1,401 research outputs found

    Investigating visualisation techniques for rapid triage of digital forensic evidence

    Get PDF
    This study investigates the feasibility of a tool that allows digital forensics (DF) investigators to efficiently triage device datasets during the collection phase of an investigation. This tool utilises data visualisation techniques to display images found in near real-time to the end user. Findings indicate that participants were able to accurately identify contraband material whilst using this tool, however, classification accuracy dropped slightly with larger datasets. Combined with participant feedback, the results show that the proposed triage method is indeed feasible, and this tool provides a solid foundation for the continuation of further work

    Identifying Trace Evidence from Target-Specific Data Wiping Application Software

    Get PDF
    One area of particular concern for computer forensics examiners involves situations in which someone utilized software applications to destroy evidence. There are products available in the marketplace that are relatively inexpensive and advertised as being able to destroy targeted portions of data stored within a computer system. This study was undertaken to analyze a subset of these tools in order to identify trace evidence, if any, left behind on disk media after executing these applications. We evaluated five Windows 7 compatible software products whose advertised features include the ability for users to wipe targeted files, folders, or evidence of selected activities. We conducted a series of experiments that involved executing each application on systems with identical data, and we then analyzed the results and compared the before and after images for each application. We identified information for each application that is beneficial to forensics examiners when faced with similar situations. This paper describes our application selection process, our application evaluation methodology, and our findings, including the variability of the effects of these tools. Following this, we describe limitations of this study and suggest areas of additional research that will benefit the study of digital forensics. --from articl

    Identifying Trace Evidence from Target-Specific Data Wiping Application Software

    Get PDF
    One area of particular concern for computer forensics examiners involves situations in which someone utilized software applications to destroy evidence. There are products available in the marketplace that are relatively inexpensive and advertised as being able to destroy targeted portions of data stored within a computer system. This study was undertaken to analyze a subset of these tools in order to identify trace evidence, if any, left behind on disk media after executing these applications. We evaluated five Windows 7 compatible software products whose advertised features include the ability for users to wipe targeted files, folders, or evidence of selected activities. We conducted a series of experiments that involved executing each application on systems with identical data, and we then analyzed the results and compared the before and after images for each application. We identified information for each application that is beneficial to forensics examiners when faced with similar situations. This paper describes our application selection process, our application evaluation methodology, and our findings, including the variability of the effects of these tools. Following this, we describe limitations of this study and suggest areas of additional research that will benefit the study of digital forensics. --from articl

    Identifying Trace Evidence from Target-Specific Data Wiping Application Software

    Get PDF
    One area of particular concern for computer forensics examiners involves situations in which someone utilized software applications to destroy evidence. There are products available in the marketplace that are relatively inexpensive and advertised as being able to destroy targeted portions of data stored within a computer system. This study was undertaken to analyze a subset of these tools in order to identify trace evidence, if any, left behind on disk media after executing these applications. We evaluated five Windows 7 compatible software products whose advertised features include the ability for users to wipe targeted files, folders, or evidence of selected activities. We conducted a series of experiments that involved executing each application on systems with identical data, and we then analyzed the results and compared the before and after images for each application. We identified information for each application that is beneficial to forensics examiners when faced with similar situations. This paper describes our application selection process, our application evaluation methodology, and our findings, including the variability of the effects of these tools. Following this, we describe limitations of this study and suggest areas of additional research that will benefit the study of digital forensics

    Climate Dynamics: A Network-Based Approach for the Analysis of Global Precipitation

    Get PDF
    Precipitation is one of the most important meteorological variables for defining the climate dynamics, but the spatial patterns of precipitation have not been fully investigated yet. The complex network theory, which provides a robust tool to investigate the statistical interdependence of many interacting elements, is used here to analyze the spatial dynamics of annual precipitation over seventy years (1941-2010). The precipitation network is built associating a node to a geographical region, which has a temporal distribution of precipitation, and identifying possible links among nodes through the correlation function. The precipitation network reveals significant spatial variability with barely connected regions, as Eastern China and Japan, and highly connected regions, such as the African Sahel, Eastern Australia and, to a lesser extent, Northern Europe. Sahel and Eastern Australia are remarkably dry regions, where low amounts of rainfall are uniformly distributed on continental scales and small-scale extreme events are rare. As a consequence, the precipitation gradient is low, making these regions well connected on a large spatial scale. On the contrary, the Asiatic South-East is often reached by extreme events such as monsoons, tropical cyclones and heat waves, which can all contribute to reduce the correlation to the short-range scale only. Some patterns emerging between mid-latitude and tropical regions suggest a possible impact of the propagation of planetary waves on precipitation at a global scale. Other links can be qualitatively associated to the atmospheric and oceanic circulation. To analyze the sensitivity of the network to the physical closeness of the nodes, short-term connections are broken. The African Sahel, Eastern Australia and Northern Europe regions again appear as the supernodes of the network, confirming furthermore their long-range connection structure. Almost all North-American and Asian nodes vanish, revealing that extreme events can enhance high precipitation gradients, leading to a systematic absence of long-range patterns

    Improved TPB-coated Light Guides for Liquid Argon TPC Light Detection Systems

    Get PDF
    Scintillation light produced in liquid argon (LAr) must be shifted from 128 nm to visible wavelengths in light detection systems used for liquid argon time-projection chambers (LArTPCs). To date, LArTPC light collection systems have employed tetraphenyl butadiene (TPB) coatings on photomultiplier tubes (PMTs) or plates placed in front of the PMTs. Recently, a new approach using TPB-coated light guides was proposed. In this paper, we report on light guides with improved attenuation lengths above 100 cm when measured in air. This is an important step in the development of meter-scale light guides for future LArTPCs. Improvements come from using a new acrylic-based coating, diamond-polished cast UV transmitting acrylic bars, and a hand-dipping technique to coat the bars. We discuss a model for connecting bar response in air to response in liquid argon and compare this to data taken in liquid argon. The good agreement between the prediction of the model and the measured response in liquid argon demonstrates that characterization in air is sufficient for quality control of bar production. This model can be used in simulations of light guides for future experiments.Comment: 25 pages, 20 figure

    The evidence for and against astronomical impacts on climate change and mass extinctions: A review

    Full text link
    Numerous studies over the past 30 years have suggested there is a causal connection between the motion of the Sun through the Galaxy and terrestrial mass extinctions or climate change. Proposed mechanisms include comet impacts (via perturbation of the Oort cloud), cosmic rays and supernovae, the effects of which are modulated by the passage of the Sun through the Galactic midplane or spiral arms. Supposed periodicities in the fossil record, impact cratering dates or climate proxies over the Phanerozoic (past 545 Myr) are frequently cited as evidence in support of these hypotheses. This remains a controversial subject, with many refutations and replies having been published. Here I review both the mechanisms and the evidence for and against the relevance of astronomical phenomena to climate change and evolution. This necessarily includes a critical assessment of time series analysis techniques and hypothesis testing. Some of the studies have suffered from flaws in methodology, in particular drawing incorrect conclusions based on ruling out a null hypothesis. I conclude that there is little evidence for intrinsic periodicities in biodiversity, impact cratering or climate on timescales of tens to hundreds of Myr. Furthermore, Galactic midplane and spiral arm crossings seem to have little or no impact on biological or climate variation above background level. (truncated)Comment: 51 pages, 7 figures, 140 references. To appear in the International Journal of Astrobiology. For hyperref version with full resolution figures see http://www.mpia-hd.mpg.de/homes/calj/astimpact_ija.pd

    One-Time Pad Encryption Steganography System

    Get PDF
    In this paper we introduce and describe a novel approach to adaptive image steganography which is combined with One-Time Pad encryption, and demonstrate the software which implements this methodology. Testing using the state-of-the-art steganalysis software tool StegExpose concludes the image hiding is reliably secure and undetectable using reasonably-sized message payloads (≤25% message bits per image pixel; bpp). Payload image file format outputs from the software include PNG, BMP, JP2, JXR, J2K, TIFF, and WEBP. A variety of file output formats is empirically important as most steganalysis programs will only accept PNG, BMP, and possibly JPG, as the file inputs. Keywords: steganography, one-time pad, steganalysis, information hiding, digital forensic
    • …
    corecore