To see the other types of publications on this topic, follow the link: Forensis.

Journal articles on the topic 'Forensis'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Forensis.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Peisert, Sean, Matt Bishop, and Keith Marzullo. "Computer forensics in forensis." ACM SIGOPS Operating Systems Review 42, no. 3 (April 2008): 112–22. http://dx.doi.org/10.1145/1368506.1368521.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kirn, Gal, and Niloufar Tajeri. "The Age of Forensics: Memory, Emancipatory Politics or Visual Strategy? Interview with Eyal Weizman and Anselm Franke." Maska 31, no. 177 (June 1, 2016): 14–35. http://dx.doi.org/10.1386/maska.31.177-178.14_7.

Full text
Abstract:
Eyal Weizman and Anselm Franke speak in detail about their collaborative effort and exhibition Forensis at HKW, Berlin. The interview by Nilourfar Tajeri and Gal Kirn tackled three major topics that emerged in the conferences during the exhibition: first, they spoke about the aesthetical implications of forensic realism and about the genesis of their collaborative work; secondly, they traced the relationship of forensics to emancipatory politics; and thirdly, they observed some theoretical and political underpinnings of the major shift from the age of the witness to the age of forensics, this connected to potential consequences for a different politics and culture of forensic memory.
APA, Harvard, Vancouver, ISO, and other styles
3

Mitas, Stergios. "Crimen publicum, poena forensis." Archiv fuer Rechts- und Sozialphilosophie 106, no. 4 (2020): 554. http://dx.doi.org/10.25162/arsp-2020-0027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Филяк, Петр Юрьевич, Сергей Владимирович Королев, and Никита Владимирович Тебеньков. "ENSURING THE INFORMATION SECURITY WITH THE USE OF TOOLS OF FORENSICS." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ, no. 4(-) (December 15, 2021): 571–80. http://dx.doi.org/10.36622/vstu.2021.24.4.009.

Full text
Abstract:
Представлен подход к обеспечению информационной безопасности [1] с помощью применения инструментальных средств прикладной науки о расследовании и раскрытии преступлений, связанных с компьютерной безопасностью, известной под названием форензика . Рассматриваются кратко терминология, теоретические основы и подходы данной науки, а также представлен набор конкретных инструментов для реализации форензики в рамках программно-аппаратных комплексов, которые можно применять на практике в целях обеспечения информационной безопасности коммерческих и не коммерческих организаций, а также иных субъектов экономической деятельности. Представлены три программных продукта: OSForensics - комплект утилит для проведения компьютерной экспертизы, выполняющий поиск и анализ различных данных в системе, восстанавливающий данные, предоставляющий возможность просмотра следов активности пользователя; Belkasoft Evidence Center - инструмент для комплексной цифровой криминалистической экспертизы и расследования корпоративных инцидентов и Passware Kit Forensic - инструмент для поиска всех зашифрованных файлов на носителях информации. The paper presents an approach to ensuring information security through the use of tools of the applied science of investigation and disclosure of crimes related to computer security, known as forensics. The terminology, theoretical foundations and approaches of this science are briefly considered, as well as a set of specific tools for the implementation of forensis within the framework of software and hardware complexes that can be applied in practice in order to ensure information security of commercial and non-commercial organizations, as well as other subjects of economic activity. Three software products are presented: OSForensics - a set of utilities for conducting computer expertise, performing search and analysis of various data in the system, restoring data, providing the ability to view traces of user activity; Belkasoft Evidence Center - a tool for complex digital forensic examination and investigation of corporate incidents and Passware Kit Forensic -a tool for searching all encrypted files on data carriers.
APA, Harvard, Vancouver, ISO, and other styles
5

Apter, Emily. "Shibboleth: Policing by Ear and Forensic Listening in Projects by Lawrence Abu Hamdan." October 156 (May 2016): 100–115. http://dx.doi.org/10.1162/octo_a_00253.

Full text
Abstract:
Drawing on the work of Lawrence Abu Hamdan, a British-Lebanese artist and researcher currently based in Beirut, this essay examines the juridical and conceptual field of critical forensis which is situated at the juncture of security studies, art, and architecture. Abu Hamdan extends forensics to the area of “new audibilities,” with a focus on the politics of juridical hearing in situations of legal-identity profiling and voice authentication (the “shibboleth test”). Abu Hamdan's projects investigate how accent monitoring and audio surveillance, voice recognition, translation technologies, sovereign acts of listening, and court determinations of linguistic norms emerge as so many technical constraints on “freedom of speech,” itself a malleable term ascribed to discrepant claims and principles, yet taking on performative force in site-specific situations.
APA, Harvard, Vancouver, ISO, and other styles
6

Slipets, O. "THEORETICAL ASPECTS OF FORENSIS-PSYCHOLOGICAL EXAMINATION OF TYPOLOGICAL FEATURES OF PERSONALITY." Theory and Practice of Forensic Science and Criminalistics 20, no. 2 (December 4, 2019): 505–21. http://dx.doi.org/10.32353/khrife.2.2019.40.

Full text
Abstract:
Over more than a hundred years of history of the application of psychological knowledge to resolve issues of law remains a controversial series of theoretical provisions of forensic psychological examination. This is also true for the psychological examination of individual psychological (typological) features of the person. The purpose of the article is to formulate theoretical provisions of forensic psychological examination of typological features of a person, main concepts. Based on the definition of the object and subject of forensic psychological examination, the concept of object and subject of psychological examination of typological features of a person is formulated. On the basis of an analysis of the legal significance of the psychological study of a person of a suspect (accused) in criminal and administrative proceedings, the legal significance and tasks of forensic psychological examination of typological peculiarities are formulated. Proceeding from the subject of psychology, the legal significance of psychological facts for establishing legal criteria, the standardized requirements for qualification and the behavior of an expert, it is proposed to clarify the limits of competence of an expert psychologist. A means of applying the notion-limiter to general psychological categories, the definition of the basic concepts of forensic psychological examination typological features of the person. The theoretical provisions of the forensic psychological examination of psychological peculiarities of a person are formulated: object, subject, legal significance, tasks, limits of competence, thesaurus, is an element of the system of theoretical and methodical foundations of forensic psychological examination and the basis for the creation of a method of forensic psychological examination of typological features of a person .
APA, Harvard, Vancouver, ISO, and other styles
7

Rothwell, Gar W. "BOTRYOPTERIS FORENSIS (BOTRYOPTERIDACEAE), A TRUNK EPIPHYTE OF THE TREE FERN PSARONIUS." American Journal of Botany 78, no. 6 (June 1991): 782–88. http://dx.doi.org/10.1002/j.1537-2197.1991.tb14479.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mazo Gómez, Wilson De Jesús. "La tradición católica, su influencia en la conformación del rol de la mujer en la familia tradicional colombiana y su relación con la violencia de pareja al interior de ésta." Ratio Juris 14, no. 28 (October 17, 2019): 219–52. http://dx.doi.org/10.24142/raju.v14n28a8.

Full text
Abstract:
De acuerdo con el Instituto Nacional de Medicina Legal y Ciencias Forenses, en su informe Forensis 2017. Datos para la vida, los hechos de discriminación y violencia de pareja contra las mujeres en Colombia se han incrementado en los últimos años; esta situación podría catalogarse como producto de una sociedad que ha sido moldeada a partir del esquema machista y patriarcal que caracteriza a las sociedades que han estado influenciadas por tradiciones como la religión católica, que parecen justificar, en algunos de los relatos de sus textos sagrados, la condición de dominación que ejerce el hombre sobre la mujer. El Estado colombiano, que en sus inicios normativos se vio influenciado por esta tradición, ha buscado, a partir de la Constitución de 1991, y a través de su posterior normatividad, no solo la reivindicación de la mujer, sino la sanción a los agresores; sin embargo, estas medidas no han sido eficientes ya que no se ha podido garantizar un verdadero ambiente de seguridad y respeto por los derechos fundamentales de las mujeres. Por lo tanto, se hace necesario intervenir la configuración de la cultura colombiana, en aras de modificar las bases culturales sobre las cuales se construyó el imaginario social que perpetúa la estructura de dominación y discriminación contra la mujer.
APA, Harvard, Vancouver, ISO, and other styles
9

Mualfah, Desti, and Rizdqi Akbar Ramadhan. "Analisis Forensik Metadata Kamera CCTV Sebagai Alat Bukti Digital." Digital Zone: Jurnal Teknologi Informasi dan Komunikasi 11, no. 2 (November 7, 2020): 257–67. http://dx.doi.org/10.31849/digitalzone.v11i2.5174.

Full text
Abstract:
Kejahatan konvensial yang terekam kamera CCTV (Closed Circuit Televison) semakin banyak ditemukan di masyarakat, setiap pelaku kejahatan yang terbukti melakukan tindak pidana tertentu akan dihukum sesuai dengan peraturan perundang-undangan. Kamera CCTV memiliki peran penting dalam keamanan, banyak diantaranya hasil tangkapan rekaman kamera CCTV dijadikan sebagai alat bukti digital. Tantangannya adalah bagaimana teknik yang diperlukan untuk penanganan khusus investigasi digital forensik dalam mencari bukti ditgital rekaman kamera CCTV menggunakan metode live forensik, yaitu ketika barang bukti dalam keadan aktif berdasarkan pedoman SNI 27037:2014 sesuai acuan kerangka kerja Common Phases of Computer Forensics Investigation Models untuk di implementasikan ke dalam dokumen Chain of Custody. Hasil penelitian ini berupa hasil analisis video rekaman kamera CCTV tentang karakteristik bukti digital dan informasi metadata yang digunakan untuk memberikan penjelasan komprehensif secara terstruktur serta acuan pengelolaan informasi data yang didapat dari hasil investigasi digital forensik yang dapat dipertanggungjawabkan dalam persidangan. Kata kunci: Bukti Digital, Live Forensik, Metadata, Kamera CCTV, Chain of Custody. Abstract Conventional crimes that are recorded on CCTV (Closed Circuit Television) cameras are increasingly being found in society, every crime that commits certain crimes will be in accordance with statutory regulations. CCTV cameras have an important role in security, many of which are recorded by CCTV cameras used as digital evidence. The challenge is how the techniques required for special handling, digital forensics in searching for digital evidence of CCTV camera footage using the live forensic method, namely when the evidence is in an active state based on the latest SNI 27037: 2014 according to the framework reference Common Phases of Computer Forensics Investigation Models for in implement it into the Chain of Custody document. These results of this research are in the form of analysis of CCTV camera video recordings about the characteristics of digital evidence and metadata information used to provide a structured comprehensive explanation and reference data management information obtained from the results of digital forensic investigations that can be accounted for in court. Keywords: Digital Evidence, Live Forensic, Metadata, CCTV Camera, Chain of Custady.
APA, Harvard, Vancouver, ISO, and other styles
10

Harrison, S. J. "The Speaking Book: The Prologue to Apuleius' Metamorphoses." Classical Quarterly 40, no. 2 (December 1990): 507–13. http://dx.doi.org/10.1017/s000983880004307x.

Full text
Abstract:
at ego tibi sermone isto Milesio varias fabulas conseram auresque tuas benivolas lepido susurro permulceam, modo si papyrum Aegyptiam argutia Nilotici calami inscriptam non spreveris inspicere. figuras fortunasque hominum in alias imagines conversas et in se rursum mutuo nexu refectas, ut mireris, exordior. ‘quis ille?’ paucis accipe. Hymettos Attica et Isthmos Ephyrea et Taenaros Spartiatica, glebae felices aeternum libris felicioribus conditae, mea vetus prosapia est; ibi linguam Atthidem primis pueritiae stipendiis merui, mox in urbe Latia advena studiorum Quiritium indigenam sermonem aerumnabili labore nullo magistro praeeunte aggressus excolui. en ecce praefamur veniam, si quid exotici ac forensis sermonis rudis locutor offendero. iam haec equidem ipsa vocis immutatio desultoriae scientiae stilo quern accessimus respondet. fabulam Graecanicam incipimus. lector intende: laetaberis.
APA, Harvard, Vancouver, ISO, and other styles
11

Tasmi, Tasmi, Fery Antony, and Ubaidillah Ubaidillah. "NETWORK FORENSIK UNTUK MENGANALISA TRAFIK DATA GAME ONLINE." Klik - Jurnal Ilmu Komputer 3, no. 1 (March 22, 2022): 50–58. http://dx.doi.org/10.56869/klik.v3i1.352.

Full text
Abstract:
Network forensics adalah salah satu cara dalam menganalisi jenis trafik dalam sebuah jaringan adalah dengan menggunakan file log dengan merecord aktifitas pada jaringan. File log disetiap sistem sering dipakai untuk media melihat aktifitas pada sebuah sistem, terkhusus pada sebuah router dan server file ini sangat diperlukan proses investigasi analisis forensik jaringan dengan menggunakan metode Generic Network Forensics Process Model yang merupakan ilmu digital forensik yang berkaitan dengan tahap-tahap untuk menemukan sumber serangan dan mendapatkan bukti-bukti serangan yang bersumber dari file log. Tujuan dari penelitian ini dapat menerapkan model network forensic dalam memonitoring trafik games-online dan dapat menghasil satu sistem yang dapat menentukan prioritas memberian bandwidth, dan juga dapat dijadikan sebagai salah satu dasar pengambilan keputusan dalam membagian bandwidth. Hasil penelitian yang telah dilakukan telah mampu menganalisi jenis trafik game online dengan menggunakn tool wireshark untuk sniffing packet data serta membaguan sebuah sistem autentikasi untuk memvalidasin user pengguna jaringan. Pada tahap awal penelitian ini hasil investigasi forensik jaringan. Berdasarkan hasil pengujian tersebut dapat dinyatakan hasil sudah sesuai dengan tujuan yang diharapkan, sehingga dapat disimpulkan penelitian ini berhasil berjalan dengan baik
APA, Harvard, Vancouver, ISO, and other styles
12

Domínguez Galbraith, Pablo. "Estéticas forenses en México: la arquitectura de lo sensible en el caso Ayotzinapa." Revista académica estesis 6, no. 6 (July 24, 2019): 90–107. http://dx.doi.org/10.37127/25393995.41.

Full text
Abstract:
Con este ensayo se pretende articular la noción de estética forense tomando de la conceptualización realizada por Eyal Weizman, Thomas Keenan, y el trabajo del Forensic Architecture Project, así como desde las perspectivas de la antropología forenses, sus discursos teóricos, filosóficos y sus prácticas artísticas. También se traza un breve panorama de las políticas sobre desaparición en Latinoamérica, y su historia y persistencia en el México contemporáneo. Se hace un análisis del caso Ayotzinapa, y de la intervención de la agencia Forensic Architecture en él, a través de su Plataforma Ayotzinapa y la exposición que tuvieron en el Museo Universitario de Arte Contemporáneo (MUAC) de la UNAM, en la Ciudad de México. Finalmente, se inscribe este trabajo en el horizonte de las estéticas forenses que se han desarrollado en México en los últimos años.
APA, Harvard, Vancouver, ISO, and other styles
13

Solla, Horacio E. "POSITIVE IDENTIFICATION OF HUMAN REMAINS BY SKULL-PHOTO COMPARISON IN URUGUAY: A REVIEW. Identificación positive de restos humanos por la comparación cráneo-foto en Uruguay: Una revisión." Revista Argentina de Anatomía Clínica 7, no. 1 (March 28, 2016): 52–59. http://dx.doi.org/10.31051/1852.8023.v7.n1.14159.

Full text
Abstract:
El artículo presenta una revisión a través de un estudio cuantitativo de los casos antropológico-forenses ocurridos en Uruguay desde 1950 a 2013 inclusive. Los casos antropológico-forenses han crecido rápida-mente en Uruguay, desde un caso registrado en 1950 hasta 91 casos en 2013. Antes de 1992 cuando se realizaba un hallazgo de restos humanos eran examinados por el médico forense que no contaba con experiencia en éste tipo de casos ni en las técnicas antropológicas forenses. Por lo tanto, en la mayoría de los casos los restos humanos no eran identificados. Como necesidad para resolver ese problema en 1992 se creó el Laboratorio de Antropología Forense en la Morgue Judicial de Montevideo. El artículo estudia un total de 1391 casos antropológico-forenses analizados en la Morgue Judicial desde 1950 hasta 2013 inclusive. El estudio se divide en dos partes: la primera representa 225 casos ocurridos desde 1950 hasta 1991 y la segunda parte representa 1166 casos ocurridos desde 1992 hasta 2013. En cada caso los restos fueron analizados para determinar posible causa de la muerte, sexo, estatura y edad al momento de la muerte. También se analizaron los casos en que se llegó a obtener una identificación positiva. El propósito de este artículo es describir el rol de la antropología Forense en el sistema judicial uruguayo y cómo las técnicas de comparaciones cráneo-fotográficas han sido utilizadas con gran éxito para identificar restos humanos en Uruguay. The article presents a review by a quantitative analysis of the forensic anthropology cases that occurred in Uruguay from 1950 to 2013. Forensic anthropology cases have rapidly increased in Uruguay over the years, from only one case in 1950 to 91 cases in 2013. Before 1992, when human remains were found, they were analyzed by the local medical examiner with lacked experience in these types of cases and in anthropological techniques. Therefore, in the majority of cases, human remains were not identified. By the need to solve these cases in 1992, the Forensic Anthropology Laboratory at the Morgue Judicial of Montevideo was created. This article studied a total of 1391 forensic anthropology cases that were undertaken at the Judicial Morgue of Montevideo between 1950 and 2013. The study is divided into two parts: the first part represents 225 cases occurring from 1950 to 1991, and the second one represents 1166 cases occurring from 1992 to 2013. In each case the remains were analyzed to determine the deceased person sex, stature and age at the time of death. Whether a positive identification was made as a result of forensic anthropology investigation was also analyzed. The purpose of this paper is to describe the place of forensic anthropology in the Uruguayan medico-legal system and to show how skull-photograph comparison techniques were successfully used to identify human remains in Uruguay.
APA, Harvard, Vancouver, ISO, and other styles
14

Nasrulloh, Imam Mahfudl, Sunardi Sunardi, and Imam Riadi. "Analisis Forensik Solid State Drive (SSD) Menggunakan Framework Rapid Response." Jurnal Teknologi Informasi dan Ilmu Komputer 6, no. 5 (October 8, 2019): 509. http://dx.doi.org/10.25126/jtiik.2019651516.

Full text
Abstract:
<p class="Abstrak">Teknologi komputer pada empat tahun terahir ini mengalami perkembangan yang pesat. Bersamaan dengan itu juga berdampak negatif salah satunya adalah berupa kejahatan komputer. Kejahatan komputer akan meninggalkan jejak aktivitas kejahatan, maka perlu dilakukan analisa dengan ilmu dan metode forensik untuk mendapatkan barang bukti. Bagaimana jika terjadi kejahatan komputer pada media penyimpanan komputer berjenis <em>non-volatile memory</em> dan dilakukan secara <em>live</em> forensik<em>.</em> Pada penelitian ini dilakukan proses forensik pada <em>Solid State Drive</em> <em>(SSD)</em> dengan <em>framework</em> <em>Grr Rapid Response</em> pada kasus kehilangan <em>data (lost data)</em> suatu organisasi. Langkah kerja forensik mengimplementasikan dari <em>National Institute of Standards Technology (NIST).</em><em> Framework</em> <em>Grr Rapid Response</em> digunakan untuk memberikan tanggapan terhadap insiden forensik digital yang difokuskan pada lingkungan forensik jarak jauh, <em>f</em><em>ramework</em> ini berbasis arsitektur <em>client server</em>. Hasil penelitian ini menunjukkan langkah kerja forensik <em>NIST</em> dapat diimplementasikan pada proses pengambilan bukti digital dengan metode akuisisi secara <em>live </em>forensik, kemampuan <em>tool</em> forensik pada proses eksaminasi <em>Grr Rapid Response</em> pada <em>Workstation (</em><em>Client Grr)</em> dengan media simpan <em>SSD</em><em>,</em> bukti digital dapat ditemukan dan dikembalikan. Bukti digital yang dapat dikembalikan berupa <em>file</em> dokumen, dan hasil validasi pada bukti digital tersebut memiliki nilai <em>hash</em> yang sama dari dua algoritma validasi bukti digital yang diimplementasikan, MD5 dan SHA-1. Sehingga hasil integritas dari dokumen tersebut menunjukkan bahwa bukti digital tersebut identik.</p><p class="Abstrak"> </p><p class="Abstrak"><em><strong>Abstract</strong></em></p><p class="Abstract"><em>Computer technology in the last four years has experienced rapid development. At the same time, it also has a negative impact, one of which is a computer crime. Computer crime will leave traces of criminal activity, so it is necessary to analyze with forensic science and methods to obtain evidence. What if there is a computer crime on a computer storage medium of a type of non-volatile memory and carried out live forensics In this study a forensic process on Solid State Drive (SSD) was carried out with the Grr Rapid Response framework for lost data in an organization. The forensic work step is implemented from the National Institute of Standards Technology (NIST). The Grr Rapid Response Framework is used to provide responses to incidents of digital forensics focused on remote forensic environments, this framework is based on a client server architecture. The results of this study indicate that NIST's forensic work steps can be implemented in the process of taking digital evidence with live forensic acquisition methods, the ability of forensic tools in the Grr Rapid Response examination process on Workstations (Client Grr) with SSD storage media, digital evidence can be found and returned. Digital evidence that can be returned is a document file, and the results of the validation of digital evidence have the same hash value from the two digital proof validation algorithms implemented, MD5 and SHA-1. So the results of the integrity of the document so that the digital evidence is identical.</em></p><p class="Abstrak"><em><strong><br /></strong></em></p>
APA, Harvard, Vancouver, ISO, and other styles
15

Wijanarko, Anas Aditya, Ridwan Ridwan, and Aliyth Prakarsa. "Peran Digital Forensik dalam Pembuktian Tempus Delicti Sebagai Upaya Pertanggungjawaban Pidana Pelaku Pembuat Video Pornografi." PAMPAS: Journal of Criminal Law 2, no. 2 (October 22, 2021): 68–88. http://dx.doi.org/10.22437/pampas.v2i2.14771.

Full text
Abstract:
This article aims to discuss the role of digital forensics in proving tempus delicti as an effort to criminal liability for the makers of pornographic video (case study: vina garut video. The role of digital forensics is used in the recent case of pornographic content, namely the Vina Garut video case. This case is a case of immoral videos showing pornographic scenes between several men and a woman, there are at least two videos of Vina Garut that are spread on social media and this makes the Garut Resort Police immediately move to investigate this case. This type of research is empirical juridical. The result of this study lead to the conclusion that based on the results of digital forensic tests, criminal liability should be imposed on the perpetrator of pornographic videos in this Vina Garut video case, namely against female perpetrators in this case with the initials PA can be categorized as victims while against other perpetrators with initials W and D are subject to Article 37 in conjunction with Article 11 of the Pornography Law, this is because the digital forensic results of the PA can still be categorized as victims. ABSTRAK Penelitian ini bertujuan untuk untuk membahas tentang peran digital forensik dalam pembuktian tempus delicti sebagai upaya pertanggungjawaban pidana pelaku pembuat video pornografi (studi kasus: video vina garut). Peran digital forensic digunakan dalam kasus konten pornografi yang belum lama ini terjadi yaitu kasus video Vina Garut. Kasus ini merupakan kasus video asusila yang memperlihatkan adegan bermuatan pornografi antara beberapa pria dengan seorang wanita, setidaknya terdapat dua video Vina Garut yang tersebar di media sosial dan hal tersebut membuat Kepolisian Resor Garut langsung bergerak menyelidiki kasus ini. Tipe penelitian ini adalah penelitian yuridis empiris. Hasil Penelitian ini menghasilkan kesimpulan bahwa berdasarkan hasil uji digital forensik maka seharusnya pertanggungjawaban pidana yang dikenakan terhadap para pelaku pembuat video pornografi dalam kasus video Vina Garut ini yaitu terhadap pelaku wanita dalam kasus ini dengan inisial PA dapat dikategorikan sebagai korban sedangkan terhadap para pelaku lain dengan inisial W dan D dikenakan Pasal 37 juncto Pasal 11 Undang-Undang Pornografi hal ini dikarenakan berdasarkan hasil digital forensik PA masih dapat dikategorikan sebagai korban.
APA, Harvard, Vancouver, ISO, and other styles
16

Haryanto, Eri, and Imam Riadi. "Forensik Internet Of Things pada Device Level berbasis Embedded System." Jurnal Teknologi Informasi dan Ilmu Komputer 6, no. 6 (December 2, 2019): 703. http://dx.doi.org/10.25126/jtiik.2019661828.

Full text
Abstract:
<p>Perangkat Internet of Things (IoT) merupakan perangkat cerdas yang memiliki interkoneksi dengan jaringan internet global. Investigasi kasus yang menyangkut perangkat IoT akan menjadi tantangan tersendiri bagi investigator forensik. Keberagaman jenis perangkat dan teknologi akan memunculkan tantangan baru bagi investigator forensik. Dalam penelitian ini dititikberatkan forensik di level internal device perangkat IoT. Belum banyak bahkan belum penulis temukan penelitian sejenis yang fokus dalam analisis forensik perangkat IoT pada level device. Penelitian yang sudah dilakukan sebelumnya lebih banyak pada level jaringan dan level cloud server perangkat IoT. Pada penelitian ini dibangun environment perangkat IoT berupa prototype smart home sebagai media penelitian dan kajian tentang forensik level device. Pada penelitian ini digunakan analisis model forensik yang meliputi collection, examination, analysis, dan reporting dalam investigasi forensik untuk menemukan bukti digital. Penelitian ini berhasil mengungkap benar-benar ada serangan berupa injeksi malware terhadap perangkat IoT yang memiliki sistem operasi Raspbian, Fedberry dan Ubuntu Mate. Pengungkapan fakta kasus mengalami kesulitan pada perangkat IoT yang memiliki sistem operasi Kali Linux. Ditemukan 1 IP Address komputer penyerang yang diduga kuat menanamkan malware dan mengganggu sistem kerja perangkat IoT.</p><p><em><strong>Abstract</strong></em></p><p class="Abstract"><em>The Internet of Things (IoT) is an smart device that has interconnection with global internet networks. Investigating cases involving IoT devices will be a challenge for forensic investigators. The diversity of types of equipment and technology will create new challenges for forensic investigators. In this study focused on forensics at the IoT device's internal device level, there have not been many similar research that focuses on forensic analysis of IoT devices at the device level. Previous research has been done more at the network level and cloud level of IoT device's. In this study an IoT environment was built a smart home prototype as a object for research and studies on forensic level devices. This study, using forensic model analysis which includes collection, examination, analysis, and reporting in finding digital evidence. This study successfully revealed that there was really an attack in the form of malware injection against IoT devices that have Raspbian, Fedberry and Ubuntu Mate operating systems. Disclosure of the fact that the case has difficulties with IoT devices that have the Kali Linux operating system. Found 1 IP Address of an attacker's computer that is allegedly strongly infusing malware and interfering with the work system of IoT devices.</em></p><p><em><strong><br /></strong></em></p>
APA, Harvard, Vancouver, ISO, and other styles
17

Matos, Iolanda Augusta Fernandes de, Vitoria Bonan Costa, Mariely Araújo de Godoi, Clemente Maia da Silva Fernandes, and Mônica da Costa Serra. "Aplicação da manufatura aditiva em Ciências Forenses: novas tecnologias a serviço da justiça e da sociedade." Research, Society and Development 12, no. 1 (January 12, 2023): e28412139725. http://dx.doi.org/10.33448/rsd-v12i1.39725.

Full text
Abstract:
Nas Ciências Forenses, a tecnologia da manufatura aditiva vem sendo utilizada há alguns anos como ferramenta para auxiliar no processo de identificação humana. A possibilidade de imprimir provas importantes, como armas empregadas em crimes, objetos, ossos, dentes e restos corporais, torna-se interessante, uma vez que diminui a necessidade de movimentação e manuseio das provas originais. No entanto, por ser um método recente, são necessárias análises e padronizações para verificar qual a melhor técnica de impressão para cada caso. Com o objetivo de verificar o que há na literatura sobre o uso da manufatura aditiva em Ciências Forenses e no processo de identificação humana, foi realizada uma revisão integrativa da literatura em diferentes bases de dados sobre o uso da impressão 3D em Ciências Forenses e no processo de identificação humana, utilizando os termos “3D print and forensic sciences”, “3D print and forensics”, addictive manufacture and forensics”, “3D print and human identification” e “addictive manufacture and human identification”; foi estabelecido o período de 2017 a 2022. Embora a impressão 3D pareça ser obtida de forma singular, sua confecção pode ser realizada de diversas formas, mas essa diversidade não afeta a fidedignidade da impressão. Armas, ossos, dentes, feridas, trajetórias de projéteis, impressões digitais ou de órgãos, entre outros são reproduzidos tridimensionalmente, e utilizados comumente em tribunais para auxiliar a Justiça. Os resultados encontrados apontam a grande precisão das réplicas obtidas a partir da impressão 3D, tanto quantitativamente (avaliação métrica) como qualitativamente (avaliação morfológica), indicando a validação da aplicação da manufatura aditiva em Ciências Forenses, assim auxiliando a Justiça e a sociedade.
APA, Harvard, Vancouver, ISO, and other styles
18

Gorea, R. K. "Forensic Nursing in Humanitarian Forensics." INTERNATIONAL JOURNAL OF ETHICS, TRAUMA & VICTIMOLOGY 6, no. 02 (December 30, 2020): 1–5. http://dx.doi.org/10.18099/ijetv.v6i02.1.

Full text
Abstract:
Humanitarian forensics has been established as a new entity, and it is bound to develop as a robust branch of science. It is a multidisciplinary subject with the involvement of experts from different fields of science. Forensic nursing too is an upcoming branch of nursing science and is a relatively new discipline of science. Forensic nursing science is expanding in various countries. This paper will describe and discuss the various important aspects of Humanitarian forensics and forensic nurses' utility in humanitarian forensics and discuss the future role of forensic nurses in humanitarian forensics.
APA, Harvard, Vancouver, ISO, and other styles
19

Macedo, Adriana Amorim Soares, and Inês Leoneza de Souza. "Contribuições do enfermeiro junto segurança pública: enfermagem na abordagem forense." Revista Recien - Revista Científica de Enfermagem 11, no. 35 (September 23, 2021): 355–64. http://dx.doi.org/10.24276/rrecien2021.11.35.355-364.

Full text
Abstract:
A Enfermagem forense ajuda as vítimas coletando informações, evidências relacionadas com crime, podendo ser a chave para resolvê-lo. Objetivos: Conhecer e divulgar a importância do enfermeiro nessa modalidade. Metodologia: revisão integrativa vinculada ao Trabalho de possibilidades de atuação da enfermagem forense brasileira, na base de dados Scientific Electronic Library Online (SciELO), Biblioteca Virtual de Saúde (BVS), descritores: Maus Tratos, Abuso Sexual e Outras Formas de Violência. Iniciada no Brasil com Associação Brasileira de Enfermagem Forense - Abeforense, Sociedade Brasileira de Enfermagem Forense - SOBEF; Consultadas Fontes: ANA (American Nurses Association) e IAFN (International Association of Forensic Nurses). Resultados: encontrados sete artigos no período 2010-2019. Destaque para pouco conhecimento do enfermeiro na área forense e seu papel como profissional aqui no Brasil. Considerações finais: Poucos estudos de referências no Brasil reforçando a necessidade deste trabalho como proposta de TCC ainda na graduação de enfermagem; sendo, portanto, necessários mais estudos e aprofundamento desta temática.Descritores: Enfermagem Forense, Enfermeiro, Violência. Nurses' contributions to public safety: nursing in the forensic approachAbstract: Forensic nursing helps victims of violence by collecting information and evidence related to a crime, which can be the key to solving it. Objectives: To know Forensic Nursing and disclose the importance of nurses in this modality. Methodology: integrative review linked to the Work of the possibilities of performance of Brazilian forensic nursing, in the Scientific Electronic Library Online database (SciELO) and the Virtual Health Library (VHL), using the descriptors: Maltreatment, Sexual Abuse and Other Forms of Violence. Started in Brazil with the Brazilian Association of Forensic Nursing - Abeforense, the Brazilian Association of Forensic Nursing - SOBEF; Sources consulted: ANA (American Nurses Association) and IAFN (International Association of Forensic Nurses). Results: seven articles were found in the period 2010-2019. With emphasis on the little knowledge of nurses in the forensic area and their role as a professional here in Brazil. Final considerations: Few reference studies in Brazil reinforcing the need for this work as a proposal for CBT even in nursing undergraduate courses; therefore, further studies and further research on this topic are needed.Descriptors: Forensic Nursing, Nurse, Violence. Contribuciones de las enfermeras a la seguridad pública: la enfermería en el enfoque forenseResumen: La enfermería forense ayuda a las víctimas mediante la recopilación de información y pruebas relacionadas con un delito, que puede ser la clave para resolverlo. Objetivos: Conocer y revelar la importancia de las enfermeras en esta modalidad. Metodología: revisión integradora vinculada al trabajo de las posibilidades de desempeño de la enfermería forense brasileña, en la base de datos Biblioteca Electrónica Científica (SciELO) y la Biblioteca Virtual en Salud (BVS), utilizando los descriptores: Maltrato, Abuso Sexual y Otras Formas de Violencia. Comenzó en Brasil con la Asociación Brasileña de Enfermería Forense - Abeforense, la Asociación Brasileña de Enfermería Forense - SOBEF; Fuentes consultadas: ANA (Asociación Americana de Enfermeras) e IAFN (Asociación Internacional de Enfermeras Forenses). Resultados: se encontraron siete artículos en el período 2010-2019. Con énfasis en el poco conocimiento de las enfermeras en el área forense y su papel como profesionales aquí en Brasil. Consideraciones finales: Pocos estudios de referencias en Brasil refuerzan la necesidad de este trabajo como una propuesta para la TCC, incluso en la graduación de enfermería; por lo tanto, se necesitan más estudios e investigaciones adicionales sobre este tema.Descriptores: Enfermería Forense, Enfermero, Violência.
APA, Harvard, Vancouver, ISO, and other styles
20

Singh, Sakshi, and Suresh Kumar. "Qualitative Assessment of Digital Forensic Tools." Asian Journal of Electrical Sciences 9, no. 1 (May 5, 2020): 25–32. http://dx.doi.org/10.51983/ajes-2020.9.1.2372.

Full text
Abstract:
Forensic science is a study of science to criminals and civil laws. Digital forensics is the part of forensic science relating to proof found in computers and advanced storage media. Forensic examiners gather, protect and break down logical confirmations over the span of examination. Digital information contains data as content, pictures, sound, video and so on. These days numerous cybercrime cases, for example, hacking, banking cheats, phishing, email spamming, etc., have developed which are connected with a computerized information. Since the digital investigation is turning into an expanding concern, numerous digital forensic tools have been created to manage the difficulties of exploring computerized wrongdoings. The motivation behind digital forensics strategies is to look, protect and extract data on advanced frameworks to discover potential confirmations to exhibit them in the courtroom. In this paper, we have discussed five kinds of forensics namely Network Forensics, Live Forensics, Cyber Forensics, Database Forensics, and Mobile Forensics. The paper depicts a list of digital forensic tools in detail and looks at them based on the characterized parameters to figure out which tool suits better for any investigation. The paper looks at network, database and mobile forensic tools and examines the silent features and uniqueness of each of the tools along with their functionalities.
APA, Harvard, Vancouver, ISO, and other styles
21

Kulikov, S. N., and A. A. Potapenko. "THE FORENSIS MODELING OF THE TRAVMATS BY THE METHOD OF THE SHOT CARTRIDGE LIGHT AND SOUND ACTION." Russian Journal of Forensic Medicine 3, no. 1 (January 1, 2017): 11–17. http://dx.doi.org/10.19048/2411-8729-2016-2-4-11-17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Iman, Nur, Aris Susanto, and Rahmat Inggi. "Analisa Perkembangan Digital Forensik dalam Penyelidikan Cybercrime di Indonesia (Systematic Review)." Jurnal Telekomunikasi dan Komputer 9, no. 3 (January 4, 2020): 186. http://dx.doi.org/10.22441/incomtech.v9i3.7210.

Full text
Abstract:
Digital forensik dikembangkan untuk menyelidiki perangkat digital dalam mendeteksi kejahatan (cybercrime). Tujuan penulisan makalah ini untuk mengidentifikasi sub digital forensik dan menganalisa perkembangan digital forensik dalam penyelidikan kasus kejahatan di Indonesia. Metode yang digunakan adalah kajian sistematis (systematic review) dengan melalui proses pemilihan sumber data yaitu Garba Rujukan Digital, Science and Technology Index, RAMA Repository. Hasil dari penelusuran menunjukkan bahwa kejahatan paling banyak ditangani yaitu live forensic, network forensic, dan mobile forensic dengan grafik trend topic diatas 10 dibandingkan dengan computer forensic dan database forensic hanya terdapat 2 topik.
APA, Harvard, Vancouver, ISO, and other styles
23

Satrya, Gandeva Bayu, and A. Ahmad Nasrullah. "Analisis Forensik Android: Artefak pada Aplikasi Penyimpanan Awan Box." Jurnal Teknologi Informasi dan Ilmu Komputer 7, no. 3 (May 22, 2020): 521. http://dx.doi.org/10.25126/jtiik.2020732220.

Full text
Abstract:
<p>Sistem penyimpanan melalui cloud memiliki banyak keunggulan, seperti kemampuan akses dari lokasi manapun serta kemudahan penyimpanan pencadangan file-file pada komputer dan smartphone. Terdapat banyak pilihan layanan penyimpanan melalui cloud, seperti Dropbox, Microsoft OneDrive, Google Drive, dan Box. Dari beberapa jenis layanan peyimpanan tersebut Box adalah satu-satunya layanan penyimpanan cloud yang mampu menjamin tingkat reliability uptime hingga 99.9%. Awalnnya, Box hanya ditujukan untuk kegiatan bisnis saja, namun sekarang Box dapat digunakan oleh pengguna secara umum. Selain memberikan pengaruh yang positif, pertumbuhan penggunaan teknologi layanan penyimpanan cloud juga telah memberikan peningkatan dalam peluang terjadinya kejahatan di dunia maya. Forensik digital merupakan solusi terbaru dalam mengamati keamanan sistem dan jaringan, sementara forensik bergerak adalah pengembangan forensic digital yang sepenuhnya difokuskan pada media smartphone. Forensik bergerak dapat dilakukan dalam dua sisi, yaitu server dan client. Studi kasus dalam penelitian ini berfokus pada penggunaan smartphone OS Android yang terinstal Box sebagai layanan penyimpanan cloud. Sedangkan tujuan utama dari penelitian ini adalah untuk menyediakan sebuah metode forensik bergerak untuk menemukan artefak pada smartphone Android yang telah terinstal dengan aplikasi Box.</p><p><em><strong>Abstract</strong></em></p><p class="Judul2"><em>Storing files in a cloud has many advantages, such as the ability to access them from any location and to keep backups of those files on computers and smartphones. There are many choices for cloud storage services, such as Dropbox, Microsoft OneDrive, Google Drive, and Box. Of these, Box is the only cloud storage service that guarantees uptime reliability 99.99% of the time. At first, Box was intended for business use only, but now it is also freely available for public use. Growth in cloud storage technology use has also resulted in increased opportunities for cybercrime to take place. Digital forensics is the latest solution for system and network security observers, while mobile forensics is a development of digital forensics that is fully focused on smartphone media. Mobile forensics can be performed on both the server and client sides. In this research, mobile forensics was performed on the client side. The case study in this paper focused on an Android operating system </em><em>(OS)</em><em> smartphone using Box cloud storage. The purpose of this study was to provide a mobile forensics method for finding artifacts on smartphones that have a Box application installed.</em></p><p><em><strong><br /></strong></em></p>
APA, Harvard, Vancouver, ISO, and other styles
24

Oppong, John Kwaku. "Evidence Confidentiality and Digital Forensic Experts." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (July 26, 2022): 161–66. http://dx.doi.org/10.22624/aims/crp-bk3-p26.

Full text
Abstract:
Digital forensics has increasingly galloped into the space of criminal justice and law enforcements as a unique tool for evidence and its dissemination. Technological advancement in database and information has also made digital forensics an important tool in law enforcement and judicial proceedings. On the other side of the coin, evidence confidentiality is an indefinite concept and one that is very dynamic and intricate. Therefore, the services of forensic experts in the digital forensic field are often required due to the significance of digital evidence to many investigations. This paper provides a brief information about evidence confidentiality and digital forensic experts. Keywords: Digital Forensics, Evidence, Confidentiality, Forensic Experts, Justice, Law. BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: John Kwaku Oppong (2022): Evidence Confidentiality and Digital Forensic Experts Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 161-166 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P26
APA, Harvard, Vancouver, ISO, and other styles
25

Hidalgo Pozo, María José. "Entomotoxicología Forense En Cadáveres En Estado De Descomposición." Ecuador Journal of Medicine 1, Esp (November 1, 2021): 17–32. http://dx.doi.org/10.46721/tejom-vol1issesp-2021-17-32.

Full text
Abstract:
Resumen Introducción: la entomotoxicología se enfoca en la aplicación del análisis toxicológico a los insectos que se encuentran en los cadáveres, para identificar la presencia de drogas y toxinas en los tejidos o restos cadavéricos. Objetivo: realizar una revisión sobre la utilidad de la entomotoxicología como herramienta para las Ciencias Forenses, en cadáveres que se encuentran en estado de descomposición avanzada, cuando no es factible la recolección de muestras biológicas. Materiales y métodos: se realizó una búsqueda en Pubmed, Scopus, Scielo y Google Académico con las palabras clave: Forensic entomology / entomología forense, Forensic entomotoxicology / entomotoxicología forense, Criminology / criminología, Forensic toxicology / toxicología forense, Poisoning / envenenamiento y Postmortem interval determination / determinación del intervalo postmortem. Se incluyeron publicaciones de acceso libre, en español e inglés; publicados desde 1992 hasta marzo 2021. Resultados: la búsqueda inicial arrojó 3476 referencias (Pubmed: 50; Scopus: 402; Scielo: 114; Google académico: 2910). Quinientas sesenta y seis publicaciones fueron excluidas por duplicación; 49 fueron incluidas en esta revisión. Conclusiones: los insectos permiten un análisis fiable de toxinas y drogas cuando no es posible realizarlo directamente desde los restos cadavéricos. En Ecuador, se requieren estudios que indaguen la aplicación y desarrollo de esta rama para determinar su precisión y utilidad a nivel local, provincial y regional. A nivel global, se debe expandir la investigación entomotoxicológica en escenarios acuáticos o de incendios; así como el impacto del cambio climático sobre la entomofauna y sus repercusiones en el análisis toxicológico de las distintas especies.
APA, Harvard, Vancouver, ISO, and other styles
26

Alotaibi, Fahad Mazaed, Arafat Al-Dhaqm, and Yasser D. Al-Otaibi. "A Novel Forensic Readiness Framework Applicable to the Drone Forensics Field." Computational Intelligence and Neuroscience 2022 (February 28, 2022): 1–13. http://dx.doi.org/10.1155/2022/8002963.

Full text
Abstract:
The Drone Forensics (DRFs) field is a branch of digital forensics, which involves the identification, capture, preservation, reconstruction, analysis, and documentation of drone incidents. Several models have been proposed in the literature for the DRF field, which generally discusses DRF from a reactive forensic perspective; however, the proactive forensic perspective is missing. Therefore, this paper proposes a novel forensic readiness framework called Drone Forensics Readiness Framework (DRFRF) using the design science method. It consists of two stages: (i) proactive forensic stage and (ii) reactive forensic stage. It considers centralized logging of all events of all the applicants within the drone device in preparation for an examination. It will speed up gathering data when an investigation is needed, permitting the forensic investigators to handle the examination and analysis directly. Additionally, digital forensics analysts can increase the possible use of digital evidence while decreasing the charge of performing forensic readiness. Thus, both the time and cost required to perform forensic readiness could be saved. The completeness, logicalness, and usefulness of DRFRF were compared to those of other models already existing in the DRF domain. The results showed the novelty and efficiency of DRFRF and its applicability to the situations before and after drone incidents.
APA, Harvard, Vancouver, ISO, and other styles
27

Vatsenko, A. "Digital Forensics Techniques Overview." Bulletin of Science and Practice 6, no. 6 (June 15, 2020): 167–74. http://dx.doi.org/10.33619/2414-2948/55/21.

Full text
Abstract:
This article discusses the important issue of the use of forensic technology in computer forensics. The basic techniques of computer forensics existing today, such as real-time tracking, sandboxing, data and password recovery, and so on, are examined. The advantages and disadvantages of existing methods are given and recommendations are made on the development of computer forensics techniques in the future. Conclusions are drawn up on the problem of using forensic technology in computer forensics.
APA, Harvard, Vancouver, ISO, and other styles
28

Susanti, Rika. "PARADIGMA BARU PERAN DOKTER DALAM PELAYANAN KEDOKTERAN FORENSIK." Majalah Kedokteran Andalas 36, no. 2 (August 30, 2012): 145. http://dx.doi.org/10.22338/mka.v36.i2.p145-154.2012.

Full text
Abstract:
AbstrakPelayanan kedokteran forensik semakin hari semakin luas, pada masa dahulu hanya sebatas pemeriksaan korban tindak pidana yang meninggal, sekarang sudah berkembng diantaranya pemeriksaan korban tindak pidana hidup, kekerasan dalam rumah tangga, child abuse and neglect, perselisihan pada perceraian, ragu ayah (dispute paternity) hingga ke pelanggaran hak asasi manusia. Bentuk ekspertise dari dokter forensik saat ini, tidak hanya terbatas pada hasil visum et repertum, akan tetapi juga pengeluaran surat keterangan kematian dan pengisian asuransi. Pelayanan kedokteran forensik sebagian besar dilakukan oleh dokter umum karena terbatasnya jumlah spesialis forensik. Peran dokter umum dalam pelayanan kedokteran forensik antara lain pemeriksaan korban tindak pidana hidup, pemeriksaan korban tindak pidana meninggal, sebagai saksi ahli, mengeluarkan surat keterangan kematian, penanganan kasus death on arrival, pengisian asuransi. Supaya tidak terjadi permasalahan terkait dengan pelayanan kedokteran forensik, diharapkan dokter menambah pengetahuan tentang kedokteran forensik dan aspek medikolegalnya.Kata kunci : pelayanan kedokteran forensik-peran dokter umum-aspek medikolegalAbstractForensic medicine service develop extensively from the dead victim examination to the various medical examination in the living victim, marriage violence,child abuse and neglect,divorce conflict,dispute paternity and violence in human rights. The expertise from forensic medicine specialist not only to publish visum et repertum but also to sign certificate of death and to admiss life insurance. Most of forensic medicine services performed by general practitioner because the lack of quantity of the forensic medicine specialist. The role of general practitioner in forensic medicine services are including the examination of the living and dead victims,expert witness in the court, publishing the certificate of the death,handling death on arrival patient, and admissing the insurance form. To avoid the problem, general practitioners should to improve their knowledge in forensic medicine services and its medicolegal aspect.Keywords: forensic medical services-physician role-medicolegal aspects
APA, Harvard, Vancouver, ISO, and other styles
29

Riadi, Imam, Sunardi Sunardi, and Sahiruddin Sahiruddin. "Analisis Forensik Recovery pada Smartphone Android Menggunakan Metode National Institute Of Justice (NIJ)." Jurnal Rekayasa Teknologi Informasi (JURTI) 3, no. 1 (June 28, 2019): 87. http://dx.doi.org/10.30872/jurti.v3i1.2292.

Full text
Abstract:
keberadaan smartphone saat ini dianggap sangat membantu aktifitas manusia dalam melakukan pekerjaan sehari- hari. Berkembangnya fitur-fitur yang ada pada smartphone memudahkan para penggunanya beraktifitas seperti melakukan pekerjaan kantor, bisnis, e-banking, dan untuk berinteraksi dengan pengguna lain di media sosial. Perkembangan smartphone tidak hanya memberikan dampak positif tetapi bisa berdampak negatif ketika perkembangan tersebut dimanfaatkan untuk melakukan tindakan kejahatan. Saat ini terdapat banyak kasus penghapusan barang bukti kejahatan yang dilakukan oleh tersangka untuk mengilangkan bukti kejahatan yang dilakukan oleh seorang pelaku. Hal ini menjadi tantangan bagi forensika teknologi informasi dan penegak hukum melakukan penyelidikan secara forensik terhadap smartphone dari tersangka dalam sebuah kasus kejahatan untuk mendapatkan kembali bukti digital yang akan dijadikan sebagai barang bukti dalam sebuah persidangan. Penelitian ini menggunakan tools MOBILedit Forensic, Wondershare dr. Fone for Android, dan Belkasoft Evidence Center untuk memperoleh bukti digital serta menggunakan metode National Institute of Justice (NIJ) yaitu dengan mengidentifikasi, mengusulkan solusi, melakukan uji solusi yang ditawarkan, mengevaluasi dan melaporkan hasil. Dari hasil pengujian tool forensik yang peneliti gunakan, tool MOBILedit Forensic tidak bisa mengembalikan data yang sudah dihapus, tool Wondershare dr. Fone For Android berhasil mengembalikan data kontak, log panggilan,dan pesan yang sudah dihapus, sementara tool Belkasoft Evidence Center hanya bisa mengembalikan data kontak, dan log panggilan yang sudah dihapus.
APA, Harvard, Vancouver, ISO, and other styles
30

Tchaou, Aliloulaye. "Phase-Oriented Advice and Review Structure (PARS) for Digital Forensic Investigations." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (July 26, 2022): 173–80. http://dx.doi.org/10.22624/aims/crp-bk3-p28.

Full text
Abstract:
The PARS is the first documented peer review methodology for the digital forensics field, a six staged approach designed to formally support organizations and their staff in their goal of facilitating effective peer review of digital forensic work, from investigative tasks to forensic activities and forensic analysis processes (Pollitt et al., 2018). This assignment discusses how the PARS methodology can be implemented, and the available options and mechanisms available to ease the interpretation of this model into existing practices. Both the early ‘Advisor’ and later ‘Reviewer’ roles in PARS are discussed and their requirements and expectations are defined. Keywords: Digital forensics, Peer review, Digital evidence, Quality assurance, Forensic science Multi-staged Rview, Multi-person Review BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Aliloulaye Tchaou (2022): Phase-Oriented Advice and Review Structure (PARS) for Digital Forensic Investigations Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 173-180 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P28
APA, Harvard, Vancouver, ISO, and other styles
31

Brown, Emmanuel Kpakpo. "Digital Forensic and Distributed Evidence." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (July 26, 2022): 357–62. http://dx.doi.org/10.22624/aims/crp-bk3-p57.

Full text
Abstract:
Digital Forensics investigation is the science and legal process of investigating computer/cybercrimes and digital media or objects to gather evidence. This new and fast evolving field encompasses computer forensics, network forensics, mobile forensics, cloud computing forensics, and IoT forensics; and for this reason have digital evidence distributed widely when the need arises for crime prosecution. Digital evidence must be authentic, accurate, complete, and convincing to the jury for legal admissibility at the court of law. In many instances due to the distributed nature of digital forensic evidence and the legal procedures to be adhered to in evidence gathering at a digital crime scene, presenting at the law courts have proven to be challenging and in some instances inadmissible. Following legal procedures in evidence gathering at a digital crime scene is critical for admissibility and prosecution. This paper aims to discuss digital forensics investigations jurisprudence in relation to distributed digital evidence. For the study to be relevant to policy and practice, forensic tools and frameworks, legal and ethical obligations, and digital evidence handling and admissibility are highlighted. This paper does not follow any forensic investigations process; but rather discusses the need for development and implementation of unique frameworks that could be utilised to gather distributed digital evidence required for admissibility in court. Keywords - Digital forensics investigations; Digital evidence; Jurisprudence BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Emmanuel Kpakpo Brown (2022): Digital Forensic and Distributed Evidence Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 357-362 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P57
APA, Harvard, Vancouver, ISO, and other styles
32

Asamoah, Jonas Takyi. "Exploring Lack of Due Diligence as a Threat to Forensic Analysis Preparation and Readiness." Advances in Multidisciplinary and scientific Research Journal Publication 1 (July 26, 2022): 307–14. http://dx.doi.org/10.22624/aims/crp-bk3-p49.

Full text
Abstract:
The usage of digital technology in the digital forensic investigation has grown in tandem with the rising importance of technology today. Too many incidences of digital and physical crime which is the focus of the world nowadays. To gather the finest evidence and investigative outcomes, a digital forensic model must be established. This study included a review of the literature on digital forensics and models established in digital forensics. According to the findings, the majority of research involves broad inquiries and procedures that overlap. Furthermore, no model has been developed to design a systemic inquiry. In this study, we propose a methodology for digital forensic examination to address this issue. This model combines several of the previous models and adds some new variables that are relevant to the study. Keywords: Due Diligence, Threats, Forensic Analysis, Preparation, Readiness, Cyber Security, BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Jonas Takyi Asamoah (2022): Exploring Lack of Due Diligence as a Threat to Forensic Analysis Preparation and Readiness Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 307-314 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P49
APA, Harvard, Vancouver, ISO, and other styles
33

Aziz, Benjamin, Clive Blackwell, and Shareeful Islam. "A Framework for Digital Forensics and Investigations." International Journal of Digital Crime and Forensics 5, no. 2 (April 2013): 1–22. http://dx.doi.org/10.4018/jdcf.2013040101.

Full text
Abstract:
Digital forensics investigations are an important task for collecting evidence based on the artifacts left in computer systems for computer related crimes. The requirements of such investigations are often a neglected aspect in most of the existing models of digital investigations. Therefore, a formal and systematic approach is needed to provide a framework for modeling and reasoning about the requirements of digital investigations. In addition, anti-forensics situations make the forensic investigation process challenging by contaminating any stage of the investigation process, its requirements, or by destroying the evidence. Therefore, successful forensic investigations require understanding the possible anti-forensic issues during the investigation. In this paper, the authors present a new method for guiding digital forensics investigations considering the anti-forensics based on goal-driven requirements engineering methodologies, in particular KAOS. Methodologies like KAOS facilitate modeling and reasoning about goals, requirements and obstacles, as well as their operationalization and responsibility assignments. The authors believe that this new method will lead in the future to better management and organization of the various steps of forensics investigations in cyberspace as well as provide more robust grounds for reasoning about forensic evidence.
APA, Harvard, Vancouver, ISO, and other styles
34

Kaleem, Hassan, and Ijaz Ahmed. "Cloud Forensics: Challenges and Solutions (Blockchain Based Solutions)." Innovative Computing Review 1, no. 2 (December 26, 2021): 1–26. http://dx.doi.org/10.32350/icr.0102.01.

Full text
Abstract:
Cloud computing is an on-demand service provided for computer resources, data storage and enhancing computing power. Digital forensics is used to help forensic investigators extract evidence against cloud/ cybercriminals and maintain the integrity and security of data stored in a cloud environment. Based on the prior research in this area concerning existing challenges and solutions, this survey focuses on exploring the problems and their proposed solutions on the basis of a detailed literature survey. It critically explores and reviews the prevailing challenges and solutions through an in-depth review of the cloud forensic area. The paper highlights all the current problems in cloud forensics and their solutions previously identified by the researchers to help investigators probe any criminal incident. The three categorization model explores the challenges and solutions of the existing methods and offers directions for future research in this area. Finally, this survey paper can be considered an initiative to carry out research and develop cloud forensic-able services for the cloud environment. INDEX TERMS: blockchain based solution, cloud forensics, cloud forensics challenges, cloud forensics methodologies, cloud forensics solutions
APA, Harvard, Vancouver, ISO, and other styles
35

Van Iten, Heyo, Mario E. Cournoyer, and Michelle Coyne. "Designation of a neotype and paraneotype for Conularina triangulata (Raymond, 1905) (Upper Ordovician, eastern North America)." Journal of Paleontology 94, no. 4 (January 20, 2020): 796–97. http://dx.doi.org/10.1017/jpa.2019.110.

Full text
Abstract:
Conularina triangulata (Raymond, 1905), the genotype of Conularina Sinclair, 1942, is a rare, early Late Ordovician conulariid (Cnidaria, Scyphozoa; Van Iten et al., 2006) having three sides or faces instead of four (Sinclair, 1942, fig. 9; Van Iten, 1992, text-fig. 3E). Originally described from the Valcour Formation (early Sandbian; Dix et al., 2013) on Valcour Island, New York (Sinclair, 1942), C. triangulata has since been found in laterally equivalent strata of the upper Laval Formation (‘Upper Chazy’; Sinclair, 1942) in Laval, Québec, Canada (Sinclair, 1942). From this same unit and area, Sinclair (1942) erected three new, four-sided species of Conularina (C. irrasa, C. raymondi, and C. undosa), and he erected a single four-sided species (C. narrawayi) from the Ottawa Formation (now the Sandbian–Katian Ottawa Group; Dix et al., 2013) at Tétreauville (now Gatineau), Québec. Subsequently, Jerre (1994) reported the occurrence of two species of Conularina in the Upper Ordovician of Sweden. Jerre (1994) also proposed that Eoconularia? forensis Sinclair, 1946 from the Upper Ordovician Citadelle Formation (‘Quebec City’ Formation; Sinclair, 1946) in Québec City, Québec (Promontoire de Québec thrust sheet, Appalachian Humber Zone, Allochtonous Domain; Castonguay et al., 2002) is a species of Conularina.
APA, Harvard, Vancouver, ISO, and other styles
36

Adzogbley, Amenuveve Gracious. "Storing Forensic Data Against Interference." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (July 20, 2022): 7–14. http://dx.doi.org/10.22624/aims/crp-bk3-p2.

Full text
Abstract:
Digital forensic investigators face a wide range of inquiry goals, such as dealing with cybercrime. Digital forensic tools are no different. Different digital traces were examined on persistent storage devices (SSDs, SD cards, and USB drives), volatile memory snapshots, and network captures. A large realistic, timely training data is required to train experts, improve the forensic tools and keep their knowledge and capabilities up to date. However, there is a significant gap in digital forensic training data due to many factors such as privacy, secrecy, data protection, and intellectual property rights. Multiple frameworks for generating realistic digital forensic data sets have been proposed in recent years. None of these frameworks offers a comprehensive strategy for creating digital forensic tools, for relevant traces, from many sources. Keywords s: Data Storage, Cybersecurity, Cybercrime, Protection, Forensics, interference. BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Amenuveve Gracious Adzogbley (2022). Storing Forensic Data Against Interference SMART-IEEE-Creative Research Publications Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 7-14. www.isteams.net/ITlawbookchapter2022. dx.doi.org/
APA, Harvard, Vancouver, ISO, and other styles
37

Ruffell, Alastair. "Forensic pedology, forensic geology, forensic geoscience, geoforensics and soil forensics." Forensic Science International 202, no. 1-3 (October 2010): 9–12. http://dx.doi.org/10.1016/j.forsciint.2010.03.044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Baafi, Peter Oppong. "Tools For Cyber Forensics." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (July 2022): 285–90. http://dx.doi.org/10.22624/aims/crp-bk3-p46.

Full text
Abstract:
Digital Forensics & Cyber Security Graduate Programme Department Of Information Systems & Innovations Ghana Institute of Management & Public Administration Greenhill, Accra, Ghana E-mails: peeuncle3@gmail.com Phone: +233242776968 ABSTRACT Digital forensics, or Cyber security, has become a vital part of almost every research, and digital forensics tools' users are becoming more diverse in their backgrounds and interests. As a result, usability is an important section of these tools. This paper investigates the usability aspect of forensics tools. The study results highlight several usability issues that need to be considered when designing and implementing digital forensics tools. Cyber-attacks are fast-moving and surging in number and severity. When the attacks occur, the attacked enterprise responds with predetermined actions. Applying digital forensics helps in recovering and investigating material on digital media and networks is one of these actions. Cyber Forensic Investigation includes the Capture and Analysis of digital data either to prove or disprove whether the internet-related theft has been committed or not. Earlier, Computers were used only to store large volumes of data and perform many operations on them, but nowadays, it has expanded and occupied a prior role in Crime Investigation. To solve these cyber-related problems, the selection and usage of Forensic tools are essential. The developers have created many cyber forensic tools for better research and quick investigation. Cop departments and investigation agencies select the tools based on various factors, including budget and available experts on the team. This paper describes the different types of existing computer forensic tools and their usage. The article gives detailed information on all related works by other scholars in the area of this paper. Keywords: Digital Forensics; Forensics, GUI, User Interface, Digital Forensics, and its framework, Cyber forensics tools. BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Peter Oppong Baafi (2022): Toosl For Cyber Forensics Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 285-290 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P46
APA, Harvard, Vancouver, ISO, and other styles
39

Faiz, Muhammad Nur, Rusydi Umar, and Anton Yudhana. "Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email." JISKA (Jurnal Informatika Sunan Kalijaga) 1, no. 3 (March 30, 2017): 108. http://dx.doi.org/10.14421/jiska.2017.13-02.

Full text
Abstract:
Digital Forensics become one popular term because Currently many violations of cyber crime. Digital techniques Computer Forensics performed or with analyze digital device, whether the device is a media Actors or as a media victim. Digital Forensic Analysis Being divided into two, traditional / dead and alive. Forensic analysis traditionally involves digital data Deposited permanent Operates in Irish, while live forensic analysis involves analysis of data Namely temporary in Random Access Memory or Deposited hearts transport equipment in the Network. Singer proposes journal Forensic analysis of life in the latest operation system windows 10. That study focused IN case several email security browsers Sales Operations manager of Google Chrome, Mozilla Firefox, and Microsoft Internet Explorer Edge. In addition, although many digital forensics type software applications not free, goal on research objectives compares browser security information so it will be more minimize abuse email.
APA, Harvard, Vancouver, ISO, and other styles
40

Charaya, Nancy. "Microbial Forensic’s - Microbes as a part of Forensic Investigation." Journal of Advanced Medical and Dental Sciences Research 4, no. 4 (August 2016): 32–37. http://dx.doi.org/10.21276/jamdsr.2016.4.4.8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Mikhaleva, Natal’ya V. "Contemporary View on Objects of Environmental Forensics." Theory and Practice of Forensic Science 16, no. 3 (November 4, 2021): 26–31. http://dx.doi.org/10.30764/1819-2785-2021-3-26-31.

Full text
Abstract:
The article reviews the concept of the object of forensic science, which is essential for expert research and the identification of classes, genera, species, and subspecies of forensic examinations, as well as their classification.The author presents the objects of environmental forensics as generic objects, gives their definition, analyzes their properties and features. It is also shown that the objects of environmental forensics are divided into the actual objects of research and samples for comparative research. Furthermore, the researcher indicates the possible instances of the intersection of studies of environmental forensics’ objects with other examinations. Finally, the author emphasizes the necessity of compliance by a forensic ecologist with the limits of his competence in such cases.
APA, Harvard, Vancouver, ISO, and other styles
42

Ekhande, Sonali, Uttam Patil, and Kshama Vishwanath Kulhalli. "Review on effectiveness of deep learning approach in digital forensics." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 5 (October 1, 2022): 5481. http://dx.doi.org/10.11591/ijece.v12i5.pp5481-5592.

Full text
Abstract:
<p><span>Cyber forensics is use of scientific methods for definite description of cybercrime activities. It deals with collecting, processing and interpreting digital evidence for cybercrime analysis. Cyber forensic analysis plays very important role in criminal investigations. Although lot of research has been done in cyber forensics, it is still expected to face new challenges in near future. Analysis of digital media specifically photographic images, audio and video recordings are very crucial in forensics This paper specifically focus on digital forensics. There are several methods for digital forensic analysis. Currently deep learning (DL), mainly convolutional neural network (CNN) has proved very promising in classification of digital images and sound analysis techniques. This paper presents a compendious study of recent research and methods in forensic areas based on CNN, with a view to guide the researchers working in this area. We first, defined and explained preliminary models of DL. In the next section, out of several DL models we have focused on CNN and its usage in areas of digital forensic. Finally, conclusion and future work are discussed. The review shows that CNN has proved good in most of the forensic domains and still promise to be better.</span></p>
APA, Harvard, Vancouver, ISO, and other styles
43

Mu'Minin, Mu'Minin, and Nuril Anwar. "Live Data Forensic Artefak Internet Browser (Studi Kasus Google Chrome, Mozilla Firefox, Opera Mode Incognito)." Buletin Sistem Informasi dan Teknologi Islam 1, no. 3 (August 31, 2020): 130–38. http://dx.doi.org/10.33096/busiti.v1i3.834.

Full text
Abstract:
Browser merupakan program aplikasi perangkat lunak yang digunakan untuk mengakses internet baik dari perangkat desktop maupun mobile. Browser tersebut digunakan untuk mencari segala macam informasi yang tersedia di dunia internet. Browser terdapat fitur mode incognito yang digunakan dalam menjelajah informasi di internet. Fitur ini diklaim tidak menyimpan data penelusuran pribadi, seperti riwayat penelusuran, cookies, cache, dan kata sandi, di penyimpanan browser. Namun browser mode incognito dapat meninggalkan barang bukti digital di sistem. Hal ini menjadi tantangan bagi forensik investigator untuk melakukan investigasi forensik dan mencari barang bukti digital (digital evidence) dari browser mode incognito. Investigasi forensik yang dilakukan investigator dilakukan sesuai dengan prosedur forensik digital dalam mencari barang bukti. Investigasi forensik terdapat metode yang digunakan dalam mencari barang bukti yaitu live forensic dan post morterm analytic. Post morterm analytic merupakan metode investigasi yang dilakukan setelah terjadi tindak kejahatan sedangkan live forensic yaitu metode investigasi yang dilakukan saat tindak kejahatan berlangsung. Dalam penelitian ini, investigator menggunakan metode live forensic. Penelitian yang dilakukan menggunakan metode live forensic mampu mendapatkan dan membuktikan bahwa penggunaan browser mode incognito masih meninggalkan informasi berupa barang bukti digital dari pengguna. Barang bukti yang ditemukan yaitu berupa browsing history, web search, password, username, visited url. Barang bukti kemudian digunakan dipengadilan untuk menentukan proses tindak pidana pada pelaku.
APA, Harvard, Vancouver, ISO, and other styles
44

Khaziev, Sh N. "Actual Problems of the International Forensic Cooperation." Theory and Practice of Forensic Science, no. 3(43) (September 30, 2016): 116–24. http://dx.doi.org/10.30764/64/1819-2785-2016-3-116-124.

Full text
Abstract:
The article deals with the historical stages of development of international cooperation in the field of forensic activities, questions of its legal regulation in the Russian Federation at the present stage, as well as a strategy for further development of this cooperation. Identified five major historical stages in the development of international cooperation in the field of forensics. In order to create the legal basis of international forensic cooperation invited to complete a draft federal Law «On forensic activities in the Russian Federation» the rules on carrying out forensic examinations of Russian experts for international justice institutions, the forensics examinations with the involvement of forensic experts of a foreign State, on the participation of Russian forensic experts in foreign and international non-governmental scientific and professional organizations of forensic experts. Proposed strategy for the development of international cooperation in the field of forensic activities.
APA, Harvard, Vancouver, ISO, and other styles
45

Sachdeva, Shaweta, B. L. Raina, and Avinash Sharma. "Analysis of Digital Forensic Tools." Journal of Computational and Theoretical Nanoscience 17, no. 6 (June 1, 2020): 2459–67. http://dx.doi.org/10.1166/jctn.2020.8916.

Full text
Abstract:
This paper aims to analyze different tools for Forensic Data Analysis comes under the branch of Digital Forensics. Forensic data analysis is done with digital techniques. Digital forensics becomes more important in law enforcement, due to the large use of computers and mobile devices. The pattern recognition system most appropriately fits into the Analysis Phase of the Digital Forensics. Pattern Recognition involves two processes. One Process is an analysis and the second process is recognition. The result of the analysis is taken out of the attributes from the patterns to be recognized i.e., a pattern of different faces and fingerprints. These attributes are then utilized for the further process in the analysis phase which provides attention on various techniques of pattern recognition that are applied to digital forensic examinations and is proposed to develop different forensic tools to collect evidence that would be helpful to solve specific types of crimes. This evidence further helps the examiner in the analysis phase of the digital forensic process by identifying the applicable data.
APA, Harvard, Vancouver, ISO, and other styles
46

Mikhaleva, N. V. "On the Issue of Environmental Forensic Subtheory." Theory and Practice of Forensic Science 17, no. 1 (April 29, 2022): 115–19. http://dx.doi.org/10.30764/1819-2785-2022-1-115-119.

Full text
Abstract:
At this point many of the concepts of environmental forensics have been theoretically elaborated, however its subtheory is yet to be developed. The article addresses the concept and subject of the environmental forensic subtheory. The author demonstrates that the subject, object and tasks of environmental forensics are not accordingly the subject, object and tasks of the environmental forensic subtheory: within the framework of the subtheory the regularities of the general theory of forensic examination regarding the environmental investigations are revealed. The author also proposes the definition of the subject of the environmental forensic subtheory, establishes its place as a part of the theory of expert diagnostics.
APA, Harvard, Vancouver, ISO, and other styles
47

Tenishev, A. P. "Antitrust forensics: concept and content." Russian competition law and economy, no. 1 (March 30, 2020): 38–41. http://dx.doi.org/10.32686/2542-0259-2020-1-38-41.

Full text
Abstract:
Effective investigation of antitrust offenses, including crimes, is an urgent task that requires not only deep scientific justification, but also the development of a set of practical recommendations. Regularities of the mechanism for committing antitrust offenses (including crimes), the occurrence of information about the antitrust offense (crime) and its participants, the collection, research and use of evidence and special means and methods of judicial research and prevention of violations of antitrust laws based on these knowledges at present do not fit into the framework of a private forensic technique.The article includes the definition of the concept of antitrust forensics. Justified the need of developing an independent branch of forensic science — antitrust forensics, which includes the theoretical part, antitrust forensic techniques, antitrust forensic tactics and antitrust forensic techniques.
APA, Harvard, Vancouver, ISO, and other styles
48

O. A., Leonenko, Yesypenko O. H., and Rakhilchuk І.V. "Modern legal and organizational principles for the development of judicial examination in crime investigation." Scientific Herald of Sivershchyna. Series: Law 2020, no. 2 (December 18, 2020): 93–101. http://dx.doi.org/10.32755/sjlaw.2020.02.093.

Full text
Abstract:
The scientific article is devoted to the problems of using forensic examinations and their results in the pre-trial investigation. Perspective directions of development of criminology according to its components are defined. The current state of develop-ment of forensic technology, tools and cybernetics in general, which is successfully used in forensics makes it possible to use retinal schemes to register criminals. It is noted that the development of forensic technologies involves the develop-ment of information retrieval programs, such as Automated Workplaces (AWP) for pre-trial investigation units of Ukraine, as well as other persons authorized to in-vestigate, reference information programs. It is effective to use global satellite positioning systems (JPS devices) while in-vestigating crimes, ZD laser scanners when inspecting the scene, as small elec-tronic devices allow you to capture the geographical coordinates of any point, loca-tion of objects at the scene, the distance between them rather quickly. A new step in forensics in the near future will be the use of "latent fingerprint" (LTF) technology, which will greatly simplify the identification of criminals. Methods of forensic examination in criminal proceedings and their improve-ment using the latest technologies that use computer programs such as "Photoro-bot", the use of audio and video, polygraph, spectrograph, etc. to reproduce human memory and the development of forensic technology, which involves development of information retrieval programs. These new approaches and knowledge used by forensics are a necessary con-dition for the rapid detection of the crime, detection and seizure of physical evi-dence for their further expert studying. The use of the latest achievements of forensic technology in the detection of hidden traces is the key to the formation of a quality evidence base and identifica-tion of a particular person during the pre-trial investigation. Key words: forensics, forensics theory, crime investigation, criminological means of research.
APA, Harvard, Vancouver, ISO, and other styles
49

Alotaibi, Fahad Mazaed, Arafat Al-Dhaqm, Yasser D. Al-Otaibi, and Abdulrahman A. Alsewari. "A Comprehensive Collection and Analysis Model for the Drone Forensics Field." Sensors 22, no. 17 (August 29, 2022): 6486. http://dx.doi.org/10.3390/s22176486.

Full text
Abstract:
Unmanned aerial vehicles (UAVs) are adaptable and rapid mobile boards that can be applied to several purposes, especially in smart cities. These involve traffic observation, environmental monitoring, and public safety. The need to realize effective drone forensic processes has mainly been reinforced by drone-based evidence. Drone-based evidence collection and preservation entails accumulating and collecting digital evidence from the drone of the victim for subsequent analysis and presentation. Digital evidence must, however, be collected and analyzed in a forensically sound manner using the appropriate collection and analysis methodologies and tools to preserve the integrity of the evidence. For this purpose, various collection and analysis models have been proposed for drone forensics based on the existing literature; several models are inclined towards specific scenarios and drone systems. As a result, the literature lacks a suitable and standardized drone-based collection and analysis model devoid of commonalities, which can solve future problems that may arise in the drone forensics field. Therefore, this paper has three contributions: (a) studies the machine learning existing in the literature in the context of handling drone data to discover criminal actions, (b) highlights the existing forensic models proposed for drone forensics, and (c) proposes a novel comprehensive collection and analysis forensic model (CCAFM) applicable to the drone forensics field using the design science research approach. The proposed CCAFM consists of three main processes: (1) acquisition and preservation, (2) reconstruction and analysis, and (3) post-investigation process. CCAFM contextually leverages the initially proposed models herein incorporated in this study. CCAFM allows digital forensic investigators to collect, protect, rebuild, and examine volatile and nonvolatile items from the suspected drone based on scientific forensic techniques. Therefore, it enables sharing of knowledge on drone forensic investigation among practitioners working in the forensics domain.
APA, Harvard, Vancouver, ISO, and other styles
50

Barros-Bailey, Mary, Jeffrey Carlisle, and Terry L. Blackwell. "Forensic Ethics and Indirect Practice for the Rehabilitation Counselor." Journal of Applied Rehabilitation Counseling 41, no. 2 (June 1, 2010): 42–47. http://dx.doi.org/10.1891/0047-2220.41.2.42.

Full text
Abstract:
For nearly 50 years, the specialty area of forensics has emerged as an established practice setting in rehabilitation counseling, and it is predicted to be the fastest-growing area of practice in the profession. Reflecting the increased number of practitioners in the specialty, the revised Code for Professional Ethics of Rehabilitation Counselors names Section F (Forensics and Indirect Services) as a guide to the ethical practice for rehabilitation counselors in this specialty. The section includes 17 standards specific to clients' and evaluees' rights, rehabilitation counselors' forensic competency and conduct, forensic practices, and forensic business practices. Furthermore, the unique relationship of the forensic rehabilitation counselor with the person receiving services is clarified through the introduction of the definition of evaluee, a term that has gained unilateral agreement throughout the field of forensic rehabilitation.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography