459 research outputs found

    Measuring digital crime investigation capacity to guide international crime prevention strategies

    Full text link
    This work proposes a method for the measurement of a country's digital investigation capacity and saturation for the assessment of future capacity expansion. The focus is on external, or international, partners being a factor that could negatively affect the return on investment when attempting to expand investigation capacity nationally. This work concludes with the argument that when dealing with digital crime, target international partners should be a consideration in expansion, and could potentially be a bottleneck of investigation requests.Comment: 7 pages, 3 figures, Presented at FutureTech 201

    On the complexity of collaborative cyber crime investigations

    Get PDF
    This article considers the challenges faced by digital evidence specialists when collaborating with other specialists and agencies in other jurisdictions when investigating cyber crime. The opportunities, operational environment and modus operandi of a cyber criminal are considered, with a view to developing the skills and procedural support that investigators might usefully consider in order to respond more effectively to the investigation of cyber crimes across State boundaries

    A ‘criminal personas’ approach to countering criminal creativity

    Get PDF
    This paper describes a pilot study of a ‘criminal personas’ approach to countering criminal creativity. The value of the personas approach has been assessed by comparing the identification of criminal opportunity, through ‘traditional’ brainstorming and then through ‘criminal personas’ brainstorming The method involved brainstorm sessions with Computer Forensics Practitioners and with Product Designers, where they were required to generate criminal scenarios, select the most serious criminal opportunities, and propose means of countering them. The findings indicated that there was merit in further research in the development and application of the ‘criminal personas’ approach. The generation of criminal opportunity ideas and proposal of counter criminal solutions were both greater when the brainstorm approach involved the group responding through their given criminal personas

    Towards adapting metamodeling approach for the mobile forensics investigation domain

    Get PDF
    Mobile phones have become quite important tools in the modern world. The forensics field heavily relies on knowledge as an important resource. Due to the ongoing changes in digital technology, the power of knowledge enables innovation and assists in establishing proper standards and procedures. As such, it is necessary to establish a relationship between the information derived from knowledge to form new concepts and ideas. Knowledge in mobile forensics is scattered and huge. Hence, this leads to lack of knowledge management in mobile forensics. In addition, lead to complexity of investigation for new investigators, ambiguity in concepts and terminologies of mobile forensics domain and waste time to understand mobile forensics domain. Therefore, mobile forensics investigators are quite suffering with forensics investigation processes in their domain. This paper will develop a new approach for mobile forensics domain which is based on metamodeling. This approach contributes to unify common concepts of mobile forensics. It also provides many benefits which include simplifying the investigation process and guide investigations team, capture and reuse specialized forensic knowledge and support training and knowledge management activities. Furthermore, it reduces complexity and ambiguity in mobile forensic domai Towards Adapting Metamodeling approach for the Mobile Forensics Investigation Domain

    Reforzando el procedimiento para el uso de nuevos medios tecnolĂłgicos en los procedimientos penales.

    Get PDF
    The new era of technology is currently of high interest for the judicial proceedings in criminal matters. Although digital technologies have been increased in the last decades, both legislator and judicial authorities being involved in developing more and more efficient means of forensic investigation in purpose to prevent and combat the criminal phenomena, the criminal organizations are also interested in breaking such legal digital framework and achieving their own scope - a financial one. On the one hand, they are permanently interested in committing serious crimes including those in digital environment, whose consequences are one of the most dangerous crimes for the entire contemporary society. On the other hand, the law enforcement agencies are working in close cooperation with experts in digital field in order to gather information on how to improve the situation itself and investigate the criminal activities by means of digital evidence. In this context, the digitalization is an efficient tool of providing information, data and other instruments the judicial bodies need in achieving their goals in criminal proceedings. The current paper focuses on the techniques and methods that judicial bodies use in the investigation activity of gathering digital evidence that may serve in making decision in criminal cases the judicial bodies are invested with. The paper is structured in five chapters, each of them providing referential elements on the proposed topic. Its structure is designed as follows: Introduction; Aims; Methodology of Research; Achievements and failures through using new technologies; Doctrinal and jurisprudence approach, and Conclusion section, which advances a de lege ferenda proposal

    Are Mobile Device Examinations Practiced like \u27Forensics\u27?

    Get PDF
    Mobile device forensics is sometimes disparaged as not really being ‘forensics.’ This paper discusses the relationship between digital forensics and other forensic sciences, and the relationship of mobile device forensics to the broader field of digital forensics. It specifically addresses the question of whether mobile device forensics processes – and practices – rise to the level of suitable forensics quality

    Forensic Investigation of Cyberstalking Cases using Behavioural Evidence Analysis

    Get PDF
    Behavioural Evidence Analysis (BEA) is, in theory, useful in developing an understanding of the offender, the victim, the crime scene, and the dynamics of the crime. It can add meaning to the evidence obtained through digital forensic techniques and assist investigators with reconstruction of a crime. There is, however, little empirical research examining the application of BEA to actual criminal cases, particularly cyberstalking cases. This study addresses this gap by examining the utility of BEA for such cases in terms of understanding the behavioural and motivational dimensions of offending, and the way in which digital evidence can be interpreted. It reports on the forensic analysis of 20 cyberstalking cases investigated by Dubai Police in the last five years. Results showed that BEA helps to focus an investigation, enables better understanding and interpretation of victim and offender behaviour, and assists in inferring traits of the offender from available digital evidence. These benefits can help investigators to build a stronger case, reduce time wasted to mistakes, and to exclude suspects wrongly accused in cyberstalking cases

    Medical Cyber-Physical Systems Development: A Forensics-Driven Approach

    Full text link
    The synthesis of technology and the medical industry has partly contributed to the increasing interest in Medical Cyber-Physical Systems (MCPS). While these systems provide benefits to patients and professionals, they also introduce new attack vectors for malicious actors (e.g. financially-and/or criminally-motivated actors). A successful breach involving a MCPS can impact patient data and system availability. The complexity and operating requirements of a MCPS complicates digital investigations. Coupling this information with the potentially vast amounts of information that a MCPS produces and/or has access to is generating discussions on, not only, how to compromise these systems but, more importantly, how to investigate these systems. The paper proposes the integration of forensics principles and concepts into the design and development of a MCPS to strengthen an organization's investigative posture. The framework sets the foundation for future research in the refinement of specific solutions for MCPS investigations.Comment: This is the pre-print version of a paper presented at the 2nd International Workshop on Security, Privacy, and Trustworthiness in Medical Cyber-Physical Systems (MedSPT 2017
    • 

    corecore