Tuesday, August 28, 2018

Questioned Documents: Secret Writing

Secret Writing: Cryptography, Encrypt- Decrypt, Steganography
All the way through history, military had used secure communications through encryption of the data. It was in 1980’s that the need for secure commercial and private communications had grown under the name of the Information Age. Internet and the World Wide Web is a platform that allows community to correspond information, mail and commerce in a digital medium. This has caused in an augment in the need for information security.
Historical Cryptography
  • Ancient Egypt
  • Greece
  • Rome
  • Alberti- Vigenere Cipher
  • Jefferson Wheel Cipher

War Driven Cryptography- WWI
  • Zimmerman Telegram
  • Choctaw Codetalkers

War Driven Cryptography- WWII
  • Enigma Encryption Machine
  • Purple

 Modern Encryption- Part 1
  •  One-time Pad
  • Pseudo-Random Number Generator
  • Symmetric Key Encryption (Private-Key)
Modern Encryption- Part 2
  • Asymmetric key Encryption (Public-Key)
  • Diffie-Hellman Key Exchange
  • RSA Encryption

Steganography

Let us learn about all this in detail through this video lecture.



Criminology 4: Social, Political and Organized Crimes



A crime can be well-defined as any act that is against laws or the legal justice system. There are various kinds of crimes, from crimes towards individuals to victimless crimes and violent crimes to white collar crimes. With every form of offence there also originates different sociological phenomena and demographic profiles.

Crimes against Persons: Crimes towards persons, also known as private crimes, comprise homicide, serious assault, sexual assault, and burglary. Personal crimes are disproportionately spread in the United States, with young, urban, poor, and racial sections doing these offenses more often than others.

Crimes against Property:  Property crimes comprise robbery of property deprived of bodily harm, such as burglary, larceny, auto theft, and arson. Like personal offenses, young, urban, poor, and racial minorities usually commit these offenses more than others.

Crimes against Morality: Crimes against ethics are also known victimless crimes because there is no petitioner, or victim. Prostitution, illegal gambling, and prohibited drug intake are all examples of victimless crimes.

White-Collar Crimes: White-collar crimes are offences that are done by individuals of good social position who commit offences in the relation to their profession. This comprises cheating (robbery of money from one’s employer), insider trading, and tax evasion and other abuses of income tax laws. White-collar crimes generally produce less anxiety in the public mind than other kinds of crime, though in relations of full dollars, white-collar crimes are even more significant for society. Nevertheless, these offenses are usually the least inspected and less accused.

For more details go through the given video lecture.


Monday, August 27, 2018

Digital Forensics : Operating Systems

An Operating System is a program which performances as an interface between the computer system users and the computer hardware components. It displays for a comprehensible setting in which a user may effortlessly develop and execute programs. Else, hardware knowledge would be compulsory for computer programming. Operating Systems obscures the complexity of hardware from apathetic users. The Operating Systems accomplishes resources and distributes them to specific programs and users. With the management of the Operating Systems, a programmer is cleared of difficult hardware deliberations. Operating Systems affords services for:

  • Processor Management 
  • Memory Management 
  • File Management 
  • Device Management 
  • Concurrency Control  
A running program does one very simple thing, i.e., it executes instructions. Billions of times every second, the processor procures instructions from memory, decodes it, and executes it. After it is finished with this instruction, the processor moves on to the next instruction, and so on, until the program finally concludes. There is a body of software, in actual fact that is in control for making it easy to run programs, allowing programs to share memory, facilitating programs to interact with devices. That body of software is known as the Operating System (OS), as it is in charge of making sure the system operates appropriately and proficiently in an easy-to-use manner.

Drugs of Abuse: Designer Drugs


Over ages, humans fortunately discovered that certain ingested plants were a source of unique satisfying feelings, beyond satiety. Some were mildly affecting (e.g. nicotine, caffeine), others enhanced mood or altered perception, reduced pain, intoxicated, or produced euphoria (e.g. alcohol, marijuana, hallucinogens, opiates, cocaine). In the past two centuries, consumption of these psychoactive substances expanded rapidly. Decontamination of the active chemicals, distribution by manoeuvres for maximum effect and global marketing contributed to this expansion. Modern chemistry has produced a huge range of variations of these plant products, paralleled by an unprecedented level of adverse biological, behavioral, medical and social consequences. Following this phenomenon, Designer drugs are produced to be similar to, but not identical with Psychoactive Drugs that are illegal to possess or sell for human consumption, unless for medical purposes. A recurring threat to public health, the Designer Drug sub-culture has burst out over the past decade. The rapid expansion can be attributed to a convergence of crucial technological advances combined with deceitful, aggressive marketing schemes.



Friday, August 24, 2018

Digital Forensics: Computer Software

Computer cannot do anything on its own. It is the user who instructs computer; what to do, how to do and when to do. In order to perform any task, a set of instructions in a particular sequence is given to the computer. These sets of instructions are called Programs. Software refers to a set of programs that makes the hardware perform a particular set of tasks in particular order. Software not only gives directions  to the computer to manage its internal resources, but also facilitates the user to use a computer system to provide specific business value. The computer is able to do nothing until it is instructed by software. Although computer hardware is, by design, wide-ranging purpose, software allows the user to instruct a computer system to execute specific functions that deliver business value. The systems software existing on a computer system provides the competences and restrictions within which the application software can function. If a computer is to function, software is not optional. Everything that a computer does, from the time the power switch is turned on until the system is shut down, is under the control of software. Basically, Software is the set of instructions that operate the computer, execute particular functions or tasks, and manipulate the data. For software (the instructions) to perform various functions, it must be programmed. That is, the instructions need to be written in a programming language that the computer can understand. Without a program, a computer is useless. 
Software can be either ‘proprietary’ (also called ‘closed’) or ‘open’. Proprietary software is privately maintained and controlled. A proprietary software scheme or technique is one that is held by a company, which will generally not disclose specifications that would let other companies to replicate the product. Gradually, proprietary software is seen as a drawback in several institutes; users have a preference to use ‘open’ software, which is software designed exhausting specifications that are widely accessible. The benefit of open software is that any person can make add-on products for it as they can appreciate in what manner it was designed. People using open software can mix and match products from different manufacturers. By making software public, however, a manufacturer permits others to duplicate its product, which many manufacturers do not want.

To know more details about the Computer Software watch the given video lecture.

Drugs of Abuse: Natural Drugs

NATURAL DRUGS

For thousands of years, natural products have played a very significant role in health care and prevention of diseases. The prehistoric civilizations of the Indians, Chinese and North Africans provide inscribed evidence for the use of natural sources for curing many diseases. Conventional natural product chemistry approaches facilitated a vast selection of bio-active secondary metabolites from terrestrial and marine sources to be discovered. 
Natural products have been the most effective source of potential drug leads. Natural products once assisted humanity as the source of all drugs, and higher plants provided most of these therapeutic agents. 
However, it was not until the 19th century that scientists isolated active components from various medicinal plants. 
  • Friedrich Serturner isolated morphine from Papaver somniferum in 1806, and since then natural products have been widely selected for their medicinal purposes. 
  • Atropine obtained from Atropa belladonna, strychnine, a Central Nervous System stimulant,
  • Ziconotide, identified from a cone snail, Conus magus, and Taxol are a few examples of active components taken out from natural sources. 
Drug detection from the usual sources mostly involves two methodologies, principal one is chemically determined which is discovery natural activities for disinfected complexes and second is the biologically driven in which bioassay‐guided approach starts with crude extracts or it can be combination of the both. Natural product chemistry is one of the oldest branches of the chemical sciences, its origin dating back to the first decades of the 19th century, or even before. 

Natural Products act as lead molecules for the synthesis of various potent drugs. Natural products entities depend not only on plants but also on other form of life like algae, fungus, sponges, molluscs, etc. Microorganisms have been widely screened for antibiotics since Fleming’s discovery of the antibacterial activity of Penicillium.

Let us learn about more Natural Drugs in the given video lecture


Criminology 3: Types of Crime

"Crime is an activity that breaks the law and enforcement”. Crime is not the problem of one home or one person; it is the problem of whole society. It costs not only in currency every year but also represents an  even  greater  loss  in  terms  of  human  values,  happiness and their morals. In recent years the crime graph is more appalling not only in India but all over the world.

According to the legal definition crime “implies any act done or committed in violation of   public   law,   and   for which the   person   is   liable to   punishment   by   indictment, presentment or impeachment”.  Crime is a universal   phenomenon.   Its   etiology   is extremely complex and the manifestations vary according to time, place and the individual. It also varies with historical periods, modes of life, economic conditions and social attitudes. 

Crime  has  been  with  mankind  since  the  beginning  of  recorded  history.  Ever  since  man has attempted to find the most effective deterrents against crime, society has framed the theories of punishment and established the prison system to control the criminal behavior but crime has continued unabated. The idea of a crime free society is utopian. Thus, the researchers suggest that we should place emphasis on prevention of crime.

Let us learn about the various types of crimes through this given video lecture.

Thursday, August 23, 2018

Criminology -2: Crime, Criminal and Criminology


Crime is an intended act or violation of criminal law (statutory or case law), committed without defense
or justification, and sanctioned by the state as an offence or misdemeanor ”

A person who commits crime is a criminal. But technically, unless a person is convicted  of crime by the Court of Law, he cannot be designated as a criminal.  If pronouncement is  pending by the court then he is referred to as an „alleged criminal‟.  Against this backdrop,  crime may be defined as “any act done or committed in violation of public law, for which  the person is liable to punishment by indictment, presentment or impeachment.

Criminology is defined as the “scientific learning of crime as a social phenomenon” or “a  science  that  deals with  different  aspects  of  behavior  that  violates  criminal law”. In  its  broader sense, it is referred to as the “entire figure of information regarding  the  causes  and  prevention  of  crime,  punishment  and  correction  of  criminals,  and process of correctional institutions and agencies”.

To know more about the causes of crime and growth of criminology go though the given video lecture.

Wednesday, August 22, 2018

Instrumentation: Measurements, Signals and Data


A signal may be defined as the output of a transducer that is responding to the chemical system of interest. The signal may be separated into two parts, one caused by the analyte(s) and the other caused by other components of the sample matrix and the instrumentation used in the measurement. This latter part of the signal is known as noise. 
Although the ability to separate significant data-containing signals from meaningless noise has constantly been a desirable property of any instrument, it has become imperative with the demand for progressively more sensitive measurements. The amount of noise present in an instrument system determines the smallest concentration of analyte that can be accurately measured and also fixes the precision of measurement at larger concentrations.
 Noise reduction (or signal enhancement) is a primary consideration in obtaining useful data from measurements that involve either weak signal sources or trace amount of analyte(s). 
The two main methods of enhancing the signal are 
(1) the use of electronic hardware devices, such as filters, or equivalent computer software algorithms to process signals from the measurement as they pass through the instrument and 
(2) post measurement mathematical treatment of data. Among the more useful post measurement methods are the statistical techniques.
In addition to signal enhancement, these techniques aid in identifying sources of error and determining precision, while providing a method for an objective comparison of results. This module will deal with some common noise-reduction techniques and briefly review important statistical methods typically used in the treatment of instrumental data.
After watching this video lecture you will learn about:
· Signal to Noise Ratio
· Sensitivity and detection limit 
· Sources of Noise 
· Hardware techniques for Signal to Noise enhancement 
· Software techniques for Signal to Noise enhancement 
· Data treatment by filtering, Smoothing, and averaging

Digital Forensics: Computer Peripherals and Hardware

A computer peripheral device can be defined as any device that is connected to the computer externally, which is not originally a part of the computer’s core architecture. The core architecture of the computer includes the motherboard, with power supply attached to it along with the Central Processing Unit (CPU) pre-installed; all of this contained together. Everything else can be said to be a peripheral device. However, there are several other elements that are required for a computer to actually function, they being the hard drive or the RAM i.e. the Random- Access Memory.
The term peripheral device is used to refer any external device other than the computer core. These external devices are used to connect to the computer and increase its functionality. The best example for this to explain is the use of Printer. Once it is connected to the computer, it can be used to print a number of documents.

For more details go through the given video lecture.

Tuesday, August 21, 2018

Criminology 1


Criminology is the scientific study of the nature, extent, management, causes, control, consequences, and prevention of criminal behavior, both on the individual and social levels. Criminology is an interdisciplinary field in both the behavioral and social sciences, drawing especially upon the research of sociologists , psychologists , philosophers , psychiatrists , biologists, social anthropologists, as well as scholars of law.

Let us learn more about Criminology from the given lecture.

Instrumentation: Introduction to Instrumental Methods


The use of instrumentation is an exciting and fascinating part of chemical analysis that interacts with all the areas of chemistry and with many other fields of pure and applied science. Analyses of Martian soils, the body fluids of racehorses and Olympic athletes, the engine oil of commercial and military jet aircraft, and even the Shroud of Turin are examples of problems that require instrumental techniques. Often it is necessary to use several instrumental techniques to obtain the information required to solve an analytical problem. 

Analytical instrumentation plays an important role in the production and evaluation of new products and in the protection of consumers and the environment. Instrumentation provides the lower detection limits required to assure safe foods, drugs, water, and air. The manufacture of materials whose composition must be known precisely, such as the substances used in integrated circuit chips, is monitored by analytical instruments. The large sample through puts made possible by automated instrumentation often relieve the analyst of the tedious tasks associated with chemical analysis. Thus, the analyst is freed to examine components of the analytical system, such as sampling methods, data treatment and the evaluation of results.

For more details watch the given lecture.

Monday, August 20, 2018

Forensic Psychology: Psychiatric Disorders: Attention Deficit Hyperactivity Disorder

Attention-deficit/hyperactivity disorder (ADHD) is a brain disorder marked by an ongoing pattern of inattention and/or hyperactivity-impulsivity that interferes with functioning or development.
Inattention and hyperactivity/impulsivity are the key behaviors of ADHD. Some people with ADHD only have problems with one of the behaviors, while others have both inattention and hyperactivity-impulsivity.Most children have the combined type of ADHD.
In preschool, the most common ADHD symptom is hyperactivity.
Scientists are not sure what causes ADHD. Like many other illnesses, a number of factors can contribute to ADHD, such as:
  • Genes
  • Cigarette smoking, alcohol use, or drug use during pregnancy
  • Exposure to environmental toxins during pregnancy
  • Exposure to environmental toxins, such as high levels of lead, at a young age
  • Low birth weight
  • Brain injuries
ADHD is more common in males than females, and females with ADHD are more likely to have problems primarily with inattention. Other conditions, such as learning disabilities, anxiety disorder, conduct disorder, depression, and substance abuse, are common in people with ADHD. 
For more details go through the given video.

Sunday, August 19, 2018

Digital Forensics: Introduction to Computer Fundamentals and Historical Background

COMPUTER is an acronym for Commonly Operated Machine Particularly Used for Technology and Research.  A computer is a sophisticated electronic device, wherein  the user  inputs  raw  data  and  it  processes  this  raw  data  using  a  set  of commands called  as programs  and  gives  the  output  to  the client and  at  the  last  stage,  saves  the  output  for prospect use.  A  Computer  can  process  numerical  as  well  as mathematics and rational calculations.
A computer has 4 functions:
a. Input
b. Processing
c. Output
d. Storage
Input:  Input  refers  to  the procedure of  feeding  raw  information  to  the  computer  using input devices. Raw information consists of letters, images, numbers, etc.
Processing: Processing is the internal operation of the computer. Process is the operation of data as per the given set of instructions.
Output: Output refers to the product of the processed data that is shown by means of the computer after processing the data.  These results or output can be saved in different storage devices for prospect use.
Storage: It is procedure of preserving the output for a certain period of time if required.

For more details watch the given video.

Welcome all

Hello Everyone !!
In this blog I will be writing about Forensic Science , its development, various domains, uses and all that I have learnt and taught in all the years so far...  Through this blog I will also be sharing the various video lectures which will be surely helpful for those who want to LEARN more about FORENSICS....
So keep yourself tuned and updated ...