• Title/Summary/Keyword: Forensic Investigation

Search Result 320, Processing Time 0.024 seconds

Practical and Legal Challenges of Cloud Investigations (클라우드 환경에서 수사 실무와 법적 과제)

  • James, Joshua I.;Jang, Yunsik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.33-39
    • /
    • 2014
  • An area presenting new opportunities for both legitimate business, as well as criminal organizations, is Cloud computing. This work gives a strong background in current digital forensic science, as well as a basic understanding of the goal of Law Enforcement when conducting digital forensic investigations. These concepts are then applied to digital forensic investigation of cloud environments in both theory and practice, and supplemented with current literature on the subject. Finally, legal challenges with digital forensic investigations in cloud environments are discussed.

Research on Effective Scientific Investigation Methods with Regards to Explosion Accidents (폭발사고시 효과적인 과학수사 방법에 관한 연구)

  • Jun, Sang-Gun;Chae, Jong-Min
    • Journal of forensic and investigative science
    • /
    • v.1 no.1
    • /
    • pp.72-87
    • /
    • 2006
  • Accidents and terrorist acts that utilize explosives have a great influence on society and thus require a prompt investigation for the arrest of the culprit. However, such investigations are often met with difficulties due to the vastness of the crime scene, restrictions on approaching the scene, fragility of the evidence, complexity of investigation, and the lack of expertise. In spite of such facts, scientific investigation regarding explosives have not been widely studied in Korea. Therefore, the focus of this research primarily concerns the effective scientific investigation methods in cases of accidents that involve chemical explosives. Although the a systematic investigation method is at the heart of scientific investigation in cases of explosive accidents, it is only at its rudimentary stage. Therefore, in this research, a systematic investigation method is put forth for the 'scene investigation, the documentation of the scene, and the collection and processing of evidence. Further, I have set forth a 'scene investigation check list' the ensure a thorough scene investigation and to promote an exhaustive evidence collection that would guarantee the admissibility of such evidence in court. The above efforts were aimed at simplifying the currently complicated investigation system. 1) In the future, a guidebook that can be generally applied to accidents involving explosives in Korea ught to be produced, a continual systematic education and integrated training excises for investigators ought to be established, laws that require additives in explosives ought to be instituted so that the type, components, and source of explosives can be identified, and lastly, a database that contain information on former explosion accidents, trends, and techniques of criminal activities that involve explosion accidents should be compiled.

  • PDF

Digital Forensic Model Suitable for Cloud Environment (클라우드 환경에 적합한 디지털 포렌식 수사 모델)

  • Lee, Gymin;Lee, Youngsook
    • Convergence Security Journal
    • /
    • v.17 no.3
    • /
    • pp.15-20
    • /
    • 2017
  • Cloud computing is a service that to use IT resources (software, storage, server, network) through various equipment in an Internet-enabled environment. Due to convenience, efficiency, and cost reduction, the utilization rate has increased recently. However, Cloud providers have become targets for attack Also, Abuse of cloud service is considered as the top security threat. The existing digital forensic procedures are suitable for investigations on individual terminals. In this paper, we propose a new investigation model by analyzing the vulnerable points that occur when you investigate the cloud environment with the existing digital forensic investigation procedure. The proposed investigation model adds a way to obtain account information, and can apply public cloud and private cloud together. Cloud services are also easily accessible and are likely to destroy digital evidence. Therefore, the investigation model was reinforced by adding an account access blocking step.

A Study on the Current State and Improvement of Operation of Fire Investigation Teams (화재조사 실태 분석과 개선방안에 관한 연구)

  • Lee, Tae-Geun;Chae, Jong-Min
    • Journal of forensic and investigative science
    • /
    • v.1 no.1
    • /
    • pp.45-53
    • /
    • 2006
  • The purposes of fire investigation are to identify and analyze the causes of fire and, using the results in promoting fire fighting policies, ultimately to prevent fires caused by similar causes and to protect people's life and properties from fire. However, although the patterns of fire are getting more diverse and complicated with the rapid development of industry, complicated with the rapid development of industry, fire fighting organizations are continuing traditional superficial fire investigation without operating a fire investigation department for the reason of insufficient manpower, equipment and budget, losing public confidence. Thus, the present study purposed to propose plans to improve the technicality of fire investigation and win public confidence in fire investigation. First, the technicality of fire investigation should be improved by operating a department and personnel exclusively for fire investigation. Second, fire investigation should be more scientific and precise using high tech fire investigation equipment. Lastly, responsible fire fighting administration should be realized through statistical analysis of the causes of fire and computerization. The results of this study are expected to contribute to the safety and security of our society.

  • PDF

The analysis of Windows 7·8 IconCache.db and its application (Windows 7·8 IconCahe.db 파일 포맷 분석 및 활용방안)

  • Lee, Chan-Youn;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.135-144
    • /
    • 2014
  • Since anti-forensics have been developed in order to avoid digital forensic investigation, the forensic methods for analyzing anti-forensic behaviors have been studied in various aspects. Among the factors for user activity analysis, "Iconcache.db" files, which have the icon information of applications, provides meaningful information for digital forensic investigation. This paper illustrates the features of IconCache.db files and suggests the countermeasures against anti-forensics utilizing them.

Determination of dextromethorphan and its metabolite dextrorphan in human urine by High-performance liquid chromatography

  • Son, Haeng-Ja;Park, Mee-Jung;Choi, Sang-Kil;Lim, Mi-Ae;Chung, Hee-Sun
    • Proceedings of the PSK Conference
    • /
    • 2003.04a
    • /
    • pp.279.2-280
    • /
    • 2003
  • A simple and accurate reverse-phase high performance liquid chromatography (HPLC) coupled with photodiode array was developed for the determination of dextromethorphan(DM) and its metabolite dextrorphan(DX) in human urine. Chromatographic separation was accomplished on a cyano analytical column at 220 nm using a mobile phase containing 25 mM triethylammonium phosphate buffer(PH 3.0) in a 0-70% ACN gradient and triazolam(TZ) was used as internal standard(I.S). (omitted)

  • PDF

Design and Implementation of Forensic Tool on Window Live System (윈도우 활성 시스템상의 디지털 증거 수집 도구 설계 및 구현)

  • Baek, Eun-Ju;Sung, Jin-Won;Lim, Kyoung-Su;Lee, Sang-Jin
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.91-100
    • /
    • 2007
  • Nowadays, there exist many forensic tools in forensic investigation. For common investigator it may cause some difficulty in handling the existing forensic tools. In case of urgent condition, if it takes long time to get the useful evidence from data, then it makes the investigation process difficult. Thus, the common investigator can collect the evidence easily by simple clicking the mouse. The only thing he needs is a tool for examination before investigating in details. Therefore, in this paper we refer to useful information in the forensic investigation, discuss the design and the implementation of tool.

  • PDF

Forensic Evaluation of Prostate-Specific-Antigen (PSA) Rapid Test Kit for Identification of Human Semen (전립선특이항원검사 Kit에 의한 정액의 신속 검출법)

  • Lim, Chae-Won;Lee, Jong-Hoon;Kim, Hyung-Lak
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.41 no.2
    • /
    • pp.76-82
    • /
    • 2009
  • It would be one of the most important tests that determination of semen in crime scene as a matter of significant evidences. Recently, it has been developed for the identification of semen in forensic specimens which was used simply, easily and reproductively. In this study, Prostate-Specific-Antigen (PSA) Rapid Test kit was evaluated for the forensic identification of semen and compared with one step semen inspection forensic rapid test kit. The sensitivity and specificity of the rapid PSA kit were examined in addition to the stability of PSA. The positive band of rapid PSA kit shown even with 1,000,000-fold diluted semen, which was at least 100 timed higher than qualitative one step semen inspection forensic rapid test kit. PSA was detected in urine from normal male adult, however, it was not detected in urine from young boys and female body fluids. It was shown that PSA was very stable to resist boiling for 20 minutes and the effect of bacteria. In crime scene investigation, rapid PSA kit is expected to help to identify semen easily in the evidences.

  • PDF

Digital Forensics Investigation Approaches in Mitigating Cybercrimes: A Review

  • Abdullahi Aminu, Kazaure;Aman Jantan;Mohd Najwadi Yusoff
    • Journal of Information Science Theory and Practice
    • /
    • v.11 no.4
    • /
    • pp.14-39
    • /
    • 2023
  • Cybercrime is a significant threat to Internet users, involving crimes committed using computers or computer networks. The landscape of cyberspace presents a complex terrain, making the task of tracing the origins of sensitive data a formidable and often elusive endeavor. However, tracing the source of sensitive data in online cyberspace is critically challenging, and detecting cyber-criminals on the other hand remains a time-consuming process, especially in social networks. Cyber-criminals target individuals for financial gain or to cause harm to their assets, resulting in the loss or theft of millions of user data over the past few decades. Forensic professionals play a vital role in conducting successful investigations and acquiring legally acceptable evidence admissible in court proceedings using modern techniques. This study aims to provide an overview of forensic investigation methods for extracting digital evidence from computer systems and mobile devices to combat persistent cybercrime. It also discusses current cybercrime issues and mitigation procedures.

A Study on the Determination of Adulteration of Sesame Oil by Near Infrared Spectroscopy (근적외선(NIR) 분광광도계에 의한 참기름의 진위판별에 관한 연구)

  • Noh, Mi-Jung;Jeong, Jin-Il;Min, Seung-Sik;Park, Yoo-Sin;Kim, Soo-Jeong
    • Korean Journal of Food Science and Technology
    • /
    • v.36 no.4
    • /
    • pp.527-530
    • /
    • 2004
  • Adulteration of sesame oil using near infrared (NIR) spectroscopy was determined. Vegetable oils including sesame oil were scanned on the NIR spectrophotometer at 400-2500 nm. Partial least square (PLS) was applied on the standardized full NIR spectral data. Discriminant analysis with PLS is adequate for determination of sesame oil adulteration, except with decreasing adulteration rate. Designing of quality control system, which uses NIR spectroscopy to measure adulteration level of sesame oil is thus possible, although more work is required to give acceptable accuracy level.