Issues for Consideration – 2010 to 2015. The current study examines appeals of criminal cases before the United States Courts of Appeal from January 2016 through August 2020, where one or more appeal claims were related to digital evidence. The purpose of this research was to determine if the legal landscape has changed since 2015; examine the most relevant legal issues related to digital evidence; and analyze how precedential cases may have affected digital forensics as evidence.
本研究是《美国上诉法院刑事案件中的数字证据:趋势和需要考虑的问题- 2010 - 2015》的后续研究。目前的研究调查了2016年1月至2020年8月期间美国上诉法院对刑事案件的上诉,其中一项或多项上诉要求与数字证据有关。这项研究的目的是确定自2015年以来法律环境是否发生了变化;审查与数字证据有关的最相关的法律问题;并分析先例案例如何影响作为证据的数字取证。
{"title":"Digital Evidence In Appeals Of Criminal Cases Before The U.S. Courts Of Appeal: A Review Of Decisions And Examination Of The Legal Landscape From 2016 – 2020","authors":"M. Novák","doi":"10.15394/jdfsl.2022.1734","DOIUrl":"https://doi.org/10.15394/jdfsl.2022.1734","url":null,"abstract":"This study is a follow-up to Digital Evidence in Criminal Cases before the U.S. Courts of Appeal: Trends and Issues for Consideration – 2010 to 2015. The current study examines appeals of criminal cases before the United States Courts of Appeal from January 2016 through August 2020, where one or more appeal claims were related to digital evidence. The purpose of this research was to determine if the legal landscape has changed since 2015; examine the most relevant legal issues related to digital evidence; and analyze how precedential cases may have affected digital forensics as evidence.","PeriodicalId":43224,"journal":{"name":"Journal of Digital Forensics Security and Law","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67058978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A CRITICAL COMPARISON OF BRAVE BROWSER AND GOOGLE CHROME FORENSIC ARTEFACTS 勇敢的浏览器和谷歌铬法医文物的关键比较
IF 0.3 Pub Date : 2022-01-01 DOI: 10.15394/jdfsl.2022.1752
Stuart Berham, Sarah Morris
Digital forensic practitioners are tasked with the identification, recovery, and analysis of Internet browser artefacts which may have been used in the pursuit of committing a civil or criminal offence. This research paper critically compares the most downloaded browser, Google Chrome, against an increasingly popular Chromium browser known as Brave, said to offer privacy-by-default. With increasing forensic caseloads, data complexity, and requirements for method validation to satisfy ISO 17025 accreditation, recognising the similarities and differences between the browsers, developed on the same underlying technology is essential. The paper describes a series of conducted experiments and subsequent analysis to identify artefacts created as part of normal user browsing activity. Analysis of the artefacts found that Brave and Chrome share almost identical data structures, with on-disk artefact recovery successful, even for deleted data. The outcome of this research, based upon the results, serves to enrich understanding and provide best practice for practitioners and software developers, respectively responsible for examining Chromium artefacts for use in evidence production and developing new forensic tools and techniques.
数字法医从业者的任务是识别、恢复和分析可能被用于实施民事或刑事犯罪的互联网浏览器人工制品。这篇研究论文对下载最多的浏览器b谷歌Chrome和日益流行的Chrome浏览器Brave进行了批判性的比较,后者据说提供默认隐私保护。随着越来越多的取证案件、数据复杂性和满足ISO 17025认证的方法验证要求的增加,识别基于相同底层技术开发的浏览器之间的异同是至关重要的。本文描述了一系列进行的实验和随后的分析,以识别作为正常用户浏览活动的一部分创建的人工制品。对伪产物的分析发现,Brave和Chrome共享几乎相同的数据结构,磁盘上的伪产物恢复成功,甚至对于删除的数据也是如此。这项研究的结果,基于结果,有助于丰富理解,并为从业者和软件开发人员提供最佳实践,分别负责检查用于证据生产的Chromium人工制品和开发新的法医工具和技术。
{"title":"A CRITICAL COMPARISON OF BRAVE BROWSER AND GOOGLE CHROME FORENSIC ARTEFACTS","authors":"Stuart Berham, Sarah Morris","doi":"10.15394/jdfsl.2022.1752","DOIUrl":"https://doi.org/10.15394/jdfsl.2022.1752","url":null,"abstract":"Digital forensic practitioners are tasked with the identification, recovery, and analysis of Internet browser artefacts which may have been used in the pursuit of committing a civil or criminal offence. This research paper critically compares the most downloaded browser, Google Chrome, against an increasingly popular Chromium browser known as Brave, said to offer privacy-by-default. With increasing forensic caseloads, data complexity, and requirements for method validation to satisfy ISO 17025 accreditation, recognising the similarities and differences between the browsers, developed on the same underlying technology is essential. The paper describes a series of conducted experiments and subsequent analysis to identify artefacts created as part of normal user browsing activity. Analysis of the artefacts found that Brave and Chrome share almost identical data structures, with on-disk artefact recovery successful, even for deleted data. The outcome of this research, based upon the results, serves to enrich understanding and provide best practice for practitioners and software developers, respectively responsible for examining Chromium artefacts for use in evidence production and developing new forensic tools and techniques.","PeriodicalId":43224,"journal":{"name":"Journal of Digital Forensics Security and Law","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67058666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Combined Approach For Private Indexing Mechanism 私有索引机制的一种组合方法
IF 0.3 Pub Date : 2022-01-01 DOI: 10.15394/jdfsl.2022.1790
Pranita Desai, V. Shelake
Private indexing is a set of approaches for analyzing research data that are similar or resemble similar ones. This is used in the database to keep track of the keys and their values. The main subject of this research is private indexing in record linkage to secure the data. Because unique personal identification numbers or social security numbers are not accessible in most countries or databases, data linkage is limited to attributes such as date of birth and names to distinguish between the number of records and the real-life entities they represent. For security reasons, the encryption of these identifiers is required. Privacy-preserving record linkage, frequently used to link private data within several databases from different companies, prevents sensitive information from being exposed to other companies. This research used a combined method to evaluate the data, using classic and new indexing methods. A combined approach is more secure than typical standard indexing in terms of privacy. Multibit tree indexing, which groups comparable data in many ways, creates a scalable tree-like structure that is both space and time flexible, as it avoids the need for redundant block structures. Because the record pair numbers to compare are the Cartesian product of both the file record numbers, the work required grows with the number of records to compare in the files. The evaluation findings of this research showed that combined method is scalable in terms of the number of databases to be linked, the database size, and the time required.
私有索引是一组用于分析相似或类似研究数据的方法。这在数据库中用于跟踪键及其值。本研究的主要课题是记录链接中的私有索引,以保证数据的安全。由于在大多数国家或数据库中无法访问唯一的个人识别号码或社会安全号码,因此数据链接仅限于诸如出生日期和姓名等属性,以区分记录的数量和它们所代表的现实生活实体。出于安全考虑,需要对这些标识符进行加密。保护隐私的记录链接,经常用于连接来自不同公司的几个数据库中的私人数据,防止敏感信息暴露给其他公司。本研究采用经典索引与新索引相结合的方法对数据进行评价。就隐私而言,组合方法比典型的标准索引更安全。多比特树索引以多种方式对可比较的数据进行分组,它创建了一个可扩展的树状结构,在空间和时间上都很灵活,因为它避免了对冗余块结构的需要。因为要比较的记录对号是两个文件记录号的笛卡尔积,所以所需的工作量随着文件中要比较的记录数量的增加而增加。本研究的评估结果表明,组合方法在要链接的数据库数量、数据库大小和所需时间方面具有可扩展性。
{"title":"A Combined Approach For Private Indexing Mechanism","authors":"Pranita Desai, V. Shelake","doi":"10.15394/jdfsl.2022.1790","DOIUrl":"https://doi.org/10.15394/jdfsl.2022.1790","url":null,"abstract":"Private indexing is a set of approaches for analyzing research data that are similar or resemble similar ones. This is used in the database to keep track of the keys and their values. The main subject of this research is private indexing in record linkage to secure the data. Because unique personal identification numbers or social security numbers are not accessible in most countries or databases, data linkage is limited to attributes such as date of birth and names to distinguish between the number of records and the real-life entities they represent. For security reasons, the encryption of these identifiers is required. Privacy-preserving record linkage, frequently used to link private data within several databases from different companies, prevents sensitive information from being exposed to other companies. This research used a combined method to evaluate the data, using classic and new indexing methods. A combined approach is more secure than typical standard indexing in terms of privacy. Multibit tree indexing, which groups comparable data in many ways, creates a scalable tree-like structure that is both space and time flexible, as it avoids the need for redundant block structures. Because the record pair numbers to compare are the Cartesian product of both the file record numbers, the work required grows with the number of records to compare in the files. The evaluation findings of this research showed that combined method is scalable in terms of the number of databases to be linked, the database size, and the time required.","PeriodicalId":43224,"journal":{"name":"Journal of Digital Forensics Security and Law","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67058775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proposed L-Shape Pattern on UFS ACM For Risk Analysis 在UFS ACM上提出l形模式进行风险分析
IF 0.3 Pub Date : 2022-01-01 DOI: 10.15394/jdfsl.2022.1728
A. Asthana, P. Pradhan
At this cloud age, there is tremendous growth in business, services, resources, and cloud technology. This growth comes with risk of unsafe, unordered, and uncertainty due to unauthorized access and theft of confidential propriety data. Our objective is to model around Read, Write and Execute to resolve these unordered, unsafe, and uncertain issues. We will develop a L-Shape pattern model matching UFS ACM to minimize the accessibilities based on RIGHT & ROLE of the resources and maximize the quality of services for safety and high availability. The preventive, detective, corrective (PDC) services are the major roles for all levels of management to coordinate, control the multiple technologies and resources which are working simultaneously. It will be more ordered, accountable, and actionable on real-time access control mechanism for scalabilities, reliability, performance, and high availability of computational services. We have to make safer, certain, unified, and step-by-step normalization by applying this UFS ACM mechanism on UNIX operating system. This proposed research paper covers a wide range of areas covering optimization, normalization, Fuzzy Low, and Risk assessment.
在这个云时代,业务、服务、资源和云技术都有巨大的增长。这种增长伴随着不安全、无序和不确定性的风险,因为未经授权的访问和机密专有数据被盗。我们的目标是围绕读、写和执行进行建模,以解决这些无序、不安全和不确定的问题。我们将开发与UFS ACM相匹配的l形模式模型,以最小化基于资源的RIGHT & ROLE的可访问性,并最大化安全性和高可用性的服务质量。预防、检测、纠错(PDC)服务是各级管理人员协调、控制同时工作的多种技术和资源的主要角色。对于计算服务的可伸缩性、可靠性、性能和高可用性,实时访问控制机制将更加有序、可靠和可操作。我们必须通过在UNIX操作系统上应用这种UFS ACM机制来实现更安全、确定、统一和逐步的规范化。本文的研究内容涵盖了优化、归一化、模糊低值和风险评估等领域。
{"title":"Proposed L-Shape Pattern on UFS ACM For Risk Analysis","authors":"A. Asthana, P. Pradhan","doi":"10.15394/jdfsl.2022.1728","DOIUrl":"https://doi.org/10.15394/jdfsl.2022.1728","url":null,"abstract":"At this cloud age, there is tremendous growth in business, services, resources, and cloud technology. This growth comes with risk of unsafe, unordered, and uncertainty due to unauthorized access and theft of confidential propriety data. Our objective is to model around Read, Write and Execute to resolve these unordered, unsafe, and uncertain issues. We will develop a L-Shape pattern model matching UFS ACM to minimize the accessibilities based on RIGHT & ROLE of the resources and maximize the quality of services for safety and high availability. The preventive, detective, corrective (PDC) services are the major roles for all levels of management to coordinate, control the multiple technologies and resources which are working simultaneously. It will be more ordered, accountable, and actionable on real-time access control mechanism for scalabilities, reliability, performance, and high availability of computational services. We have to make safer, certain, unified, and step-by-step normalization by applying this UFS ACM mechanism on UNIX operating system. This proposed research paper covers a wide range of areas covering optimization, normalization, Fuzzy Low, and Risk assessment.","PeriodicalId":43224,"journal":{"name":"Journal of Digital Forensics Security and Law","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67058958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
To License or Not to License Reexamined: An Updated Report on Licensing of Digital Examiners Under State Private Investigator Statutes 许可或不许可重新审查:根据国家私家侦探法规的数字审查员许可的最新报告
IF 0.3 Pub Date : 2022-01-01 DOI: 10.15394/jdfsl.2022.1770
T. Lonardo, Alan I. Rea, D. White
In this update to the 2015 study, the authors examine US state statutes and regulations relating to licensing and enforcement of Digital Examiner functions under each State’s private investigator/detective statute. As with the prior studies, the authors find that very few state statutes explicitly distinguish between Private Investigators (PI) and Digital Examiners (DE), and when they do, they either explicitly require a license or exempt them from the licensing statute. As noted in the previous 2015 study, there is a minor trend in which some states are moving to exempt DE from PI licensing requirements. We examine this trend and look at some additional information in terms of exemptions, including those relating to practicing attorneys, employer/employee relationships, expert testimony, and penalties for violation of the PI statutes where it is believed a PI license is required. As with the previous studies (Lonardo et al., 2008, 2009, 2012, 2015), we reviewed all state statutes relating to PI licensing. Where statutory language did not explicitly address exemption or inclusion of Digital Examiners, we contacted the relevant state regulatory body (i.e., Secretary of State’s office, State Police, regulatory agency) to assess the applicability of Digital Examiners under the respective state statutes. Based on this statutory review and regulatory feedback, we present the various state approaches to professional Digital Examiner licensing. Our recommendation remains the same: states must differentiate between Private Investigator and Digital Examiner licensing requirements and oversight.
在2015年研究的更新中,作者根据各州的私人调查员/侦探法规检查了与数字审查员的许可和执行职能相关的美国州法规和法规。与之前的研究一样,作者发现很少有州法规明确区分私家侦探(PI)和数字审查员(DE),当他们这样做时,他们要么明确要求获得许可,要么豁免许可法规。正如之前2015年的研究中所指出的,有一个小趋势是,一些州正在采取行动,将DE从PI许可要求中豁免。我们研究了这一趋势,并在豁免方面查看了一些额外的信息,包括与执业律师、雇主/雇员关系、专家证词有关的信息,以及违反PI法规的处罚,这些法规被认为需要PI许可证。与之前的研究一样(罗纳多等人,2008年,2009年,2012年,2015年),我们审查了所有与PI许可相关的州法规。如果法定语言没有明确规定豁免或包括数字审查员,我们联系了相关的州监管机构(即州务卿办公室、州警察、监管机构),以评估数字审查员在各自州法规下的适用性。基于这一法定审查和监管反馈,我们提出了不同州的专业数字审查员许可方法。我们的建议保持不变:各州必须区分私家侦探和数字审查员的许可要求和监督。
{"title":"To License or Not to License Reexamined: An Updated Report on Licensing of Digital Examiners Under State Private Investigator Statutes","authors":"T. Lonardo, Alan I. Rea, D. White","doi":"10.15394/jdfsl.2022.1770","DOIUrl":"https://doi.org/10.15394/jdfsl.2022.1770","url":null,"abstract":"In this update to the 2015 study, the authors examine US state statutes and regulations relating to licensing and enforcement of Digital Examiner functions under each State’s private investigator/detective statute. As with the prior studies, the authors find that very few state statutes explicitly distinguish between Private Investigators (PI) and Digital Examiners (DE), and when they do, they either explicitly require a license or exempt them from the licensing statute. As noted in the previous 2015 study, there is a minor trend in which some states are moving to exempt DE from PI licensing requirements. We examine this trend and look at some additional information in terms of exemptions, including those relating to practicing attorneys, employer/employee relationships, expert testimony, and penalties for violation of the PI statutes where it is believed a PI license is required. As with the previous studies (Lonardo et al., 2008, 2009, 2012, 2015), we reviewed all state statutes relating to PI licensing. Where statutory language did not explicitly address exemption or inclusion of Digital Examiners, we contacted the relevant state regulatory body (i.e., Secretary of State’s office, State Police, regulatory agency) to assess the applicability of Digital Examiners under the respective state statutes. Based on this statutory review and regulatory feedback, we present the various state approaches to professional Digital Examiner licensing. Our recommendation remains the same: states must differentiate between Private Investigator and Digital Examiner licensing requirements and oversight.","PeriodicalId":43224,"journal":{"name":"Journal of Digital Forensics Security and Law","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67058724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessment of 3D mesh watermarking techniques 三维网格水印技术评价
IF 0.3 Pub Date : 2022-01-01 DOI: 10.15394/jdfsl.2022.1745
Neha Sharma, J. Panda
With the increasing usage of three-dimensional meshes in Computer-Aided Design (CAD), medical imaging, and entertainment fields like virtual reality, etc., the authentication problems and awareness of intellectual property protection have risen over the last decade. Numerous watermarking schemes have been suggested to protect ownership and prevent the threat of data piracy. This paper begins with the potential difficulties that arose when dealing with three-dimension entities in comparison to two-dimensional entities and also lists possible algorithms suggested hitherto and their comprehensive analysis. Attacks, also play a crucial role in deciding on a watermarking algorithm so an attack based analysis is also presented to analyze the resilience of watermarking algorithms under several attacks. In the end, some evaluation measures and potential solutions are brooded over to design robust and oblivious watermarking schemes in the future.
随着三维网格在计算机辅助设计(CAD)、医学成像、虚拟现实等娱乐领域的越来越多的应用,近十年来,认证问题和知识产权保护意识不断提高。为了保护所有权和防止数据盗版的威胁,已经提出了许多水印方案。本文从处理三维实体与处理二维实体相比可能出现的困难开始,并列出了迄今为止提出的可能的算法及其综合分析。攻击对水印算法的选择也起着至关重要的作用,因此提出了一种基于攻击的分析方法来分析水印算法在几种攻击下的恢复能力。最后,提出了一些评价方法和可能的解决方案,为今后设计鲁棒性和无关性的水印方案提供参考。
{"title":"Assessment of 3D mesh watermarking techniques","authors":"Neha Sharma, J. Panda","doi":"10.15394/jdfsl.2022.1745","DOIUrl":"https://doi.org/10.15394/jdfsl.2022.1745","url":null,"abstract":"With the increasing usage of three-dimensional meshes in Computer-Aided Design (CAD), medical imaging, and entertainment fields like virtual reality, etc., the authentication problems and awareness of intellectual property protection have risen over the last decade. Numerous watermarking schemes have been suggested to protect ownership and prevent the threat of data piracy. This paper begins with the potential difficulties that arose when dealing with three-dimension entities in comparison to two-dimensional entities and also lists possible algorithms suggested hitherto and their comprehensive analysis. Attacks, also play a crucial role in deciding on a watermarking algorithm so an attack based analysis is also presented to analyze the resilience of watermarking algorithms under several attacks. In the end, some evaluation measures and potential solutions are brooded over to design robust and oblivious watermarking schemes in the future.","PeriodicalId":43224,"journal":{"name":"Journal of Digital Forensics Security and Law","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67059102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Forensic Discoverability of iOS Vault Applications iOS Vault应用程序的取证可发现性
IF 0.3 Pub Date : 2022-01-01 DOI: 10.15394/jdfsl.2022.1773
A. Gilbert, Kathryn C. Seigfried-Spellar
Vault Applications store potentially sensitive information on a smartphone; and are available on Android and iOS. Using these applications could be used to hide potential evidence or illicit photos. After comparing five iOS photo vaults, each vault left evidence and photos behind. However, of the three forensic toolkits used, each produced different results in their scans of the phone. The media left behind was due to the photo vaults not protecting their information as claimed and using basic obfuscation techniques in place of security controls. Future research will look at how newer security controls are implemented and if they are easily discoverable.
Vault应用程序在智能手机上存储潜在的敏感信息;并且可以在Android和iOS上使用。使用这些应用程序可以用来隐藏潜在的证据或非法照片。在比较了五个iOS照片库后,每个库都留下了证据和照片。然而,在使用的三种法医工具包中,每一种都在扫描手机时产生了不同的结果。媒体被抛在后面是因为照片库没有像声称的那样保护他们的信息,而是使用基本的混淆技术来代替安全控制。未来的研究将着眼于如何实现新的安全控制,以及它们是否容易被发现。
{"title":"Forensic Discoverability of iOS Vault Applications","authors":"A. Gilbert, Kathryn C. Seigfried-Spellar","doi":"10.15394/jdfsl.2022.1773","DOIUrl":"https://doi.org/10.15394/jdfsl.2022.1773","url":null,"abstract":"Vault Applications store potentially sensitive information on a smartphone; and are available on Android and iOS. Using these applications could be used to hide potential evidence or illicit photos. After comparing five iOS photo vaults, each vault left evidence and photos behind. However, of the three forensic toolkits used, each produced different results in their scans of the phone. The media left behind was due to the photo vaults not protecting their information as claimed and using basic obfuscation techniques in place of security controls. Future research will look at how newer security controls are implemented and if they are easily discoverable.","PeriodicalId":43224,"journal":{"name":"Journal of Digital Forensics Security and Law","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67058734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Journal of Digital Forensics Security and Law
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1