127 resultados para forensics
Resumo:
Magdeburg, Univ., Fak. für Informatik, Diss., 2013
Resumo:
Cyanobacteria (blue-green algae) blooms in water bodies present serious public health issues with attendant economic and ecological impacts. Llyn Tegid (Lake Bala) is an important conservation and amenity asset within Snowdonia National Park, Wales which since the mid-1990s has experienced multiple toxic cyanobacteria blooms threatening the ecology and tourism-dependent local economy. Multiple working hypotheses explain the emergence of this problem, including climate change, land management linked to increased nutrient flux, hydromorphological alterations or changing trophic structure - any of which may operate individually or cumulatively to impair lake function. This paper reports the findings of a sedimentfingerprinting study using dated lake cores to explore the linkages between catchment and lake management practices and the emergence of the algal blooms problem. Since 1900 AD lake bed sedimentation rates have varied from 0.06 to 1.07 g cm−2 yr−1, with a pronounced acceleration since the early 1980s. Geochemical analysis revealed increases in the concentrations of total phosphorus (TP), calcium and heavy metals such as zinc and lead consistent with eutrophication and a rising pollution burden, particularly since the late 1970s. An uncertainty-inclusive sedimentfingerprinting approach was used to apportion the relative fluxes from the major catchment land cover types of improved pasture, rough grazing, forestry and channel banks. This showed improved pasture and channel banks are the dominant diffuse sources of sediment in the catchment, though forestry sources were important historically. Conversion of rough grazing to improved grassland, coupled with intensified land management and year-round livestock grazing, is concluded to provide the principal source of rising TP levels. Lake Habitat Survey and particle size analysis of lake cores demonstrate the hydromorphological impact of the River Dee Regulation Scheme, which controls water level and periodically diverts flow into Llyn Tegid from the adjacent Afon Tryweryn catchment. This hydromorphological impact has also been most pronounced since the late 1970s. It is concluded that an integrated approach combining land management to reduce agricultural runoff allied to improved water level regulation enabling recovery of littoral macrophytes offers the greatest chance halting the on-going cyanobacteria issue in Llyn Tegid.
Resumo:
Background: Illegal hunting is one of the major threats to vertebrate populations in tropical regions. This unsustainable practice has serious consequences not only for the target populations, but also for the dynamics and structure of tropical ecosystems. Generally, in cases of suspected illegal hunting, the only evidence available is pieces of meat, skin or bone. In these cases, species identification can only be reliably determined using molecular technologies. Here, we reported an investigative study of three cases of suspected wildlife poaching in which molecular biology techniques were employed to identify the hunted species from remains of meat.Findings: By applying cytochrome b (cyt-b) and cytochrome oxidase subunit I (COI) molecular markers, the suspected illegal poaching was confirmed by the identification of three wild species, capybara (Hydrochoerus hydrochaeris), Chaco Chachalaca (Ortalis canicollis) and Pampas deer (Ozotoceros bezoarticus). In Brazil, hunting is a criminal offense, and based on this evidence, the defendants were found guilty and punished with fines; they may still be sentenced to prison for a period of 6 to 12 months.Conclusions: The genetic analysis used in this investigative study was suitable to diagnose the species killed and solve these criminal investigations. Molecular forensic techniques can therefore provide an important tool that enables local law enforcement agencies to apprehend illegal poachers. © 2012 Sanches et al.; licensee BioMed Central Ltd.
Resumo:
This PhD thesis discusses the impact of Cloud Computing infrastructures on Digital Forensics in the twofold role of target of investigations and as a helping hand to investigators. The Cloud offers a cheap and almost limitless computing power and storage space for data which can be leveraged to commit either new or old crimes and host related traces. Conversely, the Cloud can help forensic examiners to find clues better and earlier than traditional analysis applications, thanks to its dramatically improved evidence processing capabilities. In both cases, a new arsenal of software tools needs to be made available. The development of this novel weaponry and its technical and legal implications from the point of view of repeatability of technical assessments is discussed throughout the following pages and constitutes the unprecedented contribution of this work
Resumo:
The cybernetics revolution of the last years improved a lot our lives, having an immediate access to services and a huge amount of information over the Internet. Nowadays the user is increasingly asked to insert his sensitive information on the Internet, leaving its traces everywhere. But there are some categories of people that cannot risk to reveal their identities on the Internet. Even if born to protect U.S. intelligence communications online, nowadays Tor is the most famous low-latency network, that guarantees both anonymity and privacy of its users. The aim of this thesis project is to well understand how the Tor protocol works, not only studying its theory, but also implementing those concepts in practice, having a particular attention for security topics. In order to run a Tor private network, that emulates the real one, a virtual testing environment has been configured. This behavior allows to conduct experiments without putting at risk anonymity and privacy of real users. We used a Tor patch, that stores TLS and circuit keys, to be given as inputs to a Tor dissector for Wireshark, in order to obtain decrypted and decoded traffic. Observing clear traffic allowed us to well check the protocol outline and to have a proof of the format of each cell. Besides, these tools allowed to identify a traffic pattern, used to conduct a traffic correlation attack to passively deanonymize hidden service clients. The attacker, controlling two nodes of the Tor network, is able to link a request for a given hidden server to the client who did it, deanonymizing him. The robustness of the traffic pattern and the statistics, such as the true positive rate, and the false positive rate, of the attack are object of a potential future work.
Resumo:
Non-invasive documentation methods such as surface scanning and radiological imaging are gaining in importance in the forensic field. These three-dimensional technologies provide digital 3D data, which are processed and handled in the computer. However, the sense of touch gets lost using the virtual approach. The haptic device enables the use of the sense of touch to handle and feel digital 3D data. The multifunctional application of a haptic device for forensic approaches is evaluated and illustrated in three different cases: the representation of bone fractures of the lower extremities, by traffic accidents, in a non-invasive manner; the comparison of bone injuries with the presumed injury-inflicting instrument; and in a gunshot case, the identification of the gun by the muzzle imprint, and the reconstruction of the holding position of the gun. The 3D models of the bones are generated from the Computed Tomography (CT) images. The 3D models of the exterior injuries, the injury-inflicting tools and the bone injuries, where a higher resolution is necessary, are created by the optical surface scan. The haptic device is used in combination with the software FreeForm Modelling Plus for touching the surface of the 3D models to feel the minute injuries and the surface of tools, to reposition displaced bone parts and to compare an injury-causing instrument with an injury. The repositioning of 3D models in a reconstruction is easier, faster and more precisely executed by means of using the sense of touch and with the user-friendly movement in the 3D space. For representation purposes, the fracture lines of bones are coloured. This work demonstrates that the haptic device is a suitable and efficient application in forensic science. The haptic device offers a new way in the handling of digital data in the virtual 3D space.
Resumo:
A handwritten list of forensic and syllogistic questions compiled between 1789 and 1791 on two pages, and a half-page list of the questions for June 1800.
Resumo:
A handwritten list of the forensic questions delivered on Commencement and Exhibition Days between 1811 and 1822.
Resumo:
A handwritten list of the forensic questions delivered on Commencement and Exhibition Days between 1823 and 1824.