Revision Cards Flashcards

(35 cards)

1
Q

What is the first principal of the ACPO guidelines?

A

No action taken by law enforcement agencies should change data held on a computer or storage media which may subsequently be relied upon in court.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the second principal of the ACPO guidelines (competence)?

A

In circumstances where a person finds it necessary to access original data held on a computer or on storage media, that person must be competent to do so and be able to give evidence explaining the relevance and the implications of their actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the third principal of the ACPO guideline?

A

An audit trail of all processes applied to computer-based electronic evidence should be created and preserved.

An independent third party and should be able to examine those processes and achieve the same result.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the fourth principal of the ACPO guidelines?

A

The person in charge of the investigation has overall responsibility for ensuring that the law and these principles are adhered to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the key sections of the Computer Misuse Act?

A
  • Section 1: Unauthorised access to computer material.
  • Section 2: Unauthorised access with intent to commit or facilitate the commission of a further offence.
  • Section 3: Unauthorised modification of computer material.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the key sections of the Protection of Children Act (1978)?

A

Section 1:

  • Taking, making or possessing;
  • Distributing;
  • Possessing with a view to distributing;

An indecent photograph of a child.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What did the Criminal Justice and Public Order act add to POCA?

A

Amended S1 of POCA to include pseudophotographs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What did the Sexual Offences Act add to POCA?

A
  • Increased age of a child from 16 to 18
  • Added a defence where an incident photograph of a child over the age of 16 was created by the child’s long-term partner
  • Added a defence where it is necessary to create an indecent image of a child for criminal investigation.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What principle is facial reconstruction based on?

A
  • Facial reconstruction is based on the principle that there is a predictable relationship between the skull and overlying soft tissues.
  • This form of ID is used when facial features are severely damaged or decomposed beyond recognition.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the five steps of the Enhanced Cognitive Interview?

A
  1. Rapport building
  2. Recreate the context of the original event
  3. Open-ended narration
  4. Questioning
  5. Closure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Rapport Building?

A
  • Sets witness at ease, placing them in the correct frame of mind.
  • Transfer control to the witness.
    • Witness holds the key to a successful interview and should be made aware of this fact.
    • Let the witness choose at which point to start.
    • Listen and allow for pauses.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Context Reinstatement?

A
  • Most effective component to the CI
  • Invite witness to close their eyes and place themselves back at the scene.
  • Remember associated events including sights, smells and sounds.
  • Record any emotions.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the Open-Ended Narration?

A
  • Referred to as free-flowing narration
  • Witness describes the event of their own accord without prompts from the operator/interviewer.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the questioning phase of the CI?

A
  • Interviewer pays a more central role than in open-ended narration but the witness remains in control.
  • Focused retrieval: Open-ended questions, do not interrupt, allow for long pauses.
  • Witness compatible questioning: Conduct the interview at the witness’s pace rather than dictating the pace.
  • Avoid biased questions.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Closure?

A
  • Brief the witness as to what will happen next
  • Exchange contact details if they remember anything else.
  • Leave the witness in a positive frame of mind.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the differences between E-FIT and EFIT-6?

A
  • E-FIT is a feature-based composite system; face is constructed by selecting and arranging individual features.
  • E-FIT 6 is a holistic-based composite system; adapt a whole-face approach and appeal to the human capability to recognise faces.
    • Works on the notion of face space in which a face is represented as a point in a multidimensional space.
17
Q

Why are holistic composites better than feature-based systems?

A

Holistic composites are better than feature-based systems as it has been shown that we recognise faces holistically rather than a sum of individual features.

It uses the notion of face space in that a face is represented as a point in multidimensional space, which helps memory recall.

18
Q

What are the stages of image acquisition?

A
  • The lens focuses the image on the sensor
  • Sensitivity to infrared light is reduced by the filter.
  • CFA compensates for ‘colour blindness’ of the sensor.
  • Sensor turns light into a recordable image.
  • DSP unit performs some basic image processing before the image is saved.
19
Q

What role does the lens play?

A

The lens focuses light onto the sensor.

s = distance of object from the lens

s’ = distance of focused image from the sensor

f = focal length

20
Q

What is the role of the infrared filter?

A

The infrared filter reduces the amount of IR that reaches the sensor, as the camera is sensitive to IR.

The eye is not sensitive to IR light.

21
Q

What is the role of the Colour Filter Array?

A
  • The two common configurations are the stripe and Bayer
  • In both configurations, there are twice as many green filter elements as there are blue and red; mimics human sensitivity to green light.
  • The CFA separates natural light into its individual colour components.
22
Q

What is the role of the sensor?

A
  • Sensors are made from tightly packed light-sensitive photodiodes constructed on a silicon wafer.
  • Photodiodes are semiconductor devices that generate an electrical charge in proportion to the number of photons that reach them.
  • Electrical charges are converted into voltages that determine pixel brightness.
23
Q

What are the advantages and disadvantages of the CCD sensor?

A
  • Advantages:
    • Low noise, high S/N ratio.
    • Proven records of technologies and commercialisation
  • Disadvantages:
    • High power consumption
    • Slower speed
    • On-chip peripheral circuits are difficult to manufacture.
24
Q

What are the advantages and disadvantages of the CMOS sensor?

A

Advantages:

  • Manufacture is simple and cheaper.
  • Uses less power than CCD

Disadvantages:

  • Relatively high noise
25
What is the role of the DSP module?
* Voltages are read from the image sensor and are fed into an onboard image processing module. * Image processing module contains algorithms for improving perceived quality e.g. WB, smoothing, demosaicing and compression
26
What is the process of demosaicing?
* Reconstructs a full-colour image from incomplete colour samples output from the CFA. * Uses interpolation.
27
What are the three types of data redundancy?
* Coding redundancy: caused by suboptimal codewords for symbol encoding - symbol represents a grey-level * Interpixel redundancy: due to grey-level correlations between neighbouring pixels - justifies image transformation. * Psycho-visual redundancy: information contained within an image that is superfluous to the interpretation/aesthetics of an image. Clarity depends on spatial frequency and amplitude.
28
What are the basics of JPEG image compression?
1. Split the image into 8x8 blocks and treat each block separately. 2. Apply DCT to each block. 3. Quantise the DCT coefficients (transformed 8x8 block). 4. Apply Huffman coding scheme to quantised coefficients. 5. Save the result as a .jpg compressed file.
29
What is PRNU and its evidential use?
* Photo Response Non-Uniformity (PRNU) is variation in pixel sensitivity caused by manufacturing defects and natural NU of the silicon used in the image sensor. * Pattern noise is consistent, and unique to the image sensor and can be used to match an evidential image to its source camera. It occurs in the same pixel locations in every image.
30
What is Hashing?
* A hash is a transformation of data into a message digest that is unique to the data - process is not reversible * Typical algorithms are Secure Hashing Algorithm (SHA-1) and Message Digest 5 algorithm (MD5)
31
What are hashing functions used for, and what are the properties?
* A cryptographic hash verifies the integrity of the data - check it has not been altered in any way. * Properties: * Fixed length message digest. The length of original data message cannot be determined from the digest. * Digest is unique to data message. * Impossible to recover the original message from the digest alone.
32
What is the purpose of Digital Signing?
* Used to verify the integrity of a digital document and authenticate that it is from who it claims to be from.
33
What is the process of digital signing?
1. Arrange for the recipient to obtain the public key. 2. The sender creates a message. 3. Compute the message digest value and use the private key to encrypt the message digest value. 4. The message and encrypted message digest value are combined, forming a digitally signed message. 5. The Recipient uses the public key to check the message came from the sender and is unaltered.
34
What are Digital Certificates?
* Verifies that the public key belongs to the owner of the certificate. * Is signed by a certificate authority (CA) * CA encrypts certified digest with the private key that proves it has come from the CA. * The end user has CA's public key and validates the signature on the certificate.
35
What is the Random Interval Method?
* Uses a pseudo-random number generator (PRNG) to generate a sequence of random intervals. * A number is used to seed the PRNG. This number is the stego-key * The stego-key is used by the sender to generate the sequence of random intervals that allows them to decrypt the message.