Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Conference

Discipline
Institution
Keyword
Publication Year
Publication
File Type

Articles 13981 - 14010 of 16633

Full-Text Articles in Physical Sciences and Mathematics

Visualizing Instant Messaging Author Writeprints For Forensic Analysis, Angela Orebaugh, Jason Kinser, Jeremy Allnutt May 2014

Visualizing Instant Messaging Author Writeprints For Forensic Analysis, Angela Orebaugh, Jason Kinser, Jeremy Allnutt

Annual ADFSL Conference on Digital Forensics, Security and Law

As cybercrime continues to increase, new cyber forensics techniques are needed to combat the constant challenge of Internet anonymity. In instant messaging (IM) communications, criminals use virtual identities to hide their true identity, which hinders social accountability and facilitates cybercrime. Current instant messaging products are not addressing the anonymity and ease of impersonation over instant messaging. It is necessary to have IM cyber forensics techniques to assist in identifying cyber criminals as part of the criminal investigation. Instant messaging behavioral biometrics include online writing habits, which may be used to create an author writeprint to assist in identifying an author …


Botnet Forensic Investigation Techniques And Cost Evaluation, Brian Cusack May 2014

Botnet Forensic Investigation Techniques And Cost Evaluation, Brian Cusack

Annual ADFSL Conference on Digital Forensics, Security and Law

Botnets are responsible for a large percentage of damages and criminal activity on the Internet. They have shifted attacks from push activities to pull techniques for the distribution of malwares and continue to provide economic advantages to the exploiters at the expense of other legitimate Internet service users. In our research we asked; what is the cost of the procedural steps for forensically investigating a Botnet attack? The research method applies investigation guidelines provided by other researchers and evaluates these guidelines in terms of the cost to a digital forensic investigator. We conclude that investigation of Botnet attacks is both …


Development And Dissemination Of A New Multidisciplinary Undergraduate Curriculum In Digital Forensics, Masooda Bashir, Jenny A. Applequist, Roy H. Campbell, Lizanne Destefano, Gabriela L. Garcia, Anthony Lang May 2014

Development And Dissemination Of A New Multidisciplinary Undergraduate Curriculum In Digital Forensics, Masooda Bashir, Jenny A. Applequist, Roy H. Campbell, Lizanne Destefano, Gabriela L. Garcia, Anthony Lang

Annual ADFSL Conference on Digital Forensics, Security and Law

The Information Trust Institute (ITI) at the University of Illinois at Urbana-Champaign is developing an entirely new multidisciplinary undergraduate curriculum on the topic of digital forensics, and this paper presents the findings of the development process, including initial results and evaluation of a pilot offering of the coursework to students. The curriculum consists of a four-course sequence, including introductory and advanced lecture courses with parallel laboratory courses, followed by an advanced course. The content has been designed to reflect both the emerging national standards and the strong multidisciplinary character of the profession of digital forensics, and includes modules developed collaboratively …


Computer Forensics For Accountants, Grover S. Kearns May 2014

Computer Forensics For Accountants, Grover S. Kearns

Annual ADFSL Conference on Digital Forensics, Security and Law

Digital attacks on organizations are becoming more common and more sophisticated. Firms are interested in providing data security and having an effective means to respond to attacks. Accountants possess important investigative and analytical skills that serve to uncover fraud in forensic investigations. Some accounting students take courses in forensic accounting but few colleges offer a course in computer forensics for accountants. Educators wishing to develop such a course may find developing the curriculum daunting. A major element of such a course is the use of forensic software. This paper argues the importance of computer forensics to accounting students and offers …


Applying Memory Forensics To Rootkit Detection, Igor Korkin, Ivan Nesterov May 2014

Applying Memory Forensics To Rootkit Detection, Igor Korkin, Ivan Nesterov

Annual ADFSL Conference on Digital Forensics, Security and Law

Volatile memory dump and its analysis is an essential part of digital forensics. Among a number of various software and hardware approaches for memory dumping there are authors who point out that some of these approaches are not resilient to various anti-forensic techniques, and others that require a reboot or are highly platform dependent. New resilient tools have certain disadvantages such as low speed or vulnerability to rootkits which directly manipulate kernel structures, e.g., page tables. A new memory forensic system – Malware Analysis System for Hidden Knotty Anomalies (MASHKA) is described in this paper. It is resilient to popular …


The Federal Rules Of Civil Procedure: Politics In The 2013-2014 Revision, John W. Bagby, Byron Granda, Emily Benoit, Alexander Logan, Ryan Snell, Joseph J. Schwerha May 2014

The Federal Rules Of Civil Procedure: Politics In The 2013-2014 Revision, John W. Bagby, Byron Granda, Emily Benoit, Alexander Logan, Ryan Snell, Joseph J. Schwerha

Annual ADFSL Conference on Digital Forensics, Security and Law

Pre-trial discovery is perpetually controversial. Parties advantaged by strict privacy can often avoid justice when this is disadvantageous to their interests. Contrawise, parties advantaged by relaxed litigation privacy can achieve justice when all facts are accessible irrespective of their repositories, ownership or control. American-style pre-trial discovery in civil and regulatory enforcement is relatively rare around the world. U.S. discovery rules open nearly all relevant and non-privileged data for use by opposing parties. The traditional discovery process was costly and time consuming in the world of tangible paper data. However, these burdens have increased, rather than diminished as often predicted, as …


Testing And Evaluating The Harmonised Digital Forensic Investigation Process In Post Mortem Digital Investigation, Emilio R. Mumba, H. S. Venter May 2014

Testing And Evaluating The Harmonised Digital Forensic Investigation Process In Post Mortem Digital Investigation, Emilio R. Mumba, H. S. Venter

Annual ADFSL Conference on Digital Forensics, Security and Law

Existing digital forensic investigation process models have provided guidelines for identifying and preserving potential digital evidence captured from a crime scene. However, for any of the digital forensic investigation process models developed across the world to be adopted and fully applied by the scientific community, it has to be tested. For this reason, the Harmonized Digital Forensic Investigation Process (HDFIP) model, currently a working draft towards becoming an international standard for digital forensic investigations (ISO/IEC 27043), needs to be tested.

This paper, therefore, presents the findings of a case study used to test the HDFIP model implemented in the ISO/IEC …


Generation And Handling Of Hard Drive Duplicates As Piece Of Evidence, T. Kemmerich, F. Junge, N. Kuntze, C. Rudolph, B. Endicott-Popovsky, L. Großkopf May 2014

Generation And Handling Of Hard Drive Duplicates As Piece Of Evidence, T. Kemmerich, F. Junge, N. Kuntze, C. Rudolph, B. Endicott-Popovsky, L. Großkopf

Annual ADFSL Conference on Digital Forensics, Security and Law

An important area in digital forensics is images of hard disks. The correct production of the images as well as the integrity and authenticity of each hard disk image is essential for the probative force of the image to be used at court. Integrity and authenticity are under suspicion as digital evidence is stored and used by software based systems. Modifications to digital objects are hard or even impossible to track and can occur even accidentally. Even worse, vulnerabilities occur for all current computing systems. Therefore, it is difficult to guarantee a secure environment for forensic investigations. But intended deletions …


Internet Addiction To Child Pornography, Rachel Sitarz, Marcus Rogers, Lonnie Bentley, Eugene Jackson May 2014

Internet Addiction To Child Pornography, Rachel Sitarz, Marcus Rogers, Lonnie Bentley, Eugene Jackson

Annual ADFSL Conference on Digital Forensics, Security and Law

During the present age and time, it seems as though people in society have become addicted to nearly anything and everything, whether it be to a substance, an activity or an object. The Internet and pornography is no exception. While commonly thought of as a deviant behavior, many are displaying addictions towards the Internet and pornography. More alarming, however, are those who are viewing, downloading, or trading child pornography and displaying addictive Internet behaviors, for they are spending excessive amounts of time engaging in the proliferation of child pornographic materials. For this reason, addiction to the Internet and usage of …


Using Internet Artifacts To Profile A Child Pornography Suspect, Marcus K. Rogers, Kathryn C. Seigfried-Spellar May 2014

Using Internet Artifacts To Profile A Child Pornography Suspect, Marcus K. Rogers, Kathryn C. Seigfried-Spellar

Annual ADFSL Conference on Digital Forensics, Security and Law

Digital evidence plays a crucial role in child pornography investigations. However, in the following case study, the authors argue that the behavioral analysis or “profiling” of digital evidence can also play a vital role in child pornography investigations. The following case study assessed the Internet Browsing History (Internet Explorer Bookmarks, Mozilla Bookmarks, and Mozilla History) from a suspected child pornography user’s computer. The suspect in this case claimed to be conducting an ad hoc law enforcement investigation. After the URLs were classified (Neutral; Adult Porn; Child Porn; Adult Dating sites; Pictures from Social Networking Profiles; Chat Sessions; Bestiality; Data Cleaning; …


Life (Logical Iosforensics Examiner): An Open Source Iosbackup Forensics Examination Tool, Ibrahim Baggili, Shadi Al Awawdeh, Jason Moore May 2014

Life (Logical Iosforensics Examiner): An Open Source Iosbackup Forensics Examination Tool, Ibrahim Baggili, Shadi Al Awawdeh, Jason Moore

Annual ADFSL Conference on Digital Forensics, Security and Law

In this paper, we present LiFE (Logical iOS Forensics Examiner), an open source iOS backup forensics examination tool. This tool helps both researchers and practitioners alike in both understanding the backup structures of iOS devices and forensically examining iOS backups. The tool is currently capable of parsing device information, call history, voice messages, GPS locations, conversations, notes, images, address books, calendar entries, SMS messages, Aux locations, facebook data and e-mails. The tool consists of both a manual interface (where the user is able to manually examine the backup structures) and an automated examination interface (where the tool pulls out evidence …


Why Penetration Testing Is A Limited Use Choice For Sound Cyber Security Practice, Craig Valli, Andrew Woodward, Peter Hannay, Mike Johnstone May 2014

Why Penetration Testing Is A Limited Use Choice For Sound Cyber Security Practice, Craig Valli, Andrew Woodward, Peter Hannay, Mike Johnstone

Annual ADFSL Conference on Digital Forensics, Security and Law

Penetration testing of networks is a process that is overused when demonstrating or evaluating the cyber security posture of an organisation. Most penetration testing is not aligned with the actual intent of the testing, but rather is driven by a management directive of wanting to be seen to be addressing the issue of cyber security. The use of penetration testing is commonly a reaction to an adverse audit outcome or as a result of being penetrated in the first place. Penetration testing used in this fashion delivers little or no value to the organisation being tested for a number of …


Awareness Of Scam E-Mails: An Exploratory Research Study, Tejashree D. Datar, Kelly A. Cole, Marcus K. Rogers May 2014

Awareness Of Scam E-Mails: An Exploratory Research Study, Tejashree D. Datar, Kelly A. Cole, Marcus K. Rogers

Annual ADFSL Conference on Digital Forensics, Security and Law

The goal of this research was to find the factors that influence a user’s ability to identify e-mail scams. It also aimed to understand user’s awareness regarding e-mail scams and actions that need to be taken if and when victimized. This study was conducted on a university campus with 163 participants. This study presented the participants with two scam e-mails and two legitimate e-mails and asked the participants to correctly identify these e-mails as scam or legitimate. The study focused on the ability of people to differentiate between scam and legitimate e-mails. The study attempted to determine factors that influence …


Predicting The Optical Response Of A Generalized Multilayer Thin Film, A.J. Lawrence, Erik J. Sánchez May 2014

Predicting The Optical Response Of A Generalized Multilayer Thin Film, A.J. Lawrence, Erik J. Sánchez

Student Research Symposium

The contrast mechanism in Kerr imaging is the apparent angle through which the plane of polarization is rotated upon reflection from a magnetic surface, and this can be calculated for a well characterized surface given the polarization state of the incident light. As in traditional optical microscopy, the spatial resolution is limited by diffraction to roughly half the wavelength of the illumination light. The diffraction limit can be circumvented through the use of near-field scanning optical microscopy, in which the illumination source is an evanescent field at the tip of a tapered optical fiber. The complication in merging these two …


Zinc Oxide Random Laser Threshold Enhancement Via Addition Of Passive Scatterers, Zachariah M. Peterson, Rolf Könenkamp, Robert Campbell Word May 2014

Zinc Oxide Random Laser Threshold Enhancement Via Addition Of Passive Scatterers, Zachariah M. Peterson, Rolf Könenkamp, Robert Campbell Word

Student Research Symposium

Zinc oxide (ZnO) is a wide bandgap n-type semiconductor with a variety of optical and electrical applications and many methods of fabrication. Strong optical scattering and photoluminescence from ZnO nanoparticles and films makes the material an ideal candidate for a random laser. Previous studies have shown both incoherent and coherent random lasing from ZnO films and particles agglomerations. When used as a passive scatterer in a laser dye gain medium, the addition of ZnO has been shown to improve the threshold for lasing. By combining active scattering ZnO with a passive scatterer, MgO, we show here that the lasing threshold …


Open-Source, Low-Cost Sensor For Custom Water Level Monitoring In Observation Wells And Piezometers, Leslie A. Mowbray May 2014

Open-Source, Low-Cost Sensor For Custom Water Level Monitoring In Observation Wells And Piezometers, Leslie A. Mowbray

Student Research Symposium

Many commercial sensors exist for monitoring water levels in piezometers and wells. However, these sensors tend to be expensive and contain proprietary hardware and software that make customization by users difficult. Recently, the vast open-source Arduino programming community has enabled the development of highly customizable, low cost sensors with the precision and accuracy needed for scientific research. Here, an ultrasonic distance sensor is developed to monitor the water level in a 2” piezometer with sub-centimeter resolution, powered by a lead-acid battery and solar cell to record sub-minute time increments for duration of days to weeks. This sensor was developed specifically …


The State Of The Upper Bay Of Panama Wetlands: Ecological Significance, Environmental Policy, Urbanization, And Social Justice, Madeline A. Price May 2014

The State Of The Upper Bay Of Panama Wetlands: Ecological Significance, Environmental Policy, Urbanization, And Social Justice, Madeline A. Price

Celebration

I conducted this research while studying abroad with SIT Panama: Tropical Ecology, Marine Ecosystems, and Biodiversity Conservation. This is a multidisciplinary investigation of the Upper Bay of Panama wetlands, a 49,000 hectare region east of Panama City that features mangrove, intertidal mudflat, and grassland habitat internationally recognized as a stopover site for two million shorebirds every migration season. However, with economic pressure to increase urban development in the area, this land’s protected status under the Ramsar convention was suspended for a year in April 2012. By compiling scientific studies, news articles, photographs, and interviews with local conservationists and community members, …


Assessing Water Treatment Residuals As A Filtration Media For Phosphorus Removal At Wapato Lake - Tacoma, Wa, Brian Hite, Megan Hintz May 2014

Assessing Water Treatment Residuals As A Filtration Media For Phosphorus Removal At Wapato Lake - Tacoma, Wa, Brian Hite, Megan Hintz

Salish Sea Ecosystem Conference

Wapato Lake in Tacoma, WA is a 23-acre urban lake that has had problems of eutrophication and toxic algae blooms for over a hundred years. Inputs of phosphorus from both environmental and anthropogenic sources contribute to this problem. Much of the 900-acre watershed consists of residential or commercial development, increasing the amount of stormwater containing increased levels of phosphorus. Past management efforts designed to control eutrophication at Wapato included constructing a diversion structure to route phosphorus rich stormwater around the lake. This plan increased the retention time of Wapato to ≈ 8.5 years. We have been tasked by the City …


From Boat To Beach: Using Drift Cards To Improve Our Knowledge Of Ocean Currents, Areas At Risk And Oil Spill Trajectories., Andrew Rosenberger, Alexandra Woodsworth, Ross Dixon May 2014

From Boat To Beach: Using Drift Cards To Improve Our Knowledge Of Ocean Currents, Areas At Risk And Oil Spill Trajectories., Andrew Rosenberger, Alexandra Woodsworth, Ross Dixon

Salish Sea Ecosystem Conference

In October 2013, Raincoast Conservation Foundation and Georgia Strait Alliance launched 1644 drift cards from 9 locations along the shipping route through the Salish Sea to Vancouver, British Columbia. Drift cards are 4x6” pieces of marine plywood painted bright yellow and numbered. Drift cards have historically been used to assess the way in which floating objects move in various contexts, including potential oil spills from underwater pipelines, marine park planning, sewage outflows and more. In this case, these drift cards were released in the context of Kinder Morgan’s plans to twin the Trans Mountain pipeline, which if approved would see …


Quantification Of Pharmaceuticals, Personal Care Products, And Perfluoroalkyl Substances In Elliott Bay Sediments (Seattle, Washington), Margaret Dutch, Sandra Weakland, Valerie Partridge May 2014

Quantification Of Pharmaceuticals, Personal Care Products, And Perfluoroalkyl Substances In Elliott Bay Sediments (Seattle, Washington), Margaret Dutch, Sandra Weakland, Valerie Partridge

Salish Sea Ecosystem Conference

Pharmaceuticals and Personal Care Products (PPCPs) and Perfluoroalkyl Substances (PFASs) are identified as Chemicals of Emerging Concern (CECs) in Puget Sound due to their potential to cause adverse toxicological, biological, and ecological effects when introduced into the environment. Characterization of sources, transport patterns, and the fate of CECs in the environment has been prioritized as part of the Puget Sound Ecosystem Monitoring Program toxics monitoring strategy. These chemicals have been detected in ground water, rivers, and streams in the Pacific Northwest and in influent, effluent, and biosolids from Puget Sound municipal wastewater treatment plants over the past decade. They were …


A Molecular Framework To Identify Novel Modes Of Action Of Endocrine Disrupting Compounds In Shellfish, Mackenzie Gavery, Steven (Steven Beyer) Roberts May 2014

A Molecular Framework To Identify Novel Modes Of Action Of Endocrine Disrupting Compounds In Shellfish, Mackenzie Gavery, Steven (Steven Beyer) Roberts

Salish Sea Ecosystem Conference

Concern over human and wildlife health has brought increased attention to a group of emerging environmental contaminants referred to as endocrine disrupting compounds (EDCs). While progress has been made in describing the effects of these compounds, there are still gaps in our understanding of alternative modes of action and physiological effects outside of the reproductive axis, particularly in invertebrates. One way that EDCs may elicit these changes is through disruptions to normal epigenetic mechanisms. Epigenetics refers to heritable processes that alter gene activity without manipulating the underlying DNA sequence. Epigenetic marks, such as DNA methylation, are important regulators of gene …


The Effects Of The Melting Arctic Ice Cap On Florida's Coast, Anthony Atkinson, Nicholas Joseph, Louw Scheepers May 2014

The Effects Of The Melting Arctic Ice Cap On Florida's Coast, Anthony Atkinson, Nicholas Joseph, Louw Scheepers

CLAS: Colby Liberal Arts Symposium

We've set out to determine the effect of arctic ice melt on the coastline of Florida, more specifically its major cities and tourist attractions. To do this, we created multiple mathematical models on different bases to ensure that our models are behaving in an appropriate manner. We constructed one statistical model based on past sea level rise data, and one theoretical model based on our interpretations of different components that add to the total sea level rise. Our data and analysis showed firm indications of extreme effects on the coastline of Florida and some of its major tourist attractions by …


Zircon: Tiny Crystals With Long History And Big Uses, Jiawen Li May 2014

Zircon: Tiny Crystals With Long History And Big Uses, Jiawen Li

CLAS: Colby Liberal Arts Symposium

The first known written record about zircon dates back to c.1400. Zircon forms in felsic magmas and thus is commonly found in plutonic felsic rocks. Because of its physical resistibility to weathering and metamorphism, it is also often found in metamorphic and sedimentary rocks. zircon is an orthosilicate and therefore is made up of isolated silica tetrahedra with zirconium ions filling in the gaps. This common structure allows zircon to incorporate many trace elements, such as thorium and uranium. Zircons long physical and chemical durability and the trace elements give rise to its use in geochronology. Thorium in zircon retain …


Modeling The Optimization Of A Toll Booth Plaza, Liam Connell, Zachary Schutzman, Erin Hoover May 2014

Modeling The Optimization Of A Toll Booth Plaza, Liam Connell, Zachary Schutzman, Erin Hoover

CLAS: Colby Liberal Arts Symposium

When designing a toll plaza, many factors have to be considered, especially the number of toll booths to build. In this paper, we try to determine the optimal number of toll booths by creating a model for car movement at a toll plaza. We define optimal as the number of toll booths that minimizes the waiting time, particularly at a high congestion time (i.e. rush hour). To model the movement of cars through a toll booth plaza, we break the problem into two parts: time spent waiting in line and then time spent merging back into traffic. Because each of …


Biotransformation Of Halogenated Flame Retardants, Stefanie Lai May 2014

Biotransformation Of Halogenated Flame Retardants, Stefanie Lai

CLAS: Colby Liberal Arts Symposium

At the end of a computers life cycle, its final destination is often unknown to the average consumer. Consumers unwittingly contribute to electronic waste (e-waste) pollution, even if they attempt to recycle old monitors, televisions, gaming consoles etc, in an environmentally friendly way. In recent years e-waste has become an emerging global issue as electronics usage increases and questionable methods of disposal are exposed. Approximately, 70% of the worlds e-waste is shipped back to China, where it is often disposed of using hazardous methods. These include open-flame burning and acid digestion directly into the soil causing a widespread presence of …


From The Depths Of Great Pond (Maine): Anthropogenic And Natural Influences On Bottom Sediments And The Implications For Local Sustainability, Sara George, Clara Bicher May 2014

From The Depths Of Great Pond (Maine): Anthropogenic And Natural Influences On Bottom Sediments And The Implications For Local Sustainability, Sara George, Clara Bicher

CLAS: Colby Liberal Arts Symposium

As part of a Maine EPSCoR grant focusing on sustainability in the Belgrade Lakes watershed of central Maine, current research consists of collecting bottom sediment samples from Great Pond. Samples were analyzed to create a sediment map of the lake basin in regards to depth, grain-size distribution, organic content (%C), C:N ratios and phosphorus concentration. Results will aid in the understanding of the glacial formation of the lake, distribution of sediment within, and human impact on the lake. Additionally, knowing the distribution of phosphorus within the sediments may allow development of a strategy to avoid accelerated eutrophication. This research will …


The Limestone Neutralization Of Potential Acid Mine Drainage From Bald Mountain In Aroostook County, Maine, Brendan Cosgrove May 2014

The Limestone Neutralization Of Potential Acid Mine Drainage From Bald Mountain In Aroostook County, Maine, Brendan Cosgrove

CLAS: Colby Liberal Arts Symposium

Due to the loosening of environmental regulations in 2012, J.D. Irving, Limited may begin mining operations on massive Cu-Zn sulfide ored at Bald Mountain in Aroostook County, Maine. The Bald Mountain Project will positively and negatively impact the local economy with job creation, higher wages and income levels, but a potential decline in the recreational industry. The likely acid mine drainage (AMD) of the Bald Mountain Project can degrade aquatic ecosystems and reduce water quality and brook trout populations by metal contamination and acid loading in the local watershed. In West Virginia, in-stream limestone sand application has successfully restored streams …


Mathematical Analysis Of A Nim-Like Matrix Game, Edward Chuang, Stephen Morse May 2014

Mathematical Analysis Of A Nim-Like Matrix Game, Edward Chuang, Stephen Morse

CLAS: Colby Liberal Arts Symposium

This poster presentation covers our research on a mathematical game that is somewhat similar to the popular game Nim. In this game, Players play a variation of Nim where the number of piles must be a perfect square and where the piles are actually situated within a matrix. In addition, players are only allowed to subtract one from an entry on their turn, where as in Nim there are typically more options. The game is over either when a player does not have a move to make (because all entries have been reduced to zero) or the when the game …


Stratigraphy And Mapping Of Sandy River Floodplain Terraces, Franklin And Mercer County, Maine, Hannah Dhonau, Gift Ntuli May 2014

Stratigraphy And Mapping Of Sandy River Floodplain Terraces, Franklin And Mercer County, Maine, Hannah Dhonau, Gift Ntuli

CLAS: Colby Liberal Arts Symposium

Our project details the stratigraphy and chronology of floodplain terraces along the Sandy River in Franklin and Mercer Counties in Central Maine. Using field observations, USGS aerial photographs, and Google Earth imagery, we were able to identify three separate terraces and compare their locations to previous mapping projects in the area.


My Pet Mineral: Augite, Jacob Wall May 2014

My Pet Mineral: Augite, Jacob Wall

CLAS: Colby Liberal Arts Symposium

Augite is typically known for its greenish black color, nice vitreous luster, two directions of cleavage and of course its simple chemical formula: (Ca,Na,Mg,Fe2+,Fe3+Al,Ti)2[(Si,Al)2]O6]. Augite has a hardness of 5.5, 2 planes of cleavage and massive habit. Augite is an important rock-forming silicate mineral and occurs in a wide variety of basic igneous rocks, including gabbros, dolerites and basalts. Augite also occurs in ultrabasic and intermediate rocks as well as a limited number of high-grade metamorphic rocks such as granulites and charnockites. Augites range widely in composition and show a continuoius variation in chemical composition. Iron rich augites are restricted …