1,915 research outputs found

    Provenance analysis for instagram photos

    Get PDF
    As a feasible device fingerprint, sensor pattern noise (SPN) has been proven to be effective in the provenance analysis of digital images. However, with the rise of social media, millions of images are being uploaded to and shared through social media sites every day. An image downloaded from social networks may have gone through a series of unknown image manipulations. Consequently, the trustworthiness of SPN has been challenged in the provenance analysis of the images downloaded from social media platforms. In this paper, we intend to investigate the effects of the pre-defined Instagram images filters on the SPN-based image provenance analysis. We identify two groups of filters that affect the SPN in quite different ways, with Group I consisting of the filters that severely attenuate the SPN and Group II consisting of the filters that well preserve the SPN in the images. We further propose a CNN-based classifier to perform filter-oriented image categorization, aiming to exclude the images manipulated by the filters in Group I and thus improve the reliability of the SPN-based provenance analysis. The results on about 20, 000 images and 18 filters are very promising, with an accuracy higher than 96% in differentiating the filters in Group I and Group II

    Brooking no excuses: university staff and students are encouraged to develop their engagement

    Get PDF
    Brooking no excuses: university staff and students are encouraged to develop their engagement This paper will explore the internal and external factors that have prompted the University of East Anglia's decision to give Public Engagement into a more central role within the Universities Corporate Plan. It will illustrate how the SEARCH Action Learning Programme facilitated the design, implementation and delivery of new Staff and Student Development Programmes that aim to provide the confidence, skills and mentorship that will encourage staff to develop their engagement activities. We will use a SWOT analysis to discuss the strengths, weaknesses, opportunities and threats of the Public Engagement Practitioner. As part of this, we will explore how many of the issues we face as Science communicators with the public are similar to issues encountered by Communicators within the Arts and Humanities disciplines. Finally we will outline and detail our future plans, opportunities and vision that will enable us to move this agenda forward

    FORENSIC ANALYSIS OF THE GARMIN CONNECT ANDROID APPLICATION

    Get PDF
    Wearable smart devices are becoming more prevalent in our lives. These tiny devices read various health signals such as heart rate and pulse and also serve as companion devices that store sports activities and even their coordinates. This data is typically sent to the smartphone via a companion application installed. These applications hold a high forensic value because of the users’ private information they store. They can be crucial in a criminal investigation to understand what happened or where that person was during a given period. They also need to guarantee that the data is secure and that the application is not vulnerable to any attack that can lead to data leaks. The present work aims to do a complete forensic analysis of the companion application Garmin Connect for Android devices. We used a Garmin Smartband to generate data and test the application with a rooted Android device. This analysis is split into two parts. The first part will be a traditional Post Mortem analysis where we will present the application, data generation process, acquisition process, tools, and methodologies. Lastly, we analyzed the data extracted and studied what can be considered a forensic artifact. In the second part of this analysis, we performed a dynamic analysis. We used various offensive security techniques and methods to find vulnerabilities in the application code and network protocol to obtain data in transit. Besides completing the Garmin Connect application analysis, we contributed various modules and new features for the tool Android Logs Events And Protobuf Parser (ALEAPP) to help forensic practitioners analyze the application and to improve the open-source digital forensics landscape. We also used this analysis as a blueprint to explore six other fitness applications that can receive data from Garmin Connect. With this work, we could conclude that Garmin Connect stores a large quantity of private data in its device, making it of great importance in case of a forensic investigation. We also studied its robustness and could conclude that the application is not vulnerable to the tested scenarios. Nevertheless, we found a weakness in their communication methods that lets us obtain any data from the user even if it was not stored in the device. This fact increased its forensic importance even more

    Designing Digital Forensics Challenges for Multinational Cyber Defense Exercises

    Get PDF
    Töös püütakse kujundada ja hinnata digitaalse kohtuekspertiisi väljakutset, mida kasutada rahvusvahelisel küberkaitse õppusel. Eesmärk on fokusseerida põhioskustele, mida üks riiklik organisatsioon oma digitaalse kohtuekspertiisi ekspertidelt vajab ja disainida ning integreerida tehnilisi ülesandeid, mis adekvaatselt testivad neid oskusi suuremal küberkaitse õppusel. See töö kasutab NATO Locked Shields küberkaitse õppust test-näitena, mille jaoks väitekirja autor liitus digitaalse kohtuekspertiisi disainimeeskonnaga, NATO Cyber Defense Centre of Excellence juures, kui nad kavandasid ja rakendasid kolme-päevast digitaalse kohtuekspertiisi väljakutset. See lõputöö kehtestab rea tehnilisi ja protseduurilisi oskuseid, mida riiklikud organisatsioonid vajavad oma ekspertidelt, määrab viisid, kuidas testida neid oskusi ja arendab stsenaariumipõhist digitaalse kohtuekspertiisi väljakutset. Kasutades vahetult saadud tähelepanekuid, osaleja tagasisidet ja väljakutse tulemusi, et hinnata väljakutse efektiivsust, lõputöös leitakse, et stsenaarium testis piisavalt enamus oskusi õigel raskustasemel ja vajab parendamist ajastuses ning aruandlusstandardites. Lõpetuseks uuritakse erinevaid viise, kuidas parendada valitud meetodeid ja ülesandeid tuleviku õppusteks.This thesis seeks to design and evaluate a digital forensics challenge for inclusion in a multinational cyber defense exercise. The intent is to narrow down the key skills a state-based organization requires of its digital forensics experts and design and integrate technical tasks that adequately test these skills into a larger cyber defense exercise. It uses the NATO Locked Shields cyber defense exercise as a test case, for which the thesis author joined the digital forensics design team at the NATO Cyber Defense Centre of Excellence in designing and implementing a three day digital forensics challenge. This thesis establishes a series of technical and procedural skills state-based organizations require of their experts, determines ways to test these skills, and develops a scenario-based digital forensics challenge. Using first hand observations, participant feedback, and challenge scores to evaluate the effectiveness of the challenge, it finds that the scenario adequately tested a majority of the skills at the appropriate difficulty level and needs improvement in timing and reporting standards. Finally, it explores ways to improve upon the selected methods and tasks for future exercises

    Memory Forensics

    Get PDF
    Memory forensics is rapidly becoming a critical part of all digital forensic investigations. The value of information stored within a computer’s memory is immense; failing to capture it could result in a substantial loss of evidence. However, it is becoming increasingly more common to find situations where standard memory acquisition tools do not work. The paper addresses how an investigator can capture the memory of a locked computer when authentication is not present. The proposed solution is to use a bootable memory acquisition tool, in this case, Passware Bootable Memory Imager. To enhance the findings, three different reboot methods will be tested to help identify what would happen if the recommended warm reboot is not possible. Using a warm reboot and a secure reboot, Passware Bootable Memory Imager was able to successfully acquire the memory of the locked machine, with the resulting captures being highly representative of the populated data. However, the memory samples collected after a cold reboot did not retain any populated data. These findings highlight that to capture the memory of a locked machine, the reboot method is highly successful, providing the correct method is followed.Memory forensics is rapidly becoming a critical part of all digital forensic investigations. The value of information stored within a computer’s memory is immense; failing to capture it could result in a substantial loss of evidence. However, it is becoming increasingly more common to find situations where standard memory acquisition tools do not work. The paper addresses how an investigator can capture the memory of a locked computer when authentication is not present. The proposed solution is to use a bootable memory acquisition tool, in this case, Passware Bootable Memory Imager. To enhance the findings, three different reboot methods will be tested to help identify what would happen if the recommended warm reboot is not possible. Using a warm reboot and a secure reboot, Passware Bootable Memory Imager was able to successfully acquire the memory of the locked machine, with the resulting captures being highly representative of the populated data. However, the memory samples collected after a cold reboot did not retain any populated data. These findings highlight that to capture the memory of a locked machine, the reboot method is highly successful, providing the correct method is followed

    Forensic Analysis

    Get PDF
    It is my pleasure to place before you the book ''Forensic Analysis - From Death to Justice'' which presents one of the major portions of the broad specialty of Forensic Science comprising mainly of Thanatology and Criminalistics. This book has been designed to incorporate a wide range of new ideas and unique works from all authors from topics like Forensic Engineering, Forensic Entomology and Crime Scene Investigation. I hope that it will be useful to practitioners of forensic medicine, experts, pathologists, law makers, investigating authorities, undergraduate and postgraduate medical school graduates of medicine

    A career in Forensic Odontology:it is not just about teeth

    Get PDF
    Throughout the world, forensic odontology academic programmes have been designed and permeate discussions about international or local standard operational protocols, principles or guidelines requiring current technical and scientific knowledge. The heterogeneous groups of students who aim to pursue this career might have high educational and occupational aspirations that will be confronted with the labour markets. In this report, the authors briefly present aspects of the education and training that comprise the choice of a career in forensic odontology nowadays. In conclusion, the individual who opts for forensic odontology as a career must be prepared to find the confidence and resilience to practice professional skills in a unique and challenging field to comply with the society’s expectation

    Examination of invisible injuries: UV-induced fluorescence as a supplement to physical examination for blunt trauma injury

    Get PDF
    Die Untersuchung von Gewaltopfern und die Dokumentation von Verletzungen gehört zur Routinetätigkeit in der Klinischen Rechtsmedizin. Am häufigsten werden Folgen stumpfer Gewalteinwirkung festgestellt. Diese Untersuchungen geraten an ihre Grenzen, wenn z.B. Hautunterblutungen (noch) nicht oder bereits nicht mehr sichtbar sind. Die vorliegende Arbeit belegt den Nutzen von ultravioletter (UV) Strahlung zur Sichtbarmachung verblasster und mit bloßem Auge nicht erkennbare Hämatome. Die durch UV-Strahlung hervorgerufene Fluoreszenz von gesundem im Vergleich zu geschädigtem Gewebe kann teils noch bis zu Monate nach einer Verletzung Unterschiede aufweisen. Somit stellt das hier untersuchte Verfahren eine kostengünstige, schnelle und zuverlässige Alternative des Methodenspektrums rechtsmedizinischer Untersuchungstechniken dar.:1. Bibliographische Beschreibung 2. Introduction 3. Background 3.1. Hematoma 3.2. Electromagnetic radiation 3.3. Fluorescence 3.4. UV radiation 3.5. UV-induced fluorescence 3.6. Hematoma fluorescence 3.7. UV-photography 3.8. Alternative non-invasive 4. Motivation & Purpose of this Thesis 5. Publication 6. Summary & Conclusion 6.1. Background 6.2. Aim 6.3. Material and Method 6.4. Results 6.5. Thesis 6.6. Conclusion 7. Appendix 7.1. Bibliography 7.2. Core Data 7.3. Declaration of Independence 7.4. Curriculum vitae 7.5. Publications 7.6. AcknowledgementsIdentification and age determination of hematomas is daily work in forensic medicine. Following blunt trauma, a hematoma may be visible between a few hours and up to three weeks. Patients presenting their injuries outside of that timeframe usually miss visual signs. Various studies indicate that ultraviolet radiation (UVR) can aid the process of hematoma identification, when visible signs are vague or even absent. In this thesis hematoma identification using UV- induced fluorescence is discussed as simple, economic and convenient method.:1. Bibliographische Beschreibung 2. Introduction 3. Background 3.1. Hematoma 3.2. Electromagnetic radiation 3.3. Fluorescence 3.4. UV radiation 3.5. UV-induced fluorescence 3.6. Hematoma fluorescence 3.7. UV-photography 3.8. Alternative non-invasive 4. Motivation & Purpose of this Thesis 5. Publication 6. Summary & Conclusion 6.1. Background 6.2. Aim 6.3. Material and Method 6.4. Results 6.5. Thesis 6.6. Conclusion 7. Appendix 7.1. Bibliography 7.2. Core Data 7.3. Declaration of Independence 7.4. Curriculum vitae 7.5. Publications 7.6. Acknowledgement
    corecore