THE ENHANCED DIGITAL INVESTIGATION ON CRIME SCENE
|
|
- Alexis Potter
- 7 years ago
- Views:
Transcription
1 THE ENHANCED DIGITAL INVESTIGATION ON CRIME SCENE SHIVANAND S. ULLEGADDI 1 AND DR. SANTOSH L. DESHPANDE 2 1 M.Tech Scholar, Computer Network Engineering, Dept. Of PG Studies VTU, Belagavi, India 2 Professor, Computer Network Engineering, Dept Of PG Studies VTU, Belagavi, India Abstract The enhanced digital investigation provides tools and techniques that can be used to identify and analyze evidences on crime scene. The article introduces is a layered, consistent and secure approach to digital investigation. The digital investigation shall retrieve to obtain the evidences that will be acceptable by judiciary. The work focused on layered and consistent approach to digital investigation for law enforcement agencies. Present manual investigation process can be altered to get better result. The article deals with unique smart phone based software which aims at identifying activities that facilitate and improve investigation processes that involves in digital investigation like (a) Collection of crime evidences from possible sources of related data like images, video, audio records and notes related to crime in a tamper proof manner. (b)examination of collected evidences as per the investigation procedure which may involve noise removing, evidence extraction from images to gather accurate information.(c)analysis of evidences with legally justifiable methods and techniques of law enforcement agencies to get the relevant information of suspect or victim. (d) Reporting which is the outcome of analysis process which gives proper documentation. The article also provides law enforcement agencies a secure, accurate and consistent means for evidence gathering, including documentation with photographs, audio, video and scene notes. The enhanced digital investigation on crime scene shall eventually improve organization productivity, save time and reduce the number of other devises that investigating officers need to carry for documenting the crime scene. It would also provide scene of control, real time information and better understanding of crime scene to senior officers so they can make out smart decision and better allocate resources for effective crime scene investigation. The result from the evaluation is going to produce a new model to improve the whole investigation process. Keywords crime, evidence, investigation, scene. I. INTRODUCTION The Enhanced Digital investigation on Crime scene reporting is unique smart phone based software which aim to provides law enforcement agencies a secure, accurate and consistent means for evidence gathering, including documentation with photographs, audio, video and scene notes with the help of sensors and well advanced features of a smart phone. The goal of a Enhanced digital crime-scene investigation is to recognize, document and collect evidence at the scene of a crime. Solving the crime will then depend on piecing together the evidence to form a picture of what happened at the crime scene. Some of the evidences get lost soon after the occurrence; the other evidences disappear, gets contaminated or changed with further passage of time. The opportunity to examine the scene is available once, if the same is not fully exploited. The Wealth of information is lost forever. The report must be purely factual. The crime scene investing officials or evidence recovery technician should document what he/she sees, not what he/she thinks. A general description of the crime scene should be given just as the investigator sees it when he/she does the first walk through of the scene. The final report should tell a descriptive story. II. EXISTING INVESTIGATION MODELS The digital investigation is a process that can be modeled with some reasonably established levels. Most proposed digital models have focused on The investigation process and the different levels, they explained the complexity of an investigation and functionality of devices, and the most important principles of an investigation [1]. A. Digital Forensics Research Workshop Investigation Model (DFRWS) Digital Forensic Research Workshop (DFRWS) proposed a model on digital investigation this process has six phases. DFRWS Investigation starts with Identification phase which identify evidences which are available at the crime scene. The next phase comes is Preservation phase aim to setup a proper case management and manage the data from contamination. Evidences related to crime like images, audio, video, notes are preserved for further investigation. 465
2 III. PREFERRED INVESTIGATION MODEL Figure 1: DFRWS Investigation model. The next phase is known as collection where the relevant data are to be collected based on various recovery techniques. Examination and Analysis are the two important phases the task performed are evidence tracing, evidence validation and evidence recovery of hidden/encrypted data. The last phase is presentation phase which is related to documentation of all evidences and submitting to the court for judgment. B. Abstract Digital Investigation Model (ADIM) This model is based on DFRWS model but additional three phases are added this the total phases become nine; the additional phases are preparation, Approach strategy and Returning evidence. considering Preparation phase, activities such as preparing tools, identifying techniques and getting management that support for crime is done. Approach strategy has two major things one is to maximize the acquisition of unturned evidences and at the same time minimize any negative impact to the victim and surrounding people. Returning evidence phase tells us about submitting evidences to court for further investigation and judgment. Figure 2: Abstract digital investigation model. A. Enhanced Digital Investigation on Crime Scene Model (EDICS) There are four main considerations in digital investigation as per the standers shown in figure. 1. Collection: The first phase of investigation is to identify crime scene, label, record and gather data from possible sources of related data. 2. Examination: Data gathered is examined as per the investigation procedure which may be the regular for the investigation officials. 3. Analysis: The next phase is to analyze the result of the examination, using legally justifiable methods and techniques to get the relevant information of suspect or victim. Analysis may include noise removing, evidence extraction from images. Figure 3: Enhanced digital investigation model. 4. Reporting: The final phase is reporting the outcome of analysis, which may include describing the actions taken, describing what are the tools and procedures were selected on investigation [2]. A digital investigation follows certain stages and procedures when working on a case. First identify the crime, along with the object (victim) and other tools used to commit the crime then an investigation officer looking at all the digital evidences builds suitable chain of custody. Once officer recovers all evidences, after evidences has been analyzed the officer must act as an expert witness and present the evidence in court. The investigating officer becomes the tool which law enforcement must use to track and prosecute on criminals [3]. At the outset the crime investigation seems to be very crucial and difficult to solve the situation but the evidences that have to be taking at the crime scene are to be going to propose to find the suspect. At the crime scene, the case investigator and crime scene personal work to define the secure areas that may contain evidences: examine and document the scene; collect physical evidences and images, videos of whole crime scene and tools used to crime. Preserve all evidences for further investigation. Digital investigation will provide exact means of evidences which helps to examine and analyze the case on the basis of strong evidences at crime scene [4]. Digital evidences must be admissible, precise, authenticated and accurate in order to accept by court. Digital evidences are exact in nature and handled properly and carefully. A detailed digital investigation procedure provides important aspects to digital investigation as per the court law. A digital investigation carried out in the form of models this gives an advantage of finding the suspect related to crime. The model can also help to capture the 466
3 expertise of investigation as a basis to the development of advanced tools incorporating techniques such as automated evidence collection [3]. B. Digital Investigation Process (DIP) Figure 4: Digital investigation process. In Acquisition phase, evidences are to be gathered in acceptable manner with proper approval from the authority which is followed by identification phase where the task is to identify the evidences which leads to suspect and convert them to the format which is understood by human. The evaluation phase comprise of the task to determine whether the evidences identified in the previous phase is needed relevant to the case being investigated and the case further be lead to suspect. In final phase that is Admission the acquired and extracted evidences are presented in the court of law [4]. C. Ease of Use Collecting physical evidence from a scene can help an investigator recreate the crime scene and establish the sequence of events. Physical evidence can also corroborate statements made by the victim, suspects and witnesses [5]. Various Scene that can be documented while crime scene reporting Burglars Suicides Fires Auto thefts Auto accidents. Data transfer to server carried out through online or high speed data cable. B. Centralized Server The data collected using Mobile Application from the jurisdictions of various police stations will get accumulated in the central server, which Can be accessed by supervisors at any level from the Police Station up to state or country. Accordingly the reporting tool loaded in the central server provides the facility for analysis and generation of reports about the crime scene situation in the jurisdiction of a police station up to a state/province or the country as a whole. The user is free to choose the period for which the data is to be analyzed and reported. Thus this reporting tool provides a comprehensive report by cross classifying the crime data for the user selected period (duration) and selected jurisdiction (area/network: district, city, province, etc) including causal analysis. These secured and scientific data on crime scene, collected and managed with greater ease, are expected to revolutionize in solving the crimes. Server application from where all or selected cases can be viewed and can add the further instructions to the officers to proceed with case. List of all cases can be viewed: Location wise on MAP Category wise (Thefts, Murder, etc) Officer wise Case number wise / Date of Offence wise Data Transfer: Crime details collected from the scene of crime can be transferred online from mobile phone to server connecting through internet or can be transferred offline connecting mobile phone through data cable to server IV. PROPOSED WORK AND METHODOLOGY The proposed article explores a complete electronic record of all cases, scenes and ensures that you have a centralized place for all of your data in any environment. The regular routine of manual investigation pretended to a high magnified level which emphasis the real time investigation in better way. The work aimed to help the investigating agencies to be accurate and consistent means of evidence collection, examination, analysis and reporting. Because data is to be centralized, this gives all accumulated information to the investigating agencies which comes under jurisdictions of various police stations up to state or country. The proposed system will have two modules A. Mobile Application An android smart phone is an important aspect in which the proposed application is to be installed; this can be carried by police officer s on the field. Smart phone is expected to operate with a high speed, High resolution camera (audio/video), Smart storage capacity, 3G network facility to fetch location. The application is built in such a way that user pretend the case in all the directions and capture most possible evidences and put them to server with one touch. C. Schematic Diagram of Enhanced Digital Investigation on Crime scene System Figure 5: Architecture of Enhanced Digital Investigation System. D. Post implementation benefits and another features Productivity: once implemented would increase the productivity and reduce the time required to document the scene drastically. 467
4 Data security: From the instance evidence is collected is locked and transferred to the centralized server/cloud. Easy access to seniors: The data once transferred to the server/cloud can be easily accessed by the senior officers moreover the crime scenes can be searched by desired parameter like location, type of crime etc Empower filed force: system would reduce the need of carrying too many devices while caring out crime scene investigation. It would also reduce a lot of paper work and time spent on compiling reports. Transparency: Eliminate any possibility of manipulation of crime scene or evidence and give almost real time visibility to senior officers. E. Results and Discussions The enhanced digital investigation on crime scene gives perfect figures of crime with different analysis methods which give glance about the cases registered some of standard analysis techniques used are listed below. Severity level analysis Severity is mentioned while the case being registered. The graph deals with three severity levels high, low, medium. The analysis pretends the investigating officials to control over crime. Date crime analysis Case type analysis History of different case types like robbery, rape case, murder has been seen on one screen with graph. It clearly shows the comparison among different case category. This type of analysis over crime investigation helps investigating officials to analyze about different types of crime. V. CONCLUSION The enhanced digital crime scene investigation system will be an enhanced version is defined to redefine forensic process in crime scene. It describe the development right from the point when the initial infrastructure is put in place, to investigations when the incident is reported, through the trace back phases that would lead to the point where the crime was committed and finally to the ultimate investigations that would lead to conclusive interpretations of the evidence collected and also will helps law enforcement agencies (police) to monitor the crime scene on real time which will quickly gather the information of a crime and also higher authority will come to know the information of crime happened in particular area by sending auto generated message. Once the evidences are stored in cloud or at SP/IGP servers, the evidences are secured for longer time and no changes are made on the evidences. This proposed article is fully electronic way of investigating a crime which helps the officials to analyze the case and conclude it within less time efficiently. Thus Enhanced digital investigation on crime scene is best suitable for digital crime scene investigation. REFERENCES Date crime analysis gives detail idea about number of case registered on particular date. This helps investigating agencies to link with different crimes to get evidences. [1] Yunus Yusoff, Roshan Ismail and Zainuddin Hassan, Common Phases of Computer Forensics Investigation Models International Journal of Computer Science and Information Technology (IJCSIT), Vol 3, No 3, June 2011, pp 18,19. [2] Inkipo O. Ademu, Dr Chris O. Imfiden, Dr David S. Preston A new Approach of digital Forensics Model for Digital Forensics Investigation International Journal of advanced Computer science and Applications(IJACSA) Vol 2, No 12, 2011, pp 176. [3] Sabah Al-Fedaghi and Bashayer Al-Babtain Modeling the Forensics process, International Journal of Security and its Applications, Vol 6, No 4, October. 2012, pp
5 [4] Norulzahrah M. Zainudin, Madjid merabti, David Llewellyn-Jones, ISBN: 2010 PGNet A Digital Forensics Investigation Model for Online Social Networking unpublished. [5] Saferstein, Richard. A Simplified Guide to Crime Scene Investigation. 469
Survey on Different Phases of Digital Forensics Investigation Models
Survey on Different Phases of Digital Forensics Investigation Models Priya S. Patil 1, Prof. A. S. Kapse 2 P. R. Patil College of Engineering and Technology, Amravati, India ABSTRACT: Most forensics models
More informationCRIME SCENE INVESTIGATION
CRIME SCENE INVESTIGATION CHAPTER 2 Mr. Moss 1 CRIME SCENE INVESTIGATION Crime scenes tell a story Crime scene investigators must be careful and systematic Crime scene investigators must follow protocol
More information1/26/15. Chapter 2 Crime Scene
Chapter 2 Crime Scene Chapter 2 Crime Scene By the end of this chapter you will be able to: By the end of this chapter you will be able to: Investigation and Evidence Collection 1 Investigation and Evidence
More informationCOMMON PHASES OF COMPUTER FORENSICS INVESTIGATION MODELS
COMMON PHASES OF COMPUTER FORENSICS INVESTIGATION MODELS Yunus Yusoff, Roslan Ismail and Zainuddin Hassan College of Information Technology, Universiti Tenaga Nasional, Selangor, Malaysia yunusy@uniten.edu.my,
More informationThe Enhanced Digital Investigation Process Model
The Enhanced Digital Investigation Process Model Venansius Baryamureeba and Florence Tushabe barya@ics.mak.ac.ug, tushabe@ics.mak.ac.ug Institute of Computer Science, Makerere University P.O.Box 7062,
More informationIAPE STANDARDS SECTION 16 DIGITAL EVIDENCE
IAPE STANDARDS SECTION 16 DIGITAL EVIDENCE IAPE STANDARD SECTION 16.1 DIGITAL EVIDENCE Standard: Digital evidence is a critical element of modern criminal investigation that should be maintained in strict
More informationSecurity and Law Enforcement Community of Interest 1811-Criminal Investigating Career Road Map
Security and Law Enforcement Community of Interest 1811-Criminal Investigating Career Road Map Prepared by: Booz Allen Hamilton Career Progression within the 1811 Occupational Series is Marked by Support
More informationEast Haven Police Department
East Haven Police Department Type of Directive: Policies & Procedures No. 410.2 Subject/Title: Issue Date: Preliminary Criminal Investigations July 29, 2014 Effective Date: References/Attachments: N/A
More informationCONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS
Chapter 22 CONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS April Tanner and David Dampier Abstract Research in digital forensics has yet to focus on modeling case domain information involved in investigations.
More informationUsing Your Pocket Notebook
Using Your Pocket Notebook Introduction Much of a police officer s time is spent gathering facts and evidence that will be used in court to support a criminal prosecution. The pocket notebook is used to
More informationSufficiency of Windows Event log as Evidence in Digital Forensics
Sufficiency of Windows Event log as Evidence in Digital Forensics Nurdeen M. Ibrahim & A. Al-Nemrat, Hamid Jahankhani, R. Bashroush University of East London School of Computing, IT and Engineering, UK
More informationLAW ENFORCEMENT OFFICER
Class Code: 7824 TITLE: REPORTS TO: SUPERVISES: Law Enforcement Officer Grade 21 Director Law Enforcement N/A JOB FUNCTION: Perform a variety of law enforcement activities for an assigned school District
More informationSAULT COLLEGE SAULT STE. MARIE, ONTARIO COURSE OUTLINE
SAULT COLLEGE SAULT STE. MARIE, ONTARIO COURSE OUTLINE COURSE TITLE: Introduction to Applied Forensic Science CODE NO. : NRL 210 SEMESTER: 2 PROGRAM: AUTHOR: Natural Resources/Environmental Law Inspection
More informationInformation Technology Audit & Forensic Techniques. CMA Amit Kumar
Information Technology Audit & Forensic Techniques CMA Amit Kumar 1 Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques
More informationLecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation
Computer Forensics and Digital Investigation Computer Security EDA263, lecture 14 Ulf Larson Lecture outline! Introduction to Computer Forensics! Digital investigation! Conducting a Digital Crime Scene
More informationCrime scene evidence who is involved? Police officer and SOCO (Scenes of Crime Officer) or CSI (Crime Scene Investigator)
Police officer and SOCO (Scenes of Crime Officer) or CSI (Crime Scene Investigator) Task 1 Police officers and SOCOs both attend crime scenes, but they have different jobs to do. Read the statements from
More informationCourse Forensic Science. Unit II History
Course Forensic Science Unit II History Essential Question What is legally and ethically expected of forensic scientists and Crime Scene Investigators? TEKS 130.295(c) (4)(C) Prior Student Learning History
More informationPOLICE SCENE TECHNICIAN I POLICE SCENE TECHNICIAN II
CITY OF ROSEVILLE POLICE SCENE TECHNICIAN I POLICE SCENE TECHNICIAN II DEFINITION To perform a variety of technical and specialized duties related to the investigation of crimes and traffic accidents;
More informationRules and Procedures. Rule 312 August 23, 2001. Rule 312 - CRIME LABORATORY - EVIDENCE AND CRIME SCENES
Rules and Procedures Rule 312 August 23, 2001 Rule 312 - CRIME LABORATORY - EVIDENCE AND CRIME SCENES Rule 312, Crime Laboratory - Evidence and Crime Scenes, is hereby re-issued to establish Police Department
More informationTASK LIST UTILITIES SERVICE INVESTIGATOR (CLASS CODE 1631)
TASK LIST UTILITIES SERVICE INVESTIGATOR (CLASS CODE 1631) 1. Initiates investigations of alleged loss or theft of department property such as inventory, assets, and/or cash after notification of such
More informationMobile Audio/Video Recorder Policy
Mobile Audio/Video Recorder Policy 446.1 PURPOSE AND SCOPE The Fort Collins Police Services has equipped selected vehicles and officers with a Mobile Audio/Video Recording (MAV) system and also allows
More informationAnti-human trafficking manual for criminal justice practitioners. Module 11
Anti-human trafficking manual for criminal justice practitioners Module 11 11 UNITED NATIONS OFFICE ON DRUGS AND CRIME Vienna Anti-human trafficking manual for criminal justice practitioners Module 11:
More informationCITY OF CARLSBAD CLASS SPECIFICATION COMMUNITY SERVICE OFFICER I /II
CITY OF CARLSBAD CLASS SPECIFICATION JOB TITLE: DEPARTMENT: COMMUNITY SERVICE OFFICER I /II POLICE BASIC FUNCTION: Under direct supervision, performs a variety of routine community service, paraprofessional
More informationEvidence Technician s School
Evidence Technician s School Program Overview The Evidence Technician s School is designed to provide your Evidence Technician or Crime Scene Investigator with a sound foundation of the basic principles
More informationCRIME SCENE INVESTIGATION AND FORENSIC SCIENCE TRAINING PROGRAMMES
CRIME SCENE INVESTIGATION AND FORENSIC SCIENCE TRAINING PROGRAMMES Broadstone Mill Broadstone Road Stockport Manchester SK4 5HS Tel: +44 (0) 871 99 88 777 Email: enquiries@pgitraining.com Visit: www. pgitraining.com
More informationIntroduction to Crime Scene Dynamics
Chapter 1 Introduction to Crime Scene Dynamics OVERVIEW The development of the field of forensics has been a process steeped in science and research. On the other hand, the practice of crime scene investigation
More informationCrime Scene Search and Processing
Objective: Crime Scene Search and Processing Crime scene search scenarios involve significant teamwork. Each team member should be assigned a specific duty during the crime scene processing. Explorers
More informationDudesville: A crime scene under the microscope. QUT Extreme Science
Dudesville: A crime scene under the microscope QUT Extreme Science Glossary QUT Extreme Science DNA Chromatography Forensic Science Locard s Principle (Deoxyribonucleic acid) an extremely long macromolecule
More informationBOR 6432 Cybersecurity and the Constitution. Course Bibliography and Required Readings:
BOR 6432 Cybersecurity and the Constitution Course Description This course examines the scope of cybercrime and its impact on today s system of criminal justice. Topics to be studied include: cybercrime
More informationComputer Forensics: an approach to evidence in cyberspace
Computer Forensics: an approach to evidence in cyberspace Abstract This paper defines the term computer forensics, discusses how digital media relates to the legal requirements for admissibility of paper-based
More informationCOMMUNITY SERVICES OFFICER
COMMUNITY SERVICES OFFICER Class specifications are intended to present a descriptive list of the range of duties performed by employees in the class. Specifications are not intended to reflect all duties
More informationCopyright and Terms of Service
Forensic Science Copyright and Terms of Service Copyright Texas Education Agency, 2011. These materials are copyrighted and trademarked as the property of the Texas Education Agency (TEA) and may not be
More informationReporting the crime to the police
Section 4 Reporting the crime to the police Why report the crime to the police? It is your choice whether you report the crime to the police. Some people choose not to report or may not report straight
More informationPiecing Digital Evidence Together. Service Information
Piecing Digital Evidence Together Service Information Services Overview Mobile and Tablet Forensics Mobile Phone Forensics is the legally tested and approved systematic examination of mobile phones, SIM
More informationOn Integrating Mobile Applications into the Digital Forensic Investigative Process
On Integrating Mobile Applications into the Digital Forensic Investigative Process April Tanner, Ph.D. Department of Computer Science Jackson State University Jackson, USA Soniael Duncan Department of
More informationFlorida Fish and Wildlife Conservation Commission Division of Law Enforcement ACCIDENT INVESTIGATIONS AND DEATH NOTIFICATION
Florida Fish and Wildlife Conservation Commission Division of Law Enforcement TITLE ACCIDENT INVESTIGATIONS AND DEATH NOTIFICATION APPLICABILITY ALL MEMBERS GENERAL ORDER 29 EFFECTIVE DATE December 1,
More informationCAREER: FORENSIC SCIENCE TECHNICIAN 1
CAREER: FORENSIC SCIENCE TECHNICIAN 1 Career: Forensic Science Technician Mary C. Cartwright Middlesex Community College CRJ 111-52 Heloisa DaCunha November 29, 2012 CAREER: FORENSIC SCIENCE TECHNICIAN
More informationEXAMINATION OUTLINE FOR PRIVATE INVESTIGATORS
EXAMINATION OUTLINE FOR PRIVATE INVESTIGATORS 2014 I. Ethics (18%) This area assesses the candidate s ability to comply with ethical standards of private investigators regarding privacy rights, confidentiality,
More informationA Victim s Guide to Understanding the Criminal Justice System
A Victim s Guide to Understanding the Criminal Justice System The Bartholomew County Prosecutor s Office Victim Assistance Program Prosecutor: William Nash 234 Washington Street Columbus, IN 47201 Telephone:
More informationILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION STATE POLICE EVIDENCE TECHNICIAN SERIES
ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION STATE POLICE EVIDENCE TECHNICIAN SERIES CLASS TITLE POSITION CODE STATE POLICE EVIDENCE TECHNICIAN I 41901 STATE POLICE EVIDENCE TECHNICIAN
More informationGoal to recognize, document and collect evidence at a crime scene
Crime Scene Investigation and Evidence Collection Lecture Credits: Anthony (Bud) Bertino Goal to recognize, document and collect evidence at a crime scene Sherlock Holmes» Sir Arthur Conan Doyle in the
More informationHow To Solve A Violent Home Invasion With A United Force
Use Case SOLVING VIOLENT CRIMES WITH A UNIFIED WORKFLOW In a Violent Home Invasion Investigation, the UFED Series Seamlessly Unifies Workflows from Field to Lab A series of violent home invasions has everyone
More informationGuidelines on Digital Forensic Procedures for OLAF Staff
Ref. Ares(2013)3769761-19/12/2013 Guidelines on Digital Forensic Procedures for OLAF Staff 1 January 2014 Introduction The OLAF Guidelines on Digital Forensic Procedures are internal rules which are to
More informationSpoliation of Evidence. Prepared for:
Spoliation of Evidence Prepared for: Spoliation Nationwide anti-spoliation trend Cases can be thrown out of court Insurers can be denied subrogation claims An insured who destroys evidence of a claim can
More informationTen Deadly Sins of Computer Forensics
Ten Deadly Sins of Computer Forensics Cyber criminals take advantage of the anonymity of the Internet to escape punishment. Computer Forensics has emerged as a new discipline to counter cyber crime. This
More informationOpen Source Digital Forensics Tools
The Legal Argument 1 carrier@cerias.purdue.edu Abstract This paper addresses digital forensic analysis tools and their use in a legal setting. To enter scientific evidence into a United States court, a
More informationDigital and Cloud Forensics
Digital and Cloud Forensics Stavros Simou Cultural Informatics Laboratory, Department of Cultural Technology and Communication, University of the Aegean, University Hill, GR 81100 Mytilene, Greece ssimou@aegean.gr
More information8 Interpreting Crime Data and Statistics
8 Interpreting Crime Data and Statistics Rachel Boba T he goal of this chapter is to provide knowledge of how to appropriately apply and interpret statistics relevant to crime analysis. This chapter includes
More informationSTATE OF MONTANA DEPARTMENT OF CORRECTIONS POLICY DIRECTIVE
STATE OF MONTANA DEPARTMENT OF CORRECTIONS POLICY DIRECTIVE Subject: CRIME SCENE AND PHYSICAL EVIDENCE Policy No. DOC 3.1.28 PRESERVATION Chapter 3: FACILITY / PROGRAM OPERATIONS Page 1 of 6 Section 1:
More informationComparative Analysis of Digital Forensic Models
Journal of Advances in Computer Networks, Vol. 3, No. 1, March 2015 Comparative of Digital Forensic s Fakeeha Jafari Rabail Shafique Satti process s are: : Evidences can be collected in this phase : on
More informationConcepts of digital forensics
Chapter 3 Concepts of digital forensics Digital forensics is a branch of forensic science concerned with the use of digital information (produced, stored and transmitted by computers) as source of evidence
More informationDigital Forensics for Attorneys Overview of Digital Forensics
Lars Daniel,, EnCE, ACE, CTNS Digital Forensic Examiner Digital Forensics for Attorneys Overview of Digital Forensics Digital Forensics For Attorneys Overview of Digital Forensics Types of Digital Evidence
More informationStages in a Capital Case from http://deathpenaltyinfo.msu.edu/
Stages in a Capital Case from http://deathpenaltyinfo.msu.edu/ Note that not every case goes through all of the steps outlined here. Some states have different procedures. I. Pre-Trial Crimes that would
More informationInvestigation Techniques
Investigation Techniques Sources of Information 2016 Association of Certified Fraud Examiners, Inc. Internal vs. External Internal sources may be all that s available (accounting and business tax records,
More informationFramework for a Digital Forensic Investigation
Framework for a Digital Forensic Investigation Michael Kohn 1, JHP Eloff 2 and MS Olivier 3 1 mkohn@cs.up.ac.za, 2 eloff@cs.up.ac.za, 3 molivier@cs.up.ac.za Information and Computer Security Architectures
More informationKey Crime Analysis Data Sources. Crime
Part 2 Processes of Crime Analysis coming into the police agency, but those dispatched to or initiated by officers. Because of the vast information contained in a CAD system, information is often purged
More informationCell Phone Forensics For Legal Professionals
1 Cell Phone Forensics For Legal Professionals Lars E. Daniel, EnCE, ACE, AME, CTNS, SCE, SCCM, SCA Digital Forensics Examiner Cell Phone Acquisition and Examination Collection and Acquiring Cell Phones
More informationManagement of Crime Scenes
Management of Crime Scenes When the Call comes Document date, time, information received, and your actions and responses Prepare yourself Be calm Be safe Think Upon Arrival Duty to render aid Duty to protect
More informationLAW ENFORCEMENT OFFICER, GS-1802-05
Standard Job No. N1017 LAW ENFORCEMENT OFFICER, GS-1802-05 Introduction The incumbent of this position is responsible for performing full-time law enforcement duties including detection, apprehension,
More informationRISK MANAGEMENT SERVICES Office of The Executive Vice President & COO Allan F. Brooks, M.A, CPCU, ARM, Director, Risk Management
Incident/Accident Reporting Policy and Procedure Helping to Ensure Your Safety and Health at Chapman University Purpose Accident/incident investigations are necessary to identify causation and to help
More informationDevelopment of Forensic Nursing in Australia: Associate Professor Linda Saunders 4 th December 2008
Development of Forensic Nursing in Australia: Associate Professor Linda Saunders 4 th December 2008 Working with Offenders Country Total Criminal Population Population Australia 20,090,437 22,458 Canada
More informationRecording of Custodial Interrogations. Municipal Police Training Council. Model Policy. www.criminaljustice.ny.gov
Recording of Custodial Interrogations NEW YORK STATE DIVISION OF CRIMINAL JUSTICE SERVICES 80 South Swan Street Albany, New York 12210 www.criminaljustice.ny.gov STATE OF NEW YORK Division of Criminal
More informationTEXAS CRIME ANALYSIS 2
2011 CRIME IN TEXAS TEXAS CRIME ANALYSIS 2 CRIME MEASUREMENTS Crime affects every Texan in some fashion. To gain a measurement of crime trends, Texas participates in the Uniform Crime Reporting (UCR) program.
More informationSTATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION
STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION TITLE GRADE EEO-4 CODE SUPERVISORY CRIMINAL INVESTIGATOR II 43* D 13.241 SUPERVISORY CRIMINAL INVESTIGATOR
More informationAccident/Near Miss Investigation Guidelines
Accident/Near Miss Investigation Guidelines Accident Investigation Introduction An accident, incident or near miss has occurred, now what? Whether it is an accident, incident or near miss, it is imperative
More informationDigital Forensics. General Terms Cyber Crime, forensics models, Investigation, Analysis, digital devices.
Digital Forensics Ravneet Kaur, Amandeep Kaur Assistant Professor in Computer Science SDSPM College for Women, Rayya (Asr) Guru Nanak Dev University, India International Journal of Computer Applications
More informationHUNTINGTON WOODS DEPARTMENT OF PUBLIC SAFETY GOALS AND OBJECTIVES PROGRAM DETAIL
The following presents a detailed outline of goals and objectives of this Department organized by Department function. It is intended to provide a guideline for use in assessing progress in attaining the
More informationCloud Digital Investigations based on a Virtual Machine Computer History Model
Cloud Digital Investigations based on a Virtual Machine Computer History Model Sean Thorpe 1, Indrajit Ray 2, Tyrone Grandison 3, Abbie Barbir 4 1 Faculty of Engineering & Computing, University of Technology,
More information5) Familiarity of witness with exhibit for identification
Medical Records: If the custodian of records delivers them by subpoena, pursuant to N.C. Gen. Stat. 1A- 1, Rule 45(c)(2), for the sole purpose of delivering the medial records, the custodian need not appear
More informationCRIME SCENE MANAGEMENT: A GUIDE FOR LICENSEES
CRIME SCENE MANAGEMENT: A GUIDE FOR LICENSEES Produced by the Thames Valley Police Licensing Team March 2012 2 i n t r o d u c t i o n The key to the successful investigation is the gathering and securing
More information1. Redistributions of documents, or parts of documents, must retain the SWGIT cover page containing the disclaimer.
Disclaimer: As a condition to the use of this document and the information contained herein, the SWGIT requests notification by e-mail before or contemporaneously to the introduction of this document,
More informationGLOBAL INCIDENT & AUDIT MANAGEMENT SOFTWARE
GLOBAL INCIDENT & AUDIT MANAGEMENT SOFTWARE LOSS PREVENTION What would you do with $31 billion? THAT S HOW MUCH MONEY IS LOST TO THEFT, ACCOUNTING ERRORS, VENDOR FRAUD AND ORGANIZED CRIME (ORC) LP Software
More informationMassachusetts Digital Evidence Consortium. Digital Evidence Guide for First Responders
Massachusetts Digital Evidence Consortium Digital Evidence Guide for First Responders May 2015 Digital Evidence Guide for First Responders - MDEC A Note to the Reader There are an unlimited number of legal
More informationCTC Special Meeting on Communications and IT New York May 2013. Thank you very much. I am very pleased to be here to participate in
1 CTC Special Meeting on Communications and IT New York May 2013 Ms Marta Requena Chief, Terrorism Prevention Branch United Nations Office on Drugs and Crime Excellencies, Distinguished Delegates, Ladies
More information1. Abstract. 2. The Problem / Need for the Program
Program Information: Montgomery County, Maryland Program Title: A GIS Platform for Emergency Management and Response: Common Operational Pictures (COP) Program Category: # 14, Information Technology 1.
More informationSECURITY THREATS TO CLOUD COMPUTING
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 3, Mar 2014, 101-106 Impact Journals SECURITY THREATS TO CLOUD
More informationDesign and Implementation of a Live-analysis Digital Forensic System
Design and Implementation of a Live-analysis Digital Forensic System Pei-Hua Yen Graduate Institute of Information and Computer Education, National Kaohsiung Normal University, Taiwan amber8520@gmail.com
More information70250 Graduate Certificate in Digital Forensics
70250 Graduate Certificate in Digital Forensics Course overview The certificate course was inspired by experienced practitioners working in academia and the field of Digital Forensics, who saw the benefits
More informationTo Catch a Thief: Computer Forensics in the Classroom
To Catch a Thief: Computer Forensics in the Classroom Anna Carlin acarlin@csupomona.edu Steven S. Curl scurl@csupomona.edu Daniel Manson dmanson@csupomona.edu Computer Information Systems Department California
More informationNEW IMPROVEMENT IN DIGITAL FORENSIC STANDARD OPERATING PROCEDURE (SOP)
NEW IMPROVEMENT IN DIGITAL FORENSIC STANDARD OPERATING PROCEDURE (SOP) Sundresan Perumal 1, and Norita Md Norwawi. 2 1 Universiti Sains Islam Malaysia,sundresan@hotmail.com 2 Universiti Sains Islam Malaysia,
More informationChapter TEXAS CRIME ANALYSIS
Chapter 2 TEXAS CRIME ANALYSIS 2007 CRIME IN TEXAS TEXAS CRIME ANALYSIS 2 CRIME MEASUREMENTS Crime affects every Texan in some fashion. To gain a measurement of crime trends, Texas participates in the
More informationUML MODELLING OF DIGITAL FORENSIC PROCESS MODELS (DFPMs)
UML MODELLING OF DIGITAL FORENSIC PROCESS MODELS (DFPMs) Michael Köhn 1, J.H.P. Eloff 2, MS Olivier 3 1,2,3 Information and Computer Security Architectures (ICSA) Research Group Department of Computer
More informationCyber Forensic for Hadoop based Cloud System
Cyber Forensic for Hadoop based Cloud System ChaeHo Cho 1, SungHo Chin 2 and * Kwang Sik Chung 3 1 Korea National Open University graduate school Dept. of Computer Science 2 LG Electronics CTO Division
More informationIFS-8000 V2.0 INFORMATION FUSION SYSTEM
IFS-8000 V2.0 INFORMATION FUSION SYSTEM IFS-8000 V2.0 Overview IFS-8000 v2.0 is a flexible, scalable and modular IT system to support the processes of aggregation of information from intercepts to intelligence
More informationJOB TITLE JOB CODE PAY GRADE EFFECTIVE Medicaid Fraud Intake Officer 26140AG 29 11/15/2015
`STATE OF OHIO (DAS) CLASSIFICATION SPECIFICATION SERIES PURPOSE CLASSIFICATION SERIES Medicaid Special Agent MAJOR AGENCIES Attorney General Only SERIES NUMBER 2614AG EFFECTIVE 11/15/2015 The purpose
More informationVoice and data recording Red Box makes it easier than you imagine
Voice and data recording Red Box makes it easier than you imagine SIMPLER SMARTER VOICE If you re reading this, there s a good chance your organization has to record phone calls, radio conversations or
More informationSTATE POLICE TROOPER
JOB DESCRIPTION MICHIGAN CIVIL SERVICE COMMISSION JOB SPECIFICATION STATE POLICE TROOPER Employees in this job are police officers, responsible for the enforcement of all traffic and criminal laws of the
More informationInstructions for the Incident/Accident Investigation Form (SORM-703)
Instructions for the Incident/Accident Investigation Form (SORM-703) Purpose of Form: Effective loss control efforts require documentation of incidents and accidents to determine hazards or problem areas,
More informationRepublic of Latvia State Police Forensic Service Department
With the financial support of the Prevention of and Fight against Crime Programme European Commission Directorate General Home Affairs Republic of Latvia State Police Forensic Service Department implements
More informationModel Policy on Eyewitness Identification
Model Policy on Eyewitness Identification I. Purpose The purpose of this model policy is to outline proper protocol for eyewitness identification procedures for photographic, show-up, and live lineup identifications
More informationChain of evidence refers to the continuity of custody of material and items collected as evidence.
University of Wisconsin Madison Police Policy: 83.2 SUBJECT: EVIDENCE PROCESSING EFFECTIVE DATE: 06/01/10 REVISED DATE: 12/31/11, 11/01/13 REVIEWED DATE: 01/07/15 INDEX: 83.2.1 COLLECTING, PROCESSING,
More informationWhite Paper Automated Digital Evidence Collection and Publishing: Reduce Investigation Time and Costs May 2011
White Paper Automated Digital Evidence Collection and Publishing: Reduce Investigation Time and Costs May 2011 FBI 2009 Report: 1,756 terabytes of data processed 58,609 pieces of digital media 21,810 CDs
More informationFrequently Asked Questions - FAQ s
Frequently Asked Questions - FAQ s For information on how to report a crime CLICK HERE For information on contact details for Garda Stations CLICK HERE FAQ s (Sourced from Crime Victims Helpline) 1. What
More informationDigital Evidence Collection and Use. CS 585 Fall 2009
Digital Evidence Collection and Use CS 585 Fall 2009 Outline I. II. III. IV. Disclaimers Crime Scene Processing Legal considerations in Processing Digital Evidence A Question for Discussion Disclaimers
More informationContra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE
Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE The District and its colleges are committed to enhancing the quality of life of the community by integrating
More informationGetting Physical with the Digital Investigation Process
Getting Physical with the Digital Investigation Process Brian Carrier Eugene H. Spafford Center for Education and Research in Information Assurance and Security CERIAS Purdue University Abstract In this
More informationProviding leading edge digital forensic services with proven experience and expertise
Providing leading edge digital forensic services with proven experience and expertise Today s prevalence of electronic data demands a reliable proven solution. At CY4OR, we provide a leading edge service
More informationCrime in Arkansas 2001
State of Arkansas Mike Huckabee Governor Arkansas Crime Information Center Crime in Arkansas A publication of the Statistical Analysis Center Special Services Division Arkansas Crime Information Center
More informationLegal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.com Why should we care about CYBER CRIME & CYBER SECURITY? Clarification
More information