Free Essay

Counter Image Forensics

In:

Submitted By atul101
Words 3272
Pages 14
Chapter 3 IMPLEMETATION

3.1. JPEG COMPRESSION USING MATLAB 7.10.0

3.1.1 Workflow

We successfully compressed a black & white photograph (source: Dresden Image Database) implementing JPEG algorithm in Matlab and compressed the images to 1/4th of the original image size. This was achieved by dividing the image in blocks of 8×8 pixels and applying a discrete cosine transform (DCT) on each partition of the images. The resulting coefficients were quantized and less significant coefficients are set to zero. In order to omit redundancy in our algorithm, we skipped the entropy encoding step, since it provides lossless compression and thus not useful for forensic of the image. This is shown in figure 3.1.

3.1.2 Block splitting
Normally, the width and height of the image are a multiple of 8 and that the image is either gray scale or RGB (red, green, blue). Each pixel is assigned a value between 0 and 255, or a triplet of RGB values.

Figure 3.1 Step of JPEG Compression

Thus, we split the image into 8×8 blocks. This is needed since the DCT has no locality information whatsoever. There is only frequency information available. We continued by shifting every block by −128, this made the values symmetric around zero with average close to zero.

3.1.3 Quantization
So far there had been no compression. We then proceeded by introducing zeros in the arrays by means of Quantization. Every DCT coefficient Xjk was divided by an integer Qjk and rounded to the nearest integer. The importance of the coefficients is dependent on the human visual system; the eye is much more sensitive to low frequencies. Measurements led to standard quantization tables listed below.

Q = [16, 11, 10, 16, 24, 40, 51, 61
12, 12, 14, 19, 26, 58, 60, 55
14, 13, 16, 24, 40, 57, 69, 56
14, 17, 22, 29, 51, 87, 80, 62
18, 22, 37, 56, 68, 109, 103, 77
24, 35, 55, 64, 81, 104, 113, 92
49, 64, 78, 87, 103, 121, 120, 101
72, 92, 95, 88, 112, 100, 103, 99]

The quantized DCT coefficients was computed with

Bj,k=roundX(j,k)Q(j,k) for j = 0,1,2,…..7; k = 0,1,2,….7 (3.1)

where X is the un-quantized DCT coefficients; Q is the quantization matrix mentioned above; and B is the quantized DCT coefficients. Using this quantization matrix with the DCT coefficient matrix from above resulted in:

Figure 3.2: Unquantized DCT coefficients

Figure 3.3: Quantized DCT coefficients

3.1.4 Decompression

As mention before, we skipped entropy encoding step, since it do not produce any finger print which can be used to develop a forensic technique. Thus, above mentioned were followed in bottom to up direction. An original image and its compressed version is shown in Fig.3.4 and Fig.3.5, respectively.

Figure 3.4 Comparison between (a) Original Image and (b) Image after implementing JPEG Compression with Quality factor of 50

3.2 ANTI FORENSIC FRAMEWORK TO HIDE JPEG COMPRESSION FINGERPRINTS

We have implemented the algorithm proposed by J. He, Z. Lin, L.Wang, and X. Tang in their research paper “Detecting doctored JPEG images via DCT coefficient analysis” to counter the forensic technique which uses localized evidence of double JPEG compression to identify image forgeries.

3.2.1 Framework
JPEG is a lossy image compression techniques which operate by applying a two-dimensional invertible transform, such as the DCT to an image as a whole, or to each set of pixels within an image that has been segmented into a series of disjoint sets. As a result, the image or set of pixels is mapped into multiple subbands of transform coefficients, where each transform coefficient is denoted X.
Once obtained, each transform coefficients must be mapped to a binary value both for storage and to achieve lossy compression. This is achieved through the process of quantization, in which the binary representation of the transform coefficient X is assigned the value x according to the equation

X= x if bk≤X≤b(k+1) (3.2)

where bk and bk+1 denote the boundaries of the quantization interval over which X maps to the value . Because some subbands of transform coefficients are less perceptually important than others, and thus can accommodate greater loss during the quantization process, the set of quantization interval boundaries is chosen differently for each subband. After each transform coefficient is given a binary representation, the binary values are reordered into a single bit stream which is often subjected to lossless compression.
When the image is decompressed, the binary bit stream is first rearranged into its original two-dimensional form. Each decompressed transform coefficient Y is assigned a value through dequantization. During this process, each binary value q is mapped to a quantized transform coefficient value belonging to the discrete set Q = {…, q-1,q0,q1,….}. Each dequantized transform coefficient value can be directly related to its corresponding original transform coefficient value by the equation

Y=qk if bk≤X≤b(k+1) (3.3)

After dequantization, the inverse transform is performed on the set of transform coefficients and the resulting values are projected back into the set of allowable pixel values P= {0,…,255}. If the image was segmented, this process is repeated for each segment and the decompressed segments are joined together to create the decompressed image; otherwise, this process reconstructs the decompressed image as a whole.
By performing image compression in this manner, a distinct fingerprint is introduced into the transform coefficients of an image. When examining an unaltered image’s transform coefficient values within a particular subband, they will likely be distributed according to a smooth, continuous distribution.

This is not the case for images which have undergone image compression, since the processes of quantization and dequantization force the transform coefficients of a compressed image to take values within the discrete set Q. In practice, the act of projecting the decompressed pixel values perturbs the transform coefficient values, though the transform coefficients of a previously compressed image still cluster tightly around elements of Q. These fingerprints, known as transform coefficient quantization artifacts, are used by the majority of compression artifact-based forensic techniques to identify single or double compression, determine an image’s origin, or identify image forgeries. They can be clearly seen in Fig.3.6 & Fig.3.7, which shows the histogram of one subband of DCT coefficients from an image before and after JPEG compression, respectively.

Figure .3.6Histogram of DCT coefficients Figure.3.7: Histogram of DCT coefficients from from an uncompressed image. same image after JPEG compression.

We have used the following generalized framework to remove transform coefficient quantization artifacts from a compressed.
First, we modeled the distribution of the transform coefficients for a given subband prior to quantization using a parametric model P(X=x) = f(x,θ) with parameter θ. Next, we estimated the value of θ from the quantized transform coefficients. We then anti-forensically modified each quantized transform coefficient by adding specially designed noise, which we refer to as anti-forensic dither, to its value according to the equation

Z = Y+D (3.4)

where D is the anti-forensic dither and Z is the anti-forensically modified coefficient.
The distribution of the anti-forensic dither is chosen so that it corresponds to a renormalized and recentered segment of the model distribution for that subband, where the segment is centered at the quantized coefficient value and the segment’s length is equal to the length of the quantization interval. Because the probability that the quantized coefficient value is q(k) is given by PY=qk=b(k)b(k+1)f(x,∅)dx (3.5)

the anti-forensic dither’s distribution is given by the formula

PD=d | Y=qk= f(qk+d,∅)b(k)b(k+1)f(x,∅)dx if bk≤qk+d≤b(k+1) (3.6)

Choosing the anti-forensic dither distribution in this manner yields two main benefits; the anti-forensically modified coefficient distribution will theoretically match the transform coefficient distribution before quantization and an upper bound can be placed on the distance between each unquantized transform coefficient and its anti-forensically modified counterpart. To prove the first property, we make use of the fact that

PZ=z | Y=qk= PD=z-q(k) | Y=qk (3.7)

We then use the law of total probability to write an expression for the anti-forensically modified coefficient distribution as

PZ=z=kPZ=zY=qkP(Y=qk)
PZ=z=kf(qk+d,∅)b(k)b(k+1)f(x,∅)dx*b(k)b(k+1)f(x,∅)dx if bk≤qk+d≤b(k+1)
= kf(z,∅) if bk≤qk+d≤b(k+1) (3.8)

This is important because it proves that forensic analysis of the transform coefficient distribution of an image should be unable to distinguish an unaltered image from an anti-forensically modified one, provided that the distribution of unmodified coefficients is modeled accurately and the parameter is correctly estimated. Assuming that each quantized value lies at the center of its corresponding quantization interval, this distance can be trivially bounded as follows: X-Y≤max|bk-b(k+1)|2 (3.9)

Because each anti-forensically modified coefficient value must lie within the quantization interval encompassing the modified quantized coefficient value, the bound placed on |X-Y| also holds for |Y-Z|.
As a result, the distance between an unquantized and anti-forensically modified transform coefficient value is upper bounded by

X-Y≤maxbk-bk+1 (3.10)

3.2.2 DCT Coefficient Quantization Fingerprint Removal
In accordance with the anti-forensic framework which is discussed earlier, we begin by modeling the distribution of coefficient values within a particular ac DCT subband using the Laplace distribution

PX=x=λ2e-λ|x| (3.11)

Though we use this model for each ac subband of the DCT, each subband will have its own unique value of. Using this model and the quantization rule described above, the coefficient values of an ac subband of DCT coefficients within a previously JPEG compressed image will be distributed according to the discrete Laplace distribution

PY=y = 1-e-λQi,j2 if y=0e-λ|y|sinhλQi,j2, if y=kQ(i,j)0 otherwise where k∈Z, k≠0 (3.12)

To anti-forensically modify a previously JPEG compressed image, we first perform the initial steps in JPEG compression (i.e., color space transformation, segmentation into blocks, DCT) to obtain a set of DCT coefficients from the image. Because the final stages of JPEG decompression involve projecting the decompressed pixel values back into, the DCT coefficient values obtained is Y=Q(i,j)roundYQ(i,j).
Next, we obtain a maximum likelihood estimate the model Parameter ʎ independently for each ac subband of DCT coefficients using the quantized coefficients. By doing this, we can use this model to obtain an estimate of each ac subband’s coefficient distribution before JPEG compression. We define N = N(0) + N(1) as the total number of observations of the current DCT subband N(0), as the number DCT subband of coefficients taking the value zero, N(1) as the number of nonzero valued coefficients, and S=k=1N|y(k)|. The model parameter estimate, which we denote λ , is calculated using the equation λ = -2Q(i,j)ln⁡(∂) (3.13)
Where
∂=-N0Q(i,j)2NQi,j+4S+N02Q(i,j)2-2N1Qi,j-4S(2NQi,j+4S)2NQ+4S

(3.14)

After λ has been estimated, we add anti-forensic dither to each DCT coefficient in an ac subband. Because we model the coefficient distribution before quantization using the Laplace distribution, the expression for the anti-forensic dither’s distribution given in eqn. (3.14) simplifies to one of two equations depending upon the magnitude of the quantized DCT coefficient value to which the dither is added. For zero-valued quantized coefficients, the anti-forensic dither distribution is chosen to be

P(D=d|Y=0)=1C0e-λ |d|, if –Q(i,j)2≥d≥Q(i,j)20, otherwise (3.15)

where C0=1-e-λQ(i,j)2 (3.16)

The distribution of the anti- forensic dither added to nonzero quantized DCT coefficients is P(D=d|Y=q(k))=1C1e-sgnqkλ(d+Q(i,j)/2), if –Q(i,j)2≥d≥Q(i,j)20, otherwise (3.17) where C1=1λ(1-e-λ Q(i,j)) (3.18)

The expected value was calculated using obtained probabilistic distribution

D= d*P(D=d|Y=q(k)) (3.19)

Expected value of dither was then added to DCT coefficients of the compressed images to obtain anti-forensically modified coefficients.

3.3 IDENTIFICATION OF DIGITAL CAMERA IMAGE ORIGIN USING PRNU EXTRACTION AND APPLYING ANTIFORENSICS OVER IT 3.3.1 Identification using PRNU extraction

Sensor noise is an inherent property of images captured with a digital camera. It consists of two main components: temporal and spatial noise. All images acquired with the same image input device contain a similar spatial noise pattern, which we assume to be unique for each sensor. Spatial noise consists of three components: Photo Response Non- Uniformity Noise (PRNU), Fixed Pattern Noise (FPN) and other irregularities resulting from local disturbances on the optical elements (scratches, dust, etc.).
To estimate the spatial noise for a device under investigation, we used MATLAB version 7.10.0. A Canon Ixus 50 Model was used to get a camera specific reference noise pattern called Fingerprint by averaging over 12-15 images of the same model and same size(1024*768). Then we take a test image that maybe from the same model or a different camera and extract noise pattern (PRNU) from the test image.
Further we calculate PCE (Peak to correlation energy) between the two set of noise patterns obtained each from the reference camera and the test image. If we get a high PCE value then the test image belongs to the reference camera otherwise not.
Like normalized correlation, Peak-to-Correlation Energy ratio (PCE) is a measure of similarity for two discrete signals. PCE is especially suitable for 2-dimensional camera fingerprints because presence of hidden periodic patterns (a latent source of false identification) decreases PCE.

RESULTS
JPEG Anti-Forensics
To demonstrate that anti-forensic DCT coefficient quantization fingerprint removal technique can be used on an image without significantly impacting its visual quality, we show a typical image before and after anti-forensic modification in Fig. 4.2 & Fig. 4.3, respectively. In Fig. 4.2, the image has undergone JPEG compression using a quality factor of 50 while the image in Fig.4.3 is the JPEG compressed image after anti-forensic dither has been added to its DCT coefficients. No noticeable difference between these images is apparent after visual inspection. This is reinforced by the fact that the PSNR between the two images is 29.26 dB. More importantly, the anti-forensically modified image contains no visual indicators of either previous compression or anti-forensic modification. Since a forensic examiner will not have access to either the unaltered or compressed version of an anti-forensically modified image, these cannot be compared against the anti-forensically modified image. Instead, what is necessary is that the anti-forensically modified image plausibly appear to have never been compressed.
Inspection of the DCT coefficient value distributions of the images shown in Fig. 4.1 and Fig.4.3 yields similar results. Fig. 4.4 shows a histogram of coefficient values in the (2,2) DCT subband in an uncompressed version of these images. The corresponding coefficient value histograms from the JPEG compressed and anti-forensically modified images are shown in figure 4.5 & 4.6, respectively. While DCT coefficient quantization fingerprints are present in the histograms taken from the JPEG compressed image, these fingerprints are absent in the coefficient value histograms corresponding to the uncompressed and anti-forensically modified images. Again, we note that in reality a forensic examiner will only have access to the anti-forensically modified image and will be unable to make note of minor differences between the coefficient histograms of the uncompressed and anti-forensically modified image. The fact that the DCT coefficient value histograms from the anti-forensically modified image both fit our coefficient distribution model and contain no compression fingerprints suggests that our proposed antiforensic technique is capable of producing images that can be passed off as never having undergone JPEG compression.

Figure 4.1 Original Image

Figure 4.2 JPEG compressed image with Quality Factor 50

Figure 4.3 Anti Forensically modified image

Figure 4.4 Histogram of coefficient values from the (2,2) DCT subband taken from an uncompressed version of the image shown in Fig. 4.1

Figure 4.5 Histogram of coefficient values from the (2,2) DCT subband taken from a compressed version of the image shown in Fig. 4.2 (left)

Figure 4.6 Histogram of coefficient values from the (2,2) DCT subband for an anti-forensically modified copy of the JPEG compressed image shown in 4.3 .

Appendix :

% input image o=imread ('C:\Users\abhishek\Desktop\sailing.bmp');
% covert image into black and white form e=rgb2gray(o); size(e); e_int=int16(e); sb=size(e_int); m_128=128*ones(sb); % shifting pixel values by 128 to left
G =e_int-int16(m_128);
Q =[16,11,10,16,24,40,51,61;12,12,14,19,26,58,60,55;14,13,16,24,40,57,69,56;14,17,22,29,51,87,80,62;18,22,37,56,68,109,103,77;24,35,55,64,81,104,113,92;49,64,78,87,103,121,120,101;72,92,95,88,112,100,103,99]; fun = @(block_struct) block_struct.data./Q; func = @(block_struct) dct2(block_struct.data);
% Unquantized DCT Coefficients
X = blockproc(G,[8 8],func);
% Quantized DCT Coefficients
I=blockproc(X,[8 8],fun);
% Round of Quantized DCT Coefficients
B=round(I);
% inverse of Quantization fun2 = @(block_struct) block_struct.data.*Q; inv_f=blockproc(B,[8 8],fun2); func2 = @(block_struct) idct2(block_struct.data); in_final2=blockproc(inv_f,[8 8],func2); inv_final=int16(in_final2)+int16(m_128); inv_final128=int16(inv_final)-int16(m_128); final22=blockproc(inv_final128,[8 8],func);

% Antiforensics
I2=blockproc(final22,[8 8],fun);
I2_r=round(I);
Y=blockproc(I2_r,[8 8],fun2); zero=find(Y==0); z=size(zero);
N0=z(1,1);
N=512*768;
N1=N-N0;
final2_mod=sum(abs(Y)); s=sum(final2_mod); l= N0*N0.*Q.*Q-(2*N1.*Q-4*s).*(2*N.*Q+4*s); gamma= (-1*N0.*Q +sqrt(l))./(2*N.*Q+4*s); lambda= size(Q); lambda = -1*2*log(gamma)./Q; c0 = 1- exp(-1.*lambda.*Q/2); c1 = (1-exp(-1.*lambda.*Q))./lambda; expt =size(Q); for i = 1:8 for j = 1:8 if (Y(i,j)==0) d = (-Q(i,j)/2):0.1:Q(i,j)/2; P = exp(-1*lambda(i,j)*abs(d))/c0(i,j); else d = (-Q(i,j)/2):0.1:Q(i,j)/2; P = exp(-1*sign(Q(i,j))*lambda(i,j)*(d+Q(i,j)/2))/c1(i,j); end %generating excepted value of dither expt(i,j) = sum(d.*P); end end Z = Y+D; in_fin=blockproc(Z,[8 8],func2); inv_finale=int16(in_fin)+int16(m_128); imshow(e),figure;imshow(inv_finale,[0 255])
%Plotting X,Y & Z histogram x = -20:0.1:20;figure(5),hist(Z,x); x = -20:0.1:20;figure(4), hist( X,x) x = -20:0.1:20;figure(3),hist(final22,x)

Similar Documents

Premium Essay

Business

...Flemming as the sophisticated target because he had gathered enough evidence to support his allegation towards him. b) * To gather adequate incriminating evidences that will glue down the fraudster at the end of the investigation procedures. * To obtain a clear flow of events that could possibly lead to the occurrence of fraud in the organization. * To ensure no any facts is hidden that could be deemed relevant and material in the investigation process since if it could be worked outwards the actual fraudster could easily camouflage some evidences. * To establish the root cause of the fraud, its base and the loopholes that might have favored the incidence. * To come up with robust defenses that might be used to counter against the fraudster’s evasion tactics. c) * The strength of the predication If the fraud predication draws a strong ground to build a resilient case from it, then its worth for an organization to carry out the investigation but if...

Words: 1551 - Pages: 7

Free Essay

Digital Forensic

...NAME OF GROUP MEMBERS: HON HAO KONG TP027895 THOR LIH YIN TP024383 YUVARAJ MURALITHARAN TP028059 GROUP : GROUP C2I INTAKE CODE : UC3F1402IT{FC} MODULE CODE : CT040-3.5-3-LEAFC MODULE TITLE : LEGAL EVIDENTRARY ASPECTS OF FORENSIC COMPUTING, LEAFC PROJECT TITLE : LEAFC 2nd Group Assignment HAND-OUT DATE : 27th MAY 2014 HAND-IN DATE : 16TH JUNE 2014 LECTURER : MR. ALI JAVAN Table of Contents 1.0 Workload Matrix 3 2.0 Executive Summary 4 3.0 Case Detail and Assumptions 5 4.0 First Responder 7 4.1 Overview 7 4.2 First Responder Procedures 7 4.2.1 Securing and evaluating electronic crime scene 7 4.2.2 Documenting electronic crime scene 10 4.2.3 Collecting and preserving electronic evidence 15 4.2.4 Packaging electronic evidence 21 4.2.5 Transporting electronic evidence 22 4.3 Chain of Custody 23 5.0 Critical Analysis 24 5.1 Forensic Analysis 29 6.0 Case Reconstruction 40 6.1 Functional Analysis 40 6.2 Timeline Analysis 42 6.3 Relational Analysis 43 7.0 Apply and Result of Subpoena 44 8.0 Legal Discussion and Implication 45 8.1 Legal Discussion Perspectives 47 9.0 Conclusion and recommendations 51 9.1 Conclusion 51 9.2 Recommendations 51 10.0 References 52 Appendix A– Affadavit 54 Appendix B- Subpoena 59 1.0 Workload Matrix | Thor Lih Yin (TP024383)...

Words: 11150 - Pages: 45

Premium Essay

Crime

...http://en.wikipedia.org/wiki/Counter-terrorism Counter-terrorism (also spelled counterterrorism) is the practices, tactics, techniques, and strategies that governments, militaries, police departments and corporations adopt to prevent or in response to terrorist threats and/or acts, both real and imputed. The tactic of terrorism is available to insurgents and governments. Not all insurgents use terror as a tactic, and some choose not to use it because other tactics work better for them in a particular context. Individuals, such as Timothy McVeigh, may also engage in terrorist acts such as the Oklahoma City bombing. If the terrorism is part of a broader insurgency, counter-terrorism may also form a part of a counter-insurgency doctrine, but political, economic, and other measures may focus more on the insurgency than the specific acts of terror. Foreign internal defense (FID) is a term used by several countries[citation needed] for programs either to suppress insurgency, or reduce the conditions under which insurgency could develop. Counter-terrorism includes both the detection of potential acts and the response to related events. Anti-terrorism versus counter-terrorism Further information: Detentions following the September 11, 2001 Terrorist Attack The concept of anti-terrorism emerges from a thorough examining of the concept of terrorism as well as an attempt to understand and articulate what constitutes terrorism in Western terms. In military contexts, terrorism is a...

Words: 6044 - Pages: 25

Free Essay

Digital Forensics - Uganda’s Preparedness

...Digital Forensics: Uganda’s Preparedness Dennis Tusiime Rwatooro 2014-M142-2002 Dept of Computer Science Abstract — The more our lives continue to depend on digital communication networks and media to perform daily activities such as communication, access to information and critical services such as health, financial transactions, entertainment, and public utilities like electricity, the more we get exposed to security risks. These security risks include breach of confidentiality of communication and transactions, violation of personal privacy, crime and fraud, disruption of services, and distribution of inappropriate content, among others. The goal of digital security is to research into and develop mechanisms to address these security risks. In this paper we briefly survey some of the emerging issues in digital security. The literature shows that while some domains in digital security have remained unchanged over a long time, for example cryptography, new areas have emerged including steganography. Keywords – digital forensic techniques, volatitle data extraction, digital image forensics, malware investigations, email security, symmetric key cryptography, asymmetric key cryptography, public key cryptography. Introduction Forensic science is defined as the application of the sciences as it pertains to legal matters or problems (Gialamas, 2000). One of the branches/fields of forensic science, namely criminalistics, is the profession and scientific discipline oriented...

Words: 7291 - Pages: 30

Premium Essay

Perimeter Network Security System

...Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Taking advantage of Ext3 journaling file system in a forensic investigation AD Copyright SANS Institute Author Retains Full Rights Taking advantage of Ext3 journaling file system in a forensic investigation fu ll r igh ts. Taking advantage of Ext3 journaling file system in a forensic investigation rr eta ins GCFA Gold Certification Author: Gregorio Narváez, gnarvae@yahoo.com Adviser: Paul Wright th 07 ,A ut ho Accepted: December 30 , 2007 © SA NS In sti tu te 20 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Gregorio Narváez © SANS Institute 2007, 1 As part of the Information Security Reading Room Author retains full rights. Taking advantage of Ext3 journaling file system in a forensic investigation TABLE OF CONTENT 1. INTRODUCTION............................................................................................................................... 3 1.1 Lab Setup .................................................................................................................................... 3 2. EXT3FS JOURNAL FUNDAMENTALS......................................................................................... 4 fu ll r igh ts. 2.1...

Words: 15276 - Pages: 62

Premium Essay

My Attitud

...predecessor, NCIC, was established in 1967. NCIC 2000 serves criminal justice agencies in all 50 states, the District of Columbia, the Commonwealth of Puerto Rico, the United States Virgin Islands, and Canada, as well as federal agencies with law enforcement missions. NCIC 2000 provides a major upgrade to those services provided by NCIC, and extends these services down to the patrol car and mobile officer. 3. Integrated Automated Fingerprint Identification System (IAFIS) - is a national fingerprint and criminal history system maintained by the Federal Bureau of Investigation (FBI), Criminal Justice Information Services (CJIS) Division. The IAFIS provides automated fingerprint search capabilities, latent searching capability, electronic image storage, and electronic exchange of fingerprints and responses, 24 hours a day, 365 days a year. 4. National Instant Criminal Background Check System (NICS) - The Brady Act requires Federal Firearms Licensees (FFLs) to request background checks on individuals attempting to receive a firearm. NICS was established so that any FFL may contact for information to be supplied immediately as to whether the receipt of a firearm by a prospective transferee would violate Title 18,...

Words: 1137 - Pages: 5

Free Essay

It and Terrorism

...[pic] [pic] THE INSTITUTE OF CHARTERED ACCOUNTANTS OF INDIA SUBMITTED BY: PRITISH S. ROONGTA (GROUP LEADER) (09820456348) GROUP DETAILS |NAME |WRO NUMBER |CONTACT NUMBER | |PRITISH S. ROONGTA |WRO 0279357 |09820456348 | |RADHIKA R. PALKAR |WRO 0286747 |09833391122 | |RUTU A. SHAH |WRO 0278759 |09819033996 | |VINIT D. PATIL |WRO 0313142 |09819689616 | BATCH TIMING: 05.00 PM TO 09.00 PM BATCH COMMENCEMENT DATE: 6TH JULY 2009 CENTRE: RVG HOSTEL, ANDHERI (W) INDEX |Sr. No. |PARTICULARS |PAGE NO. | |1. |Internet And Terrorism |5 | |2. |Modern Terrorism And Internet ...

Words: 11580 - Pages: 47

Premium Essay

Researching and Overcoming Cultural Barriers in a Global Market

...Researching and Overcoming Cultural Barriers in a Global Market Patrick Moran SSCI210-1102A-07: Sociology American Inter-Continental University May 29, 2011 Abstract This paper is in fact a research project commissioned by the CEO of a major manufacturer of polymers in the United States. The company plans to sell to Asian and European markets as well as open up plants in Asia. The president and CEO of the company has asked that research be conducted as to how to best prepare personnel to the exposure of different cultures and how to conduct business with people of different culture. The CEO, Maverick, is concerned because many companies in the past have failed to successfully expand their businesses into foreign markets because of lack of understanding of foreign cultures. Group 4 researched the subject, and engaged in a group discussion that generated several points of view and ideas. There were many common beliefs, which will be defined, and solutions and policy recommendations will be offered in this paper. Researching and Overcoming Cultural Barriers in a Global Market Many companies are looking to foreign markets to expand their business and enlarge their market-share. Respecting laws and regulations imposed by a foreign government is the least of a company’s worries if it wishes to succeed. Standing in the way of success are cultural barriers that must be overcome, otherwise a company can expect to fail in its endeavors. Many companies have tried to establish...

Words: 2885 - Pages: 12

Free Essay

Forensics

...CCSI 410 Forensic Lab Report 1) Investigator’s Name: _Henry Broncano____ 2) Date of Investigation:__11-21-15 3) Lab Number and Title: _Week 4 Ilab____ 4) Summary of Findings When looking into week four of the ILabs I conducted the necessary steps requested. Do to the finding in the search of the floppy disk and its key search in the result of bob and manuel I believe there is enough to investigate. The findings show a solid lead to this case and deserve more of an evaluation. 5) Details of Investigation Saturday, 11/21/2015 1:00 PM: Determined Keyword List: Bid AND fraud*,Bid OR fraud* ,Acuerdo* AND agree*,Acuerdo* OR agree*,Bid* AND money,Bid* OR Money,Sub*,profit, stipulation, account ,contract. U.S. Department of Homeland Security, 03/22/05, 11/08/05* Estado Libre y Soberano de Chihuahua, Mexico, 04/19/05*, 07/14/05 U.S. Department of Housing and Urban Development, 01/31/05, 06/08/05* Ciudad Juarez, Mexico, 09/12/05 Laredo, TX, 02/10/05, 08/29/05, 10/04/05 Havens, New Mexico, 09/28/05*, 12/03/05 Tucson, Arizona, 02/28/05*, 05/27/05 Estado Libre y Soberano de Baja California, Mexico, 03/06/05 U.S. Immigration and Customs Enforcement, 01/05/05, 05/18/05 1:15 PM: Created Case File then added the provided floppy image file to begin my investigation. 1:20 PM: Added Keywords into the search 1:47 PM: was able to answer question 3. 2:19 PM: Setup of Case completed, and set Indexing option...

Words: 1191 - Pages: 5

Premium Essay

Forensics

...this research paper was to analyze three anti-forensic techniques for potential methods of mitigating their impact on a forensic investigation. Existing research in digital forensics and anti-forensics was used to determine how altered metadata, encryption, and deletion impact the three most prominent operating systems. The common file systems for these operating systems were analyzed to determine if file system analysis could be used to mitigate the impact of the associated anti-forensic technique. The countermeasures identified in this research can be used by investigators to reduce the impact of anti-forensic techniques on an investigation. Also, the results could be used as a basis for additional research. File system analysis can be used to detect and mitigate the impact of the three methods of anti-forensics researched under the right circumstances. Some areas of anti-forensics and file systems have been relatively well-researched. However continued research is necessary to keep pace with changes in file systems as well as anti-forensic techniques. Keywords: Cybersecurity, Albert Orbinati, Windows, Linux, Macintosh, file table. MITIGATING THE IMPACT OF ANTI-FORENSIC TECHNIQUES THROUGH FILE SYSTEM ANALYSIS by Gabriel A. Flynn A Capstone Project Submitted to the Faculty of Utica College August 2012 in Partial Fulfillment of the Requirements for the Degree of Master of Science Cybersecurity – Intelligence & Forensics © Copyright 2012 by Gabriel Flynn All Rights...

Words: 11835 - Pages: 48

Premium Essay

Network Security Plan

...The survey conducted of Corporation Tech existing hosts, while using NetWitness Investigator found that the company does not have a properly configured DMZ which exposes an organizations external services to the internet. Adding an additional layer to the security LAN will help the organization against any outside hackers. Another issue found was that the company did not have secure remote access to their computers while away from the organization. Granting access on a per-user basis only to those who have a bona fide need to access the network remotely. Implementing a remote access to the organizations computers while keeping it secure via firewalls and VPN server will ensure protection from outside intruders. I recommend that you install a VPN server as well as Remote access security. One firewall with Network Address Translation (NAT) this will add to the security that will not be visible outside of the organization and another firewall without NAT which will be visible outside of the organization. Network Security Plan Purpose Computer and network security incidents have become a fact of life for most organizations that provide networked information technology resources including connectivity with the global Internet. Current methods of dealing with such incidents are at best piecemeal relying on luck, varying working practices, good will and unofficial support from a few individuals normally engaged in central network or systems support. This approach undoubtedly...

Words: 3365 - Pages: 14

Premium Essay

Ld Debate

...The Forensics Files - 2 – The LD File Civil Disobedience Index Topic Overview 3-7 Definitions 8-10 Affirmative Cases 11-19 Negative Cases 20-25 Affirmative Extensions 26-34 Civil disobedience worked to free India. 26 Civil disobedience overthrew the communists in Poland. 26 The tradition of civil disobedience in America goes all the way back to the founders. 26 Civil disobedience can serve to prevent situations from escalating into violence. 27 Civil Disobedience has been used to promote peace. 27 Civil disobedience was used to promote racial equality. 27 Civil disobedience is used to try to prevent the destruction of the environment. 27 Civil disobedience is effective at changing the law. 28 Legal channels can take too long. 28 Consent to obey just laws does not imply consent to obey unjust ones. 28 Distinguishing between just and unjust laws to disobey can be universalized. 28 Civil disobedience can be stabilizing to a community by spreading a shared sense of justice. 29 Sometimes it is only the unjustified response to civil disobedience that has harmful consequence. 29 Civil disobedience is traditionally non-violent. 29 Civil disobedience is a form of exercising free speech- which is essential in a democracy. 30 Civil disobedience has been used to fight slave laws 30 Civil disobedience played a role in ending the Vietnam war. 30 Civil disobedience...

Words: 18413 - Pages: 74

Premium Essay

Csr a Comparative Critique

...Business Coursework Corporate Social Responsibility: With reference to your own research, do you think that the ability of a business to act successfully in a socially responsible manner is mainly determined by the products it produces? 1963 Corporate Social Responsibility is the continuing commitment by business to behave ethically and contribute to economic development while improving the quality of life of the workforce and their families as well as that of the local community and society at large. This simply means that a company gives back that which it has taken from the environment, workforce and society. There are many ways by which a company can behave in a socially responsible way, for example: using recycled products, making sure their products are fair trade (fair trade is paying workers with a wage enough for them to have a comfortable life so that they can survive, customers usually do not mind paying extra for these products) or giving donations to charities etc. “Companies with a defined corporate commitment to ethical principles do better financially than companies that don’t” – DePaul University 1997 A company behaving socially responsible is a relatively new phenomenon, in the past many companies did not care about their staff, economy and environment as long as the business was making profit and expanding, which is still the main objective for many companies today, but through a socially responsible way. The main objective for most companies...

Words: 2441 - Pages: 10

Premium Essay

A Guide to Forensic Accounting Investigation

...A GUIDE TO FORENSIC ACCOUNTING INVESTIGATION THOMAS W. GOLDEN, STEVEN L. SKALAK, AND MONA M. CLAYTON JOHN WILEY & SONS, INC. A GUIDE TO FORENSIC ACCOUNTING INVESTIGATION THOMAS W. GOLDEN, STEVEN L. SKALAK, AND MONA M. CLAYTON JOHN WILEY & SONS, INC. This book is printed on acid-free paper. Copyright © 2006 by PricewaterhouseCoopers LLP. PricewaterhouseCoopers refers to the individual member firms of the worldwide PricewaterhouseCoopers organization. All rights reserved. Published by John Wiley & Sons, Inc., Hoboken, New Jersey. Published simultaneously in Canada. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400, fax 978-646-8600, or on the Web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, 201-748-6011, fax 201-748-6008, or online at http://www.wiley.com/go/permissions. Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this...

Words: 246885 - Pages: 988

Premium Essay

E-Shoplifting

...opCHAPTER 10 E-Shoplifting The broadest and most prevalent error requires the most disinterested virtue to sustain it. Henry David Thoreau (1817–1862) 276 E-Shoplifting Introduction I the beginning, computer systems were installed to manage back-end N operations and support employees in their daily tasks. As technology evolved and systems became cheaper to deploy, businesses started using computers more and more in the management of their operations. By the early 1990s, computers and computer networks had become the information backbone of most enterprises, hosting a myriad of applications that even handled complex business logic. As Internet availability and use increased, information dissemination via the Web became very popular. It allowed small and mediumsized businesses to present information about them and their products for the whole world to see. No longer were storefronts restricted by geographic limitations. Numerous catalog stores such as Sears and Macy’s started putting out their catalogs and brochures in electronic form. By the late 1990s, almost every major consumer-based U.S. company had a Web site that featured its goods and services. Moreover, as Web applications gained momentum, merchants realized that they could reduce reliance on physical storefronts and let customers place orders and pay for them directly over the Internet. Thus was born the electronic storefront was born. Computer networks and applications were now mature enough to handle...

Words: 4936 - Pages: 20