• Title/Summary/Keyword: digital evidence

Search Result 510, Processing Time 0.028 seconds

Digital Image as Scientific Evidence: A Theoretical Inquiry of the Roles of Digital Technologies in Visualizing Risk (과학적 증거물로서 디지털 이미지: 위험의 시각화에서 디지털 영상기술의 역할과 위치)

  • Kim, Soo-Chul
    • Korean journal of communication and information
    • /
    • v.54
    • /
    • pp.98-117
    • /
    • 2011
  • This paper is a theoretical inquiry of the changing roles of digital technologies in the representation of risk. Critically examining existing perspectives on risk society and risk communication, this paper argues that digital technologies and images in risk communication have been relatively understudied. Having said that, this paper suggests that Actor-network Theory provide useful theoretical tools for current studies on how digital technologies affect contemporary risk communication practices. Furthermore, this paper examines varied recent studies investigating how digital technologies of visualization are at play in risk communication practices. In doing so, this paper demonstrates how digital images and technologies interrupt the processes that scientific evidence is presented and facts are constructed in varied contemporary scientific reasoning. It will focus on the emerging mode of seeing and visual regime made possible by the increased usage of digital image and technologies, which are characterized by networked connection, sensor, computerized algorithm, and increased storage space. Finally this paper will discuss on the implications on future studies on the roles of digital images and technologies in risk communication practices in Korean context.

  • PDF

A study of the preparation And procedures by Smartphone Mobile Forensic evidence collection and analysis (스마트폰 모바일 포렌식 증거 수집 분석을 위한 준비사항 및 절차 연구)

  • Lee, Jae-Hyun;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.269-272
    • /
    • 2011
  • The lawsuit is being made on the smart phone. And recent is getting a lot of evidence for the smart phone data in a court of law. Thus, the evidence of illegal use smartphone for the extraction of data and evidence collection, forensic procedure is a need for research. In this paper, evidence of phone forensic procedure for the extraction of the data suggests. And, by collecting forensic evidence from smartphones ensure the integrity of digital evidence and how to solve the case investigated. With this study, smartphone forensic will be able to contribute to the development.

  • PDF

A Study on Influence of Korea-EU FTA Ratification upon Legal Service and Forensic Investigation (한-EU FTA 비준에 따르는 법률서비스가 포렌식 수사에 미치는 영향 연구)

  • Lee, Gyu-An
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.5
    • /
    • pp.683-688
    • /
    • 2011
  • Korea-EU FTA, which came to an agreement in April of 2007, was resolved at the National Assembly in May of 2011, thereby having been concluded the ratification. As for the procedure of opening a market in legal service according to settlement and ratification of Korea-EU FTA, Step 1 is allowed the establishment of representative office(law firm with foreign-law consultation) at home by EU member countries' law firms. Step 2 is made available for law firm with foreign-law consultation to jointly handle and distribute profits as for a case that is mixed the domestic law firm and the domestic & foreign laws. Step 3 is allowed EU member countries' law firm to establish a joint venture with domestic law firm. This study researches into a change and influence upon legal service and forensic investigation according to Korea-EU FTA ratification. Also, it researches into position and prospect that digital forensic evidence, which possesses the majority of legal evidences, takes up in the middle of court-oriented trials. The prediction of influence in digital evidence as professional proof upon judgment will led to being capable of coping with the opening of legal service market and of wisely preparing for the advance to domestic market by law firm of Anglo-American Law.

Build a Digital Evidence Map considered Log-Chain (로그 체인을 고려한 디지털증거지도 작성)

  • Park, Hojin;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.3
    • /
    • pp.523-533
    • /
    • 2014
  • It has been spent too much time to figure out the incident route when we are facing computer security incident. The incident often recurs moreover the damage is expanded because critical clues are lost while we are wasting time with hesitation. This paper suggests to build a Digital Evidence Map (DEM) in order to find out the incident cause speedy and accurately. The DEM is consist of the log chain which is a mesh relationship between machine data. And the DEM should be managed constantly because the log chain is vulnerable to various external facts. It could help handle the incident quickly and cost-effectively by acquainting it before incident. Thus we can prevent recurrence of incident by removing the root cause of it. Since the DEM has adopted artifacts in data as well as log, we could make effective response to APT attack and Anti-Forensic.

Digital forensic framework for illegal footage -Focused On Android Smartphone- (불법 촬영물에 대한 디지털 포렌식 프레임워크 -안드로이드 스마트폰 중심으로-)

  • Kim, Jongman;Lee, Sangjin
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.39-54
    • /
    • 2018
  • Recently, discussions for the eradication of illegal shooting have been carried out in a socially-oriented way. The government has established comprehensive measures to eradicate cyber sexual violence crimes such as illegal shooting. Although the social interest in illegal shooting has increased, the illegal film shooting case is evolving more and more due to the development of information and communication technology. Applications that can hide confused videos are constantly circulating around the market and community sites. As a result, field investigators and professional analysts are experiencing difficulties in collecting and analyzing evidence. In this paper, we propose an evidence collection and analysis framework for illegal shooting cases in order to give practical help to illegal shooting investigation. We also proposed a system that can detect hidden applications, which is one of the main obstacles in evidence collection and analysis. We developed a detection tool to evaluate the effectiveness of the proposed system and confirmed the feasibility and scalability of the system through experiments using commercially available concealed apps.

A Study on the Development of a Platform for the Prevention of Digital Sexual Crimes in the Virtual-Reality Metaverse (가상현실 메타버스 디지털 성범죄 예방을 위한 플랫폼 구축 제안 연구)

  • Jae-Won, Hwang;Jung-Heum, Park;Sang-Jin, Lee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.6
    • /
    • pp.1157-1166
    • /
    • 2022
  • With the advent of the non-face-to-face era, a new type of digital sexual crime with avatars is emerging on the Metaverse virtual reality platform. Due to the lack of clearly established in legal and regulatory systems, it is challenging to punish offenders and acquire digital proof for sexual crimes using these avatars. This research aims to suggest a service and technological solution is development platform that may assist crime prevention and the collection of digital evidence, with a particular emphasis on digital sex crimes that occur in the metaverse, a virtual reality realm. This study explores the reasons behind the difficulty of legal application in the metaverse and then determines the types of digital sex crimes that may occur in the metaverse. In addition, it is suggested what service components the metaverse should contain from the stage of construction and design, can be utilized what element of metaverse in order to prevent illegal activity of avatars.

Cyber forensics domain ontology for cyber criminal investigation (사이버 범죄 수사를 위한 사이버 포렌식 범주 온톨로지)

  • Park, Heum
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.8
    • /
    • pp.1687-1692
    • /
    • 2009
  • Cyber forensics is used the process and technology of digital forensics as a criminal investigation in cyber space. Cyber crime is classified into cyber terror and general cyber crime, and those two classes are connected with each other. The investigation of cyber terror requires high technology, system environment and experts, and general cyber crime is connected with general crime by evidence from digital data in cyber space. Accordingly, it is difficult to determine relational crime types, collect evidence and the legal admissibility of evidence. Therefore, we considered the classifications of cyber crime, the collection of evidence in cyber space and the application of laws to cyber crime. In order to efficiently investigate cyber crime, it is necessary to integrate those concepts for each cyber crime-case. In this paper, we constructed a cyber forensics domain ontology for cyber criminal investigation using the concepts, relations and properties, according to categories of cyber crime, laws, evidence, and information of criminals and crime-cases. This ontology can be used in the process of investigating of cyber crime-cases, and for data mining of cyber crime; classification, clustering, association and detection of crime types, crime cases, evidences and criminals.

Reliability Verification of Evidence Analysis Tools for Digital Forensics (디지털 포렌식을 위한 증거 분석 도구의 신뢰성 검증)

  • Lee, Tae-Rim;Shin, Sang-Uk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.165-176
    • /
    • 2011
  • In this paper, we examine the reliability verification procedure of evidence analysis tools for computer forensics and test the famous tools for their functional requirements using the verification items proposed by standard document, TIAK.KO-12.0112. Also, we carry out performance evaluation based on test results and suggest the way of performance improvement for evidence analysis tools. To achieve this, we first investigate functions that test subjects can perform, and then we set up a specific test plan and create evidence image files which contain the contents of a verification items. We finally verify and analyze the test results. In this process, we can discover some weaknesses of most of analysis tools, such as the restoration for deleted & fragmented files, the identification of the file format which is widely used in the country and the processing of the strings composed of Korean alphabet.

Digital Divide: Elementary school students in Taejon, Korea (디지털 격차 : 대전지역 초등학생을 중심으로)

  • 최종인;오광록;박현아
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 2000.11a
    • /
    • pp.5-24
    • /
    • 2000
  • Access to computers and the internet and the ability to effectively use this technology are becoming increasingly important for full participation in Korea′s economic, education, and social life. In recent years, access to computers and internet has exploded. Unfortunately, there is strong evidence of "digital divide"-gap between those individual and communities that have access to these information technology and those who don′t. This research focus on the elementary school students in Taejon, Korea. We found that there is digital divide among children and also different result between access to information technology and use of contents to information technology.

  • PDF

A Method of Forensic Authentication via File Structure and Media Log Analysis of Digital Images Captured by iPhone (아이폰으로 촬영된 디지털 이미지의 파일 구조 및 미디어 로그 분석을 통한 법과학적 진본 확인 방법)

  • Park, Nam In;Lee, Ji Woo;Jeon, Oc-Yeub;Kim, Yong Jin;Lee, Jung Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.4
    • /
    • pp.558-568
    • /
    • 2021
  • The digital image to be accepted as legal evidence, it is important to verify the authentication of the digital image. This study proposes a method of authenticating digital images through three steps of comparing the file structure of digital images taken with iPhone, analyzing the encoding information as well as media logs of the iPhone storing the digital images. For the experiment, digital image samples were acquired from nine iPhones through a camera application built into the iPhone. And the characteristics of file structure and media log were compared between digital images generated on the iPhone and digital images edited through a variety of image editing tools. As a result of examining those registered during the digital image creation process, it was confirmed that differences from the original characteristics occurred in file structure and media logs when manipulating digital images on the iPhone, and digital images take with the iPhone. In this way, it shows that it can prove its forensic authentication in iPhone.