Censorship through Forensics :

نویسندگان

  • Rebecca Wexler
  • Carey R. Murphey
چکیده

Amateur video shot on mobile devices worldwide is helping to hold authorities to account for war crimes, human rights violations, and other abuses of power. What happens when the authenticity of that video is in doubt? The possibility of justice depends on forensic investigators who sometimes shroud their tools and methods in secrecy, inhibiting reproducibility of their results and disabling scrutiny of their authenticity claims.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots

Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...

متن کامل

Cinema during the First Two Decades of the Soviet Union: How Censorship of the Arts Inhibits the Dissemination of Information

Dalhousie Journal of Interdisciplinary Management Abstract: This paper examines the increased censorship of film during the inaugural decades of the Soviet Union. Through an overview of the different genres and trends of Soviet cinema during this time, I draw parallels to the political climate and the role of film as an information medium. Censorship remains a persistent, if evolving, feature o...

متن کامل

First Glance: An Introductory Analysis of Network Forensics of Tor

The Tor network is a low-latency overlay network for TCP flows that is designed to provide privacy and anonymity to its users. It is currently in use by many as a means to avoid censorship of both information to be shared and information to be retrieved. This paper details the architecture of the Tor network as a platform for evaluating the current state of forensic analysis of the Tor network....

متن کامل

Linear Wavelet-Based Estimation for Derivative of a Density under Random Censorship

In this paper we consider estimation of the derivative of a density based on wavelets methods using randomly right censored data. We extend the results regarding the asymptotic convergence rates due to Prakasa Rao (1996) and Chaubey et al. (2008) under random censorship model. Our treatment is facilitated by results of Stute (1995) and Li (2003) that enable us in demonstrating that the same con...

متن کامل

Text Screening (Censorship) in Iran: A Historical Perspective

Censorship has a long history in Iran that has interfered with text production, i.e., original writing as well as translation. This phenomenon seems to have marked the borderline between the government and the ‘enlightened’ intellectuals throughout history in Iran. Different governments have delineated ‘redlines’ for authors and translators and dealt with these constructors of culture based on ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014