• Title/Summary/Keyword: Forensic Science

Search Result 456, Processing Time 0.023 seconds

Actual Conditions of Burglaries and Analysis on Residential Invasion Burglaries in Daegu Area (강도 범죄의 실태 및 대구 지역 침입 강도 범죄 분석)

  • Lee, Sang-Ho;Kwak, Jyung-Sik
    • Journal of forensic and investigative science
    • /
    • v.2 no.2
    • /
    • pp.5-20
    • /
    • 2007
  • During the period from 2001 to 2005, 29,892 burglaries took place in Korea with the approximate average annual number - 5,978 cases. This study was conducted to analyze the reported burglaries and the result was summarized as follows. There were 8,605 residential invasion burglaries (28.8%) as the most frequent characteristic pattern. The exit was used as the most frequent invasion route for 4,031 invasion burglaries (64.3%), and an unlocked exit door or window was used as the most frequent invasion method for 2,462 invasion burglaries (28.6%). The hours just after midnight (between 00:00 and 04:00) were the most frequent time for invasion burglary to occur. Also, 5,652 burglaries occurred on Wednesday which was twice higher than on Sunday (2,988 burglaries). It was shown that the number of persons injured during burglaries were 260 deaths and 10,610 injuries. The places of the highest occurrence were the street with 10,183 burglaries (34%) and then residential place with 7,527 burglaries (approximately 25%). One-man burglary was the highest complicity: 15,012 offenders (56.1%). The knife was used as the most frequent instrument for 6,498 burglaries (24,3%) what is rare, while no criminal tool or instrument was used for 15,631 burglaries (58.4). During the period from 2001 to 2006, 1,506 burglaries occurred in Daegu and the average annual number was 251 burglaries. Among those,515 residential invasion burglaries (34.2%) took place and the average annual number was approximately 86 cases. The hours just after midnight (between 00:00 and 04:00) were the most frequent time for invasion burglary to occur (194 cases, 37.7%), the place of the highest invasion occurrence was the residential place (259 cases, 50.3%), and the exit was used as the most frequent invasion route (87 cases, 37.7%). An unlocked exit door or window was the most frequent invasion method (65 cases, 25.1%). In addition, pretending to be a delivery man, visitor or following the victim methods were used for 26 burglaries (10%). It is apparent that personal preventive measures against crimes, as well as governmental and social measures, play an important role in preventing burglaries. In particular, based on the analyzed result that an unlocked window or exit door was most frequently used for reported burglaries, it seems that there is a lack of understanding of crime prevention while little effort has been made to prevent crimes. Although everyone knows that locking a door is one of the basic measures to prevent crimes, many people tend to pay little attention to lock a door properly so burglary takes place. This study, therefore, is intended to encourage people to pay more careful attention to crime prevention, in order to help reduce the probability of burglary. With the recent improvement in social understanding of scientific crime investigation, a wide variety of police professions, including crime analysts, crime victim police counselors and coroners, have been prepared to develop the scientific crime investigation and crime analysis. In addition, it is hoped that further this study will contribute to encourage studies on crime prevention to be carried out in the future.

  • PDF

Study on Remote Data Acquisition Methods Using OAuth Protocol of Android Operating System (안드로이드 환경의 OAuth 프로토콜을 이용한 원격지 데이터 수집 방법 연구)

  • Nam, Gi-hoon;Gong, Seong-hyeon;Seok, Byoung-jin;Lee, Changhoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.111-122
    • /
    • 2018
  • Using OAuth protocol, third-party applications on the Android operating system use user's credentials or access tokens that have access authority on user's resources to gain user's account and personal information from account information providers. These credentials and token information are stored in the device by the OAuth data management method provided by the Android operating system. If this information is leaked, the attacker can use the leaked credential and token data to get user's personal data without login. This feature enables the digital forensic investigator to collect data directly from the remote server of the services used by the target of investigation in terms of collecting evidence data. Evidence data collected at a remote location can be a basis for secondary warranties and provide evidence which can be very important evidence when an attacker attempts to destroy evidence, such as the removal of an application from an Android device. In this paper, we analyze the management status of OAuth tokens in various Android operating system and device environment, and show how to collect data of various third party applications using it. This paper introduces a method of expanding the scope of data acquisition by collecting remote data of the services used by the subject of investigation from the viewpoint of digital forensics.

Comparison of Optimal Storage Temperature and Collection Reagents for Living Bacterial Cells in Swab Samples (면봉시료에서 세균의 보존을 위한 최적 보관 온도와 채취 시약의 비교)

  • Lee, Yeong Ju;You, Hee Sang;Lee, Song Hee;Lee, So Lip;Lee, Han;Sung, Ho Joong;Kang, Hee Gyoo;Hyun, Sung Hee
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.53 no.4
    • /
    • pp.326-332
    • /
    • 2021
  • Swabs are useful and common sampling tools in various research fields, such as medicine, ecology, biotechnology, forensic medicine, and pollutant monitoring systems. Collection reagents are one of the essential components in sampling. It is important to develop a sample collection kit and designate an appropriate storage temperature because samples need to be stored for a long time. The purpose of this study was to identify the effects of three collection reagents and three storage temperatures on the recovery of living bacteria without media. We selected Escherichia coli and Staphylococcus aureus as representative environmental bacteria. Distilled water (DW), phosphate buffered saline (PBS), and Tris-EDTA (TE) buffer were used as collection reagents and stored at 22℃, 4℃, and -70℃ after sampling. The results of using each collection reagent and storage temperature on the bacteria were compared using relative light units (RLU) and the number of colony forming units (CFU). When using -70℃ storage temperature and the TE buffer, the number of living bacteria and the RLU values remained constant. It is therefore recommended that the sample be stored at -70℃ immediately after collection and a TE buffer solution be used as the collection reagent.

DNA Yield and PCR Success Rate of the Establishment Time of Wood Annual Ring: A Case Study of Korean Red Pine (Pinus densiflora) (목재의 나이테 생성 시기에 따른 DNA 추출 수율 및 PCR 성공률: 소나무(Pinus densiflora) 목재의 사례)

  • So Hyeon Kim;Byeong-Ju Lee;Ji Young Ahn;Jei-Wan Lee;Hyun-Mi Lee;Soo Hyung Eo
    • Journal of Korean Society of Forest Science
    • /
    • v.112 no.4
    • /
    • pp.554-560
    • /
    • 2023
  • To prevent illegal timber distribution, DNA markers have been used to identify the species and origin. However, extracting high-quality DNA from timber is difficult because of its physical and chemical properties. In this study, we investigated whether the age of timber tissue influences the yield of DNA extraction and the success rate of polymerase chain reaction (PCR) to understand the relationship between the establishment time of the wood annual ring and the extracted DNA concentration (ng/μl), purity (A260/A280), and PCR success rate (%) from pinewood, a major Korean domestic species. According to the results, it was observed that as the distance from the cambium increased, indicating that the tissue was older, the concentration and purity of the extracted DNA decreased significantly. For the trnM-trnV (285 bp) and rpoC1 (298 bp) regions, the PCR success rate was 100%. However, for the rbcL (1.3 kb) region, the PCR success rate was 66.67%. Moreover, PCR amplification of the rbcL region failed at all points older than 30 years. Thus, it is deduced that as time passes, along with the decay of timber cells, DNA is degraded, leading to a decrease in DNA concentration, purity, and PCR success rate. The results of this study are expected to be beneficial for future applications, such as the species identification of timber, providing valuable insights and potential utilization in this field.

Comparison between different cone-beam computed tomography devices in the detection of mechanically simulated peri-implant bone defects

  • Kim, Jun Ho;Abdala-Junior, Reinaldo;Munhoz, Luciana;Cortes, Arthur Rodriguez Gonzalez;Watanabe, Plauto Christopher Aranha;Costa, Claudio;Arita, Emiko Saito
    • Imaging Science in Dentistry
    • /
    • v.50 no.2
    • /
    • pp.133-139
    • /
    • 2020
  • Purpose: This study compared 2 cone-beam computed tomography (CBCT) systems in the detection of mechanically simulated peri-implant buccal bone defects in dry human mandibles. Materials and Methods: Twenty-four implants were placed in 7 dry human mandibles. Peri-implant bone defects were created in the buccal plates of 16 implants using spherical burs. All mandibles were scanned using 2 CBCT systems with their commonly used acquisition protocols: i-CAT Gendex CB-500 (Imaging Sciences, Hatfield, PA, USA; field of view [FOV], 8 cm×8 cm; voxel size, 0.125 mm; 120 kVp; 5 mA; 23 s) and Orthopantomograph OP300 (Intrumentarium, Tuusula, Finland; FOV, 6 cm×8 cm; voxel size, 0.085 mm; 90 kVp; 6.3 mA; 13 s). Two oral and maxillofacial radiologists assessed the CBCT images for the presence of a defect and measured the depth of the bone defects. Diagnostic performance was compared in terms of the area under the curve (AUC), accuracy, sensitivity, specificity, and intraclass correlation coefficient. Results: High intraobserver and interobserver agreement was found (P<0.05). The OP300 showed slightly better diagnostic performance and higher detection rates than the CB-500 (AUC, 0.56±0.03), with a mean accuracy of 75.0%, sensitivity of 81.2%, and specificity of 62.5%. Higher contrast was observed with the CB-500, whereas the OP300 formed more artifacts. Conclusion: Within the limitations of this study, the present results suggest that the choice of CBCT systems with their respective commonly used acquisition protocols does not significantly affect diagnostic performance in detecting and measuring buccal peri-implant bone loss.

Influence of reconstruction parameters of micro-computed tomography on the analysis of bone mineral density

  • Gaeta-Araujo, Hugo;Nascimento, Eduarda Helena Leandro;Brasil, Danieli Moura;Madlum, Daniela Verardi;Haiter-Neto, Francisco;Oliveira-Santos, Christiano
    • Imaging Science in Dentistry
    • /
    • v.50 no.2
    • /
    • pp.153-159
    • /
    • 2020
  • Purpose: This study was conducted evaluate the influence of reconstruction parameters of micro-computed tomography (micro-CT) images on bone mineral density (BMD) analyses. Materials and Methods: The sample consisted of micro-CT images of the maxillae of 5 Wistar rats, acquired using a SkyScan 1174 unit (Bruker, Kontich, Belgium). Each acquisition was reconstructed following the manufacturer's recommendations(standard protocol; SP) for the application of artifact correction tools(beam hardening correction [BHC], 45%; smoothing filter, degree 2; and ring artifact correction [RAC], level 5). Additionally, images were reconstructed with 36 protocols combining different settings of artifact correction tools (P0 to P35). BMD analysis was performed for each reconstructed image. The BMD values obtained for each protocol were compared to those obtained using the SP through repeated-measures analysis of variance with the Dunnett post hoc test(α=0.05). Results: The BMD values obtained from all protocols that used a BHC of 45% did not significantly differ from those obtained using the SP (P>0.05). The other protocols all yielded significantly different BMD values from the SP(P<0.05). The smoothing and RAC tools did not affect BMD values. Conclusion: BMD values measured on micro-CT images were influenced by the BHC level. Higher levels of BHC induced higher values of BMD.

Comparison of VMD and 1,2-indanedione(SOON-100) for the Development of Latent Fingerprints on Thermal Paper (VMD와 1,2-indanedione(SOON-100)의 감열지 잠재지문 현출 효과 비교)

  • Jo, Hyunjin;Lee, Seon-Min;Yu, Je-Seol
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.11
    • /
    • pp.333-341
    • /
    • 2020
  • Since thermal paper is widely used in daily life such as convenience store receipts, lottery tickets and ATM receipts, it is important to develop fingerprints on thermal papers because it can be easily found in crime scenes. This study compared the ability of fingerprint development between vacuum metal deposition(VMD) and 1,2-indanedione(SOON-100) in order to evaluate the effectiveness of VMD, which some literatures have stated to be effective in thermal papers. As a result, in the case of SOON-100, clear ridges of fingerprints that enable individual identification were observed after an hour of deposition, although the fresh fingerprints were faint. In the case of VMD, the fingerprints gradually spread and the quality of the ridges deteriorated rapidly after 6 hours of deposition. This results is consistent with the principle of VMD. Considering the principles of VMD and the characteristics of the surface of thermal paper, VMD is not suitable for the development of potential fingerprints on the thermal paper.

Restoration of damaged speech files using deep neural networks (심층 신경망을 활용한 손상된 음성파일 복원 자동화)

  • Heo, Hee-Soo;So, Byung-Min;Yang, IL-Ho;Yoon, Sung-Hyun;Yu, Ha-Jin
    • The Journal of the Acoustical Society of Korea
    • /
    • v.36 no.2
    • /
    • pp.136-143
    • /
    • 2017
  • In this paper, we propose a method for restoring damaged audio files using deep neural network. It is different from the conventional file carving based restoration. The purpose of our method is to infer lost information which can not be restored by existing techniques such as the file carving. We have devised methods that can automate the tasks which are essential for the restoring but are inappropriate for humans. As a result of this study it has been shown that it is possible to restore the damaged files, which the conventional file carving method could not, by using tasks such as speech or nonspeech decision and speech encoder recognizer using a deep neural network.

Development of a Flatbed Scanner for Reflection Infrared Photography (반사 적외선 사진을 위한 평판 스캐너의 개발)

  • Choi, Young-Ho;Hwang, Min-Ku;Har, Dong-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.4
    • /
    • pp.57-66
    • /
    • 2011
  • At this time, digital cameras are used in art and forensic science. However, the digital camera has some limitations which need to understand of photograph and lighting. It is a useful paper to make an infrared flatbed scanner. The following processes offer an infrared flatbed scanner development. First, the infrared flatbed scanner changes visible fluorescent lamp to infrared LED. Second, it equips a long-pass filter, which is available to pass over 810nm wavelength, on the glass to complete the optimal infrared flatbed scanner. In addition, it must copy from digital camera to computer directly. The infrared digital camera has disadvantage to always irradiate infrared lamp. Because of difference between visible length and infrared length characteristic, they have different focal distance. This devised scanner for solving mentioned problems does not need to irradiate infrared lamp, and there is not a problem about focal point because the depth of field of flatbed scanner is minimum 2mm. Lastly, the infrared flatbed scanner can make high resolution which is 12,800dpi unlike digital camera. Accordingly, the infrared scanner looks forward to be used in many field of study.

Development Comparative Experiments of Blood Prints Enhancement Reagent (Fuchsin Acid, Eosin-Y, Acid Yellow 7) (배경에 따른 혈문증강 시약(Fuchsin Acid, Eosin-Y, Acid Yellow 7) 적용의 현출도 비교실험)

  • Kim, A-Ram;Kim, Woo-Joong;Jung, Hey-Young
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.6
    • /
    • pp.194-201
    • /
    • 2013
  • In serious crimes, bloody fingerprints are crucial evidence that make links between suspects and victims. There have been many studies related to bloody fingerprints for a long time. There are many comparative studies for effectiveness of Acid Fuchsin and Acid Yellow 7, but nothing about Eosin-Y in this country. Acid Fuchsin is a useful reagent that has unique red color distinguishing from light colored background. but it is useless on dark surfaces. In order to make it visible, we should use BVDA Gel lifters. On the contrary this, Acid Yellow 7 makes stronger fluorescence on a dark background. In this study, we got the conclusion that Eosin-Y is more useful than the others not only on dark background but also light background.