Computer Crime Research Center


Holograms to help security

Date: April 29, 2004
Source: Computer Crime Research Center
By: Natalya Akhtyrskaya

A new direction in gathering evidence for ascertaining guilt of a person that committed computer crime is development of methods to apply holographic systems of information recording.

Information on an object recorded by composite method of recording is uniformly distributed over a large area. This method determines a high density of information recording and its high reliability. All information recorded on a hologram is read with help of a beam of light simultaneously from the whole hologram with great speed. This method brings new immeasurable capabilities in the sphere of computers and other systems of information storing and processing. Estimates show that a flat hologram on a plate with size of 70x70 mm can contain 100 millions of bits of information; it is equal to 300 books with 200 pages each. A three-dimensional hologram can contain million of millions of bits of information in one cubic centimeter. The task is now lies in finding ways to conveniently and quickly record information and, what is specially difficult, how to quickly read the needed information from this bulk of information.

Lately a number of devices basing on principles of holographic that can be applied or modified to solve tasks of criminalistics. Holoscope and holographic disdrometer are such devices.

Holoscope or criminalistic devices, created on holoscope basis, can be applied to view the scene of a crime, to searches and other investigative activities, as they allow revealing and fixing transphenomenal objects.

Holographic methods of information processing can be applied also to record initial data. This is related to an opportunity to create holographic devices that will allow storing of high capacity of information, coding of information, reading and comparing of images and objects and so on.

Capacity to code information can be widely applied in criminalistics, particularly in fighting terrorism and computer crimes, in view of complexity of fixing tracks and information data bases that ascertain the guilt of criminals.

Produced holograms may be brought to court as evidence or attachment to protocols of crime scene inspection or inspection of sophisticated devices (for example a computer).

Information from the operative memory should be seized by copying of information to the physical medium on the corresponding computer using only certified software. In such cases this software should be provided with the corresponding documents. A program that is being run on the inspected computer during examination; results of this program running; manipulations with computer facilities that occurred during the process of investigative activity and their results should be fixed in the protocol of inspection therein. Otherwise information in the protocol won’t have logical evidential meaning.

Development of high tech crimes demands simultaneous adaptation and procedural introduction of new ways of fixing evidential information, formulating unified definition of guilt in cases of crimes with international impact, causing damage to economic systems, military defense and information safety.
Add comment  Email to a Friend

Discussion is closed - view comments archieve
2005-09-02 05:29:04 - Very nice Gergana
Total 1 comments
Copyright © 2001-2024 Computer Crime Research Center
CCRC logo