• Title/Summary/Keyword: 증거수집

Search Result 275, Processing Time 0.022 seconds

Study of an Efficient Method for Securing Evidence During the Fire Investigation (화재조사 시 증거물의 효율적인 확보 방안에 관한 연구)

  • Ye, Su-Jo;Choi, Don-Mook
    • Fire Science and Engineering
    • /
    • v.30 no.6
    • /
    • pp.43-47
    • /
    • 2016
  • The recent changes in the judicial system in South Korea, including the stronger trial-centrism and legal market opening, have made fire investigations seek more scientific evidence and structure. The collection of physical evidence is very important to prove the substantial truth of a fire at the court. Without the appropriate physical proof, the credibility of a fire investigation is lost as evidence in a court. Therefore, the fire investigation team needs to carefully handle the fire site and fire initiation evidence because evidence of a fire incident can be destroyed easily by chemical and physical damage. In addition, the fire investigation team also needs to carefully record the collections of any evidence including pictures and their analysis. This study proposed the needs of the procedure manual and guidelines that can provide a step-by-step process of fire investigations in South Korea. This study also helps fire investigation agencies to secure fire-scene evidence to distinctly investigate the facts of fire. The guidelines and manual can eventually improve the ways for the fire investigation processes in South Korea.

e-Forensic Tool Research for Obtaining Legal Evidence Ability of Digital Evidence by Intelligence Inspection (디지털 증거물의 법적능력 확보를 위한 정보감사용 e-Forensic 툴 연구)

  • Kim, Seungyong;Kim, Gyeongyong;Hwang, Incheol;Kim, Dongsik
    • Journal of the Society of Disaster Information
    • /
    • v.13 no.2
    • /
    • pp.267-275
    • /
    • 2017
  • This research is about the development of e-forensic tool that extract & analyze different forms of digital evidence that individuals come across in a disaster scene. The tool utilizes digital forensic techniques which makes the tool efficient in any disaster analysis situation. In order for the forensic evidence to be selected as legal evidence, the evidence needs to be proven that it is in its original state with no forgery involved. This is where the e-forensic tool comes in, as its ability to collect digital evidence during investigation has proven; that the tool can keep the evidence in its original state and increase the integrity by generating hash TAG and adding the forensic evidence to a password encoded file.

Development of Fingerprints Deposited on Papers Found at a Fire Scene (열에 노출된 종이에 유류된 잠재지문 현출에 관한 연구)

  • Kim, Chae-Won;Kim, Yeon-Ji;Seo, Youn-Hee;Yu, Je-Seol
    • Fire Science and Engineering
    • /
    • v.32 no.3
    • /
    • pp.88-94
    • /
    • 2018
  • Fingerprints deposited on paper found at a fire scene are important evidence for determining a suspect's identity. On the other hand, because the temperature at the fire scene is very high, there are many difficulties in developing fingerprints. This study compared the effectiveness of ninhydrin, DFO, and silver nitrate to develop fingerprints deposited on paper exposed to high temperatures. Using a dry heat press, heat was applied to the paper at $200^{\circ}C$ for various times. Silver nitrate was found to be superior to the others under all conditions. Ninhydrin developed fingerprints weakly compared to DFO and silver nitrate. In addition, the sensitivity of DFO decreased with increasing exposure time. Therefore, it is recommended silver nitrate be used to develop fingerprints deposited on paper found at a fire scene.

Dual-purpose Reagent for Separating Paper with Tape and Developing Fingerprints on the Paper Simultaneously (종이에 부착된 테이프를 박리하는 동시에 지문을 현출하는 이중목적시약(dual-purpose)에 관한 연구)

  • Seo, Youn-Hee;Kim, Yeon-Ji;Shin, Min-Seop;Yu, Je-Seol
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.1
    • /
    • pp.463-471
    • /
    • 2019
  • Tapes are usually used in violent crimes and may contain important evidence. Separating adhesive side should be preceded to collect these evidence. In this study, we researched a novel dual-purpose reagent that can separate the tape without damaging and develop the fingerprints on porous surface when the tape is attached to A4 paper. As a result, the reagent of 1:2 ratio of 1,2-IND stock solution and HFE-7100 can separate without damaging the adhesive surface and develop fingerprints on separated A4 paper.

Privacy Protection and Non-repudiation Mechanisms for Parcel Service (프라이버시 보호 및 부인방지를 제공하는 택배 시스템 제안)

  • Choi, Min Seok;Cho, Kwantae;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1283-1292
    • /
    • 2012
  • As delivery services market has grown the damage cases are also continuously increased. When using delivery services, Customers would not be compensated in any way. Perhaps worse, losing a cargo would create a great deal of trouble. Because the lack of evidence, they takes a lot of time to clarify who is responsible. To prevent these things, we must create, collect, maintain and confirm. In this paper, we introduce new delivery system with a trusted third party for non-repudiation services. Moreover, in damage case, we show that the proposed system is efficient and provide non-repudiation. Using sending and receiving codes, the proposed system identifies a responsible subject with quickness and clearness.

Windows Artifacts Analysis for Collecting Cryptocurrency Mining Evidence (암호화폐 채굴 증거 수집을 위한 윈도우 아티팩트 분석 기술 연구)

  • Si-Hyeon Park;Seong-Hun Han;Won-hyung Park
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.121-127
    • /
    • 2022
  • Recently, social issues related to cryptocurrency mining are continuously occurring at the same time as cryptocurrency prices are rapidly increasing. In particular, since cryptocurrency can be acquired through cryptographic operation, anyone with a computer can easily try mining, and as the asset value of major cryptocurrencies such as Bitcoin and Ethereum in creases, public interest is increasing. In addition, the number of cases where individuals who own high-spec computers mine cryptocurrencies in various places such as homes and businesses are increasing. Some miners are mining at companies or public places, not at home, due to the heat problem of computers that consume a lot of electrical energy, causing various problems in companies as well as personal moral problems. Therefore, this study studies the technology to obtain evidence for the traces of mining attempts using the Windows artifacts of the computers that mined cryptocurrency. Through this, it is expected that it can be used for internal audit to strengthen corporate security.

A Study on the remote acuisition of HejHome Air Cloud artifacts (스마트 홈 헤이 홈 Air의 클라우드 아티팩트 원격 수집 방안 연구)

  • Kim, Ju-eun;Seo, Seung-hee;Cha, Hae-seong;Kim, Yeok;Lee, Chang-hoon
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.69-78
    • /
    • 2022
  • As the use of Internet of Things (IoT) devices has expanded, digital forensics coverage of the National Police Agency has expanded to smart home areas. Accordingly, most of the existing studies conducted to acquire smart home platform data were mainly conducted to analyze local data of mobile devices and analyze network perspectives. However, meaningful data for evidence analysis is mainly stored on cloud storage on smart home platforms. Therefore, in this paper, we study how to acquire stored in the cloud in a Hey Home Air environment by extracting accessToken of user accounts through a cookie database of browsers such as Microsoft Edge, Google Chrome, Mozilia Firefox, and Opera, which are recorded on a PC when users use the Hey Home app-based "Hey Home Square" service. In this paper, the it was configured with smart temperature and humidity sensors, smart door sensors, and smart motion sensors, and artifacts such as temperature and humidity data by date and place, device list used, and motion detection records were collected. Information such as temperature and humidity at the time of the incident can be seen from the results of the artifact analysis and can be used in the forensic investigation process. In addition, the cloud data acquisition method using OpenAPI proposed in this paper excludes the possibility of modulation during the data collection process and uses the API method, so it follows the principle of integrity and reproducibility, which are the principles of digital forensics.

Digital Forensics Framework for Cloud Computing (클라우드 환경을 고려한 디지털 포렌식 프레임워크)

  • Lee, Chang-Hoon
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.1
    • /
    • pp.63-68
    • /
    • 2013
  • Recently, companies seek a way to overcome their financial crisis by reducing costs in the field of IT. In such a circumstance, cloud computing is rapidly emerging as an optimal solution to the crisis. Even in a digital forensic investigation, whether users of an investigated system have used a cloud service is a very important factor in selecting additional investigated subjects. When a user has used cloud services, such as Daum Cloud and Google Docs, it is possible to connect to the could service from a remote place by acquiring the user's log-in information. In such a case, evidence data should be collected from the remote place for an efficient digital forensic investigation, and it is needed to conduct research on the collection and analysis of data from various kinds of cloud services. Thus, this study suggested a digital forensic framework considering cloud environments by investigating collection and analysis techniques for each cloud service.

Android Log Cat Systems Research for Privacy (개인정보보호를 위한 안드로이드 로그캣 시스템 연구)

  • Jang, Hae-Sook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.11
    • /
    • pp.101-105
    • /
    • 2012
  • Various social problems through violating personal information and privacy are growing with the rapid spread of smartphones. For this reason, variety of researches and technology developments to protect personal information being made. The smartphone, contains almost all of the personal information, can cause data spill at any time. Collecting or analyzing evidence is not an easy job with forensic analyzing tool. Android forensics research has been focused on techniques to collect and analyze data from non-volatile memory but research for volatile data is very slight. Android log is the non-volatile data that can be collected by volatile storage. It is enough to use as a material to track the usage of the Android phone because all of the recent driven records from system to application are stored. In this paper, we propose a method to respond to determining the existence of personal information leakage by filtering logs without forensic analysis tools.

A Case Study on Scientific Inquiry and Argumentative Communication in Earth Science MBL Classes (지구과학 MBL 수업의 과학 탐구와 논의적 의사소통에 관한 사례 연구)

  • Oh, Jin-Ah;Lee, Sun-Kyung;Kim, Chan-Jong
    • Journal of the Korean earth science society
    • /
    • v.29 no.2
    • /
    • pp.189-203
    • /
    • 2008
  • Microcomputer Based Laboratory (MBL), by offering accurate and effective data collection and real-time graphs, enables students to reduce experiment time and, thereby, have deeper discussions concerning experimental results. This helps to emphasis the essential aspect of scientific inquiry; the process communication. Therefore, this study examined secondary school earth science MBL lessons with regards to the five basic aspects of scientific inquiry: "Asking", "Evidencing", "Explaining", "Evaluating" and "Communicating". It then investigated the level of argumentative communication between the students and teachers and also among the students themselves. For this study, three classroom activities were observed and videotaped, and teaching materials, textbooks and students' notes were collected. The transcribed data were analyzed from the perspective of scientific inquiry level and argument frames. The results showed that the scientific inquiry levels of the three classes were similar, except for the "Communicating" aspect, which appeared in only one episode. "Asking" was carried out by the teacher and then students were directed to collect certain data in the "Evidencing" stage. Furthermore, students were given possible ways to use evidence to formulate explanations and connections through the "Explaining" and "Evaluating" stages. In the argumentation analysis, most argumentative communication was identified as being associated with a given procedure, rather than with any scientific phenomena. In only one episode, did "Communicating" relate directly to any scientific phenomena. It can be concluded, that although MEL places emphasis on communication for authentic scientific inquiry, the environment required for such inquiry and argumentative communication can not be easily created in the classroom. Therefore, in order for authentic inquiry to take place in the MBL classroom, teachers should provide students with the opportunity to develop meaningful argumentation and scaffolding abilities.