Who's At The Keyboard? Authorship Attribution in Digital Evidence Investigations

نویسنده

  • Carole E. Chaski
چکیده

In some investigations of digital crime, the question of who was at the keyboard when incriminating documents were produced can be legitimately raised. Authorship attribution can then contribute to the investigation. Authorship methods which focus on linguistic characteristics currently have accuracy rates ranging from 72% to 89%, within the computational paradigm. This article presents a computational, stylometric method which has obtained 95% accuracy and has been successfully used in investigating and adjudicating several crimes involving digital evidence. The article concludes with a brief review of the current admissibility status of authorship identification techniques. Section 1: The Need and Available Methods In the investigation of certain crimes involving digital evidence, when a specific machine is identified as the source of documents, a legitimate question is, “Who was at the keyboard when the relevant documents were produced?” For example, consider the following scenarios, drawn from actual cases. 1. A government employee wrote e-mails to his supervisor in which he disparaged her racial heritage. After he was terminated for cause, he sued the federal government, claiming that his workspace cubicle had been open, allowing any of his co-workers to author the e-mails on his computer and send them from his computer without his knowledge. 2. A young, healthy man was found dead in his own bed by his roommate who notified the police. When the autopsy results showed that he died by injection, his death was investigated as a potential homicide. During the investigation, the roommate gave the police suicide notes which he found on the home computer. These had never been printed or discovered before the death. 3. A civilian intern with a military research laboratory kept an electronic journal of her relationship with her supervisor. As her internship came to a close, she claimed that her relationship with her supervisor was not mutually consenting and that he had raped her. When the intern’s work computer was searched, the journal was discovered. The intern claimed that during the time she had not had access to the work computer or the journal, her supervisor had edited the journal to agree with his version of the events.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Keyboard Dilemma and Authorship Identification

The keyboard dilemma is the problem of identifying the authorship of a document that was produced by a computer to which multiple users had access. This paper describes a systematic methodology for authorship identification. Validation testing of the methodology demonstrated 95% cross validated accuracy in identifying documents from ten authors and 85% cross validated accuracy in identifying fi...

متن کامل

More than Word Frequencies: Authorship Attribution via Natural Frequency Zoned Word Distribution Analysis

With such increasing popularity and availability of digital text data, authorships of digital texts can not be taken for granted due to the ease of copying and parsing. This paper presents a new text style analysis called natural frequency zoned word distribution analysis (NFZ-WDA), and then a basic authorship attribution scheme and an open authorship attribution scheme for digital texts based ...

متن کامل

Authorship, Practical Authorship and Documentary Boundary Objects in Archaeological Information Work

On the basis of an empirical investigation of archaeological information work, this paper discusses the interplay of authorship of documents and documentary boundary objects, and the practical authorship of social situations and identities and how a closer look at the authorship (as understood in the contemporary authorship literature) can be helpful in elaborating our understanding of the maki...

متن کامل

OBA2: An Onion approach to Binary code Authorship Attribution

A critical aspect of malware forensics is authorship analysis. The successful outcome of such analysis is usually determined by the reverse engineer’s skills and by the volume and complexity of the code under analysis. To assist reverse engineers in such a tedious and error-prone task, it is desirable to develop reliable and automated tools for supporting the practice of malware authorship attr...

متن کامل

Digital Forensics as a Big Data Challenge

Digital Forensics, as a science and part of the forensic sciences, is facing new challenges that may well render established models and practices obsolete. The dimensions of potential digital evidence supports has grown exponentially, be it hard disks in desktop and laptops or solid state memories in mobile devices like smartphones and tablets, even while latency times lag behind. Cloud service...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJDE

دوره 4  شماره 

صفحات  -

تاریخ انتشار 2005