WorldWideScience

Sample records for program digital forensics

  1. Digital Records Forensics: A New Science and Academic Program for Forensic Readiness

    Directory of Open Access Journals (Sweden)

    Luciana Duranti

    2010-06-01

    Full Text Available This paper introduces the Digital Records Forensics project, a research endeavour located at the University of British Columbia in Canada and aimed at the development of a new science resulting from the integration of digital forensics with diplomatics, archival science, information science and the law of evidence, and of an interdisciplinary graduate degree program, called Digital Records Forensics Studies, directed to professionals working for law enforcement agencies, legal firms, courts, and all kind of institutions and business that require their services. The program anticipates the need for organizations to become “forensically ready,” defined by John Tan as “maximizing the ability of an environment to collect credible digital evidence while minimizing the cost of an incident response (Tan, 2001.” The paper argues the need for such a program, describes its nature and content, and proposes ways of delivering it.

  2. Digital Forensics

    Science.gov (United States)

    Harron, Jason; Langdon, John; Gonzalez, Jennifer; Cater, Scott

    2017-01-01

    The term forensic science may evoke thoughts of blood-spatter analysis, DNA testing, and identifying molds, spores, and larvae. A growing part of this field, however, is that of digital forensics, involving techniques with clear connections to math and physics. This article describes a five-part project involving smartphones and the investigation…

  3. USNA DIGITAL FORENSICS LAB

    Data.gov (United States)

    Federal Laboratory Consortium — To enable Digital Forensics and Computer Security research and educational opportunities across majors and departments. Lab MissionEstablish and maintain a Digital...

  4. Digital Forensics to Intelligent Forensics

    Directory of Open Access Journals (Sweden)

    Alastair Irons

    2014-09-01

    Full Text Available In this paper we posit that current investigative techniques—particularly as deployed by law enforcement, are becoming unsuitable for most types of crime investigation. The growth in cybercrime and the complexities of the types of the cybercrime coupled with the limitations in time and resources, both computational and human, in addressing cybercrime put an increasing strain on the ability of digital investigators to apply the processes of digital forensics and digital investigations to obtain timely results. In order to combat the problems, there is a need to enhance the use of the resources available and move beyond the capabilities and constraints of the forensic tools that are in current use. We argue that more intelligent techniques are necessary and should be used proactively. The paper makes the case for the need for such tools and techniques, and investigates and discusses the opportunities afforded by applying principles and procedures of artificial intelligence to digital forensics intelligence and to intelligent forensics and suggests that by applying new techniques to digital investigations there is the opportunity to address the challenges of the larger and more complex domains in which cybercrimes are taking place.

  5. On the Development of Digital Forensics Curriculum

    Directory of Open Access Journals (Sweden)

    Manghui Tu

    2012-09-01

    Full Text Available Computer Crime and computer related incidents continue their prevalence and frequency and result in loss of billions of dollars. To fight against those crimes and frauds, it is urgent to develop digital forensics education programs to train a suitable workforce to efficiently and effectively investigate crimes and frauds. However, there is no standard to guide the design of digital forensics curriculum for an academic program. In this research, we investigate the research works on digital forensics curriculum design and existing education programs.  Both digital forensics educators and practitioners were surveyed and the results are analyzed to determine what industry and law enforcement need. Based on the survey results and what the industry certificate programs cover, we identified topics that are desired to be covered in digital forensics courses. Finally, we propose six digital forensics courses and their topics that can be offered in both undergraduate and graduate digital forensics programs.

  6. The Design of an Undergraduate Degree Program in Computer & Digital Forensics

    Directory of Open Access Journals (Sweden)

    Gary C. Kessler

    2006-09-01

    Full Text Available Champlain College formally started an undergraduate degree program in Computer & Digital Forensics in 2003. The underlying goals were that the program be multidisciplinary, bringing together the law, computer technology, and the basics of digital investigations; would be available as on online and on-campus offering; and would have a process-oriented focus. Success of this program has largely been due to working closely with practitioners, maintaining activity in events related to both industry and academia, and flexibility to respond to ever-changing needs. This paper provides an overview of how this program was conceived, developed, and implemented; its evolution over time; and current and planned initiatives.

  7. Developing digital forensic governance

    CSIR Research Space (South Africa)

    Grobler, M

    2010-03-01

    Full Text Available This paper presents a Digital Forensic (DF) governance framework and its mapping on the SANS ISO/IEC 38500:2009 Corporate governance of information technology structure. DF governance assists organisations in guiding the management team...

  8. Digital forensic standards: international progress

    CSIR Research Space (South Africa)

    Grobler, MM

    2010-05-01

    Full Text Available With the explosion of digital crime, digital forensics is more often applied. The digital forensic discipline developed rather rapidly, but up to date very little international standardization with regard to processes, procedures or management has...

  9. Aspects of Digital Forensics in South Africa

    Directory of Open Access Journals (Sweden)

    Jacques Ophoff

    2016-10-01

    Full Text Available This paper explores the issues facing digital forensics in South Africa. It examines particular cyber threats and cyber threat levels for South Africa and the challenges in addressing the cybercrimes in the country through digital forensics. The paper paints a picture of the cybercrime threats facing South Africa and argues for the need to develop a skill base in digital forensics in order to counter the threats through detection of cybercrime, by analyzing cybercrime reports, consideration of current legislation, and an analysis of computer forensics course provision in South African universities. The paper argues that there is a need to develop digital forensics skills in South Africa through university programs, in addition to associated training courses. The intention in this paper is to promote debate and discussion in order to identify the cyber threats to South Africa and to encourage the development of a framework to counter the threats – through legislation, high tech law enforcement structures and protocols, digital forensics education, digital forensics skills development, and a public and business awareness of cybercrime threats.

  10. Digital forensics and its application to forensic audit

    OpenAIRE

    Martinka, Jan

    2015-01-01

    This thesis aims to describe a process framework suitable for conducting digital forensics investigation projects as support for forensic audit. Selection of existing digital forensics investigation framework was a subject of criterial comparison. Described new framework is a result of combination and enhancement of those frameworks, which were suitable for the characteristics of forensic audit. Thesis also discusses digital forensics methods for fraud examination and risk assessment as a par...

  11. Systematic Digital Forensic Investigation Model

    OpenAIRE

    Systematic Digital Forensic Investigation Model

    2011-01-01

    Law practitioners are in an uninterrupted battle with criminals in the application of digital/computertechnologies, and require the development of a proper methodology to systematically searchdigital devices for significant evidence. Computer fraud and digital crimes are growing day by dayand unfortunately less than two percent of the reported cases result in confidence. This paperexplores the development of the digital forensics process model, compares digital forensicmethodologies, and fina...

  12. Digital forensics for handheld devices

    CERN Document Server

    Doherty, Eamon P

    2012-01-01

    Approximately 80 percent of the world's population now owns a cell phone, which can hold evidence or contain logs about communications concerning a crime. Cameras, PDAs, and GPS devices can also contain information related to corporate policy infractions and crimes. Aimed to prepare investigators in the public and private sectors, Digital Forensics for Handheld Devices examines both the theoretical and practical aspects of investigating handheld digital devices. This book touches on all areas of mobile device forensics, including topics from the legal, technical, academic, and social aspects o

  13. Digital forensics digital evidence in criminal investigations

    CERN Document Server

    Marshall, Angus McKenzie

    2009-01-01

    The vast majority of modern criminal investigations involve some element of digital evidence, from mobile phones, computers, CCTV and other devices. Digital Forensics: Digital Evidence in Criminal Investigations provides the reader with a better understanding of how digital evidence complements "traditional" scientific evidence and examines how it can be used more effectively and efficiently in a range of investigations. Taking a new approach to the topic, this book presents digital evidence as an adjunct to other types of evidence and discusses how it can be deployed effectively in s

  14. High Performance Proactive Digital Forensics

    International Nuclear Information System (INIS)

    Alharbi, Soltan; Traore, Issa; Moa, Belaid; Weber-Jahnke, Jens

    2012-01-01

    With the increase in the number of digital crimes and in their sophistication, High Performance Computing (HPC) is becoming a must in Digital Forensics (DF). According to the FBI annual report, the size of data processed during the 2010 fiscal year reached 3,086 TB (compared to 2,334 TB in 2009) and the number of agencies that requested Regional Computer Forensics Laboratory assistance increasing from 689 in 2009 to 722 in 2010. Since most investigation tools are both I/O and CPU bound, the next-generation DF tools are required to be distributed and offer HPC capabilities. The need for HPC is even more evident in investigating crimes on clouds or when proactive DF analysis and on-site investigation, requiring semi-real time processing, are performed. Although overcoming the performance challenge is a major goal in DF, as far as we know, there is almost no research on HPC-DF except for few papers. As such, in this work, we extend our work on the need of a proactive system and present a high performance automated proactive digital forensic system. The most expensive phase of the system, namely proactive analysis and detection, uses a parallel extension of the iterative z algorithm. It also implements new parallel information-based outlier detection algorithms to proactively and forensically handle suspicious activities. To analyse a large number of targets and events and continuously do so (to capture the dynamics of the system), we rely on a multi-resolution approach to explore the digital forensic space. Data set from the Honeynet Forensic Challenge in 2001 is used to evaluate the system from DF and HPC perspectives.

  15. Computational intelligence in digital forensics forensic investigation and applications

    CERN Document Server

    Choo, Yun-Huoy; Abraham, Ajith; Srihari, Sargur

    2014-01-01

    Computational Intelligence techniques have been widely explored in various domains including forensics. Analysis in forensic encompasses the study of pattern analysis that answer the question of interest in security, medical, legal, genetic studies and etc. However, forensic analysis is usually performed through experiments in lab which is expensive both in cost and time. Therefore, this book seeks to explore the progress and advancement of computational intelligence technique in different focus areas of forensic studies. This aims to build stronger connection between computer scientists and forensic field experts.   This book, Computational Intelligence in Digital Forensics: Forensic Investigation and Applications, is the first volume in the Intelligent Systems Reference Library series. The book presents original research results and innovative applications of computational intelligence in digital forensics. This edited volume contains seventeen chapters and presents the latest state-of-the-art advancement ...

  16. Digital Forensics in Cloud Computing

    Directory of Open Access Journals (Sweden)

    PATRASCU, A.

    2014-05-01

    Full Text Available Cloud Computing is a rather new technology which has the goal of efficiently usage of datacenter resources and offers them to the users on a pay per use model. In this equation we need to know exactly where and how a piece of information is stored or processed. In today's cloud deployments this task is becoming more and more a necessity and a must because we need a way to monitor user activity, and furthermore, in case of legal actions, we must be able to present digital evidence in a way in which it is accepted. In this paper we are going to present a modular and distributed architecture that can be used to implement a cloud digital forensics framework on top of new or existing datacenters.

  17. Cybercrime, digital forensics and jurisdiction

    CERN Document Server

    Chawki, Mohamed; Khan, Mohammad Ayoub; Tyagi, Sapna

    2015-01-01

    The purpose of law is to prevent the society from harm by declaring what conduct is criminal, and prescribing the punishment to be imposed for such conduct. The pervasiveness of the internet and its anonymous nature make cyberspace a lawless frontier where anarchy prevails. Historically, economic value has been assigned to visible and tangible assets. With the increasing appreciation that intangible data disseminated through an intangible medium can possess economic value, cybercrime is also being recognized as an economic asset. The Cybercrime, Digital Forensics  and Jurisdiction disseminate knowledge for everyone involved with understanding and preventing cybercrime - business entities, private citizens, and government agencies. The book is firmly rooted in the law demonstrating that a viable strategy to confront cybercrime must be international in scope.

  18. Handbook of digital forensics of multimedia data and devices

    CERN Document Server

    Li, Shujun

    2015-01-01

    Digital forensics and multimedia forensics are rapidly growing disciplines whereby electronic information is extracted and interpreted for use in a court of law. These two fields are finding increasing importance in law enforcement and the investigation of cybercrime as the ubiquity of personal computing and the internet becomes ever-more apparent. Digital forensics involves investigating computer systems and digital artefacts in general, while multimedia forensics is a sub-topic of digital forensics focusing on evidence extracted from both normal computer systems and special multimedia devices, such as digital cameras. This book focuses on the interface between digital forensics and multimedia forensics, bringing two closely related fields of forensic expertise together to identify and understand the current state-of-the-art in digital forensic investigation. Both fields are expertly attended to by contributions from researchers and forensic practitioners specializ ng in diverse topics such as forensic aut...

  19. Procedures for a harmonised digital forensic process in live forensics

    CSIR Research Space (South Africa)

    Sibiya, G

    2012-09-01

    Full Text Available Cloud computing is a novel computing paradigm that presents new research opportunities in the field of digital forensics. Cloud computing is based on the following principles: on-demand self-service, broad network access, resource pooling, rapid...

  20. The modeling of a digital forensic readiness approach to WLAN digital forensics

    CSIR Research Space (South Africa)

    Ngobeni, S

    2010-01-01

    Full Text Available digital forensics is seen as not only a counterproposal but as a solution to the rapid increase of cyber crime in WLANs. The key issue impacting WLAN digital forensics is that, it is an enormous challenge to intercept and preserve all the communications...

  1. Book Review: The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics

    Directory of Open Access Journals (Sweden)

    Stephen Larson

    2014-03-01

    Full Text Available Sammons, John. (2012. The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics. Waltham, MA: Syngress, 208 pages, Print Book ISBN: 9781597496612.eBook ISBN : 9781597496629. Print: US $29.95. eBook: US$20.97. Includes exercises, case studies, references, and index.Reviewed by Stephen Larson, PhD. Assistant Professor, Slippery Rock University of PAThe Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics is well-named–it really is very basic. And it should be, as the book’s intended audience includes entry-level digital forensics professionals and complimentary fields such as law enforcement, legal, and general information security. Though the copyright is 2012, some of the data is from 2009, and there is mention of estimates for 2010.(see PDF for full review

  2. Digital Forensic Investigation Models, an Evolution study

    Directory of Open Access Journals (Sweden)

    Khuram Mushtaque

    2015-10-01

    Full Text Available In business today, one of the most important segments that enable any business to get competitive advantage over others is appropriate, effective adaptation of Information Technology into business and then managing and governing it on their will. To govern IT organizations need to identify value of acquiring services of forensic firms to compete cyber criminals. Digital forensic firms follow different mechanisms to perform investigation. Time by time forensic firms are facilitated with different models for investigation containing phases for different purposes of the entire process. Along with forensic firms, enterprises also need to build a secure and supportive platform to make successful investigation process possible. We have underlined different elements of organizations in Pakistan; need to be addressed to provide support to forensic firms.

  3. Science Column: Reconstruction: The Experimental Side of Digital Forensics

    Directory of Open Access Journals (Sweden)

    Fred Cohen

    2013-12-01

    Full Text Available Many in digital forensics seem to forget that the science part of digital forensics means experimentation and that implies a whole lot of things that most practitioners never learned.(see PDF for full column

  4. A Harmonized Process Model for Digital Forensic Investigation Readiness

    OpenAIRE

    Valjarevic , Aleksandar; Venter , Hein

    2013-01-01

    Part 2: FORENSIC MODELS; International audience; Digital forensic readiness enables an organization to prepare itself to perform digital forensic investigations in an efficient and effective manner. The benefits include enhancing the admissibility of digital evidence, better utilization of resources and greater incident awareness. However, a harmonized process model for digital forensic readiness does not currently exist and, thus, there is a lack of effective and standardized implementations...

  5. Digital forensic readiness in a cloud environment

    CSIR Research Space (South Africa)

    Sibiya, G

    2013-09-01

    Full Text Available -jurisdictions. As such, service providers hosting the data that may be required for digital forensic investigation may be reluctant to comply with foreign law enforcement agencies. Even if they comply, this may be a costly and time-consuming exercise, given the amount...

  6. Toward a general ontology for digital forensic disciplines.

    Science.gov (United States)

    Karie, Nickson M; Venter, Hein S

    2014-09-01

    Ontologies are widely used in different disciplines as a technique for representing and reasoning about domain knowledge. However, despite the widespread ontology-related research activities and applications in different disciplines, the development of ontologies and ontology research activities is still wanting in digital forensics. This paper therefore presents the case for establishing an ontology for digital forensic disciplines. Such an ontology would enable better categorization of the digital forensic disciplines, as well as assist in the development of methodologies and specifications that can offer direction in different areas of digital forensics. This includes such areas as professional specialization, certifications, development of digital forensic tools, curricula, and educational materials. In addition, the ontology presented in this paper can be used, for example, to better organize the digital forensic domain knowledge and explicitly describe the discipline's semantics in a common way. Finally, this paper is meant to spark discussions and further research on an internationally agreed ontological distinction of the digital forensic disciplines. Digital forensic disciplines ontology is a novel approach toward organizing the digital forensic domain knowledge and constitutes the main contribution of this paper. © 2014 American Academy of Forensic Sciences.

  7. Forensic aspects of digital evidence: contributions and initiatives by the National Center for Forensic Science (NCFS)

    Science.gov (United States)

    Whitcomb, Carrie M.

    2002-07-01

    Digital evidence is information of probative value that is either stored or transmitted in a digital form. Digital evidence can exist as words (text), sound (audio), or images (video or still pictures). Law enforcement and forensic scientists are faced with collecting and analyzing these new forms of evidence that previously existed on paper or on magnetic tapes. They must apply the law and science to the processes they use. Extrapolating the old processes into the new formats has been proceeding since the 1980's. Regardless of the output format, all digital evidence has a certain commonality. One would assume that the rules of evidence and the scientific approach would also have some common characteristics. Obviously, there is also a divergence due to the differences in outputs. It is time to approach the issues regarding digital evidence in a more deliberate, organized, and scientific manner. The program outlined by the NCFS would explore these various formats, the features common to traditional types of forensic evidence, and their divergent features and explore the scientific basis for handling of digital evidence. Our web site, www.ncfs.org, describes our programs.

  8. Forensic aspects of digital evidence: contributions and initiatives by the National Center for Forensic Science

    Science.gov (United States)

    Whitcomb, Carrie M.

    2002-08-01

    Digital evidence is information of probative value that is either stored or transmitted in a digital form. Digital evidence can exist as words (text), sound (audio), or images (video or still pictures). Law enforcement and forensic scientists are faced with collecting and analyzing these new forms of evidence that previously existed on paper or on magnetic tapes. They must apply the law and science to the processes they use. Extrapolating the old processes into the new formats has been proceeding since the 1980's. Regardless of the output format, all digital evidence has a certain commonality. One would assume that the rules of evidence and the scientific approach would also have some common characteristics. Obviously, there is also a divergence due to the differences in outputs. It is time to approach the issues regarding digital evidence in a more deliberate, organized, and scientific manner. The program outlined by the NCFS would explore these various formats, their features common to traditional types of forensic evidence, and their divergent features and explore the scientific basis for handling of digital evidence. Our web site, www.ncfs.org, describes our programs.

  9. Scenario-Based Digital Forensics Challenges in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Erik Miranda Lopez

    2016-10-01

    Full Text Available The aim of digital forensics is to extract information to answer the 5Ws (Why, When, Where, What, and Who from the data extracted from the evidence. In order to achieve this, most digital forensic processes assume absolute control of digital evidence. However, in a cloud environment forensic investigation, this is not always possible. Additionally, the unique characteristics of cloud computing create new technical, legal and architectural challenges when conducting a forensic investigation. We propose a hypothetical scenario to uncover and explain the challenges forensic practitioners face during cloud investigations. Additionally, we also provide solutions to address the challenges. Our hypothetical case scenario has shown that, in the long run, better live forensic tools, development of new methods tailored for cloud investigations and new procedures and standards are indeed needed. Furthermore, we have come to the conclusion that forensic investigations biggest challenge is not technical but legal.

  10. IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations

    OpenAIRE

    Ana Nieto; Ruben Rios; Javier Lopez

    2018-01-01

    IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT) context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntar...

  11. Semantic Modelling of Digital Forensic Evidence

    Science.gov (United States)

    Kahvedžić, Damir; Kechadi, Tahar

    The reporting of digital investigation results are traditionally carried out in prose and in a large investigation may require successive communication of findings between different parties. Popular forensic suites aid in the reporting process by storing provenance and positional data but do not automatically encode why the evidence is considered important. In this paper we introduce an evidence management methodology to encode the semantic information of evidence. A structured vocabulary of terms, ontology, is used to model the results in a logical and predefined manner. The descriptions are application independent and automatically organised. The encoded descriptions aim to help the investigation in the task of report writing and evidence communication and can be used in addition to existing evidence management techniques.

  12. Column: The Consortium of Digital Forensics Specialists (CDFS

    Directory of Open Access Journals (Sweden)

    Christopher Kelley

    2011-09-01

    Full Text Available Digital forensic practitioners are faced with an extraordinary opportunity. In fact, we may never again be faced with such an opportunity, and this opportunity will challenge us in ways we may never again be challenged.At this point in the history of the Digital Forensics profession, digital forensic specialists have the unique opportunity to help this profession emerge from its infancy. But for this profession to mature -- and to flourish -- individuals and organizations integral to the practice must assemble and shape its future. This is our opportunity. In fact, this is our mandate.(see PDF for full column

  13. Guidelines for procedures of a harmonised digital forensic process in network forensics

    CSIR Research Space (South Africa)

    Sibiya, G

    2012-08-01

    Full Text Available Cloud computing is a new computing paradigm that presents fresh research issues in the field of digital forensics. Cloud computing builds upon virtualisation technologies and is distributed in nature. Depending on its implementation, the cloud can...

  14. Evaluating Digital Forensic Options for the Apple iPad

    OpenAIRE

    Hay , Andrew; Krill , Dennis; Kuhar , Benjamin; Peterson , Gilbert

    2011-01-01

    Part 5: ADVANCED FORENSIC TECHNIQUES; International audience; The iPod Touch, iPhone and iPad from Apple are among the most popular mobile computing platforms in use today. These devices are of forensic interest because of their high adoption rate and potential for containing digital evidence. The uniformity in their design and underlying operating system (iOS) also allows forensic tools and methods to be shared across product types. This paper analyzes the tools and methods available for con...

  15. The modelling of a digital forensic readiness approach for wireless local area networks

    CSIR Research Space (South Africa)

    Ngobeni, S

    2012-06-01

    Full Text Available generated by the mobile stations and to conduct a proper digital forensic investigation. This paper attempts to address this issue by proposing a wireless digital forensic readiness model designed to monitor, log and preserve wireless network traffic...

  16. A Comprehensive and Harmonized Digital Forensic Investigation Process Model.

    Science.gov (United States)

    Valjarevic, Aleksandar; Venter, Hein S

    2015-11-01

    Performing a digital forensic investigation (DFI) requires a standardized and formalized process. There is currently neither an international standard nor does a global, harmonized DFI process (DFIP) exist. The authors studied existing state-of-the-art DFIP models and concluded that there are significant disparities pertaining to the number of processes, the scope, the hierarchical levels, and concepts applied. This paper proposes a comprehensive model that harmonizes existing models. An effort was made to incorporate all types of processes proposed by the existing models, including those aimed at achieving digital forensic readiness. The authors introduce a novel class of processes called concurrent processes. This is a novel contribution that should, together with the rest of the model, enable more efficient and effective DFI, while ensuring admissibility of digital evidence. Ultimately, the proposed model is intended to be used for different types of DFI and should lead to standardization. © 2015 American Academy of Forensic Sciences.

  17. Comparing the performance of three digital forensic tools

    Directory of Open Access Journals (Sweden)

    Brian Cusack

    Full Text Available Software used for digital forensic investigations requires to be verified against reliability and validity criteria. In this paper, three well known tools are tested against the mandatory features of digital forensic tools published by the National Institute of Standards (NIST. It was found that a variation in performance existed between the tools, with all having measureable areas of non performance. The findings have an impact on the professional use of the tools and illustrate the need for benchmarking and testing of the tools before use.

  18. IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations.

    Science.gov (United States)

    Nieto, Ana; Rios, Ruben; Lopez, Javier

    2018-02-07

    IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT) context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntarily providing electronic evidence to the authorities. However, this solution is highly dependent on the willingness of citizens to collaborate and they may be reluctant to do so if the sensitive information within their personal devices is not sufficiently protected when shared with the investigators. In this paper, we provide the digital witness approach with a methodology that enables citizens to share their data with some privacy guarantees. We apply the PRoFIT methodology, originally defined for IoT-Forensics environments, to the digital witness approach in order to unleash its full potential. Finally, we show the feasibility of a PRoFIT-compliant digital witness with two use cases.

  19. IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations

    Directory of Open Access Journals (Sweden)

    Ana Nieto

    2018-02-01

    Full Text Available IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntarily providing electronic evidence to the authorities. However, this solution is highly dependent on the willingness of citizens to collaborate and they may be reluctant to do so if the sensitive information within their personal devices is not sufficiently protected when shared with the investigators. In this paper, we provide the digital witness approach with a methodology that enables citizens to share their data with some privacy guarantees. We apply the PRoFIT methodology, originally defined for IoT-Forensics environments, to the digital witness approach in order to unleash its full potential. Finally, we show the feasibility of a PRoFIT-compliant digital witness with two use cases.

  20. IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations

    Science.gov (United States)

    Lopez, Javier

    2018-01-01

    IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT) context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntarily providing electronic evidence to the authorities. However, this solution is highly dependent on the willingness of citizens to collaborate and they may be reluctant to do so if the sensitive information within their personal devices is not sufficiently protected when shared with the investigators. In this paper, we provide the digital witness approach with a methodology that enables citizens to share their data with some privacy guarantees. We apply the PRoFIT methodology, originally defined for IoT-Forensics environments, to the digital witness approach in order to unleash its full potential. Finally, we show the feasibility of a PRoFIT-compliant digital witness with two use cases. PMID:29414864

  1. Domain-Specific Optimization in Digital Forensics

    NARCIS (Netherlands)

    J. van den Bos (Jeroen); T. van der Storm (Tijs); Z. Hu; J. de Lara

    2012-01-01

    htmlabstractFile carvers are forensic software tools used to recover data from storage devices in order to find evidence. Every legal case requires different trade-offs between precision and runtime performance. The resulting required changes to the software tools are performed manually and under

  2. Digital image processing as an aid in forensic medicine

    International Nuclear Information System (INIS)

    Buitrago-Tellez, C.; Wenz, W.; Friedrich, G.

    1992-01-01

    Radiology plays an important role in the identification of unknown corpses. Positive radiographic identification by comparison with antemortem films is an established technique in this setting. Technical defects together with non-well-preserved films make it sometimes difficult or even impossible to establish a confident comparison. Digital image processing after secondary digitalization of ante- and postmortem films represents an important development and aid in forensic medicine. The application of this method is demonstrated on a single case. (orig.) [de

  3. FIA: An Open Forensic Integration Architecture for Composing Digital Evidence

    Science.gov (United States)

    Raghavan, Sriram; Clark, Andrew; Mohay, George

    The analysis and value of digital evidence in an investigation has been the domain of discourse in the digital forensic community for several years. While many works have considered different approaches to model digital evidence, a comprehensive understanding of the process of merging different evidence items recovered during a forensic analysis is still a distant dream. With the advent of modern technologies, pro-active measures are integral to keeping abreast of all forms of cyber crimes and attacks. This paper motivates the need to formalize the process of analyzing digital evidence from multiple sources simultaneously. In this paper, we present the forensic integration architecture (FIA) which provides a framework for abstracting the evidence source and storage format information from digital evidence and explores the concept of integrating evidence information from multiple sources. The FIA architecture identifies evidence information from multiple sources that enables an investigator to build theories to reconstruct the past. FIA is hierarchically composed of multiple layers and adopts a technology independent approach. FIA is also open and extensible making it simple to adapt to technological changes. We present a case study using a hypothetical car theft case to demonstrate the concepts and illustrate the value it brings into the field.

  4. Advanced framework for digital forensic technologies and procedures.

    Science.gov (United States)

    Trček, Denis; Abie, Habtamu; Skomedal, Asmund; Starc, Iztok

    2010-11-01

    Recent trends in global networks are leading toward service-oriented architectures and sensor networks. On one hand of the spectrum, this means deployment of services from numerous providers to form new service composites, and on the other hand this means emergence of Internet of things. Both these kinds belong to a plethora of realms and can be deployed in many ways, which will pose serious problems in cases of abuse. Consequently, both trends increase the need for new approaches to digital forensics that would furnish admissible evidence for litigation. Because technology alone is clearly not sufficient, it has to be adequately supported by appropriate investigative procedures, which have yet become a subject of an international consensus. This paper therefore provides appropriate a holistic framework to foster an internationally agreed upon approach in digital forensics along with necessary improvements. It is based on a top-down approach, starting with legal, continuing with organizational, and ending with technical issues. More precisely, the paper presents a new architectural technological solution that addresses the core forensic principles at its roots. It deploys so-called leveled message authentication codes and digital signatures to provide data integrity in a way that significantly eases forensic investigations into attacked systems in their operational state. Further, using a top-down approach a conceptual framework for forensics readiness is given, which provides levels of abstraction and procedural guides embellished with a process model that allow investigators perform routine investigations, without becoming overwhelmed by low-level details. As low-level details should not be left out, the framework is further evaluated to include these details to allow organizations to configure their systems for proactive collection and preservation of potential digital evidence in a structured manner. The main reason behind this approach is to stimulate efforts

  5. Digital Forensics and Born-Digital Content in Cultural Heritage Collections. CLIR Publication No. 149

    Science.gov (United States)

    Kirschenbaum, Matthew G.; Ovenden, Richard; Redwine, Gabriela

    2010-01-01

    The purpose of this report is twofold: first, to introduce the field of digital forensics to professionals in the cultural heritage sector; and second, to explore some particular points of convergence between the interests of those charged with collecting and maintaining born-digital cultural heritage materials and those charged with collecting…

  6. The Digital Forensics and Security Challenge of QR Codes

    Directory of Open Access Journals (Sweden)

    Nik Thompson

    2013-06-01

    Full Text Available The disciplines of digital forensics and IT security must adapt to new technologies and methods of interaction with those technologies.  New technologies present both challenges and opportunities for providing evidence for digital forensics investigations.  These may be in the form of new devices such as smartphones or new methods of sharing information, such as social networks.  One such rapidly emerging interaction technology is the use of Quick Response (QR codes.  These offer a physical mechanism for quick access to web sites for advertising and social interaction.  This paper argues that the common implementation of QR codes potentially presents security issues which must be considered.  It analyzes potential privacy problems with QR codes and studies a range of devices as they may have implications for the process of evidence collection and analysis.

  7. Three Tier Indoor Localization System for Digital Forensics

    OpenAIRE

    Dennis L. Owuor; Okuthe P. Kogeda; Johnson I. Agbinya

    2017-01-01

    Mobile localization has attracted a great deal of attention recently due to the introduction of wireless networks. Although several localization algorithms and systems have been implemented and discussed in the literature, very few researchers have exploited the gap that exists between indoor localization, tracking, external storage of location information and outdoor localization for the purpose of digital forensics during and after a disaster. The contribution of this paper lies in the impl...

  8. Malware Forensics Field Guide for Windows Systems Digital Forensics Field Guides

    CERN Document Server

    Malin, Cameron H; Aquilina, James M

    2010-01-01

    Dissecting the dark side of the Internet with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware) is a treaterous condition for any forensic investigator or analyst. Written by information security experts with real-world investigative experience, Malware Forensics Field Guide for Windows Systems is a "tool" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. *A condensed hand-held guide complete with on-the-job tasks and checklists *Specific for Windows-based systems, the largest running OS in the world

  9. Digitized forensics: retaining a link between physical and digital crime scene traces using QR-codes

    Science.gov (United States)

    Hildebrandt, Mario; Kiltz, Stefan; Dittmann, Jana

    2013-03-01

    The digitization of physical traces from crime scenes in forensic investigations in effect creates a digital chain-of-custody and entrains the challenge of creating a link between the two or more representations of the same trace. In order to be forensically sound, especially the two security aspects of integrity and authenticity need to be maintained at all times. Especially the adherence to the authenticity using technical means proves to be a challenge at the boundary between the physical object and its digital representations. In this article we propose a new method of linking physical objects with its digital counterparts using two-dimensional bar codes and additional meta-data accompanying the acquired data for integration in the conventional documentation of collection of items of evidence (bagging and tagging process). Using the exemplary chosen QR-code as particular implementation of a bar code and a model of the forensic process, we also supply a means to integrate our suggested approach into forensically sound proceedings as described by Holder et al.1 We use the example of the digital dactyloscopy as a forensic discipline, where currently progress is being made by digitizing some of the processing steps. We show an exemplary demonstrator of the suggested approach using a smartphone as a mobile device for the verification of the physical trace to extend the chain-of-custody from the physical to the digital domain. Our evaluation of the demonstrator is performed towards the readability and the verification of its contents. We can read the bar code despite its limited size of 42 x 42 mm and rather large amount of embedded data using various devices. Furthermore, the QR-code's error correction features help to recover contents of damaged codes. Subsequently, our appended digital signature allows for detecting malicious manipulations of the embedded data.

  10. 2016 LLNL Nuclear Forensics Summer Program

    Energy Technology Data Exchange (ETDEWEB)

    Zavarin, Mavrik [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2016-11-15

    The Lawrence Livermore National Laboratory (LLNL) Nuclear Forensics Summer Program is designed to give graduate students an opportunity to come to LLNL for 8–10 weeks for a hands-on research experience. Students conduct research under the supervision of a staff scientist, attend a weekly lecture series, interact with other students, and present their work in poster format at the end of the program. Students also have the opportunity to meet staff scientists one-on-one, participate in LLNL facility tours (e.g., the National Ignition Facility and Center for Accelerator Mass Spectrometry), and gain a better understanding of the various science programs at LLNL.

  11. 2017 LLNL Nuclear Forensics Summer Internship Program

    Energy Technology Data Exchange (ETDEWEB)

    Zavarin, Mavrik [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-12-13

    The Lawrence Livermore National Laboratory (LLNL) Nuclear Forensics Summer Internship Program (NFSIP) is designed to give graduate students an opportunity to come to LLNL for 8-10 weeks of hands-on research. Students conduct research under the supervision of a staff scientist, attend a weekly lecture series, interact with other students, and present their work in poster format at the end of the program. Students can also meet staff scientists one-on-one, participate in LLNL facility tours (e.g., the National Ignition Facility and Center for Accelerator Mass Spectrometry), and gain a better understanding of the various science programs at LLNL.

  12. 2016 LLNL Nuclear Forensics Summer Program

    International Nuclear Information System (INIS)

    Zavarin, Mavrik

    2016-01-01

    The Lawrence Livermore National Laboratory (LLNL) Nuclear Forensics Summer Program is designed to give graduate students an opportunity to come to LLNL for 8-10 weeks for a hands-on research experience. Students conduct research under the supervision of a staff scientist, attend a weekly lecture series, interact with other students, and present their work in poster format at the end of the program. Students also have the opportunity to meet staff scientists one-on-one, participate in LLNL facility tours (e.g., the National Ignition Facility and Center for Accelerator Mass Spectrometry), and gain a better understanding of the various science programs at LLNL.

  13. Book Review: Digital Crime and Forensic Science in Cyberspace

    Directory of Open Access Journals (Sweden)

    Gary C. Kessler

    2006-12-01

    Full Text Available Kanellis, P., Kiountouzis, E., Kolokotronis, N., & Martakos, D. (2006. Digital Crime and Forensic Science in Cyberspace. Hershey, PA: Idea Group Publishing, 357 pages, ISBN: 1-59140-873-3 (paper, US$79.95.Reviewed by Gary C. KesslerThis book, according to the preface, "is intended for those who are interested in a critical overview of what forensic science is, care about privacy issues, and wish to know what constitutes evidence for computer crime." It goes on to say that the specific audiences for which it was written are students in academia and professionals in the industry.If used carefully, this book does a good job at providing a snapshot of some of the current issues in digital forensics, although perhaps best aimed at information security professionals. It is a collection of 15 chapters written by authors from Greece, Italy, The Netherlands, South Africa, the U.K., and the U.S. The international flavor of the writing is also welcome in the field.(see PDF for full review

  14. Development of a National Repository of Digital Forensic Intelligence

    Directory of Open Access Journals (Sweden)

    Mark Weiser

    2006-06-01

    Full Text Available Many people do all of their banking online, we and our children communicate with peers through computer systems, and there are many jobs that require near continuous interaction with computer systems. Criminals, however, are also “connected”, and our online interaction provides them a conduit into our information like never before. Our credit card numbers and other fiscal information are at risk, our children's personal information is exposed to the world, and our professional reputations are on the line.The discipline of Digital Forensics in law enforcement agencies around the nation and world has grown to match the increased risk and potential for cyber crimes. Even crimes that are not themselves computer-based, may be solved or prosecuted based on digital evidence left behind by the perpetrator. However, no widely accepted mechanism to facilitate sharing of ideas and methodologies has emerged. Different agencies re-develop approaches that have been tested in other jurisdictions. Even within a single agency, there is often significant redundant work. There is great potential efficiency gain in sharing information from digital forensic investigations.This paper describes an on-going design and development project between Oklahoma State University’s Center for Telecommunications and Network Security and the Defense Cyber Crimes Center to develop a Repository of Digital Forensic Knowledge. In its full implementation, the system has potential to provide exceptional gains in efficiency for examiners and investigators. It provides a better conduit to share relevant information between agencies and a structure through which cases can be cross-referenced to have the most impact on a current investigation.

  15. Managing digital evidence: the governance of digital forensics

    CSIR Research Space (South Africa)

    Grobler, MM

    2010-01-01

    Full Text Available and documentation of digital evidence stored as data or magnetically encoded information (Vacca 2002:731). This extends to include the recovery, analysis and presentation of digital evidence in a way that is admissible and appropriate in a court of law...

  16. The Beginning of the End for Digital Forensic Recovery?

    Directory of Open Access Journals (Sweden)

    Graeme Baxter Bell

    2010-09-01

    Full Text Available Normal 0 false false false EN-AU X-NONE X-NONE Digital evidence is increasingly relied upon in computer forensic examinations and legal proceedings in the modern courtroom. The primary storage technology used for digital information has remained constant over the last two decades, in the form of the magnetic disc. Consequently, investigative, forensic, and judicial procedures are well-established for magnetic disc storage devices (Carrier, 2005. However, a paradigm shift has taken place in technology storage and complex, transistor-based devices for primary storage are now increasingly common. Most people are aware of the transition from portable magnetic floppy discs to portable USB transistor flash devices, yet the transition from magnetic hard drives to solid-state drives inside modern computers has so far attracted very little attention from the research community.Here we show that it is imprudent and potentially reckless to rely on existing evidence collection processes and procedures, and we demonstrate that conventional assumptions about the behaviour of storage media are no longer valid. In particular we demonstrate that modern storage devices can operate under their own volition in the absence of computer instructions. Such operations are highly destructive of traditionally recoverable data. This can contaminate evidence; can obfuscate and make validation of digital evidence reports difficult; can complicate the process of live and dead analysis recovery; and can complicate and frustrate the post recovery forensic analysis. Our experimental findings demonstrate that solid-state drives (SSDs have the capacity to destroy evidence catastrophically under their own volition, in the absence of specific instructions to do so from a computer.

  17. Digital-forensics based pattern recognition for discovering identities in electronic evidence

    NARCIS (Netherlands)

    Henseler, Hans; Hofsté, Jop; van Keulen, Maurice

    With the pervasiveness of computers and mobile devices, digital forensics becomes more important in law enforcement. Detectives increasingly depend on the scarce support of digital specialists which impedes efficiency of criminal investigations. This paper proposes and algorithm to extract, merge

  18. Column: The Science of Digital Forensics: Analysis of Digital Traces

    Directory of Open Access Journals (Sweden)

    Fred Cohen

    2012-09-01

    Full Text Available In part 1 of this series (Cohen, 2011a, Analysis of digital traces is a foundational process by which the examiner, typically using computer software tools, comes to understand and answer basic questions regarding digital traces.“Input sequences to digital systems produce outputs and state changes as a function of the previous state. To the extent that the state or outputs produce stored and/or captured bit sequences, these form traces of the event sequences that caused them. Thus the definition of a trace may be stated as: "A set of bit sequences produced from the execution of a finite state machine."(see PDF for full column

  19. Decomposed Photo Response Non-Uniformity for Digital Forensic Analysis

    Science.gov (United States)

    Li, Yue; Li, Chang-Tsun

    The last few years have seen the applications of Photo Response Non-Uniformity noise (PRNU) - a unique stochastic fingerprint of image sensors, to various types of digital forensic investigations such as source device identification and integrity verification. In this work we proposed a new way of extracting PRNU noise pattern, called Decomposed PRNU (DPRNU), by exploiting the difference between the physical andartificial color components of the photos taken by digital cameras that use a Color Filter Array for interpolating artificial components from physical ones. Experimental results presented in this work have shown the superiority of the proposed DPRNU to the commonly used version. We also proposed a new performance metrics, Corrected Positive Rate (CPR) to evaluate the performance of the common PRNU and the proposed DPRNU.

  20. A survey of passive technology for digital image forensics

    Institute of Scientific and Technical Information of China (English)

    LUO Weiqi; QU Zhenhua; PAN Feng; HUANG Jiwu

    2007-01-01

    Over the past years,digital images have been widely used in the Internet and other applications.Whilst image processing techniques are developing at a rapid speed,tampering with digital images without leaving any obvious traces becomes easier and easier.This may give rise to some problems such as image authentication.A new passive technology for image forensics has evolved quickly during the last few years.Unlike the signature-based or watermark-based methods,the new technology does not need any signature generated or watermark embedded in advance,it assumes that different imaging devices or processing would introduce different inherent patterns into the output images.These underlying patterns are consistent in the original untampered images and would be altered after some kind of manipulations.Thus,they can be used as evidence for image source identification and alteration detection.In this paper,we will discuss this new forensics technology and give an overview of the prior literatures.Some concluding remarks are made about the state of the art and the challenges in this novel technology.

  1. A simple experiment with Microsoft Office 2010 and Windows 7 utilizing digital forensic methodology

    Directory of Open Access Journals (Sweden)

    Gregory H. Carlton

    2013-03-01

    Full Text Available Digital forensic examiners are tasked with retrieving data from digital storage devices, and frequently these examiners are expected to explain the circumstances that led to the data being in its current state. Through written reports or verbal, expert testimony delivered in court, digital forensic examiners are expected to describe whether data have been altered, and if so, then to what extent have data been altered. Addressing these expectations results from opinions digital forensic examiners reach concerning their understanding of electronic storage and retrieval methods. The credibility of these opinions evolves from the scientific basis from which they are drawn using forensic methodology.   Digital forensic methodology, being a scientific process, is derived from observations and repeatable findings in controlled environments. Furthermore, scientific research methods have established that causal conclusions can be drawn only when observed in controlled experiments. With this in mind, it seems beneficial that digital forensic examiners have a library of experiments from which they can perform, observe results, and derive conclusions. After having conducted an experiment on a specific topic, a digital forensic examiner will be in a better position to express with confidence the state of the current data and perhaps the conditions that led to its current state.   This study provides a simple experiment using the contemporary versions of the most widely used software applications running on the most commonly installed operation system. Here, using the Microsoft Office 2010 applications, a simple Word document, an Excel spreadsheet, a PowerPoint presentation, and an Access database are created and then modified. A forensic analysis is performed to determine the extent in which the changes to the data are identified. The value in this study is not that it yields new forensic analysis techniques, but rather that it illustrates a

  2. A note on digital dental radiography in forensic odontology.

    Science.gov (United States)

    Chiam, Sher-Lin

    2014-09-01

    Digital dental radiography, intraoral and extraoral, is becoming more popular in dental practice. It offers convenience, such as lower exposure to radiation, ease of storing of images, and elimination of chemical processing. However, it also has disadvantages and drawbacks. One of these is the potential for confusion of the orientation of the image. This paper outlines one example of this, namely, the lateral inversion of the image. This source of confusion is partly inherent in the older model of phosphor storage plates (PSPs), as they allow both sides to be exposed without clue to the fact that the image is acquired on the wrong side. The native software allows digital manipulation of the X-ray image, permitting both rotation and inversion. Attempts to orientate the X-ray according to the indicator incorporated on the plate can then sometimes lead to inadvertent lateral inversion of the image. This article discusses the implications of such mistakes in dental digital radiography to forensic odontology and general dental practice.

  3. Digital Stratigraphy: Contextual Analysis of File System Traces in Forensic Science.

    Science.gov (United States)

    Casey, Eoghan

    2017-12-28

    This work introduces novel methods for conducting forensic analysis of file allocation traces, collectively called digital stratigraphy. These in-depth forensic analysis methods can provide insight into the origin, composition, distribution, and time frame of strata within storage media. Using case examples and empirical studies, this paper illuminates the successes, challenges, and limitations of digital stratigraphy. This study also shows how understanding file allocation methods can provide insight into concealment activities and how real-world computer usage can complicate digital stratigraphy. Furthermore, this work explains how forensic analysts have misinterpreted traces of normal file system behavior as indications of concealment activities. This work raises awareness of the value of taking the overall context into account when analyzing file system traces. This work calls for further research in this area and for forensic tools to provide necessary information for such contextual analysis, such as highlighting mass deletion, mass copying, and potential backdating. © 2017 American Academy of Forensic Sciences.

  4. Two-Step Injection Method for Collecting Digital Evidence in Digital Forensics

    Directory of Open Access Journals (Sweden)

    Nana Rachmana Syambas

    2015-01-01

    Full Text Available In digital forensic investigations, the investigators take digital evidence from computers, laptops or other electronic goods. There are many complications when a suspect or related person does not want to cooperate or has removed digital evidence. A lot of research has been done with the goal of retrieving data from flash memory or other digital storage media from which the content has been deleted. Unfortunately, such methods cannot guarantee that all data will be recovered. Most data can only be recovered partially and sometimes not perfectly, so that some or all files cannot be opened. This paper proposes the development of a new method for the retrieval of digital evidence called the Two-Step Injection method (TSI. It focuses on the prevention of the loss of digital evidence through the deletion of data by suspects or other parties. The advantage of this method is that the system works in secret and can be combined with other digital evidence applications that already exist, so that the accuracy and completeness of the resulting digital evidence can be improved. An experiment to test the effectiveness of the method was set up. The developed TSI system worked properly and had a 100% success rate.

  5. Practical implementation of a methodology for digital images authentication using forensics techniques

    OpenAIRE

    Francisco Rodríguez-Santos; Guillermo Delgado-Gutierréz; Leonardo Palacios-Luengas; Rubén Vázquez Medina

    2015-01-01

    This work presents a forensics analysis methodology implemented to detect modifications in JPEG digital images by analyzing the image’s metadata, thumbnail, camera traces and compression signatures. Best practices related with digital evidence and forensics analysis are considered to determine if the technical attributes and the qualities of an image are consistent with each other. This methodology is defined according to the recommendations of the Good Practice Guide for Computer-Based Elect...

  6. A Framework for Harmonizing Forensic Science Practices and Digital/Multimedia Evidence

    OpenAIRE

    Jaquet-Chiffelle, David-Olivier; Casey, Eoghan; Pollitt, Mark; Gladyshev, Pavel

    2018-01-01

    Like many other specializations within forensic science, the digital/multimedia discipline has been challenged with respect to demonstrating that the processes, activities, and techniques used are sufficiently scientific. To address this issue, in April 2015, the Organization of Scientific Area Committees for Forensic Science (OSAC) Digital/Multimedia Scientific Area Committee (SAC) established a Task Group (TG). This document summarizes the work of the TG that grew into establishing a harmo...

  7. [The undergraduate program in forensic science: a national challenge].

    Science.gov (United States)

    García Castillo, Zoraida; Graue Wiechers, Enrique; Durante Montiel, Irene; Herrera Saint Leu, Patricia

    2014-01-01

    The challenge in achieving an ideal state of justice is that each "proof" has the highest degree of reliability. This is the main responsibility of the forensic scientist. Up to now, criminal investigations in Mexico have been supported by forensic work from a wide variety of disciplinary backgrounds that give testimony in a particular area, even though they may have become forensic witnesses in a complementary and experiential manner. In January 2013, the Universidad Nacional Autónoma de México (UNAM) approved the "Forensic Science" undergraduate program that, in collaboration with various academic entities and government institutions, will develop forensic scientists trained in science, law, and criminology. This is focused on contributing to the national demand that the justice system has more elements to procure and administer justice in dealing with crime.

  8. A survey of contemporary enterprise storage technologies from a digital forensics perspective

    Directory of Open Access Journals (Sweden)

    Gregory H. Carlton

    2011-09-01

    Full Text Available As the proliferation of digital computational systems continue to expand, increasingly complex technologies emerge, including those regarding large, enterprise-wide, information storage and retrieval systems. Within this study, we examine four contemporary enterprise storage technologies. Our examination of these technologies is presented with an overview of the technological features of each offering and then followed with a discussion of the impact of these technologies on digital forensics methods, particularly regarding forensic data acquisition. We offer a general opinion concerning a recommended data acquisition method when faced with the task of obtaining a forensic image of data contained within these technologies, we discuss limitations of our study, and lastly, we suggest areas in which additional research would benefit the field of digital forensics.

  9. Redeye: A Digital Library for Forensic Document Triage

    Energy Technology Data Exchange (ETDEWEB)

    Bogen, Paul Logasa [ORNL; McKenzie, Amber T [ORNL; Gillen, Rob [ORNL

    2013-01-01

    Forensic document analysis has become an important aspect of investigation of many different kinds of crimes from money laundering to fraud and from cybercrime to smuggling. The current workflow for analysts includes powerful tools, such as Palantir and Analyst s Notebook, for moving from evidence to actionable intelligence and tools for finding documents among the millions of files on a hard disk, such as FTK. However, the analysts often leave the process of sorting through collections of seized documents to filter out the noise from the actual evidence to a highly labor-intensive manual effort. This paper presents the Redeye Analysis Workbench, a tool to help analysts move from manual sorting of a collection of documents to performing intelligent document triage over a digital library. We will discuss the tools and techniques we build upon in addition to an in-depth discussion of our tool and how it addresses two major use cases we observed analysts performing. Finally, we also include a new layout algorithm for radial graphs that is used to visualize clusters of documents in our system.

  10. Digital Forensics Formats: Seeking a Digital Preservation Storage Container Format for Web Archiving

    Directory of Open Access Journals (Sweden)

    Yunhyong Kim

    2012-12-01

    Full Text Available In this paper we discuss archival storage container formats from the point of view of digital curation and preservation, an aspect of preservation overlooked by most other studies. Considering established approaches to data management as our jumping off point, we selected seven container format attributes that are core to the long term accessibility of digital materials. We have labeled these core preservation attributes. These attributes are then used as evaluation criteria to compare storage container formats belonging to five common categories: formats for archiving selected content (e.g. tar, WARC, disk image formats that capture data for recovery or installation (partimage, dd raw image, these two types combined with a selected compression algorithm (e.g. tar+gzip, formats that combine packing and compression (e.g. 7-zip, and forensic file formats for data analysis in criminal investigations (e.g. aff – Advanced Forensic File format. We present a general discussion of the storage container format landscape in terms of the attributes we discuss, and make a direct comparison between the three most promising archival formats: tar, WARC, and aff. We conclude by suggesting the next steps to take the research forward and to validate the observations we have made.

  11. Gathering evidence: Model-driven software engineering in automated digital forensics

    NARCIS (Netherlands)

    van den Bos, J.

    2014-01-01

    Digital forensics concerns the acquisition, recovery and analysis of information on digital devices to answer legal questions. Exponential increases in available storage, as well as growing device adoption by the public, have made manual inspection of all information infeasible. A solution is

  12. Uses of software in digital image analysis: a forensic report

    Science.gov (United States)

    Sharma, Mukesh; Jha, Shailendra

    2010-02-01

    Forensic image analysis is required an expertise to interpret the content of an image or the image itself in legal matters. Major sub-disciplines of forensic image analysis with law enforcement applications include photo-grammetry, photographic comparison, content analysis and image authentication. It has wide applications in forensic science range from documenting crime scenes to enhancing faint or indistinct patterns such as partial fingerprints. The process of forensic image analysis can involve several different tasks, regardless of the type of image analysis performed. Through this paper authors have tried to explain these tasks, which are described in to three categories: Image Compression, Image Enhancement & Restoration and Measurement Extraction. With the help of examples like signature comparison, counterfeit currency comparison and foot-wear sole impression using the software Canvas and Corel Draw.

  13. Speech watermarking: an approach for the forensic analysis of digital telephonic recordings.

    Science.gov (United States)

    Faundez-Zanuy, Marcos; Lucena-Molina, Jose J; Hagmüller, Martin

    2010-07-01

    In this article, the authors discuss the problem of forensic authentication of digital audio recordings. Although forensic audio has been addressed in several articles, the existing approaches are focused on analog magnetic recordings, which are less prevalent because of the large amount of digital recorders available on the market (optical, solid state, hard disks, etc.). An approach based on digital signal processing that consists of spread spectrum techniques for speech watermarking is presented. This approach presents the advantage that the authentication is based on the signal itself rather than the recording format. Thus, it is valid for usual recording devices in police-controlled telephone intercepts. In addition, our proposal allows for the introduction of relevant information such as the recording date and time and all the relevant data (this is not always possible with classical systems). Our experimental results reveal that the speech watermarking procedure does not interfere in a significant way with the posterior forensic speaker identification.

  14. Windows registry forensics advanced digital forensic analysis of the Windows registry

    CERN Document Server

    Carvey, Harlan

    2011-01-01

    Harlan Carvey brings readers an advanced book on Windows Registry - the most difficult part of Windows to analyze in forensics! Windows Registry Forensics provides the background of the Registry to help develop an understanding of the binary structure of Registry hive files. Approaches to live response and analysis are included, and tools and techniques for postmortem analysis are discussed at length. Tools and techniques will be presented that take the analyst beyond the current use of viewers and into real analysis of data contained in the Registry. This book also has a DVD containing tools, instructions and videos.

  15. Python forensics a workbench for inventing and sharing digital forensic technology

    CERN Document Server

    Hosmer, Chet

    2014-01-01

    Python Forensics provides many never-before-published proven forensic modules, libraries, and solutions that can be used right out of the box. In addition, detailed instruction and documentation provided with the code samples will allow even novice Python programmers to add their own unique twists or use the models presented to build new solutions. Rapid development of new cybercrime investigation tools is an essential ingredient in virtually every case and environment. Whether you are performing post-mortem investigation, executing live triage, extracting evidence from mobile devices or cl

  16. Research on Digital Forensic Readiness Design in a Cloud Computing-Based Smart Work Environment

    Directory of Open Access Journals (Sweden)

    Sangho Park

    2018-04-01

    Full Text Available Recently, the work environments of organizations have been in the process of transitioning into smart work environments by applying cloud computing technology in the existing work environment. The smart work environment has the characteristic of being able to access information assets inside the company from outside the company through cloud computing technology, share information without restrictions on location by using mobile terminals, and provide a work environment where work can be conducted effectively in various locations and mobile environments. Thus, in the cloud computing-based smart work environment, changes are occurring in terms of security risks, such as an increase in the leakage risk of an organization’s information assets through mobile terminals which have a high risk of loss and theft and increase the hacking risk of wireless networks in mobile environments. According to these changes in security risk, the reactive digital forensic method, which investigates digital evidence after the occurrence of security incidents, appears to have a limit which has led to a rise in the necessity of proactive digital forensic approaches wherein security incidents can be addressed preemptively. Accordingly, in this research, we design a digital forensic readiness model at the level of preemptive prevention by considering changes in the cloud computing-based smart work environment. Firstly, we investigate previous research related to the cloud computing-based smart work environment and digital forensic readiness and analyze a total of 50 components of digital forensic readiness. In addition, through the analysis of the corresponding preceding research, we design seven detailed areas, namely, outside the organization environment, within the organization guideline, system information, terminal information, user information, usage information, and additional function. Then, we design a draft of the digital forensic readiness model in the cloud

  17. Digital and multimedia forensics justified: An appraisal on professional policy and legislation

    Science.gov (United States)

    Popejoy, Amy Lynnette

    Recent progress in professional policy and legislation at the federal level in the field of forensic science constructs a transformation of new outcomes for future experts. An exploratory and descriptive qualitative methodology was used to critique and examine Digital and Multimedia Science (DMS) as a justified forensic discipline. Chapter I summarizes Recommendations 1, 2, and 10 of the National Academy of Sciences (NAS) Report 2009 regarding disparities and challenges facing the forensic science community. Chapter I also delivers the overall foundation and framework of this thesis, specifically how it relates to DMS. Chapter II expands on Recommendation 1: "The Promotion and Development of Forensic Science," and focuses chronologically on professional policy and legislative advances through 2014. Chapter III addresses Recommendation 2: "The Standardization of Terminology in Reporting and Testimony," and the issues of legal language and terminology, model laboratory reports, and expert testimony concerning DMS case law. Chapter IV analyzes Recommendation 10: "Insufficient Education and Training," identifying legal awareness for the digital and multimedia examiner to understand the role of the expert witness, the attorney, the judge and the admission of forensic science evidence in litigation in our criminal justice system. Finally, Chapter V studies three DME specific laboratories at the Texas state, county, and city level, concentrating on current practice and procedure.

  18. Digital forensics in the cloud: The state of the art

    CSIR Research Space (South Africa)

    Sibiya, G

    2015-05-01

    Full Text Available [21], Lee et al. [22], Lee and Un [23], Baar et al. [24] and Ting and Yang [25] implement cloud based services to carry out computing expensive tasks including data analysis and performing searches on big evidence data. The technologies can... as it was also proposed by many other researchers in the last few years including: Lee and Un [23]; Marty, [35]; Ruan et al. [36] and Wen et al. [15]. Copyright © 2015 The authors www.IST-Africa.org/Conference2015 Page 6 of 9 Table 1 Cloud Forensic Systems...

  19. A Study of the FEPAC Accredited Graduate Forensic Science Programs' Curricula

    Science.gov (United States)

    Rushton, Catherine Genice

    2016-01-01

    The National Institute of Justice (1999) and the National Academy of Sciences (2009) recommended that forensic science training shift from on-the-job training to formal education; however, the reports cited inconsistencies in the curricula of the forensic science degree programs as an impediment to this. The Forensic Science Education Programs…

  20. A Survey of Graduate Training Programs and Coursework in Forensic Psychology

    Science.gov (United States)

    Burl, Jeffrey; Shah, Sanjay; Filone, Sarah; Foster, Elizabeth; DeMatteo, David

    2012-01-01

    An increasing number of graduate programs are available to students interested in the study of forensic psychology. The growth of forensic training opportunities is reflective of the wider development of forensic psychology as a discrete specialty area. An Internet-based survey was conducted to provide descriptive information to academic advisors…

  1. A review of forensic science higher education programs in the United States: bachelor's and master's degrees.

    Science.gov (United States)

    Tregar, Kristen L; Proni, Gloria

    2010-11-01

    As the number of forensic science programs offered at higher education institutions rises, and more students express an interest in them, it is important to gain information regarding the offerings in terms of courses, equipment available to students, degree requirements, and other important aspects of the programs. A survey was conducted examining the existing bachelor's and master's forensic science programs in the U.S. Of the responding institutions, relatively few were, at the time of the survey, accredited by the forensic science Education Programs Accreditation Commission (FEPAC). In general, the standards of the responding programs vary considerably primarily in terms of their size and subjects coverage. While it is clear that the standards for the forensic science programs investigated are not homogeneous, the majority of the programs provide a strong science curriculum, faculties with advanced degrees, and interesting forensic-oriented courses. © 2010 American Academy of Forensic Sciences.

  2. Digital Forensic Analysis Of Malware Infected Machine- Case Study

    Directory of Open Access Journals (Sweden)

    Amulya Podile

    2015-08-01

    Full Text Available Abstract Internet banking has created a convenient way for us to handle our business without leaving our home. Man-in-the-Browser is a special case of Man-in-the-middle attack targeted against customers of Internet banking. One of the capabilities of Man-in-the-Browser Trojan is modification of html referred to as html injection that allows the attacker to alter the html of a page before it is sent to the browser for interpretation. In this paper the authors discussed about forensic analysis of RAM Volatile data system logs and registry collected from bank customer computer infected with Trojan and confirmed the source of attack time-stamps and the behavior of the malware by using open source and commercial tools.

  3. The forensic float nurse: a new concept in the effective management of service delivery in a forensic program.

    Science.gov (United States)

    Cyr, J J; Paradis, J

    2012-12-01

    A major challenge faced by Forensic Program management teams is to balance their budgets due to the unpredictability of the forensic patient population, particularly in the context of managing staffing costs where the hospital is not the "gatekeeper" and does not have control over who is admitted and when. In forensic mental health, the justice system, either via the courts, or review boards, determines who is ordered for admission to hospital for assessment or treatment and rehabilitation. Hospitals have little, if any, recourse but to admit these mentally disordered offenders. This typically results in increased levels of staffing with concomitant overtime costs. The literature suggests that clustered float pool nurses develop enhanced relationships with staff and patients, thereby enabling them to attain specialized clinical expertise to treat specific patient populations, promoting safer, high quality care, and overall are more cost effective. Forensic nursing is recognized as a mental health subspecialty. The "Forensic Float Nurse" concept was piloted to provide readily available, highly adaptable, skilled forensic nurses to assist in times of unpredictably heavy workloads and/or unplanned staffing shortages. A significant reduction approaching 50% in overtime was achieved. Heuristic implications of this finding are presented. © 2012 International Association of Forensic Nurses.

  4. The use of full spectrum digital photography for evidence collection and preservation in cases involving forensic odontology.

    Science.gov (United States)

    Wright, Franklin D; Golden, Gregory S

    2010-09-10

    Photography often represents the best method to collect and preserve evidence in forensic cases. This is especially true in forensic odontology with cases involving dental identification, human abuse and, perhaps most significantly, bitemark cases. Basic visible light photography is adequate in most dental identification cases; however, full spectrum digital photography is best utilized to collect all available evidence in cases of human abuse and bitemarks. This paper will discuss the types of photographic evidence that should be collected with various forensic odontological cases and the specific techniques utilized in full spectrum forensic digital photography. The use of full spectrum photography captures the forensic injuries using special techniques recording the injuries in each of the four resultant events that occur when light strikes skin. Copyright 2010 Elsevier Ireland Ltd. All rights reserved.

  5. Técnicas de análisis forense digital aplicadas a dispositivos y sistemas móviles

    OpenAIRE

    Guillermo Jaramillo Cabrera

    2011-01-01

    La disciplina del Análisis Forense Digital, es un campo de investigación excitante y dinámico, conocido hasta ahora sólo por especialistas, y tiene cada vez más un poderoso impacto en una variedad de situaciones, incluyendo ambientes corporativos, investigaciones internas, litigación civil, investigaciones criminales, investigaciones de inteligencia y asuntos de seguridad nacional. El Análisis Forense Digital Móvil, es sin duda, el de mayor crecimiento y desarrollo en la disciplina forense di...

  6. Forensic Computing (Dagstuhl Seminar 13482)

    OpenAIRE

    Freiling, Felix C.; Hornung, Gerrit; Polcák, Radim

    2014-01-01

    Forensic computing} (sometimes also called digital forensics, computer forensics or IT forensics) is a branch of forensic science pertaining to digital evidence, i.e., any legal evidence that is processed by digital computer systems or stored on digital storage media. Forensic computing is a new discipline evolving within the intersection of several established research areas such as computer science, computer engineering and law. Forensic computing is rapidly gaining importance since the...

  7. Digital Image Forensics There is More to a Picture than Meets the Eye

    CERN Document Server

    Memon, Nasir

    2013-01-01

    Photographic imagery has come a long way from the pinhole cameras of the nineteenth century. Digital imagery, and its applications, develops in tandem with contemporary society’s sophisticated literacy of this subtle medium. This book examines the ways in which digital images have become ever more ubiquitous as legal and medical evidence, just as they have become our primary source of news and have replaced paper-based financial documentation. Crucially, the contributions also analyze the very profound problems which have arisen alongside the digital image, issues of veracity and progeny that demand systematic and detailed response: It looks real, but is it? What camera captured it? Has it been doctored or subtly altered? Attempting to provide answers to these slippery issues, the book covers how digital images are created, processed and stored before moving on to set out the latest techniques for forensically examining images, and finally addressing practical issues such as courtroom admissibility. In an e...

  8. The Advanced Data Acquisition Model (ADAM: A Process Model for Digital Forensic Practice

    Directory of Open Access Journals (Sweden)

    Richard Brian Adams

    2013-12-01

    Full Text Available As with other types of evidence, the courts make no presumption that digital evidence is reliable without some evidence of empirical testing in relation to the theories and techniques associated with its production. The issue of reliability means that courts pay close attention to the manner in which electronic evidence has been obtained and in particular the process in which the data is captured and stored. Previous process models have tended to focus on one particular area of digital forensic practice, such as law enforcement, and have not incorporated a formal description. We contend that this approach has prevented the establishment of generally accepted standards and processes that are urgently needed in the domain of digital forensics. This paper presents a generic process model as a step towards developing such a generally-accepted standard for a fundamental digital forensic activity – the acquisition of digital evidence. Normal 0 false false false EN-AU X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin-top:0cm; mso-para-margin-right:0cm; mso-para-margin-bottom:12.0pt; mso-para-margin-left:0cm; text-indent:18.0pt; line-height:200%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-ansi-language:EN-US; mso-fareast-language:EN-US; mso-bidi-language:EN-US;}

  9. Chain of evidence generation for contrast enhancement in digital image forensics

    Science.gov (United States)

    Battiato, Sebastiano; Messina, Giuseppe; Strano, Daniela

    2010-01-01

    The quality of the images obtained by digital cameras has improved a lot since digital cameras early days. Unfortunately, it is not unusual in image forensics to find wrongly exposed pictures. This is mainly due to obsolete techniques or old technologies, but also due to backlight conditions. To extrapolate some invisible details a stretching of the image contrast is obviously required. The forensics rules to produce evidences require a complete documentation of the processing steps, enabling the replication of the entire process. The automation of enhancement techniques is thus quite difficult and needs to be carefully documented. This work presents an automatic procedure to find contrast enhancement settings, allowing both image correction and automatic scripting generation. The technique is based on a preprocessing step which extracts the features of the image and selects correction parameters. The parameters are thus saved through a JavaScript code that is used in the second step of the approach to correct the image. The generated script is Adobe Photoshop compliant (which is largely used in image forensics analysis) thus permitting the replication of the enhancement steps. Experiments on a dataset of images are also reported showing the effectiveness of the proposed methodology.

  10. Forensic characterization of camcorded movies: digital cinema vs. celluloid film prints

    Science.gov (United States)

    Rolland-Nevière, Xavier; Chupeau, Bertrand; Do"rr, Gwena"l.; Blondé, Laurent

    2012-03-01

    Digital camcording in the premises of cinema theaters is the main source of pirate copies of newly released movies. To trace such recordings, watermarking systems are exploited in order for each projection to be unique and thus identifiable. The forensic analysis to recover these marks is different for digital and legacy cinemas. To avoid running both detectors, a reliable oracle discriminating between cams originating from analog or digital projections is required. This article details a classification framework relying on three complementary features : the spatial uniformity of the screen illumination, the vertical (in)stability of the projected image, and the luminance artifacts due to the interplay between the display and acquisition devices. The system has been tuned with cams captured in a controlled environment and benchmarked against a medium-sized dataset (61 samples) composed of real-life pirate cams. Reported experimental results demonstrate that such a framework yields over 80% classification accuracy.

  11. Differential Power Analysis as a digital forensic tool.

    Science.gov (United States)

    Souvignet, T; Frinken, J

    2013-07-10

    Electronic payment fraud is considered a serious international crime by Europol. An important part of this fraud comes from payment card data skimming. This type of fraud consists of an illegal acquisition of payment card details when a user is withdrawing cash at an automated teller machine (ATM) or paying at a point of sale (POS). Modern skimming devices, also known as skimmers, use secure crypto-algorithms (e.g. Advanced Encryption Standard (AES)) to protect skimmed data stored within their memory. In order to provide digital evidence in criminal cases involving skimmers, law enforcement agencies (LEAs) must retrieve the plaintext skimmed data, generally without having knowledge of the secret key. This article proposes an alternative to the current solution at the Bundeskriminalamt (BKA) to reveal the secret key. The proposed solution is non-invasive, based on Power Analysis Attack (PAA). This article first describes the structure and the behaviour of an AES skimmer, followed by the proposal of the full operational PAA process, from power measurements to attack computation. Finally, it presents results obtained in several cases, explaining the latest improvements and providing some ideas for further developments. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  12. Anàlisi forense d'evidències digitals

    OpenAIRE

    Bonachera López, Esteban

    2014-01-01

    L'objectiu principal d'aquest projecte consisteix en la realització de l'anàlisi forense del disc dur i de la memòria RAM d'un ordinador personal, en concret un Netbook, vinculat a una possible conducta delictiva. També s'inclou en l'anàlisi una base de dades del conegut programari WhatsApp extreta d'un smartphone. Per realitzar aquesta tasca s'utilitzaran eines específiques per localitzar les evidències digitals que puguin demostrar els presumptes delictes. El objetivo principal de este p...

  13. Proposal for internet-based Digital Dental Chart for personal dental identification in forensics.

    Science.gov (United States)

    Hanaoka, Yoichi; Ueno, Asao; Tsuzuki, Tamiyuki; Kajiwara, Masahiro; Minaguchi, Kiyoshi; Sato, Yoshinobu

    2007-05-03

    A dental chart is very useful as a standard source of evidence in the personal identification of bodies. However, the kind of dental chart available will often vary as a number of types of odontogram have been developed where the visual representation of dental conditions has relied on hand-drawn representation. We propose the Digital Dental Chart (DDC) as a new style of dental chart, especially for open investigations aimed at establishing the identity of unknown bodies. Each DDC is constructed using actual oral digital images and dental data, and is easy to upload onto an Internet website. The DDC is a more useful forensic resource than the standard types of dental chart in current use as it has several advantages, among which are its ability to carry a large volume of information and reproduce dental conditions clearly and in detail on a cost-effective basis.

  14. Blind Forensics of Successive Geometric Transformations in Digital Images Using Spectral Method: Theory and Applications.

    Science.gov (United States)

    Chen, Chenglong; Ni, Jiangqun; Shen, Zhaoyi; Shi, Yun Qing

    2017-06-01

    Geometric transformations, such as resizing and rotation, are almost always needed when two or more images are spliced together to create convincing image forgeries. In recent years, researchers have developed many digital forensic techniques to identify these operations. Most previous works in this area focus on the analysis of images that have undergone single geometric transformations, e.g., resizing or rotation. In several recent works, researchers have addressed yet another practical and realistic situation: successive geometric transformations, e.g., repeated resizing, resizing-rotation, rotation-resizing, and repeated rotation. We will also concentrate on this topic in this paper. Specifically, we present an in-depth analysis in the frequency domain of the second-order statistics of the geometrically transformed images. We give an exact formulation of how the parameters of the first and second geometric transformations influence the appearance of periodic artifacts. The expected positions of characteristic resampling peaks are analytically derived. The theory developed here helps to address the gap left by previous works on this topic and is useful for image security and authentication, in particular, the forensics of geometric transformations in digital images. As an application of the developed theory, we present an effective method that allows one to distinguish between the aforementioned four different processing chains. The proposed method can further estimate all the geometric transformation parameters. This may provide useful clues for image forgery detection.

  15. Técnicas de análisis forense digital aplicadas a dispositivos y sistemas móviles

    Directory of Open Access Journals (Sweden)

    Guillermo Jaramillo Cabrera

    2011-12-01

    Full Text Available La disciplina del Análisis Forense Digital, es un campo de investigación excitante y dinámico, conocido hasta ahora sólo por especialistas, y tiene cada vez más un poderoso impacto en una variedad de situaciones, incluyendo ambientes corporativos, investigaciones internas, litigación civil, investigaciones criminales, investigaciones de inteligencia y asuntos de seguridad nacional. El Análisis Forense Digital Móvil, es sin duda, el de mayor crecimiento y desarrollo en la disciplina forense digital y ofrece ventajas significativas así como también muchos retos. Mientras que lo interesante de la investigación forense de dispositivos como los que usan el Sistema Operativo Móvil Android o simplemente dispositivo Android, implica la adquisición y análisis de datos; es importante tener una visión amplia tanto de la plataforma como de las herramientas que serán utilizadas a lo largo de la investigación. Un entendimiento minucioso asistirá al Ingeniero Examinador Forense o Ingeniero de Seguridad a través del análisis e investigación exitosos de dispositivos móviles, incluyendo los Smartphone basados en Android.

  16. Evaluation of a cognitive-behavioral program for chronically psychotic forensic inpatients.

    NARCIS (Netherlands)

    Hornsveld, R.H.J.; Nijman, H.L.I.

    2005-01-01

    The present study evaluated the progress of four groups of chronically psychotic patients in treatment at De Kijvelanden Forensic Psychiatric Hospital. The psychotic patients were offered a cognitive-behavioral program, including psycho education, grief processing, stress management, functional

  17. Technical and legal perspectives on forensics scenario

    OpenAIRE

    Solinas, Fabrizio

    2014-01-01

    The dissertation concerns digital forensic. The expression digital forensic (sometimes called digital forensic science) is the science that studies the identification, storage, protection, retrieval, documentation, use, and every other form of computer data processing in order to be evaluated in a legal trial. Digital forensic is a branch of forensic science. First of all, digital forensic represents the extension of theories, principles and procedures that are typical and importa...

  18. Expeditionary Forensic Support to Joint Force Commanders: What Changes or Considerations are Warranted?

    Science.gov (United States)

    2012-04-10

    builders . Human Intelligence (HUMINT) and Signals Intelligence (SIGINT) could then also be prioritized and employed accordingly for optimal 8...responsibility for digital and multimedia forensics, and DIA responsibility for forensic intelligence activities and programs.31 The Army is also currently...aligning functional oversight of Forensics, Biometrics, Law Enforcement, Detainee Operations, and Physical Security 11 under one overarching

  19. A novel method for detecting light source for digital images forensic

    Science.gov (United States)

    Roy, A. K.; Mitra, S. K.; Agrawal, R.

    2011-06-01

    Manipulation in image has been in practice since centuries. These manipulated images are intended to alter facts — facts of ethics, morality, politics, sex, celebrity or chaos. Image forensic science is used to detect these manipulations in a digital image. There are several standard ways to analyze an image for manipulation. Each one has some limitation. Also very rarely any method tried to capitalize on the way image was taken by the camera. We propose a new method that is based on light and its shade as light and shade are the fundamental input resources that may carry all the information of the image. The proposed method measures the direction of light source and uses the light based technique for identification of any intentional partial manipulation in the said digital image. The method is tested for known manipulated images to correctly identify the light sources. The light source of an image is measured in terms of angle. The experimental results show the robustness of the methodology.

  20. DHS National Technical Nuclear Forensics Program FY 10 Summary Report: Graduate Mentoring Assistance Program (GMAP)

    International Nuclear Information System (INIS)

    Finck, Martha R.

    2011-01-01

    This program provides practical training to DHS graduate fellows in the DOE laboratory complex. It involves coordinating students, their thesis advisors, and their laboratory project mentors in establishing a meaningful program of research which contributes to the graduate student's formation as a member of the nuclear forensics community. The summary report details the student/mentor experience and future plans after the first summer practicum. This program provides practical training to DHS graduate fellows in the DOE laboratory complex. It involves coordinating students, their thesis advisors, and their laboratory project mentors in establishing a meaningful program of research which contributes to the graduate student's formation as a member of the nuclear forensics community. This final written report includes information concerning the overall mentoring experience, including benefits (to the lab, the mentors, and the students), challenges, student research contributions, and lab mentor interactions with students home universities. Idaho National Laboratory hosted two DHS Nuclear Forensics graduate Fellows (nuclear engineering) in summer 2011. Two more Fellows (radiochemistry) are expected to conduct research at the INL under this program starting in 2012. An undergraduate Fellow (nuclear engineering) who worked in summer 2011 at the laboratory is keenly interested in applying for the NF Graduate Fellowship this winter with the aim of returning to INL. In summary, this program appears to have great potential for success in supporting graduate level students who pursue careers in nuclear forensics. This relatively specialized field may not have been an obvious choice for some who have already shown talent in the traditional areas of chemistry or nuclear engineering. The active recruiting for this scholarship program for candidates at universities across the U.S. brings needed visibility to this field. Not only does this program offer critical practical training

  1. American Academy of Forensic Sciences

    Science.gov (United States)

    ... Programs Courses in Forensic Odontology Choosing a Career What is Forensic Science? What Do Forensic Scientists Do? What’s a Forensic Scientist? ... ve Decided You Want a Career in Forensic Science … Now What? Young Forensic Scientists Forum (YFSF) Annual Meeting Events ...

  2. An interactive program on digitizing historical seismograms

    Science.gov (United States)

    Xu, Yihe; Xu, Tao

    2014-02-01

    Retrieving information from analog seismograms is of great importance since they are considered as the unique sources that provide quantitative information of historical earthquakes. We present an algorithm for automatic digitization of the seismograms as an inversion problem that forms an interactive program using Matlab® GUI. The program integrates automatic digitization with manual digitization and users can easily switch between the two modalities and carry out different combinations for the optimal results. Several examples about applying the interactive program are given to illustrate the merits of the method.

  3. Limitaciones de las actuales herramientas de análisis digital forense para dispositivos móviles

    OpenAIRE

    Amsler, G. A.; Casco, María Eugenia; Roatta, Santiago

    2017-01-01

    Este informe describe la resolución de un problema de ingeniería de la asignatura Seguridad Informática de la Carrera de Ingeniería en Sistemas de la Universidad Abierta Interamericana. El objetivo del trabajo fue realizar una comparación cualitativa y cuantitativa de diferentes herramientas de adquisición de evidencia digital en dispositivos móviles. Las tareas se desarrollaron en el marco de una pasantía de un año realizada en el Laboratorio de Análisis Digital Forense de la Policía de Inve...

  4. Soldier Flexible Personal Digital Assistant Program

    National Research Council Canada - National Science Library

    Price, Mark; Woytowich, Jason; Carlson, Marc

    2008-01-01

    The main goal of the Soldier Flexible Personal Digital Assistant Program was to develop prototypes of a novel flexible display technology device for demonstration in a laboratory setting and use in Future Force Warrior (FFW) demonstrations...

  5. PENGEMBANGAN PROGRAM PENGOLAHAN CITRA UNTUK RADIOGRAFI DIGITAL

    Directory of Open Access Journals (Sweden)

    EC Nugroho

    2012-09-01

    Full Text Available Telah dikembangkan sebuah program pengolahan citra untuk radiografi digital yang disusun menggunakan perangkat lunak Borland C++ Builder 4 Professional. Untuk melakukan pengolahan terhadap citra radiografi digital,dengan pengolahan terhadap pixel-pixel dari citra. Teknik pengolahan citra, meliputi pengaturan kecerahan citra (image brightness, kontras citra (image contras, pelembutan citra (image smoothing, penajaman citra (image sharpening, deteksi tepi (edge detection, citra negatif (negative image, dan histogram. Hasil pengolahan citra dihasilkan citra radiografi digital yang mudah  diinterprestasi  lebih  teliti  oleh  pengamat.  Tujuan penelitian ini adalah mendesain perangkat lunak pengolahan citra radiografi digital. Perangkat yang telah disusun kemudian digunakan untuk melakukan pengolahan terhadap citra radiografi digital. Hasil penelitian menunjukkan adanya peningkatan kualitas citra radiografi digital, sehingga dapat membantu seorang radiographer dalam mendiagnosa atau menginterprestasikan citra radiografi digital lebih teliti. Citra radiografi awal dan citra hasilnya dapat dilihat pada layar monitor sehingga  kualitas  pengolahan  dapat dibandingkan secara langsung. The image processing program has been developed for digital radiography that is designed by using software Borland C++ Builder 4 Professional to process the radiography digital image with image pixels processing. Image processing technique consists of image brightness, image contrast, image smoothing, image sharpening, edge detection, and negative image and histogram. From the result of image processing it produced radiography image that is easier to interpret by the observer. The purpose of this research is to design the software of image processing for digital radiography. Then the software is used as the image processor for digital radiography. The result shows that there is a quality improvement of digital radiography image, so it can help

  6. Multimedia Forensics Is Not Computer Forensics

    Science.gov (United States)

    Böhme, Rainer; Freiling, Felix C.; Gloe, Thomas; Kirchner, Matthias

    The recent popularity of research on topics of multimedia forensics justifies reflections on the definition of the field. This paper devises an ontology that structures forensic disciplines by their primary domain of evidence. In this sense, both multimedia forensics and computer forensics belong to the class of digital forensics, but they differ notably in the underlying observer model that defines the forensic investigator’s view on (parts of) reality, which itself is not fully cognizable. Important consequences on the reliability of probative facts emerge with regard to available counter-forensic techniques: while perfect concealment of traces is possible for computer forensics, this level of certainty cannot be expected for manipulations of sensor data. We cite concrete examples and refer to established techniques to support our arguments.

  7. From Computer Forensics to Forensic Computing: Investigators Investigate, Scientists Associate

    OpenAIRE

    Dewald, Andreas; Freiling, Felix C.

    2014-01-01

    This paper draws a comparison of fundamental theories in traditional forensic science and the state of the art in current computer forensics, thereby identifying a certain disproportion between the perception of central aspects in common theory and the digital forensics reality. We propose a separation of what is currently demanded of practitioners in digital forensics into a rigorous scientific part on the one hand, and a more general methodology of searching and seizing digital evidence an...

  8. Clinical coaching in forensic psychiatry: an innovative program to recruit and retain nurses.

    Science.gov (United States)

    Thorpe, Gail; Moorhouse, Pamela; Antonello, Carolyn

    2009-05-01

    Ontario is currently experiencing a nursing shortage crisis. Recruitment and retention of nursing staff are critical issues. In response, retention strategies have been developed by the Ontario Ministry of Health and Long-Term Care. The Late Career Nurse Initiative is one such strategy. This innovative program encourages nurses age 55 and older to remain in the workforce by providing opportunities to use their nursing experience in less physically demanding alternate roles for a portion of their time. The Royal Ottawa Health Care Group has developed a clinical coach program in forensics that matches these veteran nurses with new graduates or nurses new to forensic psychiatric nursing. The program has resulted in retention rates of more than 91% after 1 year. This article provides background about the program and highlights its outcomes.

  9. Liforac - A Model For Live Forensic Acquisition

    CSIR Research Space (South Africa)

    Grobler, MM

    2009-10-01

    Full Text Available ways in which such an acquisition should take place to ensure forensic soundness. The study presents information on a relatively new field of expertise and considers the Digital Forensic discipline, forensic tools, practical problems experienced during...

  10. Digital forensic technologies as e-fraud risk mitigation tools in the banking industry: Evidence from Zimbabwe

    Directory of Open Access Journals (Sweden)

    Shewangu Dzomira

    2014-07-01

    Full Text Available The paper investigates digital analytical tools and technologies used in electronic fraud prevention and detection, used in the banking industry. The paper is based on a descriptive study which studied digital forensics and cyber fraud phenomenon using content analysis. To obtain the data questionnaires and interviews were administered to the selected informants from 22 banks. Convenience and judgemental sampling techniques were used. It was found out that fraud detection and prevention tools and technologies would be most effective way of combating e-fraud if they can be utilized. It is concluded that banking institutions should reshape their anti-fraud strategies to be effective by considering fraud detection efforts using advanced analytics and related tools, software and application to get more efficient oversight

  11. Book Review: Placing the Suspect behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects

    Directory of Open Access Journals (Sweden)

    Thomas Nash

    2013-06-01

    Full Text Available Shavers, B. (2013. Placing the Suspect behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects. Waltham, MA: Elsevier, 290 pages, ISBN-978-1-59749-985-9, US$51.56. Includes bibliographical references and index.Reviewed by Detective Corporal Thomas Nash (tnash@bpdvt.org, Burlington Vermont Police Department, Internet Crime against Children Task Force. Adjunct Instructor, Champlain College, Burlington VT.In this must read for any aspiring novice cybercrime investigator as well as the seasoned professional computer guru alike, Brett Shaver takes the reader into the ever changing and dynamic world of Cybercrime investigation.  Shaver, an experienced criminal investigator, lays out the details and intricacies of a computer related crime investigation in a clear and concise manner in his new easy to read publication, Placing the Suspect behind the Keyboard. Using Digital Forensics and Investigative techniques to Identify Cybercrime Suspects. Shaver takes the reader from start to finish through each step of the investigative process in well organized and easy to follow sections, with real case file examples to reach the ultimate goal of any investigation: identifying the suspect and proving their guilt in the crime. Do not be fooled by the title. This excellent, easily accessible reference is beneficial to both criminal as well as civil investigations and should be in every investigator’s library regardless of their respective criminal or civil investigative responsibilities.(see PDF for full review

  12. Digital Competition Game to Improve Programming Skills

    Science.gov (United States)

    Moreno, Julian

    2012-01-01

    The aim of this paper is to describe a digital game with an educational purpose in the subject of computer programming, which enables students to reinforce and improve their abilities on the concepts of sequencing, defined iteration and nesting. For its design, a problem solving approach was followed and a score comparing mechanism was implemented…

  13. Isolation and genetic analysis of pure cells from forensic biological mixtures: The precision of a digital approach.

    Science.gov (United States)

    Fontana, F; Rapone, C; Bregola, G; Aversa, R; de Meo, A; Signorini, G; Sergio, M; Ferrarini, A; Lanzellotto, R; Medoro, G; Giorgini, G; Manaresi, N; Berti, A

    2017-07-01

    Latest genotyping technologies allow to achieve a reliable genetic profile for the offender identification even from extremely minute biological evidence. The ultimate challenge occurs when genetic profiles need to be retrieved from a mixture, which is composed of biological material from two or more individuals. In this case, DNA profiling will often result in a complex genetic profile, which is then subject matter for statistical analysis. In principle, when more individuals contribute to a mixture with different biological fluids, their single genetic profiles can be obtained by separating the distinct cell types (e.g. epithelial cells, blood cells, sperm), prior to genotyping. Different approaches have been investigated for this purpose, such as fluorescent-activated cell sorting (FACS) or laser capture microdissection (LCM), but currently none of these methods can guarantee the complete separation of different type of cells present in a mixture. In other fields of application, such as oncology, DEPArray™ technology, an image-based, microfluidic digital sorter, has been widely proven to enable the separation of pure cells, with single-cell precision. This study investigates the applicability of DEPArray™ technology to forensic samples analysis, focusing on the resolution of the forensic mixture problem. For the first time, we report here the development of an application-specific DEPArray™ workflow enabling the detection and recovery of pure homogeneous cell pools from simulated blood/saliva and semen/saliva mixtures, providing full genetic match with genetic profiles of corresponding donors. In addition, we assess the performance of standard forensic methods for DNA quantitation and genotyping on low-count, DEPArray™-isolated cells, showing that pure, almost complete profiles can be obtained from as few as ten haploid cells. Finally, we explore the applicability in real casework samples, demonstrating that the described approach provides complete

  14. Plethora of Cyber Forensics

    OpenAIRE

    N.Sridhar; Dr.D.Lalitha Bhaskari; Dr.P.S.Avadhani

    2011-01-01

    As threats against digital assets have risen and there is necessitate exposing and eliminating hidden risks and threats. The ability of exposing is called “cyber forensics.” Cyber Penetrators have adopted more sophistical tools and tactics that endanger the operations of the global phenomena. These attackers are also using anti-forensic techniques to hide evidence of a cyber crime. Cyber forensics tools must increase its toughness and counteract these advanced persistent threats. This paper f...

  15. Video gaming and sexual violence: rethinking forensic nursing in a digital age.

    Science.gov (United States)

    Mercer, Dave; Parkinson, Denis

    2014-01-01

    This article reports findings from a qualitative study into how forensic nurses, and male personality disordered sexual offenders, talked about "pornography" in one U.K. high-security hospital. Research rationale was rooted in current professional and political debates, adopting a discourse analytic design to situate the project in a clinical context. Semistructured interviews, as co-constructed accounts, explored talk about sexual media, offending, treatment, and risk. Data were analyzed using a version of discourse analysis popular in healthcare research, identifying discursive repertoires, or collective language use, characteristic of the institutional culture. Findings revealed that masculine discourse marginalized female nurses and contradicted therapeutic goals, where men's talk about pornography, sex, and sexual crime represented discriminatory and gendered language. Nursing definitions of pornography were constructed in the context of the client group and an organizational need to manage risk. In a highly controlled environment, with a long-stay population, priority in respondent talk was given to mainstream commercial sexual media and everyday items/images perceived to have embedded sexual meaning. However, little mention was made of contemporary modes of producing/distributing pornography, where sex and sexual violence are enacted in virtual realities of cyberspace. Failure to engage with information technology, and globally mediated sex, is discussed as a growing concern for forensic health workers.

  16. The FAA's postmortem forensic toxicology self-evaluated proficiency test program: the second seven years.

    Science.gov (United States)

    Chaturvedi, Arvind K; Craft, Kristi J; Cardona, Patrick S; Rogers, Paul B; Canfield, Dennis V

    2009-05-01

    During toxicological evaluations of samples from fatally injured pilots involved in civil aviation accidents, a high degree of quality control/quality assurance (QC/QA) is maintained. Under this philosophy, the Federal Aviation Administration (FAA) started a forensic toxicology proficiency-testing (PT) program in July 1991. In continuation of the first seven years of the PT findings reported earlier, PT findings of the next seven years are summarized herein. Twenty-eight survey samples (12 urine, 9 blood, and 7 tissue homogenate) with/without alcohols/volatiles, drugs, and/or putrefactive amine(s) were submitted to an average of 31 laboratories, of which an average of 25 participants returned their results. Analytes in survey samples were correctly identified and quantitated by a large number of participants, but some false positives of concern were reported. It is anticipated that the FAA's PT program will continue to serve the forensic toxicology community through this important part of the QC/QA for laboratory accreditations.

  17. Clustering Spam Domains and Destination Websites: Digital Forensics with Data Mining

    Directory of Open Access Journals (Sweden)

    Chun Wei

    2010-03-01

    Full Text Available Spam related cyber crimes have become a serious threat to society. Current spam research mainly aims to detect spam more effectively. We believe the prosecution of spammers is a more effective way of stopping spam emails than filtering, therefore more research is needed to help forensic investigators to collect useful evidence. This research proposes an algorithm for clustering spam domains extracted from spam emails based on the hosting IP addresses and tracing the domains over a period of time. The results reveal several facts that merit law enforcement attention: many seemingly unrelated spam campaigns are actually related; spammers have a sophisticated mechanism for combating URL blacklisting by registering many new domain names every day and flushing out old domains; the domains are hosted at different IP addresses across several networks, mostly in China where legislation is not as tight as in US; old IP addresses are replaced by new ones from time to time, but still show strong correlation among them. These facts lead to the conclusion that spam-related cyber crimes are operated by well-organized criminal syndicates that have sufficient manpower to distribute a huge volume of spam through bots, purchase a large number of domain names and hosting servers and maintain websites to sell counterfeit products online. Traditional law enforcements technology has not scaled well in cases involving millions of data elements. This paper demonstrates an effective use of data mining to respond to this challenge.

  18. Copy-Move Forgery Detection Technique for Forensic Analysis in Digital Images

    Directory of Open Access Journals (Sweden)

    Toqeer Mahmood

    2016-01-01

    Full Text Available Due to the powerful image editing tools images are open to several manipulations; therefore, their authenticity is becoming questionable especially when images have influential power, for example, in a court of law, news reports, and insurance claims. Image forensic techniques determine the integrity of images by applying various high-tech mechanisms developed in the literature. In this paper, the images are analyzed for a particular type of forgery where a region of an image is copied and pasted onto the same image to create a duplication or to conceal some existing objects. To detect the copy-move forgery attack, images are first divided into overlapping square blocks and DCT components are adopted as the block representations. Due to the high dimensional nature of the feature space, Gaussian RBF kernel PCA is applied to achieve the reduced dimensional feature vector representation that also improved the efficiency during the feature matching. Extensive experiments are performed to evaluate the proposed method in comparison to state of the art. The experimental results reveal that the proposed technique precisely determines the copy-move forgery even when the images are contaminated with blurring, noise, and compression and can effectively detect multiple copy-move forgeries. Hence, the proposed technique provides a computationally efficient and reliable way of copy-move forgery detection that increases the credibility of images in evidence centered applications.

  19. GetData Digitizing Program Code: Description, Testing, Training

    International Nuclear Information System (INIS)

    Taova, S.

    2013-01-01

    90 percents of compilation in our center is obtained by data digitizing. So we are rather interested in the development of different techniques of data digitizing. Plots containing a great amount of points and solid lines are most complicated for digitizing. From our point of view including to the Exfor-Digitizer procedures of automatic or semi-automatic digitizing will allow to simplify significantly this process. We managed to test some free available program codes. Program GETDATA Graph Digitizer (www.getdata- graph-digitizer.com) looks more suitable for our purposes. GetData Graph Digitizer is a program for digitizing graphs, plots and maps. Main features of GetData Graph Digitizer are: - supported graphics formats are TIFF, JPEG, BMP and PCX; - two algorithms for automatic digitizing; - convenient manual digitizing; - reorder tool for easy points reordering; - save/open workspace, which allows to save the work and return to it later; - obtained data can be exported to the clipboard; - export to the formats: TXT (text file), XLS (MS Excel), XML, DXF (AutoCAD) and EPS (PostScript). GetData Graph Digitizer includes two algorithms for automatic digitizing. Auto trace lines: This method is designed to digitize solid lines. Choose the starting point, and the program will trace the line, stopping at it's end. To trace the line use Operations =>Auto trace lines menu or context menu ('Auto trace lines' item). To choose starting point click left mouse button, or click right mouse button to additionally choose direction for line tracing. Digitize area: The second way is to set digitizing area. This method works for any type of lines, including dashed lines. Data points are set at the intersection of grid with the line. You can choose the type of grid (X grid or Y grid), and set the distance between grid lines. You can also make the grid be shifted in such a way, that it will pass through a specific X (or Y) value. To digitize area use Operations →Digitize area menu

  20. Digit ratio (2D:4D – A forensic marker for sexual dimorphism in North Indian population

    Directory of Open Access Journals (Sweden)

    Sangeeta Dey

    2016-12-01

    Conclusion: This research study proves beneficial for identity authentication, for criminal investigation and a powerful forensic tool for medico – legal cases. This will help in the advancement of technology which will prove beneficial for the welfare of indigenous population of India. Also the data so collected can be useful as forensic anthropology population data.

  1. DNA Commission of the International Society for Forensic Genetics: Recommendations on the validation of software programs performing biostatistical calculations for forensic genetics applications.

    Science.gov (United States)

    Coble, M D; Buckleton, J; Butler, J M; Egeland, T; Fimmers, R; Gill, P; Gusmão, L; Guttman, B; Krawczak, M; Morling, N; Parson, W; Pinto, N; Schneider, P M; Sherry, S T; Willuweit, S; Prinz, M

    2016-11-01

    The use of biostatistical software programs to assist in data interpretation and calculate likelihood ratios is essential to forensic geneticists and part of the daily case work flow for both kinship and DNA identification laboratories. Previous recommendations issued by the DNA Commission of the International Society for Forensic Genetics (ISFG) covered the application of bio-statistical evaluations for STR typing results in identification and kinship cases, and this is now being expanded to provide best practices regarding validation and verification of the software required for these calculations. With larger multiplexes, more complex mixtures, and increasing requests for extended family testing, laboratories are relying more than ever on specific software solutions and sufficient validation, training and extensive documentation are of upmost importance. Here, we present recommendations for the minimum requirements to validate bio-statistical software to be used in forensic genetics. We distinguish between developmental validation and the responsibilities of the software developer or provider, and the internal validation studies to be performed by the end user. Recommendations for the software provider address, for example, the documentation of the underlying models used by the software, validation data expectations, version control, implementation and training support, as well as continuity and user notifications. For the internal validations the recommendations include: creating a validation plan, requirements for the range of samples to be tested, Standard Operating Procedure development, and internal laboratory training and education. To ensure that all laboratories have access to a wide range of samples for validation and training purposes the ISFG DNA commission encourages collaborative studies and public repositories of STR typing results. Published by Elsevier Ireland Ltd.

  2. Cyber Science, Biometrics and Digital Forensics: Workshop on Emerging Cyber Techniques and Technologies

    Science.gov (United States)

    2016-09-07

    University of Florida 12:00 pm Lunch and Networking 12:30 pm Quantifying Information Leakage Dr. Geoff Smith SCIS, Florida International...for three large research programs; The Western Hemisphere Information Exchange Program - conducting renewable energy, water purification and...in areas such as force protection, maritime detection and monitoring, unmanned aerial systems, information technology, crisis management for

  3. Forensic Science.

    Science.gov (United States)

    Brettell, T. A.; Saferstein, R.

    1989-01-01

    Presents a review of articles appealing to forensic practitioners. Topics include: drugs and poisons, forensic biochemistry, and trace evidence. Lists noteworthy books published on forensic science topics since 1986. (MVL)

  4. [The problems of professional competence in the complementary professional forensic medical expertise programs of advanced training and professional requalification].

    Science.gov (United States)

    Shadymov, A B; Fominykh, S A; Dik, V P

    This article reports the results of the analysis of the new tendencies and normatives of the working legislation in the field of additional professional education in the speciality of «forensic medical expertise» and the application of the competency-based approach to the training of specialists in the framework of professional requalification and advanced training programs. Special attention is given to the problems of organization of the educational process and the elaboration of additional training programs based on the competency approach to the training of specialists at the Department of Forensic Medicine and Law with the professor V.N. Kryukov Course of Advanced Professional Training and Professional Requalification of Specialists at the state budgetary educational Institution of higher professional education «Altai State Medical University», Russian Ministry of Health. The study revealed the problems pertaining to the development of professional competencies in the framework of educational programs for the professional requalification and advanced training in the speciality «forensic medical expertise». The authors propose the legally substantiated approaches to the solution of these problems.

  5. Recovery and identification of human remains in post-conflict environments: A comparative study of the humanitarian forensic programs in Cyprus and Kosovo.

    Science.gov (United States)

    Mikellide, Maria

    2017-10-01

    This study follows the humanitarian forensic programs in Cyprus and Kosovo over a ten-year period with an emphasis on the role of local capacity building. It begins by providing an in-depth historical account of forensic activities, followed by a comparison of the rate of excavations, exhumations and identifications. Through this analysis, a repeated pattern emerges whereby forensic activities in Kosovo start with a surge in values, which drop drastically in the first few years of operations, followed by a steadily declining productivity curve. By contrast, in Cyprus, activities begin modestly, with lower values allowing for some modest growth. Close observation of the two programs provides indications as to the factors that may influence the development of forensic programs as well as the elements that need to be set in place to create an environment conducive to greater sustainability through local ownership and responsibility. Copyright © 2017 Elsevier B.V. All rights reserved.

  6. Column: File Cabinet Forensics

    Directory of Open Access Journals (Sweden)

    Simson Garfinkel

    2011-12-01

    Full Text Available Researchers can spend their time reverse engineering, performing reverse analysis, or making substantive contributions to digital forensics science. Although work in all of these areas is important, it is the scientific breakthroughs that are the most critical for addressing the challenges that we face.Reverse Engineering is the traditional bread-and-butter of digital forensics research. Companies like Microsoft and Apple deliver computational artifacts (operating systems, applications and phones to the commercial market. These artifacts are bought and used by billions. Some have evil intent, and (if society is lucky, the computers end up in the hands of law enforcement. Unfortunately the original vendors rarely provide digital forensics tools that make their systems amenable to analysis by law enforcement. Hence the need for reverse engineering.(see PDF for full column

  7. The Relevant Skills for Forensic Accountants – Can the Romanian Accounting Education Programs offer them?

    Directory of Open Access Journals (Sweden)

    Bobițan Nicolae

    2017-01-01

    Full Text Available In Romania for becoming a forensic accountant it is necessary, as preliminary conditions, first,to have a bachelor`s degree in accounting or finance, and second, to attain a certification, aschartered accountant, given by the professional body, CECCAR, and after that, as forensicaccountant. The purpose of this study is to investigate whether the Romanian academic educationand the professional education can assure all the relevant skills for a forensic accountant. In orderto achieve the objective, first, the authors investigated the most important studies which have thepurpose to identify the relevant skills for a forensic accountant. Second, the authors reviewed thecurriculum of the most important faculties with the aim to find and connect different courses withdifferent skills. The purpose was to determine how the forensic accounting education, offered to theprofessional accountants, assures them, all the relevant skills that are necessary in the profession.

  8. The U.S. national nuclear forensics library, nuclear materials information program, and data dictionary

    International Nuclear Information System (INIS)

    Lamont, Stephen Philip; Brisson, Marcia; Curry, Michael

    2011-01-01

    Nuclear forensics assessments to determine material process history requires careful comparison of sample data to both measured and modeled nuclear material characteristics. Developing centralized databases, or nuclear forensics libraries, to house this information is an important step to ensure all relevant data will be available for comparison during a nuclear forensics analysis and help expedite the assessment of material history. The approach most widely accepted by the international community at this time is the implementation of National Nuclear Forensics libraries, which would be developed and maintained by individual nations. This is an attractive alternative toan international database since it provides an understanding that each country has data on materials produced and stored within their borders, but eliminates the need to reveal any proprietary or sensitive information to other nations. To support the concept of National Nuclear Forensics libraries, the United States Department of Energy has developed a model library, based on a data dictionary, or set of parameters designed to capture all nuclear forensic relevant information about a nuclear material. Specifically, information includes material identification, collection background and current location, analytical laboratories where measurements were made, material packaging and container descriptions, physical characteristics including mass and dimensions, chemical and isotopic characteristics, particle morphology or metallurgical properties, process history including facilities, and measurement quality assurance information. While not necessarily required, it may also be valuable to store modeled data sets including reactor burn-up or enrichment cascade data for comparison. It is fully expected that only a subset of this information is available or relevant to many materials, and much of the data populating a National Nuclear Forensics library would be process analytical or material accountability

  9. A computer program for planimetric analysis of digitized images

    DEFF Research Database (Denmark)

    Lynnerup, N; Lynnerup, O; Homøe, P

    1992-01-01

    bones as seen on X-rays. By placing the X-rays on a digitizer tablet and tracing the outline of the cell system, the area was calculated by the program. The calculated data and traced images could be stored and printed. The program is written in BASIC; necessary hardware is an IBM-compatible personal...

  10. The evaluation of a digital information literacy program

    Directory of Open Access Journals (Sweden)

    Anne Sieberhagen

    2012-10-01

    Full Text Available The article reports on the evaluation of a digital information literacy program (DILP to determine the program’s effectiveness in enhancing students’ digital information literacy skills. The DILP was originally designed and developed for the South African student, as member of Generation Y, but was adapted after identifying the demographics and characteristics of Generation Z.  This information was incorporated in the existing DILP, therefore making the DILP applicable to and useful for both Generations Y and Z. New learning technologies were identified and incorporated in the DILP to enhance students’ learning experience. An analysis of reported research indicated that there is a lack in the evaluation of programs to determine their effectiveness in enhancing the digital information literacy skills of students by using an outcomes assessment instrument. The development of an outcomes assessment instrument, which is based on internationally benchmarked information literacy competency standards and their outcomes, are presented. Evidence is provided of the effectiveness of the program in order to prove its worth as an instructional program.  Recommendations are made on how digital information literacy programs may be improved to be more effective in enhancing students’ digital information literacy skills

  11. Methodology of Implementation of Computer Forensics

    OpenAIRE

    Gelev, Saso; Golubovski, Roman; Hristov, Risto; Nikolov, Elenior

    2013-01-01

    Compared to other sciences, computer forensics (digital forensics) is a relatively young discipline. It was established in 1999 and it has been an irreplaceable tool in sanctioning cybercrime ever since. Good knowledge of computer forensics can be really helpful in uncovering a committed crime. Not adhering to the methodology of computer forensics, however, makes the obtained evidence invalid/irrelevant and as such it cannot be used in legal proceedings. This paper is to explain the methodolo...

  12. Comparison of In-Person vs. Digital Climate Education Program

    Science.gov (United States)

    Anderson, R. K.; Flora, J. A.; Saphir, M.

    2017-12-01

    In 2014, ACE (Alliance for Climate Education) evaluated the impact of its 45-minute live climate edutainment education program on the knowledge, attitudes and behavior of high school students with respect to climate change. The results showed gains in knowledge, increased engagement, as well as increased communication about climate change with number of students reporting talking about climate change with friends and family more than doubling. In 2016, ACE launched a digital version of its in-person edutainment education program, a 40-minute video version of the live program. This digital version, Our Climate Our Future (OCOF), has now been used by nearly 4,000 teachers nationwide and viewed by over 150,000 students. We experimentally tested the impact of the digital program (OCOF) compared to the live program and a control group. The experiment was conducted with 709 students in 27 classes at two North Carolina public high schools. Classes were assigned to one of three conditions: digital, live and control. In the digital version, students watched the 40-minute OCOF video featuring the same educator that presented the live program. In the live version, students received an identical 40-minute live presentation by an ACE staff educator The control group received neither treatment. When compared to controls, both programs were effective in positively increasing climate change knowledge, climate justice knowledge, perceived self-efficacy to make climate-friendly behavior changes, and beliefs about climate change (all statistically significant at or above P<.01). In the areas of hope that people can solve climate change and intent to change behavior, only the live program showed significant increases. In these two areas, it may be that an in-person experience is key to affecting change. In light of these positive results, ACE plans to increase the use of OCOF in schools across the country to assist teachers in their efforts to teach about climate change.

  13. Designing an effective microbial forensics program for law enforcement and national security purposes.

    Science.gov (United States)

    Murch, Randall S

    2014-06-01

    Forensic capabilities that provide lead information, and investigative, intelligence, prosecution and policy decision support can be invaluable for responding to and resolving bioterrorism events. Attributing biological attacks through scientific and other resources and processes is an important goal, for which science can be instrumental. Some even believe that having effective microbial forensics capabilities along with others can even deter adversaries from using biological weapons. For those nations that do not have such or wish to integrate or upgrade capabilities, thoughtful analysis and consideration of certain design principles will increase the likelihood that success will be attained.

  14. Forensic odontology.

    Science.gov (United States)

    Shamim, Thorakkal

    2012-04-01

    Forensic odontology is a specialized field of dentistry which analyses dental evidence in the interest of justice. Forensic odontology embraces all dental specialities and it is almost impossible to segregate this branch from other dental specialities. This review aims to discuss the utility of various dental specialities with forensic odontology.

  15. Digital Badges and Library Instructional Programs: Academic Library Case Study

    Science.gov (United States)

    Rodgers, Andrea Reed; Puterbaugh, Mark

    2017-01-01

    This case study describes the planning, implementation, and migration process of Eastern University Library's information literacy digital badge. Prior to implementing a badging program, information literacy sessions were informally embedded in first-year college writing courses as a "one-shot" presentation. Spurred on by accreditation…

  16. Forensic Chemistry

    Science.gov (United States)

    Bell, Suzanne

    2009-07-01

    Forensic chemistry is unique among chemical sciences in that its research, practice, and presentation must meet the needs of both the scientific and the legal communities. As such, forensic chemistry research is applied and derivative by nature and design, and it emphasizes metrology (the science of measurement) and validation. Forensic chemistry has moved away from its analytical roots and is incorporating a broader spectrum of chemical sciences. Existing forensic practices are being revisited as the purview of forensic chemistry extends outward from drug analysis and toxicology into such diverse areas as combustion chemistry, materials science, and pattern evidence.

  17. What Makes the Digital "Special"? The Research Program in Digital Collections at the National Library of Wales

    Science.gov (United States)

    Cusworth, Andrew; Hughes, Lorna M.; James, Rhian; Roberts, Owain; Roderick, Gareth Lloyd

    2015-01-01

    This article introduces some of the digital projects currently in development at the National Library of Wales as part of its Research Program in Digital Collections. These projects include the digital representation of the Library's Kyffin Willams art collection, musical collections, and probate collection, and of materials collected by the…

  18. Light Water Reactor Sustainability Program. Digital Architecture Requirements

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Kenneth [Idaho National Lab. (INL), Idaho Falls, ID (United States); Oxstrand, Johanna [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2015-03-01

    The Digital Architecture effort is a part of the Department of Energy (DOE) sponsored Light-Water Reactor Sustainability (LWRS) Program conducted at Idaho National Laboratory (INL). The LWRS program is performed in close collaboration with industry research and development (R&D) programs that provides the technical foundations for licensing and managing the long-term, safe, and economical operation of current nuclear power plants (NPPs). One of the primary missions of the LWRS program is to help the U.S. nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Therefore, a major objective of the LWRS program is the development of a seamless digital environment for plant operations and support by integrating information from plant systems with plant processes for nuclear workers through an array of interconnected technologies. In order to get the most benefits of the advanced technology suggested by the different research activities in the LWRS program, the nuclear utilities need a digital architecture in place to support the technology. A digital architecture can be defined as a collection of information technology (IT) capabilities needed to support and integrate a wide-spectrum of real-time digital capabilities for nuclear power plant performance improvements. It is not hard to imagine that many processes within the plant can be largely improved from both a system and human performance perspective by utilizing a plant wide (or near plant wide) wireless network. For example, a plant wide wireless network allows for real time plant status information to easily be accessed in the control room, field workers’ computer-based procedures can be updated based on the real time plant status, and status on ongoing procedures can be incorporated into smart schedules in the outage command center to allow for more accurate planning of critical tasks. The goal

  19. Author Guidelines: The Arab Journal of Forensic Sciences and Forensic Medicine (AJFSFM

    Directory of Open Access Journals (Sweden)

    Arab Journal of Forensic Sciences & Forensic Medicine

    2017-06-01

    Full Text Available The Arab Journal of Forensic Sciences and Forensic Medicine (AJFSFM is a peer-reviewed, open access (CC BY-NC, international journal for publishing original contributions in various fields of forensic science. These fields include, but are not limited to forensic pathology and histochemistry, toxicology(drugs, alcohol, etc., forensic biology (serology, human DNA profiling, entomology, population genetics, forensic chemistry(inks, paints, dyes, explosives, fire accelerants, psychiatry and hypnotics, forensic anthropology and archeology, forensic odontology, fingerprints and impressions, firearms and tool marks, white collar crimes (counterfeit and forgery; questioned documents, digital forensics; cyber-crimes, criminal justice and crime scene investigation, as well as many other disciplines where science and medicine interact with the law.

  20. Nuclear Forensics at Los Alamos National Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Kinman, William Scott [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Steiner, Robert Ernest [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Lamont, Stephen Philip [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-09-30

    Nuclear forensics assists in responding to any event where nuclear material is found outside of regulatory control; a response plan is presented and a nuclear forensics program is undergoing further development so that smugglers are sufficiently deterred.

  1. System Support for Forensic Inference

    Science.gov (United States)

    Gehani, Ashish; Kirchner, Florent; Shankar, Natarajan

    Digital evidence is playing an increasingly important role in prosecuting crimes. The reasons are manifold: financially lucrative targets are now connected online, systems are so complex that vulnerabilities abound and strong digital identities are being adopted, making audit trails more useful. If the discoveries of forensic analysts are to hold up to scrutiny in court, they must meet the standard for scientific evidence. Software systems are currently developed without consideration of this fact. This paper argues for the development of a formal framework for constructing “digital artifacts” that can serve as proxies for physical evidence; a system so imbued would facilitate sound digital forensic inference. A case study involving a filesystem augmentation that provides transparent support for forensic inference is described.

  2. An introduction to computer forensics.

    Science.gov (United States)

    Furneaux, Nick

    2006-07-01

    This paper provides an introduction to the discipline of Computer Forensics. With computers being involved in an increasing number, and type, of crimes the trace data left on electronic media can play a vital part in the legal process. To ensure acceptance by the courts, accepted processes and procedures have to be adopted and demonstrated which are not dissimilar to the issues surrounding traditional forensic investigations. This paper provides a straightforward overview of the three steps involved in the examination of digital media: Acquisition of data. Investigation of evidence. Reporting and presentation of evidence. Although many of the traditional readers of Medicine, Science and the Law are those involved in the biological aspects of forensics, I believe that both disciplines can learn from each other, with electronic evidence being more readily sought and considered by the legal community and the long, tried and tested scientific methods of the forensic community being shared and adopted by the computer forensic world.

  3. Gamma spectra pictures using a digital plotter. Program MONO

    International Nuclear Information System (INIS)

    Los Arcos Merino, J.M.

    1978-01-01

    The program MONO has been written for a CALCOMP-936 digital plotter operating off- -line with a UMI VAC 1106 computer, to obtain graphic representations of single gamma spectra stored on magnetic tape. It allows to plot the whole spectrum or only a part, as well as to draw a given spectrum on the same or different picture than the previous one. Ten representation scales are available and at up nine comment lines can be written in a graphic. (Author) 4 refs

  4. La informática forense y sus analogías: la balística digital

    OpenAIRE

    Constanzo, Bruno; Cistoldi, Pablo; Iturriaga, Juan Ignacio; Di Iorio, Ana

    2016-01-01

    Con el progreso de las tecnologías de la información sobre múltiples aspectos de la vida diaria, se hace cada vez más común la presencia de evidencia digital en las investigaciones judiciales. La evidencia, en cuanto contenedor físico de datos con valor investigativo, presenta distintos grados de complejidad, y la evidencia digital es un exponente excepcional en este aspecto. Algunas preguntas poco frecuentes en cuanto a la...

  5. Forensic examination of ink by high-performance thin layer chromatography--the United States Secret Service Digital Ink Library.

    Science.gov (United States)

    Neumann, Cedric; Ramotowski, Robert; Genessay, Thibault

    2011-05-13

    Forensic examinations of ink have been performed since the beginning of the 20th century. Since the 1960s, the International Ink Library, maintained by the United States Secret Service, has supported those analyses. Until 2009, the search and identification of inks were essentially performed manually. This paper describes the results of a project designed to improve ink samples' analytical and search processes. The project focused on the development of improved standardization procedures to ensure the best possible reproducibility between analyses run on different HPTLC plates. The successful implementation of this new calibration method enabled the development of mathematical algorithms and of a software package to complement the existing ink library. Copyright © 2010 Elsevier B.V. All rights reserved.

  6. On the added value of forensic science and grand innovation challenges for the forensic community.

    Science.gov (United States)

    van Asten, Arian C

    2014-03-01

    In this paper the insights and results are presented of a long term and ongoing improvement effort within the Netherlands Forensic Institute (NFI) to establish a valuable innovation programme. From the overall perspective of the role and use of forensic science in the criminal justice system, the concepts of Forensic Information Value Added (FIVA) and Forensic Information Value Efficiency (FIVE) are introduced. From these concepts the key factors determining the added value of forensic investigations are discussed; Evidential Value, Relevance, Quality, Speed and Cost. By unravelling the added value of forensic science and combining this with the future needs and scientific and technological developments, six forensic grand challenges are introduced: i) Molecular Photo-fitting; ii) chemical imaging, profiling and age estimation of finger marks; iii) Advancing Forensic Medicine; iv) Objective Forensic Evaluation; v) the Digital Forensic Service Centre and vi) Real time In-Situ Chemical Identification. Finally, models for forensic innovation are presented that could lead to major international breakthroughs on all these six themes within a five year time span. This could cause a step change in the added value of forensic science and would make forensic investigative methods even more valuable than they already are today. © 2013. Published by Elsevier Ireland Ltd on behalf of Forensic Science Society. All rights reserved.

  7. Multimedia security watermarking, steganography, and forensics

    CERN Document Server

    Shih, Frank Y

    2012-01-01

    Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and expert insights on multimedia security technology used to prove that content is authentic and has not been altered. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, this book presents a wealth of everyday protection application examples in fields including multimedia mining and classification, digital watermarking, steganography, and digital forensics. Giving readers an in-depth overview of different asp

  8. Forensic applications

    International Nuclear Information System (INIS)

    Yellin, E.

    1981-01-01

    Modern scientific technology now plays an increasingly important role in the process of law enforcement. Neutron activation, as developed for elemental analysis offers, in many cases, the suitable answer to forensic problems. The author discusses the use NAA has been put to in forensic science. (Auth.)

  9. Linear programming phase unwrapping for dual-wavelength digital holography.

    Science.gov (United States)

    Wang, Zhaomin; Jiao, Jiannan; Qu, Weijuan; Yang, Fang; Li, Hongru; Tian, Ailing; Asundi, Anand

    2017-01-20

    A linear programming phase unwrapping method in dual-wavelength digital holography is proposed and verified experimentally. The proposed method uses the square of height difference as a convergence standard and theoretically gives the boundary condition in a searching process. A simulation was performed by unwrapping step structures at different levels of Gaussian noise. As a result, our method is capable of recovering the discontinuities accurately. It is robust and straightforward. In the experiment, a microelectromechanical systems sample and a cylindrical lens were measured separately. The testing results were in good agreement with true values. Moreover, the proposed method is applicable not only in digital holography but also in other dual-wavelength interferometric techniques.

  10. Nuclear forensics

    International Nuclear Information System (INIS)

    Venugopal, V.

    2010-01-01

    Nuclear forensics is the analysis of nuclear materials recovered from either the capture of unused materials, or from the radioactive debris following a nuclear explosion and can contribute significantly to the identification of the sources of the materials and the industrial processes used to obtain them. In the case of an explosion, nuclear forensics can also reconstruct key features of the nuclear device. Nuclear forensic analysis works best in conjunction with other law enforcement, radiological protection dosimetry, traditional forensics, and intelligence work to provide the basis for attributing the materials and/or nuclear device to its originators. Nuclear forensics is a piece of the overall attribution process, not a stand-alone activity

  11. Nuclear forensics

    International Nuclear Information System (INIS)

    Karadeniz, O.; Guenalp, G.

    2010-01-01

    This review discusses the methodology of nuclear forensics and illicit trafficking of nuclear materials. Nuclear forensics is relatively new scientific branch whose aim it is to read out material inherent from nuclear material. Nuclear forensics investigations have to be considered as part of a comprehensive set of measures for detection,interception, categorization and characterization of illicitly trafficking nuclear material. Prevention, detection and response are the main elements in combating illicit trafficking. Forensics is a key element in the response process. Forensic science is defined as the application of a broad spectrum of sciences to answer questions of interest to the legal system. Besides, in this study we will explain age determination of nuclear materials.

  12. Digital Citizenship and Health Promotion Programs: The Power of Knowing.

    Science.gov (United States)

    Hicks, Elaine R

    2016-11-03

    Patterns of Internet access and use among disadvantaged subgroups of Americans reveal that not all disparities are the same, a distinction crucial for appropriate public policies and health promotion program planning. In their book, Digital Citizenship: The Internet, Society, and Participation, authors Karen Mossberger, Caroline Tolbert, and Ramona McNeal deconstructed national opinion surveys and used multivariate methods of data analysis to demonstrate the impact of exclusion from online society economically, socially, and politically among disadvantaged Americans. © 2016 Society for Public Health Education.

  13. Light Water Reactor Sustainability Program: Digital Architecture Project Plan

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Ken [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2014-09-01

    There are many technologies available to the nuclear power industry to improve efficiency in plant work activities. These range from new control room technologies to those for mobile field workers. They can make a positive impact on a wide range of performance objectives – increase in productivity, human error reduction, validation of results, accurate transfer of data, and elimination of repetitive tasks. It is expected that the industry will more and more turn to these technologies to achieve these operational efficiencies to lower costs. At the same time, this will help utilities manage a looming staffing problem as the inevitable retirement wave of the more seasoned workers affects both staffing levels and knowledge retention. A barrier to this wide-scale implementation of new technologies for operational efficiency is the lack of a comprehensive digital architecture that can support the real-time information exchanges needed to achieve the desired operational efficiencies. This project will define an advanced digital architecture that will accommodate the entire range of system, process, and plant worker activity to enable the highest degree of integration, thereby creating maximum efficiency and productivity. This pilot project will consider a range of open standards that are suitable for the various data and communication requirements of a seamless digital environment. It will map these standards into an overall architecture to support the II&C developments of this research program.

  14. The Implementation and Growth of an International Online Forensic Science Graduate Program at the University of Florida

    Science.gov (United States)

    Grundmann, Oliver; Wielbo, Donna; Tebbett, Ian

    2010-01-01

    Forensic science education has evolved as an interdisciplinary science that includes medicine, chemistry, biology, and criminal justice. Therefore, multiple paths can lead to a career in forensic science. A formal education usually requires the student to attend a college or university to obtain a bachelor's or master's degree. In many cases,…

  15. Forensic psychologist

    Directory of Open Access Journals (Sweden)

    Tinkara Pavšič Mrevlje

    2011-04-01

    Full Text Available The paper is a review of different issues that a forensic psychologists encounter at work. Forensic assessment might be needed in civil law cases, administrative procedures and in criminal law cases. The paper focuses on referrals in criminal law cases regarding matters such as assessing competence to stand trial, criminal responsibility and violence risk assessment. Finally, the role of expert testimony on eyewitness memory, which is not used in practice in Slovenia yet, is presented.

  16. Audit in forensic pathology.

    Science.gov (United States)

    Burke, M P; Opeskin, K

    2000-09-01

    Autopsy numbers in Australian hospitals have declined markedly during the past decade despite evidence of a relatively static rate of demonstrable clinical misdiagnosis during this time. The reason for this decrease in autopsy numbers is multifactorial and may include a general lack of clinical and pathologic interest in the autopsy with a possible decline in autopsy standard, a lack of clinicopathologic correlation after autopsies, and an increased emphasis on surgical biopsy reporting within hospital pathology departments. Although forensic autopsies are currently maintaining their numbers, it is incumbent on forensic pathologists to demonstrate the wealth of important information a carefully performed postmortem examination can reveal. To this end, the Pathology Division of the Victorian Institute of Forensic Medicine has instituted a program of minimum standards in varied types of coroner cases and commenced a system of internal and external audit. The minimum standard for a routine, sudden, presumed natural death is presented and the audit system is discussed.

  17. INDICATORS FOR DIGITALIZATION OF SUSTAINABLE DEVELOPMENT GOALS IN PEEX PROGRAM

    Directory of Open Access Journals (Sweden)

    Sergey N. Bobylev

    2018-01-01

    Full Text Available This article describes the Pan-Eurasian Experiment (PEEX program and indicators for monitoring of implementation and digitalization of Sustainable Development Goals (SDG inRussia, especially environmental goals. The authors considered the possibility of integration and identification of the methodological approaches of the socio-economic research to environmental sciences. Paper gives insights into the international framework of the United nations, addreses several relevant indicators to be monitored in a Russian perspective and summarizes shortly the status of the monitoring activities and provide an overview on the main tasks for the upcoming years to reach the sustainable development goals established by the United Nations. The tasks to which the Goals divided are considered in detail. The indicators of Russian statistics that can be used to monitor the implementation of these tasks are determined. It is shown, that more detailed regional analysis and new data is needed in order to quantify the feedbackloops.

  18. Learning iOS forensics

    CERN Document Server

    Epifani, Mattia

    2015-01-01

    If you are a digital forensics examiner daily involved in the acquisition and analysis of mobile devices and want to have a complete overview of how to perform your work on iOS devices, this book is definitely for you.

  19. The state of nuclear forensics

    International Nuclear Information System (INIS)

    Kristo, Michael J.; Tumey, Scott J.

    2013-01-01

    Nuclear terrorism has been identified as one of the most serious security threats facing the world today. Many countries, including the United States, have incorporated nuclear forensic analysis as a component of their strategy to prevent nuclear terrorism. Nuclear forensics involves the laboratory analysis of seized illicit nuclear materials or debris from a nuclear detonation to identify the origins of the material or weapon. Over the years, a number of forensic signatures have been developed to improve the confidence with which forensic analysts can draw conclusions. These signatures are validated and new signatures are discovered through research and development programs and in round-robin exercises among nuclear forensic laboratories. The recent Nuclear Smuggling International Technical Working Group Third Round Robin Exercise and an on-going program focused on attribution of uranium ore concentrate provide prime examples of the current state of nuclear forensics. These case studies will be examined and the opportunities for accelerator mass spectrometry to play a role in nuclear forensics will be discussed.

  20. The state of nuclear forensics

    Energy Technology Data Exchange (ETDEWEB)

    Kristo, Michael J. [Chemical Sciences Division, Lawrence Livermore National Laboratory, P.O. Box 808, L-186, Livermore, CA 94551 (United States); Tumey, Scott J., E-mail: tumey2@llnl.gov [Center for Accelerator Mass Spectrometry, Lawrence Livermore National Laboratory, P.O. Box 808, L-397, Livermore, CA 94551 (United States)

    2013-01-15

    Nuclear terrorism has been identified as one of the most serious security threats facing the world today. Many countries, including the United States, have incorporated nuclear forensic analysis as a component of their strategy to prevent nuclear terrorism. Nuclear forensics involves the laboratory analysis of seized illicit nuclear materials or debris from a nuclear detonation to identify the origins of the material or weapon. Over the years, a number of forensic signatures have been developed to improve the confidence with which forensic analysts can draw conclusions. These signatures are validated and new signatures are discovered through research and development programs and in round-robin exercises among nuclear forensic laboratories. The recent Nuclear Smuggling International Technical Working Group Third Round Robin Exercise and an on-going program focused on attribution of uranium ore concentrate provide prime examples of the current state of nuclear forensics. These case studies will be examined and the opportunities for accelerator mass spectrometry to play a role in nuclear forensics will be discussed.

  1. Digital library programs for libraries and archives developing, managing, and sustaining unique digital collections

    CERN Document Server

    Purcell, D

    2016-01-01

    Equally valuable for LIS students just learning about the digital landscape, information professionals taking their first steps to create digital content, and organizations who already have well-established digital credentials, Purcell's book outlines methods applicable and scalable to many different types and sizes of libraries and archives.

  2. Forensic pedology, forensic geology, forensic geoscience, geoforensics and soil forensics.

    Science.gov (United States)

    Ruffell, Alastair

    2010-10-10

    We now have a confusing set of five commonly used terms for the application of Earth evidence in forensic science. This confusion is resulting in Earth scientists who use these methods mentioning different terms, sometimes for the same type of study. Likewise, forensic scientists, police/law enforcement officers and those employed by courts of law are becoming confused as to what each term means. A nomenclatural framework (based on the first use of each term) is proposed to encourage consistency in the use of terminology. Generally, the number of Earth science applications has grown through time, from soil and sediment analysis to remote sensing and GIS. The issue of where forensic biology and microbiology sits with these uses of Earth evidence is considered. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.

  3. Forensic hash for multimedia information

    Science.gov (United States)

    Lu, Wenjun; Varna, Avinash L.; Wu, Min

    2010-01-01

    Digital multimedia such as images and videos are prevalent on today's internet and cause significant social impact, which can be evidenced by the proliferation of social networking sites with user generated contents. Due to the ease of generating and modifying images and videos, it is critical to establish trustworthiness for online multimedia information. In this paper, we propose novel approaches to perform multimedia forensics using compact side information to reconstruct the processing history of a document. We refer to this as FASHION, standing for Forensic hASH for informatION assurance. Based on the Radon transform and scale space theory, the proposed forensic hash is compact and can effectively estimate the parameters of geometric transforms and detect local tampering that an image may have undergone. Forensic hash is designed to answer a broader range of questions regarding the processing history of multimedia data than the simple binary decision from traditional robust image hashing, and also offers more efficient and accurate forensic analysis than multimedia forensic techniques that do not use any side information.

  4. 75 FR 7370 - Closed Captioning of Video Programming; Closed Captioning Requirements for Digital Television...

    Science.gov (United States)

    2010-02-19

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 79 [CG Docket No. 05-231; ET Docket No. 99-254; FCC 08-255] Closed Captioning of Video Programming; Closed Captioning Requirements for Digital Television... Captioning of Video Programming; Closed Captioning Requirements for Digital Television Receivers, Declaratory...

  5. Digital evidence

    Directory of Open Access Journals (Sweden)

    Lukić Tatjana

    2012-01-01

    Full Text Available Although computer makes human activities faster and easier, innovating and creating new forms of work and other kinds of activities, it also influenced the criminal activity. The development of information technology directly affects the development of computer forensics without which, it can not even imagine the discovering and proving the computer offences and apprehending the perpetrator. Information technology and computer forensic allows us to detect and prove the crimes committed by computer and capture the perpetrators. Computer forensics is a type of forensics which can be defined as a process of collecting, preserving, analyzing and presenting digital evidence in court proceedings. Bearing in mind, that combat against crime, in which computers appear as an asset or object of the offense, requires knowledge of digital evidence as well as specific rules and procedures, the author in this article specifically addresses the issues of digital evidence, forensic (computer investigation, specific rules and procedures for detecting, fixing and collecting digital evidence and use of this type of evidence in criminal proceedings. The author also delas with international standards regarding digital evidence and cyber-space investigation.

  6. Cyber Forensics and Security as an ABET-CAC Accreditable Program

    Science.gov (United States)

    Wood, David F.; Kohun, Frederick G.; Ali, Azad; Paullet, Karen; Davis, Gary A.

    2010-01-01

    This paper frames the recent ABET accreditation model with respect to the balance between IS programs and innovation. With the current relaxation of the content of the information systems requirement by ABET, it is possible to include innovation into the accreditation umbrella. To this extent this paper provides a curricular model that provides…

  7. Computer forensics with FTK

    CERN Document Server

    Carbone, Fernando

    2014-01-01

    This tutorial contains detailed instructions with useful integrated examples that help you understand the main features of FTK and how you can use it to analyze evidence. This book has clear and concise guidance in an easily accessible format.This tutorial-based guide is great for you if you want to conduct digital investigations with an integrated platform. Whether you are new to Computer Forensics or have some experience, this book will help you get started with FTK so you can analyze evidence effectively and efficiently. If you are a law enforcement official, corporate security, or IT profe

  8. [Forensic entomology].

    Science.gov (United States)

    Açikgöz, Halide Nihal

    2010-01-01

    Odour of the animal or human corpses immediately after death is very attractive for insects and other invertebrates. Blue and green bottle flies from the Calliphoridae family are the first colonizers of cadaver and immediately later necrophagous Diptera from the Sarcophagidae family settle on the same corpse. It is essential to determine the time past after death for elucidating the event in case of the homicide or suspicious death, and it is directly proportional to the post mortem interval expected time, which is based upon the speed of the larval growth. In this article, we purposed to stress the special interest of forensic entomology for the scientists who will apply this science in their forensic researches and case studies, and also to provide information to our judges, prosecutors and law enforcement agents in order to consider the entomological samples to be reliable and applicable evidences as biological stains and hairs. We are of the opinion that if any forensic entomologist is called to the crime scene or if the evidences are collected and then delivered to an entomologist, the forensic cases will be elucidated faster and more accurately.

  9. Assessment of the Forensic Sciences Profession. A Survey of Educational Offerings in the Forensic Sciences. Volume I.

    Science.gov (United States)

    Field, Kenneth S.; And Others

    This survey of the educational offerings in the Forensic Sciences was initiated to identify institutions and agencies offering educational courses and/or programs in the forensic sciences and to evaluate the availability of these programs. The information gathered by surveying members of the American Academy of Forensic Sciences reveals that…

  10. A digital fly-by-wire technology development program using an F-8C test aircraft

    Science.gov (United States)

    Jarvis, C. R.

    1974-01-01

    A digital fly-by-wire flight control system has been installed in an F-8C test airplane and has undergone extensive ground and flight testing as part of an overall program to develop digital fly-by-wire technology. This is the first airplane to fly with a digital fly-by-wire system as its primary means of control and with no mechanical reversion capability. Forty-two test flights were made for a total flight time of 57 hours. Six pilots participated in the evaluation. This paper presents an overview of the digital fly-by-wire program and discusses some of the flight-test results.

  11. Digitization

    DEFF Research Database (Denmark)

    Finnemann, Niels Ole

    2014-01-01

    what a concept of digital media might add to the understanding of processes of mediatization and what the concept of mediatization might add to the understanding of digital media. It is argued that digital media open an array of new trajectories in human communication, trajectories which were...

  12. Multimedia forensics and security foundations, innovations, and applications

    CERN Document Server

    Fouad, Mohamed; Manaf, Azizah; Zamani, Mazdak; Ahmad, Rabiah; Kacprzyk, Janusz

    2017-01-01

    This book presents recent applications and approaches as well as challenges in digital forensic science. One of the evolving challenges that is covered in the book is the cloud forensic analysis which applies the digital forensic science over the cloud computing paradigm for conducting either live or static investigations within the cloud environment. The book also covers the theme of multimedia forensics and watermarking in the area of information security. That includes highlights on intelligence techniques designed for detecting significant changes in image and video sequences. Moreover, the theme proposes recent robust and computationally efficient digital watermarking techniques. The last part of the book provides several digital forensics related applications, including areas such as evidence acquisition enhancement, evidence evaluation, cryptography, and finally, live investigation through the importance of reconstructing the botnet attack scenario to show the malicious activities and files as evidence...

  13. Modelling live forensic acquisition

    CSIR Research Space (South Africa)

    Grobler, MM

    2009-06-01

    Full Text Available This paper discusses the development of a South African model for Live Forensic Acquisition - Liforac. The Liforac model is a comprehensive model that presents a range of aspects related to Live Forensic Acquisition. The model provides forensic...

  14. PENINGKATAN KOMPETENSI GURU MELALUI WORKSHOP PENYUSUNAN SOAL DIGITAL BAHASA JAWA DENGAN MENGGUNAKAN PROGRAM ADOBE CAPTIVATE

    Directory of Open Access Journals (Sweden)

    Joko Sukoyo

    2013-02-01

    Full Text Available Kegiatan workshop ini dilakukan dengan tujuan untuk meningkatkan kemampuan guru sekolah dasar di Kecamatan Semarang Utara dalam hal penyusunan soal digital bahasa Jawa dengan menggunakan program adobe captivate. Metode yang digunakan dalam kegiatan ini adalah: ceramah, demonstrasi, praktik langsung, tanya jawab, dan penugasan. Peserta yang mengikuti workshop sebanyak 47 guru SD di Kecamatan Semarang Utara. Materi yang diberikan kepada peserta meliputi pengenalan program adobe captivate, penginstalan program adobe captivate, dan penulisan soal digital bahasa Jawa dengan menggunakan program adobe captivate. Kegiatan workshop ini berdampak positif kepada guru-guru SD di Kecamatan Semarang Utara. Sebelum diadakan kegiatan workshop, mereka sama sekali tidak dapat membuat soal digital dengan program adobe captivate. Setelah diadakan kegiatan worshop dan diadakan evaluasi terjadi peningkatan yang sangat signifikan, lebih dari 75% dapat membuat soal digital.

  15. [Forensic anthropology].

    Science.gov (United States)

    Lynnerup, Niels

    2009-09-07

    Forensic anthropology is the application of biological or physical anthropology in the service of justice. One main area is the analysis of human remains. Such analyses involve person identification by assessment of age and sex of the deceased, and comparison with ante-mortem data. Another major area is the analysis of surveillance pictures and videos. Such analyses may comprise facial and bodily morphological comparisons, multi-angle photogrammetry and gait analysis. We also perform studies of human remains for archaeologists.

  16. A State-of-the-Art Review of Cloud Forensics

    Directory of Open Access Journals (Sweden)

    Sameera Abdulrahman Almulla

    2014-12-01

    Full Text Available Cloud computing and digital forensics are emerging fields of technology. Unlike traditional digital forensics where the target environment can be almost completely acquired, isolated and can be under the investigators control; in cloud environments, the distribution of computation and storage poses unique and complex challenges to the investigators.Recently, the term "cloud forensics" has an increasing presence in the field of digital forensics. In this state-of-the-art review, we included the most recent research efforts that used "cloud forensics" as a keyword and then classify the literature in to three dimensions, (1 survey-based, (2 technology-based and (3 forensics procedural-based.We discuss widely accepted international standard bodies and their efforts to cope with the current trend of cloud forensics. Our aim is not only to reference related work based on the discussed dimensions, but also to analyze them and generate a mind map that will help in identifying research gaps. Finally, we summarize existing digital forensics tools and, the available simulation environments that can be used for evidence acquisition, examination and cloud forensics test purposes.

  17. Information Assurance and Forensic Readiness

    Science.gov (United States)

    Pangalos, Georgios; Katos, Vasilios

    Egalitarianism and justice are amongst the core attributes of a democratic regime and should be also secured in an e-democratic setting. As such, the rise of computer related offenses pose a threat to the fundamental aspects of e-democracy and e-governance. Digital forensics are a key component for protecting and enabling the underlying (e-)democratic values and therefore forensic readiness should be considered in an e-democratic setting. This position paper commences from the observation that the density of compliance and potential litigation activities is monotonically increasing in modern organizations, as rules, legislative regulations and policies are being constantly added to the corporate environment. Forensic practices seem to be departing from the niche of law enforcement and are becoming a business function and infrastructural component, posing new challenges to the security professionals. Having no a priori knowledge on whether a security related event or corporate policy violation will lead to litigation, we advocate that computer forensics need to be applied to all investigatory, monitoring and auditing activities. This would result into an inflation of the responsibilities of the Information Security Officer. After exploring some commonalities and differences between IS audit and computer forensics, we present a list of strategic challenges the organization and, in effect, the IS security and audit practitioner will face.

  18. Canadian national nuclear forensics capability project

    International Nuclear Information System (INIS)

    Ball, J.; Dimayuga, I.; Summerell, I.; Totland, M.; Jonkmans, G.; Whitlock, J.; El-jaby, A.; Inrig, E.

    2015-01-01

    Following the 2010 Nuclear Security Summit, Canada expanded its existing capability for nuclear forensics by establishing a national nuclear forensics laboratory network, which would include a capability to perform forensic analysis on nuclear and other radioactive material, as well as on traditional evidence contaminated with radioactive material. At the same time, the need for a national nuclear forensics library of signatures of nuclear and radioactive materials under Canadian regulatory control was recognized. The Canadian Safety and Security Program, administered by Defence Research and Development Canada's Centre for Security Science (DRDC CSS), funds science and technology initiatives to enhance Canada's preparedness for prevention of and response to potential threats. DRDC CSS, with assistance from Canadian Nuclear Laboratories, formerly Atomic Energy of Canada Limited, is leading the Canadian National Nuclear Forensics Capability Project to develop a coordinated, comprehensive, and timely national nuclear forensics capability. (author)

  19. Canadian national nuclear forensics capability project

    Energy Technology Data Exchange (ETDEWEB)

    Ball, J.; Dimayuga, I., E-mail: joanne.ball@cnl.ca [Canadian Nuclear Laboratories, Chalk River, Ontario (Canada); Summerell, I. [Royal Canadian Mounted Police, Ottawa, Ontario (Canada); Totland, M. [Canadian Nuclear Laboratories, Chalk River, Ontario (Canada); Jonkmans, G. [Defence Research and Development Canada, Ottawa, Ontario (Canada); Whitlock, J. [Canadian Nuclear Laboratories, Chalk River, Ontario (Canada); El-jaby, A. [Canadian Nuclear Safety Commission, Ottawa, Ontario (Canada); Inrig, E. [Defence Research and Development Canada, Ottawa, Ontario (Canada)

    2015-06-15

    Following the 2010 Nuclear Security Summit, Canada expanded its existing capability for nuclear forensics by establishing a national nuclear forensics laboratory network, which would include a capability to perform forensic analysis on nuclear and other radioactive material, as well as on traditional evidence contaminated with radioactive material. At the same time, the need for a national nuclear forensics library of signatures of nuclear and radioactive materials under Canadian regulatory control was recognized. The Canadian Safety and Security Program, administered by Defence Research and Development Canada's Centre for Security Science (DRDC CSS), funds science and technology initiatives to enhance Canada's preparedness for prevention of and response to potential threats. DRDC CSS, with assistance from Canadian Nuclear Laboratories, formerly Atomic Energy of Canada Limited, is leading the Canadian National Nuclear Forensics Capability Project to develop a coordinated, comprehensive, and timely national nuclear forensics capability. (author)

  20. Programming Not Required: Skills and Knowledge for the Digital Library Environment

    Science.gov (United States)

    Howard, Katherine

    2010-01-01

    Education for Library and Information professionals in managing the digital environment has been a key topic for discussion within the LIS environment for some time. However, before designing and implementing a program for digital library education, it is prudent to ensure that the skills and knowledge required to work in this environment are…

  1. Digital learning programs - competition for the classical microscope?

    Science.gov (United States)

    Schmidt, Peter

    2013-01-01

    The development of digital media has been impressive in recent years which is also among the reason for their increasing use in academic teaching. This is especially true for teaching Anatomy and Histology in the first two years in medical and dental curricula. Modern digital technologies allow for efficient, affordable and easily accessible distribution of histological images in high quality. Microscopy depends almost exclusively on such images. Since 20 years numerous digital teaching systems have been developed for this purpose. Respective developments have changed the ways students acquire knowledge and prepare for exams. Teaching staff should adapt lectures, seminars and labs accordingly. As a first step, a collection of high resolution digital microscopic slides was made available for students at the Friedrich-Schiller-University in Jena. The aim of the present study was to evaluate the importance of conventional light microscopy and related technologies in current and future medical and dental education aswell. A survey was done among 172 medical and dental students at the Friedrich-Schiller-University Jena. 51% of students use now frequently new digital media for learning histology in contrast to 5% in the year 2000 [1]. Digital media including Internet, CD- based learning combined with social networks successfully compete with classical light microscopy.

  2. 28 CFR 90.14 - Forensic medical examination payment requirement.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Forensic medical examination payment... Program § 90.14 Forensic medical examination payment requirement. (a) For the purpose of this subpart B, a... entity incurs the full out-of-pocket costs of forensic medical examinations for victims of sexual assault...

  3. Factors Predicting Organizational Identification with Intercollegiate Forensics Teams

    Science.gov (United States)

    Croucher, Stephen M.; Long, Bridget L.; Meredith, Michael J.; Oommen, Deepa; Steele, Emily L.

    2009-01-01

    This study examines the relationship between intercollegiate forensics competitors' organizational identification and organizational culture. Through a survey analysis of 314 intercollegiate forensics students, this study reports three major findings. First, this study found male competitors identify with forensics programs more than female…

  4. Teaching Forensic Psychiatry to General Psychiatry Residents

    Science.gov (United States)

    Lewis, Catherine F.

    2004-01-01

    Objective: The Accreditation Council on Graduate Medical Education (ACGME) requires that general psychiatry residency training programs provide trainees with exposure to forensic psychiatry. Limited information is available on how to develop a core curriculum in forensic psychiatry for general psychiatry residents and few articles have been…

  5. Computer Forensics for Graduate Accountants: A Motivational Curriculum Design Approach

    Directory of Open Access Journals (Sweden)

    Grover Kearns

    2010-06-01

    Full Text Available Computer forensics involves the investigation of digital sources to acquire evidence that can be used in a court of law. It can also be used to identify and respond to threats to hosts and systems. Accountants use computer forensics to investigate computer crime or misuse, theft of trade secrets, theft of or destruction of intellectual property, and fraud. Education of accountants to use forensic tools is a goal of the AICPA (American Institute of Certified Public Accountants. Accounting students, however, may not view information technology as vital to their career paths and need motivation to acquire forensic knowledge and skills. This paper presents a curriculum design methodology for teaching graduate accounting students computer forensics. The methodology is tested using perceptions of the students about the success of the methodology and their acquisition of forensics knowledge and skills. An important component of the pedagogical approach is the use of an annotated list of over 50 forensic web-based tools.

  6. Computer program user's manual for FIREFINDER digital topographic data verification library dubbing system

    Science.gov (United States)

    Ceres, M.; Heselton, L. R., III

    1981-11-01

    This manual describes the computer programs for the FIREFINDER Digital Topographic Data Verification-Library-Dubbing System (FFDTDVLDS), and will assist in the maintenance of these programs. The manual contains detailed flow diagrams and associated descriptions for each computer program routine and subroutine. Complete computer program listings are also included. This information should be used when changes are made in the computer programs. The operating system has been designed to minimize operator intervention.

  7. Forensic entomology: a template for forensic acarology?

    Science.gov (United States)

    Turner, Bryan

    2009-10-01

    Insects are used in a variety of ways in forensic science and the developing area of forensic acarology may have a similar range of potential. This short account summarises the main ways in which entomology currently contributes to forensic science and discusses to what extent acarology might also contribute in these areas.

  8. Development and implementation of an automated quantitative film digitizer quality control program

    Science.gov (United States)

    Fetterly, Kenneth A.; Avula, Ramesh T. V.; Hangiandreou, Nicholas J.

    1999-05-01

    A semi-automated, quantitative film digitizer quality control program that is based on the computer analysis of the image data from a single digitized test film was developed. This program includes measurements of the geometric accuracy, optical density performance, signal to noise ratio, and presampled modulation transfer function. The variability of the measurements was less than plus or minus 5%. Measurements were made on a group of two clinical and two laboratory laser film digitizers during a trial period of approximately four months. Quality control limits were established based on clinical necessity, vendor specifications and digitizer performance. During the trial period, one of the digitizers failed the performance requirements and was corrected by calibration.

  9. Computer Forensics for Graduate Accountants: A Motivational Curriculum Design Approach

    OpenAIRE

    Grover Kearns

    2010-01-01

    Computer forensics involves the investigation of digital sources to acquire evidence that can be used in a court of law. It can also be used to identify and respond to threats to hosts and systems. Accountants use computer forensics to investigate computer crime or misuse, theft of trade secrets, theft of or destruction of intellectual property, and fraud. Education of accountants to use forensic tools is a goal of the AICPA (American Institute of Certified Public Accountants). Accounting stu...

  10. Design of a wireless forensic readiness model (WFRM)

    CSIR Research Space (South Africa)

    Ngobeni, SJ

    2009-07-01

    Full Text Available ] Solomon, M.G., Barrett, D. & Broom, N. (2005). Computer forensics, The Best First Step towards a Career in Computer Forensics. SYBEX Inc, San Francisco, London. [13] RICCA Act, (22 January 2002). Regulation of Interception of Communications...: http://www.guidancesoftware.com/ediscovery/index.aspx, (Accessed 05 April 2009). [15] Forensic Toolkit. (10 July 2008). Access Data, A pioneer in digital investigations since 1987. Available from: http...

  11. Gamma spectra pictures using a digital plotter. Program MONO; Representacion de Espectros directos mediante un trazado digital. Prograa MONO

    Energy Technology Data Exchange (ETDEWEB)

    Los Arcos, J M

    1978-07-01

    The program MONO has been written for a CALCOMP-936 digital plotter operating off- -line with a UMI VAC 1106 computer, to obtain graphic representations of single gamma spectra stored on magnetic tape. It allows to plot the whole spectrum or only a part, as well as to draw a given spectrum on the same or different picture than the previous one. Ten representation scales are available and at up nine comment lines can be written in a graphic. (Author) 4 refs.

  12. Forensic entomology

    Science.gov (United States)

    Amendt, Jens; Krettek, Roman; Zehner, Richard

    Necrophagous insects are important in the decomposition of cadavers. The close association between insects and corpses and the use of insects in medicocriminal investigations is the subject of forensic entomology. The present paper reviews the historical background of this discipline, important postmortem processes, and discusses the scientific basis underlying attempts to determine the time interval since death. Using medical techniques, such as the measurement of body temperature or analysing livor and rigor mortis, time since death can only be accurately measured for the first two or three days after death. In contrast, by calculating the age of immature insect stages feeding on a corpse and analysing the necrophagous species present, postmortem intervals from the first day to several weeks can be estimated. These entomological methods may be hampered by difficulties associated with species identification, but modern DNA techniques are contributing to the rapid and authoritative identification of necrophagous insects. Other uses of entomological data include the toxicological examination of necrophagous larvae from a corpse to identify and estimate drugs and toxicants ingested by the person when alive and the proof of possible postmortem manipulations. Forensic entomology may even help in investigations dealing with people who are alive but in need of care, by revealing information about cases of neglect.

  13. A Comparison Study of Adults with Intellectual Disability and Psychiatric Disorder with and without Forensic Involvement

    Science.gov (United States)

    Raina, P.; Lunsky, Y.

    2010-01-01

    The current study describes and compares profiles of patients in the same specialized hospital program for patients with intellectual disability with and without forensic involvement. A retrospective chart review of 78 individuals (39 forensic and 39 non-forensic) served between 2006 and 2008 was completed. The forensic sample was more likely to…

  14. DIGITAL

    Data.gov (United States)

    Federal Emergency Management Agency, Department of Homeland Security — The Digital Flood Insurance Rate Map (DFIRM) Database depicts flood risk information and supporting data used to develop the risk data. The primary risk...

  15. The role of forensic dentist following mass disaster | Kolude | Annals ...

    African Journals Online (AJOL)

    The various forensic dental modalities of identification that include matching techniques, postmortem profiling, genetic fingerprinting, dental fossil assessment and dental biometrics with digital subtraction were considered. The varying extent of use of forensic dental techniques and the resulting positive impact on human ...

  16. How to optimize radiological images captured from digital cameras, using the Adobe Photoshop 6.0 program.

    Science.gov (United States)

    Chalazonitis, A N; Koumarianos, D; Tzovara, J; Chronopoulos, P

    2003-06-01

    Over the past decade, the technology that permits images to be digitized and the reduction in the cost of digital equipment allows quick digital transfer of any conventional radiological film. Images then can be transferred to a personal computer, and several software programs are available that can manipulate their digital appearance. In this article, the fundamentals of digital imaging are discussed, as well as the wide variety of optional adjustments that the Adobe Photoshop 6.0 (Adobe Systems, San Jose, CA) program can offer to present radiological images with satisfactory digital imaging quality.

  17. An Analysis of Forensic Imaging in the Absence of Write-Blockers

    Directory of Open Access Journals (Sweden)

    Gary C Kessler

    2014-09-01

    Full Text Available Best practices in digital forensics demand use of write-blockers when creating forensic copies of digital media and this has been a core of computer forensics training for decades. The practice is so in-grained that images created without a write-blocker are immediate suspect for integrity. This paper describes a research framework to examine what occurs when a forensic image is acquired without benefit of a write-blocker in order to understand the true impact of such an eventuality. The initial tests document the changes made to a hard drive and flash drive when imaged and examined with a Windows-based forensics workstation.

  18. Forensic challenges for handling incidents and crime in cyberspace

    CSIR Research Space (South Africa)

    Taute, B

    2009-10-01

    Full Text Available their goals. Who will bring law and order to cyberspace? This presentation focuses on the technology challenges for dealing with digital forensics and the time factor in dealing with incidents and crime in cyberspace....

  19. Criminalistics and the forensic nursing process.

    Science.gov (United States)

    Burgess, Ann Wolbert; Piatelli, Michael J; Pasqualone, Georgia

    2011-06-01

    Students learn science by actually performing science activities. The 12 laboratories described in this article assist students in applying the fundamental techniques germane to the field of forensic science to "solve" contrived cases and present "evidence" in a mock trial. Moreover, students are also confronted with some of the legal and ethical issues concerning the validity, reliability, and application of some forensic techniques. The pedagogical design of the laboratory course provides a rich, challenging, and interdisciplinary academic experience intended to augment and compliment the didactic forensic lecture portion of the course. This laboratory course was designed to engender, embody, and articulate one of the University's directive goals to support interdisciplinary teaching, research, and programming. Because we developed the laboratories on minimal funds, we demonstrated that it could be cost-effective. And thus, we recommend a laboratory science course be included as part of the curriculum of all forensic nursing students and practitioners. © 2011 International Association of Forensic Nurses.

  20. Expanding forensic science through forensic intelligence.

    Science.gov (United States)

    Ribaux, Olivier; Talbot Wright, Benjamin

    2014-12-01

    Research and Development ('R&D') in forensic science currently focuses on innovative technologies improving the efficiency of existing forensic processes, from the detection of marks and traces at the scene, to their presentation in Court. R&D approached from this perspective provides no response to doubts raised by recent criminological studies, which question the effective contribution of forensic science to crime reduction, and to policing in general. Traces (i.e. forensic case data), as remnants of criminal activity are collected and used in various forms of crime monitoring and investigation. The aforementioned doubts therefore need to be addressed by expressing how information is conveyed by traces in these processes. Modelling from this standpoint expands the scope of forensic science and provides new R&D opportunities. Twelve propositions for R&D are stated in order to pave the way. Copyright © 2014 Forensic Science Society. Published by Elsevier Ireland Ltd. All rights reserved.

  1. Practical mobile forensics

    CERN Document Server

    Bommisetty, Satish; Mahalik, Heather

    2014-01-01

    The book is an easy-to-follow guide with clear instructions on various mobile forensic techniques. The chapters and the topics within are structured for a smooth learning curve, which will swiftly empower you to master mobile forensics. If you are a budding forensic analyst, consultant, engineer, or a forensic professional wanting to expand your skillset, this is the book for you. The book will also be beneficial to those with an interest in mobile forensics or wanting to find data lost on mobile devices. It will be helpful to be familiar with forensics in general but no prior experience is re

  2. The prevalence of encoded digital trace evidence in the nonfile space of computer media(,) (.).

    Science.gov (United States)

    Garfinkel, Simson L

    2014-09-01

    Forensically significant digital trace evidence that is frequently present in sectors of digital media not associated with allocated or deleted files. Modern digital forensic tools generally do not decompress such data unless a specific file with a recognized file type is first identified, potentially resulting in missed evidence. Email addresses are encoded differently for different file formats. As a result, trace evidence can be categorized as Plain in File (PF), Encoded in File (EF), Plain Not in File (PNF), or Encoded Not in File (ENF). The tool bulk_extractor finds all of these formats, but other forensic tools do not. A study of 961 storage devices purchased on the secondary market and shows that 474 contained encoded email addresses that were not in files (ENF). Different encoding formats are the result of different application programs that processed different kinds of digital trace evidence. Specific encoding formats explored include BASE64, GZIP, PDF, HIBER, and ZIP. Published 2014. This article is a U.S. Government work and is in the public domain in the USA. Journal of Forensic Sciences published by Wiley Periodicals, Inc. on behalf of American Academy of Forensic Sciences.

  3. An interactive program for digitization of seabed photographs

    Digital Repository Service at National Institute of Oceanography (India)

    Ramprasad, T.; Sharma, R.

    A program for dignitization of seabed photographs to compute coverage and abundance of polymetallic nodules is developed. Since the objects in the seabed photograph are partially covered by thin sediment layer, the automatic scanning devices may...

  4. Integrating Forensic Science.

    Science.gov (United States)

    Funkhouser, John; Deslich, Barbara J.

    2000-01-01

    Explains the implementation of forensic science in an integrated curriculum and discusses the advantages of this approach. Lists the forensic science course syllabi studied in three high schools. Discusses the unit on polymers in detail. (YDS)

  5. Forensic speaker recognition

    NARCIS (Netherlands)

    Meuwly, Didier

    2013-01-01

    The aim of forensic speaker recognition is to establish links between individuals and criminal activities, through audio speech recordings. This field is multidisciplinary, combining predominantly phonetics, linguistics, speech signal processing, and forensic statistics. On these bases, expert-based

  6. Learning Android forensics

    CERN Document Server

    Tamma, Rohit

    2015-01-01

    If you are a forensic analyst or an information security professional wanting to develop your knowledge of Android forensics, then this is the book for you. Some basic knowledge of the Android mobile platform is expected.

  7. Guidelines for the documentation of digital computer programs - approved 1974

    International Nuclear Information System (INIS)

    Anon.

    1975-01-01

    This standard presents guidelines for the documentation of engineering and scientific computer programs. Good documentation promotes understanding, reduces duplication of effort, eases conversion to different computer environments and aids modification for extended applications. Good documentation is essential for implementation and effective use of programs obtained from other installations. Since the intention of this standard is to encourage better communication between the developer and user, it should be regarded as a guide rather than a set of rigid specifications. As a guide, it is sufficiently comprehensive to apply to large-scale programs intended for extensive external use. Not all features of this document are appropriate in all circumstances. In general, as the project complexity increases so does the need for more complete documentation. An organization may have special documentation requirements which supersede or extend these guidelines. This standard is a revision of ANS-STD.2-1967 and supersedes it

  8. Gender Digital Divide and Challenges in Undergraduate Computer Science Programs

    Science.gov (United States)

    Stoilescu, Dorian; McDougall, Douglas

    2011-01-01

    Previous research revealed a reduced number of female students registered in computer science studies. In addition, the female students feel isolated, have reduced confidence, and underperform. This article explores differences between female and male students in undergraduate computer science programs in a mid-size university in Ontario. Based on…

  9. We Interrupt This Program: Media Theorist Douglas Rushkoff Has Second Thoughts about Our Digital Practices

    Science.gov (United States)

    Rushkoff, Douglas

    2011-01-01

    When asked what Facebook is for, kids will say that it's there to help them make friends. The kids the author celebrated in his early books as "digital natives," capable of seeing through all efforts of big media and marketing, have actually proven less able to discern the integrity of the sources they read and the intentions of the programs they…

  10. Macromodels of digital integrated circuits for program packages of circuit engineering design

    Science.gov (United States)

    Petrenko, A. I.; Sliusar, P. B.; Timchenko, A. P.

    1984-04-01

    Various aspects of the generation of macromodels of digital integrated circuits are examined, and their effective application in program packages of circuit engineering design is considered. Three levels of macromodels are identified, and the application of such models to the simulation of circuit outputs is discussed.

  11. Putting Multiliteracies into Practice: Digital Storytelling for Multilingual Adolescents in a Summer Program

    Science.gov (United States)

    Angay-Crowder, Tuba; Choi, Jayoung; Yi, Youngjoo

    2013-01-01

    In this article we demonstrate how we created a context in which digital storytelling was designed and implemented to teach multilingual middle school students in the summer program sponsored by a local nonprofit organization, the Latin American Association, in a city in the southeastern United States. While implementing the notion of…

  12. A Phenomenological Study of the Lived Experiences of Digital Immigrants in a Fully Online Master's Degree Program

    Science.gov (United States)

    Kieschnick, Stuart

    2012-01-01

    This qualitative study was designed to investigate the challenges encountered and support systems needed by digital immigrants enrolled in an online master's degree program. Participants were digital immigrants who were born before 1980 and enrolled or recently graduated from an online master's degree program. Survey data and demographic data were…

  13. Cross-cultural issues in forensic psychiatry training.

    Science.gov (United States)

    Layde, Joseph B

    2004-01-01

    Forensic psychiatry was officially recognized as a subspecialty by the American Board of Medical Specialties in the 1990's. In 1994, the American Board of Psychiatry and Neurology (ABPN) gave its first written examination to certify forensic psychiatrists. In 1996, the Accreditation Council for Graduate Medical Education (ACGME) began to officially accredit one-year residency experiences in forensic psychiatry, which follow a 4-year residency in general psychiatry. The extra year of training, colloquially known as a fellowship, is required for candidates who wish to receive certification in the subspecialty of forensic psychiatry; since 2001, completion of a year of training in a program accredited by ACGME has been required for candidates wishing to take the ABPN forensic psychiatry subspecialty examination. With the formal recognition of the subspecialty of forensic psychiatry comes the need to examine special issues of cultural importance which apply specifically to forensic psychiatry training. This paper examines the current literature on cross-cultural issues in forensic psychiatry, sets out several of the societal reasons for the importance of emphasizing those issues in forensic psychiatric training, and discusses how those issues are addressed in the curriculum of one forensic psychiatry fellowship at the Medical College of Wisconsin (MCW). While much has been written about cross-cultural issues in general psychiatry, very little has appeared in the literature on the topic of cross-cultural issues in forensic psychiatry.

  14. Nuclear forensics: Soil content

    International Nuclear Information System (INIS)

    Beebe, Merilyn Amy

    2015-01-01

    Nuclear Forensics is a growing field that is concerned with all stages of the process of creating and detonating a nuclear weapon. The main goal is to prevent nuclear attack by locating and securing nuclear material before it can be used in an aggressive manner. This stage of the process is mostly paperwork; laws, regulations, treaties, and declarations made by individual countries or by the UN Security Council. There is some preliminary leg work done in the form of field testing detection equipment and tracking down orphan materials; however, none of these have yielded any spectacular or useful results. In the event of a nuclear attack, the first step is to analyze the post detonation debris to aid in the identification of the responsible party. This aspect of the nuclear forensics process, while reactive in nature, is more scientific. A rock sample taken from the detonation site can be dissolved into liquid form and analyzed to determine its chemical composition. The chemical analysis of spent nuclear material can provide valuable information if properly processed and analyzed. In order to accurately evaluate the results, scientists require information on the natural occurring elements in the detonation zone. From this information, scientists can determine what percentage of the element originated in the bomb itself rather than the environment. To this end, element concentrations in soils from sixty-nine different cities are given, along with activity concentrations for uranium, thorium, potassium, and radium in various building materials. These data are used in the analysis program Python.

  15. Nuclear forensics: Soil content

    Energy Technology Data Exchange (ETDEWEB)

    Beebe, Merilyn Amy [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-08-31

    Nuclear Forensics is a growing field that is concerned with all stages of the process of creating and detonating a nuclear weapon. The main goal is to prevent nuclear attack by locating and securing nuclear material before it can be used in an aggressive manner. This stage of the process is mostly paperwork; laws, regulations, treaties, and declarations made by individual countries or by the UN Security Council. There is some preliminary leg work done in the form of field testing detection equipment and tracking down orphan materials; however, none of these have yielded any spectacular or useful results. In the event of a nuclear attack, the first step is to analyze the post detonation debris to aid in the identification of the responsible party. This aspect of the nuclear forensics process, while reactive in nature, is more scientific. A rock sample taken from the detonation site can be dissolved into liquid form and analyzed to determine its chemical composition. The chemical analysis of spent nuclear material can provide valuable information if properly processed and analyzed. In order to accurately evaluate the results, scientists require information on the natural occurring elements in the detonation zone. From this information, scientists can determine what percentage of the element originated in the bomb itself rather than the environment. To this end, element concentrations in soils from sixty-nine different cities are given, along with activity concentrations for uranium, thorium, potassium, and radium in various building materials. These data are used in the analysis program Python.

  16. An enhanced feature set for pattern recognition based contrast enhancement of contact-less captured latent fingerprints in digitized crime scene forensics

    Science.gov (United States)

    Hildebrandt, Mario; Kiltz, Stefan; Dittmann, Jana; Vielhauer, Claus

    2014-02-01

    In crime scene forensics latent fingerprints are found on various substrates. Nowadays primarily physical or chemical preprocessing techniques are applied for enhancing the visibility of the fingerprint trace. In order to avoid altering the trace it has been shown that contact-less sensors offer a non-destructive acquisition approach. Here, the exploitation of fingerprint or substrate properties and the utilization of signal processing techniques are an essential requirement to enhance the fingerprint visibility. However, especially the optimal sensory is often substrate-dependent. An enhanced generic pattern recognition based contrast enhancement approach for scans of a chromatic white light sensor is introduced in Hildebrandt et al.1 using statistical, structural and Benford's law2 features for blocks of 50 micron. This approach achieves very good results for latent fingerprints on cooperative, non-textured, smooth substrates. However, on textured and structured substrates the error rates are very high and the approach thus unsuitable for forensic use cases. We propose the extension of the feature set with semantic features derived from known Gabor filter based exemplar fingerprint enhancement techniques by suggesting an Epsilon-neighborhood of each block in order to achieve an improved accuracy (called fingerprint ridge orientation semantics). Furthermore, we use rotation invariant Hu moments as an extension of the structural features and two additional preprocessing methods (separate X- and Y Sobel operators). This results in a 408-dimensional feature space. In our experiments we investigate and report the recognition accuracy for eight substrates, each with ten latent fingerprints: white furniture surface, veneered plywood, brushed stainless steel, aluminum foil, "Golden-Oak" veneer, non-metallic matte car body finish, metallic car body finish and blued metal. In comparison to Hildebrandt et al.,1 our evaluation shows a significant reduction of the error rates

  17. Computer Forensics Field Triage Process Model

    Directory of Open Access Journals (Sweden)

    Marcus K. Rogers

    2006-06-01

    Full Text Available With the proliferation of digital based evidence, the need for the timely identification, analysis and interpretation of digital evidence is becoming more crucial. In many investigations critical information is required while at the scene or within a short period of time - measured in hours as opposed to days. The traditional cyber forensics approach of seizing a system(s/media, transporting it to the lab, making a forensic image(s, and then searching the entire system for potential evidence, is no longer appropriate in some circumstances. In cases such as child abductions, pedophiles, missing or exploited persons, time is of the essence. In these types of cases, investigators dealing with the suspect or crime scene need investigative leads quickly; in some cases it is the difference between life and death for the victim(s. The Cyber Forensic Field Triage Process Model (CFFTPM proposes an onsite or field approach for providing the identification, analysis and interpretation of digital evidence in a short time frame, without the requirement of having to take the system(s/media back to the lab for an in-depth examination or acquiring a complete forensic image(s. The proposed model adheres to commonly held forensic principles, and does not negate the ability that once the initial field triage is concluded, the system(s/storage media be transported back to a lab environment for a more thorough examination and analysis. The CFFTPM has been successfully used in various real world cases, and its investigative importance and pragmatic approach has been amply demonstrated. Furthermore, the derived evidence from these cases has not been challenged in the court proceedings where it has been introduced. The current article describes the CFFTPM in detail, discusses the model’s forensic soundness, investigative support capabilities and practical considerations.

  18. Double-digit growth characterizes 1981 nuclear programs abroad

    International Nuclear Information System (INIS)

    Anon.

    1981-01-01

    A 1980 international reactor survey shows a doubling of orders for nuclear power programs outside the US and a nearly 14% increase in nuclear capacity abroad. US manufacturers will not fill any of the 10 new foreign orders of 1980, and they received no new domestic orders. A statistical breakdown lists plants by country, type, net megawatts, year of reactor order, reactor manufacturer, location, date of commercial operation, and primary utility. The report also summarizes fuel-reprocessing and waste-management development in key countries. 1 figure, 1 table

  19. Forensic Science Curriculum for High School Students

    Science.gov (United States)

    Burgess, Christiana J.

    Over the last several decades, forensic science---the application of science to civil and criminal legal matters---has become of increasing popularity with the public. The range of disciplines within the field is immense, offering individuals the potential for a unique career, regardless of their specific interests or expertise. In response to this growth, many organizations, both public and private, have recognized the need to create forensic science programs that strive to maintain and enhance the quality of forensic science education. Unfortunately, most of the emphasis placed on developing these materials relates to post-secondary education, and creates a significant lack of forensic science educational materials available in the U.S., especially in Oklahoma. The purpose of this project was to create a high school curriculum that provides the foundation for building a broad, yet comprehensive, overview of the field of forensic science and its associated disciplines. The overall goal was to create and provide course materials to high school teachers in order to increase their knowledge of forensic science such that they are able to teach its disciplines effectively and with accuracy. The Forensic Science Curriculum for High School Students includes sample lesson plans, PowerPoint presentations, and lab activities with step-by-step instructions.

  20. Thinking forensics: Cognitive science for forensic practitioners.

    Science.gov (United States)

    Edmond, Gary; Towler, Alice; Growns, Bethany; Ribeiro, Gianni; Found, Bryan; White, David; Ballantyne, Kaye; Searston, Rachel A; Thompson, Matthew B; Tangen, Jason M; Kemp, Richard I; Martire, Kristy

    2017-03-01

    Human factors and their implications for forensic science have attracted increasing levels of interest across criminal justice communities in recent years. Initial interest centred on cognitive biases, but has since expanded such that knowledge from psychology and cognitive science is slowly infiltrating forensic practices more broadly. This article highlights a series of important findings and insights of relevance to forensic practitioners. These include research on human perception, memory, context information, expertise, decision-making, communication, experience, verification, confidence, and feedback. The aim of this article is to sensitise forensic practitioners (and lawyers and judges) to a range of potentially significant issues, and encourage them to engage with research in these domains so that they may adapt procedures to improve performance, mitigate risks and reduce errors. Doing so will reduce the divide between forensic practitioners and research scientists as well as improve the value and utility of forensic science evidence. Copyright © 2016 The Chartered Society of Forensic Sciences. Published by Elsevier B.V. All rights reserved.

  1. Using noise inconsistencies for blind image forensics

    Czech Academy of Sciences Publication Activity Database

    Saic, Stanislav; Mahdian, Babak

    2009-01-01

    Roč. 27, č. 10 (2009), s. 1497-1503 ISSN 0262-8856 R&D Projects: GA ČR GA102/08/0470 Institutional research plan: CEZ:AV0Z10750506 Keywords : Image forensics * Digital forgery * Image tampering * Image segmentation Subject RIV: IN - Informatics, Computer Science Impact factor: 1.474, year: 2009 http://library.utia.cas.cz/separaty/2009/ZOI/saic-using%20noise%20inconsistencies%20for%20blind%20image%20forensics.pdf

  2. Forensic nursing in secure environments.

    Science.gov (United States)

    Shelton, Deborah

    2009-01-01

    There are few well-designed studies of corrections or prison nursing roles. This study seeks to describe the corrections or prison role of forensic nurses in the United States who provide care in secure environments. National data detailing the scope of practice in secure environments are limited. This pencil and paper survey describes the roles of 180 forensic nurses from 14 states who work in secure environments. Descriptive statistics are utilized. A repeated measures ANOVA with post hoc analyses was implemented. These nurses were older than average in age, but had 10 years or less experience in forensic nursing practice. Two significant roles emerged to "promote and implement principles that underpin effective quality and practice" and to "assess, develop, implement, and improve programs of care for individuals." Significant roles varied based upon the security classification of the unit or institution in which the nurses were employed. Access to information about these nurses and their nursing practice was difficult in these closed systems. Minimal data are available nationally, indicating a need for collection of additional data over time to examine changes in role. It is through such developments that forensic nursing provided in secure environments will define its specialization and attract the attention it deserves.

  3. Forensic accounting in the fraud auditing case

    Directory of Open Access Journals (Sweden)

    Nataša Simeunović

    2016-11-01

    Full Text Available This paper presents a real case of digital forensic analysis in organizational fraud auditing process investigated using two different forensic tools, namely Tableau TD3 Touch Screen Forensic Imager and Access Data FTK Imager. Fraud auditing is more of a mindset than a methodology and has different approaches from financial auditing. Fraud auditors are mostly focused on exceptions, accounting irregularities, and patterns of their conduct. Financial auditors place special emphasis on the audit trail and material misstatements. A fraud case investigation of non-cash misappropriations committed by an employee, the warehouseman, will be presented herein in order to highlight the usefulness of fraud auditing, which can reveal many forms of financial crime and can be used in both private and public sector companies. Due to the computerized accounting environment, fraud investigation requires a combination of auditing, computer crime and digital forensic investigation skills, which can be achieved through joint efforts and cooperation of both digital investigator and fraud auditor as proposed herein.

  4. A method for digital image registration using a mathematical programming technique

    Science.gov (United States)

    Yao, S. S.

    1973-01-01

    A new algorithm based on a nonlinear programming technique to correct the geometrical distortions of one digital image with respect to another is discussed. This algorithm promises to be superior to existing ones in that it is capable of treating localized differential scaling, translational and rotational errors over the whole image plane. A series of piece-wise 'rubber-sheet' approximations are used, constrained in such a manner that a smooth approximation over the entire image can be obtained. The theoretical derivation is included. The result of using the algorithm to register four channel S065 Apollo IX digitized photography over Imperial Valley, California, is discussed in detail.

  5. Live forensic acquisition as alternative to traditional forensic processes

    CSIR Research Space (South Africa)

    Lessing, M

    2008-09-01

    Full Text Available The development of live forensic acquisition in general presents a remedy for some of the problems introduced by traditional forensic acquisition. However, this live forensic acquisition introduces a variety of additional problems, unique...

  6. Position paper: recommendations for a digital mammography quality assurance program V4.0.

    Science.gov (United States)

    Heggie, J C P; Barnes, P; Cartwright, L; Diffey, J; Tse, J; Herley, J; McLean, I D; Thomson, F J; Grewal, R K; Collins, L T

    2017-09-01

    In 2001 the ACPSEM published a position paper on quality assurance in screen film mammography which was subsequently adopted as a basis for the quality assurance programs of both the Royal Australian and New Zealand College of Radiologists (RANZCR) and of BreastScreen Australia. Since then the clinical implementation of digital mammography has been realised and it has become evident that existing screen-film protocols were not appropriate to assure the required image quality needed for reliable diagnosis or to address the new dose implications resulting from digital technology. In addition, the advantages and responsibilities inherent in teleradiology are most critical in mammography and also need to be addressed. The current document is the result of a review of current overseas practice and local experience in these areas. At this time the technology of digital imaging is undergoing significant development and there is still a lack of full international consensus about some of the detailed quality control (QC) tests that should be included in quality assurance (QA) programs. This document describes the current status in digital mammography QA and recommends test procedures that may be suitable in the Australasian environment. For completeness, this document also includes a review of the QA programs required for the various types of digital biopsy units used in mammography. In the future, international harmonisation of digital quality assurance in mammography and changes in the technology may require a review of this document. Version 2.0 represented the first of these updates and key changes related to image quality evaluation, ghost image evaluation and interpretation of signal to noise ratio measurements. In Version 3.0 some significant changes, made in light of further experience gained in testing digital mammography equipment were introduced. In Version 4.0, further changes have been made, most notably digital breast tomosynthesis (DBT) testing and QC have

  7. Forensic linguistics: Applications of forensic linguistics methods to anonymous letters

    OpenAIRE

    NOVÁKOVÁ, Veronika

    2011-01-01

    The title of my bachelor work is ?Forensic linguistics: Applications of forensic linguistics methods to anonymous letters?. Forensic linguistics is young and not very known branch of applied linguistics. This bachelor work wants to introduce forensic linguistics and its method. The bachelor work has two parts ? theory and practice. The theoretical part informs about forensic linguistics in general. Its two basic aspects utilized in forensic science and respective methods. The practical part t...

  8. Linux malware incident response an excerpt from malware forensic field guide for Linux systems

    CERN Document Server

    Malin, Cameron H; Aquilina, James M

    2013-01-01

    Linux Malware Incident Response is a ""first look"" at the Malware Forensics Field Guide for Linux Systems, exhibiting the first steps in investigating Linux-based incidents. The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a ""toolkit"" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators is presented in a succinct outline format with cross-references to suppleme

  9. Database Application Schema Forensics

    Directory of Open Access Journals (Sweden)

    Hector Quintus Beyers

    2014-12-01

    Full Text Available The application schema layer of a Database Management System (DBMS can be modified to deliver results that may warrant a forensic investigation. Table structures can be corrupted by changing the metadata of a database or operators of the database can be altered to deliver incorrect results when used in queries. This paper will discuss categories of possibilities that exist to alter the application schema with some practical examples. Two forensic environments are introduced where a forensic investigation can take place in. Arguments are provided why these environments are important. Methods are presented how these environments can be achieved for the application schema layer of a DBMS. A process is proposed on how forensic evidence should be extracted from the application schema layer of a DBMS. The application schema forensic evidence identification process can be applied to a wide range of forensic settings.

  10. NEWLIN: A digital computer program for the linearisation of sets of algebraic and first order differential equations

    International Nuclear Information System (INIS)

    Hopkinson, A.

    1969-05-01

    The techniques normally used for linearisation of equations are not amenable to general treatment by digital computation. This report describes a computer program for linearising sets of equations by numerical evaluations of partial derivatives. The program is written so that the specification of the non-linear equations is the same as for the digital simulation program, FIFI, and the linearised equations can be punched out in form suitable for input to the frequency response program FRP2 and the poles and zeros program ZIP. Full instructions for the use of the program are given and a sample problem input and output are shown. (author)

  11. [Profile, competencies and digital fluency of nurses in the Professional Improvement Program].

    Science.gov (United States)

    Tanabe, Lyvia Pini; Kobayashi, Rika Miyahara

    2013-08-01

    A descriptive exploratory study conducted in the city of São Paulo, which aimed to identify the profile, competencies and digital fluency of nurses in the Professional Improvement Program in handling technology at work. The population, composed by 60 nurses in the program, answered a questionnaire with data about profile, digital fluency and professional competencies. The participants were found to be: 95.0% female, 61.7% between 23 and 25 years old, 75.0% from public schools, 58.3% enrolled in cardiovascular nursing, 98.3% had contact with computing resources during graduation, 100.0% had a computer at home, 86.7% accessed the internet daily, 96.7% used Messenger and 58.3% had an intermediate level of knowledge and skill in computing. Professional competencies required for technology management referred to knowing how to be innovative, creative, and updated to identify and manage software and to use technological resources.

  12. Book Review: The X-Ways Forensics Practitioner's Guide

    Directory of Open Access Journals (Sweden)

    Linda Lau

    2014-09-01

    Full Text Available Shavers, B., and Zimmerman, E. (2013. The X-Ways Forensics Practitioner's Guide. Waltham, MA: Syngress, 242 pages. ISBN: 978-0-12-411605-4. Print: US $50.90. Includes exercises, case studies, references, and index. Reviewed by Linda K. Lau, Longwood UniversityBrett Shavers is a former law enforcement officer, a digital forensics examiner, an adjunct instructor, and a frequent speaker at many conferences. After writing his first book, titled Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects, he co-wrote his 2nd book with Eric Zimmerman and Jimmy Weg, who is a knowledgeable technical editor. Both Brett and Eric are experts in cyber forensics, with many years of law enforcement experience at both the state and federal levels.

  13. Impact of digitalization of mammographic units on average glandular doses in the Flemish Breast Cancer Screening Program

    OpenAIRE

    De Hauwere, An; Thierens, Hubert

    2012-01-01

    The impact of digitalization on the average glandular doses in 49 mammographic units participating in the Flemish Breast Cancer Screening Program was studied. Screen-film was changed to direct digital radiography and computed radiography in 25 and 24 departments respectively. Average glandular doses were calculated before and after digitalization for different PMMA-phantom thicknesses and for groups of 50 successive patients. For the transition from screen-film to computed radiography both ph...

  14. The interface between forensic science and technology: how technology could cause a paradigm shift in the role of forensic institutes in the criminal justice system.

    Science.gov (United States)

    Kloosterman, Ate; Mapes, Anna; Geradts, Zeno; van Eijk, Erwin; Koper, Carola; van den Berg, Jorrit; Verheij, Saskia; van der Steen, Marcel; van Asten, Arian

    2015-08-05

    In this paper, the importance of modern technology in forensic investigations is discussed. Recent technological developments are creating new possibilities to perform robust scientific measurements and studies outside the controlled laboratory environment. The benefits of real-time, on-site forensic investigations are manifold and such technology has the potential to strongly increase the speed and efficacy of the criminal justice system. However, such benefits are only realized when quality can be guaranteed at all times and findings can be used as forensic evidence in court. At the Netherlands Forensic Institute, innovation efforts are currently undertaken to develop integrated forensic platform solutions that allow for the forensic investigation of human biological traces, the chemical identification of illicit drugs and the study of large amounts of digital evidence. These platforms enable field investigations, yield robust and validated evidence and allow for forensic intelligence and targeted use of expert capacity at the forensic institutes. This technological revolution in forensic science could ultimately lead to a paradigm shift in which a new role of the forensic expert emerges as developer and custodian of integrated forensic platforms. © 2015 The Author(s) Published by the Royal Society. All rights reserved.

  15. The interface between forensic science and technology: how technology could cause a paradigm shift in the role of forensic institutes in the criminal justice system

    Science.gov (United States)

    Kloosterman, Ate; Mapes, Anna; Geradts, Zeno; van Eijk, Erwin; Koper, Carola; van den Berg, Jorrit; Verheij, Saskia; van der Steen, Marcel; van Asten, Arian

    2015-01-01

    In this paper, the importance of modern technology in forensic investigations is discussed. Recent technological developments are creating new possibilities to perform robust scientific measurements and studies outside the controlled laboratory environment. The benefits of real-time, on-site forensic investigations are manifold and such technology has the potential to strongly increase the speed and efficacy of the criminal justice system. However, such benefits are only realized when quality can be guaranteed at all times and findings can be used as forensic evidence in court. At the Netherlands Forensic Institute, innovation efforts are currently undertaken to develop integrated forensic platform solutions that allow for the forensic investigation of human biological traces, the chemical identification of illicit drugs and the study of large amounts of digital evidence. These platforms enable field investigations, yield robust and validated evidence and allow for forensic intelligence and targeted use of expert capacity at the forensic institutes. This technological revolution in forensic science could ultimately lead to a paradigm shift in which a new role of the forensic expert emerges as developer and custodian of integrated forensic platforms. PMID:26101289

  16. Graduate forensic nursing education: how to better educate nurses to care for this patient population.

    Science.gov (United States)

    Simmons, Barbara

    2014-01-01

    Nurses are often the first healthcare contact for those affected by violence. Despite the impact of violence on healthcare across specialties and ages, forensic nursing content is limited in undergraduate and graduate curricula. The purpose of this article is to provide background on forensic nursing and present a model of a graduate forensic nursing program that can be used as a curriculum guide.

  17. Simulation and Digitization of a Gas Electron Multiplier Detector Using Geant4 and an Object-Oriented Digitization Program

    Science.gov (United States)

    McMullen, Timothy; Liyanage, Nilanga; Xiong, Weizhi; Zhao, Zhiwen

    2017-01-01

    Our research has focused on simulating the response of a Gas Electron Multiplier (GEM) detector using computational methods. GEM detectors provide a cost effective solution for radiation detection in high rate environments. A detailed simulation of GEM detector response to radiation is essential for the successful adaption of these detectors to different applications. Using Geant4 Monte Carlo (GEMC), a wrapper around Geant4 which has been successfully used to simulate the Solenoidal Large Intensity Device (SoLID) at Jefferson Lab, we are developing a simulation of a GEM chamber similar to the detectors currently used in our lab. We are also refining an object-oriented digitization program, which translates energy deposition information from GEMC into electronic readout which resembles the readout from our physical detectors. We have run the simulation with beta particles produced by the simulated decay of a 90Sr source, as well as with a simulated bremsstrahlung spectrum. Comparing the simulation data with real GEM data taken under similar conditions is used to refine the simulation parameters. Comparisons between results from the simulations and results from detector tests will be presented.

  18. Forensic Science Technician

    Science.gov (United States)

    Tech Directions, 2010

    2010-01-01

    Forensic science technicians, also called crime laboratory technicians or police science technicians, help solve crimes. They examine and identify physical evidence to reconstruct a crime scene. This article discusses everything students need to know about careers for forensic science technicians--wages, responsibilities, skills needed, career…

  19. Forensic Toxicology: An Introduction.

    Science.gov (United States)

    Smith, Michael P; Bluth, Martin H

    2016-12-01

    This article presents an overview of forensic toxicology. The authors describe the three components that make up forensic toxicology: workplace drug testing, postmortem toxicology, and human performance toxicology. Also discussed are the specimens that are tested, the methods used, and how the results are interpreted in this particular discipline. Copyright © 2016 Elsevier Inc. All rights reserved.

  20. The Forensics Aspects of Event Data Recorders

    Directory of Open Access Journals (Sweden)

    Jeremy S. Daily

    2008-09-01

    Full Text Available The proper generation and preservation of digital data from Event Data Recorders (EDRs can provide invaluable evidence to automobile crash reconstruction investigations. However, data collected from the EDR can be difficult to use and authenticate, complicating the presentation of such information as evidence in legal proceedings. Indeed, current techniques for removing and preserving such data do not meet the court’s standards for electronic evidence. Experimentation with an EDR unit from a 2001 GMC Sierra pickup truck highlighted particular issues with repeatability of results. Fortunately, advances in the digital forensics field and memory technology can be applied to EDR analysis in order to provide more complete and usable data. The presented issues should assist in the identification and development of a model for forensically sound collection and investigation techniques for EDRs.

  1. Equipment line-up developed for structuring programmed digital systems important to safety

    International Nuclear Information System (INIS)

    Remus, L.; Colling, J.M.; Buisson, J.

    1986-01-01

    The use of the programmed digital techniques in systems important to safety led to developing equipment line-ups which allow to procedure, through using a restricted number of sub-assemblies, a variety of facilities capable of performing diversified functions. Upon remembering the requirements that such equipment are required to meet (quality assurance both at the design and production stages, qualification, testing opportunities, etc.) the equipments produced by MERLIN GERIN are described in this paper. Such equipments include a whole set of printed circuit boards, plug-in units with self-engaging connectors and the related cabinets to accomodate them. The following systems are made up of such equipments: Digital integrated protection system; Rod control and monitoring system; Reactor power distribution monitoring equipment. This equipment line-up has been gradually complemented and is still further expanding both as a result of the component further development or for the purpose of meeting new requirements or applications (new digital neutron instrumentation, local area networks). Experience gained thus far provides us with the capability of working out in a short time programmed systems for further applications in the nuclear power field

  2. PCR in forensic genetics

    DEFF Research Database (Denmark)

    Morling, Niels

    2009-01-01

    Since the introduction in the mid-1980s of analyses of minisatellites for DNA analyses, a revolution has taken place in forensic genetics. The subsequent invention of the PCR made it possible to develop forensic genetics tools that allow both very informative routine investigations and still more...... and more advanced, special investigations in cases concerning crime, paternity, relationship, disaster victim identification etc. The present review gives an update on the use of DNA investigations in forensic genetics.......Since the introduction in the mid-1980s of analyses of minisatellites for DNA analyses, a revolution has taken place in forensic genetics. The subsequent invention of the PCR made it possible to develop forensic genetics tools that allow both very informative routine investigations and still more...

  3. Readiness for Delivering Digital Health at Scale: Lessons From a Longitudinal Qualitative Evaluation of a National Digital Health Innovation Program in the United Kingdom

    Science.gov (United States)

    Lennon, Marilyn R; Bouamrane, Matt-Mouley; Devlin, Alison M; O'Connor, Siobhan; O'Donnell, Catherine; Chetty, Ula; Agbakoba, Ruth; Bikker, Annemieke; Grieve, Eleanor; Finch, Tracy; Watson, Nicholas; Wyke, Sally

    2017-01-01

    Background Digital health has the potential to support care delivery for chronic illness. Despite positive evidence from localized implementations, new technologies have proven slow to become accepted, integrated, and routinized at scale. Objective The aim of our study was to examine barriers and facilitators to implementation of digital health at scale through the evaluation of a £37m national digital health program: ‟Delivering Assisted Living Lifestyles at Scale” (dallas) from 2012-2015. Methods The study was a longitudinal qualitative, multi-stakeholder, implementation study. The methods included interviews (n=125) with key implementers, focus groups with consumers and patients (n=7), project meetings (n=12), field work or observation in the communities (n=16), health professional survey responses (n=48), and cross program documentary evidence on implementation (n=215). We used a sociological theory called normalization process theory (NPT) and a longitudinal (3 years) qualitative framework analysis approach. This work did not study a single intervention or population. Instead, we evaluated the processes (of designing and delivering digital health), and our outcomes were the identified barriers and facilitators to delivering and mainstreaming services and products within the mixed sector digital health ecosystem. Results We identified three main levels of issues influencing readiness for digital health: macro (market, infrastructure, policy), meso (organizational), and micro (professional or public). Factors hindering implementation included: lack of information technology (IT) infrastructure, uncertainty around information governance, lack of incentives to prioritize interoperability, lack of precedence on accountability within the commercial sector, and a market perceived as difficult to navigate. Factors enabling implementation were: clinical endorsement, champions who promoted digital health, and public and professional willingness. Conclusions

  4. Readiness for Delivering Digital Health at Scale: Lessons From a Longitudinal Qualitative Evaluation of a National Digital Health Innovation Program in the United Kingdom.

    Science.gov (United States)

    Lennon, Marilyn R; Bouamrane, Matt-Mouley; Devlin, Alison M; O'Connor, Siobhan; O'Donnell, Catherine; Chetty, Ula; Agbakoba, Ruth; Bikker, Annemieke; Grieve, Eleanor; Finch, Tracy; Watson, Nicholas; Wyke, Sally; Mair, Frances S

    2017-02-16

    Digital health has the potential to support care delivery for chronic illness. Despite positive evidence from localized implementations, new technologies have proven slow to become accepted, integrated, and routinized at scale. The aim of our study was to examine barriers and facilitators to implementation of digital health at scale through the evaluation of a £37m national digital health program: ‟Delivering Assisted Living Lifestyles at Scale" (dallas) from 2012-2015. The study was a longitudinal qualitative, multi-stakeholder, implementation study. The methods included interviews (n=125) with key implementers, focus groups with consumers and patients (n=7), project meetings (n=12), field work or observation in the communities (n=16), health professional survey responses (n=48), and cross program documentary evidence on implementation (n=215). We used a sociological theory called normalization process theory (NPT) and a longitudinal (3 years) qualitative framework analysis approach. This work did not study a single intervention or population. Instead, we evaluated the processes (of designing and delivering digital health), and our outcomes were the identified barriers and facilitators to delivering and mainstreaming services and products within the mixed sector digital health ecosystem. We identified three main levels of issues influencing readiness for digital health: macro (market, infrastructure, policy), meso (organizational), and micro (professional or public). Factors hindering implementation included: lack of information technology (IT) infrastructure, uncertainty around information governance, lack of incentives to prioritize interoperability, lack of precedence on accountability within the commercial sector, and a market perceived as difficult to navigate. Factors enabling implementation were: clinical endorsement, champions who promoted digital health, and public and professional willingness. Although there is receptiveness to digital health

  5. In defense of forensic social science

    Directory of Open Access Journals (Sweden)

    Amir Goldberg

    2015-11-01

    Full Text Available Like the navigation tools that freed ancient sailors from the need to stay close to the shoreline—eventually affording the discovery of new worlds—Big Data might open us up to new sociological possibilities by freeing us from the shackles of hypothesis testing. But for that to happen we need forensic social science: the careful compilation of evidence from unstructured digital traces as a means to generate new theories.

  6. A minimax technique for time-domain design of preset digital equalizers using linear programming

    Science.gov (United States)

    Vaughn, G. L.; Houts, R. C.

    1975-01-01

    A linear programming technique is presented for the design of a preset finite-impulse response (FIR) digital filter to equalize the intersymbol interference (ISI) present in a baseband channel with known impulse response. A minimax technique is used which minimizes the maximum absolute error between the actual received waveform and a specified raised-cosine waveform. Transversal and frequency-sampling FIR digital filters are compared as to the accuracy of the approximation, the resultant ISI and the transmitted energy required. The transversal designs typically have slightly better waveform accuracy for a given distortion; however, the frequency-sampling equalizer uses fewer multipliers and requires less transmitted energy. A restricted transversal design is shown to use the least number of multipliers at the cost of a significant increase in energy and loss of waveform accuracy at the receiver.

  7. Challenges in applying the ACPO principles in cloud forensic investigations

    Directory of Open Access Journals (Sweden)

    Harjinder Singh Lallie

    2012-03-01

    Full Text Available The numerous advantages offered by cloud computing has fuelled its growth and has made it one of the most significant of current computing trends. The same advantages have created complex issues for those conducting digital forensic investigations. Digital forensic investigators rely on the ACPO guidelines when conducting an investigation, however the guidelines make no reference to some of the issues presented by cloud investigations.This study investigates the impact of cloud computing on ACPO’s core principles and asks whether there is a need for the principles and guidelines to be reviewed to address the issues presented by cloud computing. Empirical research is conducted and data collected from key experts in the field of digital forensics.This research presents several key findings: there is a very real concern for how cloud computing will affect digital forensic investigations; the ACPO principles cannot easily be applied in all cloud investigations but are generally sufficient for cloud computing forensic investigations. However the advent of cloud computing is a significant development in technology and may in the near future warrant a review of the guidelines in particular to incorporate the involvement of third parties in cloud investigations.

  8. RELIEVE: A FORTRAN 77 program for numerical and graphical processing of digital topographic maps

    International Nuclear Information System (INIS)

    Sanchez, J.J.; Gorostiza, C.

    1995-01-01

    The RELIEVE program was developed in order to its integration with the expert system SIRENAS, in the frame of the Industrial Risks Programme, within the CIEMAT center. For accomplishing this mentioned system, arose the necessity of an additional component enabled for analyzing the topography (relieve) of the territory in which the focused site is located. That is just the mission of the RELIEVE program. Basically RELIEVE analyses the digitalized data points of a determinate topographic area, around a location of interest. The program allows us estimation by numerical techniques, using IMSL library, of the deep width, and other geometrical characteristics of the valley that is involved in. Optionally RELIEVE produces also graphical outputs concerning 3D representation of topographical map, level curves, sections of interest considered in the valley, etc., by means of the DISSPLA II library, running in the IBM system of the CIEMAT. (Author) 5 refs

  9. Forensic Mass Spectrometry

    Science.gov (United States)

    Hoffmann, William D.; Jackson, Glen P.

    2015-07-01

    Developments in forensic mass spectrometry tend to follow, rather than lead, the developments in other disciplines. Examples of techniques having forensic potential born independently of forensic applications include ambient ionization, imaging mass spectrometry, isotope ratio mass spectrometry, portable mass spectrometers, and hyphenated chromatography-mass spectrometry instruments, to name a few. Forensic science has the potential to benefit enormously from developments that are funded by other means, if only the infrastructure and personnel existed to adopt, validate, and implement the new technologies into casework. Perhaps one unique area in which forensic science is at the cutting edge is in the area of chemometrics and the determination of likelihood ratios for the evaluation of the weight of evidence. Such statistical techniques have been developed most extensively for ignitable-liquid residue analyses and isotope ratio analysis. This review attempts to capture the trends, motivating forces, and likely impact of developing areas of forensic mass spectrometry, with the caveat that none of this research is likely to have any real impact in the forensic community unless: (a) The instruments developed are turned into robust black boxes with red and green lights for positives and negatives, respectively, or (b) there are PhD graduates in the workforce who can help adopt these sophisticated techniques.

  10. Intelligent wireless forensic model (IWFM) for moving devices between wireless networks

    CSIR Research Space (South Africa)

    Ngobeni, SJ

    2008-09-01

    Full Text Available Donald, Forensic Analysis of the Contents of Nokia Mobile Phones, 2006, Pp 1-4. [3] W.G. Kruse and J.G. Heiser, Computer Forensics, Incident response essentials, Addison-Wesley, Boston, 2001. [4] M. Kohn, J.H.P. Eloff, M. Olivier, Framework for a Digital...

  11. Forensic DNA testing.

    Science.gov (United States)

    Butler, John M

    2011-12-01

    Forensic DNA testing has a number of applications, including parentage testing, identifying human remains from natural or man-made disasters or terrorist attacks, and solving crimes. This article provides background information followed by an overview of the process of forensic DNA testing, including sample collection, DNA extraction, PCR amplification, short tandem repeat (STR) allele separation and sizing, typing and profile interpretation, statistical analysis, and quality assurance. The article concludes with discussions of possible problems with the data and other forensic DNA testing techniques.

  12. Virtual reality and 3D animation in forensic visualization.

    Science.gov (United States)

    Ma, Minhua; Zheng, Huiru; Lallie, Harjinder

    2010-09-01

    Computer-generated three-dimensional (3D) animation is an ideal media to accurately visualize crime or accident scenes to the viewers and in the courtrooms. Based upon factual data, forensic animations can reproduce the scene and demonstrate the activity at various points in time. The use of computer animation techniques to reconstruct crime scenes is beginning to replace the traditional illustrations, photographs, and verbal descriptions, and is becoming popular in today's forensics. This article integrates work in the areas of 3D graphics, computer vision, motion tracking, natural language processing, and forensic computing, to investigate the state-of-the-art in forensic visualization. It identifies and reviews areas where new applications of 3D digital technologies and artificial intelligence could be used to enhance particular phases of forensic visualization to create 3D models and animations automatically and quickly. Having discussed the relationships between major crime types and level-of-detail in corresponding forensic animations, we recognized that high level-of-detail animation involving human characters, which is appropriate for many major crime types but has had limited use in courtrooms, could be useful for crime investigation. © 2010 American Academy of Forensic Sciences.

  13. Physics and forensics

    International Nuclear Information System (INIS)

    Wilkinson, T.J.; Perry, D.L.; Martin, M.C.; McKinney, W.R.

    2001-01-01

    This popular article in Physics World reviews the application of Fourier Transform Infrared Spectromicroscopy to Forensics, and predicts further applications due to the high inherent signal to noise available for FTIR microscopy at synchrotron sources

  14. SNOW: a digital computer program for the simulation of ion beam devices

    International Nuclear Information System (INIS)

    Boers, J.E.

    1980-08-01

    A digital computer program, SNOW, has been developed for the simulation of dense ion beams. The program simulates the plasma expansion cup (but not the plasma source itself), the acceleration region, and a drift space with neutralization if desired. The ion beam is simulated by computing representative trajectories through the device. The potentials are simulated on a large rectangular matrix array which is solved by iterative techniques. Poisson's equation is solved at each point within the configuration using space-charge densities computed from the ion trajectories combined with background electron and/or ion distributions. The simulation methods are described in some detail along with examples of both axially-symmetric and rectangular beams. A detailed description of the input data is presented

  15. Digitizing geographic data with GRIDOT; a generalized program for drawing overlay grids in various map projections

    International Nuclear Information System (INIS)

    Edwards, R.G.; Durfee, R.C.

    1976-09-01

    The GRIDOT computer program draws overlay grids on a Calcomp plotter for use in digitizing information from maps, rectified aerial photographs, and other sources of spatially distributed data related to regional environmental problems. The options of the program facilitate use of the overlays with standard maps and map projections of the continental United States. The overlay grid may be defined as a latitude-longitude grid (geodetic grid), a Universal Transverse Mercator Grid, or one of the standard state-plane coordinate system grids. The map for which the overlay is intended may be in an Albers Equal Area projection, a Lambert Conformal projection, a Polyconic projection, a Transverse Mercator projection, a Universal Transverse Mercator projection, or any of the standard state-plane projections

  16. What is nuclear forensics?

    International Nuclear Information System (INIS)

    Halevy, Itzhak

    2014-01-01

    Nuclear forensics is the investigation of nuclear materials to find evidence for example the source, the trafficking, and the enrichment of the material. The material can be recovered from various sources including dust from the vicinity of a nuclear facility, or from the radioactive debris following a nuclear explosion. Results of nuclear forensic testing are used by different organizations to make decisions. The information is typically combined with other sources of information such as law enforcement and intelligence information

  17. Mac OS X Forensics

    Science.gov (United States)

    Craiger, Philip; Burke, Paul

    This paper describes procedures for conducting forensic examinations of Apple Macs running Mac OS X. The target disk mode is used to create a forensic duplicate of a Mac hard drive and preview it. Procedures are discussed for recovering evidence from allocated space, unallocated space, slack space and virtual memory. Furthermore, procedures are described for recovering trace evidence from Mac OS X default email, web browser and instant messaging applications, as well as evidence pertaining to commands executed from a terminal.

  18. Research in computer forensics

    OpenAIRE

    Wai, Hor Cheong

    2002-01-01

    Approved for public release; distribution is unlimited Computer Forensics involves the preservation, identification, extraction and documentation of computer evidence stored in the form of magnetically encoded information. With the proliferation of E-commerce initiatives and the increasing criminal activities on the web, this area of study is catching on in the IT industry and among the law enforcement agencies. The objective of the study is to explore the techniques of computer forensics ...

  19. A PLC platform-independent structural analysis on FBD programs for digital reactor protection systems

    International Nuclear Information System (INIS)

    Jung, Sejin; Yoo, Junbeom; Lee, Young-Jun

    2017-01-01

    Highlights: • FBD has been widely used to implement safety-critical software for PLC-based systems. • The safety-critical software should be developed strictly with safety programming guidelines. • There are no argued rules that have specific links to higher guidelines NUREG/CR-6463 PLC platform-independently. • This paper proposes a set of rules on the structure of FBD programs with providing specific links to higher guidelines. • This paper also provides CASE tool ‘FBD Checker’ for analyzing the structure of FBD. - Abstract: FBD (function block diagram) has been widely used to implement safety-critical software for PLC (programmable logic controller)-based digital nuclear reactor protection systems. The software should be developed strictly in accordance with safety programming guidelines such as NUREG/CR-6463. Software engineering tools of PLC vendors enable us to present structural analyses using FBD programs, but specific rules pertaining to the guidelines are enclosed within the commercial tools, and specific links to the guidelines are not clearly communicated. This paper proposes a set of rules on the structure of FBD programs in accordance with guidelines, and we develop an automatic analysis tool for FBD programs written in the PLCopen TC6 format. With the proposed tool, any FBD program that is transformed into an open format can be analyzed the PLC platform-independently. We consider a case study on FBD programs obtained from a preliminary version of a Korean nuclear power plant, and we demonstrate the effectiveness and potential of the proposed rules and analysis tool.

  20. Solution to Detect, Classify, and Report Illicit Online Marketing and Sales of Controlled Substances via Twitter: Using Machine Learning and Web Forensics to Combat Digital Opioid Access

    Science.gov (United States)

    Klugman, Josh; Kuzmenko, Ella; Gupta, Rashmi

    2018-01-01

    Background On December 6 and 7, 2017, the US Department of Health and Human Services (HHS) hosted its first Code-a-Thon event aimed at leveraging technology and data-driven solutions to help combat the opioid epidemic. The authors—an interdisciplinary team from academia, the private sector, and the US Centers for Disease Control and Prevention—participated in the Code-a-Thon as part of the prevention track. Objective The aim of this study was to develop and deploy a methodology using machine learning to accurately detect the marketing and sale of opioids by illicit online sellers via Twitter as part of participation at the HHS Opioid Code-a-Thon event. Methods Tweets were collected from the Twitter public application programming interface stream filtered for common prescription opioid keywords in conjunction with participation in the Code-a-Thon from November 15, 2017 to December 5, 2017. An unsupervised machine learning–based approach was developed and used during the Code-a-Thon competition (24 hours) to obtain a summary of the content of the tweets to isolate those clusters associated with illegal online marketing and sale using a biterm topic model (BTM). After isolating relevant tweets, hyperlinks associated with these tweets were reviewed to assess the characteristics of illegal online sellers. Results We collected and analyzed 213,041 tweets over the course of the Code-a-Thon containing keywords codeine, percocet, vicodin, oxycontin, oxycodone, fentanyl, and hydrocodone. Using BTM, 0.32% (692/213,041) tweets were identified as being associated with illegal online marketing and sale of prescription opioids. After removing duplicates and dead links, we identified 34 unique “live” tweets, with 44% (15/34) directing consumers to illicit online pharmacies, 32% (11/34) linked to individual drug sellers, and 21% (7/34) used by marketing affiliates. In addition to offering the “no prescription” sale of opioids, many of these vendors also sold other

  1. The Rise of Forensic Pathology in Human Medicine: Lessons for Veterinary Forensic Pathology.

    Science.gov (United States)

    Pollanen, M S

    2016-09-01

    The rise of forensic pathology in human medicine has greatly contributed to the administration of justice, public safety and security, and medical knowledge. However, the evolution of human forensic pathology has been challenging. Veterinary forensic pathologists can learn from some of the lessons that have informed the growth and development of human forensic pathology. Three main observations have emerged in the past decade. First, wrongful convictions tell us to use a truth-seeking stance rather than an a priori "think dirty" stance when investigating obscure death. Second, missed homicides and concealed homicides tell us that training and certification are the beginning of reliable forensic pathology. Third, failure of a sustainable institutional arrangement that fosters a combination of service, research, and teaching will lead to stagnation of knowledge. Forensic pathology of humans and animals will flourish, help protect society, and support justice if we embrace a modern biomedical scientific model for our practice. We must build training programs, contribute to the published literature, and forge strong collaborative institutions. © The Author(s) 2016.

  2. The international development of forensic science standards - A review.

    Science.gov (United States)

    Wilson-Wilde, Linzi

    2018-04-16

    Standards establish specifications and procedures designed to ensure products, services and systems are safe, reliable and consistently perform as intended. Standards can be used in the accreditation of forensic laboratories or facilities and in the certification of products and services. In recent years there have been various international activities aiming at developing forensic science standards and guidelines. The most significant initiative currently underway within the global forensic community is the development of International Organization for Standardization (ISO) standards. This paper reviews the main bodies working on standards for forensic science, the processes used and the implications for accreditation. This paper specifically discusses the work of ISO Technical Committee TC272, the future TC272 work program for the development of forensic science standards and associated timelines. Also discussed, are the lessons learnt to date in navigating the complex environment of multi-country stakeholder deliberations in standards development. Crown Copyright © 2018. Published by Elsevier B.V. All rights reserved.

  3. Solution to Detect, Classify, and Report Illicit Online Marketing and Sales of Controlled Substances via Twitter: Using Machine Learning and Web Forensics to Combat Digital Opioid Access.

    Science.gov (United States)

    Mackey, Tim; Kalyanam, Janani; Klugman, Josh; Kuzmenko, Ella; Gupta, Rashmi

    2018-04-27

    On December 6 and 7, 2017, the US Department of Health and Human Services (HHS) hosted its first Code-a-Thon event aimed at leveraging technology and data-driven solutions to help combat the opioid epidemic. The authors—an interdisciplinary team from academia, the private sector, and the US Centers for Disease Control and Prevention—participated in the Code-a-Thon as part of the prevention track. The aim of this study was to develop and deploy a methodology using machine learning to accurately detect the marketing and sale of opioids by illicit online sellers via Twitter as part of participation at the HHS Opioid Code-a-Thon event. Tweets were collected from the Twitter public application programming interface stream filtered for common prescription opioid keywords in conjunction with participation in the Code-a-Thon from November 15, 2017 to December 5, 2017. An unsupervised machine learning–based approach was developed and used during the Code-a-Thon competition (24 hours) to obtain a summary of the content of the tweets to isolate those clusters associated with illegal online marketing and sale using a biterm topic model (BTM). After isolating relevant tweets, hyperlinks associated with these tweets were reviewed to assess the characteristics of illegal online sellers. We collected and analyzed 213,041 tweets over the course of the Code-a-Thon containing keywords codeine, percocet, vicodin, oxycontin, oxycodone, fentanyl, and hydrocodone. Using BTM, 0.32% (692/213,041) tweets were identified as being associated with illegal online marketing and sale of prescription opioids. After removing duplicates and dead links, we identified 34 unique “live” tweets, with 44% (15/34) directing consumers to illicit online pharmacies, 32% (11/34) linked to individual drug sellers, and 21% (7/34) used by marketing affiliates. In addition to offering the “no prescription” sale of opioids, many of these vendors also sold other controlled substances and illicit drugs

  4. [Research Progress on Forensic Dentistry].

    Science.gov (United States)

    Liu, F; Dang, Y H

    2017-04-01

    Forensic dentistry is an interdiscipline of forensic medicine and stomatology, which provides legal information by collecting, testing and assessing the dental evidence scientifically. In this review, the present application of forensic dentistry has been described, such as the estimation of age, sex, species, occupation and living habit, as well as the identification of individual, domestic violence or abuse, which aims to enrich and improve forensic dentistry for making it be more useful in forensic medicine even in juridical practice. Copyright© by the Editorial Department of Journal of Forensic Medicine.

  5. Judges Awareness, Understanding, and Application of Digital Evidence

    OpenAIRE

    Gary C Kessler

    2011-01-01

    As digital evidence grows in both volume and importance in criminal and civil courts, judges need to fairly and justly evaluate the merits of the offered evidence. To do so, judges need a general understanding of the underlying technologies and applications from which digital evidence is derived. Due to the relative newness of the computer forensics field, there have been few studies on the use of digital forensic evidence and none about judges’ relationship with digital evidence.This paper d...

  6. Forensic seismology revisited

    Science.gov (United States)

    Douglas, A.

    2007-01-01

    screening criteria, only about 50% of earthquakes can be positively identified as such. Various methods have been proposed whereby a “determined violator” could avoid the provisions of a CTBT and carry out a test that would be either undetected or detected but not identified as an explosion. The increase in complexity and cost of such a test should discourage any State from attempting it. In addition, there is always the possibility of some stations detecting the test, the test being identified as suspicious, and so subject to an OSI. With time as the IMS becomes more efficient and effective it will act increasingly to deter anyone contemplating a clandestine test, from going ahead. What has emerged is several robust criteria. The criteria include: location, which when combined with hydro-acoustic data can identify earthquakes under the sea; m b : M s; and depth of focus. More detailed study is required of any remaining seismic disturbance that is regarded as suspicious: for example, is close to a site where nuclear tests have been carried out in the past. Any disturbance that is shown to be explosion-like, may be the subject of an OSI. One surprise is how little plate tectonics has contributed to resolving problems in forensic seismology. Much of the evidence for plate tectonics comes from seismological studies so it would be expected that the implications for Earth structure arising from forensic seismology would be consistent with plate-tectonic models. So far the AWE Group have found little synergy between plate tectonics and forensic seismology. It is to be hoped that the large volume of seismological data of high quality now being collected by the IMS and the increasing number of digital stations, will result in a revised Earth model that is consistent with the findings of forensic seismology, so that a future review of progress will show that the forensic seismologist can draw on this model in attempting to interpret apparently anomalous seismograms.

  7. Digital health intervention as an adjunct to a workplace health program in hypertension.

    Science.gov (United States)

    Senecal, Conor; Widmer, R Jay; Johnson, Matthew P; Lerman, Lilach O; Lerman, Amir

    2018-05-30

    Hypertension is a common and difficult-to-treat condition; digital health tools may serve as adjuncts to traditional pharmaceutical and lifestyle-based interventions. Using a retrospective observational study we sought to evaluate the effect of a desktop and mobile digital health intervention (DHI) as an adjunct to a workplace health program in those previously diagnosed with hypertension. As part of a workplace health program, 3330 patients were identified as previously diagnosed with hypertension. A DHI was made available to participants providing motivational and educational materials assisting in the management of hypertension. We evaluated changes in blood pressure, weight, and body mass index (BMI) between users and nonusers based on login frequency to the DHI using multivariate regression through the five visits over the course of 1 year. One thousand six hundred twenty-two (49%) participants logged into the application at least once. DHI users had significant greater improvements in systolic blood pressure (SBP; -2.79 mm Hg), diastolic blood pressure (-2.12 mm Hg), and BMI (-0.23 kg/m 2 ) at 1 year. Increased login frequency was significantly correlated with reductions in SBP, diastolic blood pressure, weight, and BMI (P ≤ .014). This large, observational study provides evidence that a DHI as an adjunct to a workplace health program is associated with greater improvement in blood pressure and BMI at 1 year. This study adds to the growing body of evidence that DHIs may be useful in augmenting the treatment of hypertension in addition to traditional management with pharmaceuticals and lifestyle changes. Copyright © 2018 American Heart Association. Published by Elsevier Inc. All rights reserved.

  8. An Evidence-Based Forensic Taxonomy of Windows Phone Communication Apps.

    Science.gov (United States)

    Cahyani, Niken Dwi Wahyu; Martini, Ben; Choo, Kim-Kwang Raymond; Ab Rahman, Nurul Hidayah; Ashman, Helen

    2018-05-01

    Communication apps can be an important source of evidence in a forensic investigation (e.g., in the investigation of a drug trafficking or terrorism case where the communications apps were used by the accused persons during the transactions or planning activities). This study presents the first evidence-based forensic taxonomy of Windows Phone communication apps, using an existing two-dimensional Android forensic taxonomy as a baseline. Specifically, 30 Windows Phone communication apps, including Instant Messaging (IM) and Voice over IP (VoIP) apps, are examined. Artifacts extracted using physical acquisition are analyzed, and seven digital evidence objects of forensic interest are identified, namely: Call Log, Chats, Contacts, Locations, Installed Applications, SMSs and User Accounts. Findings from this study would help to facilitate timely and effective forensic investigations involving Windows Phone communication apps. © 2017 American Academy of Forensic Sciences.

  9. Defense Forensics: Additional Planning and Oversight Needed to Establish an Enduring Expeditionary Forensic Capability

    Science.gov (United States)

    2013-06-01

    forensic pathology, forensic anthropology, and forensic toxicology . 13DOD’s forensic directive defines DOD components as the Office of the...DEFENSE FORENSICS Additional Planning and Oversight Needed to Establish an Enduring Expeditionary Forensic ...COVERED 00-00-2013 to 00-00-2013 4. TITLE AND SUBTITLE Defense Forensics : Additional Planning and Oversight Needed to Establish an Enduring

  10. Blurriness in Live Forensics: An Introduction

    Science.gov (United States)

    Savoldi, Antonio; Gubian, Paolo

    The Live Forensics discipline aims at answering basic questions related to a digital crime, which usually involves a computer-based system. The investigation should be carried out with the very goal to establish which processes were running, when they were started and by whom, what specific activities those processes were doing and the state of active network connections. Besides, a set of tools needs to be launched on the running system by altering, as a consequence of the Locard’s exchange principle [2], the system’s memory. All the methodologies for the live forensics field proposed until now have a basic, albeit important, weakness, which is the inability to quantify the perturbation, or blurriness, of the system’s memory of the investigated computer. This is the very last goal of this paper: to provide a set of guidelines which can be effectively used for measuring the uncertainty of the collected volatile memory on a live system being investigated.

  11. Understanding digital storytelling: individual ‘voice’ and community-building in youth media programs

    Directory of Open Access Journals (Sweden)

    Aneta Podkalicka

    2010-11-01

    Full Text Available Digital storytelling (DST has been widely used as a means of empowerment for marginalised voices across community-based projects worldwide. This paper discusses uses but also limitations of the practice in the context of a Melbourne-based youth media program for ‘youth at risk’ called YouthWorx. Based on our ongoing, long-term ethnographic research, we explore the cultural production of digital stories as a co-creative process that exposes a range of controversies to do with the politics of ‘voice’, genre’s communicative potential and ethical considerations. Concrete examples from YouthWorx’s pedagogical work serve to illustrate the values of self-expression (‘voice’, critical reflection and collaboration that form part of broader social transformations generated by these creative practices. The critique of DST practice offered here connects with existing studies concerned with the socially contextualised processes of media education, and the theoretical shift beyond ‘the right to speak’ towards ‘the right to be understood’ (Husband, 2009. The paper recommends more analytical attention be paid to a dynamic social process of learning (of media, interpersonal competencies and community-building, extending beyond the immediate DST situation, rather than narrowing the focus on end-result atomised media products.

  12. Digital forensic framework for a cloud environment

    CSIR Research Space (South Africa)

    Sibiya, G

    2012-05-01

    Full Text Available crimes that can be committed in the cloud include unauthorized access to resources in the cloud, money laundering, distributed denial of services attacks, storage of pirated software, music, movies, etc. In this section, two scenarios of criminal...

  13. Smartphones as distributed witnesses for digital forensics

    CSIR Research Space (South Africa)

    Pieterse, H

    2014-01-01

    Full Text Available Smartphones have become an integral part of people's lives during the last few years. Their wide range of capabilities and support of additional applications cause a wealth of information to be stored on these devices. Although tools are available...

  14. Forensic Analysis of Digital Image Tampering

    Science.gov (United States)

    2004-12-01

    analysis of when each method fails, which Chapter 4 discusses. Finally, a test image containing an invisible watermark using LSB steganography is...2.2 – Example of invisible watermark using Steganography Software F5 ............. 8 Figure 2.3 – Example of copy-move image forgery [12...used to embed the hidden watermark is Steganography Software F5 version 11+ discussed in Section 2.2. Original JPEG Image – 580 x 435 – 17.4

  15. A Framework for Automated Digital Forensic Reporting

    Science.gov (United States)

    2009-03-01

    unknown or not yet analyzed identities. We created a hotmail and gmail account for each user account, for a total of 6 email accounts. After the user...log in, and immediately went online to create communication paths. Using Mozilla Firefox, domexuser1 created a hotmail account, a gmail account, a

  16. A forensic readiness model for Wireless Local Area Networks

    CSIR Research Space (South Africa)

    Ngobeni, S

    2010-01-01

    Full Text Available of cyber crime, where criminals deliberately and actively break into WLANs with the intent to cause harm or access sensitive information. WLAN digital forensics is seen not only as a response to cyber crime in wireless environments, but also as a means...

  17. Judges Awareness, Understanding, and Application of Digital Evidence

    Directory of Open Access Journals (Sweden)

    Gary C Kessler

    2011-03-01

    Full Text Available As digital evidence grows in both volume and importance in criminal and civil courts, judges need to fairly and justly evaluate the merits of the offered evidence. To do so, judges need a general understanding of the underlying technologies and applications from which digital evidence is derived. Due to the relative newness of the computer forensics field, there have been few studies on the use of digital forensic evidence and none about judges’ relationship with digital evidence.This paper describes a recent study, using grounded theory methods, into judges’ awareness, knowledge, and perceptions of digital evidence. This study is the first in the U.S. to examine judges and digital forensics, thus opening up a new avenue of research. It is the second time that grounded theory has been employed in a published digital forensics study, demonstrating the applicability of that methodology to this discipline.

  18. Forensic psychiatry in Singapore.

    Science.gov (United States)

    Chan, Lai Gwen; Tomita, Todd

    2013-12-01

    Singapore is a geographically small nation-state that has transformed itself from a third-world country to a developed nation after attaining political independence 46 years ago. The pace of change has been tremendous and mental health care is no exception. This paper provides an overview of mental health care and a review of key mental health legislation, including a National Mental Health Blueprint that was rolled out in 2007. On this background, the paper focuses on a description of forensic psychiatric services in Singapore. The role of the Department of Forensic Psychiatry at the Institute of Mental Health, which is the only forensic psychiatry department in the country, will be highlighted. Civil commitment and the treatment of unfit accused persons and insanity acquittees is reviewed. The role of forensic psychiatric assessments in the Singapore courts is examined. The application of the insanity and diminished responsibility defenses are reviewed. A trend is identified in the Singapore courts towards a more rehabilitation-focused sentencing approach and the role that forensic psychiatric assessments play in cases involving mentally disordered offenders is highlighted. Copyright © 2013 Wiley Publishing Asia Pty Ltd.

  19. A TRUSTWORTHY CLOUD FORENSICS ENVIRONMENT

    OpenAIRE

    Zawoad , Shams; Hasan , Ragib

    2015-01-01

    Part 5: CLOUD FORENSICS; International audience; The rapid migration from traditional computing and storage models to cloud computing environments has made it necessary to support reliable forensic investigations in the cloud. However, current cloud computing environments often lack support for forensic investigations and the trustworthiness of evidence is often questionable because of the possibility of collusion between dishonest cloud providers, users and forensic investigators. This chapt...

  20. Development of a Bi-Disciplinary Course in Forensic Science

    Directory of Open Access Journals (Sweden)

    Stacey L. Raimondi

    2013-08-01

    Full Text Available Forensic science programs and courses have traditionally been housed within chemistry departments at the college/university level, largely because the pioneers of the field were chemists who applied technology that was more chemical than biological in nature. However, with the development of such areas of study as DNA analysis, anatomical studies, and forensic entomology, it is becoming more and more important for forensic science students to have a strong biological background as well as a chemical background. Furthermore, while biology students are typically required to have extensive chemistry training as part of their major, the converse is not true for chemistry students. Therefore, it is possible that a student interested in forensic science could complete a major in chemistry and never have taken a biology class, leaving them woefully under-prepared for any type of masters program or career in forensic science immediately following graduation. Indeed, an examination of available positions in forensic science shows a large number of positions for DNA analysts for which the typical chemistry student would not be prepared without extensive biology training (http://www.aafs.org. Furthermore, positions for medical examiners or pathologists require extensive training in biology in addition to the continued medical training and residency programs. Therefore, it seems imperative that introductory forensic science courses adapt to these needs and be taught with a more bi-disciplinary approach in order to educate students on the whole field rather than one aspect. To that end, a new bi-disciplinary Forensic Science course was developed at Elmhurst College. This course was team-taught by a biology and a chemistry professor so that students would obtain a thorough understanding of the field and techniques used by both biologists and chemists. A description of this new version of a forensic science course follows, focusing on the addition of biology

  1. The use of linear programming techniques to design optimal digital filters for pulse shaping and channel equalization

    Science.gov (United States)

    Houts, R. C.; Burlage, D. W.

    1972-01-01

    A time domain technique is developed to design finite-duration impulse response digital filters using linear programming. Two related applications of this technique in data transmission systems are considered. The first is the design of pulse shaping digital filters to generate or detect signaling waveforms transmitted over bandlimited channels that are assumed to have ideal low pass or bandpass characteristics. The second is the design of digital filters to be used as preset equalizers in cascade with channels that have known impulse response characteristics. Example designs are presented which illustrate that excellent waveforms can be generated with frequency-sampling filters and the ease with which digital transversal filters can be designed for preset equalization.

  2. Specialty Guidelines for Forensic Psychology

    Science.gov (United States)

    American Psychologist, 2013

    2013-01-01

    In the past 50 years forensic psychological practice has expanded dramatically. Because the practice of forensic psychology differs in important ways from more traditional practice areas (Monahan, 1980) the "Specialty Guidelines for Forensic Psychologists" were developed and published in 1991 (Committee on Ethical Guidelines for Forensic…

  3. From forensic epigenetics to forensic epigenomics: broadening DNA investigative intelligence.

    Science.gov (United States)

    Vidaki, Athina; Kayser, Manfred

    2017-12-21

    Human genetic variation is a major resource in forensics, but does not allow all forensically relevant questions to be answered. Some questions may instead be addressable via epigenomics, as the epigenome acts as an interphase between the fixed genome and the dynamic environment. We envision future forensic applications of DNA methylation analysis that will broaden DNA-based forensic intelligence. Together with genetic prediction of appearance and biogeographic ancestry, epigenomic lifestyle prediction is expected to increase the ability of police to find unknown perpetrators of crime who are not identifiable using current forensic DNA profiling.

  4. Nuclear forensic analysis

    International Nuclear Information System (INIS)

    Tomar, B.S.

    2016-01-01

    In the present talk the fundamentals of the nuclear forensic investigations will be discussed followed by the detailed standard operating procedure (SOP) for the nuclear forensic analysis. The characteristics, such as, dimensions, particle size, elemental and isotopic composition help the nuclear forensic analyst in source attribution of the interdicted material, as the specifications of the nuclear materials used by different countries are different. The analysis of elemental composition could be done by SEM-EDS, XRF, CHNS analyser, etc. depending upon the type of the material. Often the trace constituents (analysed by ICP-AES, ICP-MS, AAS, etc) provide valuable information about the processes followed during the production of the material. Likewise the isotopic composition determined by thermal ionization mass spectrometry provides useful information about the enrichment of the nuclear fuel and hence its intended use

  5. Efficacy of nuclear forensics

    International Nuclear Information System (INIS)

    Kazi, Reshmi

    2011-01-01

    In a strange turn of history, the threat of global nuclear war has gone down, but the risk of a nuclear attack has gone up. The danger of nuclear terrorism and ways to thwart it, tackle it and manage it in the event of an attack is increasingly gaining the attention of nuclear analysts all over the world. There is rising awareness among nuclear experts to develop mechanisms to prevent, deter and deal with the threat of nuclear terrorism. Nuclear specialists are seeking to develop and improve the science of nuclear forensics so as to provide faster analysis during a crisis. Nuclear forensics can play an important role in detecting illicit nuclear materials to counter trafficking in nuclear and radiological materials. An effective nuclear forensic and attribution strategy can enable policy makers, decision makers and technical managers to respond to situations involving interception of special nuclear materials

  6. Geoethics and Forensic Geology

    Science.gov (United States)

    Donnelly, Laurance

    2017-04-01

    The International Union of Geological Sciences (IUGS), Initiative on Forensic Geology (IFG) was set up in 2011 to promote and develop the applications of geology to policing and law enforcement throughout the world. This includes the provision of crime scene examinations, searches to locate graves or items of interest that have been buried beneath the ground surface as part of a criminal act and geological trace analysis and evidence. Forensic geologists may assist the police and law enforcement in a range of ways including for example; homicide, sexual assaults, counter terrorism, kidnapping, humanitarian incidents, environmental crimes, precious minerals theft, fakes and fraudulent crimes. The objective of this paper is to consider the geoethical aspects of forensic geology. This includes both delivery to research and teaching, and contribution to the practical applications of forensic geology in case work. The case examples cited are based on the personal experiences of the authors. Often, the technical and scientific aspect of forensic geology investigation may be the most straightforward, after all, this is what the forensic geologist has been trained to do. The associated geoethical issues can be the most challenging and complex to manage. Generally, forensic geologists are driven to carry-out their research or case work with integrity, honesty and in a manner that is law abiding, professional, socially acceptable and highly responsible. This is necessary in advising law enforcement organisations, society and the scientific community that they represent. As the science of forensic geology begins to advance around the world it is desirable to establish a standard set of principles, values and to provide an agreed ethical a framework. But what are these core values? Who is responsible for producing these? How may these become enforced? What happens when geoethical standards are breached? This paper does not attempt to provide all of the answers, as further work

  7. Radiochronology in nuclear forensics

    International Nuclear Information System (INIS)

    Alamelu, D.

    2016-01-01

    Nuclear forensics corresponds to the forensic analysis of nuclear materials. The samples analysed may either be those that are confiscated during any act of smuggling or that is retrieved from a postexplosion debris. The characterisation of the material is based on the isotopic composition, physical and chemical compositions, age and history of the material which are determined by suitable analytical techniques. The interpretation of the analytical results is necessary to understand the details of the material such as its provenance, the industrial history of the material as well as the implications of the probable use of the material

  8. Kindle Forensics: Acquisition & Analysis

    Directory of Open Access Journals (Sweden)

    Peter Hannay

    2011-06-01

    Full Text Available The Amazon Kindle eBook reader supports a wide range of capabilities beyond reading books. This functionality includes an inbuilt cellular data connection known as Whispernet. The Kindle provides web browsing, an application framework, eBook delivery and other services over this connection. The historic data left by user interaction with this device may be of forensic interest. Analysis of the Amazon Kindle device has resulted in a method to reliably extract and interpret data from these devices in a forensically complete manner.

  9. La geomatica forense e il Forensic GIS

    Directory of Open Access Journals (Sweden)

    Renzo Carlucci

    2013-03-01

    Full Text Available La Conferenza ASITA 2012, tenutasi lo scorso novembre a Vicenza, ha rivelato una piacevole sorpresa con unasessione speciale che ha visto magistrati, avvocati e geomatici coinvolti per discutere l'aspetto relativo all’impattodella determinazione scientifica in iter giudiziari quali i contesti investigativi e processuali.AbstractIn the ASITA Conference 2012, held last November in Vicenza,a special session on “Forensic geomatics”, with judges and lawyers involved to discuss a very important aspect about the impact of scientific geomatics determinations arising during the judicial process of contexts analysis and investigative proceedings. 

  10. La geomatica forense e il Forensic GIS

    Directory of Open Access Journals (Sweden)

    Renzo Carlucci

    2013-03-01

    Full Text Available La Conferenza ASITA 2012, tenutasi lo scorso novembre a Vicenza, ha rivelato una piacevole sorpresa con unasessione speciale che ha visto magistrati, avvocati e geomatici coinvolti per discutere l'aspetto relativo all’impattodella determinazione scientifica in iter giudiziari quali i contesti investigativi e processuali. Abstract In the ASITA Conference 2012, held last November in Vicenza,a special session on “Forensic geomatics”, with judges and lawyers involved to discuss a very important aspect about the impact of scientific geomatics determinations arising during the judicial process of contexts analysis and investigative proceedings.

  11. Comparative performance of modern digital mammography systems in a large breast screening program

    Energy Technology Data Exchange (ETDEWEB)

    Yaffe, Martin J., E-mail: martin.yaffe@sri.utoronto.ca; Bloomquist, Aili K.; Hunter, David M.; Mawdsley, Gordon E. [Physical Sciences Division, Sunnybrook Research Institute, Departments of Medical Biophysics and Medical Imaging, University of Toronto, Ontario M4N 3M5 (Canada); Chiarelli, Anna M. [Prevention and Cancer Control, Cancer Care Ontario, Dalla Lana School of Public Health, University of Toronto, Ontario M4N 3M5, Canada and Ontario Breast Screening Program, Cancer Care Ontario, Toronto, Ontario M5G 1X3 (Canada); Muradali, Derek [Ontario Breast Screening Program, Cancer Care Ontario, Toronto, Ontario M5G 1X3 (Canada); Mainprize, James G. [Physical Sciences Division, Sunnybrook Research Institute, Toronto, Ontario M4N 3M5 (Canada)

    2013-12-15

    Purpose: To compare physical measures pertaining to image quality among digital mammography systems utilized in a large breast screening program. To examine qualitatively differences in these measures and differences in clinical cancer detection rates between CR and DR among sites within that program. Methods: As part of the routine quality assurance program for screening, field measurements are made of several variables considered to correlate with the diagnostic quality of medical images including: modulation transfer function, noise equivalent quanta, d′ (an index of lesion detectability) and air kerma to allow estimation of mean glandular dose. In addition, images of the mammography accreditation phantom are evaluated. Results: It was found that overall there were marked differences between the performance measures of DR and CR mammography systems. In particular, the modulation transfer functions obtained with the DR systems were found to be higher, even for larger detector element sizes. Similarly, the noise equivalent quanta, d′, and the phantom scores were higher, while the failure rates associated with low signal-to-noise ratio and high dose were lower with DR. These results were consistent with previous findings in the authors’ program that the breast cancer detection rates at sites employing CR technology were, on average, 30.6% lower than those that used DR mammography. Conclusions: While the clinical study was not large enough to allow a statistically powered system-by-system assessment of cancer detection accuracy, the physical measures expressing spatial resolution, and signal-to-noise ratio are consistent with the published finding that sites employing CR systems had lower cancer detection rates than those using DR systems for screening mammography.

  12. Assessing the impact of a remote digital coaching engagement program on patient-reported outcomes in asthma.

    Science.gov (United States)

    Rasulnia, Mazi; Burton, Billy Stephen; Ginter, Robert P; Wang, Tracy Y; Pleasants, Roy Alton; Green, Cynthia L; Lugogo, Njira

    2017-08-11

    Low adherence and poor outcomes provide opportunity for digital coaching to engage patients with uncontrolled asthma in their care to improve outcomes. To examine the impact of a remote digital coaching program on asthma control and patient experience. We recruited 51 adults with uncontrolled asthma, denoted by albuterol use of >2 times per week and/or exacerbations requiring corticosteroids, and applied a 12-week patient-centered remote digital coaching program using a combination of educational pamphlets, symptom trackers, best peak flow establishment, physical activity, and dietary counseling, as well as coaches who implemented emotional enforcement to motivate disease self-management through telephone, text, and email. Baseline and post-intervention measures were quality of life (QOL), spirometry, Asthma Control Test (ACT), Asthma Symptom Utility Index (ASUI), rescue albuterol use, and exacerbation history. Among 51 patients recruited, 40 completed the study. Eight subjects required assistance reading medical materials. Significant improvements from baseline were observed for Patient-Reported Outcomes Measurement Information System mental status (p = 0.010), body weight, and outpatient exacerbation frequency (p = 0.028). The changes from baseline in ACT (p = 0.005) were statistically significant but did not achieve the pre-specified minimum clinically important difference (MCID), whereas for ASUI, the MCID and statistical significance were achieved. Spirometry and rescue albuterol use were no different. A patient-oriented, remote digital coaching program that utilized trained health coaches and digital materials led to statistically significant improvement in mental status, outpatient exacerbations, body weight, and ASUI. Digital coaching programs may improve some outcomes in adults with uncontrolled asthma.

  13. Embedded protostars in the dust, ice, and gas in time (DIGIT) Herschel key program

    DEFF Research Database (Denmark)

    Green, Joel D.; Evans II, Neal J.; Jørgensen, Jes Kristian

    2013-01-01

    We present 50-210 um spectral scans of 30 Class 0/I protostellar sources, obtained with Herschel-PACS, and 0.5-1000 um SEDs, as part of the Dust, Ice, and Gas in Time (DIGIT) Key Program. Some sources exhibit up to 75 H2O lines ranging in excitation energy from 100-2000 K, 12 transitions of OH, a...

  14. DISEÑO DE UN MICROSISTEMA PROGRAMABLE PARA EFECTOS DE AUDIO DIGITAL USANDO FPGAS

    Directory of Open Access Journals (Sweden)

    John Michael Espinosa Durán

    Full Text Available Este artículo describe el diseño de un microsistema programable para el procesamiento de efectos de audio digital implementado en un FPGA. El microsistema es diseñado usando un procesador de propósito específico y reconfigurable, un banco de RAMs y una interfaz gráfica de usuario basada en una pantalla táctil LCD. El procesador es diseñado usando 15 efectos de audio basados en retardos y procesamiento en el dominio dinámico y de la frecuencia. Los efectos son diseñados usando Megafunciones y el compilador FIR de Quartus II, son simulados en Simulink5 usando DSP Builder6, y son configurados utilizando una interfaz gráfica de usuario. El microsistema programable es implementado en el sistema de desarrollo DE2-70, y su funcionamiento es verificado usando un reproductor MP3 y un parlante. Adicionalmente, el microsistema permite la generación de efectos con alta fidelidad usando una tasa de muestreo máxima de 195.62 MSPS, y puede ser embebido en un SoC.

  15. Apollo guidance, navigation and control: Guidance system operations plan for manned CM earth orbital and lunar missions using Program COLOSSUS 3. Section 3: Digital autopilots (revision 14)

    Science.gov (United States)

    1972-01-01

    Digital autopilots for the manned command module earth orbital and lunar missions using program COLOSSUS 3 are discussed. Subjects presented are: (1) reaction control system digital autopilot, (2) thrust vector control autopilot, (3) entry autopilot and mission control programs, (4) takeover of Saturn steering, and (5) coasting flight attitude maneuver routine.

  16. Forensic Applications of LIBS

    Science.gov (United States)

    Hark, Richard R.; East, Lucille J.

    Forensic science is broadly defined as the application of science to matters of the law. Practitioners typically use multidisciplinary scientific techniques for the analysis of physical evidence in an attempt to establish or exclude an association between a suspect and the scene of a crime.

  17. Nuclear forensics case studies

    International Nuclear Information System (INIS)

    Fedchenko, Vitaly

    2016-01-01

    The objective of this presentation is to share three case studies from the Institute of Transuranium Elements (ITU) which describe the application of nuclear forensics to events where nuclear and other radioactive material was found to be out of regulatory control

  18. FORENSIC CRIMINOLOGY - FUGITIVE PSYCHOLOGY

    OpenAIRE

    Nyagudi, Nyagudi Musandu

    2014-01-01

    Forensic Criminology – Fugitive Psychology, 2010 Security Summit (Regional Security Exhibition & Conference ) a forum hosted by Kenya Security Industry Association, Securi Fast Trainers & Consultants, Fidelity Security Limited at Desmond Tutu Conference Centre, Nairobi Kenya from 4th-5th March, 2010  

  19. Forensic importance of jealousy.

    Science.gov (United States)

    Muzinić, Lana; Goreta, Miroslav; Jukić, Vlado; Dordević, Veljko; Koić, Elvira; Herceg, Miroslav

    2003-06-01

    The aim of the investigation is to define as clearly as possible specific forensic psychiatric characteristics of persons who committed homicide and or attempted due to jealousy (the nature and severity of psychopathology, the level of responsibility, danger for the community, intensity and nature of aggression, the victimologic dimension, the relation of alcohol and jealousy). A retrospective method based on forensic psychiatric expertises in the period 1975-1999 was used. They encompassed 200 examinees that committed murder or attempted it. The results show the connection of psychotic jealousy with the highest degree of danger in diagnostic categories of paranoid psychosis and paranoid schizophrenia. The time span from the first manifestations of jealousy until the actual commitment of a crime is the longest in personality disorders and the shortest in schizophrenia. Exogenous provoking situations were dominant for committing homicide due to jealousy in personality disorders. Acute alcohol intoxication has a specific significance in crime due to jealousy in the same diagnostic category. Clear criteria were designed for forensic psychiatric evaluation of murder and attempts of homicide caused by jealousy, which will be of help in everyday practice in the field forensic work and treatment.

  20. Forensic postmortem computed tomography

    DEFF Research Database (Denmark)

    Jakobsen, Lykke Schrøder; Lundemose, Sissel; Banner, Jytte

    2016-01-01

    differences. CONCLUSIONS: Noninvasive in situ PMCT methods for organ measuring, as performed in this study, are not useful tools in forensic pathology. The best method to estimate organ volume is a CT-scan of the eviscerated organ. PMCT-determined CTR seems to be useless for ascertaining cardiomegaly...

  1. Soil Science Forensic Application

    OpenAIRE

    Rēpele, M; Alksne, M

    2009-01-01

    The forensic potential of soil and geological evidence has been recognized for more than a century, but in the last 15 years these types of evidence have been used much more widely both as an investigative intelligence tool and as evidence in court.

  2. Achieving Business Excellence by Optimizing Corporate Forensic Readiness

    Directory of Open Access Journals (Sweden)

    Gojko Grubor

    2017-02-01

    Full Text Available In order to improve their business excellence, all organizations, despite their size (small, medium or large one should manage their risk of fraud. Fraud, in today’s world, is often committed by using computers and can only be revealed by digital forensic investigator. Not even small or medium-sized companies are secure from fraud. In the light of recent financial scandals that literary demolished not just economies of specific countries but entire world economy, we propose in this paper an optimal model of corporative computer incident digital forensic investigation (CCIDFI by using adopted mathematic model of the greed MCDM – multi-criteria decision-making method and the Expert Choice software tool for multi-criteria optimization of the CCIDFI readiness. Proposed model can, first of all, help managers of small and medium-sized companies to justify their decisions to employ digital forensic investigators and include them in their information security teams in order to choose the optimal CCIDFI model and improve forensic readiness in the computer incident management process that will result with minimization of potential losses of company in the future and improve its business quality.

  3. Nuclear and Radiological Forensics and Attribution Overview

    International Nuclear Information System (INIS)

    Smith, D K; Niemeyer, S

    2005-01-01

    The goal of the U.S. Department of Homeland Security (DHS) Nuclear and Radiological Forensics and Attribution Program is to develop the technical capability for the nation to rapidly, accurately, and credibly attribute the origins and pathways of interdicted or collected materials, intact nuclear devices, and radiological dispersal devices. A robust attribution capability contributes to threat assessment, prevention, and deterrence of nuclear terrorism; it also supports the Federal Bureau of Investigation (FBI) in its investigative mission to prevent and respond to nuclear terrorism. Development of the capability involves two major elements: (1) the ability to collect evidence and make forensic measurements, and (2) the ability to interpret the forensic data. The Program leverages the existing capability throughout the U.S. Department of Energy (DOE) national laboratory complex in a way that meets the requirements of the FBI and other government users. At the same time the capability is being developed, the Program also conducts investigations for a variety of sponsors using the current capability. The combination of operations and R and D in one program helps to ensure a strong linkage between the needs of the user community and the scientific development

  4. Forensic learning disability nursing skills and competencies: a study of forensic and non-forensic nurses.

    Science.gov (United States)

    Mason, Tom; Phipps, Dianne

    2010-11-01

    This paper reports on an investigation into the skills and competencies of forensic learning disability nurses in the United Kingdom. The two sample populations were forensic learning disability nurses from the high, medium, and low secure psychiatric services and non-forensic learning disability nurses from generic services. An information gathering schedule was used to collect the data; of 1200 schedules, 643 were returned for a response rate of 53.5%. The data identified the "top ten" problems that forensic learning disability nurses may encounter, the skills and competencies necessary to overcome them, and the areas that need to be developed in the future. The results indicated that the forensic learning disability nurses tended to focus on the physical aspects to the role whilst the non-forensic learning disability nurses tended to perceive the forensic role in relational terms. This has implications for practice, policy, and procedures.

  5. Results from a Pilot REU Program: Exploring the Cosmos Using Sloan Digital Sky Survey Data

    Science.gov (United States)

    Chanover, Nancy J.; Holley-Bockelmann, Kelly; Holtzman, Jon A.

    2017-01-01

    In the Summer of 2016 we conducted a 10-week pilot Research Experience for Undergraduates (REU) program aimed at increasing the participation of underrepresented minority undergraduate students in research using data from the Sloan Digital Sky Survey (SDSS). This program utilized a distributed REU model, whereby students worked with SDSS scientists on exciting research projects while serving as members of a geographically distributed research community. The format of this REU is similar to that of the SDSS collaboration itself, and since this collaboration structure has become a model for the next generation of large scale astronomical surveys, the students participating in the SDSS REU received early exposure and familiarity with this approach to collaborative scientific research. The SDSS REU also provided the participants with a low-risk opportunity to audition for graduate schools and to explore opportunities afforded by a career as a research scientist. The six student participants were placed at SDSS REU host sites at the Center for Astrophysics at Harvard University, University of Wisconsin-Madison, Vanderbilt University, and the University of Portsmouth. Their research projects covered a broad range of topics related to stars, galaxies, and quasars, all making use of SDSS data. At the start of the summer the REU students participated in a week-long Boot Camp at NMSU, which served as a program orientation, an introduction to skills relevant to their research projects, and an opportunity for team-building and cohort-forming. To foster a sense of community among our distributed students throughout the summer, we conducted a weekly online meeting for all students in the program via virtual meeting tools. These virtual group meetings served two purposes: as a weekly check-in to find out how their projects were progressing, and to conduct professional development seminars on topics of interest and relevance to the REU participants. We discuss the outcomes of this

  6. Overview of Forensic Toxicology, Yesterday, Today and in the Future.

    Science.gov (United States)

    Chung, Heesun; Choe, Sanggil

    2017-01-01

    The scope of forensic toxicology has been tremendously expanded over the past 50 years. From two general sections forensic toxicology can be further classified into 8-9 sections. The most outstanding improvement in forensic toxicology is the changes brought by instrumental development. The field of forensic toxicology was revolutionized by the development of immunoassay and benchtop GC-MS in the 1980's and LC-MS-MS in 2000's. Detection of trace amounts of analytes has allowed the use of new specimens such as hair and oral fluids, along with blood and urine. Over a longer period of time, continuous efforts have been made to efficiently extract and separate drug and poison from biological fluids. International endeavors to develop high quality standards and guidelines for drugs and poisons in biological specimens and to promote them in order to increase reliability of laboratories are also part of the recent advancement of forensic toxicology. Interpretation of postmortem toxicology encompasses various factors including postmortem redistribution and stability. Considering the recent trend, the interpretation of toxicological results should account for autopsy findings, crime scene information, and related medical history. The fields of forensic toxicology will continuously develop to improve analysis of target analytes from various specimens, quality assurance program, and results interpretation. In addition, the development of analytical techniques will also contribute further advancement of forensic toxicology. The societies of forensic toxicologists, such as TIAFT, will play an important role for the advancement of forensic toxicology by collaborating and sharing ideas between toxicologists from both developed and developing countries. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.

  7. Light Water Reactor Sustainability Program: Digital Technology Business Case Methodology Guide

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Ken [Idaho National Lab. (INL), Idaho Falls, ID (United States); Lawrie, Sean [ScottMadden, Inc., Raleigh, NC (United States); Hart, Adam [ScottMadden, Inc., Raleigh, NC (United States); Vlahoplus, Chris [ScottMadden, Inc., Raleigh, NC (United States)

    2014-09-01

    The Department of Energy’s (DOE’s) Light Water Reactor Sustainability Program aims to develop and deploy technologies that will make the existing U.S. nuclear fleet more efficient and competitive. The program has developed a standard methodology for determining the impact of new technologies in order to assist nuclear power plant (NPP) operators in building sound business cases. The Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway is part of the DOE’s Light Water Reactor Sustainability (LWRS) Program. It conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. This work involves two major goals: (1) to ensure that legacy analog II&C systems are not life-limiting issues for the LWR fleet and (2) to implement digital II&C technology in a manner that enables broad innovation and business improvement in the NPP operating model. Resolving long-term operational concerns with the II&C systems contributes to the long-term sustainability of the LWR fleet, which is vital to the nation’s energy and environmental security. The II&C Pathway is conducting a series of pilot projects that enable the development and deployment of new II&C technologies in existing nuclear plants. Through the LWRS program, individual utilities and plants are able to participate in these projects or otherwise leverage the results of projects conducted at demonstration plants. Performance advantages of the new pilot project technologies are widely acknowledged, but it has proven difficult for utilities to derive business cases for justifying investment in these new capabilities. Lack of a business case is often cited by utilities as a barrier to pursuing wide-scale application of digital technologies to nuclear plant work activities. The decision to move forward with funding usually hinges on

  8. An overview of NASA's digital fly-by-wire technology development program

    Science.gov (United States)

    Jarvis, C. R.

    1976-01-01

    The feasibility of using digital fly by wire systems to control aircraft was demonstrated by developing and flight testing a single channel system, which used Apollo hardware, in an F-8C test airplane. This is the first airplane to fly with a digital fly by wire system as its primary means of control and with no mechanical reversion capability. The development and flight test of a triplex digital fly by wire system, which will serve as an experimental prototype for future operational digital fly by wire systems, are underway.

  9. Estimating the measurement uncertainty in forensic blood alcohol analysis.

    Science.gov (United States)

    Gullberg, Rod G

    2012-04-01

    For many reasons, forensic toxicologists are being asked to determine and report their measurement uncertainty in blood alcohol analysis. While understood conceptually, the elements and computations involved in determining measurement uncertainty are generally foreign to most forensic toxicologists. Several established and well-documented methods are available to determine and report the uncertainty in blood alcohol measurement. A straightforward bottom-up approach is presented that includes: (1) specifying the measurand, (2) identifying the major components of uncertainty, (3) quantifying the components, (4) statistically combining the components and (5) reporting the results. A hypothetical example is presented that employs reasonable estimates for forensic blood alcohol analysis assuming headspace gas chromatography. These computations are easily employed in spreadsheet programs as well. Determining and reporting measurement uncertainty is an important element in establishing fitness-for-purpose. Indeed, the demand for such computations and information from the forensic toxicologist will continue to increase.

  10. Measurement and evaluation of digital cervicography programs in two cervical cancer screening camps in East Africa

    Science.gov (United States)

    Peterson, Curtis W.; Mink, Jonah; Levitz, David

    2017-03-01

    Cervical cancer disproportionately affects women living in low- and middle-income countries. To address this global crisis, many governments and NGOs have implemented community-based screening and treatment programs at outreach camps. Here, high volumes of patients are able to access care: screening and diagnosis followed by immediate treatment of precancerous lesions onsite. However, monitoring and evaluation (M&E) of these efforts presents challenges, since each event typically relies on a different health workforce, and refers patients to different facilities for follow up and advanced care. To address these challenges, a digital imaging intervention was deployed at several screening camps in East Africa. Trained nurses screened women using a connected low-cost mobile colposcope built around a smartphone. A decision support job aid was integrated into the app controlling the device, guiding nurses and recording their diagnosis and treatment decisions. Aggregating the data from the job aid allowed M&E of the screening camp in real-time. In this paper, the M&E data from 2 different screening camps in East Africa are compared. Additionally, screening camps are compared to stationary clinics. Differences in the patient screening times, treatment rates, and individual nurse statistics were all documented through the job aid allowing for much improved epidemiological information following outreach events thus enabling targeted program improvements and provider training. Reporting data from screening camps were also shared online via public web pages, facilitating broader dissemination of health needs in specific East African communities, and sparking conversations with regional stakeholders about local disease burden.

  11. Identifying a Computer Forensics Expert: A Study to Measure the Characteristics of Forensic Computer Examiners

    Directory of Open Access Journals (Sweden)

    Gregory H. Carlton

    2010-03-01

    Full Text Available Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 The usage of digital evidence from electronic devices has been rapidly expanding within litigation, and along with this increased usage, the reliance upon forensic computer examiners to acquire, analyze, and report upon this evidence is also rapidly growing. This growing demand for forensic computer examiners raises questions concerning the selection of individuals qualified to perform this work. While courts have mechanisms for qualifying witnesses that provide testimony based on scientific data, such as digital data, the qualifying criteria covers a wide variety of characteristics including, education, experience, training, professional certifications, or other special skills. In this study, we compare task performance responses from forensic computer examiners with an expert review panel and measure the relationship with the characteristics of the examiners to their quality responses. The results of this analysis provide insight into identifying forensic computer examiners that provide high-quality responses. /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;}

  12. Analytical and Radiochemistry for Nuclear Forensics

    Energy Technology Data Exchange (ETDEWEB)

    Steiner, Robert Ernest [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Dry, Donald E. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Kinman, William Scott [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Podlesak, David [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Tandon, Lav [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-05-26

    Information about nonproliferation nuclear forensics, activities in forensics at Los Alamos National Laboratory, radio analytical work at LANL, radiochemical characterization capabilities, bulk chemical and materials analysis capabilities, and future interests in forensics interactions.

  13. Forensic geotechnical engineering

    CERN Document Server

    Babu, GL

    2016-01-01

    In this edited volume on advances in forensic geotechnical engineering, a number of technical contributions by experts and professionals in this area are included. The work is the outcome of deliberations at various conferences in the area conducted by Prof. G.L. Sivakumar Babu and Dr. V.V.S. Rao as secretary and Chairman of Technical Committee on Forensic Geotechnical Engineering of International Society for Soil Mechanics and Foundation Engineering (ISSMGE). This volume contains papers on topics such as guidelines, evidence/data collection, distress characterization, use of diagnostic tests (laboratory and field tests), back analysis, failure hypothesis formulation, role of instrumentation and sensor-based technologies, risk analysis, technical shortcomings. This volume will prove useful to researchers and practitioners alike.

  14. Veterinary Forensic Toxicology.

    Science.gov (United States)

    Gwaltney-Brant, S M

    2016-09-01

    Veterinary pathologists working in diagnostic laboratories are sometimes presented with cases involving animal poisonings that become the object of criminal or civil litigation. Forensic veterinary toxicology cases can include cases involving animal cruelty (malicious poisoning), regulatory issues (eg, contamination of the food supply), insurance litigation, or poisoning of wildlife. An understanding of the appropriate approach to these types of cases, including proper sample collection, handling, and transport, is essential so that chain of custody rules are followed and proper samples are obtained for toxicological analysis. Consultation with veterinary toxicologists at the diagnostic laboratory that will be processing the samples before, during, and after the forensic necropsy can help to ensure that the analytical tests performed are appropriate for the circumstances and findings surrounding the individual case. © The Author(s) 2016.

  15. Evaluation of a Digital Game-Based Learning Program for Enhancing Youth Mental Health: A Structural Equation Modeling of the Program Effectiveness.

    Science.gov (United States)

    Huen, Jenny My; Lai, Eliza Sy; Shum, Angie Ky; So, Sam Wk; Chan, Melissa Ky; Wong, Paul Wc; Law, Y W; Yip, Paul Sf

    2016-10-07

    Digital game-based learning (DGBL) makes use of the entertaining power of digital games for educational purposes. Effectiveness assessment of DGBL programs has been underexplored and no attempt has been made to simultaneously model both important components of DGBL: learning attainment (ie, educational purposes of DGBL) and engagement of users (ie, entertaining power of DGBL) in evaluating program effectiveness. This study aimed to describe and evaluate an Internet-based DGBL program, Professor Gooley and the Flame of Mind, which promotes mental health to adolescents in a positive youth development approach. In particular, we investigated whether user engagement in the DGBL program could enhance their attainment on each of the learning constructs per DGBL module and subsequently enhance their mental health as measured by psychological well-being. Users were assessed on their attainment on each learning construct, psychological well-being, and engagement in each of the modules. One structural equation model was constructed for each DGBL module to model the effect of users' engagement and attainment on the learning construct on their psychological well-being. Of the 498 secondary school students that registered and participated from the first module of the DGBL program, 192 completed all 8 modules of the program. Results from structural equation modeling suggested that a higher extent of engagement in the program activities facilitated users' attainment on the learning constructs on most of the modules and in turn enhanced their psychological well-being after controlling for users' initial psychological well-being and initial attainment on the constructs. This study provided evidence that Internet intervention for mental health, implemented with the technologies and digital innovations of DGBL, could enhance youth mental health. Structural equation modeling is a promising approach in evaluating the effectiveness of DGBL programs.

  16. Comparison of digital mammography alone and digital mammography plus tomosynthesis in a population-based screening program.

    Science.gov (United States)

    Skaane, Per; Bandos, Andriy I; Gullien, Randi; Eben, Ellen B; Ekseth, Ulrika; Haakenaasen, Unni; Izadi, Mina; Jebsen, Ingvild N; Jahr, Gunnar; Krager, Mona; Niklason, Loren T; Hofvind, Solveig; Gur, David

    2013-04-01

    To assess cancer detection rates, false-positive rates before arbitration, positive predictive values for women recalled after arbitration, and the type of cancers detected with use of digital mammography alone and combined with tomosynthesis in a large prospective screening trial. A prospective, reader- and modality-balanced screening study of participants undergoing combined mammography plus tomosynthesis, the results of which were read independently by four different radiologists, is under way. The study was approved by a regional ethics committee, and all participants provided written informed consent. The authors performed a preplanned interim analysis of results from 12,631 examinations interpreted by using mammography alone and mammography plus tomosynthesis from November 22, 2010, to December 31, 2011. Analyses were based on marginal log-linear models for binary data, accounting for correlated interpretations and adjusting for reader-specific performance levels by using a two-sided significance level of .0294. Detection rates, including those for invasive and in situ cancers, were 6.1 per 1000 examinations for mammography alone and 8.0 per 1000 examinations for mammography plus tomosynthesis (27% increase, adjusted for reader; P = .001). False-positive rates before arbitration were 61.1 per 1000 examinations with mammography alone and 53.1 per 1000 examinations with mammography plus tomosynthesis (15% decrease, adjusted for reader; P tomosynthesis; P = .72). Twenty-five additional invasive cancers were detected with mammography plus tomosynthesis (40% increase, adjusted for reader; P tomosynthesis (P tomosynthesis in a screening environment resulted in a significantly higher cancer detection rate and enabled the detection of more invasive cancers. Clinical trial registration no. NCT01248546. RSNA, 2013

  17. CYBER FORENSICS COMPETENCY-BASED FRAMEWORK - AREVIEW

    OpenAIRE

    Elfadil Sabeil; Azizah Bt Abdul Manaf; Zuraini Ismail; Mohamed Abas

    2011-01-01

    Lack of Cyber Forensics experts is a huge challenge facing the world today. It comes due to the fancy of Cyber Forensics training or education. The multidisciplinary nature of Cyber Forensics proliferates to diverse training programmes, from a handful day‟s workshop to Postgraduate in Cyber Forensics. Consequently, this paper concentrates on analyzing the Cyber Forensics training programmes in terms of Competency-Based Framework. The study proves that Cyber Forensics training or education h...

  18. Forensic radiology in dentistry

    Directory of Open Access Journals (Sweden)

    T Manigandan

    2015-01-01

    Full Text Available Radiography can play an important part in forensic odontology, mainly to establish identification. This may take the precise form of comparison between antemortem and postmortem radiographs. Radiographs may also be taken to determine the age of a minor victim and even help in the assessment of the sex and ethnic group. Comparable radiographs are an essential factor to confirm identification in a mass disaster.

  19. Forensic implications of rape

    OpenAIRE

    Novaković Milan

    2006-01-01

    Introduction. Rape is a sexual act of violence in which physical strength is used. Criminal law imposes strict punishments for such crimes as rape. Psycho-pathologically, rape is among the gravest of crimes, often associated with extremely deviated behavior. This article deals with the forensic aspects of sexual violence in Bosnia and Herzegovina in the period from 2000-2004. We report about sexual assaults, personality of delinquents, motives and consequences of rape. Material and Methods. T...

  20. Forensic neutron activation analysis

    International Nuclear Information System (INIS)

    Kishi, T.

    1987-01-01

    The progress of forensic neutron activation analysis (FNAA) in Japan is described. FNAA began in 1965 and during the past 20 years many cases have been handled; these include determination of toxic materials, comparison examination of physical evidences (e.g., paints, metal fragments, plastics and inks) and drug sample differentiation. Neutron activation analysis is applied routinely to the scientific criminal investigation as one of multielement analytical techniques. This paper also discusses these routine works. (author) 14 refs

  1. 7 CFR 1755.522 - RUS general specification for digital, stored program controlled central office equipment.

    Science.gov (United States)

    2010-01-01

    ... calls shall not require more than 500 milliseconds, exclusive of ringing and ring trip, to complete its... shall be designed so that, in the event of a network failure, the system shall immediately or... digital-to-digital environment or operate initially in an independent network (refer to Bellcore document...

  2. Streaming the Archives: Repurposing Systems to Advance a Small Media Digitization and Dissemination Program

    Science.gov (United States)

    Anderson, Talea

    2015-01-01

    In 2013-2014, Brooks Library at Central Washington University (CWU) launched library content in three systems: a digital asset-management system, an institutional repository (IR), and a web-based discovery layer. In early 2014, the archives at the library began to use these systems to disseminate media recently digitized from legacy formats. As…

  3. Use of Digital Technology and Support Software Programs in the Private Dental Offices in Nevada

    Science.gov (United States)

    Fattore-Bruno, LaDeane

    2009-01-01

    The purpose of this survey research was to determine the diffusion of digital radiography, the electronic oral health record (EOHR), digital intraoral photography, and diagnosis and clinical decision-making support software into the dental offices of Nevada. A cross-sectional survey design was utilized with a random sample of 600 Nevada dentists.…

  4. USB Storage Device Forensics for Windows 10.

    Science.gov (United States)

    Arshad, Ayesha; Iqbal, Waseem; Abbas, Haider

    2018-05-01

    Significantly increased use of USB devices due to their user-friendliness and large storage capacities poses various threats for many users/companies in terms of data theft that becomes easier due to their efficient mobility. Investigations for such data theft activities would require gathering critical digital information capable of recovering digital forensics artifacts like date, time, and device information. This research gathers three sets of registry and logs data: first, before insertion; second, during insertion; and the third, after removal of a USB device. These sets are analyzed to gather evidentiary information from Registry and Windows Event log that helps in tracking a USB device. This research furthers the prior research on earlier versions of Microsoft Windows and compares it with latest Windows 10 system. Comparison of Windows 8 and Windows 10 does not show much difference except for new subkey under USB Key in registry. However, comparison of Windows 7 with latest version indicates significant variances. © 2017 American Academy of Forensic Sciences.

  5. A Comprehensive Review on Adaptability of Network Forensics Frameworks for Mobile Cloud Computing

    Directory of Open Access Journals (Sweden)

    Suleman Khan

    2014-01-01

    Full Text Available Network forensics enables investigation and identification of network attacks through the retrieved digital content. The proliferation of smartphones and the cost-effective universal data access through cloud has made Mobile Cloud Computing (MCC a congenital target for network attacks. However, confines in carrying out forensics in MCC is interrelated with the autonomous cloud hosting companies and their policies for restricted access to the digital content in the back-end cloud platforms. It implies that existing Network Forensic Frameworks (NFFs have limited impact in the MCC paradigm. To this end, we qualitatively analyze the adaptability of existing NFFs when applied to the MCC. Explicitly, the fundamental mechanisms of NFFs are highlighted and then analyzed using the most relevant parameters. A classification is proposed to help understand the anatomy of existing NFFs. Subsequently, a comparison is given that explores the functional similarities and deviations among NFFs. The paper concludes by discussing research challenges for progressive network forensics in MCC.

  6. A comprehensive review on adaptability of network forensics frameworks for mobile cloud computing.

    Science.gov (United States)

    Khan, Suleman; Shiraz, Muhammad; Wahab, Ainuddin Wahid Abdul; Gani, Abdullah; Han, Qi; Rahman, Zulkanain Bin Abdul

    2014-01-01

    Network forensics enables investigation and identification of network attacks through the retrieved digital content. The proliferation of smartphones and the cost-effective universal data access through cloud has made Mobile Cloud Computing (MCC) a congenital target for network attacks. However, confines in carrying out forensics in MCC is interrelated with the autonomous cloud hosting companies and their policies for restricted access to the digital content in the back-end cloud platforms. It implies that existing Network Forensic Frameworks (NFFs) have limited impact in the MCC paradigm. To this end, we qualitatively analyze the adaptability of existing NFFs when applied to the MCC. Explicitly, the fundamental mechanisms of NFFs are highlighted and then analyzed using the most relevant parameters. A classification is proposed to help understand the anatomy of existing NFFs. Subsequently, a comparison is given that explores the functional similarities and deviations among NFFs. The paper concludes by discussing research challenges for progressive network forensics in MCC.

  7. A Comprehensive Review on Adaptability of Network Forensics Frameworks for Mobile Cloud Computing

    Science.gov (United States)

    Abdul Wahab, Ainuddin Wahid; Han, Qi; Bin Abdul Rahman, Zulkanain

    2014-01-01

    Network forensics enables investigation and identification of network attacks through the retrieved digital content. The proliferation of smartphones and the cost-effective universal data access through cloud has made Mobile Cloud Computing (MCC) a congenital target for network attacks. However, confines in carrying out forensics in MCC is interrelated with the autonomous cloud hosting companies and their policies for restricted access to the digital content in the back-end cloud platforms. It implies that existing Network Forensic Frameworks (NFFs) have limited impact in the MCC paradigm. To this end, we qualitatively analyze the adaptability of existing NFFs when applied to the MCC. Explicitly, the fundamental mechanisms of NFFs are highlighted and then analyzed using the most relevant parameters. A classification is proposed to help understand the anatomy of existing NFFs. Subsequently, a comparison is given that explores the functional similarities and deviations among NFFs. The paper concludes by discussing research challenges for progressive network forensics in MCC. PMID:25097880

  8. Tattoos: forensic considerations.

    Science.gov (United States)

    Byard, Roger W

    2013-12-01

    Tattooing refers to marking of the skin by puncturing and introducing pigmented material. Although it derives from a Polynesian word, tautau, decorative tattooing has been found in most societies over many centuries. The purpose of tattooing has varied from simple decoration, to a marker of social rank, criminal and noncriminal group membership, or a particular rite of passage in tribal communities. Tattooing may be used in medicine to mark areas for radiotherapy, and may occur inadvertently associated with certain occupations such as coal mining. Forensically, tattoos may be very useful in assisting with body identification if facial features or fingers have been damaged or removed. Aspects of a decedent's history may also be deduced from certain tattoos such as military tattoos in service personnel, rudimentary line tattoos with antisocial and anti-police messages in ex-prisoners, and syringes, marihuana leaves or mushrooms in illicit drug users. Tattoos have become more common in recent years in younger individuals in the West and so should be expected to be found with increasing incidence at the time of forensic autopsy examinations. Increasing population movements also mean that less common tattoos may be encountered during forensic evaluations.

  9. The application of parameters for comprehensive smile esthetics by digital smile design programs: A review of literature

    Directory of Open Access Journals (Sweden)

    Doya Omar

    2018-01-01

    Full Text Available Cosmetic dentistry is increasingly becoming an issue of concern to patients who hope to improve their smile. A systematic and comprehensive dentofacial analysis must be performed before commencing esthetic treatment. Several computer software programs have been developed for digital smile design (DSD to assist clinicians in this process. This article compares DSD programs commonly used in cosmetic dentistry and their ability to assess esthetic parameters. A literature review was performed of current dentofacial aesthetic parameters and clinical applications of computer technology to assess facial, dentogingival and dental esthetics. Eight DSD programs (Photoshop CS6, Keynote, Planmeca Romexis Smile Design, Cerec SW 4.2, Aesthetic Digital Smile Design, Smile Designer Pro, DSD App and VisagiSMile were compared. Photoshop, Keynote and Aesthetic Digital Smile Design included the largest number of esthetic analysis parameters. Other studied DSD programs presented deficiencies in their ability to analyze facial esthetic parameters but included comprehensive dentogingival and dental esthetic functions. The DSD App, Planmeca Romexis Smile Design, and Cerec SW 4.2 were able to perform 3D analysis; furthermore, Cerec SW 4.2 and PRSD could be used jointly with CAD/CAM. The DSD App and Smile Designer Pro are available as mobile phone applications. It can be concluded that despite the fact that they were not specifically designed for dental diagnosis, Photoshop CS6 and Keynote provide a more comprehensive smile analysis than most specialized DSD programs. However, other program functions should also be considered when deciding which DSD program is applicable to individual clinical setups.

  10. DNS in Computer Forensics

    Directory of Open Access Journals (Sweden)

    Neil Fowler Wright

    2012-06-01

    Full Text Available The Domain Name Service (DNS is a critical core component of the global Internet and integral to the majority of corporate intranets. It provides resolution services between the human-readable name-based system addresses and the machine operable Internet Protocol (IP based addresses required for creating network level connections. Whilst structured as a globally dispersed resilient tree data structure, from the Global and Country Code Top Level Domains (gTLD/ccTLD down to the individual site and system leaf nodes, it is highly resilient although vulnerable to various attacks, exploits and systematic failures. This paper examines the history along with the rapid growth of DNS up to its current critical status. It then explores the often overlooked value of DNS query data; from packet traces, DNS cache data, and DNS logs, with its use in System Forensics and more frequently in Network Forensics, extrapolating examples and experiments that enhance knowledge.Continuing on, it details the common attacks that can be used directly against the DNS systems and services, before following on with the malicious uses of DNS in direct system attacks, Distributed Denial of Service (DDoS, traditional Denial of Service (DOS attacks and malware. It explores both cyber-criminal activities and cyber-warfare based attacks, and also extrapolates from a number of more recent attacks the possible methods for data exfiltration. It explores some of the potential analytical methodologies including; common uses in Intrusion Detection Systems (IDS, as well as infection and activity tracking in malware traffic analysis, and covers some of the associated methods around technology designed to defend against, mitigate, and/or manage these and other risks, plus the effect that ISP and nation states can have by direct manipulation of DNS queries and return traffic.This paper also investigates potential behavioural analysis and time-lining, which can then be used for the

  11. From forensic epigenetics to forensic epigenomics: Broadening DNA investigative intelligence

    NARCIS (Netherlands)

    A. Vidaki (Athina); M.H. Kayser (Manfred)

    2017-01-01

    textabstractHuman genetic variation is a major resource in forensics, but does not allow all forensically relevant questions to be answered. Some questions may instead be addressable via epigenomics, as the epigenome acts as an interphase between the fixed genome and the dynamic environment. We

  12. Comparison of digital tomosynthesis and computed tomography for lung nodule detection in SOS screening program.

    Science.gov (United States)

    Grosso, Maurizio; Priotto, Roberto; Ghirardo, Donatella; Talenti, Alberto; Roberto, Emanuele; Bertolaccini, Luca; Terzi, Alberto; Chauvie, Stéphane

    2017-08-01

    To compare the lung nodules' detection of digital tomosynthesis (DTS) and computed tomography (CT) in the context of the SOS (Studio OSservazionale) prospective screening program for lung cancer detection. One hundred and thirty-two of the 1843 subjects enrolled in the SOS study underwent CT because non-calcified nodules with diameters larger than 5 mm and/or multiple nodules were present in DTS. Two expert radiologists reviewed the exams classifying the nodules based on their radiological appearance and their dimension. LUNG-RADS classification was applied to compare receiver operator characteristics curve between CT and DTS with respect to final diagnosis. CT was used as gold standard. DTS and CT detected 208 and 179 nodules in the 132 subjects, respectively. Of these 208 nodules, 189 (91%) were solid, partially solid, and ground glass opacity. CT confirmed 140/189 (74%) of these nodules but found 4 nodules that were not detected by DTS. DTS and CT were concordant in 62% of the cases applying the 5-point LUNG-RADS scale. The concordance rose to 86% on a suspicious/non-suspicious binary scale. The areas under the curve in receiver operator characteristics were 0.89 (95% CI 0.83-0.94) and 0.80 (95% CI 0.72-0.89) for CT and DTS, respectively. The mean effective dose was 0.09 ± 0.04 mSv for DTS and 4.90 ± 1.20 mSv for CT. The use of a common classification for nodule detection in DTS and CT helps in comparing the two technologies. DTS detected and correctly classified 74% of the nodules seen by CT but lost 4 nodules identified by CT. Concordance between DTS and CT rose to 86% of the nodules when considering LUNG-RADS on a binary scale.

  13. trieFinder: an efficient program for annotating Digital Gene Expression (DGE) tags.

    Science.gov (United States)

    Renaud, Gabriel; LaFave, Matthew C; Liang, Jin; Wolfsberg, Tyra G; Burgess, Shawn M

    2014-10-13

    Quantification of a transcriptional profile is a useful way to evaluate the activity of a cell at a given point in time. Although RNA-Seq has revolutionized transcriptional profiling, the costs of RNA-Seq are still significantly higher than microarrays, and often the depth of data delivered from RNA-Seq is in excess of what is needed for simple transcript quantification. Digital Gene Expression (DGE) is a cost-effective, sequence-based approach for simple transcript quantification: by sequencing one read per molecule of RNA, this technique can be used to efficiently count transcripts while obviating the need for transcript-length normalization and reducing the total numbers of reads necessary for accurate quantification. Here, we present trieFinder, a program specifically designed to rapidly map, parse, and annotate DGE tags of various lengths against cDNA and/or genomic sequence databases. The trieFinder algorithm maps DGE tags in a two-step process. First, it scans FASTA files of RefSeq, UniGene, and genomic DNA sequences to create a database of all tags that can be derived from a predefined restriction site. Next, it compares the experimental DGE tags to this tag database, taking advantage of the fact that the tags are stored as a prefix tree, or "trie", which allows for linear-time searches for exact matches. DGE tags with mismatches are analyzed by recursive calls in the data structure. We find that, in terms of alignment speed, the mapping functionality of trieFinder compares favorably with Bowtie. trieFinder can quickly provide the user an annotation of the DGE tags from three sources simultaneously, simplifying transcript quantification and novel transcript detection, delivering the data in a simple parsed format, obviating the need to post-process the alignment results. trieFinder is available at http://research.nhgri.nih.gov/software/trieFinder/.

  14. New perspectives in forensic anthropology.

    Science.gov (United States)

    Dirkmaat, Dennis C; Cabo, Luis L; Ousley, Stephen D; Symes, Steven A

    2008-01-01

    A critical review of the conceptual and practical evolution of forensic anthropology during the last two decades serves to identify two key external factors and four tightly inter-related internal methodological advances that have significantly affected the discipline. These key developments have not only altered the current practice of forensic anthropology, but also its goals, objectives, scope, and definition. The development of DNA analysis techniques served to undermine the classic role of forensic anthropology as a field almost exclusively focused on victim identification. The introduction of the Daubert criteria in the courtroom presentation of scientific testimony accompanied the development of new human comparative samples and tools for data analysis and sharing, resulting in a vastly enhanced role for quantitative methods in human skeletal analysis. Additionally, new questions asked of forensic anthropologists, beyond identity, required sound scientific bases and expanded the scope of the field. This environment favored the incipient development of the interrelated fields of forensic taphonomy, forensic archaeology, and forensic trauma analysis, fields concerned with the reconstruction of events surrounding death. Far from representing the mere addition of new methodological techniques, these disciplines (especially, forensic taphonomy) provide forensic anthropology with a new conceptual framework, which is broader, deeper, and more solidly entrenched in the natural sciences. It is argued that this new framework represents a true paradigm shift, as it modifies not only the way in which classic forensic anthropological questions are answered, but also the goals and tasks of forensic anthropologists, and their perception of what can be considered a legitimate question or problem to be answered within the field.

  15. Digital mammography

    International Nuclear Information System (INIS)

    Bick, Ulrich; Diekmann, Felix

    2010-01-01

    This state-of-the-art reference book provides in-depth coverage of all aspects of digital mammography, including detector technology, image processing, computer-aided diagnosis, soft-copy reading, digital workflow, and PACS. Specific advantages and disadvantages of digital mammography in comparison to screen-film mammography are thoroughly discussed. By including authors from both North America and Europe, the book is able to outline variations in the use, acceptance, and quality assurance of digital mammography between the different countries and screening programs. Advanced imaging techniques and future developments such as contrast mammography and digital breast tomosynthesis are also covered in detail. All of the chapters are written by internationally recognized experts and contain numerous high-quality illustrations. This book will be of great interest both to clinicians who already use or are transitioning to digital mammography and to basic scientists working in the field. (orig.)

  16. Social Studies Teacher Candidates' Opinions about Digital Citizenship and Its Place in Social Studies Teacher Training Program: A Comparison between the USA and Turkey

    Science.gov (United States)

    Karaduman, Hidir

    2017-01-01

    This research aims to determine and compare what social studies teacher candidates living in two different countries think about digital citizenship and its place within social studies and social studies teacher training program and to produce suggestions concerning digital citizenship education. Having a descriptive design, this research has…

  17. Forensic archaeology and anthropology : An Australian perspective.

    Science.gov (United States)

    Oakley, Kate

    2005-09-01

    Forensic archaeology is an extremely powerful investigative discipline and, in combination with forensic anthropology, can provide a wealth of evidentiary information to police investigators and the forensic community. The re-emergence of forensic archaeology and anthropology within Australia relies on its diversification and cooperation with established forensic medical organizations, law enforcement forensic service divisions, and national forensic boards. This presents a unique opportunity to develop a new multidisciplinary approach to forensic archaeology/anthropology within Australia as we hold a unique set of environmental, social, and cultural conditions that diverge from overseas models and require different methodological approaches. In the current world political climate, more forensic techniques are being applied at scenes of mass disasters, genocide, and terrorism. This provides Australian forensic archaeology/anthropology with a unique opportunity to develop multidisciplinary models with contributions from psychological profiling, ballistics, sociopolitics, cultural anthropology, mortuary technicians, post-blast analysis, fire analysis, and other disciplines from the world of forensic science.

  18. "Who Dunnit?": Learning Chemistry and Critical Thinking through Hands-On Forensic Science.

    Science.gov (United States)

    Demetry, Chrysanthe; Nicoletti, Denise; Mix, Kimberlee; O'Connor, Kerri; Martin, Andrea

    2002-01-01

    Demonstrates how forensic science can be used as a framework for generating student interest and learning in chemistry and promoting critical thinking. The "Who Dunnit?" forensic science workshop was developed by undergraduate students and is one element of a two-week residential summer outreach program that seeks to develop interest in…

  19. Recommended Practice: Creating Cyber Forensics Plans for Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Eric Cornelius; Mark Fabro

    2008-08-01

    Cyber forensics has been in the popular mainstream for some time, and has matured into an information-technology capability that is very common among modern information security programs. The goal of cyber forensics is to support the elements of troubleshooting, monitoring, recovery, and the protection of sensitive data. Moreover, in the event of a crime being committed, cyber forensics is also the approach to collecting, analyzing, and archiving data as evidence in a court of law. Although scalable to many information technology domains, especially modern corporate architectures, cyber forensics can be challenging when being applied to non-traditional environments, which are not comprised of current information technologies or are designed with technologies that do not provide adequate data storage or audit capabilities. In addition, further complexity is introduced if the environments are designed using proprietary solutions and protocols, thus limiting the ease of which modern forensic methods can be utilized. The legacy nature and somewhat diverse or disparate component aspects of control systems environments can often prohibit the smooth translation of modern forensics analysis into the control systems domain. Compounded by a wide variety of proprietary technologies and protocols, as well as critical system technologies with no capability to store significant amounts of event information, the task of creating a ubiquitous and unified strategy for technical cyber forensics on a control systems device or computing resource is far from trivial. To date, no direction regarding cyber forensics as it relates to control systems has been produced other than what might be privately available from commercial vendors. Current materials have been designed to support event recreation (event-based), and although important, these requirements do not always satisfy the needs associated with incident response or forensics that are driven by cyber incidents. To address these

  20. Adaptation and Feasibility Study of a Digital Health Program to Prevent Diabetes among Low-Income Patients: Results from a Partnership between a Digital Health Company and an Academic Research Team

    Directory of Open Access Journals (Sweden)

    Valy Fontil

    2016-01-01

    Full Text Available Background. The feasibility of digital health programs to prevent and manage diabetes in low-income patients has not been adequately explored. Methods. Researchers collaborated with a digital health company to adapt a diabetes prevention program for low-income prediabetes patients at a large safety net clinic. We conducted focus groups to assess patient perspectives, revised lessons for improved readability and cultural relevance to low-income and Hispanic patients, conducted a feasibility study of the adapted program in English and Spanish speaking cohorts, and implemented real-time adaptations to the program for commercial use and for a larger trial of in multiple safety net clinics. Results. The majority of focus group participants were receptive to the program. We modified the curriculum to a 5th-grade reading level and adapted content based on patient feedback. In the feasibility study, 54% of eligible contacted patients expressed interest in enrolling (n=23. Although some participants’ computer access and literacy made registration challenging, they were highly satisfied and engaged (80% logged in at least once/week. Conclusions. Underserved prediabetic patients displayed high engagement and satisfaction with a digital diabetes prevention program despite lower digital literacy skills. The collaboration between researchers and a digital health company enabled iterative improvements in technology implementation to address challenges in low-income populations.

  1. Digital Mapping Charting and Geodesy analysis Program (DMAP) Review of Technical Initiatives for FY03

    National Research Council Canada - National Science Library

    Breckenridge, John

    2003-01-01

    The Naval DMAP serves as a technical representative for the Oceanographer of the Navy, NO96 to address significant issues relevant to the Navy's use and development of digital Mapping, Charting & Geodesy (MC&G) data...

  2. A journey from robot to digital human mathematical principles and applications with MATLAB programming

    CERN Document Server

    Gu, Edward Y L

    2013-01-01

    This book provides readers with a solid set of diversified and essential tools for the theoretical modeling and control of complex robotic systems, as well as for digital human modeling and realistic motion generation. Following a comprehensive introduction to the fundamentals of robotic kinematics, dynamics and control systems design, the author extends robotic modeling procedures and motion algorithms to a much higher-dimensional, larger scale and more sophisticated research area, namely digital human modeling. Most of the methods are illustrated by MATLAB™ codes and sample graphical visualizations, offering a unique closed loop between conceptual understanding and visualization. Readers are guided through practicing and creating 3D graphics for robot arms as well as digital human models in MATLAB™, and through driving them for real-time animation. This work is intended to serve as a robotics textbook with an extension to digital human modeling for senior undergraduate and graduate engineering students....

  3. Nuclear Forensics Technologies in Japan

    International Nuclear Information System (INIS)

    Shinohara, N.; Kimura, Y.; Okubo, A.; Tomikawa, H.

    2015-01-01

    Nuclear forensics is the analysis of intercepted illicit nuclear or radioactive material and any associated material to provide evidence for nuclear attribution by determining origin, history, transit routes and purpose involving such material. Nuclear forensics activities include sampling of the illicit material, analysis of the samples and evaluation of the attribution by comparing the analysed data with database or numerical simulation. Because the nuclear forensics methodologies provide hints of the origin of the nuclear materials used in illegal dealings or nuclear terrorism, it contributes to identify and indict offenders, hence to enhance deterrent effect against such terrorism. Worldwide network on nuclear forensics can lead to strengthening global nuclear security regime. In the ESARDA Symposium 2015, the results of research and development of fundamental nuclear forensics technologies performed in Japan Atomic Energy Agency during the term of 2011-2013 were reported, namely (1) technique to analyse isotopic composition of nuclear material, (2) technique to identify the impurities contained in the material, (3) technique to determine the age of the purified material by measuring the isotopic ratio of daughter thorium to parent uranium, (4) technique to make image data by observing particle shapes with electron microscope, and (5) prototype nuclear forensics library for comparison of the analysed data with database in order to evaluate its evidence such as origin and history. Japan’s capability on nuclear forensics and effective international cooperation are also mentioned for contribution to the international nuclear forensics community.

  4. Towards automatic forensic face recognition

    NARCIS (Netherlands)

    Ali, Tauseef; Spreeuwers, Lieuwe Jan; Veldhuis, Raymond N.J.

    2011-01-01

    In this paper we present a methodology and experimental results for evidence evaluation in the context of forensic face recognition. In forensic applications, the matching score (hereafter referred to as similarity score) from a biometric system must be represented as a Likelihood Ratio (LR). In our

  5. Forensic Face Recognition: A Survey

    NARCIS (Netherlands)

    Ali, Tauseef; Veldhuis, Raymond N.J.; Spreeuwers, Lieuwe Jan

    2010-01-01

    Beside a few papers which focus on the forensic aspects of automatic face recognition, there is not much published about it in contrast to the literature on developing new techniques and methodologies for biometric face recognition. In this report, we review forensic facial identification which is

  6. Forensic Face Recognition: A Survey

    NARCIS (Netherlands)

    Ali, Tauseef; Spreeuwers, Lieuwe Jan; Veldhuis, Raymond N.J.; Quaglia, Adamo; Epifano, Calogera M.

    2012-01-01

    The improvements of automatic face recognition during the last 2 decades have disclosed new applications like border control and camera surveillance. A new application field is forensic face recognition. Traditionally, face recognition by human experts has been used in forensics, but now there is a

  7. Forensic Tools for Mobile Phone Subscriber Identity Modules

    Directory of Open Access Journals (Sweden)

    Wayne Jansen

    2006-06-01

    Full Text Available Mobile phones and other handheld devices incorporating cellular capabilities, such as Personal Digital Assistants, are ubiquitous.  Besides placing calls, these devices allow users to perform other useful tasks, including text messaging and phonebook entry management.  When cell phones and cellular devices are involved in a crime or other incident, forensic specialists require tools that allow the proper retrieval and speedy examination of data present on the device.  For devices conforming to the Global System for Mobile Communications (GSM standards, certain data such as dialed numbers, text messages, and phonebook entries are maintained on a Subscriber Identity Module (SIM.  This paper gives a snapshot of the state of the art of forensic software tools for SIMs and an explanation of the types of digital evidence they can recover.

  8. A Partnership Training Program in Breast Cancer Diagnosis: Concept Development of the Next Generation Diagnostic Breast Imaging Using Digital Image Library and Networking Techniques

    National Research Council Canada - National Science Library

    Chouikha, Mohamed F

    2004-01-01

    ...); and Georgetown University (Image Science and Information Systems, ISIS). In this partnership training program, we will train faculty and students in breast cancer imaging, digital image database library techniques and network communication strategy...

  9. Hawaii Coral Reef Assessment and Monitoring Program (CRAMP): digital still images from transects on Kauai, Oahu, Molokai, Maui, and Hawaii 2011-2012 (NCEI Accession 0119360)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This dataset consists of digital still images from the Hawaii Coral Reef Assessment and Monitoring Program (CRAMP) taken 2011-2012 from 29 sites within 5 main...

  10. Hawaii Coral Reef Assessment and Monitoring Program (CRAMP): digital still images from transects on Kauai, Oahu, Molokai, Maui, and Hawaii 2008-2010 (NCEI Accession 0104357)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This dataset consists of digital still images from the Hawaii Coral Reef Assessment and Monitoring Program (CRAMP) taken 2008-2010 from 24 sites within 5 main...

  11. Forensic applications of physics

    International Nuclear Information System (INIS)

    Martinez, Ernesto N.

    2002-01-01

    Science and the law are considered to be the two main shaping forces in modern societies. The Regional Seminars on Forensic Physics are organized by (mostly CNEA) scientists in Bariloche with a twofold purpose: to increase the participation of researchers as experts witnesses in the solution of legal problems, and to make judges aware of facilities and techniques that might prove useful. Some of the contributions to the last seminar are discussed, ranging from the numerical simulation of mayor explosions to the behavior of snow avalanches, and from the proper control of a trace laboratory to the distribution of words in the plays of Shakespeare. (author)

  12. Defining a Forensic Audit

    Directory of Open Access Journals (Sweden)

    Stevenson G. Smith

    2009-03-01

    Full Text Available Disclosures about new financial frauds and scandals are continually appearing in the press.  As a consequence, the accounting profession's traditional methods of monitoring corporate financial activities are under intense scrutiny.  At the same time, there is recognition that principles-based GAAP from the International Accounting Standards Board will become the recognized standard in the U.S.  The authors argue that these two factors will change the practices used to fight corporate malfeasance as investigators adapt the techniques of accounting into a forensic audit engagement model.

  13. Pharmacogenetics and forensic toxicology.

    Science.gov (United States)

    Musshoff, Frank; Stamer, Ulrike M; Madea, Burkhard

    2010-12-15

    Large inter-individual variability in drug response and toxicity, as well as in drug concentrations after application of the same dosage, can be of genetic, physiological, pathophysiological, or environmental origin. Absorption, distribution and metabolism of a drug and interactions with its target often are determined by genetic differences. Pharmacokinetic and pharmacodynamic variations can appear at the level of drug metabolizing enzymes (e.g., the cytochrome P450 system), drug transporters, drug targets or other biomarker genes. Pharmacogenetics or toxicogenetics can therefore be relevant in forensic toxicology. This review presents relevant aspects together with some examples from daily routines. Copyright © 2010. Published by Elsevier Ireland Ltd.

  14. BIOETHICS AND FORENSIC PSYCHIATRY

    Directory of Open Access Journals (Sweden)

    Călin SCRIPCARU

    2016-03-01

    Full Text Available The recent laws on mental health define psychiatric illness as a loss of consciousness and understanding of consequences of self-behavioral acts, evaluated by loss of discernment. As discernment represents the main criteria of responsibility towards personal actions, this study attempts at presenting the ethical issues related to discernment evaluation from the perspective of forensic medicine. We propose a "mint" representation of the content and consequences of one’s own actions as a new criteria of evaluation, taking into account the modern principles of psychology and psychiatry.

  15. Forensic Memories: After Testimony

    DEFF Research Database (Denmark)

    Bøndergaard, Johanne Helbo

    2014-01-01

    of writing that might in fact come “after” testimony. In this paper I attempt to describe a mode of writing in contemporary literature on memory and history, which allows later generations to address historical events to which they did not bear witness, challenging the testimonial mode while bearing its...... strategies and strengths in mind - “after” in both senses of the word. The central argument is that just as the legal concept of testimony was introduced into the cultural sphere to describe a particular genre or mode of writing, the legal concept of forensics will serve as a useful term for describing...

  16. Simulation in computer forensics teaching: the student experience

    OpenAIRE

    Crellin, Jonathan; Adda, Mo; Duke-Williams, Emma; Chandler, Jane

    2011-01-01

    The use of simulation in teaching computing is well established, with digital forensic investigation being a subject area where the range of simulation required is both wide and varied demanding a corresponding breadth of fidelity. Each type of simulation can be complex and expensive to set up resulting in students having only limited opportunities to participate and learn from the simulation. For example students' participation in mock trials in the University mock courtroom or in simulation...

  17. Performance Measurement for Mobile Forensic Data Acquisition in Firefox OS

    OpenAIRE

    Mohd Najwadi Yusoff; Ramlan Mahmod; Mohd Taufik Abdullah; Ali Dehghantanha

    2015-01-01

    Mozilla Corporation has recently released a Linux-based open source operating system, namely Firefox OS. The arrival of this Firefox OS has created new challenges, concentrations and opportunities for digital investigators. Currently, Firefox OS is still not fully supported by most of the existing mobile forensic tools. Even when the phone is detected as Android, only pictures from removable memory was able to be captured. Furthermore, the internal data acquisition is still not working. There...

  18. Forensic odontology education:from undergraduate to PhD - a Brazilian experience.

    Science.gov (United States)

    Dietrichkeit Pereira, J G; Frontanilla Recalde, T S; Barreto Costa, P; Jacometti, V; Vigorito Magalhães, L; Alves Da Silva, R H

    2017-12-01

    Forensic Odontology is a topic present in the majority of Dental Schools in Brazil, and due to this reality, some universities develop activities related to undergraduate and graduate students, from the Dentistry course until the Ph.D. degree. To present the education experience related to Forensic Odontology at School of Dentistry of Ribeirão Preto (USP - University of São Paulo), showing the strategies and activities in the different degrees (Dental course, Forensic Odontology Specialization Program, Specific Professional Training, Master, and Ph.D.). To the undergraduate students, many activities are developed in order to demonstrate all the possibilities that Forensic Dentistry allow, including theoretical and practical activities; in the Forensic Odontology Specialization Program, the dentists are trained to act as Forensic Odontologists in all its amplitude; in the Specific Professional Training, some courses are available, related to specific topics as DVI, Forensic Facial Reconstruction, Auditor in Dental Care Insurance and others; and in the Master and Ph.D. Programs, the professionals receive training in skills like teaching, research, student's guidance and others. In Brazil, Forensic Odontology is a well-known field in Dentistry and universities develop an important role in training a qualified workforce.

  19. Forensic culture as epistemic culture: the sociology of forensic science.

    Science.gov (United States)

    Cole, Simon A

    2013-03-01

    This paper explores whether we can interpret the notion of 'forensic culture' as something akin to what Knorr-Cetina called an 'epistemic culture'. Can we speak of a 'forensic culture', and, if so, how is it similar to, or different from, other epistemic cultures that exist in what is conventionally called 'science'? This question has important policy implications given the National Academy Science's (NAS) recent identification of 'culture' as one of the problems at the root of what it identified as 'serious deficiencies' in U.S. forensic science and 'scientific culture' as an antidote to those problems. Finding the NAS's characterisation of 'scientific culture' overly general and naïve, this paper offers a preliminary exploration of what might be called a 'forensic culture'. Specifically, the paper explores the way in which few of the empirical findings accumulated by sociologists of science about research science seem to apply to forensic science. Instead, forensic science seems to have developed a distinct culture for which a sociological analysis will require new explanatory tools. Faithful sociological analysis of 'forensic culture' will be a necessary prerequisite for the kind of culture change prescribed by external reformist bodies like the NAS. Copyright © 2012. Published by Elsevier Ltd.

  20. Nails in Forensic Toxicology: An Update.

    Science.gov (United States)

    Solimini, Renata; Minutillo, Adele; Kyriakou, Chrystalla; Pichini, Simona; Pacifici, Roberta; Busardo, Francesco Paolo

    2017-01-01

    The analysis of nails as a keratinized matrix to detect drugs or illicit substances has been increasingly used in forensic and clinical toxicology as a complementary test, especially for the specific characteristics of stably accumulating substances for long periods of time. This allows a retrospective investigation of chronic drug abuse, monitoring continuous drug or pharmaceutical use, reveal in utero drug exposure or environmental exposures. We herein review the recent literature investigating drug incorporation mechanisms and drug detection in nails for forensic toxicological purposes. Mechanisms of drug incorporation have not yet been fully elucidated. However, some research has lately contributed to a better understanding of how substances are incorporated into nails, suggesting three potential mechanisms of drug incorporation: contamination from sweat, incorporation from nail bed and incorporation from germinal matrix. In addition, numerous methods dealing with the determination of drugs of abuse, medications and alcohol biomarkers in nails have been reported in studies over the years. The latter methods could find application in clinical and forensic toxicology. The studies herein reviewed point out how important it is to standardize and harmonize the methodologies (either pre-analytical or analytical) for nails analysis and the optimization of sampling as well as the development of proficiency testing programs and the determination of cut-off values. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.

  1. Nanoparticles in forensic science

    Science.gov (United States)

    Cantu, Antonio A.

    2008-10-01

    Nanoparticles appear in several areas of forensic science including security documents, paints, inks, and reagents that develop latent prints. One reagent (known as the silver physical developer) that visualizes the water insoluble components of latent print residue is based on the formation of highly charged silver nanoparticles. These attach to and grow on the residue and generate a silver image. Another such reagent involves highly charged gold nanoparticles. These attach to the residue forming a weak gold image which can be amplified with a silver physical developer. Nanoparaticles are also used in items such as paints, printing inks, and writing inks. Paints and most printing inks consist of nano-sized pigments in a vehicle. However, certain modern ink jet printing inks now contain nano-sized pigments to improve their light fastness and most gel inks are also based on nano scale pigments. These nanoparticlecontaining materials often appear as evidence and are thus subject to forensic characterization. Both luminescent (quantum dots), up-converting nano scale phosphors, and non luminescent nanoparticles are used as security tags to label product, add security to documents, and as anti counterfeiting measures. These assist in determining if an item is fraudulently made.

  2. Forensic Stable Isotope Biogeochemistry

    Science.gov (United States)

    Cerling, Thure E.; Barnette, Janet E.; Bowen, Gabriel J.; Chesson, Lesley A.; Ehleringer, James R.; Remien, Christopher H.; Shea, Patrick; Tipple, Brett J.; West, Jason B.

    2016-06-01

    Stable isotopes are being used for forensic science studies, with applications to both natural and manufactured products. In this review we discuss how scientific evidence can be used in the legal context and where the scientific progress of hypothesis revisions can be in tension with the legal expectations of widely used methods for measurements. Although this review is written in the context of US law, many of the considerations of scientific reproducibility and acceptance of relevant scientific data span other legal systems that might apply different legal principles and therefore reach different conclusions. Stable isotopes are used in legal situations for comparing samples for authenticity or evidentiary considerations, in understanding trade patterns of illegal materials, and in understanding the origins of unknown decedents. Isotope evidence is particularly useful when considered in the broad framework of physiochemical processes and in recognizing regional to global patterns found in many materials, including foods and food products, drugs, and humans. Stable isotopes considered in the larger spatial context add an important dimension to forensic science.

  3. Personal digital assistants are comparable to traditional diaries for dietary self-monitoring during a weight loss program.

    Science.gov (United States)

    Yon, Bethany A; Johnson, Rachel K; Harvey-Berino, Jean; Gold, Beth Casey; Howard, Alan B

    2007-04-01

    Dietary self-monitoring is considered the core of behavioral weight control programs. As software for personal digital assistants (PDA) has become more available, this study investigated whether the use of a PDA would improve dietary self-monitoring frequency and subsequent weight loss over the use of traditional paper diaries. One-hundred-seventy-six adults (BMI 25-39.9) participated in a 6-month behavioral weight control program. Treatment subjects (n = 61) were provided with a PalmZire 21 with Calorie King's Diet Diary software installed. Their self-monitoring habits and weight loss were compared with the results from a previous program (n = 115) which followed the same protocol using paper diaries for self-monitoring. No significant differences in weight loss or dietary self-monitoring were found. More frequent self-monitoring correlated with weight loss in both groups (pself-monitoring that is fitting to their lifestyle and skills.

  4. Application of forensic image analysis in accident investigations.

    Science.gov (United States)

    Verolme, Ellen; Mieremet, Arjan

    2017-09-01

    Forensic investigations are primarily meant to obtain objective answers that can be used for criminal prosecution. Accident analyses are usually performed to learn from incidents and to prevent similar events from occurring in the future. Although the primary goal may be different, the steps in which information is gathered, interpreted and weighed are similar in both types of investigations, implying that forensic techniques can be of use in accident investigations as well. The use in accident investigations usually means that more information can be obtained from the available information than when used in criminal investigations, since the latter require a higher evidence level. In this paper, we demonstrate the applicability of forensic techniques for accident investigations by presenting a number of cases from one specific field of expertise: image analysis. With the rapid spread of digital devices and new media, a wealth of image material and other digital information has become available for accident investigators. We show that much information can be distilled from footage by using forensic image analysis techniques. These applications show that image analysis provides information that is crucial for obtaining the sequence of events and the two- and three-dimensional geometry of an accident. Since accident investigation focuses primarily on learning from accidents and prevention of future accidents, and less on the blame that is crucial for criminal investigations, the field of application of these forensic tools may be broader than would be the case in purely legal sense. This is an important notion for future accident investigations. Copyright © 2017 Elsevier B.V. All rights reserved.

  5. Psychiatric/ psychological forensic report writing.

    Science.gov (United States)

    Young, Gerald

    Approaches to forensic report writing in psychiatry, psychology, and related mental health disciplines have moved from an organization, content, and stylistic framework to considering ethical and other codes, evidentiary standards, and practice considerations. The first part of the article surveys different approaches to forensic report writing, including that of forensic mental health assessment and psychiatric ethics. The second part deals especially with psychological ethical approaches. The American Psychological Association's Ethical Principles and Code of Conduct (2002) provide one set of principles on which to base forensic report writing. The U.S. Federal Rules of Evidence (2014) and related state rules provide another basis. The American Psychological Association's Specialty Guidelines for Forensic Psychology (2013) provide a third source. Some work has expanded the principles in ethics codes; and, in the third part of this article, these additions are applied to forensic report writing. Other work that could help with the question of forensic report writing concerns the 4 Ds in psychological injury assessments (e.g., conduct oneself with Dignity, avoid the adversary Divide, get the needed reliable Data, Determine interpretations and conclusions judiciously). One overarching ethical principle that is especially applicable in forensic report writing is to be comprehensive, scientific, and impartial. As applied to forensic report writing, the overall principle that applies is that the work process and product should reflect integrity in its ethics, law, and science. Four principles that derive from this meta-principle concern: Competency and Communication; Procedure and Protection; Dignity and Distance; and Data Collection and Determination. The standards or rules associated with each of these principles are reviewed. Crown Copyright © 2016. Published by Elsevier Ltd. All rights reserved.

  6. Computer Forensics JumpStart

    CERN Document Server

    Solomon, Michael G; Tittel, Ed; Broom, Neil; Barrett, Diane

    2011-01-01

    Essential reading for launching a career in computer forensicsInternet crime is on the rise, catapulting the need for computer forensics specialists. This new edition presents you with a completely updated overview of the basic skills that are required as a computer forensics professional. The author team of technology security veterans introduces the latest software and tools that exist and they review the available certifications in this growing segment of IT that can help take your career to a new level. A variety of real-world practices take you behind the scenes to look at the root causes

  7. [Research Progress on Forensic Entomotoxicology].

    Science.gov (United States)

    Liu, Zhi-jiang; Zhai, Xian-dun; Guan, Ling; Mo, Yao-nan

    2015-06-01

    Forensic entomotoxicology is a branch of forensic medicine, which applies entomology, toxicology and other related studies to solve the poisoning cases. It has an obvious advantage in the investigation on poisoning death. Based on the expounding definition and research of entomotoxicology, this paper reviews research progress and application value in some aspects of forensic medicine, such as the effects of drugs/toxins on the growth and development of sarcosaphagous insects and the qualitative and quantitative analysis of the drugs/toxins in the poisoned body tissue.

  8. SIDAS - a block-diagram programming system for the interactive digital simulation of dynamic systems

    International Nuclear Information System (INIS)

    Moll, H.; Burkhardt, H.

    1978-01-01

    The paper describes a block-oriented digital simulation system. Some applications clarify the basic structure and operation. The main features of the system are: Easy handling and manipulation through interactive graphical input/output, operational flexibility through successive simulation runs and online modification of parameters, direct access to all facilities of a medium-sized computing system. (orig.) [de

  9. Classroom Habit(us): Digital Learning Tools in a Blended Learning Program

    DEFF Research Database (Denmark)

    Borsotti, Valeria; Møllenbach, Emilie

    2016-01-01

    In this exploratory case study we map the educational practice of teachers and students in a professional master of Interaction Design. Through a grounded analysis of the context we describe and reflect on: 1) the use of digital learning tools in a blended learning environment, 2) co...

  10. Improving Student Job Placement and Assessment through the Use of Digital Marketing Certification Programs

    Science.gov (United States)

    Staton, Mark G.

    2016-01-01

    The area of digital marketing is a difficult one for course development. Not only is it a relatively new topic area--having become popular after many marketing faculty completed their academic training--it is a constantly changing one wherein "innovative" tools are continuously being replaced within the industry. After uncovering what…

  11. Writing Programs as Distributed Networks: A Materialist Approach to University-Community Digital Media Literacy

    Science.gov (United States)

    Comstock, Michelle

    2006-01-01

    This article addresses how community-university digital media literacy projects are redefining literacy, literate practices, and institutions. Using Actor-Network Theory (ANT), which emphasizes the organizing process itself, I analyze the shifting definitions of literacy within one particular university-community collaboration. My analysis…

  12. Forensic Science Education and Educational Requirements for Forensic Scientists.

    Science.gov (United States)

    Gaensslen, Robert E.

    2002-01-01

    Focuses on criminalistics, which can be understood to mean the activities and specialty areas characteristic of most municipal, county, or state forensic science laboratories in the United States. (DDR)

  13. Cyber Forensics Ontology for Cyber Criminal Investigation

    Science.gov (United States)

    Park, Heum; Cho, Sunho; Kwon, Hyuk-Chul

    We developed Cyber Forensics Ontology for the criminal investigation in cyber space. Cyber crime is classified into cyber terror and general cyber crime, and those two classes are connected with each other. The investigation of cyber terror requires high technology, system environment and experts, and general cyber crime is connected with general crime by evidence from digital data and cyber space. Accordingly, it is difficult to determine relational crime types and collect evidence. Therefore, we considered the classifications of cyber crime, the collection of evidence in cyber space and the application of laws to cyber crime. In order to efficiently investigate cyber crime, it is necessary to integrate those concepts for each cyber crime-case. Thus, we constructed a cyber forensics domain ontology for criminal investigation in cyber space, according to the categories of cyber crime, laws, evidence and information of criminals. This ontology can be used in the process of investigating of cyber crime-cases, and for data mining of cyber crime; classification, clustering, association and detection of crime types, crime cases, evidences and criminals.

  14. Author Guidelines: The Arab Journal of Forensic Sciences and Forensic Medicine (AJFSFM)

    OpenAIRE

    Arab Journal of Forensic Sciences & Forensic Medicine

    2017-01-01

    The Arab Journal of Forensic Sciences and Forensic Medicine (AJFSFM) is a peer-reviewed, open access (CC BY-NC), international journal for publishing original contributions in various fields of forensic science. These fields include, but are not limited to forensic pathology and histochemistry, toxicology(drugs, alcohol, etc.), forensic biology (serology, human DNA profiling, entomology, population genetics), forensic chemistry(inks, paints, dyes, explosives, fire accelerants), psychiatry and...

  15. Digital Breast Tomosynthesis with Synthesized Two-Dimensional Images versus Full-Field Digital Mammography for Population Screening: Outcomes from the Verona Screening Program.

    Science.gov (United States)

    Caumo, Francesca; Zorzi, Manuel; Brunelli, Silvia; Romanucci, Giovanna; Rella, Rossella; Cugola, Loredana; Bricolo, Paola; Fedato, Chiara; Montemezzi, Stefania; Houssami, Nehmat

    2018-04-01

    Purpose To examine the outcomes of a breast cancer screening program based on digital breast tomosynthesis (DBT) plus synthesized two-dimensional (2D) mammography compared with those after full-field digital mammography (FFDM). Materials and Methods This prospective study included 16 666 asymptomatic women aged 50-69 years who were recruited in April 2015 through March 2016 for DBT plus synthetic 2D screening in the Verona screening program. A comparison cohort of women screened with FFDM (n = 14 423) in the previous year was included. Screening detection measures for the two groups were compared by calculating the proportions associated with each outcome, and the relative rates (RRs) were estimated with multivariate logistic regression. Results Cancer detection rate (CDR) for DBT plus synthetic 2D imaging was 9.30 per 1000 screening examinations versus 5.41 per 1000 screening examinations with FFDM (RR, 1.72; 95% confidence interval [CI]: 1.30, 2.29). CDR was significantly higher in patients screened with DBT plus synthetic 2D imaging than in those screened with FFDM among women classified as having low breast density (RR, 1.53; 95% CI: 1.13, 2.10) or high breast density (RR, 2.86; 95% CI: 1.42, 6.25). The positive predictive value (PPV) for recall was almost doubled with DBT plus synthetic 2D imaging: 23.3% versus 12.9% of recalled patients who were screened with FFDM (RR, 1.81; 95% CI: 1.34, 2.47). The recall rate was similar between groups (RR, 0.95; 95% CI: 0.84, 1.06), whereas the recall rate with invasive assessment was higher for DBT plus synthetic 2D imaging than for FFDM (RR, 1.93; 95% CI: 1.31, 2.03). The mean number of screening studies interpreted per hour was significantly lower for screening examinations performed with DBT plus synthetic 2D imaging (38.5 screens per hour) than with FFDM (60 screens per hour) (P < .001). Conclusion DBT plus synthetic 2D imaging increases CDRs with recall rates comparable to those of FFDM. DBT plus synthetic 2D imaging

  16. Development of spectral analysis math models and software program and spectral analyzer, digital converter interface equipment design

    Science.gov (United States)

    Hayden, W. L.; Robinson, L. H.

    1972-01-01

    Spectral analyses of angle-modulated communication systems is studied by: (1) performing a literature survey of candidate power spectrum computational techniques, determining the computational requirements, and formulating a mathematical model satisfying these requirements; (2) implementing the model on UNIVAC 1230 digital computer as the Spectral Analysis Program (SAP); and (3) developing the hardware specifications for a data acquisition system which will acquire an input modulating signal for SAP. The SAP computational technique uses extended fast Fourier transform and represents a generalized approach for simple and complex modulating signals.

  17. Mixed-signal early vision chip with embedded image and programming memories and digital I/O

    Science.gov (United States)

    Linan-Cembrano, Gustavo; Rodriguez-Vazquez, Angel; Dominguez-Castro, Rafael; Espejo, Servando

    2003-04-01

    From a system level perspective, this paper presents a 128x128 flexible and reconfigurable Focal-Plane Analog Programmable Array Processor, which has been designed as a single chip in a 0.35μm standard digital 1P-5M CMOS technology. The core processing array has been designed to achieve high-speed of operation and large-enough accuracy (~7bit) with low power consumption. The chip includes on-chip program memory to allow for the execution of complex, sequential and/or bifurcation flow image processing algorithms. It also includes the structures and circuits needed to guarantee its embedding into conventional digital hosting systems: external data interchange and control are completely digital. The chip contains close to four million transistors, 90% of them working in analog mode. The chip features up to 330GOPs (Giga Operations per second), and uses the power supply (180GOP/Joule) and the silicon area (3.8 GOPS/mm2) efficiently, as it is able to maintain VGA processing throughputs of 100Frames/s with about 15 basic image processing tasks on each frame.

  18. Nuclear Forensics: Report of the AAAS/APS Working Group

    Science.gov (United States)

    Tannenbaum, Benn

    2008-04-01

    This report was produced by a Working Group of the American Physical Society's Program on Public Affairs in conjunction with the American Association for the Advancement of Science Center for Science, Technology and Security Policy. The primary purpose of this report is to provide the Congress, U.S. government agencies and other institutions involved in nuclear forensics with a clear unclassified statement of the state of the art of nuclear forensics; an assessment of its potential for preventing and identifying unattributed nuclear attacks; and identification of the policies, resources and human talent to fulfill that potential. In the course of its work, the Working Group observed that nuclear forensics was an essential part of the overall nuclear attribution process, which aims at identifying the origin of unidentified nuclear weapon material and, in the event, an unidentified nuclear explosion. A credible nuclear attribution capability and in particular nuclear forensics capability could deter essential participants in the chain of actors needed to smuggle nuclear weapon material or carry out a nuclear terrorist act and could also encourage states to better secure such materials and weapons. The Working Group also noted that nuclear forensics result would take some time to obtain and that neither internal coordination, nor international arrangements, nor the state of qualified personnel and needed equipment were currently enough to minimize the time needed to reach reliable results in an emergency such as would be caused by a nuclear detonation or the intercept of a weapon-size quantity of material. The Working Group assesses international cooperation to be crucial for forensics to work, since the material would likely come from inadequately documented foreign sources. In addition, international participation, if properly managed, could enhance the credibility of the deterrent effect of attribution. Finally the Working Group notes that the U.S. forensics

  19. Biosensors in forensic sciences

    Directory of Open Access Journals (Sweden)

    Frederickx, C.

    2011-01-01

    Full Text Available A biosensor is a device that uses biological materials to detect and monitor the presence of specific chemicals in an area. Traditional methods of volatile detection used by law enforcement agencies and rescue teams typically consist of reliance on canine olfaction. This concept of using dogs to detect specific substances is quite old. However, dogs have some limitations such as cost of training and time of conditioning. Thus, the possibility of using other organisms as biosensors including rats, dolphins, honeybees, and parasitic wasps for detecting explosives, narcotics and cadavers has been developed. Insects have several advantages unshared by mammals. Insects are sensitive, cheap to produce and can be conditioned with impressive speed for a specific chemical-detection task. Moreover, insects might be a preferred sensing method in scenarios that are deemed too dangerous to use mammals. The purpose of this review is to provide an overview of the biosensors used in forensic sciences.

  20. A history of forensic anthropology.

    Science.gov (United States)

    Ubelaker, Douglas H

    2018-04-01

    Forensic anthropology represents a dynamic and rapidly evolving complex discipline within anthropology and forensic science. Academic roots extend back to early European anatomists but development coalesced in the Americas through high-profile court testimony, assemblage of documented collections and focused research. Formation of the anthropology section of the American Academy of Forensic Sciences in 1972, the American Board of Forensic Anthropology in 1977/1978 and other organizational advances provided important stimuli for progress. While early pioneers concentrated on analysis of skeletonized human remains, applications today have expanded to include complex methods of search and recovery, the biomechanics of trauma interpretation, isotopic analysis related to diet and region of origin, age estimation of the living and issues related to humanitarian and human rights investigations. © 2018 Wiley Periodicals, Inc.

  1. Professional convergence in forensic practice.

    Science.gov (United States)

    Mercer, D; Mason, T; Richman, J

    2001-06-01

    This paper outlines the development and convergence of forensic science and secure psychiatric services in the UK, locating the professionalization of forensic nursing within a complex web of political, economic, and ideological structures. It is suggested that a stagnation of the therapeutic enterprise in high and medium security provision has witnessed an intrusion of medical power into the societal body. Expanding technologies of control and surveillance are discussed in relation to the move from modernity to postmodernity and the ongoing dynamic of medicalized offending. Four aspects of globalization are identified as impacting upon the organization and application of forensic practice: (i) organized capitalism and the exhaustion of the welfare state; (ii) security versus danger and trust versus risk; (iii) science as a meta-language; and (iv) foreclosure as a mechanism of censorship. Finally, as a challenge for the profession, some predictions are offered about the future directions or demise of forensic nursing.

  2. Forensic historiography: narratives and science.

    Science.gov (United States)

    Drukteinis, Albert M

    2014-01-01

    Psychiatrists function, in part, as historians who rely on patient narratives to help them understand presenting mental disorders and explain their causes. Forensic psychiatrists have been skeptical of using narratives, raising concerns about their lack of objectivity and potential for bias. They also have criticized narratives as being more performative than scientific. Recent authors, however, have pointed out that narratives may be helpful in forming forensic opinions and supporting oral testimony, while stressing that their use must be consistent with the ethics espoused by forensic psychiatry. This article reviews the role of narratives in understanding human events and the ubiquitous presence of narratives in the judicial process. It delves into the inescapability of using explicit or implicit narratives in the course of forensic practice, as well as how they may be meaningfully incorporated into evaluations and find expression alongside scientific principles. © 2014 American Academy of Psychiatry and the Law.

  3. Forensic Science--A Proposal

    Science.gov (United States)

    Geesaman, Donald P.; Abrahamson, Dean E.

    1973-01-01

    Forensic science is an approach to study desirability of specific technologies in the context of value objectives and biological imperatives of society. Such groups should be formed with people from various physical and social sciences. (PS)

  4. Evidentiary standards for forensic anthropology.

    Science.gov (United States)

    Christensen, Angi M; Crowder, Christian M

    2009-11-01

    As issues of professional standards and error rates continue to be addressed in the courts, forensic anthropologists should be proactive by developing and adhering to professional standards of best practice. There has been recent increased awareness and interest in critically assessing some of the techniques used by forensic anthropologists, but issues such as validation, error rates, and professional standards have seldom been addressed. Here we explore the legal impetus for this trend and identify areas where we can improve regarding these issues. We also discuss the recent formation of a Scientific Working Group for Forensic Anthropology (SWGANTH), which was created with the purposes of encouraging discourse among anthropologists and developing and disseminating consensus guidelines for the practice of forensic anthropology. We believe it is possible and advisable for anthropologists to seek and espouse research and methodological techniques that meet higher standards to ensure quality and consistency in our field.

  5. Chemical profiling of chemical warfare agents for forensic purposes

    NARCIS (Netherlands)

    Noort, D.; Reuver, L.P.J. de; Fidder, A.; Tromp, M.; Verschraagen, M.

    2010-01-01

    A program has been initiated towards the chemical profiling of chemical warfare agents, in order to support forensic investigations towards synthesis routes, production sites and suspect chemical suppliers. Within the first stage of the project various chemical warfare agents (VX, sulfur mustard,

  6. Parasites in Forensic Science: a historic perspective

    Science.gov (United States)

    Cardoso, Rita; Alves, Helena; Richter, Joachim; Botelho, Monica C

    Parasites show a great potential to Forensic Science. Forensic Science is the application of any science and methodology to the legal system. The forensic scientist collects and analyses the physical evidence and produce a report of the results to the court. A parasite is an organism that lives at the expense of another and they exist in any ecosystem. Parasites are the cause of many important diseases. The forensic scientists can use the parasites to identify a crime scene, to determine the murder weapon or simply identify an individual. The applications for parasites in the Forensic Science can be many and more studies should be made in Forensic Parasitology. The most important parasites in Forensic Science are helminths specifically schistosomes. Through history there are many cases where schistosomes were described in autopsies and it was related to the cause of death. Here we review the applications of parasites in Forensic Science and its importance to the forensic scientist.

  7. The Development of Interactive World Wide Web Based Teaching Material in Forensic Science.

    Science.gov (United States)

    Daeid, Niamh Nic

    2001-01-01

    Describes the development of a Web-based tutorial in the forensic science teaching program at the University of Strathclyde (Scotland). Highlights include the theoretical basis for course development; objectives; Web site design; student feedback; and staff feedback. (LRW)

  8. Evaluation of NCHRP 747 Pavement Forensic Guide for GDOT’s Adoption

    Science.gov (United States)

    2018-04-01

    This report presents the recommendation for whether the Georgia Department of Transportation (GDOT) should adopt the National Cooperative Highway Research Program (NCHRP) Report 747 (Guide for Conducting Forensic Investigations of Highway Pavements) ...

  9. Implementing a Swedish regionalized medical program supported by digital technologies: possibilities and challenges from a management perspective.

    Science.gov (United States)

    Pettersson, Fanny L M

    2013-01-01

    In 2011, Umeå University in Sweden was facing its first attempt to transform the existing medical program into a regionalized medical program (RMP), supported by the use of digital technologies. The Swedish RMP means that students are distributed in geographically separated groups while doing their five clinical clerkship semesters. To provide medical students with ways of undertaking their theoretical studies when geographically distributed, digital technologies are used for educational and administrative purposes. In this article, the Swedish RMP will be described and related to previous international research on educating medical students in rural settings. The aim of this article was, from a management perspective, to understand if and how contradictions arise during the implementation process of the Swedish RMP, supported by digital technologies. Based on this analysis, a further aim was to discuss, from a management perspective, the possibilities and challenges for improvement of this medical educational practice, as well as to provide implications for other similar changes in medical programs internationally. To identify possible contradictions during the implementation process, ethnographically inspired observations were made during management work meetings, before and during the first regionalized semester. In addition, in-depth follow-up interviews were held in May and June 2011 with six management executives of the Swedish RMP, concerning their expectations and experiences of the implementation process. The qualitative and activity theory (AT)-inspired analysis resulted in the emergence of two main themes and seven sub-themes. The analysis suggests that a number of contradictions arose during the implementation process of the Swedish RMP. For instance, a contradiction constituted as a conflict between the university management and some teachers concerning how digital technologies and technology enhanced learning (TEL) could and should be used when

  10. Digital mammography; Mamografia digital

    Energy Technology Data Exchange (ETDEWEB)

    Chevalier, M.; Torres, R.

    2010-07-01

    Mammography represents one of the most demanding radiographic applications, simultaneously requiring excellent contrast sensitivity, high spatial resolution, and wide dynamic range. Film/screen is the most widely extended image receptor in mammography due to both its high spatial resolution and contrast. The film/screen limitations are related with its narrow latitude, structural noise and that is at the same time the medium for the image acquisition, storage and presentation. Several digital detector made with different technologies can overcome these difficulties. Here, these technologies as well as their main advantages and disadvantages are analyzed. Also it is discussed its impact on the mammography examinations, mainly on the breast screening programs. (Author).

  11. HistoStitcher© : An Interactive Program for Accurate and Rapid Reconstruction of Digitized Whole Histological Sections from Tissue Fragments

    Science.gov (United States)

    Chappelow, Jonathan; Tomaszewski, John E.; Feldman, Michael; Shih, Natalie; Madabhushi, Anant

    2011-01-01

    We present an interactive program called HistoStitcher© for accurate and rapid reassembly of histology fragments into a pseudo-whole digitized histological section. HistoStitcher© provides both an intuitive graphical interface to assist the operator in performing the stitch of adjacent histology fragments by selecting pairs of anatomical landmarks, and a set of computational routines for determining and applying an optimal linear transformation to generate the stitched image. Reconstruction of whole histological sections from images of slides containing smaller fragments is required in applications where preparation of whole sections of large tissue specimens is not feasible or efficient, and such whole mounts are required to facilitate (a) disease annotation and (b) image registration with radiological images. Unlike manual reassembly of image fragments in a general purpose image editing program (such as Photoshop), HistoStitcher© provides memory efficient operation on high resolution digitized histology images and a highly flexible stitching process capable of producing more accurate results in less time. Further, by parameterizing the series of transformations determined by the stitching process, the stitching parameters can be saved, loaded at a later time, refined, or reapplied to multi-resolution scans, or quickly transmitted to another site. In this paper, we describe in detail the design of HistoStitcher© and the mathematical routines used for calculating the optimal image transformation, and demonstrate its operation for stitching high resolution histology quadrants of a prostate specimen to form a digitally reassembled whole histology section, for 8 different patient studies. To evaluate stitching quality, a 6 point scoring scheme, which assesses the alignment and continuity of anatomical structures important for disease annotation, is employed by three independent expert pathologists. For 6 studies compared with this scheme, reconstructed sections

  12. Integrating forensic science into nursing processes in the ICU.

    Science.gov (United States)

    Hoyt, Constance A

    2006-01-01

    The critical care nurse is in an ideal position to assume responsibilities related to the identification of forensic cases and the preservation of associated evidence. Victims of child and elder abuse and neglect, individuals involved in vehicular or industrial accidents, substance abusers, and incarcerated populations are among the several types of patients that are likely to managed in the intensive care unit (ICU). Hospitals and their personnel assume considerable liability in such cases for detecting, collecting, and preserving evidence, as well as for reporting and referring the cases to appropriate law enforcement or judicial authorities. The Joint Commission for the Accreditation of Healthcare Organizations has published specific regulatory guidance to ensure that all healthcare personnel are properly educated to assume certain forensic responsibilities. The orientation and in-service programs of the ICU nurse should include specific guidance regarding forensic principles, practices, and procedures.

  13. Keeping the Momentum and Nuclear Forensics at Los Alamos National Laboratory

    International Nuclear Information System (INIS)

    Steiner, Robert Ernest; Dion, Heather M.; Dry, Donald E.; Kinman, William Scott; LaMont, Stephen Philip; Podlesak, David; Tandon, Lav

    2016-01-01

    LANL has 70 years of experience in nuclear forensics and supports the community through a wide variety of efforts and leveraged capabilities: Expanding the understanding of nuclear forensics, providing training on nuclear forensics methods, and developing bilateral relationships to expand our understanding of nuclear forensic science. LANL remains highly supportive of several key organizations tasked with carrying forth the Nuclear Security Summit messages: IAEA, GICNT, and INTERPOL. Analytical chemistry measurements on plutonium and uranium matrices are critical to numerous programs including safeguards accountancy verification measurements. Los Alamos National Laboratory operates capable actinide analytical chemistry and material science laboratories suitable for nuclear material and environmental forensic characterization. Los Alamos National Laboratory uses numerous means to validate and independently verify that measurement data quality objectives are met. Numerous LANL nuclear facilities support the nuclear material handling, preparation, and analysis capabilities necessary to evaluate samples containing nearly any mass of an actinide (attogram to kilogram levels).

  14. Keeping the Momentum and Nuclear Forensics at Los Alamos National Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Steiner, Robert Ernest [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Dion, Heather M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Dry, Donald E. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Kinman, William Scott [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); LaMont, Stephen Philip [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Podlesak, David [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Tandon, Lav [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-07-22

    LANL has 70 years of experience in nuclear forensics and supports the community through a wide variety of efforts and leveraged capabilities: Expanding the understanding of nuclear forensics, providing training on nuclear forensics methods, and developing bilateral relationships to expand our understanding of nuclear forensic science. LANL remains highly supportive of several key organizations tasked with carrying forth the Nuclear Security Summit messages: IAEA, GICNT, and INTERPOL. Analytical chemistry measurements on plutonium and uranium matrices are critical to numerous programs including safeguards accountancy verification measurements. Los Alamos National Laboratory operates capable actinide analytical chemistry and material science laboratories suitable for nuclear material and environmental forensic characterization. Los Alamos National Laboratory uses numerous means to validate and independently verify that measurement data quality objectives are met. Numerous LANL nuclear facilities support the nuclear material handling, preparation, and analysis capabilities necessary to evaluate samples containing nearly any mass of an actinide (attogram to kilogram levels).

  15. The digital computer

    CERN Document Server

    Parton, K C

    2014-01-01

    The Digital Computer focuses on the principles, methodologies, and applications of the digital computer. The publication takes a look at the basic concepts involved in using a digital computer, simple autocode examples, and examples of working advanced design programs. Discussions focus on transformer design synthesis program, machine design analysis program, solution of standard quadratic equations, harmonic analysis, elementary wage calculation, and scientific calculations. The manuscript then examines commercial and automatic programming, how computers work, and the components of a computer

  16. Average glandular dose in paired digital mammography and digital breast tomosynthesis acquisitions in a population based screening program: effects of measuring breast density, air kerma and beam quality

    Science.gov (United States)

    Helge Østerås, Bjørn; Skaane, Per; Gullien, Randi; Catrine Trægde Martinsen, Anne

    2018-02-01

    The main purpose was to compare average glandular dose (AGD) for same-compression digital mammography (DM) and digital breast tomosynthesis (DBT) acquisitions in a population based screening program, with and without breast density stratification, as determined by automatically calculated breast density (Quantra™). Secondary, to compare AGD estimates based on measured breast density, air kerma and half value layer (HVL) to DICOM metadata based estimates. AGD was estimated for 3819 women participating in the screening trial. All received craniocaudal and mediolateral oblique views of each breasts with paired DM and DBT acquisitions. Exposure parameters were extracted from DICOM metadata. Air kerma and HVL were measured for all beam qualities used to acquire the mammograms. Volumetric breast density was estimated using Quantra™. AGD was estimated using the Dance model. AGD reported directly from the DICOM metadata was also assessed. Mean AGD was 1.74 and 2.10 mGy for DM and DBT, respectively. Mean DBT/DM AGD ratio was 1.24. For fatty breasts: mean AGD was 1.74 and 2.27 mGy for DM and DBT, respectively. For dense breasts: mean AGD was 1.73 and 1.79 mGy, for DM and DBT, respectively. For breasts of similar thickness, dense breasts had higher AGD for DM and similar AGD for DBT. The DBT/DM dose ratio was substantially lower for dense compared to fatty breasts (1.08 versus 1.33). The average c-factor was 1.16. Using previously published polynomials to estimate glandularity from thickness underestimated the c-factor by 5.9% on average. Mean AGD error between estimates based on measurements (air kerma and HVL) versus DICOM header data was 3.8%, but for one mammography unit as high as 7.9%. Mean error of using the AGD value reported in the DICOM header was 10.7 and 13.3%, respectively. Thus, measurement of breast density, radiation dose and beam quality can substantially affect AGD estimates.

  17. Integrated computer-aided forensic case analysis, presentation, and documentation based on multimodal 3D data.

    Science.gov (United States)

    Bornik, Alexander; Urschler, Martin; Schmalstieg, Dieter; Bischof, Horst; Krauskopf, Astrid; Schwark, Thorsten; Scheurer, Eva; Yen, Kathrin

    2018-06-01

    Three-dimensional (3D) crime scene documentation using 3D scanners and medical imaging modalities like computed tomography (CT) and magnetic resonance imaging (MRI) are increasingly applied in forensic casework. Together with digital photography, these modalities enable comprehensive and non-invasive recording of forensically relevant information regarding injuries/pathologies inside the body and on its surface. Furthermore, it is possible to capture traces and items at crime scenes. Such digitally secured evidence has the potential to similarly increase case understanding by forensic experts and non-experts in court. Unlike photographs and 3D surface models, images from CT and MRI are not self-explanatory. Their interpretation and understanding requires radiological knowledge. Findings in tomography data must not only be revealed, but should also be jointly studied with all the 2D and 3D data available in order to clarify spatial interrelations and to optimally exploit the data at hand. This is technically challenging due to the heterogeneous data representations including volumetric data, polygonal 3D models, and images. This paper presents a novel computer-aided forensic toolbox providing tools to support the analysis, documentation, annotation, and illustration of forensic cases using heterogeneous digital data. Conjoint visualization of data from different modalities in their native form and efficient tools to visually extract and emphasize findings help experts to reveal unrecognized correlations and thereby enhance their case understanding. Moreover, the 3D case illustrations created for case analysis represent an efficient means to convey the insights gained from case analysis to forensic non-experts involved in court proceedings like jurists and laymen. The capability of the presented approach in the context of case analysis, its potential to speed up legal procedures and to ultimately enhance legal certainty is demonstrated by introducing a number of

  18. Basic digital signal processing

    CERN Document Server

    Lockhart, Gordon B

    1985-01-01

    Basic Digital Signal Processing describes the principles of digital signal processing and experiments with BASIC programs involving the fast Fourier theorem (FFT). The book reviews the fundamentals of the BASIC program, continuous and discrete time signals including analog signals, Fourier analysis, discrete Fourier transform, signal energy, power. The text also explains digital signal processing involving digital filters, linear time-variant systems, discrete time unit impulse, discrete-time convolution, and the alternative structure for second order infinite impulse response (IIR) sections.

  19. Implementing The Automated Phases Of The Partially-Automated Digital Triage Process Model

    Directory of Open Access Journals (Sweden)

    Gary D Cantrell

    2012-12-01

    Full Text Available Digital triage is a pre-digital-forensic phase that sometimes takes place as a way of gathering quick intelligence. Although effort has been undertaken to model the digital forensics process, little has been done to date to model digital triage. This work discuses the further development of a model that does attempt to address digital triage the Partially-automated Crime Specific Digital Triage Process model. The model itself will be presented along with a description of how its automated functionality was implemented to facilitate model testing.

  20. Digital system for acquiring signals from photodiode arrays. No. Program Element 2317-08-03

    International Nuclear Information System (INIS)

    Le Guen, M.; Meric, B.

    1981-01-01

    A model of circuit allowing the digitization and the memorization of signals coming from linear arrays of photodiodes have been realized. The authors first recall the organization and present in the second part some test results on experimental sites. The model consists of 1 - an acquisition, memorization and visualization card (AMV card) for the data from RETICON 121 photodiode strips, 2 - a series transfer card for the memorized data, and 3 - an interface and multiplexing card associated with a system using a 6800 microprocessor allowing the management of eight acquisition cards [fr

  1. Psychiatric comorbidity in forensic psychiatry.

    Science.gov (United States)

    Palijan, Tija Zarković; Muzinić, Lana; Radeljak, Sanja

    2009-09-01

    For the past several years a numerous studies in the field of forensic psychiatry confirmed a close relationship between violent offenders and comorbid substance abuse. The comorbid substance abuse in violent offenders was usually unrecognized and misdiagnosed. Furthermore, comorbidity in forensic psychiatry describes the co-occurrence of two or more conditions or psychiatric disorder known in the literature as dual diagnosis and defined by World Health Organization (WHO). In fact, many violent offenders have multiple psychiatric diagnoses. Recent studies have confirmed causal relationship between major psychiatric disorders and concomitant substance abuse (comorbidity) in 50-80% of forensic cases. In general, there is a high level of psychiatric comorbidity in forensic patients with prevalence of personality disorders (50-90%), mood disorders (20-60%) and psychotic disorders (15-20%) coupled with substance abuse disorders. Moreover, the high prevalence of psychiatric comorbidities could be found in mentally retarded individuals, as well as, in epileptic patients. Drugs and alcohol abuse can produce serious psychotoxic effects that may lead to extreme violent behavior and consequently to serious criminal offence such as physical assault, rape, armed robbery, attempted murder and homicide, all due to an altered brain function and generating psychotic-like symptoms. Studies have confirmed a significant statistical relevance in causal relationship between substance abuse and violent offences. In terms of forensic psychiatry, the comorbidity strongly contributes in the process of establishing psychiatric diagnosis of diminished mental capacity or insanity at the time of the offence in the course of clinical assessment and evaluation of violent offenders. Today, the primary focus of forensic psychiatry treatment services (in-patient or community) is management of the violent offenders with psychiatric comorbidity which requires a multilevel, evidence based approach to

  2. Development and evaluation of first responder equipment for nuclear forensics

    International Nuclear Information System (INIS)

    Tsuchiya, Ken'ichi; Kurosawa, Kenji; Akiba, Norimitsu; Kuroki, Kenro; Schwantes, Jon M.; Pierson, Richard; Piper, Roman K.

    2014-01-01

    Nuclear forensics are the technical means by which nuclear and other radioactive materials used in illegal activities are characterized as to physical and chemical condition, provenance, and history. Sampling for traditional forensics evidence (e.g. fingerprints, DNA, hair, fibers, and digital evidence) contaminated by radionuclides, and categorization of nuclear and other radioactive materials by on-sight measurement are required for first responders. Portable radiological equipment and radiation protection for first responders to achieve emergency tasks safely at the incident sites have been developed and evaluated in National Research Institute of Police Science. In this report, we introduce wireless network dosimetry system and neutron protection shield with water under sampling and categorization. Described next in this report are evaluation tests of active personal dosimeters using neutron irradiation field in Pacific Northwest National Laboratory. We evaluated them under fast and thermal neutron field. We confirmed the large fluctuation of the response for each dosimeter caused by the energy dependence of the detectors. (author)

  3. Framework para la computación forense en Colombia

    Directory of Open Access Journals (Sweden)

    Andrés F. Álvarez Serna

    2012-12-01

    Full Text Available Este FRAMEWORK es un conjunto estandarizado de conceptos, prácticas y criterios para enfocar la problemática a la que se enfrentan los investigadores forenses al momento de procesar las evidencias digitales. Este artículo se refiere a la forense digital en conceptos generales y ubica al lector en el presente de esta ciencia y muestra una guía de pasos a seguir para la recolección y tratamiento de las evidencias enmarcadas en las leyes colombianas y servirá como material de apoyo a estudiantes interesados en el tema y/o quienes ya estén en el medio.

  4. Targeting Medication Non-Adherence Behavior in Selected Autoimmune Diseases: A Systematic Approach to Digital Health Program Development.

    Directory of Open Access Journals (Sweden)

    Trevor van Mierlo

    Full Text Available 29 autoimmune diseases, including Rheumatoid Arthritis, gout, Crohn's Disease, and Systematic Lupus Erythematosus affect 7.6-9.4% of the population. While effective therapy is available, many patients do not follow treatment or use medications as directed. Digital health and Web 2.0 interventions have demonstrated much promise in increasing medication and treatment adherence, but to date many Internet tools have proven disappointing. In fact, most digital interventions continue to suffer from high attrition in patient populations, are burdensome for healthcare professionals, and have relatively short life spans.Digital health tools have traditionally centered on the transformation of existing interventions (such as diaries, trackers, stage-based or cognitive behavioral therapy programs, coupons, or symptom checklists to electronic format. Advanced digital interventions have also incorporated attributes of Web 2.0 such as social networking, text messaging, and the use of video. Despite these efforts, there has not been little measurable impact in non-adherence for illnesses that require medical interventions, and research must look to other strategies or development methodologies. As a first step in investigating the feasibility of developing such a tool, the objective of the current study is to systematically rate factors of non-adherence that have been reported in past research studies.Grounded Theory, recognized as a rigorous method that facilitates the emergence of new themes through systematic analysis, data collection and coding, was used to analyze quantitative, qualitative and mixed method studies addressing the following autoimmune diseases: Rheumatoid Arthritis, gout, Crohn's Disease, Systematic Lupus Erythematosus, and inflammatory bowel disease. Studies were only included if they contained primary data addressing the relationship with non-adherence.Out of the 27 studies, four non-modifiable and 11 modifiable risk factors were

  5. Forensic psychiatry in Chile.

    Science.gov (United States)

    St Denis, Emily E; Sepúlveda, Enrique; Téllez, Carlos; Arboleda-Flórez, Julio; Stuart, Heather; Lam, Miu

    2012-01-01

    Mental disorders are among the most prevalent of chronic disorders, and a high prevalence of these disorders has been consistently found in jails and prisons. This study was a retrospective case series that described the population of adults charged with a criminal offense who were court ordered to undergo a psychiatric assessment within the Medical Legal Service in Santiago, Chile from 2005 to 2006. Characteristics were explored in order to better understand this population in light of the recent reforms in the judicial and health systems of Chile. Ninety percent of sampled individuals were male, primarily between the ages of 18-39 years. Seventy percent of the evaluations came from the pre-reformed judicial system and 30% were from the reformed system. Approximately 63% of evaluated offenders were considered to have a psychiatric pathology, the most common being the personality disorders. Of the evaluated offenders, approximately 84% were considered by a psychiatrist to be criminally responsible for their crime, 7% were regarded as having diminished criminal responsibility, 4% were considered to be not criminally responsible for their crime, and 4% were cases where criminal responsibility was not applicable. Profession status, municipality of residence, type of residence, ICD-10 diagnosis, treatment recommendation, and criminal responsibility were found to be significantly different between male and female evaluated offenders. Results from this investigation will contribute to knowledge about forensic psychiatry and mental health in Latin America, and will hopefully pave the way for more research and international comparisons. Copyright © 2012 Elsevier Ltd. All rights reserved.

  6. Ethanol Forensic Toxicology.

    Science.gov (United States)

    Perry, Paul J; Doroudgar, Shadi; Van Dyke, Priscilla

    2017-12-01

    Ethanol abuse can lead to negative consequences that oftentimes result in criminal charges and civil lawsuits. When an individual is suspected of driving under the influence, law enforcement agents can determine the extent of intoxication by measuring the blood alcohol concentration (BAC) and performing a standardized field sobriety test. The BAC is dependent on rates of absorption, distribution, and elimination, which are influenced mostly by the dose of ethanol ingested and rate of consumption. Other factors contributing to BAC are gender, body mass and composition, food effects, type of alcohol, and chronic alcohol exposure. Because of individual variability in ethanol pharmacology and toxicology, careful extrapolation and interpretation of the BAC is needed, to justify an arrest and assignment of criminal liability. This review provides a summary of the pharmacokinetic properties of ethanol and the clinical effects of acute intoxication as they relate to common forensic questions. Concerns regarding the extrapolation of BAC and the implications of impaired memory caused by alcohol-induced blackouts are discussed. © 2017 American Academy of Psychiatry and the Law.

  7. Forensic Physics 101: Falls from a height

    Science.gov (United States)

    Cross, Rod

    2008-09-01

    The physics of falling from a height, a topic that could be included in a course on forensic physics or in an undergraduate class as an example of Newton's laws, is applied to a common forensic problem.

  8. Drawbacks in the scientification of forensic science.

    Science.gov (United States)

    Biedermann, A; Curran, J

    2014-12-01

    This letter to the Editor comments on the article On the limitations of probability in conceptualizing pattern matches in forensic science by P. T. Jayaprakash (Forensic Science International, [10]). Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  9. Active Traffic Capture for Network Forensics

    Science.gov (United States)

    Slaviero, Marco; Granova, Anna; Olivier, Martin

    Network traffic capture is an integral part of network forensics, but current traffic capture techniques are typically passive in nature. Under heavy loads, it is possible for a sniffer to miss packets, which affects the quality of forensic evidence.

  10. Herschel Studies of the Evolution and Environs of Young Stars in the DIGIT, WISH, and FOOSH Programs

    Science.gov (United States)

    Green, Joel D.; DIGIT OT Key Project Team; WISH GT Key Project Team; FOOSH OT1 Team

    2012-01-01

    The Herschel Space Observatory has enabled us to probe the physical conditions of outer disks, envelopes, and outflows of young stellar objects, including embedded objects, Herbig Ae/Be disks, and T Tauri disks. We will report on results from three projects, DIGIT, WISH, and FOOSH. The DIGIT (Dust, Ice, and Gas in Time) program (PI: Neal Evans) utilizes the full spectral range of the PACS instrument to explore simultaneously the solid and gas-phase chemistry around sources in all of these stages. WISH (Water in Star Forming Regions with Herschel, PI Ewine van Dishoeck) focuses on observations of key lines with HIFI and line scans of selected spectral regions with PACS. FOOSH (FU Orionis Objects Surveyed with Herschel, PI Joel Green) studies FU Orionis objects with full range PACS and SPIRE scans. DIGIT includes examples of low luminosity protostars, while FOOSH studies the high luminosity objects during outburst states. Rotational ladders of highly excited CO and OH emission are detected in both disks and protostars. The highly excited lines are more commonly seen in the embedded phases, where there appear to be two temperature components. Intriguingly, water is frequently detected in spectra of embedded sources, but not in the disk spectra. In addition to gas features, we explore the extent of the newly detected 69 um forsterite dust feature in both T Tauri and Herbig Ae/Be stars. When analyzed along with the Spitzer-detected dust features, these provide constraints on a population of colder crystalline material. We will present some models of individual sources, as well as some broad statistics of the emission from these stages of star and planet formation.

  11. Developing a Forensic Approach to Process Improvement: The Relationship between Curriculum and Impact in Frontline Operator Education

    Science.gov (United States)

    Croom, Simon; Betts, Alan

    2011-01-01

    The authors present a comparative study of 2 in-company educational programs aimed at developing frontline operator capabilities in forensic methods. They discuss the relationship between the application of various forensic tools and conceptual techniques, the process (i.e., curriculum) for developing employee knowledge and capability, and the…

  12. A Novel Secure Image Hashing Based on Reversible Watermarking for Forensic Analysis

    OpenAIRE

    Doyoddorj, Munkhbaatar; Rhee, Kyung-Hyune

    2011-01-01

    Part 2: Workshop; International audience; Nowadays, digital images and videos have become increasingly popular over the Internet and bring great social impact to a wide audience. In the meanwhile, technology advancement allows people to easily alter the content of digital multimedia and brings serious concern on the trustworthiness of online multimedia information. In this paper, we propose a new framework for multimedia forensics by using compact side information based on reversible watermar...

  13. Civil forensic psychiatry - Part 1: an overview.

    Science.gov (United States)

    Samuels, Anthony H

    2018-02-01

    Objectives This paper provides an overview for general and forensic psychiatrists of the complexity and challenge of working in the civil medico-legal arena. It covers expert evidence, ethics, core concepts in civil forensic psychiatry and report writing. Conclusions Civil forensic psychiatry is an important sub-speciality component of forensic psychiatry that requires specific skills, knowledge and the ability to assist legal bodies in determining the significance of psychiatric issues.

  14. Technological policies for education and digital literacy: the governmental program ‘e.escolinha’

    Directory of Open Access Journals (Sweden)

    Sara Pereira

    2012-12-01

    Full Text Available In 2008, the Portuguese government announced the initiative ’e.escolinha’ which included the distribution of computers ‘Magalhães’ to students of the 1st cycle of basic education for three consecutive school years. Currently suspended, the programme was a flagship of the XVII Constitutional Government, led by José Sócrates, but it was also subject of controversy from the opposition parties and from the school community, especially due to the apparent emphasis on access to technology rather than a greater concern with the training and pedagogical practices. Under the Technological Plan for Education, the ’e.escolinha’ initiative was part of a broader policy for the development of a competitive and dynamic economy, responding to the goals set by the EU in the Lisbon Strategy 2000. The initiative was presented to the country with ambitious goals regarding the expected changes to teachers’ pedagogical practices, the process of children’s learning and school success in general. However, the most visible face of the policy, although it may comprise other nuances, may have been reduced to the question of access, investing little in other dimensions of digital literacy. Based on interviews with key actors involved in the conception and implementation of the ’e.escolinha’ initiative, and on official programme documents, this paper intends to discuss how policy makers and companies set out and evaluate the objectives of this initiative. It is intended, in particular, to understand if they share the idea that this governmental measure follows a technological drift or if they discern any digital literacy objectives in it. This piece of work is part of a research project titled "Navigating with Magellan: Study on the Impact of Digital Media on Schoolchildren," that is being carried out at the Communication and Society Research Centre at the University of Minho, funded by the Portuguese Foundation for Science and Technology ((PTDC

  15. Virginia Base Mapping Program (VBMP) 2002; Digital Terrain Model developed for 1"=400' scale Digital Orthophotography for the South Zone of the Virginia State Plane Grid

    Data.gov (United States)

    Federal Emergency Management Agency, Department of Homeland Security — These files contain rectified digital vector terrain model data. The vector files are uncompressed complete with coordinate information. The VBMP project encompasses...

  16. Virginia Base Mapping Program (VBMP) 2002; Digital Terrain Model developed for 1"=400' scale Digital Orthophotography for the South Zone of the Virginia State Plane Grid

    Data.gov (United States)

    Federal Emergency Management Agency, Department of Homeland Security — Terrain data, as defined in FEMA Guidelines and Specifications, Appendix N: Data Capture Standards, describes the digital topographic data that was used to create...

  17. User's instructions for ORCENT II: a digital computer program for the analysis of steam turbine cycles supplied by light-water-cooled reactors

    International Nuclear Information System (INIS)

    Fuller, L.C.

    1979-02-01

    The ORCENT-II digital computer program will perform calculations at valves-wide-open design conditions, maximum guaranteed rating conditions, and an approximation of part-load conditions for steam turbine cycles supplied with throttle steam characteristic of contemporary light-water reactors. Turbine performance calculations are based on a method published by the General Electric Company. Output includes all information normally shown on a turbine-cycle heat balance diagram. The program is written in FORTRAN IV for the IBM System 360 digital computers at the Oak Ridge National Laboratory

  18. User's instructions for ORCENT II: a digital computer program for the analysis of steam turbine cycles supplied by light-water-cooled reactors

    Energy Technology Data Exchange (ETDEWEB)

    Fuller, L.C.

    1979-02-01

    The ORCENT-II digital computer program will perform calculations at valves-wide-open design conditions, maximum guaranteed rating conditions, and an approximation of part-load conditions for steam turbine cycles supplied with throttle steam characteristic of contemporary light-water reactors. Turbine performance calculations are based on a method published by the General Electric Company. Output includes all information normally shown on a turbine-cycle heat balance diagram. The program is written in FORTRAN IV for the IBM System 360 digital computers at the Oak Ridge National Laboratory.

  19. Digital Filming of the Seismograms Held in the Jakarta Archives: A Pilot Program

    Science.gov (United States)

    Okal, E. A.; Kirby, S. H.

    2014-12-01

    Because of the long duration of most seismic cycles with respect to thehistory of seismological instrumentation,seismograms from the first half of the 20th century constitute an invaluableresource, allowing significant constraints on the regional chronologyof earthquake occurrence as well as the modern quantification of their sizethrough the calculation of seismic moments. This is especially true in theSouthern hemisphere which hosted few seismic stations before the 1930s. In this context, the preservation of seismograms in a digital format allowing their seamless exchange is an important challenge to the scientific community. Under funding from the Earth Observatory of Singapore, we initiated in July2014 a pilotproject, administered by IASPEI, to test the feasibility ofphotographically scanning records of the Wiechert and Bosch instruments operatedat the Jakarta (ex-Batavia) station since 1910 and archivedat the BMKG regional office in Ciputat. We used a 24 MP SONY alphaNEXT 7 camera with a nearly distortion-free wide angle lens mounted on a copystand with underside light-table illumination. We encounteredmany challenges, including the fragility of acidic paper,serious dark-brown age-toning of the paper, as well as many missing records.However, this pilot test showed that this inexpensive systemis effective in providing well-resolved waveforms, and reaped more than 500digital copies of seismograms of earthquakes earmarked for theirglobal or regional importance, going back to 1910.Including the compilation of metadata necessary for futuresearch capability, 15 to 20 seismograms can be scanned per hour.Following successful capacity building through on-site training of BMKG Staff,it is hoped that this project can be pursued at BMKG, and complementsimilar endeavors, especially in the critically important Southern Hemisphere,either ongoing (e.g., at Canberra, Silverton), or desirable (e.g., at Lower Hutt,La Paz).

  20. A Positive Behavioral Approach for Aggression in Forensic Psychiatric Settings.

    Science.gov (United States)

    Tolisano, Peter; Sondik, Tracey M; Dike, Charles C

    2017-03-01

    Aggression toward self and others by complex patients admitted to forensic psychiatric settings is a relatively common yet extremely difficult behavior to treat. Traditional interventions in forensic inpatient settings have historically emphasized control and management over treatment. Research over the past several years has demonstrated the value of behavioral and psychosocial treatment interventions to reduce aggression and to increase prosocial skill development in inpatient forensic population. Positive behavioral support (PBS) offers a comprehensive approach that incorporates the science of applied behavioral analysis (ABA) in support of patients with challenging behaviors, including aggression and violence. In this article, we describe a PBS model to treat aggression in forensic settings. PBS includes a comprehensive functional assessment, along with four basic elements: ecological strategies, positive programming, focused support strategies, and reactive strategies. Other key components are described, including data collection, staff training, fidelity checks to ensure correct implementation of the plan, and ongoing monitoring and revision of PBS strategies, according to treatment outcomes. Finally, a behavioral consultation team approach within the inpatient forensic setting is recommended, led by an assigned doctoral-level psychologist with specialized knowledge and training in behavioral methods. The behavioral consultation team works directly with the unit treatment team and the identified patient to develop, implement, and track a plan that may extend over several weeks to several months including transition into the community. PBS can offer a positive systemic impact in forensic inpatient settings, such as providing a nonpharmacologic means to address aggression, reducing the incidences of restraint and seclusion, enhancing staff proficiency in managing challenging patient presentations, and reducing recidivism when used as part of the bridge to

  1. Home - Virginia Department of Forensic Science

    Science.gov (United States)

    Collecting DNA Data Bank Samples Forensic Training Forensic Science Academy Short Course Schedule Forensic gross weights, marijuana food products and search warrant cases. Click anywhere on the image to open the -screen comparison software system to perform and document the comparison. Virginia DNA Data Bank

  2. THE ROLE OF FORENSIC DENTIST FOLLOWING MASS ...

    African Journals Online (AJOL)

    and dental practitioners of the crucial role of dentist in victim's identification and ... role of forensic dental personnel in human identification following ... matrimonial, or financial reasons6. The first and .... chief physician during the systematic extermination of the Jews at ... of police officers with forensic pathologist and forensic.

  3. Group program procedure for machining seal rings of steam turbines on digital computer controlled machines

    International Nuclear Information System (INIS)

    Glukhikh, V.K.; Skvortsov, S.B.; Sidorov, V.A.

    1982-01-01

    Developed is a group program procedure for turning machining of seal rings, including the use of new progressive high-accuracy equipment, universal device for securing of all nomenclature of treated seal rings, necessary cutting tools and program control of the process of treatment. Introduction of a new technological process permitted to improve the quality of treated seal rings; to reduce the labour consumption in 30...40% [ru

  4. CROSAT: A digital computer program for statistical-spectral analysis of two discrete time series

    International Nuclear Information System (INIS)

    Antonopoulos Domis, M.

    1978-03-01

    The program CROSAT computes directly from two discrete time series auto- and cross-spectra, transfer and coherence functions, using a Fast Fourier Transform subroutine. Statistical analysis of the time series is optional. While of general use the program is constructed to be immediately compatible with the ICL 4-70 and H316 computers at AEE Winfrith, and perhaps with minor modifications, with any other hardware system. (author)

  5. Digital books.

    Science.gov (United States)

    Wink, Diane M

    2011-01-01

    In this bimonthly series, the author examines how nurse educators can use the Internet and Web-based computer technologies such as search, communication, and collaborative writing tools; social networking and social bookmarking sites; virtual worlds; and Web-based teaching and learning programs. This article describes digital books.

  6. Oral Pathology in Forensic Investigation.

    Science.gov (United States)

    Shamim, Thorakkal

    2018-01-01

    Forensic odontology is the subdiscipline of dentistry which analyses dental evidence in the interest of justice. Oral pathology is the subdiscipline of dentistry that deals with the pathology affecting the oral and maxillofacial regions. This subdiscipline is utilized for identification through oral and maxillofacial pathologies with associated syndromes, enamel rod patterns, sex determination using exfoliative cytology, identification from occlusal morphology of teeth, and deoxyribonucleic acid profiling from teeth. This subdiscipline is also utilized for age estimation studies which include Gustafson's method, incremental lines of Retzius, perikymata, natal line formation in teeth, neonatal line, racemization of collagen in dentin, cemental incremental lines, thickness of the cementum, and translucency of dentin. Even though the expertise of an oral pathologist is not taken in forensic investigations, this paper aims to discuss the role of oral pathology in forensic investigation.

  7. Identical twins in forensic genetics

    DEFF Research Database (Denmark)

    Tvedebrink, Torben; Morling, Niels

    2015-01-01

    The increase in the number of forensic genetic loci used for identification purposes results in infinitesimal random match probabilities. These probabilities are computed under assumptions made for rather simple population genetic models. Often, the forensic expert reports likelihood ratios, where...... published results accounting for close familial relationships. However, we revisit the discussion to increase the awareness among forensic genetic practitioners and include new information on medical and societal factors to assess the risk of not considering a monozygotic twin as the true perpetrator......, then data relevant for the Danish society suggests that the threshold of likelihood ratios should approximately be between 150,000 and 2,000,000 in order to take the risk of an unrecognised identical, monozygotic twin into consideration. In other societies, the threshold of the likelihood ratio in crime...

  8. Forensic aspects of animal abusing

    Directory of Open Access Journals (Sweden)

    Aleksić Jelena

    2008-01-01

    Full Text Available Animal abuse is important social issue, which includes a wide range of behaviors of humans that are harmful to animals, starting from unintentional neglect to intentional cruelty. Types of animal abuse are different and they can include physical, sexual, emotional abuse or neglect. Training dogs for fights and dog fighting are considered to be neglection of animals. Forensic veterinarians are called for testifining more often now for presenting the evidence that can lead to making a case regarding animal abuse. This study will include an explanation of forensic vet's role and different types of animal abuse.

  9. Technological Innovations in Forensic Genetics

    DEFF Research Database (Denmark)

    Wienroth, Matthias; Morling, Niels; Williams, Robin

    2014-01-01

    This paper discusses the nature of four waves of technological innovations in forensic genetics alongside the social, legal and ethical aspect of these innovations. It emphasises the way in which technological advances and their socio-legal frameworks are co-produced, shaping technology...... expectations, social identities, and legal institutions. It also considers how imagined and actual uses of forensic genetic technologies are entangled with assertions about social order, affirmations of common values and civil rights, and promises about security and justice. Our comments seek to encourage...

  10. The Digital Library for Earth System Education: A Progress Report from the DLESE Program Center

    Science.gov (United States)

    Marlino, M. R.; Sumner, T. R.; Kelly, K. K.; Wright, M.

    2002-12-01

    DLESE is a community-owned and governed digital library offering easy access to high quality electronic resources about the Earth system at all educational levels. Currently in its third year of development and operation, DLESE resources are designed to support systemic educational reform, and include web-based teaching resources, tools, and services for the inclusion of data in classroom activities, as well as a "virtual community center" that supports community goals and growth. "Community-owned" and "community-governed" embody the singularity of DLESE through its unique participatory approach to both library building and governance. DLESE is guided by policy development vested in the DLESE Steering Committee, and informed by Standing Committees centered on Collections, Services, Technology, and Users, and community working groups covering a wide variety of interest areas. This presentation highlights both current and projected status of the library and opportunities for community engagement. It is specifically structured to engage community members in the design of the next version of the library release. The current Version 1.0 of the library consists of a web-accessible graphical user interface connected to a database of catalogued educational resources (approximately 3000); a metadata framework enabling resource characterization; a cataloging tool allowing community cataloging and indexing of materials; a search and discovery system allowing browsing based on topic, grade level, and resource type, and permitting keyword and controlled vocabulary-based searches; and a portal website supporting library use, community action, and DLESE partnerships. Future stages of library development will focus on enhanced community collaborative support; development of controlled vocabularies; collections building and community review systems; resource discovery integrating the National Science Education Standards and geography standards; Earth system science vocabulary

  11. Examples of digital simulation of AC-DC power converter with the Electromagnetic Transients Program

    International Nuclear Information System (INIS)

    Tanahashi, Shugo; Yamada, Shuichi; Mugishima, Mituo; Kitagawa, Shiro.

    1989-03-01

    This article gives a practical guidance for analysis of power converter circuits using the Electromagnetic Transients Program (EMTP). First how to use the program is shown with two simple examples; (1) a power supply with three-phase diode bridge and (2) a feedback system for current control. Then its application to more complicated system is shown with an example of a power supply for Compact Helical System (CHS), where a hybrid power supply with multi-phase diode and thyristor bridges, and two three-phase thyristor converters are driven by an AC generator. (author)

  12. Contribution to computer aided design of digital circuits - Minimization of alphanumeric expressions - Program CHOPIN

    International Nuclear Information System (INIS)

    Blanca, Ernest

    1974-10-01

    Alpha-numeric boolean expressions, written in the form of sums of products and/or products of sums with many brackets, may be minimized in two steps: syntaxic recognition analysis using precedence operator grammar, syntaxic reduction analysis. These two phases of execution and the different programs of the corresponding machine algorithm are described. Examples of minimization of alpha-numeric boolean expressions written with the help of brackets, utilisation note of the program CHOPIN and theoretical considerations related to language, grammar, precedence operator grammar, sequential systems, boolean sets, boolean representations and treatments of boolean expressions, boolean matrices and their use in grammar theory, are discussed and described. (author) [fr

  13. Forensic analysis of video steganography tools

    Directory of Open Access Journals (Sweden)

    Thomas Sloan

    2015-05-01

    Full Text Available Steganography is the art and science of concealing information in such a way that only the sender and intended recipient of a message should be aware of its presence. Digital steganography has been used in the past on a variety of media including executable files, audio, text, games and, notably, images. Additionally, there is increasing research interest towards the use of video as a media for steganography, due to its pervasive nature and diverse embedding capabilities. In this work, we examine the embedding algorithms and other security characteristics of several video steganography tools. We show how all feature basic and severe security weaknesses. This is potentially a very serious threat to the security, privacy and anonymity of their users. It is important to highlight that most steganography users have perfectly legal and ethical reasons to employ it. Some common scenarios would include citizens in oppressive regimes whose freedom of speech is compromised, people trying to avoid massive surveillance or censorship, political activists, whistle blowers, journalists, etc. As a result of our findings, we strongly recommend ceasing any use of these tools, and to remove any contents that may have been hidden, and any carriers stored, exchanged and/or uploaded online. For many of these tools, carrier files will be trivial to detect, potentially compromising any hidden data and the parties involved in the communication. We finish this work by presenting our steganalytic results, that highlight a very poor current state of the art in practical video steganography tools. There is unfortunately a complete lack of secure and publicly available tools, and even commercial tools offer very poor security. We therefore encourage the steganography community to work towards the development of more secure and accessible video steganography tools, and make them available for the general public. The results presented in this work can also be seen as a useful

  14. Digital voltage discriminator

    International Nuclear Information System (INIS)

    Zhou Zhicheng

    1992-01-01

    A digital voltage discriminator is described, which is synthesized by digital comparator and ADC. The threshold is program controllable with high stability. Digital region of confusion is approximately equal to 1.5 LSB. This discriminator has a single channel analyzer function model with channel width of 1.5 LSB

  15. A Review of Forensic Science Management Literature.

    Science.gov (United States)

    Houck, M M; McAndrew, W P; Porter, M; Davies, B

    2015-01-01

    The science in forensic science has received increased scrutiny in recent years, but interest in how forensic science is managed is a relatively new line of research. This paper summarizes the literature in forensic science management generally from 2009 to 2013, with some recent additions, to provide an overview of the growth of topics, results, and improvements in the management of forensic services in the public and private sectors. This review covers only the last three years or so and a version of this paper was originally produced for the 2013 Interpol Forensic Science Managers Symposium and is available at interpol.int. Copyright © 2015 Central Police University.

  16. [Advances of forensic entomology in China].

    Science.gov (United States)

    Lan, Ling-mei; Liao, Zhi-gang; Chen, Yao-qing; Yao, Yue; Li, Jian-bo; Li, Mao-yang; Cai, Ji-feng

    2006-12-01

    Forensic entomology is a branch of forensic medicine, which applies studies of insects and arthropods to getting evidence for court and has an analogous advantage in the estimation of the postmortem interval (PMI) and other questions of forensic relevance. The paper expounds its definition and contents and reviews some progress of the studies in some aspects in China such as the constitution and succession of insect community on the different cadavers, the applications of morphological features of insects and the technology of analysis of deoxyribonucleic acid (DNA) in forensic entomology, and forensic entomological toxicology etc.

  17. Hardware architecture and associated programming flow for the design of digital fault-tolerant systems

    International Nuclear Information System (INIS)

    Peyret, Thomas

    2014-01-01

    Whether in automotive with heat stress or in aerospace and nuclear field subjected to cosmic, neutron and gamma radiation, the environment can lead to the development of faults in electronic systems. These faults, which can be transient or permanent, will lead to erroneous results that are unacceptable in some application contexts. The use of so-called rad-hard components is sometimes compromised due to their high costs and supply problems associated with export rules. This thesis proposes a joint hardware and software approach independent of integration technology for using digital programmable devices in environments that generate faults. Our approach includes the definition of a Coarse Grained Re-configurable Architecture (CGRA) able to execute entire application code but also all the hardware and software mechanisms to make it tolerant to transient and permanent faults. This is achieved by the combination of redundancy and dynamic reconfiguration of the CGRA based on a library of configurations generated by a complete conception flow. This implemented flow relies on a flow to map a code represented as a Control and Data Flow Graph (CDFG) on the CGRA architecture by obtaining directly a large number of different configurations and allows to exploit the full potential of architecture. This work, which has been validated through experiments with applications in the field of signal and image processing, has been the subject of two publications in international conferences and of two patents. (author) [fr

  18. Reimagining Understandings of Literacy in Teacher Preparation Programs Using Digital Literacy Autobiographies

    Science.gov (United States)

    McTavish, Marianne; Filipenko, Margot

    2016-01-01

    This article examines preservice teachers' understandings and beliefs about literacy in the 21st century specifically at the beginning of their teacher education program. In particular, the authors explored preservice teachers' responses to the first assignment of their foundations literacy course for evidence of their emerging beliefs and…

  19. STAB: A kinetic, three-dimensional, one-group digital computer program

    International Nuclear Information System (INIS)

    Curtis, A.R.; Tyror, J.G.; Wrigley, H.E.

    1961-10-01

    A computer program for solving the one-group, time dependent, three-dimensional diffusion equation together with auxiliary equations representing heat transfer, xenon production and control rod movements, is presented. The equations and the methods of solution are discussed. (author)

  20. Veterinary Forensic Pathology: The Search for Truth.

    Science.gov (United States)

    McDonough, S P; McEwen, B J

    2016-09-01

    Veterinary forensic pathology is emerging as a distinct discipline, and this special issue is a major step forward in establishing the scientific basis of the discipline. A forensic necropsy uses the same skill set needed for investigations of natural disease, but the analytical framework and purpose of forensic pathology differ significantly. The requirement of legal credibility and all that it entails distinguishes the forensic from routine diagnostic cases. Despite the extraordinary depth and breadth of knowledge afforded by their training, almost 75% of veterinary pathologists report that their training has not adequately prepared them to handle forensic cases. Many veterinary pathologists, however, are interested and willing to develop expertise in the discipline. Lessons learned from tragic examples of wrongful convictions in medical forensic pathology indicate that a solid foundation for the evolving discipline of veterinary forensic pathology requires a commitment to education, training, and certification. The overarching theme of this issue is that the forensic necropsy is just one aspect in the investigation of a case of suspected animal abuse or neglect. As veterinary pathologists, we must be aware of the roles filled by other veterinary forensic experts involved in these cases and how our findings are an integral part of an investigation. We hope that the outcome of this special issue of the journal is that veterinary pathologists begin to familiarize themselves with not only forensic pathology but also all aspects of veterinary forensic science. © The Author(s) 2016.

  1. Research in forensic radiology and imaging

    DEFF Research Database (Denmark)

    Aalders, M. C.; Adolphi, N. L.; Daly, B.

    2017-01-01

    of America, and the Netherlands Forensic Institute. During this meeting, an international and multidisciplinary panel of forensic scientists discussed the current state of science in forensic radiology, and drafted a research agenda to further advance the field. Four groups for further research focus were...... identified: big data and statistics, identification and biological profiling, multimodal imaging, and visualization and presentation. This paper describes each of these research topics and thereby hopes to contribute to the development of this exciting new field of forensic medical science.......This paper presents the outcome of the first international forensic radiology and imaging research summit, organized by the International Society of Forensic Radiology and Imaging, the International Association of Forensic Radiographers, the National Institute of Justice of the United States...

  2. Multi-Stakeholder Case Prioritization in Digital Investigations

    Directory of Open Access Journals (Sweden)

    Joshua I. James

    2014-09-01

    Full Text Available This work examines the problem of case prioritization in digital investigations for better utilization of limited criminal investigation resources. Current methods of case prioritization, as well as observed prioritization methods used in digital forensic investigation laboratories are examined. After, a multi-stakeholder approach to case prioritization is given that may help reduce reputational risk to digital forensic laboratories while improving resource allocation. A survey is given that shows differing opinions of investigation priority between Law Enforcement and the public that is used in the development of a prioritization model. Finally, an example case is given to demonstrate the practicality of the proposed method.

  3. European Union RACE program contributions to digital audiovisual communications and services

    Science.gov (United States)

    de Albuquerque, Augusto; van Noorden, Leon; Badique', Eric

    1995-02-01

    The European Union RACE (R&D in advanced communications technologies in Europe) and the future ACTS (advanced communications technologies and services) programs have been contributing and continue to contribute to world-wide developments in audio-visual services. The paper focuses on research progress in: (1) Image data compression. Several methods of image analysis leading to the use of encoders based on improved hybrid DCT-DPCM (MPEG or not), object oriented, hybrid region/waveform or knowledge-based coding methods are discussed. (2) Program production in the aspects of 3D imaging, data acquisition, virtual scene construction, pre-processing and sequence generation. (3) Interoperability and multimedia access systems. The diversity of material available and the introduction of interactive or near- interactive audio-visual services led to the development of prestandards for video-on-demand (VoD) and interworking of multimedia services storage systems and customer premises equipment.

  4. Exploration of Digital Circuits and Transistor-Level Testing in the DARPA TRUST Program

    Science.gov (United States)

    2015-03-01

    attacked is to have the Trojan Horse being the signal. The term Trojan Horse was originally invented when the Greek soldiers tried to invade Troy but...night Greek soldiers came out of the horse and destroyed the city. Nowadays, a Trojan Horse is a seemingly innocuous piece of hardware or software...the DARPA TRUST program was initiated and continues to be a vital component in the war fighting effort of the DoD. One reason that the DARPA TRUST

  5. Xbox one file system data storage: A forensic analysis

    OpenAIRE

    Gravel, Caitlin Elizabeth

    2015-01-01

    The purpose of this research was to answer the question, how does the file system of the Xbox One store data on its hard disk? This question is the main focus of the exploratory research and results sought. The research is focused on digital forensic investigators and experts. An out of the box Xbox One gaming console was used in the research. Three test cases were created as viable scenarios an investigator could come across in a search and seizure of evidence. The three test cases were then...

  6. Forensic trace DNA: A review

    NARCIS (Netherlands)

    R.A.H. van Oorschot (Roland ); K. Ballantyne (Kaye); R.J. Mitchell (R. John)

    2010-01-01

    textabstractDNA analysis is frequently used to acquire information from biological material to aid enquiries associated with criminal offences, disaster victim identification and missing persons investigations. As the relevance and value of DNA profiling to forensic investigations has increased, so

  7. Incorporating Argumentation through Forensic Science

    Science.gov (United States)

    Wheeler, Lindsay B.; Maeng, Jennifer L.; Smetana, Lara K.

    2014-01-01

    This article outlines how to incorporate argumentation into a forensic science unit using a mock trial. Practical details of the mock trial include: (1) a method of scaffolding students' development of their argument for the trial, (2) a clearly outlined set of expectations for students during the planning and implementation of the mock…

  8. Peer review in forensic science.

    Science.gov (United States)

    Ballantyne, Kaye N; Edmond, Gary; Found, Bryan

    2017-08-01

    Peer review features prominently in the forensic sciences. Drawing on recent research and studies, this article examines different types of peer review, specifically: editorial peer review; peer review by the scientific community; technical and administrative review; and verification (and replication). The article reviews the different meanings of these quite disparate activities and their utility in relation to enhancing performance and reducing error. It explains how forensic practitioners should approach and use peer review, as well as how it should be described in expert reports and oral testimony. While peer review has considerable potential, and is a key component of modern quality management systems, its actual value in most forensic science settings has yet to be determined. In consequence, forensic practitioners should reflect on why they use specific review procedures and endeavour to make their actual practices and their potential value transparent to consumers; whether investigators, lawyers, jurors or judges. Claims that review increases the validity of a scientific technique or accuracy of opinions within a particular case should be avoided until empirical evidence is available to support such assertions. Copyright © 2017 Elsevier B.V. All rights reserved.

  9. Forensic Palynology as Classroom Inquiry

    Science.gov (United States)

    Babcock, Steven L.; Warny, Sophie

    2014-01-01

    This activity introduces the science of "forensic palynology": the use of microscopic pollen and spores (also called "palynomorphs") to solve criminal cases. Plants produce large amounts of pollen or spores during reproductive cycles. Because of their chemical resistance, small size, and morphology, pollen and spores can be…

  10. Genomic applications in forensic medicine

    DEFF Research Database (Denmark)

    Børsting, Claus; Morling, Niels

    2016-01-01

    Since the 1980s, advances in DNA technology have revolutionized the scope and practice of forensic medicine. From the days of restriction fragment length polymorphisms (RFLPs) to short tandem repeats (STRs), the current focus is on the next generation genome sequencing. It has been almost a decad...

  11. Selection effects in forensic science

    NARCIS (Netherlands)

    Franx, G.J.; Gennip, van Yves; Hochs, P.; Nuyens, M.; Palla, L.; Quant, C.; Trapman, P.; Berg, van den J.B.; Bhulai, S.; Hulshof, J.; Koole, G.; Quant, C.; Williams, J.F.

    2006-01-01

    In this report we consider the following question: does a forensic expert need to know exactly how the evidential material was selected? We set up a few simple models of situations in which the way evidence is selected may influence its value in court. Although reality is far from a probabilistic

  12. Digital broadcasting

    International Nuclear Information System (INIS)

    Park, Ji Hyeong

    1999-06-01

    This book contains twelve chapters, which deals with digitization of broadcast signal such as digital open, digitization of video signal and sound signal digitization of broadcasting equipment like DTPP and digital VTR, digitization of equipment to transmit such as digital STL, digital FPU and digital SNG, digitization of transmit about digital TV transmit and radio transmit, digital broadcasting system on necessity and advantage, digital broadcasting system abroad and Korea, digital broadcasting of outline, advantage of digital TV, ripple effect of digital broadcasting and consideration of digital broadcasting, ground wave digital broadcasting of DVB-T in Europe DTV in U.S.A and ISDB-T in Japan, HDTV broadcasting, satellite broadcasting, digital TV broadcasting in Korea, digital radio broadcasting and new broadcasting service.

  13. Maximizing the Impact of Digital Media Campaigns to Promote Smoking Cessation: A Case Study of the California Tobacco Control Program and the California Smokers' Helpline.

    Science.gov (United States)

    Lee, Youn Ok; Momin, Behnoosh; Hansen, Heather; Duke, Jennifer; Harms, Kristin; McCartney, Amanda; Neri, Antonio; Kahende, Jennifer; Zhang, Lei; Stewart, Sherri L

    2014-01-01

    Digital media are often used to encourage smoking cessation by increasing quitline call volume through direct promotion to smokers or indirect promotion to smoker proxies. The documentation of a program's experiences utilizing digital media is necessary to develop both the knowledge base and a set of best practices. This case study highlights the use of digital media in a proxy-targeted campaign to promote the California Smokers' Helpline to health care professionals from October 2009 to September 2012. We describe the iterative development of the campaign's digital media activities and report campaign summaries of web metrics (website visits, webinar registrations, downloads of online materials, online orders for promotional materials) and media buy (gross impressions) tracking data. The campaign generated more than 2.7 million gross impressions from digital media sources over 3 years. Online orders for promotional materials increased almost 40% over the course of the campaign. A clearly defined campaign strategy ensured that there was a systematic approach in developing and implementing campaign activities and ensuring that lessons learned from previous years were incorporated. Discussion includes lessons learned and recommendations for future improvements reported by campaign staff to inform similar efforts using digital media.

  14. Microfluidic Devices for Forensic DNA Analysis: A Review.

    Science.gov (United States)

    Bruijns, Brigitte; van Asten, Arian; Tiggelaar, Roald; Gardeniers, Han

    2016-08-05

    Microfluidic devices may offer various advantages for forensic DNA analysis, such as reduced risk of contamination, shorter analysis time and direct application at the crime scene. Microfluidic chip technology has already proven to be functional and effective within medical applications, such as for point-of-care use. In the forensic field, one may expect microfluidic technology to become particularly relevant for the analysis of biological traces containing human DNA. This would require a number of consecutive steps, including sample work up, DNA amplification and detection, as well as secure storage of the sample. This article provides an extensive overview of microfluidic devices for cell lysis, DNA extraction and purification, DNA amplification and detection and analysis techniques for DNA. Topics to be discussed are polymerase chain reaction (PCR) on-chip, digital PCR (dPCR), isothermal amplification on-chip, chip materials, integrated devices and commercially available techniques. A critical overview of the opportunities and challenges of the use of chips is discussed, and developments made in forensic DNA analysis over the past 10-20 years with microfluidic systems are described. Areas in which further research is needed are indicated in a future outlook.

  15. The Impact of Hard Disk Firmware Steganography on Computer Forensics

    Directory of Open Access Journals (Sweden)

    Iain Sutherland

    2009-06-01

    Full Text Available The hard disk drive is probably the predominant form of storage media and is a primary data source in a forensic investigation. The majority of available software tools and literature relating to the investigation of the structure and content contained within a hard disk drive concerns the extraction and analysis of evidence from the various file systems which can reside in the user accessible area of the disk. It is known that there are other areas of the hard disk drive which could be used to conceal information, such as the Host Protected Area and the Device Configuration Overlay. There are recommended methods for the detection and forensic analysis of these areas using appropriate tools and techniques. However, there are additional areas of a disk that have currently been overlooked.  The Service Area or Platter Resident Firmware Area is used to store code and control structures responsible for the functionality of the drive and for logging failing or failed sectors.This paper provides an introduction into initial research into the investigation and identification of issues relating to the analysis of the Platter Resident Firmware Area. In particular, the possibility that the Platter Resident Firmware Area could be manipulated and exploited to facilitate a form of steganography, enabling information to be concealed by a user and potentially from a digital forensic investigator.

  16. Digital Citizenship Means Character Education for the Digital Age

    Science.gov (United States)

    Ohler, Jason

    2012-01-01

    The reality of students' cyber lives has thrust upon educators a new approach: creating character education programs tuned to digital youth that are proactive and aggressive. This will help integrate students' digital activities within the context of the communities in which they live, both local and digital. The digital age beckons a new era of…

  17. Foundations of Forensic Meteoritics

    Science.gov (United States)

    Treiman, A. H.

    1992-07-01

    , soil) adhering to a meteorite are samples of the actual physical environment in which the meteorite rested. Adhesion may derive from chemical cementation (incl. rust from the meteorite), biologic activity (incl. desert varnish?), or impact processes [2]. Given the wide diversity of geological materials and processes on the Earth, adhering geological materials may be useful forensic tools. For instance, fall in a volcanic terrane may be inconsistent with adhering sediments of clean quartz sand. Biologic matter on meteorites includes animal and vegetable matter mixed with the adhering geological materials, lichens and other plants growing in place, and purposefully attached animal matter (e.g. insect eggs). The most useful biological data may be provided by pollen, which can often be referred unambiguously to genera and species of plants. For example, sediments adhering to meteorites from the central Nullabor Plain (W. Australia) are different from sediments from the Plain's margin in S. Australia. Sediment on meteorites from the central Nullabor (e.g. Mundrabilla) lacks quartz sand and consists almost entirely of clay-sized particles, consistent with derivation from the local saprolitic soil. Sediment on meteorites from the eastern Nullabor (e.g. Hughes and Cook, S.A.) contains a significant fraction of quartz sand, 1/4- to 1/2-mm grains, probably blown from the Great Victoria Desert to the north and northwest. However, sedimentologic data alone may be misleading. For instance, sediments adhering to Nuevo Mercurio stones (H5; Zacatecas, Mexico) are clay-sized and lack coarser material. But sediment on Nuevo Mercurio (b), a ureilite found in the Nuevo Mercurio strewn field, consists of quartz sand and clay pellets, 1/4 to 1/2 mm diameter. Clearly, local environments may affect the character of sediment adhering to a meteorite, and careful detailed study may be required to determine whether a meteorite has been transported. I am grateful to R. Farrell and D. New for

  18. FLICA III. A digital computer program for thermal-hydraulic analysis of reactors and experimental loops

    International Nuclear Information System (INIS)

    Plas, Roger.

    1975-05-01

    This computer program describes the flow and heat transfer in steady and transient state in two-phase flows. It is the present stage of the evolution about FLICA, FLICA II and FLICA II B codes which have been used and developed at CEA for the thermal-hydraulic analysis of reactors and experimental loops with heating rod bundles. In the mathematical model all the significant terms of the fundamental hydrodynamic equations are taken into account with the approximations of turbulent viscosity and conductivity. The two-phase flow is calculated by the homogeneous model with slip. In the flow direction an implicit resolution scheme is available, which make possible to study partial or total flow blockage, with upstream and downstream effects. A special model represents the helical wire effects in out-of pile experimental rod bundles [fr

  19. Microbial Forensics: A Scientific Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Keim, Paul

    2003-02-17

    Microorganisms have been used as weapons in criminal acts, most recently highlighted by the terrorist attack using anthrax in the fall of 2001. Although such ''biocrimes'' are few compared with other crimes, these acts raise questions about the ability to provide forensic evidence for criminal prosecution that can be used to identify the source of the microorganisms used as a weapon and, more importantly, the perpetrator of the crime. Microbiologists traditionally investigate the sources of microorganisms in epidemiological investigations, but rarely have been asked to assist in criminal investigations. A colloquium was convened by the American Academy of Microbiology in Burlington, Vermont, on June 7-9, 2002, in which 25 interdisciplinary, expert scientists representing evolutionary microbiology, ecology, genomics, genetics, bioinformatics, forensics, chemistry, and clinical microbiology, deliberated on issues in microbial forensics. The colloquium's purpose was to consider issues relating to microbial forensics, which included a detailed identification of a microorganism used in a bioattack and analysis of such a microorganism and related materials to identify its forensically meaningful source--the perpetrators of the bioattack. The colloquium examined the application of microbial forensics to assist in resolving biocrimes with a focus on what research and education are needed to facilitate the use of microbial forensics in criminal investigations and the subsequent prosecution of biocrimes, including acts of bioterrorism. First responders must consider forensic issues, such as proper collection of samples to allow for optimal laboratory testing, along with maintaining a chain of custody that will support eventual prosecution. Because a biocrime may not be immediately apparent, a linkage must be made between routine diagnosis, epidemiological investigation, and criminal investigation. There is a need for establishing standard operating

  20. Nuclear Forensic Science: Analysis of Nuclear Material Out of Regulatory Control

    Science.gov (United States)

    Kristo, Michael J.; Gaffney, Amy M.; Marks, Naomi; Knight, Kim; Cassata, William S.; Hutcheon, Ian D.

    2016-06-01

    Nuclear forensic science seeks to identify the origin of nuclear materials found outside regulatory control. It is increasingly recognized as an integral part of a robust nuclear security program. This review highlights areas of active, evolving research in nuclear forensics, with a focus on analytical techniques commonly employed in Earth and planetary sciences. Applications of nuclear forensics to uranium ore concentrates (UOCs) are discussed first. UOCs have become an attractive target for nuclear forensic researchers because of the richness in impurities compared to materials produced later in the fuel cycle. The development of chronometric methods for age dating nuclear materials is then discussed, with an emphasis on improvements in accuracy that have been gained from measurements of multiple radioisotopic systems. Finally, papers that report on casework are reviewed, to provide a window into current scientific practice.

  1. Forensic botany: usability of bryophyte material in forensic studies.

    Science.gov (United States)

    Virtanen, Viivi; Korpelainen, Helena; Kostamo, Kirsi

    2007-10-25

    Two experiments were performed to test the relevance of bryophyte (Plantae, Bryophyta) material for forensic studies. The first experiment was conducted to reveal if, and how well, plant fragments attach to footwear in general. In the test, 16 persons walked outdoors wearing rubber boots or hiking boots. After 24h of use outdoors the boots were carefully cleaned, and all plant fragments were collected. Afterwards, all plant material was examined to identify the species. In the second experiment, fresh material of nine bryophyte species was kept in a shed in adverse conditions for 18 months, after which DNA was extracted and subjected to genotyping to test the quality of the material. Both experiments give support for the usability of bryophyte material in forensic studies. The bryophyte fragments become attached to shoes, where they remain even after the wearer walks on a dry road for several hours. Bryophyte DNA stays intact, allowing DNA profiling after lengthy periods following detachment from the original plant source. Based on these experiments, and considering the fact that many bryophytes are clonal plants, we propose that bryophytes are among the most usable plants to provide botanical evidence for forensic investigations.

  2. Using environmental forensic microscopy in exposure science.

    Science.gov (United States)

    Millette, James R; Brown, Richard S; Hill, Whitney B

    2008-01-01

    Environmental forensic microscopy investigations are based on the methods and procedures developed in the fields of criminal forensics, industrial hygiene and environmental monitoring. Using a variety of microscopes and techniques, the environmental forensic scientist attempts to reconstruct the sources and the extent of exposure based on the physical evidence left behind after particles are exchanged between an individual and the environments he or she passes through. This article describes how environmental forensic microscopy uses procedures developed for environmental monitoring, criminal forensics and industrial hygiene investigations. It provides key references to the interdisciplinary approach used in microscopic investigations. Case studies dealing with lead, asbestos, glass fibers and other particulate contaminants are used to illustrate how environmental forensic microscopy can be very useful in the initial stages of a variety of environmental exposure characterization efforts to eliminate some agents of concern and to narrow the field of possible sources of exposure.

  3. Understanding Nuclear Forensics in 5 Questions

    International Nuclear Information System (INIS)

    2014-01-01

    Forensic science, commonly referred to as forensics, is the examination of physical, biological, behavioural and documentary evidence. The goal of forensics is to discover linkages among people, places, things and events. A sub-discipline of forensic science, nuclear forensics is the analysis of intercepted illicit nuclear or radioactive material and any associated material, which can assist in law enforcement investigations as well as assessments of the potential vulnerabilities associated with the use, production and storage of these materials as part of a nuclear security infrastructure. The analysis of nuclear or other radioactive material seeks to identify what the materials are, how, when, and where the materials were made, and what their intended uses were. Nuclear forensics is an important tool in the fight against illicit trafficking in nuclear and radiological material

  4. Forensic Taxonomy of Android Social Apps.

    Science.gov (United States)

    Azfar, Abdullah; Choo, Kim-Kwang Raymond; Liu, Lin

    2017-03-01

    An Android social app taxonomy incorporating artifacts that are of forensic interest will enable users and forensic investigators to identify the personally identifiable information (PII) stored by the apps. In this study, 30 popular Android social apps were examined. Artifacts of forensic interest (e.g., contacts lists, chronology of messages, and timestamp of an added contact) were recovered. In addition, images were located, and Facebook token strings used to tie account identities and gain access to information entered into Facebook by a user were identified. Based on the findings, a two-dimensional taxonomy of the forensic artifacts of the social apps is proposed. A comparative summary of existing forensic taxonomies of different categories of Android apps, designed to facilitate timely collection and analysis of evidentiary materials from Android devices, is presented. © 2016 American Academy of Forensic Sciences.

  5. Microbiome Tools for Forensic Science.

    Science.gov (United States)

    Metcalf, Jessica L; Xu, Zhenjiang Z; Bouslimani, Amina; Dorrestein, Pieter; Carter, David O; Knight, Rob

    2017-09-01

    Microbes are present at every crime scene and have been used as physical evidence for over a century. Advances in DNA sequencing and computational approaches have led to recent breakthroughs in the use of microbiome approaches for forensic science, particularly in the areas of estimating postmortem intervals (PMIs), locating clandestine graves, and obtaining soil and skin trace evidence. Low-cost, high-throughput technologies allow us to accumulate molecular data quickly and to apply sophisticated machine-learning algorithms, building generalizable predictive models that will be useful in the criminal justice system. In particular, integrating microbiome and metabolomic data has excellent potential to advance microbial forensics. Copyright © 2017. Published by Elsevier Ltd.

  6. Method Development in Forensic Toxicology.

    Science.gov (United States)

    Peters, Frank T; Wissenbach, Dirk K; Busardo, Francesco Paolo; Marchei, Emilia; Pichini, Simona

    2017-01-01

    In the field of forensic toxicology, the quality of analytical methods is of great importance to ensure the reliability of results and to avoid unjustified legal consequences. A key to high quality analytical methods is a thorough method development. The presented article will provide an overview on the process of developing methods for forensic applications. This includes the definition of the method's purpose (e.g. qualitative vs quantitative) and the analytes to be included, choosing an appropriate sample matrix, setting up separation and detection systems as well as establishing a versatile sample preparation. Method development is concluded by an optimization process after which the new method is subject to method validation. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.

  7. Statistical aspects of forensic genetics

    DEFF Research Database (Denmark)

    Tvedebrink, Torben

    This PhD thesis deals with statistical models intended for forensic genetics, which is the part of forensic medicine concerned with analysis of DNA evidence from criminal cases together with calculation of alleged paternity and affinity in family reunification cases. The main focus of the thesis...... is on crime cases as these differ from the other types of cases since the biological material often is used for person identification contrary to affinity. Common to all cases, however, is that the DNA is used as evidence in order to assess the probability of observing the biological material given different...... of the DNA evidence under competing hypotheses the biological evidence may be used in the court’s deliberation and trial on equal footing with other evidence and expert statements. These probabilities are based on population genetic models whose assumptions must be validated. The thesis’s first two articles...

  8. A brief overview of forensic herpetology

    OpenAIRE

    Baker, Barry

    2008-01-01

    The emerging field of forensic herpetology is reviewed. This research focus, defined here as the application of science to studies of reptiles and amphibians when these animals become the subject of legal investigations, has gained increasing attention in recent years. A diverse range of experts contributes to methods in forensic herpetology including forensic scientists, herpetologists, veterinarians, zookeepers, physicians, pathologists and toxicologists. The English language literature in ...

  9. Client-side Skype forensics: an overview

    Science.gov (United States)

    Meißner, Tina; Kröger, Knut; Creutzburg, Reiner

    2013-03-01

    IT security and computer forensics are important components in the information technology. In the present study, a client-side Skype forensics is performed. It is designed to explain which kind of user data are stored on a computer and which tools allow the extraction of those data for a forensic investigation. There are described both methods - a manual analysis and an analysis with (mainly) open source tools, respectively.

  10. Risk assessment of forensic patients: nurses' role.

    Science.gov (United States)

    Encinares, Maxima; McMaster, Jeff James; McNamee, Jim

    2005-03-01

    One of the unique roles of forensic nurses is to conduct risk assessments. Establishing a therapeutic nurse-patient relationship helps forensic nurses perform accurate and useful risk assessments. Accurate risk assessments can facilitate formulation of individualized risk management plans, designed to meet patients' needs and ensure public safety. The importance of forensic nurses' knowledge and application of appropriate communication and proper documentation cannot be overemphasized.

  11. Forensic experience of Saudi nurses; an emerging need for forensic qualifications.

    Science.gov (United States)

    Alsaif, Dalia M; Alfaraidy, Maram; Alsowayigh, Kholoud; Alhusain, Awal; Almadani, Osama M

    2014-10-01

    Forensic nursing was recognized as a nursing subspecialty after the perceived need for forensic nurses to bring about their nursing duties while at the same time helping legal authorities to deliver justice. With the increased rate of cases that are presenting to the forensic centers in Saudi Arabia, there was a need for the presence of nurses to work side by side to physicians. This study was aimed at determining the forensic qualifications of nurses working in emergency departments in the area of Dammam and their knowledge about principles of forensic nursing. A self-administered questionnaire was distributed to registered nurses who are working in Emergency departments of secondary hospitals in the area of Dammam. Questions included knowledge, awareness and attitude toward forensic nursing. A total of 96 participants responded to the questionnaire with females representing 78% (n: 75). Diploma was the highest earned nursing degree in 95% (n: 91) of participants. Only 33% (n: 32) were aware of the term forensic nursing and the majority of the respondents gave invalid or didn't know the answers to knowledge questions. A total of 77% (n: 74) agreed that they are not adequately trained for handling forensic cases. Saudi nurses need forensic education. The presence of qualified forensic nurses would help delivering optimal forensic services and would assist in bringing justice. Copyright © 2014 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.

  12. Nuclear forensic analysis of thorium

    International Nuclear Information System (INIS)

    Moody, K.J.; Grant, P.M.

    1999-01-01

    A comprehensive radiochemical isolation procedure and data analysis/interpretation method for the nuclear forensic investigation of Th has been developed. The protocol includes sample dissolution, chemical separation, nuclear counting techniques, consideration of isotopic parent-daughter equilibria, and data interpretation tactics. Practical application of the technology was demonstrated by analyses of a questioned specimen confiscated at an illegal drug synthesis laboratory by law enforcement authorities. (author)

  13. Audit Log for Forensic Photography

    Science.gov (United States)

    Neville, Timothy; Sorell, Matthew

    We propose an architecture for an audit log system for forensic photography, which ensures that the chain of evidence of a photograph taken by a photographer at a crime scene is maintained from the point of image capture to its end application at trial. The requirements for such a system are specified and the results of experiments are presented which demonstrate the feasibility of the proposed approach.

  14. Particle Analysis in Forensic Science.

    Science.gov (United States)

    Bisbing, R E; Schneck, W M

    2006-07-01

    Microscopic trace evidence includes particles from many sources such as biologicals, soil, building materials, metals, explosives, gunshot residues, and cosmetics. The particles are identified by morphological analysis, microscopy, and chemical analysis. Their identity is confirmed by comparison with reference materials or other comparison samples. The probative value of particles of forensic interest depends on their nature and the circumstances of their presence. Copyright © 2006 Central Police University.

  15. Forensic aspects of animal abusing

    OpenAIRE

    Aleksić Jelena; Jović Slavoljub

    2008-01-01

    Animal abuse is important social issue, which includes a wide range of behaviors of humans that are harmful to animals, starting from unintentional neglect to intentional cruelty. Types of animal abuse are different and they can include physical, sexual, emotional abuse or neglect. Training dogs for fights and dog fighting are considered to be neglection of animals. Forensic veterinarians are called for testifining more often now for presenting the evidence that can lead to making a case rega...

  16. The Rapid Forensic Evaluation of Microbes in Biodefense Research Program Will Develop a Rapid Screening and Detection System for Multiple Bio-Threat (BT) Agents for the Department of Defense

    Science.gov (United States)

    2012-05-31

    forensic analysis of microbes. The naturally occurring fungus Rhizoctonia solani (a common inhabitant of the soil ecosystem) was used to experiment...Triangle Park, NC 27709-2211 15. SUBJECT TERMS Rhizoctonia solani, dsRNA, biosensor, proteomics , genomics Dr. Bharathan Narayanaswamy, Dr. Seema Bharathan...naturally occurring fungus Rhizoctonia solani (a common inhabitant of the soil ecosystem) was used to experiment, develop, optimize and validate bio

  17. Computer-aided fiber analysis for crime scene forensics

    Science.gov (United States)

    Hildebrandt, Mario; Arndt, Christian; Makrushin, Andrey; Dittmann, Jana

    2012-03-01

    The forensic analysis of fibers is currently completely manual and therefore time consuming. The automation of analysis steps can significantly support forensic experts and reduce the time, required for the investigation. Moreover, a subjective expert belief is extended by objective machine estimation. This work proposes the pattern recognition pipeline containing the digital acquisition of a fiber media, the pre-processing for fiber segmentation, and the extraction of the distinctive characteristics of fibers. Currently, basic geometrical features like width, height, area of optically dominant fibers are investigated. In order to support the automatic classification of fibers, supervised machine learning algorithms are evaluated. The experimental setup includes a car seat and two pieces clothing of a different fabric. As preliminary work, acrylic as synthetic and sheep wool as natural fiber are chosen to be classified. While sitting on the seat, a test person leaves textile fibers. The test aims at automatic distinguishing of clothes through the fiber traces gained from the seat with the help of adhesive tape. The digitalization of fiber samples is provided by a contactless chromatic white light sensor. First test results showed, that two optically very different fibers can be properly assigned to their corresponding fiber type. The best classifier achieves an accuracy of 75 percent correctly classified samples for our suggested features.

  18. Forensic entomology: applications and limitations.

    Science.gov (United States)

    Amendt, J; Richards, C S; Campobasso, C P; Zehner, R; Hall, M J R

    2011-12-01

    Forensic entomology is the science of collecting and analysing insect evidence to aid in forensic investigations. Its main application is in the determination of the minimum time since death in cases of suspicious death, either by estimating the age of the oldest necrophagous insects that developed on the corpse, or by analysing the insect species composition on the corpse. In addition, toxicological and molecular examinations of these insects may help reveal the cause of death or even the identity of a victim, by associating a larva with its last meal, for example, in cases where insect evidence is left at a scene after human remains have been deliberately removed. Some fly species can develop not only on corpses but on living bodies too, causing myiasis. Analysis of larvae in such cases can demonstrate the period of neglect of humans or animals. Without the appropriate professional collection of insect evidence, an accurate and convincing presentation of such evidence in court will be hampered or even impossible. The present paper describes the principles and methods of forensic entomology and the optimal techniques for collecting insect evidence.

  19. DNA fingerprinting in forensics: past, present, future.

    Science.gov (United States)

    Roewer, Lutz

    2013-11-18

    DNA fingerprinting, one of the great discoveries of the late 20th century, has revolutionized forensic investigations. This review briefly recapitulates 30 years of progress in forensic DNA analysis which helps to convict criminals, exonerate the wrongly accused, and identify victims of crime, disasters, and war. Current standard methods based on short tandem repeats (STRs) as well as lineage markers (Y chromosome, mitochondrial DNA) are covered and applications are illustrated by casework examples. Benefits and risks of expanding forensic DNA databases are discussed and we ask what the future holds for forensic DNA fingerprinting.

  20. An Android Communication App Forensic Taxonomy.

    Science.gov (United States)

    Azfar, Abdullah; Choo, Kim-Kwang Raymond; Liu, Lin

    2016-09-01

    Due to the popularity of Android devices and applications (apps), Android forensics is one of the most studied topics within mobile forensics. Communication apps, such as instant messaging and Voice over IP (VoIP), are one popular app category used by mobile device users, including criminals. Therefore, a taxonomy outlining artifacts of forensic interest involving the use of Android communication apps will facilitate the timely collection and analysis of evidentiary materials from such apps. In this paper, 30 popular Android communication apps were examined, where a logical extraction of the Android phone images was collected using XRY, a widely used mobile forensic tool. Various information of forensic interest, such as contact lists and chronology of messages, was recovered. Based on the findings, a two-dimensional taxonomy of the forensic artifacts of the communication apps is proposed, with the app categories in one dimension and the classes of artifacts in the other dimension. Finally, the artifacts identified in the study of the 30 communication apps are summarized using the taxonomy. It is expected that the proposed taxonomy and the forensic findings in this paper will assist forensic investigations involving Android communication apps. © 2016 American Academy of Forensic Sciences.

  1. The forensic aspects of sexual violence.

    Science.gov (United States)

    Newton, Mary

    2013-02-01

    Complainants of sexual assault may disclose to different agencies, the police and health professionals being the most likely. It is possible for certain evidence types to be collected before a clinical forensic assessment takes place that do not require the need for a Forensic Medical Practitioner. If the time frames after the incident and the nature of assault warrant the need for a forensic medical examination of either a complainant or a suspect, this should only be conducted by doctors and nurses who have received relevant, up-to-date specialist theoretical and practical training. Clear evidence shows that few other criminal offences require as extensive an examination and collection of forensic evidence as that of a sexual assault. The forensic evidence in a case may identify an assailant, eliminate a nominated suspect(s), and assist in the prosecution of a case. The elements of forensic medical examination, reviewed in this chapter, are those that are the most varied across jurisdictions around the world currently. Key focus points of this chapter are considerations for early evidence collection, utilising dedicated medical examination facilities for sample collection, contamination issues associated with evidence collection and certain practical aspects of forensic sampling methods which have evolved given results identified by Forensic Scientists processing evidential samples in sexual assault cases, Some of the problems encountered by the forensic science provider will also be discussed. Copyright © 2012 Elsevier Ltd. All rights reserved.

  2. Frequently cited journals in forensic psychology.

    Science.gov (United States)

    Black, Steve

    2012-02-01

    Works cited in six forensic psychology journals published 2008-2010 were counted to identify the most frequently cited journals. The sample of works cited (N = 21,776) was not a definitive ranked list of important journals in forensic psychology, but was large enough to indicate high-impact journals. The list of frequently cited publications included more general psychiatry and psychology journals than titles specific to forensic psychology. The implications of the proportion of general versus specific titles for collections supporting research in forensic psychology were discussed.

  3. Towards better digital pathology workflows: programming libraries for high-speed sharpness assessment of Whole Slide Images.

    Science.gov (United States)

    Ameisen, David; Deroulers, Christophe; Perrier, Valérie; Bouhidel, Fatiha; Battistella, Maxime; Legrès, Luc; Janin, Anne; Bertheau, Philippe; Yunès, Jean-Baptiste

    2014-01-01

    Since microscopic slides can now be automatically digitized and integrated in the clinical workflow, quality assessment of Whole Slide Images (WSI) has become a crucial issue. We present a no-reference quality assessment method that has been thoroughly tested since 2010 and is under implementation in multiple sites, both public university-hospitals and private entities. It is part of the FlexMIm R&D project which aims to improve the global workflow of digital pathology. For these uses, we have developed two programming libraries, in Java and Python, which can be integrated in various types of WSI acquisition systems, viewers and image analysis tools. Development and testing have been carried out on a MacBook Pro i7 and on a bi-Xeon 2.7GHz server. Libraries implementing the blur assessment method have been developed in Java, Python, PHP5 and MySQL5. For web applications, JavaScript, Ajax, JSON and Sockets were also used, as well as the Google Maps API. Aperio SVS files were converted into the Google Maps format using VIPS and Openslide libraries. We designed the Java library as a Service Provider Interface (SPI), extendable by third parties. Analysis is computed in real-time (3 billion pixels per minute). Tests were made on 5000 single images, 200 NDPI WSI, 100 Aperio SVS WSI converted to the Google Maps format. Applications based on our method and libraries can be used upstream, as calibration and quality control tool for the WSI acquisition systems, or as tools to reacquire tiles while the WSI is being scanned. They can also be used downstream to reacquire the complete slides that are below the quality threshold for surgical pathology analysis. WSI may also be displayed in a smarter way by sending and displaying the regions of highest quality before other regions. Such quality assessment scores could be integrated as WSI's metadata shared in clinical, research or teaching contexts, for a more efficient medical informatics workflow.

  4. Towards better digital pathology workflows: programming libraries for high-speed sharpness assessment of Whole Slide Images

    Science.gov (United States)

    2014-01-01

    Background Since microscopic slides can now be automatically digitized and integrated in the clinical workflow, quality assessment of Whole Slide Images (WSI) has become a crucial issue. We present a no-reference quality assessment method that has been thoroughly tested since 2010 and is under implementation in multiple sites, both public university-hospitals and private entities. It is part of the FlexMIm R&D project which aims to improve the global workflow of digital pathology. For these uses, we have developed two programming libraries, in Java and Python, which can be integrated in various types of WSI acquisition systems, viewers and image analysis tools. Methods Development and testing have been carried out on a MacBook Pro i7 and on a bi-Xeon 2.7GHz server. Libraries implementing the blur assessment method have been developed in Java, Python, PHP5 and MySQL5. For web applications, JavaScript, Ajax, JSON and Sockets were also used, as well as the Google Maps API. Aperio SVS files were converted into the Google Maps format using VIPS and Openslide libraries. Results We designed the Java library as a Service Provider Interface (SPI), extendable by third parties. Analysis is computed in real-time (3 billion pixels per minute). Tests were made on 5000 single images, 200 NDPI WSI, 100 Aperio SVS WSI converted to the Google Maps format. Conclusions Applications based on our method and libraries can be used upstream, as calibration and quality control tool for the WSI acquisition systems, or as tools to reacquire tiles while the WSI is being scanned. They can also be used downstream to reacquire the complete slides that are below the quality threshold for surgical pathology analysis. WSI may also be displayed in a smarter way by sending and displaying the regions of highest quality before other regions. Such quality assessment scores could be integrated as WSI's metadata shared in clinical, research or teaching contexts, for a more efficient medical informatics

  5. Effects of a 12-Week Digital Care Program for Chronic Knee Pain on Pain, Mobility, and Surgery Risk: Randomized Controlled Trial.

    Science.gov (United States)

    Mecklenburg, Gabriel; Smittenaar, Peter; Erhart-Hledik, Jennifer C; Perez, Daniel A; Hunter, Simon

    2018-04-25

    Chronic knee pain, most commonly caused by knee osteoarthritis, is a prevalent condition which in most cases can be effectively treated through conservative, non-surgical care involving exercise therapy, education, psychosocial support, and weight loss. However, most people living with chronic knee pain do not receive adequate care, leading to unnecessary use of opiates and surgical procedures. Assess the efficacy of a remotely delivered digital care program for chronic knee pain. We enrolled 162 participants into a randomized controlled trial between January and March 2017. Participants were recruited from participating employers using questionnaires for self-assessment of their knee pain, and randomized into treatment (n=101) and control (n=61) groups. Participants in the treatment group were enrolled in the Hinge Health digital care program for chronic knee pain. This is a remotely delivered, home-based 12-week intervention that includes sensor-guided exercise therapy, education, cognitive behavioral therapy, weight loss, and psychosocial support through a personal coach and team-based interactions. The control group received three education pieces regarding self-care for chronic knee pain. Both groups had access to treatment-as-usual. The primary outcome was the Knee Injury and Osteoarthritis Outcome Score (KOOS) Pain subscale and KOOS Physical Function Shortform (KOOS-PS). Secondary outcomes were visual analog scales (VAS) for pain and stiffness respectively, surgery intent, and self-reported understanding of the condition and treatment options. Outcome measures were analyzed by intention to treat (excluding 7 control participants who received the digital care program due to administrative error) and per protocol. In an intent-to-treat analysis the digital care program group had a significantly greater reduction in KOOS Pain compared to the control group at the end of the program (greater reduction of 7.7, 95% CI 3.0 to 12.3, P=.002), as well as a

  6. 3rd International Arab Forensic Sciences & Forensic Medicine Conference, ASFSFM 2017: Conference Report

    Directory of Open Access Journals (Sweden)

    Abdulsallam A. Bakdash

    2017-12-01

    Full Text Available The Arab Society for Forensic Sciences and Forensic Medicine (ASFSFM at Naif Arab University for Security Sciences seeks to present the latest developments in all fields of forensic sciences through holding specialized scientific events and academic activities. This is also achieved through its periodic scientific peer-reviewed journal, the Arab Journal of Forensic Sciences and Forensic Medicine. It also seeks to promote scientific research in all fields of forensic science and forensic medicine, and seeks actively to contribute in holding scientific meetings in accordance with advanced scientific standards, including the 3rd International Arab Forensic Sciences & Forensic Medicine Conference. This important event was attended by scientists and experts from various fields of criminal and forensic sciences from both Arab and non-Arab countries. This conference was a significant scientific accomplishment that contributed to the advancement of forensic sciences and forensic medicine in the Arab world. The conference aimed, in accordance with the vision of Naif Arab University for Security Sciences, to enhance peace, security and justice in Arab societies.  Naif Arab University for Security Sciences, represented by the Arab Society for Forensic Sciences and Forensic Medicine, held the 3rd International Arab Forensic Sciences & Forensic Medicine Conference on the University's campus during the period from 21st to 23rd November 2017. The event included the participation of more than 720 experts in forensic sciences and forensic medicine from 33 countries all over the world. Experts discussed and presented the latest developments in their fields. The conference provided a creative environment for students from both local and international universities to benefit from experts and specialists, and to access the most recent research.  On behalf of His Excellency the president of Naif Arab University for Security Sciences, and the Arab Society for

  7. The use of insects in forensic investigations: An overview on the scope of forensic entomology.

    Science.gov (United States)

    Joseph, Isaac; Mathew, Deepu G; Sathyan, Pradeesh; Vargheese, Geetha

    2011-07-01

    Forensic entomology is the study of insects/arthropods in criminal investigation. Right from the early stages insects are attracted to the decomposing body and may lay eggs in it. By studying the insect population and the developing larval stages, forensic scientists can estimate the postmortem index, any change in position of the corpse as well as the cause of death. Forensic odontologists are called upon more frequently to collaborate in criminal investigations and hence should be aware of the possibilities that forensic entomology have to offer and use it as an adjunct to the conventional means of forensic investigation.

  8. TIMTEM - a digital program for the calculation of two-dimensional, non-linear temperature fields of reactor components of complex structure taking into account inhomogeneity and anisotropy

    International Nuclear Information System (INIS)

    Simon-Weidner, J.

    1975-05-01

    The digital program TIMTEM calculates twodimensional, nonlinear temperature fields of reactor components of complex structure; inhomogeneity and anisotropy are taken into account. Systems consisting of different materials and therefore having different temperature- and/or time-dependent material characteristics are allowed. Various local, time- and/or temperature-dependent boundary conditions can be considered, too, which may be locally different from each other or can be interconnected. (orig.) [de

  9. Status of nuclear forensic support in Sudan

    International Nuclear Information System (INIS)

    Mokhtar, Mohammedelmoez Eltayeb Abderahman

    2015-08-01

    The central problem investigated in this thesis is nuclear forensic support in Sudan, the thesis comprises five chapters, began with an introduction containing the art of forensic science, stated the importance of the it in criminal investigations. The forensic science was defined, and stated the principle of which it underlying, including: principle of individuality and principle of exchange, the divisions of this science has been clarified, then it discussed the crime scene and the collecting of evidence, where starting the forensic science at the crime scene, with clarifying the principle of crime scene investigation. Nuclear and other radioactive material was discussed: defining a radioactivity with the material source. It placed into 3 general categories: special nuclear materials, reactor fuel, and commercial radioactive sources, and mention each category and it characteristics. Radiation is part of our environment was clarified, and discussed what the effect on organisms and populations are. Nuclear forensics was presented,and how problem of the safeguarding of the nuclear material beginning. The emerging nature of the problem was discussed, the radiological crime scene management was explained, importance of securing the scene with an examples of equipment and instruments for on-scene radiation safety assessment and how the collection of evidence, storage forensic laboratory analysis was discussed and how set the designated nuclear forensic laboratory, also nuclear forensic interpretation, and the chain of custody was mentioned. The role of Regulating Authority in Nuclear forensic support was discussed, specifically in Sudan, International Cooperation have also been reminded, as well as memorandum of understanding was mentioned between SNRRA and the administration of forensic evidence, and one of it results is the radiological surveys unit in forensic administration, how the unit is configured, the role of the unit, finally conclusion of research was

  10. 2nd Arab Forensic Science & Forensic Medicine Meeting, ASFSFM 2016: Meeting Report

    Directory of Open Access Journals (Sweden)

    Abdulsallam Bakdash

    2016-12-01

    Full Text Available One of the main objectives of Naif Arab University for Security Sciences (NAUSS is to enhance peace, security, and justice in Arab societies through education, research, and advanced professional training in various disciplines of security and forensic sciences. NAUSS strives to improve the academic and professional skills of forensic scientists and security personnel to combat crime and terrorism by utilizing all the available tools of modern technology. NAUSS also realizes the importance of scientific research in the social, economic, and technological development of a society and is, therefore, committed to encouraging and supporting research at every level. NAUSS has given the fields of forensic sciences and forensic medicine a top priority and the attention they deserve. In pursuit of its objectives, and in cooperation with other Arab member organizations, NAUSS launched the Arab Society for Forensic Sciences and Forensic Medicine (ASFSFM in 2013. The Society had the honour of being officially launched by His Royal Highness, Prince Mohammed bin Naif bin Abdul Aziz, Crown Prince, Deputy Prime Minister and the Minister of the Interior, Honorary President of the Council of Arab Ministers of Interior and Chairman of the Supreme Council of NAUSS. The 2nd Arab Forensic Science & Forensic Medicine Meeting (ASFSFM Meeting 2016 was yet another part of the efforts and concern of NAUSS to advance the skills and knowledge of Arab specialists and to facilitate cooperation among forensic scientists and institutions engaged in the practice, education and research of forensic sciences and forensic medicine at various levels.

  11. Forensic Interviews for Child Sexual Abuse Allegations: An Investigation into the Effects of Animal-Assisted Intervention on Stress Biomarkers.

    Science.gov (United States)

    Krause-Parello, Cheryl A; Gulick, Elsie E

    2015-01-01

    The use of therapy animals during forensic interviews for child sexual abuse allegations is a recommendation by the Therapy Animals Supporting Kids Program to help ease children's discomfort during the forensic interview process. Based on this recommendation, this study incorporated a certified therapy canine into the forensic interview process for child sexual abuse allegations. This study investigated changes in salivary cortisol, immunoglobulin A, blood pressure, and heart rate as a result of forensic interview phenomenon (e.g., outcry) incorporating animal-assisted intervention versus a control condition in children (N = 42) interviewed for alleged child sexual abuse. The results supported significantly greater heart rate values for the control group (n = 23) who experienced sexual contact and/or indecency than the experience of aggravated sexual assault compared to no difference in HR for the intervention group (n = 19). The results suggest that the presence of the canine in the forensic interview may have acted as a buffer or safeguard for the children when disclosing details of sexual abuse. In the intervention group, children's HR was lower at the start of the forensic interview compared to the control group. Finding an effect of having a certified handler-canine team available during the forensic interview on physiological measures of stress has real-world value for children, child welfare personnel, and clinical therapists. It is suggested that animal-assisted intervention be expanded to children facing other types of trauma and to treatment programs for child survivors of sexual abuse.

  12. Forensic use of fingermarks and fingerprints

    NARCIS (Netherlands)

    Meuwly, Didier; Li, Stan Z.; Jain, Anil K.

    2014-01-01

    The aim of this entry is to describe and explain the main forensic uses of fingermarks and fingerprints. It defines the concepts and provides the nomenclature related to forensic dactyloscopy. It describes the structure of the papillary ridges, the organization of the information in three levels,

  13. Human resources and their possible forensic meanings.

    Science.gov (United States)

    Russo, Andrea; Urlić, Ivan; Kasum, Josip

    2015-09-01

    Forensics (forensic--before the Forum) means the application of knowledge from different scientific fields in order to define facts in judicial and/or administrative procedures. Nowadays forensics, besides this, finds its application even in different economic processes. For example, forensics enters the commercial areas of business intelligence and of different security areas. The European Commission recognized the importance of forensics, and underscored the importance of development of its scientific infrastructure in member States. We are witnessing the rise of various tragedies in economic and other kinds of processes. Undoubtedly, the world is increasingly exposed to various forms of threats whose occurrences regularly involve people. In this paper we are proposing the development of a new approach in the forensic assessment of the state of human resources. We are suggesting that in the focus should be the forensic approach in the psychological assessment of awareness of the individual and of the critical infrastructure sector operator (CISO) in determining the level of actual practical, rather than formal knowledge of an individual in a particular field of expertise, or in a specific scientific field, and possible forensic meanings.

  14. Forensic Learning Disability Nursing Role Analysis

    Science.gov (United States)

    Mason, Tom; Phipps, Dianne; Melling, Kat

    2011-01-01

    This article reports on a study carried out on the role constructs of forensic and nonforensic Learning Disability Nursing in relation to six binary themes. The aims were to identify if there were differences in perceptions of forensic learning disability nurses and nonforensic learning disability nurses in relation to the six binary themes of the…

  15. Bovine and equine forensic DNA analysis

    NARCIS (Netherlands)

    van de Goor, L.H.P.

    2011-01-01

    Animal forensic DNA analysis is being used for human criminal investigations (e.g traces from cats and dogs), wildlife management, breeding and food safety. The most common DNA markers used for such forensic casework are short tandem repeats (STR). Rules and guidelines concerning quality assurance

  16. Massively parallel sequencing of forensic STRs

    DEFF Research Database (Denmark)

    Parson, Walther; Ballard, David; Budowle, Bruce

    2016-01-01

    The DNA Commission of the International Society for Forensic Genetics (ISFG) is reviewing factors that need to be considered ahead of the adoption by the forensic community of short tandem repeat (STR) genotyping by massively parallel sequencing (MPS) technologies. MPS produces sequence data that...

  17. Digital Still Transect Images from the Hawaii Coral Reef Assessment and Monitoring Program (CRAMP): Data from 2004 (NODC Accession 0037908)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This dataset consists of video transect images (JPG files) from CRAMP surveys taken in 2004 at 6 sites, some of which had multiple depths. Digital images are...

  18. Digital Still Transect Images from the Hawaii Coral Reef Assessment and Monitoring Program (CRAMP) Maui 2006 (NODC Accession 0039627)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This dataset consists of digital still transect images (JPG files) from CRAMP surveys taken on Maui in 2006 at 8 sites, some of which had multiple depths. Surveys...

  19. Error and its meaning in forensic science.

    Science.gov (United States)

    Christensen, Angi M; Crowder, Christian M; Ousley, Stephen D; Houck, Max M

    2014-01-01

    The discussion of "error" has gained momentum in forensic science in the wake of the Daubert guidelines and has intensified with the National Academy of Sciences' Report. Error has many different meanings, and too often, forensic practitioners themselves as well as the courts misunderstand scientific error and statistical error rates, often confusing them with practitioner error (or mistakes). Here, we present an overview of these concepts as they pertain to forensic science applications, discussing the difference between practitioner error (including mistakes), instrument error, statistical error, and method error. We urge forensic practitioners to ensure that potential sources of error and method limitations are understood and clearly communicated and advocate that the legal community be informed regarding the differences between interobserver errors, uncertainty, variation, and mistakes. © 2013 American Academy of Forensic Sciences.

  20. Easy digital engineering

    International Nuclear Information System (INIS)

    Jin, Dal Bok

    2002-02-01

    This book lists basic of digital engineering, number system and digital code, Boolean algebra and basic logic circuit, simplify of logical expression, combinational circuit, arithmetic circuit, multivibrator circuit, sequential circuit, memory unit of semiconductor and logical element for program, D/A converter and A/D converter, logic element and integrated circuit and logic circuit and micro controller. It has exercises and answers about digital engineering and summary in the end of each chapter.