• Title/Summary/Keyword: 수사

Search Result 808, Processing Time 0.029 seconds

Analysis of an Arson fire of Motor Vehicle (자동차 방화사례의 분석)

  • Lee, Eui-Pyeong
    • Fire Science and Engineering
    • /
    • v.25 no.6
    • /
    • pp.112-119
    • /
    • 2011
  • In this study, a fire cause of setting fire to one's own car to collect the insurance is analyzed. Through a close examination of causes of this car fire, it is suggested to improve current practices and institutions: (1) A collection system of fallen vehicle parts or fire debris in the fire site should be established; (2) A system of providing fire site information in detail should be established when a police station requests National Institute of Scientific Investigation (NISI) to examine causes of vehicle fires; (3) When a burned car is suspected of arson, a fire station and a police station should maintain a mutual cooperation system; (4) Procedures of examining the causes of vehicle arson in National Institute of Scientific Investigation (NISI) should be improved; and (5) Recognition of the examination of fire causes and correlation with analysis equipment should be changed.

Research about the Identification and Gathering of Digital Forensic Evidence by Cyber Intrusion Accident Types (사이버 침해사고 유형별 디지털 포렌식 증거의 식별 및 수집에 관한 연구)

  • Shin, Kyung-Jun;Lee, Sang-Jin
    • Convergence Security Journal
    • /
    • v.7 no.4
    • /
    • pp.93-105
    • /
    • 2007
  • A digital forensic technology and tools are used much in the rapidly increased cyber intrusion accident investigation. But, almost the identification and gathering tools of digital forensic evidence are very difficultly integrated and simply poor-skill. Thereby, Important digital evidences at intrusion accident investigation of public institution and a private enterprise can be omitted or demaged. In this paper, therefore, we refer to 'The digital forensic tool for identification and gathering evidence' based only Window OS by using 'Log Parser', discuss the methodology for the identification and gathering of digital forensic evidence by cyber intrusion accident types.

  • PDF

A Study of Trace for Data Wiping Tools (완전삭제 도구 사용 흔적에 관한 연구)

  • Kim, Yeon-Soo;Bang, Je-Wan;Kim, Jin-Kook;Lee, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.17C no.2
    • /
    • pp.159-164
    • /
    • 2010
  • The data wiping is a technique which perfectly deletes data in a storage to prevent data recovery. Currently, management of stored data is important because of increasing an accident of personal information leakage. Especially, if you need to discard data contained personal information, using a wiping tool which permanently deletes data to prevent unnecessary personal information leakage. The data wiping is also used for data security and privacy protection. However the data wiping can be used intentionally destruction of evidence. This intentionally destruction of evidence is important clues of forensic investigation. This paper demonstrates the methods for detecting the usage of wiping tools in digital forensic investigation.

An Experience of Judicial Autopsy for a Death by Muscular Dystrophy: An Autopsy Case (근이영양증으로 인한 사망의 사법부검 사례 경험: 증례 보고)

  • Kim, Youn Shin;Park, Ji Hye
    • The Korean Journal of Legal Medicine
    • /
    • v.42 no.4
    • /
    • pp.159-163
    • /
    • 2018
  • Progressive muscular dystrophy (PMD) is a primary muscle disease characterized by progressive muscle weakness and wasting, which is inherited by an X-linked recessive pattern and occurs mainly in males. There are several types of muscular dystrophies classified according to the distribution of predominant muscle weakness including Duchenne and Becker, Emery-Dreifuss, facioscapulohumeral, oculopharyngeal, and limb-girdle type. Clinical manifestations of PMD are clumsy, unsteady gait, pneumonia, heart failure, pulmonary edema, hydropericardium, hydrothorax, aspiration, syncopal attacks, and sudden cardiac death. The deceased was a 34-year-old man, and the onset of the first clinical symptom, gait disturbance, was in his late teens. His elder brother had the same disease and experienced brain death after a head trauma and died after mechanical ventilation was discontinued. After an autopsy, we found contracture of the joints, pseudohypertrophy of the calf, wasting and fat replacement of the thigh muscle, pericardial effusion (80 mL), fibrosis and fat replacement of the cardiac ventricular wall, pulmonary edema, and froth in the bronchus. The cause of death was heart failure and dyspnea due to muscular dystrophy. There was no sign or suspicion of foul play in his death.

Forensic Investigation Procedure for Real-time Synchronization Service (실시간 동기화 서비스에 대한 포렌식 조사 절차에 관한 연구)

  • Lee, Jeehee;Jung, Hyunji;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1363-1374
    • /
    • 2012
  • The number and use of Internet connected devices has dramatically increased in the last several years. Therefore many services synchronizing data in real-time is increasing such as mail, calendar and storage service. This service provides convenience to users. However, after devices are seized, the data could be changed because of characteristic about real-time synchronization. Therefore digital investigation could be difficult by this service. This work investigates the traces on each local device and proposes a method for the preservation of real-time synchronized data. Based on these, we propose the procedures of real-time synchronization data.

A Method for Tracing Internet Usage in Multi-use Web browser Environment and Non-English Speaking Countries (웹 브라우저 다중 사용 환경과 비영어권 국가에서의 인터넷 사용흔적 조사 방법)

  • Lee, Seung-Bong;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.5
    • /
    • pp.125-132
    • /
    • 2010
  • Web browser is essential application for using internet. If suspect use a web browser for crime, evidence related crime is stored in log file. Therefore, we obtain the useful information related crime as investigating web browser log file. In this paper, we look at the related work and tools for web browser log file. And we introduce analysis methodology of web browser log file focus on the digital forensics. In addition, we apply to our tool at real case.

Evaluation of developing efficiency on latent fingerprint (잠재지문 현출효율 평가에 대한 연구)

  • Kim, Man-Ki;Park, Sung-Woo;Ohgami, Yusuke
    • Analytical Science and Technology
    • /
    • v.22 no.2
    • /
    • pp.166-171
    • /
    • 2009
  • Powder method is simple and very effective method for developing latent finger and palm print in crime scene. This technique has been actively studied to enhance effectiveness. In general, the evaluation for developing powder is mainly performed by the subjective opinion of researcher from comparison of the results obtained with existing and new one to develope finger and palm deposition. The purpose of this work is to present objective method of powder-treated latent fingerprint for evaluating method by developing efficiency. We indicated three evaluating methods of objective developing efficiency, which are measuring the number of minutiae in same sections on print, scattering level of developing reagent and contrast between developing reagent and background materials.

Ballistic Cavity Simulation using Modified Bresenham Algorithm (개선된 브레즈넘 알고리즘을 이용한 탄흔 시뮬레이션)

  • Yunji Seok;Seongah Chin
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.683-688
    • /
    • 2023
  • Content featuring next-generation weapons is continuously appearing in games and virtual reality. In the context of story development, the traces of a target's bullet marks are observed differently according to the unique characteristics of the rifle and bullet. Additionally, there is an example of using forensic ballistics to investigate crime by examining the traces of bullets. Understanding the relationship between the ballistic coefficient and cavity by ballistics is crucial during this process. This paper proposes a physics-based cavity simulation using the modified Bresenham's line algorithm, which can enhance realism in games and virtual reality. This simulation accurately models the trajectory of bullets and cavity formation upon impact, creating a more realistic representation of how bullets interact with materials. Overall, physics-based simulations can greatly enhance the realism and immersion of games and virtual reality experiences and can have applications in forensic investigations.

A Study on Twitter Crawling Techniques for Tracking Digital Sexual Crimes (디지털 성범죄 추적을 위한 트위터 크롤링 기법 연구)

  • Hyeon-Woo Lee;Su-Bin Lee;Dong-Hwi An;Jiyeon Kim;Chang-Hoon Kim
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.203-205
    • /
    • 2023
  • 소셜미디어 사용이 증가하면서 성 착취물, 불법 촬영물과 같은 디지털 성범죄 또한 확산되는 추세이다. 소셜미디어에서 검색어 차단 정책 등을 통해 디지털 성범죄를 제재하기 위한 노력이 이루어지고 있으나, 은어 및 다양한 변형어를 사용한 우회 검색을 모두 차단하는 것이 어려울 뿐 아니라, 단시간에도 방대한 양의 데이터가 생성되는 소셜미디어 특성상 범죄 관련 게시글을 모두 식별해 내는 것이 현실적으로 불가능하다. 따라서 능동적이고 고도화된 크롤링 기술 개발을 통해 소셜미디어상의 범죄를 실시간 탐지하는 연구가 필요하다. 본 논문에서는 디지털 성범죄 관련 데이터가 빈번하게 관찰되는 트위터를 대상으로 성 착취물 및 불법 촬영물 정보를 수집하기 위한 검색 키워드를 정의하고, 실제 트위터 크롤링을 수행하여 텔레그램, 디스코드, 라인 등과 같은 다른 소셜미디어에 성범죄물이 유포되는 정황을 URL, 코드, 해시태그 추출을 통해 확보하는 수사 기술을 개발한다.

  • PDF

Traffic Accident Type Classification and Characteristic Analysis Research to Develop Autonomous Vehicle Accident Investigation Guidelines Using the National Forensic Service Data Base (국과수 데이터베이스를 활용하여 자율주행차 사고조사 가이드라인 개발을 위한 교통사고 유형 분류 및 특성 분석 연구)

  • Byungdeok In;Dayoung Park;Jongjin Park
    • Journal of Auto-vehicle Safety Association
    • /
    • v.16 no.1
    • /
    • pp.35-41
    • /
    • 2024
  • In order to verify autonomous driving scenarios and safety, a lot of driving and accident data is needed, so various organizations are conducting classification and analysis of traffic accident types. In this study, it was determined that accident recording devices such as EDR (Event Data Recorder) and DSSAD (Data Storage System for Automated Driving) would become an objective standard for analyzing the causes of autonomous vehicle accidents, and traffic accidents that occurred from 2015 to 2020 were analyzed. Using the database system of IGLAD (Initiative for the Global Harmonization of Accident Data), approximately 360 accident data of EDR-equipped vehicles were classified and their characteristics were analyzed by comparing them with accident types of ADAS (Advanced Driver Assistance System)-equipped vehicles. It will be used to develop autonomous vehicle accident investigation guidelines in the future.