491 research outputs found

    Evaluation of modus operandi as a perpetrator identification technique in the investigation of rape cases

    Get PDF
    Rape is a serious crime and is a huge problem in Ethiopia. It has a devastating effect on the victim and society as a whole. The Ethiopian news is peppered with reports of this crime. Anorganized and sophisticated way in which the perpetrators of rape can be identified is by the use of modus operandi information. The aim of this research is to evaluate how modus operandi can be used as a perpetrator identification technique in the investigation of rape cases in the Gulele policing area. For any investigation to be successful, the investigator must have the objectives of crime investigation in mind. In the investigation of crime, the collection of evidence is important and there are two basic important principles, namely Locard’s principle and the chain of custody that investigator must comply with. These will ensure that evidence is admissible during a trial. Evidence is found on a crime scene. In rape cases, the body of the perpetrator and the victim can be seen as the crime scene. For evidence to be applicable to the investigation, it must first be identified and then individualised. It is important for investigators to be familiar with the concept of modus operandi, and the influencing factors. The purpose of this research is to provide practical recommendations on the best practices for the use of modus operandi.Police PracticeM. Tech. (Forensic Investigation

    A Forensic Enabled Data Provenance Model for Public Cloud

    Get PDF
    Cloud computing is a newly emerging technology where storage, computation and services are extensively shared among a large number of users through virtualization and distributed computing. This technology makes the process of detecting the physical location or ownership of a particular piece of data even more complicated. As a result, improvements in data provenance techniques became necessary. Provenance refers to the record describing the origin and other historical information about a piece of data. An advanced data provenance system will give forensic investigators a transparent idea about the data\u27s lineage, and help to resolve disputes over controversial pieces of data by providing digital evidence. In this paper, the challenges of cloud architecture are identified, how this affects the existing forensic analysis and provenance techniques is discussed, and a model for efficient provenance collection and forensic analysis is proposed

    Digital forensics: an integrated approach for the investigation of cyber/computer related crimes

    Get PDF
    A thesis submitted to the University of Bedfordshire in partial fulfilment of the requirements for the degree of Doctor of PhilosophyDigital forensics has become a predominant field in recent times and courts have had to deal with an influx of related cases over the past decade. As computer/cyber related criminal attacks become more predominant in today’s technologically driven society the need for and use of, digital evidence in courts has increased. There is the urgent need to hold perpetrators of such crimes accountable and successfully prosecuting them. The process used to acquire this digital evidence (to be used in cases in courts) is digital forensics. The procedures currently used in the digital forensic process were developed focusing on particular areas of the digital evidence acquisition process. This has resulted in very little regard being made for the core components of the digital forensics field, for example the legal and ethical along with other integral aspects of investigations as a whole. These core facets are important for a number of reasons including the fact that other forensic sciences have included them, and to survive as a true forensics discipline digital forensics must ensure that they are accounted for. This is because, digital forensics like other forensics disciplines must ensure that the evidence (digital evidence) produced from the process is able to withstand the rigors of a courtroom. Digital forensics is a new and developing field still in its infancy when compared to traditional forensics fields such as botany or anthropology. Over the years development in the field has been tool centered, being driven by commercial developers of the tools used in the digital investigative process. This, along with having no set standards to guide digital forensics practitioners operating in the field has led to issues regarding the reliability, verifiability and consistency of digital evidence when presented in court cases. Additionally some developers have neglected the fact that the mere mention of the word forensics suggests courts of law, and thus legal practitioners will be intimately involved. Such omissions have resulted in the digital evidence being acquired for use in various investigations facing major challenges when presented in a number of cases. Mitigation of such issues is possible with the development of a standard set of methodologies flexible enough to accommodate the intricacies of all fields to be considered when dealing with digital evidence. This thesis addresses issues regarding digital forensics frameworks, methods, methodologies and standards for acquiring digital evidence using the grounded theory approach. Data was gathered using literature surveys, questionnaires and interviews electronically. Collecting data using electronic means proved useful when there is need to collect data from different jurisdictions worldwide. Initial surveys indicated that there were no existing standards in place and that the terms models/frameworks and methodologies were used interchangeably to refer to methodologies. A framework and methodology have been developed to address the identified issues and represent the major contribution of this research. The dissertation outlines solutions to the identified issues and presents the 2IR Framework of standards which governs the 2IR Methodology supported by a mobile application and a curriculum of studies. These designs were developed using an integrated approach incorporating all four core facets of the digital forensics field. This research lays the foundation for a single integrated approach to digital forensics and can be further developed to ensure the robustness of process and procedures used by digital forensics practitioners worldwide

    Addressing Information Asymmetry In The Social Contract: An Archival-diplomatic Approach To Open Government Data Curation

    Get PDF
    This thesis shows that the concepts and practices developed in the field of record-keeping can be applied to the curation of open government data to strengthen the trustworthiness of that data. It begins by situating open government data in the context of the social contract, which operates through the exchange of information. The thesis develops the notions of the ‘record-as-command’ and ‘data-as-command’ to explain the dialogical but asymmetrical information relationship between the individual and the state, which is modelled as a principal-agent problem. Using concepts from information economics, the study argues that open government data is the latest monitoring mechanism in a long history of government secrecy and openness. This establishes the significance of the curation of open government data beyond technical questions. The thesis then considers how trustworthiness has figured in thinking about record-keeping, identifying three core record-keeping controls; 1) metadata used to document 2) custodianship in 3) auditable systems. To show how these three broad controls have been put into practice, the study examines two examples of record-keeping guidance, one for paper records and one for hybrid records, which demonstrates the application of the three core controls across time and media. The study then looks for the presence or absence of these controls in government datasets published in Kenya and Australia. These analyses trace the datasets back to their source(s), at each step looking for evidence of custodial and curatorial interventions documented in metadata managed in auditable systems. The study’s contribution to open government data work is its demonstration of the value of record-keeping controls in the curation of data. Additionally, the study contributes new insights to information in the principal-agent problem of the social contract, contributes to archival theory and finds a need to foster critical data literacy in the body politic if open government data is to be read and used to correct information asymmetry

    Establishing the digital chain of evidence in biometric systems

    Get PDF
    Traditionally, a chain of evidence or chain of custody refers to the chronological documentation, or paper trail, showing the seizure, custody, control, transfer, analysis, and disposition of evidence, physical or electronic. Whether in the criminal justice system, military applications, or natural disasters, ensuring the accuracy and integrity of such chains is of paramount importance. Intentional or unintentional alteration, tampering, or fabrication of digital evidence can lead to undesirable effects. We find despite the consequences at stake, historically, no unique protocol or standardized procedure exists for establishing such chains. Current practices rely on traditional paper trails and handwritten signatures as the foundation of chains of evidence.;Copying, fabricating or deleting electronic data is easier than ever and establishing equivalent digital chains of evidence has become both necessary and desirable. We propose to consider a chain of digital evidence as a multi-component validation problem. It ensures the security of access control, confidentiality, integrity, and non-repudiation of origin. Our framework, includes techniques from cryptography, keystroke analysis, digital watermarking, and hardware source identification. The work offers contributions to many of the fields used in the formation of the framework. Related to biometric watermarking, we provide a means for watermarking iris images without significantly impacting biometric performance. Specific to hardware fingerprinting, we establish the ability to verify the source of an image captured by biometric sensing devices such as fingerprint sensors and iris cameras. Related to keystroke dynamics, we establish that user stimulus familiarity is a driver of classification performance. Finally, example applications of the framework are demonstrated with data collected in crime scene investigations, people screening activities at port of entries, naval maritime interdiction operations, and mass fatality incident disaster responses

    Digital Forensics Investigation Frameworks for Cloud Computing and Internet of Things

    Get PDF
    Rapid growth in Cloud computing and Internet of Things (IoT) introduces new vulnerabilities that can be exploited to mount cyber-attacks. Digital forensics investigation is commonly used to find the culprit and help expose the vulnerabilities. Traditional digital forensics tools and methods are unsuitable for use in these technologies. Therefore, new digital forensics investigation frameworks and methodologies are required. This research develops frameworks and methods for digital forensics investigations in cloud and IoT platforms

    An exploration of the investigative value of cell phone record analysis in the investigation of serious and violent crimes in the Winelands District, Western Cape Province

    Get PDF
    In modern times, cell phones have influenced people’s everyday lives and changed the ways they interact with each other and one another. The continuous development and advancement of cell phone technology has also sophisticated the way in which cell phones are used. For many people, cell phones have replaced many functions previously performed on laptops and computers, such as storing important information, conversations, keeping of schedules; as well as saving and transferring files, and internet surfing. Accordingly, the usage of cell phones has become an important part of people’s everyday life, and has changed people’s ways of interacting with one another. However, the popularity of mobile devices has been overshadowed by their frequent usage in digital crimes, which also necessitated the application of digital forensics in crime investigation. It could then be postulated that cell phones have played a significant part in the commission of many crimes and the subsequent investigation thereof. In that regard, cell phone investigation could be viewed as the future of criminal investigations and analysis. This research, therefore, explores the investigative value of cell phone record analysis in the investigation of serious and violent crimes in the Winelands District, Western Cape Province.Police PracticeM.A. (Forensic Investigation

    In Homage of Change

    Get PDF

    A semantic methodology for (un)structured digital evidences analysis

    Get PDF
    Nowadays, more than ever, digital forensics activities are involved in any criminal, civil or military investigation and represent a fundamental tool to support cyber-security. Investigators use a variety of techniques and proprietary software forensic applications to examine the copy of digital devices, searching hidden, deleted, encrypted, or damaged files or folders. Any evidence found is carefully analysed and documented in a "finding report" in preparation for legal proceedings that involve discovery, depositions, or actual litigation. The aim is to discover and analyse patterns of fraudulent activities. In this work, a new methodology is proposed to support investigators during the analysis process, correlating evidences found through different forensic tools. The methodology was implemented through a system able to add semantic assertion to data generated by forensics tools during extraction processes. These assertions enable more effective access to relevant information and enhanced retrieval and reasoning capabilities
    • 

    corecore