• Title/Summary/Keyword: 수사절차

Search Result 78, Processing Time 0.025 seconds

A Study of Digital Investigation Modeling Method (디지털 범죄 수사 절차 모델링 기법에 관한 연구)

  • Lee Seok-Hee;Shin Jae-Lyong;Lim Kyoung-Soo;Lee Sang-Jin
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.397-402
    • /
    • 2006
  • 디지털 범죄 수사 능력은 디지털 포렌식 기술 개발 뿐만 아니라 정책적인 수사체계가 얼마나 잘되어 있느냐에 따라 달라진다. 점차 다양화 되고 지능화 되어가는 디지털 범죄를 수사하기 위해서는 디지털 범죄 수사 체계 모델링이 필요하다. 따라서 본고에서는 디지털 범죄의 종류와 그에 적합한 수사 절차를 언급하고, UML(Unified Modeling Language)을 이용하여 디지털 범죄 수사 절차를 체계화하고 모델링하는 방법을 제시하고자 한다.

  • PDF

Methodology for digital investigation of illegal sharing using BitTorrent (BitTorrent를 이용한 저작물 불법 공유 조사 방법에 관한 연구)

  • Park, Soo-Young;Chung, Hyun-Ji;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.193-201
    • /
    • 2013
  • Sharing copyrighted files without copyright holder's permission is illegal. But, a number of illegal file sharers using BitTorrent increase. However, it is difficult to find appropriate digital evidences and legal basis to punish them. And, there are no framework for digital investigation of illegal sharing using BitTorrent. Additionally, role of server in BitTorrent had been reduced than server in conventional P2P. So, It is difficult to apply investigation framework for illegal sharing using conventional P2P to investigation process of illegal sharing using BitTorrent. This paper proposes the methodology about punishing illegal sharer using BitTorrent by suggesting the digital investigation framework.

The Regulations by Criminal Law against any Testifier's Untrue Statement in the Investigation Procedures (수사절차에서 참고인의 허위진술에 대한 형사법적 규제방안)

  • Yoo, In-Chang
    • Journal of Digital Convergence
    • /
    • v.10 no.4
    • /
    • pp.167-172
    • /
    • 2012
  • There is no substantive enactment in our country to regulate testifier's false statement in the process of investigation under current law. In consideration of such investigation reality, there exist predominant view that the regulations against testifier's untrue statement are necessary to fine actual truth on criminal justice. However, such view is not quite agreeable, for it holds a probability that excessive investigation rights might cause infringement on personal rights. It's because of human rights protection that the criminal justice puts before the finding of actual truth as its biggest principle, and as we see above, any testifiers' untrue statement are already punishable, although restrictive, through interpretation of deceptive scheme under current law such as obstruction of justice, crimes of sheltering or flying a criminal or calumny.

Mobile Digital Forensic Procedure for Crime Investigation in Social Network Service (소셜 네트워크 서비스에서 사건 수사를 위한 모바일 디지털 포렌식 절차에 관한 연구)

  • Jang, Yu Jong;Kwak, Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.3
    • /
    • pp.325-331
    • /
    • 2013
  • Social network services(SNS) has been used as a means of communication for user or express themselves user. Therefore, SNS has a variety of information. This information is useful to help the investigation can be used as evidence. In this paper, A study of mobile digital forensic procedure for crime investigation in social network service. Analysis of database file taken from the smartphone at social network service application for mobile digital forensic procedure. Therefore, we propose a procedure for the efficient investigation of social network service mobile digital forensic.

A Study on the Countermeasures against International Computer Crimes - Focusing on The Police Investigation Procedure - (컴퓨터범죄의 국가간 대응방안에 관한 연구 - 경찰 수사절차를 중심으로 -)

  • Oh Tae-Kon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.287-295
    • /
    • 2005
  • A Study on the Countermeasures against International Computer Crime focusing on the Police Investigation Procedure. These days, much more intelligent, varied and advanced techniques for computer crimes have been used than for development of technology. In particular, it has been reported that the damages are enormous. Damages of some computer crimes can not be accurately reported. This study is to speculate specific types of computer crimes and obtain its prevention and countermeasures centering on the Police Investigation Procedure. In particular, it is to speculate international cooperation under the condition that global damages occur frequently due to preparation of advanced network environment.

  • PDF

A Proposal of Digital Forensic Investigation Process Model (디지털 포렌식 수사 절차 모델 제안)

  • Shin Jae-Lyong;Lee Seok-Hee;Lee Sang-Jin
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.403-407
    • /
    • 2006
  • 완벽한 디지털 범죄 수사를 위해서는 우수한 디지털 포렌식 기술이 우선적으로 요구되겠지만, 범죄수사의 특성상 기술이외에도 법적, 제도적 측면들이 적절하게 조합되어야만 한다. 본 논문에서는 디지털 포렌식의 제도 및 정책적인 면에서 디지털 범죄 수사의 절차가 현실적으로 적용 가능하고, 범죄 해결에 효율적이며 합법성을 유지하면서 진행될 수 있도록 새로운 형태의 디지털 포렌식 절차를 제안하고자 한다.

  • PDF

Digital Forensic Techniques using physical recovery method (물리적 복구 방법을 활용한 디지털 포렌식 기술)

  • Choi, Jae-Min;Shin, Dae-Min;Lee, Sang-Jin;Lim, Jong-In
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2007.02a
    • /
    • pp.146-149
    • /
    • 2007
  • 2000년대에 접어들어 컴퓨터가 보급화 되면서, 컴퓨터를 도구로 하는 범죄가 폭발적으로 증가하기 시작하였다. 컴퓨터 시스템에 접근하여 중요 정보를 빼돌리거나, 범죄의 목적이 되는 해킹과 같은 정보보호 침해사고가 크게 증가하였으며, 컴퓨터를 이용한 정상적인 서비스를 방해하는 형태의 디지털 범죄들이 다수 발생하기 시작하였다. 따라서 범죄 수사 과정에서 전자 매체에 대한 분석이 필수 불가결한 요소로 등장하고 있으며, 이를 분석하려는 디지털 포렌식 연구가 활발히 진행되고 있다. 특히 전자 매체에 기록되는 디지털 정보는 보관이 편리하지만 삭제와 복제가 용이하므로 디지털 증거는 매우 세심하게 다루어야 하며, 수사관에 의한 의도적인 훼손이 없었음을 증명할 수 있는 절차와 제도가 필요하다. 국내에서는 적법한 수사 절차와 무결성을 보장하기 위하여 '절차 연속성(chain-of-custody)'을 제공하는 수사 가이드라인을 제작하였으며, 체계적인 수사를 수행 하고 있다.[4] 이와 더불어 포렌식 수사 과정에서 물리적인 접근을 통해 디지털 저장 매체에 대한 복구할 수 있는 방법이 존재하며, 이에 대한 구체적인 방안을 논한다.[1]

  • PDF

Digital Forensics Ontology for Intelligent Crime Investigation System (지능형 범죄수사 시스템을 위한 범용 디지털포렌식 온톨로지)

  • Yun, Han-Kuk;Lee, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.12
    • /
    • pp.161-169
    • /
    • 2014
  • Digital forensics is the process of proving criminal charges by collecting and analyzing digital evidence which is related to the crime in question. Most digital forensic research is focused on digital forensic techniques themselves or cyber crime. In this paper, we designed a digital forensics-criminal investigation linked model in order to effectively apply digital forensics to various types of criminal investigations. Digital forensic ontology was developed based on this model. For more effective application of digital forensics to criminal investigation we derived specific application fields. The ontology has legality rules and adequacy rules, so it can support investigative decision-making. The ontology can be developed into an intelligent criminal investigation system.

A Study on the allowed range of viewing and copying right of criminal victim's investigation records (범죄 피해자의 수사기록 열람·등사권의 허용 범위에 관한 연구)

  • NAM, SEON MO
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.1
    • /
    • pp.127-137
    • /
    • 2019
  • In this study, I set the allowable range of viewing / copying rights of investigation records on criminal victims and bereaved families in the procedure of investigation. I tried to grasp the contents of the suspect's statement at an early stage and support it in order to cope appropriately Recently, the social consideration of people suffering from crime victims is expanding in fact. The scope of the investigation is set by the lawyer of the suspect in relation to the subordinate statute concerning the investigation and reading of the investigation record. In parallel, it is necessary to apply to the victim's lawyer or bereaved. This is a part that coincides with the purpose of certifying private rights such as browsing of litigation records to the victim and ultimately has a purpose related to the allowable range. Although it is the right to receive the investigation result at each stage, it is not used properly. Especially when distorted investigation progresses, if the suspect is not prosecuted, the victim may be in a state of regret. The important part can be summarized as the question of whether the investigation of the victim's lawyer is allowed to view and access the criminal records. This section has been reviewed with a focus on the current Act and its functional aspects should be emphasized and revised in accordance with the legal environment. These findings will contribute to ensuring victims' rights in the future. It is also used as an important resource in the legislative process, including the revision of the criminal procedure law.

Digital Forensic Model Suitable for Cloud Environment (클라우드 환경에 적합한 디지털 포렌식 수사 모델)

  • Lee, Gymin;Lee, Youngsook
    • Convergence Security Journal
    • /
    • v.17 no.3
    • /
    • pp.15-20
    • /
    • 2017
  • Cloud computing is a service that to use IT resources (software, storage, server, network) through various equipment in an Internet-enabled environment. Due to convenience, efficiency, and cost reduction, the utilization rate has increased recently. However, Cloud providers have become targets for attack Also, Abuse of cloud service is considered as the top security threat. The existing digital forensic procedures are suitable for investigations on individual terminals. In this paper, we propose a new investigation model by analyzing the vulnerable points that occur when you investigate the cloud environment with the existing digital forensic investigation procedure. The proposed investigation model adds a way to obtain account information, and can apply public cloud and private cloud together. Cloud services are also easily accessible and are likely to destroy digital evidence. Therefore, the investigation model was reinforced by adding an account access blocking step.