• Title/Summary/Keyword: Criminal Procedure

Search Result 58, Processing Time 0.026 seconds

File Signature's Automatic Calculation Algorithm Proposal for Digital Forensic

  • Jang, Eun-Jin;Shin, Seung-Jung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.118-123
    • /
    • 2021
  • Recently, digital crime is becoming more intelligent, and efficient digital forensic techniques are required to collect evidence for this. In the case of important files related to crime, a specific person may intentionally delete the file. In such a situation, data recovery is a very important procedure that can prove criminal charges. Although there are various methods to recover deleted files, we focuses on the recovery technique using HxD editor. When recovering a deleted file using the HxD editor, check the file structure and access the file data area through calculation. However, there is a possibility that errors such as arithmetic errors may occur when a file approach through calculation is used. Therefore, in this paper, we propose an algorithm that automatically calculates the header and footer of a file after checking the file signature in the root directory for efficient file recovery. If the algorithm proposed in this paper is used, it is expected that the error rate of arithmetic errors in the file recovery process can be reduced.

Criminal Investigators' Recognition of Judicial Autopsy and It's Implications - With the Case of P Police Station - (사법부검에 대한 수사경찰의 인식분석 및 함의 - P 경찰서의 사례를 중심으로 -)

  • Park, Dong-Kyun;Choi, Mu-Chan
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.12
    • /
    • pp.256-263
    • /
    • 2008
  • Based on the analysis of criminal investigators' recognition of judicial autopsy, this study presented policy alternatives as follows. First, a procedure is needed that optometrists and investigators jointly make previous explanations to bereaved families the status of investigation and the results of examination to their satisfaction and collect their opinions, for the purpose of obtaining an agreement to autopsy from them. Second, the dignity of the dead should be kept. To this end, particular consideration should be given to women bodies. Also, we need to minimize the number of autopsy witnesses and obtain agreement from bereaved families when there is an on-the-spot study. Third, we need to establish a guideline that investigators could request a warrant later in certain cases of dead bodies. Also, if a bereaved family positively asks for autopsy, it should be allowed through tentatively named ‘Request for Autopsy.’ Finally, To make a careful decision on whether an autopsy should be made or not, we can form a joint investigation team of public prosecutors and criminal investigators; however, an autopsy should be done only if it is deemed inevitable, considering the bereaved family's opinion.

The Behavioral Attitude of Financial Firms' Employees on the Customer Information Security in Korea (금융회사의 고객정보보호에 대한 내부직원의 태도 연구)

  • Jung, Woo-Jin;Shin, Yu-Hyung;Lee, Sang-Yong Tom
    • Asia pacific journal of information systems
    • /
    • v.22 no.1
    • /
    • pp.53-77
    • /
    • 2012
  • Financial firms, especially large scaled firms such as KB bank, NH bank, Samsung Card, Hana SK Card, Hyundai Capital, Shinhan Card, etc. should be securely dealing with the personal financial information. Indeed, people have tended to believe that those big financial companies are relatively safer in terms of information security than typical small and medium sized firms in other industries. However, the recent incidents of personal information privacy invasion showed that this may not be true. Financial firms have increased the investment of information protection and security, and they are trying to prevent the information privacy invasion accidents by doing all the necessary efforts. This paper studies how effectively a financial firm will be able to avoid personal financial information privacy invasion that may be deliberately caused by internal staffs. Although there are several literatures relating to information security, to our knowledge, this is the first study to focus on the behavior of internal staffs. The big financial firms are doing variety of information security activities to protect personal information. This study is to confirm what types of such activities actually work well. The primary research model of this paper is based on Theory of Planned Behavior (TPB) that describes the rational choice of human behavior. Also, a variety of activities to protect the personal information of financial firms, especially credit card companies with the most customer information, were modeled by the four-step process Security Action Cycle (SAC) that Straub and Welke (1998) claimed. Through this proposed conceptual research model, we study whether information security activities of each step could suppress personal information abuse. Also, by measuring the morality of internal staffs, we checked whether the act of information privacy invasion caused by internal staff is in fact a serious criminal behavior or just a kind of unethical behavior. In addition, we also checked whether there was the cognition difference of the moral level between internal staffs and the customers. Research subjects were customer call center operators in one of the big credit card company. We have used multiple regression analysis. Our results showed that the punishment of the remedy activities, among the firm's information security activities, had the most obvious effects of preventing the information abuse (or privacy invasion) by internal staff. Somewhat effective tools were the prevention activities that limited the physical accessibility of non-authorities to the system of customers' personal information database. Some examples of the prevention activities are to make the procedure of access rights complex and to enhance security instrument. We also found that 'the unnecessary information searches out of work' as the behavior of information abuse occurred frequently by internal staffs. They perceived these behaviors somewhat minor criminal or just unethical action rather than a serious criminal behavior. Also, there existed the big cognition difference of the moral level between internal staffs and the public (customers). Based on the findings of our research, we should expect that this paper help practically to prevent privacy invasion and to protect personal information properly by raising the effectiveness of information security activities of finance firms. Also, we expect that our suggestions can be utilized to effectively improve personnel management and to cope with internal security threats in the overall information security management system.

  • PDF

Study for Inferior Alveolar and Lingual Nerve Damages Associated with Dental Local Anesthesia (치과 국소마취와 관련된 하치조신경과 설신경 손상에 대한 연구)

  • Lee, Byung-Ha;Im, Tae-Yun;Hwang, Kyung-Gyun;Seo, Min-Seock;Park, Chang-Joo
    • Journal of The Korean Dental Society of Anesthesiology
    • /
    • v.10 no.2
    • /
    • pp.172-177
    • /
    • 2010
  • Background: Damages of trigeminal nerve, particularly inferior alveolar nerve and lingual nerve, could occur following dental procedures. In some cases, nerve damage may happen as a complication of the local anesthetic injection itself and not of the surgical procedure. Methods: From September 2006 to August 2010, 5 cases of inferior alveolar nerve and lingual nerve damages, which were assumed to happen solely due to local anesthesia, were reviewed. All cases were referred to Division of Oral and Maxillofacial Surgery, Department of Dentistry, Hanyang University Medical Center for legal authentication in the process of criminal procedure. Results: In all five cases, patients complained of altered sensation occurred in the distribution of the inferior alveolar or lingual nerve following block anesthesia. The local anesthetics were 2% lidocaine with 1 : 100,000 epinephrine and the amount of local anesthetics, which were used during injection, were varied. Most of patients experienced the electric stimulation during injection. Recovery was poor and professional supportive care was mostly absent. Conclusions: Dental practitioners should consider that the surgical procedure caused the trigeminal nerve damage, however, dental local anesthesia for inferior alveolar nerve and lingual nerve could be one of the causes for damages. The various mechanisms for nerve damages by local anesthesia are thoroughly discussed.

One-probe P300 based concealed information test with machine learning (기계학습을 이용한 단일 관련자극 P300기반 숨김정보검사)

  • Hyuk Kim;Hyun-Taek Kim
    • Korean Journal of Cognitive Science
    • /
    • v.35 no.1
    • /
    • pp.49-95
    • /
    • 2024
  • Polygraph examination, statement validity analysis and P300-based concealed information test are major three examination tools, which are use to determine a person's truthfulness and credibility in criminal procedure. Although polygraph examination is most common in criminal procedure, but it has little admissibility of evidence due to the weakness of scientific basis. In 1990s to support the weakness of scientific basis about polygraph, Farwell and Donchin proposed the P300-based concealed information test technique. The P300-based concealed information test has two strong points. First, the P300-based concealed information test is easy to conduct with polygraph. Second, the P300-based concealed information test has plentiful scientific basis. Nevertheless, the utilization of P300-based concealed information test is infrequent, because of the quantity of probe stimulus. The probe stimulus contains closed information that is relevant to the crime or other investigated situation. In tradition P300-based concealed information test protocol, three or more probe stimuli are necessarily needed. But it is hard to acquire three or more probe stimuli, because most of the crime relevant information is opened in investigative situation. In addition, P300-based concealed information test uses oddball paradigm, and oddball paradigm makes imbalance between the number of probe and irrelevant stimulus. Thus, there is a possibility that the unbalanced number of probe and irrelevant stimulus caused systematic underestimation of P300 amplitude of irrelevant stimuli. To overcome the these two limitation of P300-based concealed information test, one-probe P300-based concealed information test protocol is explored with various machine learning algorithms. According to this study, parameters of the modified one-probe protocol are as follows. In the condition of female and male face stimuli, the duration of stimuli are encouraged 400ms, the repetition of stimuli are encouraged 60 times, the analysis method of P300 amplitude is encouraged peak to peak method, the cut-off of guilty condition is encouraged 90% and the cut-off of innocent condition is encouraged 30%. In the condition of two-syllable word stimulus, the duration of stimulus is encouraged 300ms, the repetition of stimulus is encouraged 60 times, the analysis method of P300 amplitude is encouraged peak to peak method, the cut-off of guilty condition is encouraged 90% and the cut-off of innocent condition is encouraged 30%. It was also conformed that the logistic regression (LR), linear discriminant analysis (LDA), K Neighbors (KNN) algorithms were probable methods for analysis of P300 amplitude. The one-probe P300-based concealed information test with machine learning protocol is helpful to increase utilization of P300-based concealed information test, and supports to determine a person's truthfulness and credibility with the polygraph examination in criminal procedure.

Relationship between Violent Criminal Behavior and Imbalance of Scalp Hair Minerals in Man (두발중 미량 중금속과 필수금속의 과다 또는 과소의 불균형과 폭력범죄 행동과의 관련성 연구)

  • Kim, Doo-Hie;Jang, Bon-Ki;Lee, Duk-Hee;Hong, Sung-Chul;Kim, Byung-Hie
    • Journal of Preventive Medicine and Public Health
    • /
    • v.27 no.1 s.45
    • /
    • pp.25-43
    • /
    • 1994
  • To estimate the factors to the inclination of the criminal violence, the content of trace minerals and toxic metals in the scalp hair were measured during the period from May 1992 to October 1992. One hundred eleven violent and 89 nonviolent criminal inmates of Taegu Correctional Institute were selected. The inmates of violent criminals were imprisoned by murder, robber, rape, injury and violent acts. Those of nonviolent criminals were swindle, larceny, and adultery and had no history of institutional violence. The contents of two toxic metals (cadmium, lead) and five trace minerals (Cu, Fe, Zn, Mg, Na) were determined by an atomic absorption spectrophotometer (IL. 551). The contents of cadmium and lead in hair of violent criminals were significantly higher as $0.56{\pm}0.14ppm,\;11.53{\pm}3.32ppm$, respectively, than $0.42{\pm}0.20ppm,\;9.63{\pm}4.31ppm$ of nonviolent group (p<0.01). But the level of copper was significantly lower than nonviolent group (p<0.05). The factors that had a significant correlation with the inclination of violence in multiple logistic regression analysis were cadmium (odds ratio=98.09), unmarried (odds ratio=0.39), many times of criminal history(odds ratio=1.57) and residence of rural area (odds ratio=0.44). The results suggest that the sub-toxic contents of cadmium and lead in the hair may be of potential effect on behavior, and the mineral analysis may be an important adjunctive diagnostic procedure. Further studies into this problem are necessary.

  • PDF

Study on Aircraft Accident Investigation (군항공기사고조사에 관한 연구)

  • Kim, Hae-Ma-Joong;Ha, Hong-Young;Hong, Sang-Beom
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.18
    • /
    • pp.325-362
    • /
    • 2003
  • In an effort to enhance the independence of and expertise in military aircraft accident investigation, a permanent accident investigation board should be established. Establishing permanent accident investigation board would render the military accident investigation more reliable and would increase its public esteem. Because there is no provision governing the responsibilities of the investigation and cooperation between civil and military authority in case that both civil and military aircraft are involved, it is necessary to fill this gap by enacting appropriate laws. In case of civil aircraft accident investigation involving a military issue, it would be better to allow military authority to be involved in the investigation. For the betterment of investigation, it is also necessary to provide a field investigator an authority to directly collect relevant information. Since the sole purpose of accident investigation is to prevent the recurrence of aircraft accidents, the scope of information disclosure should be limited and the investigation report shall be used for neither criminal procedure nor disciplinary procedure so that the objectivity of the investigation should be ensured.

  • PDF

A Study on the Efficient Digital Evidence Processing in Case Transfer : Focused on Military and Police Case Studies and Expert Interviews (사건 이송 시 효율적인 디지털 증거 처리 절차에 관한 고찰 : 군·경 사례연구 및 전문가 인터뷰를 중심으로)

  • Young June Kim;Wan Ju Kim;Jae sung Lim
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.121-130
    • /
    • 2022
  • Recently, as soldiers are allowed to use mobile phones, cases are frequently transferred from the police to the military due to criminal acts, and digital evidence is collected separately from the reliability of previous investigations, such as overlapping seizure and search procedures. In this study, through in-depth interviews with practitioners in charge of digital evidence in the military, police, and courts, problems related to digital evidence handling, such as infringement of evidence ability due to overlapping human factors and procedures, are derived and analyzed. The presented procedure verified the effectiveness of the procedure through case analysis, and is expected to contribute to the guarantee of the evidence capacity of digital evidence and the efficiency of handling cases.

The problem point and improvement program of the scene search and seizure of digital evidence at practical affairs (실무상 디지털증거의 현장압수수색 문제점과 개선방안)

  • Kim, Yong-Ho;Lee, Daesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.11
    • /
    • pp.2595-2601
    • /
    • 2013
  • Currently, under being related with confiscation method of digital store medium from the court of justice, "the sorting confiscation method of principle, the exceptional medium confiscation method" from in section3 no.106 of the criminal procedure code disregard the actual fields of investigation. What is more, there are many difficulties to execute cases by observing this for the achievement of confiscation purpose. At this point, I present the problems of the present confiscation search method and the desirable scene confiscation search method and the improvement program under the new technology circumstance.

Comparison of Domestic Chemical Accident Investigation System (국내 화학사고 조사제도 비교 연구)

  • Kim, Sungbum;Lim, Myunghee;Choi, Sungwoon
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.4
    • /
    • pp.515-519
    • /
    • 2015
  • 87 and 104 cases of chemical accidents in 2013 and 2014 respectively have brought enormous damages to people and environment. Also, the industry has significant damages the company reputation and a lot of expense to repair the damage handling. Toxic substance has spread out rapidly in the atmosphere at chemical accidents and that affect to workers as well as neighborhood. In order to analyze the causes of chemical accidents throughly, reliable and systematic investigation procedure should be considered. In this study, the chemical accident investigation system of each government agency in charge of the accident investigation is compared and analysed.