Journal of Advanced Forensic Sciences
Latest Publications


TOTAL DOCUMENTS

7
(FIVE YEARS 1)

H-INDEX

0
(FIVE YEARS 0)

Published By Open Access Pub

2692-5915

2021 ◽  
Vol 1 (2) ◽  
pp. 15-26
Author(s):  
Donald L. Buresh

The purpose of this essay is to compare and contrast the cyber-attacks on Estonia, Georgia, and Ukraine, including tactics, techniques, procedures, and effects. The paper states that none of the models will probably be repeated. The thesis is that cyber-attacks will change as technology changes. In other words, past cyber-attacks operations, particularly in Estonia, Georgia, and Ukraine, are not good predictors of future cyber-attack activity.


2020 ◽  
Vol 1 (2) ◽  
pp. 7-14
Author(s):  
Donald L. Buresh

This paper evaluates the effect of the Estonian cyber incident on Estonia, Russia, the United States, the European Union, and the North Atlantic Treaty Organization, also known as NATO. The paper employs the Valeriano and Maness criteria for evaluating a cyber incident critically. The article asks how did the Estonian cyber incident come to pass, what were the foreign policy and international relationship effects, what was the impact on Estonia, and how did Estonia react to the attack. The essay concludes that the Estonian cyber incident was a catalyst, prompting the nations listed herein to address the effects of cyber-attacks, and then search for acceptable solutions.


2020 ◽  
Vol 1 (2) ◽  
pp. 1-6
Author(s):  
Donald L. Buresh

This paper attempts to answer the question of how government agencies use The Onion Router, or Tor, in conducting investigations. The essay observes that Tor is free open-source software that can be used by anyone who desires to communicate with others in a secure manner. In surveying the literature, it is found that Tor can be employed for both legal and illegal purposes. As the major financial contributor, Tor is used by government to secure its communications. Because Tor by bad actors, and because many of the Tor relays are operated by government agencies, Tor has been successfully employed in catching unsuspecting criminals. The conclusion of this exposition is that if one wants to communicate securely with someone else, and not be visible to government agencies, Tor should not be the vehicle of choice. There are alternative modes of communication that can thwart the risk of government surveillance.


2020 ◽  
Vol 1 (1) ◽  
pp. 30-38
Author(s):  
Donald L. Buresh

The question that this paper answer is whether the Illinois Reporter’s Privilege should protect an online blogger. The definitions of the terms “reporter,” “news medium,” and “source” quoted from 735 ILCS 5/8-902, followed by several examples. Second, a brief history of journalism is presented, where it is demonstrated that for hundreds of years, journalists and publishers alike engaged in their profession with little formal training, but rather with a sincere desire to convey the facts and the truth to their peers. Second, the essay outlines how Illinois and federal courts have employed the privilege in case law. In answering the question, the work examines whether WikiLeaks qualifies under the Illinois Reporter’s Privilege. The position taken is that the answer is yes. The idea is that if WikiLeaks qualifies under the privilege, then other online blogs also qualify. The opinion of the author is that the law is sufficient as it stands. There is no need to change its wording. Finally, some loose ends are discussed before reiterating the conclusion that the Illinois Reporters’ should not be changed.


2020 ◽  
Vol 1 (1) ◽  
pp. 18-29
Author(s):  
Donald L. Buresh

This paper attempts to answer the question of whether digital terrorism, also known as cyberterrorism, exists. The paper defines terrorism both in the conventional and digital sense. It then gives a short history of conventional terrorism, dating back two thousand years and ending with the terrorist activities in several third-world nations. The essay then discusses digital terrorism, highlighting the Estonian, Georgian, and Ukrainian cyber-attacks. The work concludes that digital terrorism does indeed exist, but that the future is uncertain in the sense that future cyber-attacks will probably not resemble past attacks as the technology advances.


2020 ◽  
Vol 1 (1) ◽  
pp. 10-17
Author(s):  
Siniša Franjić

Fire is an uncontrolled combustion that causes material damage and endangers human lives. Combustion is a chemical process that causes the oxidation of the fuel constituents of a some kind fuel. It is a process between fuel and oxidants in which heat is generated due to changes in chemical constituents. By releasing heat, it may occur light in the form of annealing or flame. There are accidental and arson fires. This work is dedicated to all firefighters in the world who very often find themselves in situations where they save the lives of others while neglecting their own safety. Firefighters are the heroes of modern times.


2020 ◽  
Vol 1 (1) ◽  
pp. 1-9
Author(s):  
Ashraful Mozid ◽  
Nelufer Yesmen

Cybercrime is one of the fastest-growing criminal activities in contemporary age. The first recorded cybercrime happened in France in the year 1820. It was not as sophisticated as cybercrime we know in our world today, but, still, that was a crime. Cybercrime has evolved globally as the online platform is progressing. While progress is made in the battle against cybercrime there still remains a wide gap in the consistency of laws across international borders. The main objectives of this study are to explore the nature of cybercrime in developing countries, find out the cyber threats for terrorist activities and explain cybercrime and threats from criminological aspects. This is a descriptive study which is based on secondary data. This study is based on previous researches & studies. this paper discusses the nature of cybercrime in developing countries. It could allow developed countries to understand better the national and international effects of that cyber threats, to determine the conditions of current regional and international agreements, and to help countries create a sound legal framework. And then we notice the impact of cyber threats all over the world. At last, we discuss cybercrime from criminological point of view. Cybercrime is not limited to two neighboring countries and cross-border conflicts; an attempt could be conducted from another world. It is fearful to see cyber wars as the easiest way to carry out sabotaging rather than wars such as cold war, chemical and biological wars, terrorist wars or jihadist attacks. The international legal framework aims by the International Criminal Court to keep offenders accountable for their actions. The government has by far the biggest burden and obstacle in raising knowledge of cybercrime among the people.


Sign in / Sign up

Export Citation Format

Share Document