171 research outputs found

    The next generation for the forensic extraction of electronic evidence from mobile telephones

    Get PDF
    Electronic evidence extracted from a mobile telephone provide a wealth of information about the user. Before a court allows the trier of fact to consider the electronic evidence, the court must ensure that the subject matter, testimony of which is to be given, is scientific. Therefore, regard must, at the investigation stage, be given to fulfill the requirements of science and law, including international standards. Such compliance also moves the extraction of electronic evidence from mobile telephones into the next generation, a more rigorous position as a forensic science, by being able to give in court well- reasoned and concrete claims about the accuracy and validity of conclusions.published_or_final_versio

    Software pirates: a criminal investigation

    Get PDF
    Computer program infringing materials are difficult to identify. There are common techniques to disguise the origin of copied codes. In order to decide on a legal basis whether a substantial part of copyright work has been taken, it is necessary to consider both the quality and quantity of the part taken. Various researches have carried out in relation to authorship identification and plagiarism identification. In a criminal case in Hong Kong, we used a common software to compare files contents and folders between a copyright work and the infringing copy instead of complex and technical metrics. We conclude that the source codes of the defendant started from the source codes of his previous employer using simple and easy to understand measurements. Though the magistrate was satisfied beyond reasonable doubt of the defendant’s guilt, the evidence in the case did not enable a scientific calculation in respect of the likelihood that a computer program may look like a derivative of another program by chance.postprintThe 33rd ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2012), Beijing, China, 11-16 June 2012. In Proceedings of the PLDI, 2012, p. 1-1

    Quantification of digital forensic hypotheses using probability theory

    Get PDF
    The issue of downloading illegal material from a website onto a personal digital device is considered from the perspective of conventional (Pascalian) probability theory. We present quantitative results for a simple model system by which we analyse and counter the putative defence case that the forensically recovered illegal material was downloaded accidentally by the defendant. The model is applied to two actual prosecutions involving possession of child pornography.published_or_final_versio

    Analyzing storage media of digital camera

    Get PDF
    Digital photography has become popular in recent years. Photographs have become common tools for people to record every tiny parts of their daily life. By analyzing the storage media of a digital camera, crime investigators may extract a lot of useful information to reconstruct the events. In this work, we will discuss a few approaches in analyzing these kinds of storage media of digital cameras. A hypothetical crime case will be used as case study for demonstration of concepts. © 2009 IEEE.published_or_final_versionThe 2009 International Workshop on Forensics for Future Generation Communication Environments (F2GC-09) in conjunction with CSA 2009, Jeju Island, Korea, 10-12 December 2009. In Proceedings of CSA, 2009, p. 1-

    Memory acquisition: A 2-Take approach

    Get PDF
    When more and more people recognize the value of volatile data, live forensics gains more weight in digital forensics. It is often used in parallel with traditional pull-the-plug forensics to provide a more reliable result in forensic examination. One of the core components in live forensics is the collection and analysis of memory volatile data, during which the memory content is acquired for searching of relevant evidential data or investigating various computer processes to unveil the activities being performed by a user. However, this conventional method may have weaknesses because of the volatile nature of memory data and the absence of original data for validation. This may cause implication to the admissibility of memory data at the court of law which requires strict authenticity and reliability of evidence. In this paper, we discuss the impact of various memory acquisition methods and suggest a 2-Take approach which aims to enhance the confidence level of the acquired memory data for legal proceedings. © 2009 IEEE.published_or_final_versionThe 2009 International Workshop on Forensics for Future Generation Communication Environments (F2GC-09) in conjunction with CSA 2009, Jeju Island, Korea, 10-12 December 2009. In Proceedings of CSA, 2009, p. 1-

    Protecting digital data privacy in Computer Forensic Examination

    Get PDF
    Session 1: Forensic Modeling and Framework: no. 3Privacy is a fundamental human right defined in the Universal Declaration of Human Rights. To enable the protection of data privacy, personal data that are not related to the investigation subject should be excluded during computer forensic examination. In the physical world, protection of privacy is controlled and regulated in most countries by laws. Legislation for handling private data has been established in various jurisdictions. In the modern world, the massive use of computers generates a huge amount of private data and there is correspondingly an increased expectation to recognize and respect human rights in digital investigation. However, there does not exist a forensically sound model for protecting private data in the context of digital investigation, and it poses a threat to privacy if the investigation involves the processing of such kind of data. In this paper, we try to address this important issue and present a cryptographic model designed to be incorporated into the current digital investigation framework, thereby adding a possible way to protect data privacy in digital investigation. © 2011 IEEE.link_to_subscribed_fulltex

    Transcriptomic Responses Of Corpuscle Of Stannius Gland Of Japanese Eels (anguilla Japonica) To Changes In Water Salinity

    Get PDF
    Physiological studies of a unique endocrine gland in fish, named corpuscles of Stannius (CS), described a Ca2+-regulatory function for this gland mediated by stanniocalcin-1, a hypocalcemic polypeptide hormone. However, to date, the endocrine functions of the glands have not been completely elucidated. We hypothesized that other unidentified active principles in the glands are involved in the regulation of plasma ion (Na+, Ca2+) and/or blood pressure. In this study, transcriptome sequencing of CS glands was performed using Japanese eels (Anguilla japonica) adapted to freshwater (FW) or seawater (SW) to reveal the presence and differential expression of genes encoding proteins related to the ion-osmoregulatory and pressor functions. We acquired a total of 14.1 Mb and 12.1 Mb quality-trimmed reads from the CS glands collected from FW and SW adapted eels, respectively. The de novo assembly resulted in 9254 annotated genes. Among them, 475 genes were differentially expressed with 357 up- and 118 down-regulated in the SW group. Gene ontology analysis further demonstrated the presence of natriuresis and pressor related genes. In summary, ours is the first study using high-throughput sequencing to identify gene targets that could explain the physiological importance of the CS glands.published_or_final_versio

    A new mib allele with a chromosomal deletion covering foxc1a exhibits anterior somite specification defect

    Get PDF
    mibnn2002, found from an allele screen, showed early segmentation defect and severe cell death phenotypes, which are different from previously known mib mutants. Despite distinct morphological phenotypes, the typical mib molecular phenotypes: her4 down-regulation, neurogenic phenotype and cold sensitive dlc expression pattern, still remained. The linkage analysis also indicated that mibnn2002 is a new mib allele. Failure of specification in anterior 7-10 somites is likely due to lack of foxc1a expression in mibnn2002 homozygotes. Somites and somite markers gradually appeared after 7-10 somite stage, suggesting that foxc1a is only essential for the formation of anterior 7-10 somites. Apoptosis began around 16-somite stage with p53 up-regulation. To find the possible links of mib, foxc1a and apoptosis, transcriptome analysis was employed. About 140 genes, including wnt3a, foxc1a and mib, were not detected in the homozygotes. Overexpression of foxc1a mRNA in mibnn2002 homozygotes partially rescued the anterior somite specification. In the process of characterizing mibnn2002 mutation, we integrated the scaffolds containing mib locus into chromosome 2 (or linkage group 2, LG2) based on synteny comparison and transcriptome results. Genomic PCR analysis further supported the conclusion and showed that mibnn2002 has a chromosomal deletion with the size of about 9.6 Mbp.published_or_final_versio

    Identification and Expression Profiling of MicroRNAs in the Brain, Liver and Gonads of Marine Medaka (Oryzias melastigma) and in Response to Hypoxia

    Get PDF
    The marine medaka (Oryzias melastigma) has been increasingly used as a fish model for detecting environmental stresses and chemical contaminants in the marine environment. Recent mammalian studies have shown that environmental stresses can alter the expression profiles of microRNAs (miRNAs), leading to transgenerational effects. Here, we use high-throughput Illumina RNA sequencing (RNA-Seq) for miRNA transcriptome analysis of brain, liver, and gonads from sexually mature male and female marine medaka. A total of 128,883,806 filtered sequence reads were generated from six small RNA libraries, identifying a total of 2,125,663 non-redundant sequences. These sequences were aligned and annotated to known animal miRNAs (miRBase) using the BLAST method. A total of 223 distinct miRNA types were identified, with the greatest number expressed in brain tissue. Our data suggested that 55 miRNA types from 34 families are common to all tested tissues, while some of the miRNAs are tissue-enriched or sex-enriched. Quantitative real-time PCR analysis further demonstrated that let-7a, miR-122, and miR-9-3p were downregulated in hypoxic female medaka, while miR-2184 was specifically upregulated in the testis of hypoxic male fish. This is the first study to identify miRNAs in O. melastigma using small RNA deep sequencing technology. Because miRNA expression is highly conserved between marine medaka and other vertebrates, marine medaka may serve as a good model for studies on the functional roles of miRNAs in hypoxia stress response and signaling in marine fish.published_or_final_versio
    corecore