2,989 research outputs found

    Development of an Artificial Intelligence Method for the Analysis of Bloodstain Patterns

    Get PDF
    Bloodstain Pattern Analysis (BPA) is a forensic discipline that plays a crucial role in reconstructing the events at a crime scene (Acampora, 2014). The shape, size, distribution, and location of bloodstains can help infer the potential murder weapon, the origin of the attack, and if the body has been moved or relocated from the original crime scene. Commonly, errors in identifying blood spatter evidence arise when the crime scene has large amounts of bloodstains which can yield less information during analysis. This study aims to utilize artificial intelligence (A.I.) algorithms to assist the analyst in the analysis of bloodstain patterns. To date, BPA relies on a manual analysis process; therefore, it is imperative to have forensic analysts who can accurately produce reliable results (Hoelz, 2009). However, human error is unavoidable, and analyst error can result in inaccurate conclusions that can jeopardize casework. The President's Council of Advisors on Science and Technology (PCAST) report on Forensic Science in Criminal Courts: Ensuring Scientific Validity of Feature-Comparison Methods brought to light the shortcomings of many forensic disciplines, including BPA. To improve the field of BPA, automated and computer-assisted methods of analysis are needed. In this study, we used A.I. to estimate the angle of impact from simulated crime scene samples. Our A.I.-assisted approach was determined to be accurate for 78.64% of all data analyzed. This study focused on the analysis of photos taken from a single impact angle as the primary input data. Bloodstain patterns were experimentally constructed using controlled conditions, and a single variable altered at a time

    Implementation of DNA Pattern Recognition in Turing Machines

    Get PDF
    Pattern recognition is the act of takingin raw data and taking an action based on thecategory of the pattern. DNA pattern recognitionhas applications in almost any field. It hasapplications in forensics, genetic engineering, bioinformatics, DNA nanotechnology, history and soon. The size of the DNA molecules can be verylarge that it is a tedious task to perform patternrecognition for the same using commontechniques. Hence this paper describes the patternrecognition for DNA molecules using the conceptof Turing Machines. It also performs a simulationof the standard Turing Machine that performsDNA pattern recognition on the Universal TuringMachine

    Explainable digital forensics AI: Towards mitigating distrust in AI-based digital forensics analysis using interpretable models

    Get PDF
    The present level of skepticism expressed by courts, legal practitioners, and the general public over Artificial Intelligence (AI) based digital evidence extraction techniques has been observed, and understandably so. Concerns have been raised about closed-box AI models’ transparency and their suitability for use in digital evidence mining. While AI models are firmly rooted in mathematical, statistical, and computational theories, the argument has centered on their explainability and understandability, particularly in terms of how they arrive at certain conclusions. This paper examines the issues with closed-box models; the goals; and methods of explainability/interpretability. Most importantly, recommendations for interpretable AI-based digital forensics (DF) investigation are proposed

    An overview of 3D printing in forensic science: the tangible third-dimension

    Get PDF
    There has been a rapid development and utilization of three‐dimensional (3D) printing technologies in engineering, health care, and dentistry. Like many technologies in overlapping disciplines, these techniques have proved to be useful and hence incorporated into the forensic sciences. Therefore, this paper describes how the potential of using 3D printing is being recognized within the various sub‐disciplines of forensic science and suggests areas for future applications. For instance, the application can create a permanent record of an object or scene that can be used as demonstrative evidence, preserving the integrity of the actual object or scene. Likewise, 3D printing can help with the visualization of evidential spatial relationships within a scene and increase the understanding of complex terminology within a courtroom. However, while the application of 3D printing to forensic science is beneficial, currently there is limited research demonstrated in the literature and a lack of reporting skewing the visibility of the applications. Therefore, this article highlights the need to create good practice for 3D printing across the forensic science process, the need to develop accurate and admissible 3D printed models while exploring the techniques, accuracy and bias within the courtroom, and calls for the alignment of future research and agendas perhaps in the form of a specialist working group

    Study of Peer-to-Peer Network Based Cybercrime Investigation: Application on Botnet Technologies

    Full text link
    The scalable, low overhead attributes of Peer-to-Peer (P2P) Internet protocols and networks lend themselves well to being exploited by criminals to execute a large range of cybercrimes. The types of crimes aided by P2P technology include copyright infringement, sharing of illicit images of children, fraud, hacking/cracking, denial of service attacks and virus/malware propagation through the use of a variety of worms, botnets, malware, viruses and P2P file sharing. This project is focused on study of active P2P nodes along with the analysis of the undocumented communication methods employed in many of these large unstructured networks. This is achieved through the design and implementation of an efficient P2P monitoring and crawling toolset. The requirement for investigating P2P based systems is not limited to the more obvious cybercrimes listed above, as many legitimate P2P based applications may also be pertinent to a digital forensic investigation, e.g, voice over IP, instant messaging, etc. Investigating these networks has become increasingly difficult due to the broad range of network topologies and the ever increasing and evolving range of P2P based applications. In this work we introduce the Universal P2P Network Investigation Framework (UP2PNIF), a framework which enables significantly faster and less labour intensive investigation of newly discovered P2P networks through the exploitation of the commonalities in P2P network functionality. In combination with a reference database of known network characteristics, it is envisioned that any known P2P network can be instantly investigated using the framework, which can intelligently determine the best investigation methodology and greatly expedite the evidence gathering process. A proof of concept tool was developed for conducting investigations on the BitTorrent network.Comment: This is a thesis submitted in fulfilment of a PhD in Digital Forensics and Cybercrime Investigation in the School of Computer Science, University College Dublin in October 201

    To Teach, Delight, and Inspire. Experiences with Kim Sowol’s Jindallaekkot (Azaleas) as a Printed Facsimile, Printed Scholarly Edition, Web-based Reading Text, and Virtual Reality Experience

    Get PDF
    Here we document how college students responded to a canonical book of Korean poems, Kim Sowol’s 1925 Jindallaekkot (Azaleas), presented in a variety of formats: as part of a 2014 printed facsimile, a 2007 printed scholarly edition, a reading text articulated as a web page on a tablet, and a radical refiguration as a virtual reality forest. We asked students to describe if they enjoyed and felt inspired by their encounters with Kim Sowol’s poetry in these different formats. We also asked if they felt their experiences were educational and if they engendered a desire to share Kim Sowol’s poetry with international peers. Student responses suggest that encounters with novel forms of canonical texts are enjoyable, inspiring, and create a desire to share them with international peers, especially if novel presentations are complemented by more familiar textual idioms, which students found the most educational

    To Teach, Delight, and Inspire. Experiences with Kim Sowol’s Jindallaekkot (Azaleas) as a Printed Facsimile, Printed Scholarly Edition, Web-based Reading Text, and Virtual Reality Experience

    Get PDF
    Here we document how college students responded to a canonical book of Korean poems, Kim Sowol’s 1925 Jindallaekkot (Azaleas), presented in a variety of formats: as part of a 2014 printed facsimile, a 2007 printed scholarly edition, a reading text articulated as a web page on a tablet, and a radical refiguration as a virtual reality forest. We asked students to describe if they enjoyed and felt inspired by their encounters with Kim Sowol’s poetry in these different formats. We also asked if they felt their experiences were educational and if they engendered a desire to share Kim Sowol’s poetry with international peers. Student responses suggest that encounters with novel forms of canonical texts are enjoyable, inspiring, and created a desire to share them with international peers, especially if novel presentations are complemented by more familiar textual idioms, which students found the most educational

    Effects of different coating materials on three-dimensional optical scanning accuracy

    Get PDF
    The processes of three-dimensional optical scanning depend on the reflection of the surface to be digitized. To scanspecular or translucent surfaces, it is necessary to apply a coating material which interferes with the accuracy of thethree-dimensional measurements. This study proposes the use of gold, silver, platinum, and carbon by sputtering to coatthe surfaces to be scanned. The effects of these materials on the accuracy of the three-dimensional scanning were evalu-ated and compared with those of two frequently used materials, namely, talc and non-aqueous wet developer for pene-trant testing. To verify the resulting geometric variations, specimens were scanned before and after the application ofeach coating material. The results showed that the intrinsic errors of the three-dimensional scanning process, such asthe registration of several point clouds, can have more significant effects than the coating material used. Measurementstaken from a single point cloud showed dimensional tolerances of approximately 0.01mm for gold, platinum, and carboncoating. These coatings offer significantly higher accuracy than the traditionally used developer and are suggested foraccurate three-dimensional scanning of specular and translucent surfaces

    Real-time monitoring as a supplementary security component of vigilantism in modern network environments

    Get PDF
    © 2020, The Author(s). The phenomenon of network vigilantism is autonomously attributed to how anomalies and obscure activities from adversaries can be tracked in real-time. Needless to say, in today’s dynamic, virtualized, and complex network environments, it has become undeniably necessary for network administrators, analysts as well as engineers to practice network vigilantism, on traffic as well as other network events in real-time. The reason is to understand the exact security posture of an organization’s network environment at any given time. This is driven by the fact that modern network environments do, not only present new opportunities to organizations but also a different set of new and complex cybersecurity challenges that need to be resolved daily. The growing size, scope, complexity, and volume of networked devices in our modern network environments also makes it hard even for the most experienced network administrators to independently provide the breadth and depth of knowledge needed to oversee or diagnose complex network problems. Besides, with the growing number of Cyber Security Threats (CSTs) in the world today, many organisations have been forced to change the way they plan, develop and implement cybersecurity strategies as a way to reinforce their ability to respond to cybersecurity incidents. This paper, therefore, examines the relevance of Real-Time Monitoring (RTM) as a supplementary security component of vigilantism in modern network environments, more especially for proper planning, preparedness, and mitigation in case of a cybersecurity incident. Additionally, this paper also investigates some of the key issues and challenges surrounding the implementation of RTM for security vigilantism in our modern network environments
    • 

    corecore