• Title/Summary/Keyword: 증거물

Search Result 77, Processing Time 0.025 seconds

Development Comparative Experiments of Blood Prints Enhancement Reagent (Fuchsin Acid, Eosin-Y, Acid Yellow 7) (배경에 따른 혈문증강 시약(Fuchsin Acid, Eosin-Y, Acid Yellow 7) 적용의 현출도 비교실험)

  • Kim, A-Ram;Kim, Woo-Joong;Jung, Hey-Young
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.6
    • /
    • pp.194-201
    • /
    • 2013
  • In serious crimes, bloody fingerprints are crucial evidence that make links between suspects and victims. There have been many studies related to bloody fingerprints for a long time. There are many comparative studies for effectiveness of Acid Fuchsin and Acid Yellow 7, but nothing about Eosin-Y in this country. Acid Fuchsin is a useful reagent that has unique red color distinguishing from light colored background. but it is useless on dark surfaces. In order to make it visible, we should use BVDA Gel lifters. On the contrary this, Acid Yellow 7 makes stronger fluorescence on a dark background. In this study, we got the conclusion that Eosin-Y is more useful than the others not only on dark background but also light background.

A Comparative study on the Effectiveness of Bloodstain Enhancing Reagents for the Development of Bloody Prints on the Cadaver Skin (혈흔 증강시약들의 시체피부 혈액지문에 대한 효과성 비교)

  • Mim, Dong-Ki;Kim, Da-Ye;Kim, Seung-Gap;Lee, Ga-Eul;Lee, Eun-Hye;Yu, Je-Seol
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.6
    • /
    • pp.474-480
    • /
    • 2016
  • Bloody fingerprints are important in many cases - especially in murder case. This study compared effectiveness of some reagents which had better quality of developing bloody fingerprints from human skin. Leuco crystal violet(LCV), hungarian red, amido black, coomassie blue, acid violet17, and crowle's double stain were used. Fingerprints were generated in the depletion series, and tissue method was used in applying all reagents. LCV showed the best result in this study.

A Study on the Maritime Police Investigation Training for Improvement Maritime Crime Investigation Competency (해양범죄의 수사역량 강화를 위한 해양경찰 수사교육전문화에 관한 연구)

  • Kim, Jae-Woon
    • Journal of Digital Convergence
    • /
    • v.12 no.6
    • /
    • pp.35-42
    • /
    • 2014
  • In Korea, all investigations of maritime crime such as murder, robbery, drug trafficking, and illegal fishing that have been committed at sea are under the jurisdiction of maritime police. As maritime crimes tend to have more unique cases, cause damage on a larger scale, and be limited to evidence that is possibly contaminated, compared to non-maritime crimes, the cases demand maritime police investigators with a higher level of expertise. However, there is currently a lack of competent investigators in the maritime police, leading to the training of maritime police investigators in training agencies. so many of maritime investigators goes to land police training agency including Korean Police Investigation Academy. Therefore, in order to improve the capabilities of maritime crime investigation we must first gather information and data in relation to maritime crimes to foster more investigation specialists, and establish specialized training agencies offering a training course more focused on maritime crimes.

Digital Image as Scientific Evidence: A Theoretical Inquiry of the Roles of Digital Technologies in Visualizing Risk (과학적 증거물로서 디지털 이미지: 위험의 시각화에서 디지털 영상기술의 역할과 위치)

  • Kim, Soo-Chul
    • Korean journal of communication and information
    • /
    • v.54
    • /
    • pp.98-117
    • /
    • 2011
  • This paper is a theoretical inquiry of the changing roles of digital technologies in the representation of risk. Critically examining existing perspectives on risk society and risk communication, this paper argues that digital technologies and images in risk communication have been relatively understudied. Having said that, this paper suggests that Actor-network Theory provide useful theoretical tools for current studies on how digital technologies affect contemporary risk communication practices. Furthermore, this paper examines varied recent studies investigating how digital technologies of visualization are at play in risk communication practices. In doing so, this paper demonstrates how digital images and technologies interrupt the processes that scientific evidence is presented and facts are constructed in varied contemporary scientific reasoning. It will focus on the emerging mode of seeing and visual regime made possible by the increased usage of digital image and technologies, which are characterized by networked connection, sensor, computerized algorithm, and increased storage space. Finally this paper will discuss on the implications on future studies on the roles of digital images and technologies in risk communication practices in Korean context.

  • PDF

The study of bloody fingerprint enhancement on paper with chemical reagents (화학시약들을 이용한 지류에서 혈흔지문 증강에 관한 연구)

  • Lim, Seung;Kim, Im-Soon;Noh, Jong-Yun;Kim, Sang-Il;Yu, Je-Sul
    • Analytical Science and Technology
    • /
    • v.25 no.5
    • /
    • pp.284-291
    • /
    • 2012
  • Bloody fingerprint is a very important evidence. In this study, we confirmed the enhancement effects of ninhydrin, leucocrystal violet (LCV), fuchsin acid, iodine and dimethylaminocinnamaldehyde (DMAC) on bloody fingerprints which were deposited on paper. Bloody fingerprint were deposited on paper sequentially and used after drying at room temperature. If a ridge of bloody fingerprint was clear, ninhydrin and LCV was the most effective but was not good for invisible ridge. Fuchsin acid reagent dyed paper surface so that the contrast of enhanced bloody fingerprint was decreased. Although bloody fingerprint was enhanced with iodine reagent, but the developed color was very weak after reaction. We thought that the enhancement effect of iodine to bloody fingerprint was negligible. Also, the enhancement effect of DMAC reagent to relatively clear bloody fingerprint was not good. However, it was very effective to faint or invisible ridge. By washing with methanol, contrast of enhanced bloody fingerprint was increased.

Animal species identification by co-amplification of hypervariable region 1 (HV1) and cytochrome b in mitochondrial DNA

  • Lim, Si Keun;Park, Ki Won
    • Analytical Science and Technology
    • /
    • v.18 no.3
    • /
    • pp.257-262
    • /
    • 2005
  • Mitochondrial DNA (mt DNA) sequence analysis has been a useful tool for species identification of animals and human individuals. Two hypervariable regions (HV1 and HV2) in control region of mitochondrial genome were analyzed for human individual identification. In case of animal species identification, several genes on mt DNA such as cytochrome b (cytb), RNAs, cytochrome oxidases (CO) were used. In this study, co-amplification of HV1 and cytb was carried out in order to check the contamination of animal DNA and to verify the human DNA. The primer sets used in PCR were H15997/L16236 for HV1 and H14724/L15149 for cytb. PCR products for HV1 and cytb were 239 bp and 425 bp, respectively. The appearance of two bands on agarose gel implied the DNA came from human, however the single band of cytb gene represented the non-human animal DNA.

Study on MalangMalang Talkafe Database Encryption Process and Recovering Its Deleted Messages on Windows (윈도우에서의 말랑말랑 톡카페 데이터베이스 암호화 프로세스 분석 및 삭제된 메시지 복구 연구)

  • Youn, Byungchul;Kim, Soram;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.397-403
    • /
    • 2020
  • With the convenience of real-time conversation, multimedia file and contact sharing services, most people use instant messenger, and its usage time is increasing. Because the messengers contain a lot of user behavior information data, in the digital forensic investigation, they can be very useful evidence to identify user behavior. However, some of useful data can be difficult to acquire or recognize because they are encrypted or deleted. Thus, in order to use the messenger data as evidence, the study of message decryption process and message recovery is essential. In this paper, we analyze the database encryption process of the instant messenger, MalangMalang Talkafe, and propose the method to decrypt it. In addition, we propose the methods to identify the deleted messages and recover from the volatile memory area.

Study for Tracing Zombie PCS and Botnet Using an Email Spam Trap (이메일 스팸트랩을 이용한 좀비 PC 및 봇넷 추적 방안연구)

  • Jeong, Hyun-Cheol;Kim, Huy-Kang;Lee, Sang-Jin;Oh, Joo-Hyung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.101-115
    • /
    • 2011
  • A botnet is a huge network of hacked zombie PCs. Recognizing the fact that the majority of email spam is sent out by botnets, a system that is capable of detecting botnets and zombie PCS will be designed in this study by analyzing email spam. In this study, spam data collected in "an email spam trail system", Korea's national spam collection system, were used for analysis. In this study, we classified the spam groups by the URLs or attached files, and we measured how much the group has the characteristics of botnet and how much the IPs have the characteristics of zombie PC. Through the simulation result in this study, we could extract 16,030 zombie suspected PCs for one hours and it was verified that email spam can provide considerably useful information in tracing zombie PCs.

Analysis of anti-forensic trends and research on countermeasuresucation (안티 포렌식 동향 분석 및 대응 방안 연구)

  • Han Hyundong;Cho Young Jun;Cho Jae Yeon;Kim Se On;Han Wan Seop;Choi Yong Jun;Lee Jeong Hun;Kim Min Su
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.97-107
    • /
    • 2023
  • With the popularization of digital devices in the era of the 4th industrial revolution and the increase in cyber crimes targeting them, the importance of securing digital data evidence is emerging. However, the difficulty in securing digital data evidence is due to the use of anti-forensic techniques that increase analysis time or make it impossible, such as manipulation, deletion, and obfuscation of digital data. Such anti-forensic is defined as a series of actions to damage and block evidence in terms of digital forensics, and is classified into data destruction, data encryption, data concealment, and data tampering as anti-forensic techniques. Therefore, in this study, anti-forensic techniques are categorized into data concealment and deletion (obfuscation and encryption), investigate and analyze recent research trends, and suggest future anti-forensic research directions.

A Study on Characteristics and Techniques that Affect Data Integrity for Digital Forensic on Flash Memory-Based Storage Devices (플래시 메모리 기반 저장장치에서 디지털 포렌식을 위한 데이터 무결성에 영향을 주는 특성 및 기술 연구)

  • Hyun-Seob Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.3
    • /
    • pp.7-12
    • /
    • 2023
  • One of the most important characteristics of digital forensics is integrity. Integrity means that the data has not been tampered with. If evidence is collected during digital forensic and later tampered with, it cannot be used as evidence. With analog evidence, it's easy to see if it's been tampered with, for example, by taking a picture of it. However, the data on the storage media, or digital evidence, is invisible, so it is difficult to tell if it has been tampered with. Therefore, hash values are used to prove that the evidence data has not been tampered with during the process of collecting evidence and submitting it to the court. The hash value is collected from the stored data during the evidence collection phase. However, due to the internal behavior of NAND flash memory, the physical data shape may change over time from the acquisition phase. In this paper, we study the characteristics and techniques of flash memory that can cause the physical shape of flash memory to change even if no intentional data corruption is attempted.