• Title/Summary/Keyword: forensic analysis

Search Result 511, Processing Time 0.024 seconds

The Role of Forensic Engineering in the Diagnosis of Electrocution Fatalities: Two Case Reports

  • Mohammad Alqassim;Raneem Ewiss;Hamdah Al Ali
    • Safety and Health at Work
    • /
    • v.14 no.1
    • /
    • pp.124-130
    • /
    • 2023
  • The increase in the number of fatal electric accidents over the years has escalated the demand for specialized forensic engineers to determine their relevant technical causes. Likewise, the complexities associated with identifying the causes of electrocution accidents have prompted the General Department of Forensic Science and Criminology at Dubai Police to adopt a new methodology to diagnose electrocution accidents, consisting of an approach that involves medico-legal examination, electrical diagnosis of the evidence, and trace evidence analysis. This paper will discuss the application of the adopted method in further detail by unfolding two case reports. The first report outlines a case in which a worker got electrocuted at a construction site while attempting to turn on a lamp. The second case report involves the death of a technician in a workshop after trying to disconnect a washing machine from its plug. The methodology was utilized during the investigation of both cases, which were attended by the appointed forensic engineers and showed promising results.

Analysis on Mobile Forensic of Smishing Hacking Attack (Smishing 사고에 대한 Mobile Forensic 분석)

  • Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.12
    • /
    • pp.2878-2884
    • /
    • 2014
  • The Smishing attacks are caused using smartphone since 2013. Smishing hacking attacks are increasing due to the approximately 104 million private information leakage incidents by the 3 domestic credit card companies occurred in January 2014. The Smishing attack occurred in conjunction with hacking illegal leakage of personal information and direct financial damage. In this paper, i am analyze real-world case studies in the lab and study accident on Smishing Mobile Forensic analysis. I am study of a real case Smishing hacking attacks. And studying evidence for a Mobile Forensic analysis of the technical principles of Smishing attacks. The study for the Mobile Forensic evidence proved the Smishing hacking attacks using Mobile Forensic technic and create Mobile Forensic reports. Through this paper, the research will be safe for the people living in the smartphone can be used safely and conveniently, with the development of Mobile Forensic technology, to study the extraction of Smishing accident evidences from the court.

Forensic Analysis Technology of Smart phone backup data via synchronization (동기화 스마트폰 백업 데이터 포렌식 분석 기술)

  • Lee, Jae-Hyun;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.287-290
    • /
    • 2011
  • The synchronization feature on the smartphone by default (default) value is set. Smartphone synchronization has been set is stored that smartphone data is automatically backed up is stored When connected to a PC with a smartphone dedicated cable. The backup data is a common technique to analyze the content to be difficult to apply forensic techniques can find out information on criminal suspects. In this paper, the backup data is synchronized to the smartphone through forensic analysis is the study of forensic evidence. In a lab environment to send personal financial information on smartphone, smartphone is assumed that the experiment is compromised. Smartphone's backup data by using the forensic tools in crime associated with personal financial information and analyze data. And, to be adopted by the court will study the evidence leveraging forensic technology. Through this paper as a basis for smartphone forensic analysis will be utilized.

  • PDF

Practical and Legal Challenges of Cloud Investigations (클라우드 환경에서 수사 실무와 법적 과제)

  • James, Joshua I.;Jang, Yunsik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.33-39
    • /
    • 2014
  • An area presenting new opportunities for both legitimate business, as well as criminal organizations, is Cloud computing. This work gives a strong background in current digital forensic science, as well as a basic understanding of the goal of Law Enforcement when conducting digital forensic investigations. These concepts are then applied to digital forensic investigation of cloud environments in both theory and practice, and supplemented with current literature on the subject. Finally, legal challenges with digital forensic investigations in cloud environments are discussed.

Analysis of Death Due to Poisoning in the National Capital Region (2014-2016) (수도권 부검시료에서 중독사 관련 사용물질 현황(2014-2016))

  • Park, Meejung;Park, Jongsin;Lee, Sangki;In, Sangwhan
    • Journal of The Korean Society of Clinical Toxicology
    • /
    • v.15 no.2
    • /
    • pp.101-106
    • /
    • 2017
  • Purpose: This study examined the patterns of drugs, poisons, and chemicals detected in autopsy samples performed in the Seoul Institute and other regional forensic offices of the National Forensic Service (NFS) between 2014 and 2016. Methods: The investigation carried out using the laboratory information management system. Forensic toxicological identification and quantitation were performed in autopsy samples, including heart blood, peripheral blood, liver, kidney, vitreous humor and etc. Gas chromatography/mass spectrometry (GC-MS) and liquid chromatography-tandem mass spectrometry (LC-MS/MS) were used to analyze the drugs and poisons. Results: Forensic autopsies were performed on 9,674 cases in this period. Based on the autopsy reports, 699 cases (7.2%) were considered as unnatural deaths caused by fatal intoxication. The number of male deaths was higher than that of female deaths, with the age of 50-59 being the most common age group. Conclusion: Drugs comprised the largest number of deaths due to poison, followed by alcohol, agrochemicals, drug with alcohol, carbon monoxide, and cyanide, in that order. Zolpidem was the most frequently used drug in all drug-related intoxication cases.

Method Validation for the Simultaneous Analysis of Organophosphorous Pesticides in Blood by GC/MS (GC/MS를 이용한 혈액 중 유기인제류 농약의 동시 분석에 관한 방법의 유효화)

  • Park Mee Jung;Yang Ja Youl;Kim Ki Wook;Park Yoo Shin;Chung Hee Sun;Lee Sang Ki
    • Environmental Analysis Health and Toxicology
    • /
    • v.20 no.4 s.51
    • /
    • pp.297-302
    • /
    • 2005
  • The purpose of this study was to provide the standard method for the analysis of organophosphorous pesticides such as chlorpyrifos, diazinon, malathion and parathion in blood. We performed method validation for these pesticides in blood according to EURACHEM (A focus For Analytical Chemistry in Europe) guide. For the analysis of the pesticides, we used solid-phase extraction ,column (Waters Oasis $HLB^{(R)}$. After the extraction, the supernatants were evaporated to dryness under the nitrogen stream. They were analyzed by gas chromatography/mass spectrometry (GC/MS) after reconstituting with ethanol. Terbufos was used as an internal standard. To validate this method, we performed verification procedures with the following parameters: selectivity, linearity of calibration, accuracy, precision, limit of detection and quantification. Validation data according to Eurachem guide were adequate for our purpose for the analysis of chlorpyrifos, diazinon, malathion and parathion in blood.

Forensic Analysis of KakaoTalk Messenger on Android Environment (안드로이드 환경에서의 KakaoTalk 메신저의 포렌식 분석 방법론 제안 및 분석)

  • Yoon, Jongcheol;Park, Yongsuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.1
    • /
    • pp.72-80
    • /
    • 2016
  • Recently, IM(Instant Messenger) of KakaoTalk is being used on smart devices such as smartphones. Because IM service can carry user and/or suspector's various information including life style, geographical position, psychology and crime history, forensic analysis on IM service is desirable. But, forensic analysis for KakaoTalk is not well studied yet. This paper studies a proper forensic method for KakaoTalks, finds artifacts location, reconstruct the list of contacts and the chronology of the messages that have been exchanged by users. Proposed methodology and analyzed information can provide a basic platform for forensic tool.