14,261 research outputs found

    Subject benchmark statement: forensic science

    Get PDF

    A descriptive model of the offence chain for imprisoned adult male firesetters (descriptive model of adult male firesetting)

    Get PDF
    Purpose: Firesetting has devastating consequences. Although some theoretical efforts have been made to explain firesetting (i.e., a small number of multi- and single-factor theories), little effort has been devoted to understand how deliberate firesetting unfolds across time (i.e., micro or offence chain theories). This research aimed to produce the first descriptive offence chain theory for incarcerated adult male firesetters.Methods: Thirty-eight adult male firesetters—recruited from prison establishments in England and Wales—were interviewed about the events, thoughts and feelings leading up to, surrounding, and immediately following a deliberate incident of firesetting. Results: Using Grounded Theory analysis, the Descriptive Model of Adult male Firesetting (DMAF) was developed documenting the cognitive, behavioural, affective and contextual factors leading to a single incident of deliberate firesetting. Conclusions: New information generated from the DMAF is presented and its contributions to the current evidence base are highlighted. Clinical implications, limitations and future research directions are also discussed

    Forensic examination and analysis of the Prefetch files on the banking Trojan malware incidents

    Get PDF
    Whenever a program runs within the operating system, there will be data or artefacts created on the system. This condition applies to the malicious software (malware). Although they intend to obscure their presence on the system with anti-forensic techniques, still they have to run on the victim’s system to acquire their objective. Modern malware creates a significant challenge to the digital forensic community since they are being designed to leave limited traces and misdirect the examiner. Therefore, every examiner should consider performing all the forensics approaches such as memory forensic, live-response and Windows file analysis in the related malware incidents to acquire all the potential evidence on a victim’s system. There is a challenge when an examiner only has an option to perform post-mortem forensic approach. It leads to a question: what is a forensic examination and analysis that available to obtain evidence in such incidents? The paper shows how the Prefetching process works on a system, common characteristics and the differences in the Prefetching process related to the various versions of Windows. Thus, the paper shows how the Prefetch files contain the evidentiary value which could answer what, how, where and when the banking Trojan malware infects the system. Finally, the paper shows that forensic examination and analysis of the Prefetch files can find the data remnants of banking Trojan malware incidents

    Identifying bugs in digital forensic tools

    No full text
    Bugs can be found in all code and the consequences are usually managed through up-grade releases, patches, and restarting operating systems and applications. However, in mission critical systems complete fall over systems are built to assure service continuity. In our research we asked the question, what are the professional risks of bugs in digital forensic tools? Our investigation reviewed three high use professional proprietary digital forensic tools, one in which we identified six bugs and evaluated these bug in terms of potential impacts on an investigator\u27s work. The findings show that yes major brand name digital forensic tools have software bugs and there is room for improvement. These bugs had potential to frustrate an investigator, to cost time, to lose evidence and to require compensatory strategies. Such software bugs also have the potential for malicious exploitation and anti-forensic use

    Bits, Bytes, and Constitutional Rights: Navigating Digital Data and the Fourth Amendment

    Get PDF
    • …
    corecore