• Title/Summary/Keyword: Anti-Forensic

Search Result 60, Processing Time 0.025 seconds

Evaluation of Rapid IgG4 Test for Diagnosis of Gnathostomiasis

  • Wang, Yue;Ma, An;Liu, Xiao-Long;Eamsobhana, Praphathip;Gan, Xiao-Xian
    • Parasites, Hosts and Diseases
    • /
    • v.59 no.3
    • /
    • pp.257-263
    • /
    • 2021
  • Human gnathostomiasis is a parasitic disease caused by Gnathostoma nematode infection. A rapid, reliable, and practical immunoassay, named dot immuno-gold filtration assay (DIGFA), was developed to supporting clinical diagnosis of gnathostomiasis. The practical tool detected anti-Gnathostoma-specific IgG4 in human serum using crude extract of third-stage larvae as antigen. The result of the test was shown by anti-human IgG4 monoclonal antibody conjugated colloidal gold. The sensitivity and specificity of the test were both 100% for detection in human sera from patients with gnathostomiasis (13/13) and from healthy negative controls (50/50), respectively. Cross-reactivity with heterogonous serum samples from patients with other helminthiases ranged from 0 (trichinosis, paragonimiasis, clonorchiasis, schistosomiasis, and cysticercosis) to 25.0% (sparganosis), with an average of 6.3% (7/112). Moreover, specific IgG4 antibodies diminished at 6 months after treatment. This study showed that DIGFA for the detection of specific IgG4 in human sera could be a promising tool for the diagnosis of gnathostomiasis and useful for evaluating therapeutic effects.

Estimation of Eyewitness Identification Accuracy by Event-Related Potentials (차량 번호판 목격자의 기억 평가를 위한 사건 관련 전위 연구)

  • Ham, Keunsoo;Pyo, Chuyeon;Jang, Taeik;Yoo, Seong Ho
    • The Korean Journal of Legal Medicine
    • /
    • v.39 no.4
    • /
    • pp.115-119
    • /
    • 2015
  • We investigated event-related potentials (ERPs) to estimate the accuracy of eyewitness memories. Participants watched videos of vehicles being driven dangerously, from an anti-impaired driving initiative. The four-letter license plates of the vehicles were the target stimuli. Random numbers were presented while participants attempted to identify the license plate letters, and electroencephalograms were recorded. There was a significant difference in activity 300-500 milliseconds after stimulus onset, between target stimuli and random numbers. This finding contributes to establishing an eyewitness recognition model where different ERP components may reflect more explicit memory that is dissociable from recollection.

A Study on Analysis of Hidden Areas of Removable Storage Device from a Digital Forensics Point of View (디지털 포렌식 관점에서 이동식 저장매체의 은닉영역 분석 연구)

  • Hong, Pyo-gil;Lee, Dae-sung;Kim, Dohyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.111-113
    • /
    • 2021
  • USB storage devices, which are represented by removable storage media, are widely used even nowadays when cloud services are common. However, since they are cases where hidden areas are created and exploited in USB storage devices. This research is needed to detect and analyze them from an Anti-forensic point of view. In this paper, we analyze a program that can be exploited as Anti-forensic because it can create a hidden partition and store files there, and the file system created by it from a digital forensic point of view.

  • PDF

Analysis on the Fire Accidents Vehicles Caused by Faults in the Same Anti-lock Brake System (ABS) of the same Manufacturer (동일한 제조사의 ABS 모듈 결함으로 인한 차량화재 사고사례 분석)

  • Park, Nam-Kyu;Lee, Dong-Kyu;Cho, Young-Jin;Moon, Byung-Sun;Song, Jae-Yong
    • Fire Science and Engineering
    • /
    • v.33 no.3
    • /
    • pp.121-127
    • /
    • 2019
  • This study examined a fire accident caused by a defect in the vehicle ABS module. A large number of vehicles using the same manufacturer's ABS module in recent fire events showed a tendency to combust due to the same faults. As previously stated in the ABS module which shows the electrical breakdown between the power lines supplied to the constant power source by the battery. The electrical breakdown of the ABS module was caused by defects of the ABS module itself that were influenced by of the external flame. These results highlight the need to determine if there is a deficiency of the ABS module in the investigation of the cause of a fire in a vehicle which is produced by the same manufacturer.

Digital Forensic: Challenges and Solution in the Protection of Corporate Crime

  • CHOI, Do-Hee
    • The Journal of Industrial Distribution & Business
    • /
    • v.12 no.6
    • /
    • pp.47-55
    • /
    • 2021
  • Purpose: Organizational crime is an offense committed by an individual or an official in a corporate entity for organizational gain. This study aims to explore the literature on challenges facing digital forensics and further discuss possible solutions to such challenges as far as the protection of corporate crime is concerned. Research design, data and methodology: Qualitative textual methodology matches the interpretative approach since it is a quality method meant to consider the inductivity of strategies. Also, a qualitative approach is vital because it is distinct from the techniques used in optimistic paradigms linked to science laws. Results: For achieving justice through the investigation of digital forensic, there is a need to eradicate corporate crimes. This study suggests several solutions to reduce corporate crime such as 'Solving a problem to Anti-forensic Techniques', 'Cloud computing technique', and 'Legal Framework' etc. Conclusion: As corporate crime increases in rate, the data collected by digital forensics increases. The challenge of analyzing chunks of data requires digital forensic experts, who need tools to analyze them. Research findings shows that a change of the operating system and digital evidence interpretation is becoming a challenge as the new computer application software is not compatible with older software's structure.

Development of Rapid and Simple Drug Identification and Semi Quantitative Analytical Program by Gas Chromatography-Mass Spectrometry (가스크로마토그래피/질량분석기를 이용한 약물의 확인 및 간이 정량분석 프로그램 개발)

  • Kim, Eun-Mi;Han, Eun-Young;Hong, Hyo-Jeong;Jeong, Su-Jin;Choe, Sang-Gil;Rhee, Jong-Sook;Jung, Jin-Mi;Yeom, Hye-Sun;Lee, Han-Sun;Lee, Sang-Ki
    • YAKHAK HOEJI
    • /
    • v.55 no.2
    • /
    • pp.106-115
    • /
    • 2011
  • Systematic toxicological analysis (STA) means the process for general unknown screening of drugs and toxic compounds in biological fluids. In order to establish STA, in previous study we investigated pattern of drugs & poisons in autopsy cases during 2007~2009 in Korea, and finally selected 62 drugs as target drugs for STA. In this study, rapid and simple drug identification and quantitative analytical program by gas chromatography-mass spectrometry(GC-MS) was developed. The in-house program, "DrugMan", consisted of modified chemstation data analysis menu and newly developed macro modules. Total 55 drugs among 62 target drugs were applied to this program, they were 14 antidepressants, 8 anti-histamines, 5 sedatives/hypnotics, 5 narcotic analgesics, 3 antipsychotic drugs, and etc. For calibration curves, fifty five drugs were divided into four groups of range considering their therapeutic or toxic concentrations in blood specimen, i.e. 0.05~1 mg/l, 0.1~1 mg/l, 0.1~5 mg/l or 0.5~10 mg/l. Standards spiked bloods were extracted by solid-phase extraction (SPE) with trimipramine-D3 as internal standard. Parameters such as retention times, 3 mass fragment ions, and calibration curves for each drug were registered to DrugMan. A series of identification, semi quantitation of target drugs and reporting the results were performed automatically. Calibration curves for most drugs were linear with correlation coefficients exceeding 0.98. Sensitivity rate of DrugMan was 0.90 (90%) for 55 drugs at the level of 0.5 mg/l. For standard spiked bloods at the level of 0.5 mg/l for 29 drugs, semi quantitative concentrations were ranged 0.36~0.64 mg/l by DrugMan. If more drugs are registered to database in DrugMan in further study, it will be useful tools for STA in forensic toxicology.

Mechanism of Fatty Acid Synthase in Drug Tolerance Related to Epithelial-mesenchymal Transition of Breast Cancer

  • Li, Jun-Qin;Xue, Hui;Zhou, Lan;Dong, Li-Hua;Wei, Da-Peng;Li, Hua
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.18
    • /
    • pp.7617-7623
    • /
    • 2014
  • Objective: The mechanism of action of fatty acid synthase (FASN) in drug tolerance of breast cancer cells with epithelial-mesenchymal transition (EMT) features was investigated. Methods: The breast cancer cell line MCF-7-MEK5 with stably occurring EMT and tumour necrosis factor-${\alpha}$ (TNF-${\alpha}$) tolerance was used as the experimental model, whereas MCF-7 acted as the control. Tumour cells were implanted into nude mice for in vivo analysis, and cerulenin was used as a FASN inhibitor. RT-PCR, real-time quantitative PCR and Western blot were employed to detect the expression of FASN, TNFR-1, TNFR-2, Wnt-1, ${\beta}$-catenin and cytC at the RNA and protein levels. Results: Compared with MCF-7, TNFR-1 expression in MCF-7-MEK5 was slightly changed, TNFR-2 was decreased, and FASN, Wnt-1, ${\beta}$-catenin and cytC were increased. The expression of Wnt-1 and ${\beta}$-catenin in MCF-7-MEK5 decreased after cerulenin treatment, whereas cytC expression increased. Conclusions: The important function of FASN in the drug tolerance of breast cancer may be due to the following mechanisms: FASN downregulated TNFR-2 expression through lipid rafts to make the cells less sensitive to TNF-${\alpha}$, and simultaneously activated the Wnt-$1/{\beta}$-catenin signalling pathway. Thus, cytC expression increased, which provided cells with anti-apoptotic capacity and induced drug tolerance.

Development of a Simultaneous Detection and Quantification Method of Anorectics in Human Urine Using GC-MS and its Application to Legal Cases (GC-MS를 이용한 사람 뇨시료 중 비만치료제 분석 및 비만치료제 남용 현황의 법과학적 고찰)

  • Choi, Hyeyoung;Lee, Jaesin;Jang, Moonhee;Yang, Wonkyung;Kim, Eunmi;Choi, Hwakyung
    • YAKHAK HOEJI
    • /
    • v.57 no.6
    • /
    • pp.420-425
    • /
    • 2013
  • Phentermine (PT) and phenmetrazine (PM) have been widely used as anti-obesity drugs. These drugs should be used with caution due to its close relation to amphetamine in its structure and toxicity. PT and PM, amphetamine-type anorectics, have recently been considered as alternatives for methamphetamine abuse in Korea. In addition, the misuse and abuse of PT and PM obtained by illegal sources such as the internet become a serious social problem. In the present study, a simultaneous detection and quantification method for determining PT and PM in human urine was developed and validated according to the international guidelines. The urine samples were screened using a fluorescence polarization immunooassay and analyzed by gas chromatography mass spectrometry (GC-MS) after extraction using automatic solid phase extraction (SPE) with a mixed-mode cation exchange cartridge and derivatization with pentafluoropropionic anhydride (PFPA). The validation results for selectivity, linearity, limits of detection (LOD) and quantification (LOQ), intra- and inter-assay precision and accuracy and recovery were satisfactory. The validated method was successfully applied to authentic urine samples collected from 38 drug abuse suspects. PT and/or PM were identified with or without methamphetamine in urine samples. Abuse of PT and PM have increased continuously in Korea, therefore, closer supervision of the inappropriate use of anoretics is necessary.

A Study on Unknown Malware Detection using Digital Forensic Techniques (디지털 포렌식 기법을 활용한 알려지지 않은 악성코드 탐지에 관한 연구)

  • Lee, Jaeho;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.107-122
    • /
    • 2014
  • The DDoS attacks and the APT attacks occurred by the zombie computers simultaneously attack target systems at a fixed time, caused social confusion. These attacks require many zombie computers running attacker's commands, and unknown malware that can bypass detecion of the anti-virus products is being executed in those computers. A that time, many methods have been proposed for the detection of unknown malware against the anti-virus products that are detected using the signature. This paper proposes a method of unknown malware detection using digital forensic techniques and describes the results of experiments carried out on various samples of malware and normal files.

A Study on Hard Disk Drive ATA Passwords (하드디스크 드라이브 ATA 패스워드에 관한 연구)

  • Lee, Ju-young;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1059-1065
    • /
    • 2015
  • Hard disk passwords are commonly not well known. If the passwords are set, forensic investigators are not allowed to access data on hard disks, so they can be used to obstruct investigations. Expensive tools such as PC-3000 are necessary for unlocking such hard disk passwords. But it would be a burden on both organizations that should pay for these tools and forensic investigators that are unfamiliar with these tools. This paper discusses knowledge required for unlocking hard disk passwords and proposes methods for unlocking the passwords without high-priced tools. And with a vendor-specific method, this paper provides procedures for acquiring passwords and unlocking hard disk drives.