To see the other types of publications on this topic, follow the link: Forensic investigation.

Journal articles on the topic 'Forensic investigation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Forensic investigation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Safie, Sairul Izwan, and Syah Reezal Md Bashah. "A Comprehensive Review of the Evolution and Future Directions of Digital Forensic Investigation Model." International Journal of Emerging Technology and Advanced Engineering 13, no. 7 (July 16, 2023): 1–10. http://dx.doi.org/10.46338/ijetae0723_01.

Full text
Abstract:
Digital forensics investigations play an essential role in modern law enforcement, national security, and civil litigation. To conduct a successful investigation, it is crucial to choose an appropriate digital forensics investigation model that fits the investigation's context, scope, purpose, and methods. This paper presents an overview of the main factors that should be considered when selecting a digital forensics investigation model, including the type of incident, legal and ethical requirements, technical and operational capabilities, and complexity of the scenario. Additionally, this paper describes 11 digital forensics investigation models, ranging from simple to complex, each with its own strengths and weaknesses. By understanding the advantages and limitations of each model, digital forensics professionals can choose the most suitable model for their specific investigation. Keywords—Digital forensics investigations, Forensic analysis, Investigation models, Forensics Model
APA, Harvard, Vancouver, ISO, and other styles
2

Aziz, Benjamin, Clive Blackwell, and Shareeful Islam. "A Framework for Digital Forensics and Investigations." International Journal of Digital Crime and Forensics 5, no. 2 (April 2013): 1–22. http://dx.doi.org/10.4018/jdcf.2013040101.

Full text
Abstract:
Digital forensics investigations are an important task for collecting evidence based on the artifacts left in computer systems for computer related crimes. The requirements of such investigations are often a neglected aspect in most of the existing models of digital investigations. Therefore, a formal and systematic approach is needed to provide a framework for modeling and reasoning about the requirements of digital investigations. In addition, anti-forensics situations make the forensic investigation process challenging by contaminating any stage of the investigation process, its requirements, or by destroying the evidence. Therefore, successful forensic investigations require understanding the possible anti-forensic issues during the investigation. In this paper, the authors present a new method for guiding digital forensics investigations considering the anti-forensics based on goal-driven requirements engineering methodologies, in particular KAOS. Methodologies like KAOS facilitate modeling and reasoning about goals, requirements and obstacles, as well as their operationalization and responsibility assignments. The authors believe that this new method will lead in the future to better management and organization of the various steps of forensics investigations in cyberspace as well as provide more robust grounds for reasoning about forensic evidence.
APA, Harvard, Vancouver, ISO, and other styles
3

Sutikno, Tole. "Mobile forensics tools and techniques for digital crime investigation: a comprehensive review." International Journal of Informatics and Communication Technology (IJ-ICT) 13, no. 2 (August 1, 2024): 321. http://dx.doi.org/10.11591/ijict.v13i2.pp321-332.

Full text
Abstract:
<p>Extracting and analyzing data from smartphones, IoT devices, and drones is crucial for conducting digital crime investigations. Effective cyberattack mitigation necessitates the use of advanced Android mobile forensics techniques. The investigation necessitates proficiency in manual, logical, hex dump, chip-off, and microread methodologies. This paper provides a comprehensive overview of Android mobile forensics tools and techniques for digital crime investigation, as well as their use in gathering and analyzing evidence. Forensic software tools like Cellebrite UFED, Oxygen Forensic Detective, XRY by MSAB, Magnet AXIOM, SPF Pro by SalvationDATA, MOBILedit Forensic Express, and EnCase Forensic employ both physical and logical techniques to retrieve data from mobile devices. These advanced tools offer a structured approach to tackling digital crimes effectively. We compare dependability, speed, compatibility, data recovery accuracy, and reporting. Mobile-network forensics ensures data acquisition, decryption, and analysis success. Conclusions show that Android mobile forensics tools for digital crime investigations are diverse and have different capabilities. Mobile forensics software offers complete solutions, but new data storage and encryption methods require constant development. The continuous evolution of forensic software tools and a comprehensive tool classification system could further enhance digital crime investigation capabilities.</p>
APA, Harvard, Vancouver, ISO, and other styles
4

P A, Safuwan Ali, and Kavitha R. "Unraveling Cyber Threats: The Role of Forensic Investigation in Cyber Security." International Journal of Multidisciplinary Research in Science, Engineering and Technology 7, no. 05 (May 22, 2024): 10258–60. http://dx.doi.org/10.15680/ijmrset.2024.0705108.

Full text
Abstract:
In today's digital landscape, cyber threats pose significant risks to organizations worldwide, demanding robust cybersecurity measures. Forensic investigation is pivotal in identifying, analyzing, and mitigating these threats, providing insights into their nature and impact for effective incident response. Leveraging forensic techniques and tools empowers organizations to fortify defense strategies and resilience against evolving threats. Cyber forensics encompasses diverse domains such as digital, data, system, and network forensics, crucial for legally admissible evidence presentation. System forensics focuses on standalone machine investigations, while network forensics scrutinizes network events. Data forensics involves analyzing volatile and non-volatile data, while proactive forensics facilitates ongoing evidence collection for enhanced preparedness. Email forensics addresses the evidential role of emails in forensic investigations.
APA, Harvard, Vancouver, ISO, and other styles
5

Sharma, Puneet, Deepak Arora, and T. Sakthivel. "Mobile Cloud Forensic Readiness Process Model for Cloud-Based Mobile Applications." International Journal of Digital Crime and Forensics 12, no. 3 (July 2020): 58–76. http://dx.doi.org/10.4018/ijdcf.2020070105.

Full text
Abstract:
Nowadays, mobile cloud applications have attracted millions of smartphone users due to the proliferation of cyber technologies and a wide range of applications. Mobile cloud forensic investigation methodologies need tremendous growth due to the increasing crime incidents. The forensic readiness model plays a significant role in the forensic investigation framework by ensuring the ease of investigation to the forensic investigator. The existing forensic readiness supports either the mobile device or cloud environment, which lacks to prepare the information for the investigation. This article presents a mobile cloud forensic readiness process model to identify the factors and prepare the information that effectively supports forensic investigations. The proposed model involves requirements for the mobile cloud forensics from multiple perspectives with the aim of developing the forensic-ready system. As a result, the proposed forensic readiness model enables the mobile cloud forensic to improve the accuracy of investigation as well as reduces the investigation time significantly.
APA, Harvard, Vancouver, ISO, and other styles
6

Brown, Emmanuel Kpakpo. "Digital Forensic and Distributed Evidence." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (July 26, 2022): 357–62. http://dx.doi.org/10.22624/aims/crp-bk3-p57.

Full text
Abstract:
Digital Forensics investigation is the science and legal process of investigating computer/cybercrimes and digital media or objects to gather evidence. This new and fast evolving field encompasses computer forensics, network forensics, mobile forensics, cloud computing forensics, and IoT forensics; and for this reason have digital evidence distributed widely when the need arises for crime prosecution. Digital evidence must be authentic, accurate, complete, and convincing to the jury for legal admissibility at the court of law. In many instances due to the distributed nature of digital forensic evidence and the legal procedures to be adhered to in evidence gathering at a digital crime scene, presenting at the law courts have proven to be challenging and in some instances inadmissible. Following legal procedures in evidence gathering at a digital crime scene is critical for admissibility and prosecution. This paper aims to discuss digital forensics investigations jurisprudence in relation to distributed digital evidence. For the study to be relevant to policy and practice, forensic tools and frameworks, legal and ethical obligations, and digital evidence handling and admissibility are highlighted. This paper does not follow any forensic investigations process; but rather discusses the need for development and implementation of unique frameworks that could be utilised to gather distributed digital evidence required for admissibility in court. Keywords - Digital forensics investigations; Digital evidence; Jurisprudence BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Emmanuel Kpakpo Brown (2022): Digital Forensic and Distributed Evidence Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 357-362 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P57
APA, Harvard, Vancouver, ISO, and other styles
7

Baroto, Wishnu Agung. "Advancing Digital Forensic through Machine Learning: An Integrated Framework for Fraud Investigation." Asia Pacific Fraud Journal 9, no. 1 (June 1, 2024): 1–16. http://dx.doi.org/10.21532/apfjournal.v9i1.346.

Full text
Abstract:
The rise of cybercrime and cyber-related crime encourages efficient digital forensic investigations more crucial than ever before. Traditional investigation methods can be time-consuming, costly, and resource-intensive, while machine learning algorithms have the potential to reduce the complexity by promoting automation and investigation capabilities. This study begins with an analysis of digital forensics framework using a document analysis methodology. Moreover, exploring current practice and potential implementation of machine learning in digital forensics for fraud investigation is demonstrated through the features of Autopsy 4.15.0, a widely known digital forensics tool. The findings suggest the implementation of a comprehensive digital forensic framework that prioritizes the interpretation phase, with the support of machine learning capabilities. At present, machine learning mainly supports the analysis phase, which happens to be the most time-intensive process of digital forensic investigations. Furthermore, as fraud investigation has a role of fraud detection and prevention, current digital forensics procedures do not support the fraud detection and prevention process, despite the potential for machine learning to support this through pattern recognition.These discoveries are particularly significant in the fight against fraudulent activities, such as tax fraud, data fraud, financial fraud, and asset misappropriation, in the digital age.
APA, Harvard, Vancouver, ISO, and other styles
8

Shah, Abdullah. "Evaluating Network Forensics Applying Advanced Tools." International Journal of Advanced Engineering, Management and Science 9, no. 4 (2023): 01–09. http://dx.doi.org/10.22161/ijaems.94.1.

Full text
Abstract:
Network forensics comes under the domain of digital forensics and deals with evidences left behind on the networkiafter a cyber-attack. It is indication of the weakness that led to the crime and the possible cause. Network focused research comes up with many challenges which involves the collection, storage, content, privacy, confiscation and the admissibility. It is important and critical for any network forensic researcher or the investigator to consider adopting efficient forensic network investigation framework or the methodologies in order to improve investigation process. The main aim of this research contribution was to do a comprehensive analysis of concepts of networks forensics through extensive investigation and by analyzing various methodologies and associated tools which should be used in the network forensic investigations. Detailed and in depth analysis of concepts of network forensic investigation on a designed/conceived network architecture was carried out which was then followed by analyzing various methodologies and tools employed. An innovative framework for the investigation was designed which can be used by any forensic expert. The acquired data was analyzed by using information, strategizing and collecting evidence and by analyzing and reporting of the methodologies on the conceptualized network. Consequently, it led to the researcher to adopt and utilize a powerful and efficient forensic network methodology that will ultimately help in improving the investigation process and providing required tools/techniques along with the requisite guidelines that will determine the approach, methods, and strategies which are to be used for networkiforensiciprocess to be followed and be executed with the use of relevant tools that will tend to help in the simplification and improvement of the forensics investigation process.
APA, Harvard, Vancouver, ISO, and other styles
9

Charaya, Nancy. "Microbial Forensic’s - Microbes as a part of Forensic Investigation." Journal of Advanced Medical and Dental Sciences Research 4, no. 4 (August 2016): 32–37. http://dx.doi.org/10.21276/jamdsr.2016.4.4.8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sharma, Sandeep Kumar, and Mazhar Khaliq. "Design and development of software quality forensics framework and model." Multidisciplinary Science Journal 6, no. 7 (January 16, 2024): 2024111. http://dx.doi.org/10.31893/multiscience.2024111.

Full text
Abstract:
The illicit activist tampers the software for malcious purposes. The process of forensics examining and gathering evidence for software accused in forensic laboratories presents challenges in terms of software quality. Therefore, it is crucial to design and develop a framework, model, and dedicated standards for the forensic analysis of software quality. These resources can be employed for investigations, legal proceedings, as well as establishing criteria and standards for both past and present scenarios. The aim of the research work is to design a software-quality forensics framework for forensic investigation to the quality of software. The research primarily concentrates on developing a model for software quality assessment and identifying the pertinent existing standards through the conceptual framework of software quality forensics. The implementation of software quality forensics has improved the efficiency and effectiveness in investigating and managing incidents related to software quality. The proposed framework for software quality forensics allows for the evaluation and assessment of quality issues within specific software systems. To complement the software quality forensic framework, a comparative analysis has been conducted between existing software quality models and the proposed software quality forensic model.
APA, Harvard, Vancouver, ISO, and other styles
11

Anushka Deepak Kadage. "AI-Enhanced Digital Forensics: Automated Techniques for Efficient Investigation and Evidence Collection." Journal of Electrical Systems 20, no. 1s (March 28, 2024): 211–29. http://dx.doi.org/10.52783/jes.766.

Full text
Abstract:
The abstract summarizes AI-enhanced digital forensics topics. It highlights the importance of AI in digital forensic investigations and outlines its major features, historical perspectives, and methodological evolution. The abstract describes how automated methods can streamline evidence collection and investigation. The historical perspective highlights digital forensic procedures from rudimentary file system investigations to AI-driven methods. This progression reflects digital crime's dynamic character and forensic method developments. The AI-enhanced digital forensics methodology includes establishing an effective component model, identifying datasets, gathering data, arranging studies, and considering ethical considerations. Representative datasets and ethical considerations are stressed in the abstract to ensure ethical and responsible AI application in forensic investigations. AI-based systems are evaluated using accuracy, false positive/negative rates, speed and efficiency, scalability, and durability. A straightforward comparison of these parameters across AI algorithms using bar graphs and grouped bar charts helps forensic investigators chooses strategies. In conclusion, AI-enhanced digital forensics is well understood, and performance evaluations, methodological concerns, historical evolution, and ethics are important. AI is being used in digital forensics as technology advances, giving investigators a strong tool to navigate the digital world accurately and efficiently. To use AI responsibly and effectively for justice, technique and ethics must be constantly improved
APA, Harvard, Vancouver, ISO, and other styles
12

Pertsev, Roman. "THE USE OF "SMART" TECHNOLOGIES IN FORENSICS." Criminalistics and Forensics, no. 67 (August 9, 2022): 104–13. http://dx.doi.org/10.33994/kndise.2022.67.12.

Full text
Abstract:
In the modern world, technology continues to develop, this development is necessary for various industries, including police investigations. Thus, with the proper use of “smart” technologies, law enforcement agencies can predict, prevent and solve crimes. This paper discusses the process of obtaining and identifying important information that digital devices located at the crime scene can provide the police investigation. After analyzing which, the investigating authorities conducting pre-trial investigations can use it to identify and catch criminals, and in the future even to prevent crimes from happening. The issue of protecting privacy in the Internet era and the regulation at the legislative level of the work of investigative and law enforcement agencies in the field of digital technologies is touched upon. As a result of the study, the author concludes that with the advent and introduction of “smart” technologies, increasing the professionalism of police officers requires constant updating of knowledge and skills, the exchange of innovative developments with specialists from other countries, mastering the latest methods, mechanisms, and tools for conducting forensic research. Forensic investigators involved in crime scene investigations must be able to recognize and professionally retrieve hybrid (digital) devices to preserve possible information stored in them for further digital forensics. Key words: smart technologies, digital devices, digital forensics, privacy, police investigation, forensic intelligence.
APA, Harvard, Vancouver, ISO, and other styles
13

Mualfah, Desti, and Rizdqi Akbar Ramadhan. "Analisis Forensik Metadata Kamera CCTV Sebagai Alat Bukti Digital." Digital Zone: Jurnal Teknologi Informasi dan Komunikasi 11, no. 2 (November 7, 2020): 257–67. http://dx.doi.org/10.31849/digitalzone.v11i2.5174.

Full text
Abstract:
Kejahatan konvensial yang terekam kamera CCTV (Closed Circuit Televison) semakin banyak ditemukan di masyarakat, setiap pelaku kejahatan yang terbukti melakukan tindak pidana tertentu akan dihukum sesuai dengan peraturan perundang-undangan. Kamera CCTV memiliki peran penting dalam keamanan, banyak diantaranya hasil tangkapan rekaman kamera CCTV dijadikan sebagai alat bukti digital. Tantangannya adalah bagaimana teknik yang diperlukan untuk penanganan khusus investigasi digital forensik dalam mencari bukti ditgital rekaman kamera CCTV menggunakan metode live forensik, yaitu ketika barang bukti dalam keadan aktif berdasarkan pedoman SNI 27037:2014 sesuai acuan kerangka kerja Common Phases of Computer Forensics Investigation Models untuk di implementasikan ke dalam dokumen Chain of Custody. Hasil penelitian ini berupa hasil analisis video rekaman kamera CCTV tentang karakteristik bukti digital dan informasi metadata yang digunakan untuk memberikan penjelasan komprehensif secara terstruktur serta acuan pengelolaan informasi data yang didapat dari hasil investigasi digital forensik yang dapat dipertanggungjawabkan dalam persidangan. Kata kunci: Bukti Digital, Live Forensik, Metadata, Kamera CCTV, Chain of Custody. Abstract Conventional crimes that are recorded on CCTV (Closed Circuit Television) cameras are increasingly being found in society, every crime that commits certain crimes will be in accordance with statutory regulations. CCTV cameras have an important role in security, many of which are recorded by CCTV cameras used as digital evidence. The challenge is how the techniques required for special handling, digital forensics in searching for digital evidence of CCTV camera footage using the live forensic method, namely when the evidence is in an active state based on the latest SNI 27037: 2014 according to the framework reference Common Phases of Computer Forensics Investigation Models for in implement it into the Chain of Custody document. These results of this research are in the form of analysis of CCTV camera video recordings about the characteristics of digital evidence and metadata information used to provide a structured comprehensive explanation and reference data management information obtained from the results of digital forensic investigations that can be accounted for in court. Keywords: Digital Evidence, Live Forensic, Metadata, CCTV Camera, Chain of Custady.
APA, Harvard, Vancouver, ISO, and other styles
14

Savenko, A. S. "Formation of Intellectual Property Forensics in the System of the Russian Ministry of Justice." Theory and Practice of Forensic Science 15, no. 3 (October 23, 2020): 98–105. http://dx.doi.org/10.30764/1819-2785-2020-3-98-105.

Full text
Abstract:
The article analyses legal regulations of a forensic investigation into intellectual property o jects regarding the appointment of examinations of trademarks and service marks. The matter of necessity of specialized knowledge to conduct such investigations is addressed as well as current expert and judicial practice in this field. The author notes that forensic analysis of trade and service marks should be carried out as a part of a comprehensive examination in complex cases. The investigation should also include a sociological study.It is shown that the training of state forensic experts in the Russian Ministry of Justice system for intellectual property forensics, among other things to assess its value, will provide fully competent, unbiased, and independent experts and specialists in the field. The author proposes acknowledging and adding to the List of types of forensic examinations conducted in the Federal budget forensic institutions of the Russian Ministry of Justice the new type of forensic examinations – “Intellectual Property Forensics”.
APA, Harvard, Vancouver, ISO, and other styles
15

Syed Khurram Hassan and Hafiza Hadia Shehzad. "The Nanoforensic: An Advanced Perspective in Crime Investigation." International Journal for Electronic Crime Investigation 7, no. 1 (March 3, 2023): 33–38. http://dx.doi.org/10.54692/ijeci.2023.0701126.

Full text
Abstract:
Nano forensics is the advanced application of nanotechnology-based techniques to resolve cases in forensic science. Forensic science offers scientific methods in a criminal investigation. Nano-forensics deals with the development of new approaches for fingerprint visualization, DNA isolation, forensic toxicology, explosive detection, identification of body fluids, gunshot residue analysis, detection of illicit drugs, etc. The nanomaterials used in forensic science are nanocrystals, nanoparticles, quantum dots, nanobelts, nanocomposites, nanoclusters, nanotubes, nanorods, etc. The scope of nanotechnology is very wide.
APA, Harvard, Vancouver, ISO, and other styles
16

Al Jum'ah, Muhammad Na'im, Hamid Wijaya, and Rima Ruktiari Ismail. "Implementasi Model Digital Forensik Procces Untuk Sosial Media Investigation Dengan Tools Hunchly." Cyber Security dan Forensik Digital 6, no. 2 (February 1, 2024): 48–53. http://dx.doi.org/10.14421/csecurity.2023.6.2.4265.

Full text
Abstract:
Perkembangan teknologi yang semakin pesat dapat menjadi dampak posistif dan dapat negatif. Dampak positifnya adalah proses penyebaran informasi yang semakin cepat, namun dampak negatifnya adalah banyaknya informasi hoax dan hate space yang terjadi di media sosial akibat tidak adanya filter dan pengecekan keabsahan informasi. Hal ini juga mengakibatkan banyaknya tindak kejahatan yang terjadi di media sosial. Salah satu pemecahan masalah dengan banyaknya kasus yang terjadi akibat penyalahgunaan media sosial adalah dengan melakukan proses invesitgasi forensic pada social media. Proses investigasi forensik ini dilakukan dengan metode live investigation menggunakan metode digital forensik proses yang terdiri dari proses Collection, Examination, Analysis dan Reporting. Proses pengumpulan barang bukti dengan menggunakan tools hunchly sehingga dapat dilakukan proses investigasi secara langsung. Hasil dari penelitian ini adalah dengan memanfaatkan metode digital forensik proses dan penggunaan tools hunchly untuk melakukan teknik live investigation untuk melakukan pengumpulan bukti digital dari akun-akun media sosial yang melakukan tindak kejahatan di media sosial sehingga dapat di proses sesuai dengan peraturan hukum yang telah berlaku Kata kunci: Bukti Digital, Media Sosial, Digital Forensik, Hunchly ------------------------------------------------------------------- The increasingly rapid development of technology can have both positive and negatif impacts. The positive impact is that the process of disseminating information is getting faster, but the negatif impact is the large amount of hoax information and hate space that occurs on social media due to the absence of filters and checking the validity of the information. This also results in many crimes occurring on social media. One solution to the problem with the many cases that occur due to misuse of social media is to carry out a forensic investigation process on social media. This forensic investigation process is carried out using the live investigation method using a digital forensic process method consisting of Collection, Examination, Analysis and Reporting processes. The process of collecting evidence uses powerful tools so that the investigation process can be carried out directly. The results of this research are by utilizing digital forensic process methods and using hunchly tools to carry out live investigation techniques to collect digital evidence from social media accounts that commit crimes on social media so that it can be processed in accordance with applicable legal regulations. Keywords: Sosial Media, Digital Forensics, Hunchly
APA, Harvard, Vancouver, ISO, and other styles
17

Alansari, Iman S. "A Detection and Investigation Model for the Capture and Analysis of Network Crimes." Engineering, Technology & Applied Science Research 13, no. 5 (October 13, 2023): 11871–77. http://dx.doi.org/10.48084/etasr.6316.

Full text
Abstract:
Investigation in the field of network forensics involves examining network traffic to identify, capture, preserve, reconstruct, analyze, and document network crimes. Although there are different perspectives on the practical and technical aspects of network forensics, there is still a lack of fundamental guidelines. This paper proposes a new detection and investigation model for capturing and analyzing network crimes, using design science research. The proposed model involves six processes: identification, verification, gathering, preservation, examination, analysis, and documentation. Each process is associated with several activities that provide the investigation team with a clear picture of exactly what needs to be performed. In addition, the proposed model has a unique activity, namely reporting. As a result, this model represents a comprehensive approach to network forensics investigations. It is designed to work in conjunction with established forensic techniques to ensure that forensic evidence from the network is collected and analyzed efficiently and effectively following accepted forensic procedures. The proposed model was compared with existing models in terms of completeness, showing that it is complete and can be adapted to any type of network and legal framework.
APA, Harvard, Vancouver, ISO, and other styles
18

Shivdas, Sajin. "Introduction to Digital Forensics." International Journal for Research in Applied Science and Engineering Technology 11, no. 8 (August 31, 2023): 833–36. http://dx.doi.org/10.22214/ijraset.2023.55258.

Full text
Abstract:
Abstract: Crimes committed using computers are increasing rapidly, posing a challenge to law enforcement. Investigations including cybercrime, terrorism, and civil litigation all make use of digital forensics today. Because of the ever-increasing sophistication of modern technology, forensic investigations of this sort can quickly become difficult and time-consuming. In order to successfully retrieve meaningful digital evidence during such investigations, however, a standard framework for digital forensic professionals to follow must be developed. All appropriate steps that a digital forensic investigation would take should be highlighted by the framework and methodology used to conduct digital forensics. This study provides a system for conducting digital forensic investigations with an emphasis on the forensic aspects of those probes, the tools and procedures employed by examiners, and the significance of hashing in preventing the manipulation of evidence. Digital forensics, as a whole, is still a field that is widely growing along with the continually advancing world of technology. This form of forensics is one that is also growing in importance and necessity due to crimes stemming from digital devices becoming increasingly popular as well. These steady numbers are what have and will continue to drive the field of digital forensics into meeting its full potential on a consistent basis, in both a preventative and recovering manner. However, in order to recognize this potential, it is important to first understand what digital forensics really entails
APA, Harvard, Vancouver, ISO, and other styles
19

Kumar, Saurabh, S. K. Pathak, and Jagendra Singh. "A Comprehensive Study of XSS Attack and the Digital Forensic Models to Gather the Evidence." ECS Transactions 107, no. 1 (April 24, 2022): 7153–63. http://dx.doi.org/10.1149/10701.7153ecst.

Full text
Abstract:
Cyber Crime and fraud are growing at a rapid rate and the law practitioners require proper methodology to collect the digital evidences. When the criminals use digital platform in order to commit the crime, forensic examiners apply practical frameworks and methods to collect digital evidences. Digital forensics method involves the analysis of network traffic for detecting intrusions and investigating them. Different models have been proposed for the cyber crime investigation with the merits and demerit. This research paper explores cross-site scripting (XSS) attacks, features of the existing digital forensic investigation models and discusses some of the issues related to digital forensic research.
APA, Harvard, Vancouver, ISO, and other styles
20

Adesina, Adesoji A., Ayodele Ariyo Adebiyi, and Charles K. Ayo. "Identification of forensic artifacts from the registry of windows 10 device in relation to idrive cloud storage usage." Bulletin of Electrical Engineering and Informatics 11, no. 1 (February 1, 2022): 521–29. http://dx.doi.org/10.11591/eei.v11i1.3489.

Full text
Abstract:
The accessibility of cloud storage over the internet as a result of cloud computing technology provides the opportunity to store, share and upload data online with the use of digital devices which can be accessed anytime and anywhere. These benefits can also be exploited by the cybercriminals to perform various criminal activities including storing and exchanging of illegal materials on cloud storage platforms. The logs of malicious usages can be obtained from the cloud service providers for forensic investigations but the privacy issue among other factors make it difficult for such logs to be shared. Therefore, there is a need to perform client-side forensics to be able to carry out forensic investigation on digital devices as related to the activities on cloud storage. This study identifies relevant artifacts that can be forensically extracted from the registry of a window 10 device that accessed iDrive cloud storage. The study explores different experimental setups for the forensic analysis and adopted an integrated conceptual digital forensic framework in the investigation process to detect relevant forensic artifacts from the registry of a windows 10 device. This study increases the knowledge of cloud storage forensics and the significance of registry analysis during digital investigations.
APA, Harvard, Vancouver, ISO, and other styles
21

Baafi, Peter Oppong. "Tools For Cyber Forensics." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (July 2022): 285–90. http://dx.doi.org/10.22624/aims/crp-bk3-p46.

Full text
Abstract:
Digital Forensics & Cyber Security Graduate Programme Department Of Information Systems & Innovations Ghana Institute of Management & Public Administration Greenhill, Accra, Ghana E-mails: peeuncle3@gmail.com Phone: +233242776968 ABSTRACT Digital forensics, or Cyber security, has become a vital part of almost every research, and digital forensics tools' users are becoming more diverse in their backgrounds and interests. As a result, usability is an important section of these tools. This paper investigates the usability aspect of forensics tools. The study results highlight several usability issues that need to be considered when designing and implementing digital forensics tools. Cyber-attacks are fast-moving and surging in number and severity. When the attacks occur, the attacked enterprise responds with predetermined actions. Applying digital forensics helps in recovering and investigating material on digital media and networks is one of these actions. Cyber Forensic Investigation includes the Capture and Analysis of digital data either to prove or disprove whether the internet-related theft has been committed or not. Earlier, Computers were used only to store large volumes of data and perform many operations on them, but nowadays, it has expanded and occupied a prior role in Crime Investigation. To solve these cyber-related problems, the selection and usage of Forensic tools are essential. The developers have created many cyber forensic tools for better research and quick investigation. Cop departments and investigation agencies select the tools based on various factors, including budget and available experts on the team. This paper describes the different types of existing computer forensic tools and their usage. The article gives detailed information on all related works by other scholars in the area of this paper. Keywords: Digital Forensics; Forensics, GUI, User Interface, Digital Forensics, and its framework, Cyber forensics tools. BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Peter Oppong Baafi (2022): Toosl For Cyber Forensics Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 285-290 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P46
APA, Harvard, Vancouver, ISO, and other styles
22

Singh, Sakshi, and Suresh Kumar. "Qualitative Assessment of Digital Forensic Tools." Asian Journal of Electrical Sciences 9, no. 1 (May 5, 2020): 25–32. http://dx.doi.org/10.51983/ajes-2020.9.1.2372.

Full text
Abstract:
Forensic science is a study of science to criminals and civil laws. Digital forensics is the part of forensic science relating to proof found in computers and advanced storage media. Forensic examiners gather, protect and break down logical confirmations over the span of examination. Digital information contains data as content, pictures, sound, video and so on. These days numerous cybercrime cases, for example, hacking, banking cheats, phishing, email spamming, etc., have developed which are connected with a computerized information. Since the digital investigation is turning into an expanding concern, numerous digital forensic tools have been created to manage the difficulties of exploring computerized wrongdoings. The motivation behind digital forensics strategies is to look, protect and extract data on advanced frameworks to discover potential confirmations to exhibit them in the courtroom. In this paper, we have discussed five kinds of forensics namely Network Forensics, Live Forensics, Cyber Forensics, Database Forensics, and Mobile Forensics. The paper depicts a list of digital forensic tools in detail and looks at them based on the characterized parameters to figure out which tool suits better for any investigation. The paper looks at network, database and mobile forensic tools and examines the silent features and uniqueness of each of the tools along with their functionalities.
APA, Harvard, Vancouver, ISO, and other styles
23

Kovalev, Sergey Aleksandroviсh. "Allpying the Method of Criminalistc Computer Modeling in Crime Investigation." Webology 18, SI05 (October 30, 2021): 871–78. http://dx.doi.org/10.14704/web/v18si05/web18268.

Full text
Abstract:
The authors of this article reviewed certain issues, application features and development perspectives of criminalistic computer modeling in crime investigation. The article gives a more precise definition to the term “criminalistic computer modeling” and the strategy of automized crime investigation, reviews the existing programmed hardware-software complexes and forensic equipment, which use criminalistic computer modeling. Moreover, it outlines the possibility of using certain AI elements for building automized strategies to investigate particular types of crimes. Nowadays, forensics as a science needs to develop new tactics, methods and recommendations, as well as forensic equipment and software, based on modern computer technologies and the method of forensic computer modeling, including the use of AI elements, to make crime investigation more effective. This becomes particularly important during the pre-trial investigation stage, closely connected to the development of new forensic equipment and methods. In this regard, the issues of using criminalistic computer modeling in crime investigation demand special attention. The results of this research lead the authors to believe that the possibility of applying criminalistic computer modeling opens new prospects for using it in forensics, including the criminalistic methodology, which will increase the effectiveness of crime investigation and optimize the work of the investigator.
APA, Harvard, Vancouver, ISO, and other styles
24

Firdonsyah, Arizona, Purwanto Purwanto, and Imam Riadi. "Framework for Digital Forensic Ethical Violations: A Systematic Literature Review." E3S Web of Conferences 448 (2023): 01003. http://dx.doi.org/10.1051/e3sconf/202344801003.

Full text
Abstract:
Handling digital forensic cases plays a critical role in maintaining public interest and trust. However, the lack of an ethical code in digital forensics work processes can compromise the integrity and reliability of inspection results. This study aims to address this issue by conducting a systematic literature review (SLR) to explore existing standards for digital forensic frameworks. This study uses SLR techniques to identify and map various digital forensic investigation processes described in the literature. While there are some topics that address digital forensic frameworks in this review, we find it to be overwhelmingly focused on testing or evaluating digital forensic investigations. Unfortunately, the reviewed frameworks often neglected the code of ethics validation process, leaving the potential for ethical violations in the field of digital forensics. Integrating ethical considerations into existing frameworks is essential to ensure the credibility and reliability of digital forensic investigations. This study highlights the need to establish comprehensive policies and standards that include not only technical aspects but also ethical practices. In this way, digital forensics professionals can effectively maintain professional ethics, mitigate ethical violations, and restore public confidence in their findings. Future research should focus on the development and implementation of robust ethical frameworks in the field of digital forensics.
APA, Harvard, Vancouver, ISO, and other styles
25

AlShaer, Maryam, Khawla AlShehhi, and Samia Abdulla. "The Internet of Things (IoT) Forensic Investigation Process." Journal of Information Security and Cybercrimes Research 6, no. 2 (November 23, 2023): 150–61. http://dx.doi.org/10.26735/dbeu2801.

Full text
Abstract:
The Internet of Things (IoT), a rapidly evolving network of connected devices, is expected to grow to an astounding 41.6 billion units by 2025. This exponential growth, while beneficial in terms of data collection and exchange, has also increased the vulnerability of these devices to sophisticated cyberattacks, notably the Mirai botnet malware. This paper centers on the distinctive challenges posed in the field of IoT forensics. These challenges are primarily due to the intricate and diverse nature of IoT devices and ecosystems, which complicate the application of standard forensic tools and methodologies. One of the most significant hurdles in IoT forensics is data acquisition, considering the vast diversity of devices and the lack of specialized forensic tools tailored to these unique environments. The paper conducts a thorough literature review to explore these challenges in depth, aiming to not only provide a comprehensive understanding of the current state of IoT forensics but also to identify potential avenues for future research and development. It also highlights key strategies and solutions to enhance the security of IoT devices and to support forensic investigators in navigating the complexities of IoT ecosystems. Through this exploration, the paper contributes valuable insights and guidelines, poised to shape the advancement of IoT device security and forensic investigation techniques.
APA, Harvard, Vancouver, ISO, and other styles
26

Alhussan, Amel Ali, Arafat Al-Dhaqm, Wael M. S. Yafooz, Abdel-Hamid M. Emara, Shukor Bin Abd Razak, and Doaa Sami Khafaga. "A Unified Forensic Model Applicable to the Database Forensics Field." Electronics 11, no. 9 (April 23, 2022): 1347. http://dx.doi.org/10.3390/electronics11091347.

Full text
Abstract:
The Database Forensics Investigation (DBFI) field is focused on capturing and investigating database incidents. DBFI is a subdomain of the digital forensics domain, which deals with database files and dictionaries to identify, acquire, preserve, examine, analyze, reconstruct, present, and document database incidents. Several frameworks and models have been offered for the DBFI field in the literature. However, these specific models and frameworks have redundant investigation processes and activities. Therefore, this study has two aims: (i) conducting a compressive survey to discover the challenges and issues of the DBFI field and (ii) developing a Unified forensic model for the database forensics field. To this end, the design science research (DSR) method was used in this study. The results showed that the DBFI field suffers from many issues such as the lack of standardization, multidimensional nature, heterogeneity, and ambiguity, making it complex for those working in this domain. In addition, a model was proposed in this paper, called the Unified Forensic Model (UFM), which consists of five main stages: initialization stage, acquiring stage, investigation stage, restoring and recovering stage, and evaluation stage. Each stage has several processes and activities. The applicability of UFM was evaluated from two perspectives: completeness and implementation perspectives. UFM is a novel model covering all existing DBFI models and comprises two new stages: the recovering and restoring stage and the evaluation stage. The proposed UFM is so flexible that any forensic investigator could employ it easily when investigating database incidents.
APA, Harvard, Vancouver, ISO, and other styles
27

Rehman, Danish, and Er Jasdeep Singh. "A Study of Minimization of Cybercrimes by the Implementation of Cyber Forensics Tool Kit." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 1335–45. http://dx.doi.org/10.22214/ijraset.2022.40867.

Full text
Abstract:
Abstract: To identify whether the victim has committed a crime, both criminal and forensic investigators need the help of digital forensics. As a result, an investigator must use an adequate, accurate, affordable, and trustworthy cyber forensic tool for forensics investigations related to crimes. Digital forensics, also known as computer forensic analysis, computer analysis, and computer inspection, is the practise of painstakingly evaluating computer media (hard discs, diskettes, cassettes, and so on) for evidence. A comprehensive inspection by a qualified examiner may result in the reorganisation of a computer's operations. It's a step-by-step technique for investigating crimes utilising digital evidence employing scientific methodologies and processes. While many amazing solutions have been developed to protect our information communication networks, these devices require much more frequent updating. Individuals with both research abilities and a professional grasp of how the internet works, as well as those who know how to examine PC network security problems, are in great demand. This gives an attack-resistant investigative framework, as well as understanding of how the internet operates and the skills to assess cybercrime apparatus to discover who, what, when, why, and how. The study's findings led to the development of Digital Forensic tool solutions for investigators looking to expand their capabilities in using these tools. Keywords: Forensic, Cybercrime, investigation, toolkit
APA, Harvard, Vancouver, ISO, and other styles
28

Adesina, Adesoji, Ayodele Adebiyi, and Charles Ayo. "Detection and extraction of digital footprints from the iDrive cloud storage using web browser forensics analysis." Indonesian Journal of Electrical Engineering and Computer Science 26, no. 1 (April 1, 2022): 550. http://dx.doi.org/10.11591/ijeecs.v26.i1.pp550-559.

Full text
Abstract:
STorage as a <span>service (STaaS) allows its subscribers the ability to access their stored data with the use of internet enabled digital devices at anywhere, anyplace and anytime. The easy accessibility of cloud storage with digital devices is one of the major benefits of cloud computing but this benefit can also be exploited by cybercriminals to perform various forms of malicious usages. During forensic investigation, forensic examiners are expected to provided evidence in relation to the malicious usages but the physical inaccessibility to the digital artifacts on the cloud servers, the difficulty in retrieving evidential artifacts from various cloud storage services and the difficulty in obtaining forensic logs from the concerned cloud service providers among other factors make it difficult to perform forensic investigations. This paper provided step by step experimental guidelines to extract digital artifacts from Google Chrome and Internet Explorer from Windows 10 personal computer using iDrive cloud storage as a case study. The study used Nirsoft forensic tool to locate the relevant forensic artifacts and an integrated conceptual digital forensic framework was adopted to carry out the investigation. This study increases the knowledge of client forensics using web browser analysis during cloud storage forensic investigation.</span>
APA, Harvard, Vancouver, ISO, and other styles
29

Hikmatyar, Firmansyah Gustav, and Bambang Sugiantoro. "Digital Forensic Analysis on Android Smartphones for Handling Cybercrime Cases." IJID (International Journal on Informatics for Development) 7, no. 2 (January 7, 2019): 19. http://dx.doi.org/10.14421/ijid.2018.07204.

Full text
Abstract:
As the times progressed, forensic science has developed rapidly. The science of forensics extends to new areas of technology ranging from digital forensics, computer forensics and mobile forensics. Mobile forensics in analyzing and collecting data is obtained from various resources, such as operating systems, communication lines and also various storage media. The most popular mobile operating system of the day is a smartphone based on android operating system. With android technology, criminals can use that technology as a crime medium ranging from overriding crime ideas, crime targets and crime scenarios. In this Final Project use forensic mobile application to get data residing in cell phone actors, in the form of text, sound, picture and video that have or not yet deleted in smartphone. In this study, a model for investigating the crime scene is the author using the Generic Computer Forensic Investigation Model (GCFIM). On the GCFIM model the investigator may be able to return to the previous stage because of the possibility of a changeable situation (both physical and digital), the investigation tools used, the crime tools used, and the level of investigative expertise. In this research also added weighting method of word TF-IDF, where this method can help to find keyword in digital evidence in the form of word / text.
APA, Harvard, Vancouver, ISO, and other styles
30

Nortje, Jacobus Gerhardus J., and Daniel P. Bredenkamp. "A generic investigation process for South African commercial forensic practitioners." Journal of Financial Crime 27, no. 2 (January 20, 2020): 587–600. http://dx.doi.org/10.1108/jfc-06-2019-0077.

Full text
Abstract:
Purpose The purpose of this paper is to critically analyse and discuss the identification of a generic investigation process to be followed by the commercial forensic practitioner in South Africa. Design/methodology/approach This paper is a cross-sectional design that commenced with a review of the current available literature, highlighting the different approaches, processes and best practices used in local and international forensic practices. The methodology includes primary data collected with questionnaires from commercial forensic practitioner (N = 75) process users. Findings This paper identifies the following five distinct categories in the forensic investigation process, with sub-processes, namely, initiation, planning, execution, reporting and reflection. Research limitations/implications The study focuses only on the South African members of the Institute of Commercial Forensic Practitioners (ICFP) fraternity in South Africa as the ICFP is a leading body that, through membership, offers a recognised professional qualification in commercial forensics. Practical implications An investigation process for commercial forensic practitioners in South Africa could be used by the ICFP that would provide a governance structure for the ICFP. Originality/value The originality of this paper lies in setting out of an account of forensic accounting processes and best practices nationally and internationally. The missing knowledge is that no such research is known to have been conducted in South Africa. Currently, to the authors’ knowledge, no formalised investigation process exists. The contribution of the study is that by using an investigation process, it may enhance the quality of forensic investigations and contribute to the successful investigation and prosecution of commercial crime in South Africa that will be beneficial to all stakeholders.
APA, Harvard, Vancouver, ISO, and other styles
31

Altheyabi, Jasir Adel. "The Digital Forensic Tools Accuracy and Specifications." Academic Journal of Research and Scientific Publishing 3, no. 35 (March 5, 2022): 58–65. http://dx.doi.org/10.52132/ajrsp.e.2022.35.3.

Full text
Abstract:
The research aims to provide an overview of computer forensics, the history of computer forensics tools, and the accuracy and specifications of these tools. With the great and accelerating technological development, the reliance on the Internet has become greater and stronger than before. The world has become dependent on technology in all production and economic operations. And we talked in the second axis of the search for The Computer Forensic Legal Requirement, and Presentation of the tools used in the criminal investigation and an explanation of each tool. The digital forensic investigation tools that we will explain in this research are FTK. Forensic Toolkit, Prodiscovery, Autopsy, p2commander, OSForensics. We conclude that digital investigation tools have outstanding performance on different mediums. It has high accuracy and efficiency in digital investigation, and no single tool is superior to some other tools in all media. With more than one tool on a range of devices, it improves the investigation and testimony capabilities of examinees during exploration.
APA, Harvard, Vancouver, ISO, and other styles
32

Kutuzova, N. D., and E. I. Maiorova. "Environmental Forensic Science in the System of the Russian Ministry of Justice: Current State and Perspectives." Theory and Practice of Forensic Science 13, no. 3 (October 19, 2018): 94–98. http://dx.doi.org/10.30764/1819-2785-2018-13-3-94-98.

Full text
Abstract:
The paper examines the current state of environmental forensic science in the system of the RFCFS of the Russian Ministry of Justice. The authors highlight the courts’ growing demand for expert investigation of elements of the environment and whole ecosystems. The potential for developing environmental forensics in the system of forensic science organizations of the Russian Ministry of Justice is analyzed. The need for new structural divisions that would undertake environmental investigations on the territorial basis is demonstrated. Requirements are listed for the professional retraining of state environmental forensic scientists.
APA, Harvard, Vancouver, ISO, and other styles
33

Aramilev, S. V., E. S. Kiseleva, and P. V. Fomenko. "Forensic Investigation of Crimes Against the Amur Tiger and Other Animals: Problems and Solutions." Theory and Practice of Forensic Science 12, no. 3 (September 30, 2017): 105–9. http://dx.doi.org/10.30764/1819-2785-2017-12-3-105-109.

Full text
Abstract:
The late 20th century saw the development of a new special framework for the conservation of large mammals – both tigers and their prey, mostly ungulates, – along with their habitats in the Far East of Russia. Tightening controls on poaching, illicit trafficking and trade in wild animals and their parts, as well as enforcement of adequate penalties for these crimes rely on effective crime detection procedures and quality forensic investigation, which provides important grounds for prosecution. There are currently only four organizations conducting such forensic investigations within the geographic range of the Amur tiger.Efforts to facilitate forensic assistance have included production of the monograph “The Basics of Wildlife Forensics”, establishment of a veterinary treatment and diagnostic center for post-mortem examinations and a carcass storage facility for preservation of forensic evidence, and ongoing work to create biorepositories.However, there is still no streamlined system for state-supported forensic investigation of crimes against wildlife and forensic examinations of wild animals, their parts and derivatives.Such examinations should be conducted by specialized centers under designated conservation authorities of the constituent subjects of the Russian Federation, similar to the forensic bureaus of the Ministry of the Interior.
APA, Harvard, Vancouver, ISO, and other styles
34

Yousefsaber, Fatemeh, Zeinab Naseri, and Amir Hosein Hasani. "A Short Review of Forensic Microbiology." Avicenna Journal of Clinical Microbiology and Infection 9, no. 2 (June 29, 2022): 88–96. http://dx.doi.org/10.34172/ajcmi.2022.14.

Full text
Abstract:
Background: Microbial forensics is a multidisciplinary area, which has been recently considered an effective tool in forensic investigations. This growing field of forensics covers a wide spectrum of different branches of science, including biology, chemistry, physics, geology, mathematics, and computer sciences, leading to a practical approach that can be applied in several areas such as bioterrorist actions, environmental issues, emerging and reemerging diseases, as well as reliable trace evidence at a crime scene. Methods: The information has been gathered via Google Scholar using several keywords, including forensic microbiology, bioterrorism, forensic investigation, and trace evidence. The data were from reliable articles and books published over 50 years. This paper is a short review of forensic microbiology with a bioinformatics perspective to use in different fields such as the court. Results: It is known that using either microorganisms or their toxins is a low-cost potential tool with serious morbidity and mortality rates that can spread all around the world by food or water supplies or even through the air, making them a perfect candidate bioweapon with minimum traceability. Studies have indicated that environmental conditions plus biological and abiotic factors would affect the following analysis and the final validation, which is an essential step in the forensic investigation due to its highly effective role in the court vote. To face different challenges, law enforcement has the infrastructure for attribution and deterrence (e.g., following the exact microbial forensics program) so that it can be used in court. Developing more reproducible, sensitive, and accurate methods, preparing a wide reliable database, and devoting the right amount of budget will help improve the whole forensic procedure in the legal system. Conclusions: The current paper is a short review of how forensic scientists can use microbial features on a crime scene to clarify and enhance the procedure to solve different criminal cases.
APA, Harvard, Vancouver, ISO, and other styles
35

Rizal, Randi, Siti Rahayu Selamat, and Mohd Zaki Mas’ud. "An Overview Diversity Framework for Internet of Things (IoT) Forensic Investigation." JOIV : International Journal on Informatics Visualization 7, no. 2 (June 18, 2023): 569. http://dx.doi.org/10.30630/joiv.7.2.1520.

Full text
Abstract:
The increasing utilization of IoT technology in various fields creates opportunities and risks for investigating all cybercrimes. At the same time, many research studies have concentrated on security and forensic investigations to collect digital evidence on IoT devices. However, until now, the IoT platform has not fully evolved to adjust the tools, methods, and procedures of IoT forensic investigations. The main reasons for investigators are the characteristics and infrastructure of IoT devices. For example, device number variations, heterogeneity, distribution of protocols used, data duplication, complexity, limited memory, etc. As a result, resulting is a tough challenge to identify, collect, examine, analyze, and present potential IoT digital evidence for forensic investigative processes effectively and efficiently. Indeed, there is not fully used and adapted international standard for the perfect IoT forensic investigation framework. In the research method, a literature review has been carried out by producing previous research studies that have contributed to further facing challenges. To keep the quality of the literature review, research questions (RQ) were conducted for all studies related to the IoT forensic investigation framework between 2015-2022. This research results highlight and provides a comprehensive overview of the twenty current IoT forensic investigation framework that has been proposed. Then, a summary or contribution is presented focusing on the latest research, grouping the forensic phases, and evaluating essential frameworks in the IoT forensic investigation process to obtain digital evidence. Finally, open research issues are presented for further research in developing IoT forensic investigative framework.
APA, Harvard, Vancouver, ISO, and other styles
36

Jaiswal, A. K., and Saisha Nayyer. "DNA profiling in forensic investigation – A review." IP International Journal of Forensic Medicine and Toxicological Sciences 8, no. 1 (May 15, 2023): 14–22. http://dx.doi.org/10.18231/j.ijfmts.2023.003.

Full text
Abstract:
DNA Profiling is a revolutionary method for individual and relationship analysis, crime investigation, hereditary disorders, etc. It is a universal method used to establish accurate results during the process of forensic investigation. DNA profiling techniques, which are based on repetitive sequences within DNA, have proven to be of paramount importance, albeit the complete utilization of knowledge still remaining unexplored. Even a hair strand, blood drop or even skin flakes can be used to identify DNA sequences. It has a wide range of applications both in forensics and law. Because of the advancement in the field of forensics in the past four decades, DNA evidence now stands as one of the most reliable forms of proof in a court of law. In the following article, the authors explore the main concepts of DNA Profiling, and the techniques which are widely used in forensic laboratories such as RFLP, VNTR, STR, AFLP, mtDNA analysis, Y-chromosome analysis and gender typing.
APA, Harvard, Vancouver, ISO, and other styles
37

Thierry, Murangira B., and Fred K. "The Use of Forensic Evidences in Investigations and Prosecution in International Criminal Proceedings. Case Study of International Criminal Court (ICC)." International Journal of Forensic Sciences 9, no. 2 (2024): 1–18. http://dx.doi.org/10.23880/ijfsc-16000380.

Full text
Abstract:
From 1990s, a rising number of international and hybrid criminal tribunals and since 2002, the International Criminal Court have conducted various investigations on international crimes including crime against humanity, genocide and war crimes in various countries worldwide. These judicial organs have repeatedly relied upon witness’s testimonies, information and assistance from a wide variety of sources including governments, journalists, peacekeepers, human rights researchers and intelligence specialists and few forensic scientists, wherein some of these information and reports were driven by politics. Even though such information were very benefitting “there have also been many mishaps, misunderstandings in terms of differentiating information and evidence and missed opportunities in view of finding out the truth in way that information that could potentially have been of great use to criminal cases was lost or was collected or preserved in a manner that made it unusable at trial.” In today’s era, where there is a remarkable technological development in forensic science, it is time to use forensic methods in investigation of international crimes since a number of scientific and technological advances have improved the ability to document large-scale crimes with efficiency and precision. Yet, only in recent years have international criminal courts and other fact-finding institutions begun to embrace these innovations. There is a need of forensic science in investigating and prosecuting offenders of atrocities than traditional use of testimonies which are not easy to be relied on but still some legal and administrative issues still hinder the successful use of forensic evidences in investigating and prosecuting in international criminal proceedings. The present research focused on the practical use of forensic evidences like; pathology and DNA in exhumation of mass grave for determination of cause, manner and mechanism of death but to locate, excavate and exhume mass graves to produce forensic evidences of atrocities and to returning victims to loved ones and also discussed as tools for justice, humanitarian and documentation.The research also revealed the problems which are not only limited to the legal challenges of insufficiency of forensic evidence admissibility regulations and their maintenance of chain of custody, but also there are administrative issues like, lack of fund to be used during forensic investigation activities including, crime scene examination, collection of evidence and laboratory International Journal of Forensic Sciences 2 Thierry MB and Fred K. The Use of Forensic Evidences in Investigations and Prosecution in International Criminal Proceedings. Case Study of International Criminal Court (ICC). Int J Forens Sci 2024, 9(2): 000380. Copyright© Thierry MB and Fred K. examination of forensic evidence and all these can lead to unnecessary complications and prolongation criminal proceedings in international criminal court hence breach of fair trial principle. Finally, the research proposed reforms by establishing specific regulations related to the admissibility of forensic evidences in international criminal proceedings and chain of custody of forensic evidences as well as harmonizing the standard operating procedure of forensic investigation to regulate scientific investigation activities including, Crime Scene Management, Evidence Collection, Examination of forensic evidences and forensic expert report writing in investigation and prosecution of international criminal proceeding and also detailed mandate to solve administrative issues.
APA, Harvard, Vancouver, ISO, and other styles
38

Mantiri, Astria Santa Natalia, and Elvis Sumanti. "THE ROLE OF DIGITAL FORENSICS IN THE PRELIMINARY INVESTIGATION." Klabat Accounting Review 3, no. 1 (June 15, 2022): 79. http://dx.doi.org/10.60090/kar.v3i1.821.79-95.

Full text
Abstract:
In this era, technological developments have a significant influence in business. However, many taxpayers abuse the use of technology to commit fraud. Therefore, there needs to be a system that can filter and detect data of taxpayers who commit fraud. This research is conducted to analyze digital forensics' role in dealing with fraud and to determine the critical success factors that support the digital forensics in detecting fraud. This study uses qualitative reasearch where the author wanted to find out the role of Digital Forensics in the Preliminary Evidence Examination by interviewing the digital forensic officer in one of Tax Offices in Indonesia. The result proves that the role of digital forensics in the preliminary Investigation is crucial. The management and development of digital data can be carried out effectively with valid evidence through Digital Forensic activities (UU ITE). The skill of Digital Forensics officer in using programs to process data is essential in getting evidence. Taxpayer participation is also important in gathering evidence. The amount of digital evidence collected will be used through analysis and development by using chain of custody method, where this method can ensure the integrity of the data processed to convince the court in making decisions. Keywords: Digital Forensic, Preliminary Investigation, Tax Audit, Tax Fraud
APA, Harvard, Vancouver, ISO, and other styles
39

Amparbeng, Maxwell. "Inaccessibility of Services as a Threat to Forensic Analysis." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (July 20, 2022): 29–34. http://dx.doi.org/10.22624/aims/crp-bk3-p5.

Full text
Abstract:
Computer and Internet-based crimes are widespread problems that affect a vast number of individuals. Combating such criminals has become a difficult task for competent authorities, as it has enabled a new wave of criminal activity. This phenomenon has drew the attention of security and justice systems all over the world, and these institutions must now deal with the task of reforming and redefining the laws and methodologies used to investigate computer-related criminal activity (Garfinkel, 2010). On the other hand cybercriminals are also making use of existing technologies or systems and new means or techniques to make cybercrime detection, investigation and prevention very difficult. The paper will look at anti-forensics strategies such as data concealment, artefact erasure, trail obfuscation, and attacks on the forensic instruments themselves. Investigators must deal with anti-forensics approaches on a regular basis as digital forensics becomes more significant in current investigations. This article will explore the challenges that investigators and forensic practitioners face when conducting investigations. Keywords: Digital Forensics, Cloud Computing, Cloud Service Provider, Full Disk Encryption
APA, Harvard, Vancouver, ISO, and other styles
40

O. A., Leonenko, Yesypenko O. H., and Rakhilchuk І.V. "Modern legal and organizational principles for the development of judicial examination in crime investigation." Scientific Herald of Sivershchyna. Series: Law 2020, no. 2 (December 18, 2020): 93–101. http://dx.doi.org/10.32755/sjlaw.2020.02.093.

Full text
Abstract:
The scientific article is devoted to the problems of using forensic examinations and their results in the pre-trial investigation. Perspective directions of development of criminology according to its components are defined. The current state of develop-ment of forensic technology, tools and cybernetics in general, which is successfully used in forensics makes it possible to use retinal schemes to register criminals. It is noted that the development of forensic technologies involves the develop-ment of information retrieval programs, such as Automated Workplaces (AWP) for pre-trial investigation units of Ukraine, as well as other persons authorized to in-vestigate, reference information programs. It is effective to use global satellite positioning systems (JPS devices) while in-vestigating crimes, ZD laser scanners when inspecting the scene, as small elec-tronic devices allow you to capture the geographical coordinates of any point, loca-tion of objects at the scene, the distance between them rather quickly. A new step in forensics in the near future will be the use of "latent fingerprint" (LTF) technology, which will greatly simplify the identification of criminals. Methods of forensic examination in criminal proceedings and their improve-ment using the latest technologies that use computer programs such as "Photoro-bot", the use of audio and video, polygraph, spectrograph, etc. to reproduce human memory and the development of forensic technology, which involves development of information retrieval programs. These new approaches and knowledge used by forensics are a necessary con-dition for the rapid detection of the crime, detection and seizure of physical evi-dence for their further expert studying. The use of the latest achievements of forensic technology in the detection of hidden traces is the key to the formation of a quality evidence base and identifica-tion of a particular person during the pre-trial investigation. Key words: forensics, forensics theory, crime investigation, criminological means of research.
APA, Harvard, Vancouver, ISO, and other styles
41

Kausar Parveen. "Digital Investigations: Navigating Challenges in Tool Selection for Operating System Forensics." International Journal for Electronic Crime Investigation 8, no. 1 (March 13, 2024): 79–92. http://dx.doi.org/10.54692/ijeci.2024.0801189.

Full text
Abstract:
The process of gathering, identifying, extracting, and documenting electronic evidence for use in court is known as "digital forensics." We have a lot of tools at our disposal to make this procedure quick and straightforward. Four tools have been selected for investigation and analysis in this work. For every kind of digital forensics, the top tools have been selected based on several criteria. For computer forensic tools, (Stellar and Forensic Tool Kit) have been investigated; for network forensic tools, Network Map has been selected, and OSF mount has been examined as a live forensic tool. Other forensic tool types, such as database, operating system, and mail forensic tools, are also covered in this work. The role of Artificial intelligence in Digital Forensic tools has been discussed in this paper by using both Decision Stump and Bayes net machine learning techniques. After making an investigation of the IoT device traffic dataset using these two techniques, Decision Stump gives us less accurate results compared with Bayes net.
APA, Harvard, Vancouver, ISO, and other styles
42

Cinar, Burak, and Jasmin Praful Bharadiya. "Cloud Computing Forensics; Challenges and Future Perspectives: A Review." Asian Journal of Research in Computer Science 16, no. 1 (May 24, 2023): 1–14. http://dx.doi.org/10.9734/ajrcos/2023/v16i1330.

Full text
Abstract:
Cloud computing has become increasingly popular in recent years, evolving into a computing paradigm that is both cost-effective and efficient. It has the potential to be one of the technologies that has had the most significant impact on computing throughout its history. Regrettably, cloud service providers and their customers have not yet developed major forensic tools that can assist with the investigation of criminal conduct that occurs in the cloud. Because it is difficult to prevent cloud vulnerabilities and criminal targeting, it is necessary to be aware of how digital forensic investigations of the cloud may be carried out. This is because cloud vulnerabilities and criminal targeting are difficult to avoid. In this context, the current study examines current and future trends in cloud forensics, methodology for cloud forensics, and cloud forensic tools. In addition, the study also looks at cloud forensic approaches.
APA, Harvard, Vancouver, ISO, and other styles
43

Febriani, Nyimas Chairunnisa, and Alek Wijaya. "Komparasi Kejahatan di Twitter dan Instagram dengan Pendekatan Digital Forensic Investigation." Jurnal Bina Komputer 5, no. 1 (June 30, 2023): 33–40. http://dx.doi.org/10.33557/jbkom.v3i2.1478.

Full text
Abstract:
Semakin meningkat perkembangan teknologi dalam kehidupan sehari-hari, maka semakin meningka pula tindak kejahatan dalam sosial media. Salah satu media sosial yang sering menjadi sasaran kejahatan ialah twitter dan instagram. Adapun digital forensic investigation merupakan bagian ilmu forensic yang melingkupi penemuan dan investigasi data yang ditemukan pada perangkat digital atau juga dikenal sebagai Ilmu Forensik Digital, yang mana merupakan salah satu cabang ilmu forensic yang berfokus pada penyelidikan dan penemuan konten perangkat digital dan seringkali dikaitkan dengan kejahatan komputer. Dengan begitu melalui pendekatan digital forensic investigation terhadap twitter dan instagram diharapkan dapat menjadi tolak ukur bahaya terkait komparasi kejahatan pada twitter dan instagram. Metode yang akan digunakan yaitu National Institute of Justice (NIJ) dengan tahapan berikut Collection, Examination, Analysis dan Reporting. Metode berikut diharapkan dapat menghasilkan bukti digital forensik yang dapat mengetahui komparasi kejahatan pada media sosial twitter dan instagram.
APA, Harvard, Vancouver, ISO, and other styles
44

Fayyad-Kazan, Hasan, Ale Hejase, Imad Moukadem, and Sondos Kassem-Moussa. "Verifying the Audio Evidence to Assist Forensic Investigation." Computer and Information Science 14, no. 3 (July 5, 2021): 25. http://dx.doi.org/10.5539/cis.v14n3p25.

Full text
Abstract:
Audio forensics is a field in forensics that is used to authenticate, enhance, and analyze audio files to aid in solving different crime investigations. Audio as a forensic evidence must be enhanced and analyzed to be admissible in courts of law. But more importantly, it must be authenticated in order to prove that it is authentic and no manipulations were done to it. In this paper, an overview on audio forensics is presented, previous related work to this topic is shown, and methodologies for audio enhancement and authentication are explained along with audio tampering ways and signatures presentation.
APA, Harvard, Vancouver, ISO, and other styles
45

Amanbayeva, Altynay. "ANALYSIS OF THE FORMATION AND DEVELOPMENT OF MODERN TRENDS IN FORENSIC METHODS OF INVESTIGATING CRIMES AGAINST SEXUAL INVIOLABILITY OF MINORS." Review of Law Sciences 5, no. 4 (December 24, 2021): 156–62. http://dx.doi.org/10.51788/tsul.rols.2021.5.4./wkzv4480.

Full text
Abstract:
The article is devoted to modern trends in the forensic methods of investigating crimes against the sexual inviolability of minors. Statistics show that most of these crimes are committed at home and by people from close associates. The author identifies the reasons for the complexity of the investigation of crimes against the sexual inviolability of minors. In connection with the “natural aging” of forensic methods of investigating crimes, the formation and development of new modern directions is required, taking into account the specifics of crimes against the sexual inviolability of minors. In particular, the necessity of developing a unified methodology for the investigation of such crimes is substantiated. The achievements of forensic science, which are a reflection of the dynamics of criminal law and criminal procedural relations, can serve as a basis. The analysis made it possible to conclude that the modern forensic methodology for investigating crimes against the sexual inviolability of minors has not yet been fully formed. The digital age is changing the behavior of children and possibly increasing their vulnerability. The emergence of new forms of violence necessitates further detailing of the private methodology for investigating crimes against the sexual inviolability of minors. In particular, cases of committing crimes of this category using the Internet have become more frequent (Articles 121, 124 of the Criminal Code of the Republic of Kazakhstan). And here international cooperation is required to develop a common for all appropriate terminology and description of the constituent elements of various forms of these acts, as well as their legal status. At the national level, the development of a national computer investigation strategy is required. The conclusion is made about the need for further development and detailing of modern directions of forensic methods of investigation of the considered group of crimes, in particular, digital forensics.
APA, Harvard, Vancouver, ISO, and other styles
46

Quist, Albert. "Digital Forensic Challenges in Internet of Things (IoT)." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (July 23, 2022): 119–24. http://dx.doi.org/10.22624/aims/crp-bk3-p20.

Full text
Abstract:
With emerging technology and the connection of electronic devices to the internet, Internet of Things (IoT) has become part of human life. From the development of smartphones to smartwatches and smart-homes, electronic devices now have the capability of performing human activities or aiding humans in performing activities such as turning hall lights on or off with their voice. Although a large number of people use these devices for the greater good, a few individuals or group of people hide behind these devices to perform malicious activities. In order to apprehend and prosecute perpetuators who hide behind smart devices for evil gains, forensic examinations or investigations must be conducted. This review aims to identify digital forensic challenges in IoT. The inclusion criteria for this paper were international journals, articles, conference papers and case studies published from 2019 to 2022. Thematic analysis was used to analyze and synthesis the literature. Three themes emerged from the analysis; automated compromised smart-home tracer; data volatility and reconstruction; IoT forensic investigation framework. This integrative review combines evidence of digital forensic challenges in diverse IoT devices. Keyword IoT forensics, IoT challenges, Digital forensics, Smart-home forensics.
APA, Harvard, Vancouver, ISO, and other styles
47

Bouafif, Hana, Faouzi Kamoun, and Farkhund Iqbal. "Towards a Better Understanding of Drone Forensics." International Journal of Digital Crime and Forensics 12, no. 1 (January 2020): 35–57. http://dx.doi.org/10.4018/ijdcf.2020010103.

Full text
Abstract:
Unmanned aerial vehicles (drones) have gained increased popularity as their innovative uses continue to expand across various fields. Despite their numerous beneficial uses, drones have unfortunately been misused, through many reported cases, to launch illegal and sometimes criminal activities that pose direct threats to individuals, organizations, public safety and national security. These threats have recently led law enforcement agencies and digital forensic investigators to pay special attention to the forensic aspects of drones. This important research topic, however, remains underexplored. This study aims to further explore drone forensics in terms of challenges, forensic investigation procedures and experimental results through a forensic investigation study performed on a Parrot AR drone 2.0. In this study, the authors present new insights on drone forensics in terms of forensic approaches, access to drone's digital containers and the retrieval of key information that can assist digital forensic investigators establish ownership, recuperate flight data and gain access to media files.
APA, Harvard, Vancouver, ISO, and other styles
48

Taubkin, I. S. "On the Special Conceptual Framework for the Fire Forensics." Theory and Practice of Forensic Science 15, no. 3 (October 23, 2020): 76–88. http://dx.doi.org/10.30764/1819-2785-2020-3-76-88.

Full text
Abstract:
The article addresses the issues of the particular terminology for fire forensic investigations. Definitions for the basic parameters of a fire hazardous area, determining its susceptibility to ignition, and their relationship to the impulses initiating such areas’ combustion are analyzed.Two main tasks of forensic fire examinations are reviewed: establishing the technical cause of a fire, its organizational cause, and consequences. The author gives definitions for these tasks and the term “ignition source”.The paper’s relevance stems from the need to prevent mistakes in terminology when conducting a forensic fire investigation. The article may be of use for practicing experts and specialists in fire forensics’ theory and practice.
APA, Harvard, Vancouver, ISO, and other styles
49

Sodhi, Gurvinder Singh, and Jasjeet Kaur. "Forensic Investigation of Explosions: A Review." Journal of Forensic Chemistry and Toxicology 5, no. 2 (December 15, 2019): 137–42. http://dx.doi.org/10.21088/jfct.2454.9363.5219.7.

Full text
Abstract:
An explosion is defined as a violent, shattering action caused by a bomb. The main chemical ingredient of a bomb is the explosive – an endothermic substance which serves as a storehouse of energy. When this energy is suddenly released, in the confined space of the bomb, it causes a devastating effect, resulting in loss of lives and property. As compared to conventional crime scenes, explosion sites are more difficult to process. In many cases a building may have collapsed and the crime scene evidence may have become buried beneath the debris. A vital aspect of forensic investigation of bomb blasts is to establish the explosion seat. Equally important is to identify the type of chemical explosives used to commit the crime. This communication highlights the complications encountered in the management of explosion sites and the difficulties experienced in processing the evidence collected there from. The types of injuries which the victims of explosion suffer are also briefly described.
APA, Harvard, Vancouver, ISO, and other styles
50

Saleh, Muhammed, Siti Hajar Othman, Maha Driss, Arafat Al-dhaqm, Abdulalem Ali, Wael M. S. Yafooz, and Abdel-Hamid M. Emara. "A Metamodeling Approach for IoT Forensic Investigation." Electronics 12, no. 3 (January 19, 2023): 524. http://dx.doi.org/10.3390/electronics12030524.

Full text
Abstract:
The Internet of Things (IoT) Investigation of Forensics (IoTFI) is one of the subdomains of Digital Forensics that aims to record and evaluate incidents involving the Internet of Things (IoT). Because of the many different standards, operating systems, and infrastructure-based aspects that make up the Internet of Things industry, this sector is extremely varied, ambiguate, and complicated. Many distinct IoTFI models and frameworks were developed, each one based on a unique set of investigation procedures and activities tailored to a particular IoT scenario. Because of these models, the domain becomes increasingly complicated and disorganized among those who perform domain forensics. As a result, the IoTFI domain does not have a general model for managing, sharing, and reusing the processes and activities that it offers. With the use of the metamodeling development process, this work aims to create an Internet of Things Forensic Investigation Metamodel (IoTFIM) for the IoTFI domain. Utilizing the metamodeling development process allows for the construction and validation of a metamodel and the verification that the metamodel is both comprehensive and consistent. The IoTFIM is divided into two phases: the first phase identifies the problem, and the second phase develops the IoTFIM. It is utilized to structure and organize IoTFI domain knowledge, which makes it easier for domain forensic practitioners to manage, organize, share, and reuse IoTFI domain knowledge. The purpose of this is to detect, recognize, extract, and match various IoTFI processes, concepts, activities, and tasks from various IoTFI models in an IoTFIM that was established, facilitating the process of deriving and instantiating solution models for domain practitioners. Utilizing several metamodeling methodologies, we were able to validate the generated IoTFMI’s consistency as well as its applicability (comparison against other models, frequency-based selection). Based on the findings, it can be concluded that the built IoTFIM is consistent and coherent. This makes it possible for domain forensic practitioners to simply instantiate new solution models by picking and combining concept elements (attribute and operations) based on the requirements of their models.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography