• Title/Summary/Keyword: Criminal detection

Search Result 60, Processing Time 0.019 seconds

Research on the detection of LCN DNA from traces on firearms (총기 흔적흔에서의 low copy number(LCN) DNA 검출에 관한 연구)

  • Jeon, Chung-Hyun;Park, Sung-Woo
    • Analytical Science and Technology
    • /
    • v.24 no.1
    • /
    • pp.51-59
    • /
    • 2011
  • Genetic Identification has become an important forensic investigation method which discerns identity through analysis of physical samples discovered in various crime scenes. Recently more samples are being requested to undergo A-STR analysis of low copy number (LCN) DNA, which is known as touch evidence-type sample and left on various objects such as a pen briefly used by the criminal, the gear of the car used for driving, the handle, and various buttons inside a car. This research attempted to extract the LCN DNA of the touch evidencetype left on crushed fingerprints on firearms, etc. and examine the genotyping success rate. Four types of firearms (M16, K1A, COLT 45 Pistol, M29 Revolver) were fired individually and physical samples were gathered from four parts of each firearm. Subsequently, in order to extract the LCN DNA, Microkit and $Prepfiler^{TM}$ were used to compare and analyze the quantity of DNA extracted and the genotyping success rate. Analysis results showed that the quantity of DNA extracted by $Prepfiler^{TM}$ was on average 1.7 times higher than that of Microkit, and in genotype analysis success rate $Prepfiler^{TM}$ also demonstrated 24.9% on average in contrast to 0% for Microkit. In regards to the grip part of the K1A, $Prepfiler^{TM}$'s success rate was as high as 50.6%.

Identification of Food-Poisoning Bacteria (Bacillus cereus) and the Bacterial Toxin Genes for Application to Forensic Microbiology : A Case Report from National Forensic Service (법미생물 검사를 위한 식중독 세균(Bacillus cereus)의 동정 및 독소 유전자 검사법: 국립과학수사연구원 사례보고)

  • Cho, Yoonjung;Lee, Min Ho;Kim, Hyo Sook;Eom, Kiyoon;Kim, Min-Hee;Kim, Jong-Bae;Lee, Dong Sub
    • Journal of Science Criminal Investigation
    • /
    • v.11 no.3
    • /
    • pp.210-217
    • /
    • 2017
  • In the forensic microbiology laboratories, microorganism analyses from food are requested. There have been several cases of Bacillus cereus isolated from the samples requested to the National Forensic Service. B. cereus is an important pathogenic bacterium which can cause food-borne outbreaks. Therefore, we isolated B. cereus from anchovy aekjeot recently requested for microbial examination and identified using MSId based on the 16S rDNA sequence and real-time PCR method. We also conducted PCR for detection of diarrheal toxin genes and an emetic toxin gene and found the presence of nheABC, bceT and entFM diarrheal toxin genes in the B. cereus isolate. There are several clinically important food-poisoning bacteria that should be noted during inspection. In particular, B. cereus can cause food poisoning even when cooked foods are ingested, because B. cereus forms endo-spore which confers strong environmental resistance and heat resistance to the bacteria, and the bacterial emetic toxin also has heat resistance. Here we highlight the importance to distinguish clinically important bacteria such as B. cereus from food specimens, and we expect this study will provide procedures for identification of B. cereus and detection of the bacterial toxin genes for future cases in the forensic microbiology laboratories.

Vehicle Information Recognition and Electronic Toll Collection System with Detection of Vehicle feature Information in the Rear-Side of Vehicle (차량후면부 차량특징정보 검출을 통한 차량정보인식 및 자동과금시스템)

  • 이응주
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.1
    • /
    • pp.35-43
    • /
    • 2004
  • In this paper, we proposed a vehicle recognition and electronic toll collection system with detection and classification of vehicle identification mark and emblem as well as recognition of vehicle license plate to unman toll fee collection system or incoming/outcoming vehicles to an institution. In the proposed algorithm, we first process pre-processing step such as noise reduction and thinning from the rear side input image of vehicle and detect vehicle mark, emblem and license plate region using intensity variation informations, template masking and labeling operation. And then, we classify the detected vehicle features regions into vehicle mark and emblem as well as recognize characters and numbers of vehicle license plate using hybrid and seven segment pattern vector. To show the efficiency of the proposed algorithm, we tested it on real vehicle images of implemented vehicle recognition system in highway toll gate and found that the proposed method shows good feature detection/classification performance regardless of irregular environment conditions as well as noise, size, and location of vehicles. And also, the proposed algorithm may be utilized for catching criminal vehicles, unmanned toll collection system, and unmanned checking incoming/outcoming vehicles to an institution.

  • PDF

A Study on Real IP Traceback and Forensic Data Generation against Bypass Attack (우회적인 공격에 대한 실제 IP 역추적 실시와 포렌식 자료 생성)

  • Youn, Byung-Sun;Yang, Hae-Sool;Kim, Dong-Jhoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.1
    • /
    • pp.143-151
    • /
    • 2008
  • Execute IP traceback at this paper as target an intruder's attacking that Bypass Attack in order to avoid an exposure of own Real IP address Design IP traceback server and agent module, and install in Internet network system for Real IP traceback. Set up detection and chase range aggressive loop around connection arbitrariness, and attack in practice, and generate Real IP data cut off by fatal attacks after data and intrusion detection accessed general IP, and store to DB. Generate the Forensic data which Real IP confirms substance by Whois service, and ensured integrity and the reliability that buy to early legal proof data, and was devoted to of an invader Present the cyber criminal preventive effect that is dysfunction of Ubiquitous Information Society and an effective Real IP traceback system, and ensure a Forensic data generation basis regarding a judge's robe penalty through this paper study.

  • PDF

A Study about Early Detection Techniques of Cyber Threats Based Honey-Net (허니넷 기반의 사이버위협 조기탐지기법 연구)

  • Lee, Dong-Hwi;Lee, Sang-Ho;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.67-72
    • /
    • 2005
  • The exponential increase of malicious and criminal activities in cyber space is posing serious threat which could destabilize the foundation of modern information society. In particular, unexpected network paralysis or break-down created by the spread of malicious traffic could cause confusion and disorder in a nationwide scale, and unless effective countermeasures against such unexpected attacks are formulated in time, this could develop into a catastrophic condition. In order to solve a same problem, this paper researched early detection techniques for only early warning of cyber threats with separate way the detection due to and existing security equipment from the large network. It researched the cyber example alert system which applies the module of based honeynet from the actual large network and this technique against the malignant traffic how many probably it will be able to dispose effectively from large network.

  • PDF

A case study of verifying a suicide by carbon monoxide intoxication committed by burning an ignition charcoal briquette (착화탄 연소에 의한 일산화탄소 중독사에서 자살입증에 관한 사례연구)

  • Sung, Tae-myung;Jo, Ju-ik;Ahn, Phil-sang
    • Analytical Science and Technology
    • /
    • v.28 no.6
    • /
    • pp.398-408
    • /
    • 2015
  • Carbon monoxide (CO) intoxication, arising from CO from an ignited charcoal briquette (ICB), is a popular means of committing suicide in Korea. Most CO intoxications are related to suicide attempts; however, the possibility of a homicide disguised as a suicide cannot be ruled out. Therefore, forensic investigation of the deceased and the crime scene is crucial to confirm that the deceased committed suicide. Detection of the components of an ICB on the objects suspected of being contacted by the deceased, such as the hands, nostrils, and doorknobs, is essential for linking the crime scene to the victim in the case of suicides by ignited ICBs. The traces from an ICB were analyzed by investigating the morphological characteristics and obtaining elemental compositions. The ICBs were completely different from blackened wood, as detected by discriminant analysis with the elements of carbon and oxygen. We analyzed one case of CO intoxication to demonstrate an excellent procedure for verifying whether a suicide occurred with an ICB. We employed SEM-EDX for the analysis of an ICB, microscope-FT/IR and pyrolysis-GC/MS for a partly burnt resin-type substance, GC/MS for diphenhydramine (a sleeping drug), and GC/TCD for the CO-Hb level. We detected traces of an ICB on the hands, nostrils, and doorknobs, which were all discriminated into an ICB group. Detection of ICB traces from the nostrils could indicate that the deceased started the fire themselves to commit suicide. The partially burnt black material was analyzed as an acrylronitrilestyrene polymer, which is normally used to make bags for carrying or wrapping and could be assumed to have been used to transport the ICB. Diphenhydramine, a sleeping drug, was detected at a level of 2.3 mg/L in the blood, which was lower than that in fatal cases (8-31 mg/L; mean 16 mg/L). A CO-Hb level of 79% was found in the blood, which means that the cause of death was CO intoxication. The steps shown here could represent an ideal method for reaching a verdict of suicide by CO intoxication produced by burning an ICB in a sealed room or a car.

A Face Recognition Based Suspected Criminal Detection and Identification System (얼굴 인식 기반의 범죄 용의자 탐지 및 식별 시스템)

  • Lee, Jong-Uk;Kang, Bong-Su;Lee, Han-Sung;Park, Dae-Hee
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2010.11a
    • /
    • pp.127-128
    • /
    • 2010
  • 본 논문에서는 CCTV 감시 영상에서 취득한 얼굴 이미지를 이용하여, 범죄자 감시목록에 등록된 범죄 용의자를 탐지 식별하는 시스템을 설계 및 구현하였다. 특히 본 논문에서 제안한 SVDD와 SRC를 혼합한 계층적 구조의 범죄 용의자 식별 모듈은 다음과 같은 특성을 갖는다: 1) 먼저 SVDD를 이용하여 범죄 용의자만을 빠르게 인식함으로써, 일반인에 대한 불필요한 범죄자 식별 연산을 수행하지 않는다; 2) 다양한 식별 성능을 저해하는 환경에서도 이미 강인한 성능이 검증된 SRC를 범죄 용의자 식별과정에 적용함으로써 안정적이고 정확한 식별 시스템을 보장한다; 3) 동일 생체 특정의 반복적 사용을 통한 다수결 투표전략을 취함으로써 시스템의 신뢰도를 보장한다; 4) 점증적 갱신의 학습 능력으로 인하여 범죄 용의자 감시목록 데이터베이스의 변화에도 능동적으로 적응한다 실제 KUFD(Korea University Face Database)를 자체 제작하고 캠퍼스 내에서 CCTV 환경의 얼굴 인식 기반 범죄 용의자 탐지 및 식별 시스템 환경을 모의 구축하여 실험적으로 제안된 시스템의 성능을 검증한다.

  • PDF

A Study of Network Forensic for IDS (IDS 관제를 위한 네트워크 포렌식 연구)

  • Lee, Gi-Sung;No, Si-Young;Park, Sang-Joon;Lee, Jong-Chan;Lee, Seong-Yoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.1
    • /
    • pp.467-473
    • /
    • 2011
  • The Network-packet in this Paper to ensure the integrity of the legal evidence is effect that can have is to offer an Network-forensics system. The Paper proposed Network-forensics system in the company through legal disputes accident Networking and state agency (with investigative authority) for criminal investigations in networking for the effective and correct way to present a report of user-centric services through effective awareness can be improved.

A Study on the Direction of the Formulation of "Safe Country" Laws and Regulations due to the Development of Information Technology (정보사회에 있어서 '안전국가' 법규의 정립방향에 관한 소고)

  • Kim, Hyun-Kyung
    • Journal of Information Technology Services
    • /
    • v.12 no.3
    • /
    • pp.151-163
    • /
    • 2013
  • It is no doubt that information technology is the key factor of national safety. Information technology is positively useful for national security such as crime prevention and detection, criminal investigation, disaster management, and national defense. However, it might be a threat to the security as we saw in the examples such as '3.4 DDoS attacks' and 'Nong-hyup Computer Network Failure.' Although the effect that information technology makes upon the national security is immense, the current legal system does not reflect these changes well. National security should be kept during 'prevention-response-recovery' process regardless it is in the online on offline. In addition, public administration for national security should be based on laws. However, the current legal system is lack of legislative basis on cyber and physical disaster, and the laws on the response to disaster might cause confusing. Therefore, this study examines the limitation of the current legal system on national security, and suggests directions for the development of the system based on the new establishment of the legal concept for 'national security'.

Body fluid identification in forensics

  • An, Ja-Hyun;Shin, Kyoung-Jin;Yang, Woo-Ick;Lee, Hwan-Young
    • BMB Reports
    • /
    • v.45 no.10
    • /
    • pp.545-553
    • /
    • 2012
  • Determination of the type and origin of the body fluids found at a crime scene can give important insights into crime scene reconstruction by supporting a link between sample donors and actual criminal acts. For more than a century, numerous types of body fluid identification methods have been developed, such as chemical tests, immunological tests, protein catalytic activity tests, spectroscopic methods and microscopy. However, these conventional body fluid identification methods are mostly presumptive, and are carried out for only one body fluid at a time. Therefore, the use of a molecular genetics-based approach using RNA profiling or DNA methylation detection has been recently proposed to supplant conventional body fluid identification methods. Several RNA markers and tDMRs (tissue-specific differentially methylated regions) which are specific to forensically relevant body fluids have been identified, and their specificities and sensitivities have been tested using various samples. In this review, we provide an overview of the present knowledge and the most recent developments in forensic body fluid identification and discuss its possible practical application to forensic casework.