A Susceptible Evidence Processing Framework for Handheld Devices Through Digital Forensic Measurements
Keywords:
Evidence processing, Digital Forensic Investigation, evidence labelling, KDEAbstract
Digital forensic comprises various actions for processing digital evidences like preprocess, identification, modeling, extraction, and documentation. All these actions are modelled and entitled through the court of law. Different procedures and methods are followed to perform these actions by the help of various platforms and hardware specifications. The analysis and processing of digital evidences depends on the hardware specifications of various companies and the systematic approach of various effective evidence processing software tools. Most of the hardware developing companies takes the security measures through on board circuits and this helps the digital investigators an advantage while retrieving evidences. Latest technological advancements in industry demands various sensitive security measures needs to be considered while launching new hardware devices specifically for communication purposes. Digital forensic plays a great role in retrieving sensitive evidences and its processing while a digital crime scene is evaluating. This activity considers various processing steps and it leads to the evaluation of both hardware and software participated in the crime scene. Mobile devices are the most sensitive and popular handheld devices used around the globe and the communication capability of these handheld devices makes the message passing and content delivery more flexible hence may lead to the misuse and hacked through the personal space. This article gives an effective framework for analysis and processing of digital evidences specifically for handheld devices like Mobiles, pager, laptop, Notebook and other electronic pads. Nowadays most of the communications occurred through handheld devices so the application of digital forensic measurements on these cases are highly important and sensitive. The digital crime analysis and its effective processing solved by the proposed framework and it integrates various levels of security pads. The framework proposed here comprises LR based Numerical and Verbal likelihood ratio during the digital evidence processing scenarios. This integrated mechanism works on the device platform scrutinize both platform dependent and independent factors and applied on the kernel layer with certain security measurements. Any handheld or mobile platforms may adapt with the changes and the retrieved kernel resources including any suspected communications can pass through the framework channel. Thus the scalable platforms may arise with sustainable security enhancements which are entitles according to the procedure established by law.
Downloads
References
Martire, K. A., Kemp, R. I., Sayle, M., & Newell, B. R. (2014). On the interpretation of likelihood ratios in forensic science evidence: Presentation formats and the weak evidence effect. Forensic Science International, 240, 61–68. http://dx.doi.org/10.1016/j.forsciint.2014.04.005
Bolck A and Alberink I (2011), Variation in Likelihood Ratios for forensic evidence evaluation of XTC tablets comparison, Journal of Chemometrics , 25: 41-49 DOI: 10.1002/cem.1361.
Martire, K. A., Kemp, R. I., Watkins, I., Sayle, M. A., & Newell, B. R. (2013). The expression and interpretation of uncertain forensic science evidence: Verbal equivalence, evidence strength, and the weak evidence effect. Law and Human Behavior, 37, 197–207. http://dx.doi.org/ 10.1037/lhb0000027.
Neumann C, Champod C, Puch-Solis R, Egli N, Anthonioz A, Bromage-Griffiths A, (2007), Computation of Likelihood Ratios in Fingerprint Identification for Configurations of Any Number of Minutiae, J Forensic Sci, 54-64.
Weyermann C, Marquis R, Delaporte C, Esseiva P, Dujourdy L, Lock E, Aalberg L, Dieckmann S, Zrcek F, Bosenko J (2008), Drug intelligence based on MDMA tablets data: (1) Organic impurities profiling. Forensic Science International 177 (1):11-16.
Marquis R, Weyermann C, Delaporte C, Esseiva P, Dujourdy L, Koper C, Aalberg L, Dahlenburg R, Zrcek F, Bosenko J (2008) Drug intelligence based on MDMA tablets data: (2) Phusical characteristics profiling. Forensic Science International 178 (1): 24-39.
Bayes T, Price, R (1763). An Essay towards solving a Problem in the Doctrine of Chance. By the late Rev. Mr. Bayes, communicated by Mr. Price, in a letter to John Canton, M. A. and F. R. S. Philosophical Transactions of the Royal Society of London 53: 370–418.
Cole, S. Forensics Without Uniqueness, Conclusions Without Individualization: The New Epistemology of Forensic Identification. Law, Probability and Risk 2009, 8 (3), 233–255
Koehler, J. J., & Macchi, L. (2004). Thinking about low-probability events. An Exemplar-Cuing theory. Psychological Science, 15, 540–546. http:// dx.doi.org/10.1111/j.0956-7976.2004. 00716.x
Evett, I. W.; Lambert, J. A.; Buckleton, J. S. A Bayesian Approach to Interpreting Footwear Marks in Forensic Casework. Sci. and Justice 1998, 38 (4), 241–247.
Thomson, W. C. Discussion Paper: Hard Cases Make Bad Law–Reactions to R v T. Law, Probability and Risk 2012, 11 (4), 347–359.
Ponce, A., and F. Pascual. 1999. Critical review of presumptive tests for bloodstains. Forensic Science Communications 1(2). http://www.fbi.gov/about-us/lab/forensic-sciencecommunications/ fsc/archive/july1999/ponce.htm (accessed March 10, 2011).
Adderley, R., Bond, J.W., Townsley, M. Use of data mining techniques to model crime scene investigator performance 26th SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence, Cambridge UK, 2006.
Skopik, Settanni, & Fiedler (2016). A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing. Computers & Security, 60, 154–176. doi.org/10.1016/j.cose.2016.04.003.
Harris, A. Corner, U. Hahn, James is polite and punctual (and useless): a Bayesian formalisation of faint praise, THINK REASONING (2013), http:// dx.doi.org/10.1080/13546783.2013.801367.
Taroni, F., Aitken, C., Garbolino, P., & Biedermann, A. (2006). Bayesian networks and probabilistic inference in forensic science. West Sussex, UK: Wiley. http://dx.doi.org/10.1002/0470091754
Christensen, Michael E. RaynorRory McDonald (2015). What Is Disruptive Innovation? Harvard Business Review, 44–53. Retrieved from https://hbr.org/2015/12/what-is-disruptive-innovation.
Taroni, F., Aitken, C., Garbolino, P., & Biedermann, A. (2006). Bayesian networks and probabilistic inference in forensic science. West Sussex, UK: Wiley. http://dx.doi.org/10.1002/0470091754
Tversky, A., & Kahneman, D. (1982). Evidential impact of base rates. In D. Kahneman, P. Slovic, & A. Tversky (Eds.), Judgment under uncertainty: Heuristics and biases (pp. 153–160). Cambridge, UK: Cambridge University Press. http://dx.doi.org/10.1017/CBO9780511809477.011
Thompson, W. C., Kaasa, S. O., & Peterson, T. (2013). Do jurors give appropriate weight to forensic identification evidence? Journal of Empirical Legal Studies, 10, 359–397. http://dx.doi.org/10.1111/jels.12013
Thompson, W. C. (2012). Discussion paper: Hard cases make bad law: Reactions to R v. T. Law Probability and Risk, 11, 347–359. http://dx .doi.org/10.1093/lpr/mgs020
Cankaya EC, Kupka B. A Survey of Digital Forensics Tools for Database Extraction. In Future Technologies Conference; 2016; San Fransisco: IEEE. p. 1014-1019.
[J. Beckett and J. Slay, “Digital forensics: Validation and verification in a dynamic work environment,” Proc. Annu. Hawaii Int. Conf. Syst. Sci., no. February 2014, 2007.
Riadi and A. Firdonsyah, “Forensic Investigation Technique on Android ’ s Blackberry Messenger using NIST Framework,” Int. J. Cyber - Secur. Digit. Forensics ( IJCSDF ) Soc. Digit. Inf. Wirel. Commun., vol. 6, no. 4, pp. 198–205.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.