742 results on '"Chain of custody"'
Search Results
2. A Bibliometric Analysis and Systematic Review of a Blockchain-Based Chain of Custody for Digital Evidence
- Author
-
Onyeashie, Belinda I., Leimich, Petra, McKeown, Sean, Russell, Gordon, Akan, Ozgur, Editorial Board Member, Bellavista, Paolo, Editorial Board Member, Cao, Jiannong, Editorial Board Member, Coulson, Geoffrey, Editorial Board Member, Dressler, Falko, Editorial Board Member, Ferrari, Domenico, Editorial Board Member, Gerla, Mario, Editorial Board Member, Kobayashi, Hisashi, Editorial Board Member, Palazzo, Sergio, Editorial Board Member, Sahni, Sartaj, Editorial Board Member, Shen, Xuemin, Editorial Board Member, Stan, Mircea, Editorial Board Member, Jia, Xiaohua, Editorial Board Member, Zomaya, Albert Y., Editorial Board Member, Tan, Zhiyuan, editor, Wu, Yulei, editor, and Xu, Min, editor
- Published
- 2024
- Full Text
- View/download PDF
3. Chain of Custody and Evidence Integrity Verification Using Blockchain Technology.
- Author
-
Miller, Adir and Singh, Avinash
- Abstract
The validity and integrity of digital evidence and the chain of custody are crucial to all digital forensic investigations. All new evidence and access logs of the original evidence should be logged in a document called the 'chain of custody'. This document shows the timeline of any piece of evidence from the time it was recorded until the end of the investigation. In a traditional digital investigation, trusted parties, such as an investigator, are allowed access to the digital evidence and follow a strict process when dealing with data. These trusted parties have the capability to alter the data making the evidence inadmissible in a court of law. Alternatively, these trusted parties may also alter the data accidentally or with malicious intent, due to a lack of transparency and non-repudiation. Blockchain technology can solve this issue, however, existing research shows that adopting blockchain does not provide adequate transparent access control mechanisms. Consequently, this makes blockchain difficult to adopt due to the one-to-one mapping and the inability to easily validate the chain of custody and evidence admissibility. Current methodologies rely on an external off-chain access control mechanism, which, regrettably, remains susceptible to potential breaches that could compromise its integrity and validity. This paper proposes an enhanced model to provide access control through smart contracts, ensuring immutability, flexibility, transparency, and non-repudiation of both the access control mechanisms and the digital evidence itself. This is achieved by moving the access control mechanism to the blockchain. This tracks any changes made through the access control mechanism, further ensuring transparency and integrity. This smart contract-based access control builds off role-based access control, allowing for more complex hierarchies to be used. This model aims to allow for both modularity, making adoption easier for existing digital forensic tools, and encouraging digital investigation and litigation to become more streamlined. Existing tools can easily integrate with the proposed model adding an extra layer of non-repudiation, transparency, and integrity. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. Potential applicability of blockchain technology in the maintenance of chain of custody in forensic casework
- Author
-
Harsh Patil, Ravshish Kaur Kohli, Sorabh Puri, and Pooja Puri
- Subjects
Blockchain ,Chain of custody ,Cyber security ,Digital evidence ,Decentralized technology ,Encryption ,Law in general. Comparative and uniform law. Jurisprudence ,K1-7720 ,Medicine (General) ,R5-920 - Abstract
Abstract Background Proper investigation of digital evidence is of prime significance in cyber investigations. From the collection of evidence, its preservation, and its analysis, it is important to maintain its integrity in the legal system due to the involvement of different stakeholders like law enforcement agencies, digital analysts, and the judiciary. This review paper focuses on how blockchain technology can be used to collect evidence efficiently. Main text In the present scenario, the manual logs of the chain of custody are used to ensure that the evidence remains confidential and transparent. It is accompanied by filling out the application forms and maintaining logs within the organization handling the evidence. Hence, it is important to ensure the validity, integrity, and verifiability of evidence as it moves through different hierarchical levels. There are certain issues associated with the current chain of custody, such as evidence loss, theft, tampering, and, even worse, evidence manipulation inside the system. To avoid this situation and to make the process coherent, this review paper aims to highlight the potential use of blockchain technology to preserve chain of custody. Conclusion Although this scientific technology is mainly used to run cryptocurrencies, with careful consideration and application, this could play a key role in supporting and managing the chain of custody. It is a distributed database that keeps track of blocks. These blocks are collection of entries that keep growing continually and are secured from editing and manipulation by retaining the hash of the previous block in the chain. This is a decentralized technology that is not easily compromised in terms of security and therefore has the potential to solve our problem area. A future research agenda needs to be established, which lays the solid foundation for further studies on this evident emerging area.
- Published
- 2024
- Full Text
- View/download PDF
5. Potential applicability of blockchain technology in the maintenance of chain of custody in forensic casework.
- Author
-
Patil, Harsh, Kohli, Ravshish Kaur, Puri, Sorabh, and Puri, Pooja
- Abstract
Background: Proper investigation of digital evidence is of prime significance in cyber investigations. From the collection of evidence, its preservation, and its analysis, it is important to maintain its integrity in the legal system due to the involvement of different stakeholders like law enforcement agencies, digital analysts, and the judiciary. This review paper focuses on how blockchain technology can be used to collect evidence efficiently. Main text: In the present scenario, the manual logs of the chain of custody are used to ensure that the evidence remains confidential and transparent. It is accompanied by filling out the application forms and maintaining logs within the organization handling the evidence. Hence, it is important to ensure the validity, integrity, and verifiability of evidence as it moves through different hierarchical levels. There are certain issues associated with the current chain of custody, such as evidence loss, theft, tampering, and, even worse, evidence manipulation inside the system. To avoid this situation and to make the process coherent, this review paper aims to highlight the potential use of blockchain technology to preserve chain of custody. Conclusion: Although this scientific technology is mainly used to run cryptocurrencies, with careful consideration and application, this could play a key role in supporting and managing the chain of custody. It is a distributed database that keeps track of blocks. These blocks are collection of entries that keep growing continually and are secured from editing and manipulation by retaining the hash of the previous block in the chain. This is a decentralized technology that is not easily compromised in terms of security and therefore has the potential to solve our problem area. A future research agenda needs to be established, which lays the solid foundation for further studies on this evident emerging area. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. ADATKINYERÉS CBRN KÖRNYEZETBEN.
- Author
-
Izabella, KAKUJA
- Subjects
CRIME scenes ,PERSONAL belongings ,DIGITAL media ,ELECTRONIC evidence ,DATA extraction - Abstract
Copyright of Safety & Security Sciences Review / Biztonságtudományi Szemle is the property of Obuda University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
7. The Impact of the New Institution of the Criminal Expert Examination on Medical Criminal Proceedings.
- Author
-
Chien-Yu Liao
- Abstract
The norms for the examination of criminal experts were one of the topics of the National Conference on Judicial Reform in 2017, and after 6 years, a new institution has finally emerged. The originally expected examination institution, according to which the defendant could authorise a private expert for the examination, was changed to the authorisation of a private institute as an examination expert. Regarding the written expert opinion, it was expected that the expert examiner could appear in court and be cross-examined. However, this would only happen in exceptional cases. As expert testimony is widely used in medical litigation, it would be necessary to understand it and realise the effect that the new institution could have. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. Variability of the declared recycled content by changing allocation methods: A case study on plastic waste recycling
- Author
-
Francesco Caraceni, Elisabetta Abbate, Carlo Brondi, Martino Colonna, Giovanni Dotelli, and Andrea Ballarino
- Subjects
Circular economy ,Plastic waste recycling ,Mass balance ,Recycled content ,Traceability ,Chain of Custody ,Environmental sciences ,GE1-350 ,Environmental effects of industries and plants ,TD194-195 - Abstract
The Chain of Custody (CoC) standard tracks the recycled content (RC) of products, in most cases using the Mass Balance model. This model freely allows the selection of allocation methods and timeframes for the RC evaluation. Our work opens a discussion on the potential effects of this freedom in the RC evaluation. Firstly, we defined the general model representing the viable allocation methods and timeframe, and secondly, we applied the model to a case study. The mass balance model simplifies the monitoring of RC and encourages companies to use recycled materials. However, we outline the need for actions on stricter RC calculation and reporting, for instance, by reducing the timeframe of mass balance calculation or promoting the controlled blending model, which guarantees the physical presence of RC in the product. The results provide a basis for policymakers to set requirements for RC evaluation.
- Published
- 2024
- Full Text
- View/download PDF
9. Global bamboo forest certification: The state of the art
- Author
-
Yanxia Li, Yanjie Hu, and Kun Li
- Subjects
Sustainable forest management ,Bamboo ,Certification ,Chain of custody ,Trade ,Forestry ,SD1-669.5 - Abstract
Illegal logging is an important cause of deforestation and forest degradation. As a voluntary market-driven mechanism, sustainable forest management certification aims to reduce illegal logging in forests and promote sustainable management practices by creating a transparent, independent tracing and auditing mechanism. To date, around 11% of global forest areas have been certified under forest certification schemes. Biologically, bamboo belongs to the grass family and is classified as a non-timber forest product. Owing to its high fibre quality, many bamboo panel-based products, such as flooring, furniture, and kitchenware, are traded as alternatives to timber products in the global market. Forest certification is widely acknowledged as a means of ensuring the sustainability and legality of forest sources by European countries and the United States, which are the largest importers of bamboo products. Therefore, certified bamboo and its products are often required to meet the legal requirements and public procurement policies when entering these markets. Currently, 48 valid Forest Stewardship Council (FSC) bamboo forest management certificates and 3237 valid bamboo FSC Chain of Custody (CoC) certificates have been issued, while only 1 bamboo forest management and 3 bamboo CoC certificates have been documented in PEFC (Program for the Endorsement of Forest Certification) online database. Here, we describe the current development of global bamboo forest certification in terms of certification standards, practices, and markets; analyze challenges and future trends; and offer recommendations for creating interest in this issue and taking further action.
- Published
- 2024
- Full Text
- View/download PDF
10. Letter to the editor: 'Potential applicability of blockchain technology in the maintenance of chain of custody in forensic casework'
- Author
-
Nishchal Soni
- Subjects
Blockchain technology ,Digital forensics ,Chain of custody ,Evidence management ,Law in general. Comparative and uniform law. Jurisprudence ,K1-7720 ,Medicine (General) ,R5-920 - Published
- 2024
- Full Text
- View/download PDF
11. A five-stage framework for sustainability certification for fashion brands: Can a standardised approach work in the fashion industry?
- Author
-
Baker, Kelly and McNeill, Lisa S.
- Abstract
Sustainability certification is one means to address environmental and social issues present in fashion supply chains, whilst bridging the knowledge gap between brands and consumers. However, despite increased urgency to improve social, ethical and environmental practices in this industry, little is understood about how ethical fashion brands currently utilise sustainability certification, in an increasingly saturated, and often unregulated, labelling environment. This study examines choice of sustainability certifications, certification process, and use of labelling, by a range of Australasian fashion brands who promote sustainability as a core part of their customer-facing image. The research identifies a five-stage framework for sustainability certification, as well as indicating failures of current systems relative to user needs. The study develops and offers a proposal for a standardised taxonomy of fashion sustainability labelling that could be adapted, irrespective of firm size, sales revenue of garment and textile types. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
12. Blockchain-Based Criminal Information Management System in Sri Lanka.
- Author
-
B., Brahanawardhan, S. N., Wijayarathne, M. N. H., Ahmed, M., Thushitharan, Pandithage, Dinithi, and Yapa, Kanishka
- Subjects
INFORMATION resources management ,BLOCKCHAINS ,FINANCIAL crises ,TECHNOLOGICAL innovations ,ARTIFICIAL neural networks ,ARTIFICIAL intelligence ,MACHINE learning - Abstract
Due to the current economic crisis in Sri Lanka, people's lifestyles are in difficult conditions. Due to this, crimes are increasing rapidly. The graph of criminal activities is steadily increasing in the country because of an economic crisis and the globalization of ultra-modern technology. In many industries today, blockchain applications are being explored as a secure and costeffective method to manage a distributed database and keep track of all types of digital transactions. In Sri Lanka, the existing criminal information management system is a traditional paper-basis approach. Storing, retrieving, and updating criminal records are highly time-consuming. As a result, it causes many drawbacks. To address the drawback, our team is proposing blockchain-based technology for a criminal information management system called “CRYSIS.” Blockchain can take the position of the accumulation of criminal records with a network where criminal records information is easily accessible within the organization, secure, and cannot be altered. A P2P (peerto-peer) network called blockchain aids in the decentralization of criminal records. As a result, to maintain a ledger to prevent a single point of failure (SPOF), and all the criminal records will be updated and validated in real-time. Because they are easily accessible and unbreakable, decentralized networks with straightforward algorithms are safe and cryptographically secured. Blockchain's peer-to-peer network facilitates the sharing of information within organizations. To ensure criminal records' confidentiality and integrity, this system will be built on the immutability feature of blockchain. By developing this blockchain-based system, the corruption of risk factors can be reduced. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
13. Survey on Forestry and Sources of Wood
- Author
-
Sauter, Udo Hans, Scheiding, Wolfram, Merkle, Dieter, Managing Editor, Niemz, Peter, editor, Teischinger, Alfred, editor, and Sandberg, Dick, editor
- Published
- 2023
- Full Text
- View/download PDF
14. Letter to the editor: “Potential applicability of blockchain technology in the maintenance of chain of custody in forensic casework”
- Author
-
Soni, Nishchal
- Published
- 2024
- Full Text
- View/download PDF
15. Supply chain traceability using blockchain.
- Author
-
Azevedo, Pedro, Gomes, Jorge, and Romão, Mário
- Abstract
In the current global marketplace supply chains can span a huge number of countries, cross many borders and require interoperation of a multitude of organizations. This vastness of supply chains impacts business competitiveness since it adds complexity and can difficult securing traceability, chain of custody and transparency. We propose that assuring chain of custody and traceability via Blockchain (BC) allows organizations to demonstrate product provenance, integrity and compliance. This work proposes that to effect true traceability the more complete approach is to connect both the Supply Chain Actors (SCAs) and products identifications using digital certificates. A Blockchain is used to manage the traceability of products and validation of the identities. Importing, verifying and storing the certificates uses an off-chain data storage solution for products certificates, IDs and data (i.e., WalliD). To create, validate the certificates and setup the chain of trust a Public Key Infrastructure (PKI) was designed as part of the proposal. Our study follows a Design Science research approach aimed to analyse the requirements and propose a solution to a more complete traceability in supply chains. The results were architectural artifacts, including an Ethereum Smart Contract and a PKI based certificate authentication system. The implementation of these deliverables allow for a supply chain system that can provide decentralized and trustful assurance of the provenance, chain of custody and traceability functionalities for all the Organizations and also for the final consumers. To exemplify the problem and demonstrate the applicability of the solution, its potential and benefits we applied it to a real food supply chain use case that already uses provenance certificates and stored them in the blockchain using the before mentioned SmartContract to assure and demonstrate the chain of custody and traceability of the food produce. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
16. A cadeia de custódia da prova e o relatório de inteligência financeira do COAF/UIF: repercussões do Recurso Extraordinário n° 1.055.941/SP no âmbito probatório.
- Author
-
Oliveira Araújo, Matheus
- Abstract
Copyright of Revista Brasileira de Direito Processual Penal is the property of Instituto Brasileiro de Direito Processual Penal and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
- Full Text
- View/download PDF
17. Exploring Blockchain Technology for Chain of Custody Control in Physical Evidence: A Systematic Literature Review.
- Author
-
Batista, Danielle, Mangeth, Ana Lara, Frajhof, Isabella, Alves, Paulo Henrique, Nasser, Rafael, Robichez, Gustavo, Silva, Gil Marcio, and Miranda, Fernando Pellon de
- Subjects
BLOCKCHAINS ,DIGITAL forensics ,ELECTRONIC evidence ,PROBLEM solving ,FINANCIAL services industry - Abstract
Blockchain technology, initially known for its applications in the financial industry, has emerged as a promising solution for various other domains. One prominent area for the use of blockchain-based solutions is forensics, specifically the chain of custody maintenance and control. While there have been numerous research projects exploring the use of blockchain technology in digital forensics, limited attention has been given to its application in controlling of the physical evidence chain of custody. In this research, we aim to explore the literature on the use of blockchain technology to solve problems related to the physical evidence chain of custody. Through a systematic literature review (SLR), we analyzed 26 resources discussing blockchain-based solutions for evidence chain of custody issues, based on requirements that could be applied to both physical and digital evidence. The results showed that there is a lack of studies involving the use of blockchain technology to solve problems related to the physical evidence chain of custody, and future research should focus on solving the issue. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
18. Mechanism to Handle Mobile Devices in Cyber Security Investigations.
- Author
-
Kumar, Abhishek, Senapati, Kishore Kumar, and Patnaik, K. Sridhar
- Subjects
INTERNET security ,LAW enforcement agencies ,COMPUTER crime prevention ,TELEPHONE companies ,CELL phones ,CRIME scenes ,LAW enforcement - Abstract
Smartphones play an extensive position withinside most company investigations into cyber intrusions. Investigations from the Law Enforcement additionally contain cellular gadgets sporting crucial proof that could assist carry the case to its logical conclusion. Smartphones are utilized in several crook justice contexts. The company presents mobile telephones to lots of its personnel as a part of their task duties, and the BOYD (carry your very own tool) idea is broadly adopted, permitting customers to get admission to workplace applications (like Outlook, Skype, etc.) the usage of their very own transportable gadgets. Based on forensic proof from research starting from conventional crimes (homicide, robbery, kidnapping, etc.) to technological crimes like cybersecurity incidents on company-huge cellular facilities, unlawful get admission to or exchanges, or facts theft, the cybercrime inquiry unit can be required to capture the cellular gadgets and ship them to FLS for added analysis. The chain of custody high-quality practices for securing mobile telephones, iPads, company cellular telephones, and BYOD gadgets in a manner that protects the integrity of the proof and is consequently suited in courtroom docket are in short defined on this paper. This paper's chain of custody technique was created especially for cellular platforms which require specific application of mind and use of tools in the reconstruction of the scene of crime as well as management of the evidence due to the variety of operating systems and nature of dynamic evidence which mobile devices have. The necessities of the commercial enterprise and regulation enforcement agencies that might use the record for normal cellular tool investigations in India have been taken into consideration while it was being developed. This paper has been written retaining in view the necessities of each enterprise in addition to the Law Enforcement Agencies to apply it for his or her everyday cybersecurity investigations concerning cellular gadgets. [ABSTRACT FROM AUTHOR]
- Published
- 2023
19. Ensuring accountability in digital forensics with proxy re-encryption based chain of custody
- Author
-
Patil, Rachana Y., Patil, Yogesh H., Bannore, Aparna, and Ranjanikar, Manjiri
- Published
- 2024
- Full Text
- View/download PDF
20. The Hospital of the Future and Security: An Arranged Marriage
- Author
-
Diamond, Alexis, Grama, Joanna Lyn, Tietjen, Jill S., Series Editor, and Hudson, Florence D., editor
- Published
- 2022
- Full Text
- View/download PDF
21. An Effective Approach to the Cross-Border Exchange of Digital Evidence Using Blockchain
- Author
-
López-Aguilar, Pablo, Solanas, Agusti, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Hirche, Sandra, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Möller, Sebastian, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Zhang, Junjie James, Series Editor, Saponara, Sergio, editor, and De Gloria, Alessandro, editor
- Published
- 2022
- Full Text
- View/download PDF
22. Chain of Custody: Scaling the Investigation to the Event
- Author
-
Sisodia, Usha, Singh, Jaskaran, editor, and Sharma, Neeta Raj, editor
- Published
- 2022
- Full Text
- View/download PDF
23. Management of Digital Evidence for Cybercrime Investigation—A Review
- Author
-
Harshwardhan, Chougule, Sunny, Dhadiwal, Mehul, Lokhande, Rohit, Naikade, Patil, Rachana, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Reddy, V. Sivakumar, editor, Prasad, V. Kamakshi, editor, Wang, Jiacun, editor, and Reddy, K.T.V., editor
- Published
- 2022
- Full Text
- View/download PDF
24. Collaborative Integrity Verification for Blockchain-Based Cloud Forensic Readiness Data Protection
- Author
-
Salami, Omoniyi Wale, Abdulrazaq, Muhammad Bashir, Adedokun, Emmanuel Adewale, Yahaya, Basira, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Misra, Sanjay, editor, Oluranti, Jonathan, editor, Damaševičius, Robertas, editor, and Maskeliunas, Rytis, editor
- Published
- 2022
- Full Text
- View/download PDF
25. Digital Evidence Security System Design Using Blockchain Technology.
- Author
-
Sunardi and Kusuma, Ridho Surya
- Subjects
ELECTRONIC evidence ,BLOCKCHAINS ,COMPUTER crimes ,K-means clustering ,COMPUTER access control - Abstract
Digital evidence plays an essential role in meeting the forensic need to uncover cybercrime and search for trace information of perpetrators. Digital evidence is vulnerable to system changes, human error, theft, deletion, and data manipulation, requiring security efforts to maintain authenticity. This study offers optimization of the chain of custody systems to maintain digital evidence integrity using authentication applications connected to the website server database. The design of the chain of custody system uses blockchain technology and K-means clustering algorithm. This research process consists of two stages. The first stage is the prototype of blockchain-based user access authentication applications. The second stage is the implementation of K-means clustering to determine the place of data storage according to its classification. The results of this study are the maximum security for blockchain-based chain of custody with the efficiency value of this application of 94.73% and the system load value of 0.223%. The total cost of deploying the application is 0.026702786 ETH. Based on this research can help to secure digital evidence information. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
26. A IMPORTÂNCIA DA CADEIA DE CUSTÓDIA NA PRESERVAÇÃO DO LOCAL DO CRIME: REVISÃO DE LITERATURA.
- Author
-
Franhan de Macena, Heloisa Marina and Ribeiro Duarte, Anna Carolina
- Subjects
CRIME scenes ,LITERATURE reviews ,EXPERT evidence ,CRIMINAL evidence ,PROFESSIONAL ethics - Abstract
Copyright of Revista Saúde is the property of Revista Saude and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
- Full Text
- View/download PDF
27. Recommendations for procedures related to the evidence chain of custody in forensic anthropology in Brazil.
- Author
-
Damascena, Nicole Prata, Calmon Silva, Melina, Deitos, Alexandre Raphael, Baldasso, Rosane Pérez, Ferreira, Renata Cristina Grangeiro, Kotinda Júnior, Cristian, and Palhares Machado, Carlos Eduardo
- Subjects
FORENSIC anthropology ,CRIMES against humanity ,VIOLENT deaths ,ARCHAEOLOGICAL human remains ,HUMAN rights violations ,SPANISH language - Abstract
Forensic anthropologists perform specialised analysis, mainly involving skeletonised human remains, cadavers in advanced stages of decomposition, disassociated elements from the human body, and human remains in extreme carbonisation. The main objectives of the forensic anthropology expertise are human identification and assisting in determining the cause and manner of death. Estimating the time since death is also a priority for some cases, especially ones involving missing persons. This science works on individual cases, violent deaths, missing persons, mass disasters, suspected violations of human rights, and crimes against humanity. Forensic anthropological evidence is, in general, very sensitive. Thus, it is important to detail aspects relevant to the maintenance of the chain of custody at all phases of the investigation, as well as standardise the actions of the individuals involved. This aims to preserve the evidence integrity and sameness (Sameness: free translation of the Portuguese word "mesmidade", derived from a Spanish word that does not possess a translation to Portuguese. Sameness of evidence is understood as the guarantee that the evidence under valuation (or under analysis of its probative value) is exactly and integrally the same one which was collected, corresponding, therefore, to "the same" (and not "part of", "derived from"), safeguarding its value. Brazil Law No. 13.964 of 14 December 2019 establishes and lists 10 phases related to the evidence chain of custody that must be followed. These newly introduced requirements resulted in the need for adaptation of the forensic, investigative, and legal actors involved in an investigation, and in the detailed description of the procedures for the different areas related to criminalistics, including forensic anthropology. The information provided in this article should be interpreted as recommendations, even though their non-compliance may weaken the investigative and forensic analysis processes in whole or in part. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
28. Improving Uncertainty in Chain of Custody for Image Forensics Investigation Applications
- Author
-
Hany M. Elgohary, Saad M. Darwish, and Saleh Mesbah Elkaffas
- Subjects
Blockchain ,chain of custody ,digital evidence ,fuzzy hash ,image forensic ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Cybercrime investigations rely heavily on digital evidence to establish links between suspects and the criminal conduct they are allegedly involved in. As a result, digital evidence must be protected since it is complex, volatile, and susceptible to alteration. In the digital evidence method, the chain of custody (CoC) is essential. As a result of the CoC, it is possible to establish that the evidence was never tampered with. Due to the inherent uncertainty of digital evidence, the trustworthiness of the CoC cannot be judged at this time. It is the duty of forensic examiners to challenge this inclination and publicly admit the inherent ambiguity in whatever evidence they use to make their decisions. This article suggests a new paradigm for maintaining the integrity of digital evidence in order to overcome these challenges. To handle the uncertainty generated by error-prone technologies while dealing with CoC documents, the new paradigm used a fuzzy hash inside the blockchain data structure. Traditional hashing methods are only able to tell whether two inputs are precisely the same or not because they are sensitive to even the smallest input changes. Using fuzzy hash functions, we can figure out how dissimilar two images are by comparing their similarities. As an example of how this paradigm may be applied to computer systems and make digital investigations more successful, we utilize image forensics as the focus of an in-depth look at how it works.
- Published
- 2022
- Full Text
- View/download PDF
29. E-Voting
- Author
-
Gray, Gerald R. and Gray, Gerald R.
- Published
- 2021
- Full Text
- View/download PDF
30. Blockchain Based Framework to Maintain Chain of Custody (CoC) in a Forensic Investigation
- Author
-
Sarishma, Gupta, Abhishek, Mishra, Preeti, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Singh, Mayank, editor, Tyagi, Vipin, editor, Gupta, P. K., editor, Flusser, Jan, editor, Ören, Tuncer, editor, and Sonawane, V. R., editor
- Published
- 2021
- Full Text
- View/download PDF
31. Blockchain and Artificial Intelligence Managing a Secure and Sustainable Supply Chain
- Author
-
Pimenidis, Elias, Patsavellas, John, Tonkin, Michael, Masys, Anthony J., Series Editor, Bichler, Gisela, Advisory Editor, Bourlai, Thirimachos, Advisory Editor, Johnson, Chris, Advisory Editor, Karampelas, Panagiotis, Advisory Editor, Leuprecht, Christian, Advisory Editor, Morse, Edward C., Advisory Editor, Skillicorn, David, Advisory Editor, Yamagata, Yoshiki, Advisory Editor, Jahankhani, Hamid, editor, Jamal, Arshad, editor, and Lawson, Shaun, editor
- Published
- 2021
- Full Text
- View/download PDF
32. Exploring technologies to better link physical evidence and digital information for disaster victim identification.
- Author
-
Lovell, David, Vella, Kellie, Muñoz, Diego, McKague, Matt, Brereton, Margot, and Ellis, Peter
- Subjects
DISASTER victims ,ELECTRONIC evidence ,MANAGEMENT information systems ,FORENSIC pathology ,INFORMATION resources management ,PATIENT preferences ,ELECTRONICS recycling - Abstract
Disaster victim identification (DVI) entails a protracted process of evidence collection and data matching to reconcile physical remains with victim identity. Technology is critical to DVI by enabling the linkage of physical evidence to information. However, labelling physical remains and collecting data at the scene are dominated by low-technology paper-based practices. We ask, how can technology help us tag and track the victims of disaster? Our response to this question has two parts. First, we conducted a human–computer interaction led investigation into the systematic factors impacting DVI tagging and tracking processes. Through interviews with Australian DVI practitioners, we explored how technologies to improve linkage might fit with prevailing work practices and preferences; practical and social considerations; and existing systems and processes. We focused on tagging and tracking activities throughout the DVI process. Using insights from these interviews and relevant literature, we identified four critical themes: protocols and training; stress and stressors; the plurality of information capture and management systems; and practicalities and constraints. Second, these findings were iteratively discussed by the authors, who have combined expertise across electronics, data science, cybersecurity, human–computer interaction and forensic pathology. We applied the themes identified in the first part of the investigation to critically review technologies that could support DVI practitioners by enhancing DVI processes that link physical evidence to information. This resulted in an overview of candidate technologies matched with consideration of their key attributes. This study recognises the importance of considering human factors that can affect technology adoption into existing practices. Consequently, we provide a searchable table (as ) that relates technologies to the key considerations and attributes relevant to DVI practice, for readers to apply to their own context. While this research directly contributes to DVI, it also has applications to other domains in which a physical/digital linkage is required, and particularly within high stress environments with little room for error. Disaster victim identification (DVI) processes require us to link physical evidence and digital information. While technology could improve this linkage, experience shows that technological "solutions" are not always adopted in practice. Our study of the practices, preferences and contexts of Australian DVI practitioners suggests 10 critical considerations for these technologies. We review and evaluate 44 candidate technologies against these considerations and highlight the role of human factors in adoption. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
33. Forensic entomology in research and practice: an overview of forensic experts' perceptions and scientific output in Brazil.
- Author
-
Guimarães, Stephanie Evelyn França, Steindorff, Gabriela Streppel, de Lima Bicho, Carla, Farias, Rodrigo Cesar Azevedo Pereira, and Vasconcelos, Simão Dias
- Subjects
- *
FORENSIC entomology , *CRIMINAL evidence , *INSECT larvae , *CRIMINAL investigation , *CRIME scenes , *SENSORY perception , *DEAD - Abstract
Given the growing demands for standardization of procedures for collection, preservation, and identification of insect specimens, this study aimed to identify how forensic entomology is used in Brazil and the perceptions of professionals involved in this process. We conducted: (1) bibliometric survey of the scientific production of forensic specialists from 2001 to 2020; (2) questionnaire applied to forensic professionals to verify their perceptions about the use of entomological evidence in practice. An increase in publications on Forensic Entomology was noticed in the last 5 years, mainly in the South and Northeast regions. Of the 82 respondents to the questionnaire, 62.8% deal with cadavers at least once a week, but 89.0% of the professionals who examine cadavers weekly find less than 10.0% colonized by insect larvae. Using entomological evidence to estimate PMI was mentioned by only 36.6% of the professionals. Most respondents stated no procedures related to collecting, handling, or identifying necrophagous insects in their daily practice. Regarding the chain of custody, 64.6% said they were aware of the changes in the regulations involving the collection and maintenance of forensic evidence. We emphasize the importance of collaboration between scientists at universities and crime scene examiners. Although the use of entomological evidence in criminal investigations in Brazil is still scarce, a growing interest in this area can be detected among forensic experts. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
34. Toward Court-Admissible Sensor Systems to Fight Domestic Violence
- Author
-
Campos Gaviño, Miguel Ángel, Larrabeiti López, David, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Dziech, Andrzej, editor, Mees, Wim, editor, and Czyżewski, Andrzej, editor
- Published
- 2020
- Full Text
- View/download PDF
35. Quality Control in Forensic DNA Typing
- Author
-
Badiye, Ashish, Kapoor, Neeti, Kathane, Prachi, Shukla, Ritesh K., Shrivastava, Pankaj, editor, Dash, Hirak Ranjan, editor, Lorente, Jose A., editor, and Imam, Jahangir, editor
- Published
- 2020
- Full Text
- View/download PDF
36. Forensic DNA Evidence: From Crime Scene to Conviction
- Author
-
Badiye, Ashish, Kapoor, Neeti, Shrivastava, Pankaj, Shrivastava, Pankaj, editor, Dash, Hirak Ranjan, editor, Lorente, Jose A., editor, and Imam, Jahangir, editor
- Published
- 2020
- Full Text
- View/download PDF
37. DNA Technologies in Criminal Investigation and Courts
- Author
-
Machado, Helena, Granja, Rafaela, Machado, Helena, and Granja, Rafaela
- Published
- 2020
- Full Text
- View/download PDF
38. Securing The Chain Of Custody And Integrity Of Data In A Global North-South Partnership To Monitor The Quality Of Essential Medicines
- Author
-
Natalie Meyers, Associate Director of Operations, Lucy Family Institute for Data and Society, University of Notre Dame, Kathleen Hayes, University of Notre Dame, Ayenew Ashenef, Assistant Professor at Addis Ababa University, Ethiopia, Timothy Johann, Associate Professor of Chemistry at Roanoke College, Christopher Sweet, Associate Director, Cyberinfrastructure Development, Center for Research Computing, University of Notre Dame, and Marya Lieberman, Professor at University of Notre Dame
- Subjects
chain of custody ,data integrity ,blockchain in healthcare ,counterfeit drugs ,supply chain fraud ,fraudulent drugs ,verifying vaccines ,provenance of drugs ,managing health data on the blocckchain ,blockchain supply chain drug pilot ,blockchain research from emerging nations ,Computer applications to medicine. Medical informatics ,R858-859.7 - Abstract
The annual ConV2X is a leading international health tech symposium driving real world evidence, strategy, research, operations and trends to create a blueprint for a new digital health era. The 2021 symposium featured a scientific program of academic/research presentations in addition to business and industry talks. The research track focused on exploring and sharing developments in blockchain and emerging technologies in health and clinical medicine. Submissions were based on original research, conceptual frameworks, proposed applications, position papers, case studies, and real-world implementation. Selection was based on a peer-review process. Faculty, students, and industry researchers were encouraged to submit abstracts to present ideas before an informed and knowledgeable audience of industry leaders, policy makers, funders, and researchers. This presentation was selected by the scientific review committee. Submission Review Committee • Dave Kochalko, CEO of ARTiFACTS • Anjum Khurshid, UT Austin • Carlos Caldas, UT Engineering • Gil Alterovitz, Harvard Medical School • Kayo Fujimoto, UT Health Houston • Lei Zhang, University of Glasglow • Sean Manion, CSciO of ConsenSys Health • Vijayakuman Varadarajan, University of South Wales • Vikram Dhillon, Wayne State University • Yuichi Ikeda, Kyoto University
- Published
- 2022
- Full Text
- View/download PDF
39. Double disappearance: A problem that increases the forensic crisis in Mexico
- Author
-
Dra. Isabel Beltrán-Gil
- Subjects
Disappearance ,Double disappearance ,Negligence ,Chain of custody ,Identification ,Criminal law and procedure ,K5000-5582 - Abstract
Enforced disappearances in Mexico are due to criminal violence, but also to the State’s negligence, and its corresponding authorities and institutions, that elude their legal functions of keeping and guarding unidentified bodies in order to guarantee the pertinent investigations. The incorrect application of procedures leads to the commission of illegalities that give rise to the loss of unidentified bodies, making impossible or difficult for the relatives of the victims to recover them. This situation lays the foundations for double disappearance in Mexico, based on the omission of state responsibilities or its acquiescence with criminal networks.
- Published
- 2022
- Full Text
- View/download PDF
40. Postorbital discard and chain of custody: The processing of artifacts returning to Earth from the International Space Station.
- Author
-
Walsh, Justin St P., Gorman, Alice C., and Castaño, Paola
- Subjects
- *
SPACE stations , *CARGO handling , *CARGO ships , *FREIGHT & freightage , *MATERIAL culture - Abstract
Few items that comprise the material culture of the International Space Station ever return to Earth. Most are left on the station or placed on cargo resupply ships that burn up on atmospheric re-entry. This fact presents a challenge for archaeologists who use material culture as their primary evidence. Together with a sociologist, we observed the processes that have been developed by NASA contractors to handle and return items that come back to Earth on the Cargo Dragon vehicle. We observed two missions, CRS-13 and CRS-14, in January and May 2018, respectively, traveling to the locations of work and interviewing the contractors and associated staff. These observations are described here, using the lenses of archaeological understandings of discard practices, the anthropological concept of the chaîne opératoire , and the forensic idea of "chain of custody" to interpret the meanings and associations of the various kinds of objects returned from space. • Processes for handling cargo from ISS are elaborate, thorough, and costly. • ISS cargo includes scientific samples, broken equipment, and crew personal items. • Archaeology and sociology show the meanings behind ISS cargo processes. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
41. A future for seafood point-of-origin testing using DNA and stable isotope signatures.
- Author
-
Cusa, Marine, St John Glew, Katie, Trueman, Clive, Mariani, Stefano, Buckley, Leah, Neat, Francis, and Longo, Catherine
- Subjects
- *
STABLE isotopes , *STABLE isotope analysis , *SEAFOOD , *ISOTOPIC signatures , *DNA - Abstract
Demand for seafood products is increasing worldwide, contributing to ever more complex supply chains and posing challenges to trace their origin and guarantee legal, well-managed, sustainable sources from confirmed locations. While DNA-based methods have proven to be reliable in verifying seafood authenticity at the species level, the verification of geographic origin remains inherently more complex. Both genetic and stable isotope analyses have been employed for determining point-of-origin with varying degrees of success, highlighting that their application can be effective when the right tool is selected for a given application. Developing an a priori prediction of their discrimination power for different applications can help avoid the financial cost of developing inappropriate reference datasets. Here, we reviewed the application of both techniques to seafood point-of-origin for 63 commercial finfish species certified by the Marine Stewardship Council, and showed that, even for those species where baseline data exist, real applications are scarce. To fill these gaps, we synthesised current knowledge on biological and biogeochemical mechanisms that underpin spatial variations in genetic and isotopic signatures. We describe which species' biological and distribution traits are most helpful in predicting effectiveness of each tool. Building on this, we applied a mechanistic approach to predicting the potential for successful validation of origin to three case study fisheries, using combined genetic and isotopic methodologies to distinguish individuals from certified versus non-certified regions. Beyond ecolabelling applications, the framework we describe could be reproduced by governments and industries to select the most cost-effective techniques. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
42. The viability assured by the chain of custody
- Author
-
Margarida Barbosa
- Subjects
chain of custody ,evidence collection ,forensic sciences ,Medicine - Published
- 2022
- Full Text
- View/download PDF
43. Investigación y prueba digital de los ciberdelitos.
- Author
-
Pérez, Francisco Ortego
- Subjects
- *
ELECTRONIC evidence , *COMPUTER crimes , *CRIMINAL evidence , *COMPUTER storage devices , *DIGITAL technology , *EVIDENCE preservation , *LEGAL procedure , *TECHNOLOGICAL innovations , *CRIMINAL investigation , *CRIMINAL procedure , *CRIMINAL law - Abstract
This article analyzes the need to autonomously regulate digital evidence in criminal process. The digital age and the technological advances represented by the Internet have led to very positive innovations, but also to the emergence of cybercrime. The Law must respond to the challenges of cybercrime by adapting criminal and procedural laws. Cybercrimes poses serious difficulties with respect to investigation and evidence, and criminal proceedings were increasingly based on digital evidence. [ABSTRACT FROM AUTHOR]
- Published
- 2022
44. RFID IMPLEMENTATIONS IN THE WOOD SUPPLY CHAINS: STATE OF THE ART AND THE WAY TO THE FUTURE.
- Author
-
TSIORAS, Petros A., ŻAK, Jacek, and KARASZEWSKI, Zbigniew
- Subjects
- *
WOOD , *SUPPLY chains , *SUSTAINABILITY , *ILLEGAL logging , *WOOD products , *INTERNET of things , *FOOD chains - Abstract
The focus of this review paper is to present the state of the art regarding RFID implementations in wood supply chains, covering the tree marking stage till the transportation to the final processor. The easier than ever collection of data using sensors and the emerging ability to exchange information in the context of the Internet of Things (IoT) form a very promising new environment for the optimization of wood supply chains. Driven by currently enhanced, ability to store different layers of information per merchantable unit (tree assortments at final or semi-final form or containers of woody biomass), RFID applications can provide valuable solutions and revolutionize wood supply chains by warranting traceability, combating illegal logging, minimizing waste and offering detailed information of the wood products properties, among other benefits that are presented in the text. The benefits can be identified at the ecological, social and economic levels, addressing the sustainability concerns of modern societies. To make use of this huge potential, a continuous flow and fusion of information at all supply chain stages must be taken for granted, as well as the close cooperation among stakeholders. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
45. Biodetección de cadáveres, secciones anatómicas y fluidos biológicos en escenarios criminales apoyada por caninos.
- Author
-
Romero Luna, María Azucena, Antonio Bohórquez, Gabriel, Ulises Rojas-Guevara, Jorge, Baracaldo Eusse, Julián Andrés, and Alit Mansegosa, Daniela
- Subjects
- *
CRIMINAL investigation , *CRIMINAL evidence , *CRIMINOLOGY , *DEAD , *FORENSIC sciences , *ODORS - Abstract
Biological evidence in criminal settings usually goes unnoticed by the human senses, although there is evidence of the use of canines for their detection. The objectives of this research are to analyze the role of canine equipment for tracking corpses, anatomical sections and biological fluids in criminal settings; in addition to knowing the provenance of biological training aids for training and determining the scope and importance of canines in the forensic field. Based on the above, a documentary review of publications in academic databases between 2010 to 2021 was carried out, starting from the qualitative method with a hermeneutic-interpretive role. An analysis was carrying out from the academic referents, determining the importance of these studies in criminal investigation, criminology and victimology contexts. In conclusion, the technical possibilities offered by canines in forensic protocols are highlighted, starting from standardization for the handling of samples, storage and the future of investigations for the management of expert studies in real contexts, in order to guarantee compliance with the Chain of Custody, which leads to a successful canine performance under a certification and evidentiary validity within the criminal process. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
46. The Standardised Digital Forensic Investigation Process Model (SDFIPM)
- Author
-
Montasari, Reza, Hill, Richard, Carpenter, Victoria, Hosseinian-Far, Amin, Masys, Anthony J., Series Editor, Bichler, Gisela, Advisory Editor, Bourlai, Thirimachos, Advisory Editor, Johnson, Chris, Advisory Editor, Karampelas, Panagiotis, Advisory Editor, Leuprecht, Christian, Advisory Editor, Morse, Edward C., Advisory Editor, Skillicorn, David, Advisory Editor, Yamagata, Yoshiki, Advisory Editor, Jahankhani, Hamid, editor, Kendzierskyj, Stefan, editor, Jamal, Arshad, editor, Epiphaniou, Gregory, editor, and Al-Khateeb, Haider, editor
- Published
- 2019
- Full Text
- View/download PDF
47. Cloud Forensics in Relation to Criminal Offences and Industrial Attacks in Mauritius
- Author
-
Leelodharry, Dhanush, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Satapathy, Suresh Chandra, editor, Bhateja, Vikrant, editor, Somanah, Radhakhrishna, editor, Yang, Xin-She, editor, and Senkerik, Roman, editor
- Published
- 2019
- Full Text
- View/download PDF
48. Rancang Bangun Sistem Untuk Manajemen Barang Bukti Fisik dan Chain of Custody (CoC) pada Penyimpananan Laboratorium Forensika Digital
- Author
-
Tino Feri Efendi, Ridho Rahmadi, and Yudi Prayudi
- Subjects
bukti fisik ,chain of custody ,data inventory ,Information technology ,T58.5-58.64 - Abstract
Kejahatan komputer memiliki 2 jenis barang bukti, yaitu: bukti fisik dan bukti digital. Penyimpanan pada bukti fisik membutuhkan sebuah ruang khusus yang dapat menampung bukti fisik tersebut. Namun dibutuhkan sebuah sistem yang dapat menyimpan dan mengelola bukti fisik tersebut. Permasalahan yang ada saat ini adalah tidak adanya konsep penyimpanan bukti fisik serta dokumentasinya (Chain of Custody). Manajemen Barang Bukti Fisik diusulkan sebagai solusi untuk memecahkan masalah tersebut. Konsep ini berupa sebuah Sistem Manajemen Bukti Fisik dan Chain of Custody dengan mengambil analogi sebuah Data Inventory. Sedangkan informasi Chain of Custody. Permasalahan pada Manajemen Barang Bukti Fisik tersebut membutuhkan Sistem Manajemen untuk Barang Bukti Fisik yang sesuai untuk diterapkan dilingkungan Laboratorium Forensika Digital UII. Penelitian ini telah berhasil mengimplementasikan konsep Data Inventory. Diharapkan dengan adanya konsep Manajemen Barang Bukti Fisik ini kontrol barang bukti fisik dan segala aktivitas yang berkaitan dengannya dapat terjaga serta terdokumentasi dengan baik. DOI: https://doi.org/10.26905/jtmi.v6i2.4177
- Published
- 2020
- Full Text
- View/download PDF
49. Analisis Digital Forensik Rekaman Kamera CCTV Menggunakan Metode NIST (National Institute of Standards Technology)
- Author
-
Desti Mualfah and Rizdqi Akbar Ramadhan
- Subjects
kamera cctv ,metadata ,nist ,chain of custody ,Computer software ,QA76.75-76.765 ,Information technology ,T58.5-58.64 ,Computer engineering. Computer hardware ,TK7885-7895 - Abstract
Kejahatan konvensional yang terekam kamera CCTV (Closed Circuit Televison) semakin meningkat, setiap pelaku kejahatan yang terbukti melakukan tindak pidana tertentu akan dihukum sesuai dengan peraturan perundang-undangan. Permasalahannya, adalah bagaimana sebuah kasus yang terekam pada kamera CCTV dapat dijadikan sebagai alat bukti digital. Bukti digital berkaitan erat dalam memastikan keamanan, privasi dan integritas data saat mengikuti tahapan proses identifikasi digital forensik. Tahap identifikasi menggunakan metode NIST (National Institute of Standarts Technolog) digunakan untuk investigasi dalam mencari informasi terkait metadata pada rekaman kamera CCTV agar dapat memberikan informasi terstruktur, menggambarkan serta mengolah sebuah informasi yang didapat dari sumber investigasi digital forensik dapat di implementasikan kedalam dokumen Chain of Custody yang bertujuan untuk dapat digunakan sebagai alat bukti digital yang sah dalam pengadilan
- Published
- 2020
- Full Text
- View/download PDF
50. Novel recovery methods for biological materials in cases of alleged sexual assault: A word of caution.
- Author
-
Murphy, Charlotte, Alexander, Karen, Stark, Margaret M., and Davidson, Geraldine
- Subjects
SEXUAL assault ,BIOMATERIALS ,SEXUAL abuse victims ,SEX crimes ,CRIMINAL investigation ,FORENSIC sciences - Abstract
Many believe that an increase in the public confidence in the investigation of sexual crimes, and in conviction rates, will lead to an increase in the reporting of these crimes. Consequently, Forensic Science Providers are continually striving to make improvements in evidence recovery and examination and the subsequent interpretation of evidence. One development is in methods that enable an individual to self-sample. However, in cases where a complainant has self-sampled, questions of when the samples were taken, how they were stored and so on, can be legitimately raised. Additionally the continuity and integrity of evidential samples may be questioned resulting in them not being acceptable to the courts and potential evidence could therefore be lost. There is a large emotional and psychological impact of sexual assault and rape and no complainant who reports a sexual assault and recovers material should have that evidence inadmissible to a court. Specialised units for victims of alleged sexual violence are available and offer far more than the recovery of evidential samples. This commentary on behalf of the Faculty of Forensic & Legal Medicine (FFLM) and the Association of Forensic Science Providers Body Fluid Forum (AFSP BFF) highlights the need for after care for the victims of sexual assault and why all evidence recovered in cases of alleged sexual assault and sexual violence should be obtained in line with best practice protocols. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.