A Complexity Based Forensic Analysis of the Trojan Horse Defence

Author(s):  
Richard E. Overill ◽  
Jantje A.M. Silomon
Author(s):  
Edward G. Bartick ◽  
John A. Reffner

Since the introduction of commercial Fourier transform infrared (FTIR) microscopic systems in 1983, IR microscopy has developed as an important analytical tool in research, industry and forensic analysis. Because of the frequent encounter of small quantities of physical evidence found at crime scenes, spectroscopic IR microscopes have proven particularly valuable for forensic applications. Transmittance and reflectance measurements have proven very useful. Reflection-absorption, specular reflection, and diffuse reflection have all been applied. However, it has been only very recently that an internal reflection (IRS) objective has been commercially introduced.The IRS method, also known as attenuated total reflection (ATR), has proven very useful for IR analysis of standard size samples. The method has been applied to adhesive tapes, plastic explosives, and general applications in the analysis of opaque materials found as evidence. The small quantities or uncontaminated areas of specimens frequently found requiring forensic analysis will often be directly applicable to microscopic IRS analysis.


2008 ◽  
Vol 39 (12) ◽  
pp. 14
Author(s):  
CHARLESE. CRUTCHFIELD
Keyword(s):  

2020 ◽  
Vol 5 (1) ◽  
pp. 33-37
Author(s):  
Zahra Sina ◽  
Nadia Abdullahi

Personal hygiene products are used on a daily basis by many people. Many are comparable to the Trojan horse. On the outside, they appear to be harmless. They are contained in attractive bottles and they rely on misleading ads to attract consumers. However, these products may contain potentially harmful chemicals and many people are unaware of how individuals, societies and environments are affected in the various stages of the life cycle of many personal hygiene products. Our STSE issue deals with an everyday product that falls under the Trojan horse analogy–lotion. We are concerned that our peers and other young adults are purchasing lotions without the knowledge of how they came to stand on the shelves of a store. We conducted a correlation study between gender and popular lotion brands among teenagers and the reasons behind their choices. We came to the conclusion that more females than males were interested in popular lotion brands due to enticing features that targets mainly feminine interests (e.g. scent is an aspect of lotion that more females than males consider when purchasing the brand). For our actions, we prepared an educational mind-map on our issue and a video compilation where we interviewed female students on their reactions to various lotion brand commercials. Our actions are meant to inform the public about the controversies surrounding our issue and the techniques companies use to gain the attention of potential consumers.


2018 ◽  
Vol 5 (2) ◽  
pp. 73-83
Author(s):  
Hussein Abed Ghannam

WhatsApp is a giant mobile instant message IM application with over 1billion users. The huge usage of IM like WhatsApp through giant smart phone “Android” makes the digital forensic researchers to study deeply. The artefacts left behind in the smartphone play very important role in any electronic crime, or any terror attack. “WhatsApp” as a biggest IM in the globe is considered to be very important resource for information gathering about any digital crime. Recently, end-to-end encryption and many other important features were added and no device forensic analysis or network forensic analysis studies have been performed to the time of writing this paper. This paper explains how can we able to extract the Crypt Key of “WhatsApp” to decrypt the databases and extract precious artefacts resides in the android system without rooting the device. Artefacts that extracted from the last version of WhatsApp have been analysed and correlate to give new valuable evidentiary traces that help in investigating. Many hardware and software tools for mobile and forensics are used to collect as much digital evidence as possible from persistent storage on android device. Some of these tools are commercial like UFED Cellebrite and Andriller, and other are open source tools such as autopsy, adb, WhatCrypt. All of these tools that forensically sound accompanied this research to discover a lot of artefacts resides in android internal storage in WhatsApp application.


2015 ◽  
Vol 2 (1-2) ◽  
pp. 161-166 ◽  
Author(s):  
Michael W. Macy
Keyword(s):  

FORUM ◽  
2014 ◽  
Vol 56 (3) ◽  
pp. 457
Author(s):  
SARAH BARTON ◽  
RICHARD HATCHER
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document