157 research outputs found

    An Investigation into the Efficacy of Three Erasure Tools under Windows 7

    Get PDF
    This paper examined three erasure software tools aimed at removing evidence of online and other activity, and was investigated using the Windows 7 operating system as the test platform. The tools in question were Anti- Tracks, Free Internet Eraser and Free Internet Window Washer. The findings included each of the tested software’s ability to completely erase target data on the drive. It also included examined whether the data was erased or merely the link to the data was deleted, making the file recoverable. It was found that the Anti-Tracks program did not erase any of the information targeted by the researchers. The Free Internet Window Washer software was able to erase Internet Explorer browser history, and recent document activity for the operating system, but not any other activity or information was erased. The last tool, Free Internet Eraser was able to erase all information apart from MSN Messenger chat history, and the temporary internet files. The conclusion is that end users should be careful in selecting or using such erasure tools as they may behave differently under different operating systems, and may not always remove beyond recovery all information

    Forensic analysis of epic privacy browser on windows operating systems

    Get PDF
    The 16th European Conference on Cyber Warfare and Digital Security (ECCWS 2017), Dublin, Ireland, 29-30 June 2017Internet security can be compromised not only through the threat of malware, fraud, system intrusion or damage, but also via the tracking of internet activity. Criminals are using numerous methods to access data in the highly lucrative cybercrime business. Organized crime, as well as individual users, are benefiting from the protection of Virtual Private Networks (VPNs) and private browsers, such as Tor, Epic Privacy, to carry out illegal activity such as money laundering, drug dealing, the trade of child pornography, etc. News articles advising on internet privacy assisted in educating the public and a new era of private browsing arose. Although these measures were designed to protect legitimate browsing privacy, they also provided a means to conceal illegal activity. One such tool released for private browsing was Epic Privacy Browser. It is currently used in approximately 180 countries worldwide. Epic Privacy Browser is promoted as a chromium powered browser, specifically engineered to protect users' privacy. It operates solely in "private browser" mode and, after the close of the browsing session, it automatically deletes all browsing data. The developers of Epic Privacy Browser claim that all traces of user activity will be cleared upon close of the application. However, there is no forensic acquisition and analysis of Epic Privacy Browser in literature. In this paper, we contribute towards the goal of assisting forensic examiners with the location and type of evidence available through live and post-mortem state analysis of the Epic Privacy Browser on Windows 7 and Windows 10. This analysis identifies how the browser functions during use and where data can be recovered once the browser is closed, the necessary tools that will assist in the forensics discovery, and effective presentation of the recovered material

    Analysis of digital evidence in identity theft investigations

    Get PDF
    Identity Theft could be currently considered as a significant problem in the modern internet driven era. This type of computer crime can be achieved in a number of different ways; various statistical figures suggest it is on the increase. It intimidates individual privacy and self assurance, while efforts for increased security and protection measures appear inadequate to prevent it. A forensic analysis of the digital evidence should be able to provide precise findings after the investigation of Identity Theft incidents. At present, the investigation of Internet based Identity Theft is performed on an ad hoc and unstructured basis, in relation to the digital evidence. This research work aims to construct a formalised and structured approach to digital Identity Theft investigations that would improve the current computer forensic investigative practice. The research hypothesis is to create an analytical framework to facilitate the investigation of Internet Identity Theft cases and the processing of the related digital evidence. This research work makes two key contributions to the subject: a) proposing the approach of examining different computer crimes using a process specifically based on their nature and b) to differentiate the examination procedure between the victim’s and the fraudster’s side, depending on the ownership of the digital media. The background research on the existing investigation methods supports the need of moving towards an individual framework that supports Identity Theft investigations. The presented investigation framework is designed based on the structure of the existing computer forensic frameworks. It is a flexible, conceptual tool that will assist the investigator’s work and analyse incidents related to this type of crime. The research outcome has been presented in detail, with supporting relevant material for the investigator. The intention is to offer a coherent tool that could be used by computer forensics investigators. Therefore, the research outcome will not only be evaluated from a laboratory experiment, but also strengthened and improved based on an evaluation feedback by experts from law enforcement. While personal identities are increasingly being stored and shared on digital media, the threat of personal and private information that is used fraudulently cannot be eliminated. However, when such incidents are precisely examined, then the nature of the problem can be more clearly understood

    A systematic survey of online data mining technology intended for law enforcement

    Get PDF
    As an increasing amount of crime takes on a digital aspect, law enforcement bodies must tackle an online environment generating huge volumes of data. With manual inspections becoming increasingly infeasible, law enforcement bodies are optimising online investigations through data-mining technologies. Such technologies must be well designed and rigorously grounded, yet no survey of the online data-mining literature exists which examines their techniques, applications and rigour. This article remedies this gap through a systematic mapping study describing online data-mining literature which visibly targets law enforcement applications, using evidence-based practices in survey making to produce a replicable analysis which can be methodologically examined for deficiencies

    Biomedical Applications of Mid-Infrared Spectroscopic Imaging and Multivariate Data Analysis: Contribution to the Understanding of Diabetes Pathogenesis

    Get PDF
    Diabetic retinopathy (DR) is a microvascular complication of diabetes and a leading cause of adult vision loss. Although a great deal of progress has been made in ophthalmological examinations and clinical approaches to detect the signs of retinopathy in patients with diabetes, there still remain outstanding questions regarding the molecular and biochemical changes involved. To discover the biochemical mechanisms underlying the development and progression of changes in the retina as a result of diabetes, a more comprehensive understanding of the bio-molecular processes, in individual retinal cells subjected to hyperglycemia, is required. Animal models provide a suitable resource for temporal detection of the underlying pathophysiological and biochemical changes associated with DR, which is not fully attainable in human studies. In the present study, I aimed to determine the nature of diabetes-induced, highly localized biochemical changes in the retinal tissue from Ins2Akita/+ (Akita/+; a model of Type I diabetes) male mice with different duration of diabetes. Employing label-free, spatially resolved Fourier transform infrared (FT-IR) imaging engaged with chemometric tools enabled me to identify temporal-dependent reproducible biomarkers of the diabetic retinal tissue from mice with 6 or 12 weeks, and 6 or 10 months of diabetes. I report, for the first time, the origin of molecular changes in the biochemistry of individual retinal layers with different duration of diabetes. A robust classification between distinctive retinal layers - namely photoreceptor layer (PRL), outer plexiform layer (OPL), inner nuclear layer (INL), and inner plexiform layer (IPL) - and associated temporal-dependent spectral biomarkers, were delineated. Spatially-resolved super resolution chemical images revealed oxidative stress-induced structural and morphological alterations within the nucleus of the photoreceptors. Comparison among the PRL, OPL, INL, and IPL suggested that the photoreceptor layer is the most susceptible layer to the oxidative stress with short-duration of diabetes. Moreover, for the first time, we present the temporal-dependent molecular alterations for the PRL, OPL, INL, and IPL from Akita/+ mice, with progression of diabetes. These findings are potentially important and may be of particular benefit in understanding the molecular and biological activity of retinal cells during oxidative stress in diabetes. Our integrating paradigm provides a new conceptual framework and a significant rationale for a better understanding of the molecular and cellular mechanisms underlying the development and progression of DR. This approach may yield alternative and potentially complimentary methods for the assessment of diabetes changes. It is expected that the conclusions drawn from this work will bridge the gap in our knowledge regarding the biochemical mechanisms of the DR and address some critical needs in the biomedical community

    Standard methods for molecular research in Apis mellifera

    Get PDF
    From studies of behaviour, chemical communication, genomics and developmental biology, among many others, honey bees have long been a key organism for fundamental breakthroughs in biology. With a genome sequence in hand, and much improved genetic tools, honey bees are now an even more appealing target for answering the major questions of evolutionary biology, population structure, and social organization. At the same time, agricultural incentives to understand how honey bees fall prey to disease, or evade and survive their many pests and pathogens, have pushed for a genetic understanding of individual and social immunity in this species. Below we describe and reference tools for using modern molecular-biology techniques to understand bee behaviour, health, and other aspects of their biology. We focus on DNA and RNA techniques, largely because techniques for assessing bee proteins are covered in detail in Hartfelder et al. (2013). We cover practical needs for bee sampling, transport, and storage, and then discuss a range of current techniques for genetic analysis. We then provide a roadmap for genomic resources and methods for studying bees, followed by specific statistical protocols for population genetics, quantitative genetics, and phylogenetics. Finally, we end with three important tools for predicting gene regulation and function in honey bees: Fluorescence in situ hybridization (FISH), RNA interference (RNAi), and the estimation of chromosomal methylation and its role in epigenetic gene regulation.Fundação para a CiĂȘncia e Tecnologi
    • 

    corecore