• Title/Summary/Keyword: Collecting evidence

Search Result 92, Processing Time 0.021 seconds

Possible Health Risk Over Talc (탈크노출과 건강상의 위험)

  • Park, Dong-Uk
    • Journal of Environmental Health Sciences
    • /
    • v.35 no.3
    • /
    • pp.235-238
    • /
    • 2009
  • In Korea, talc that has been widely used for a lot of consumer products as well as industrial usage until recently was found to be contaminated with asbestos. It becomes a major social issue. Critical health risk about both talc and talc contaminated with asbestos was summarized through literature review. It has been confirmed that talc can pose ovarian cancer when talc powder is used in the genital area. International Agency for Research on Cancer (IARC) already concluded that the perineal use of cosmetic talc can cause possibly carcinogenic to humane(Group 2B), although there was study reporting the lack of a consistent an established correlation between perineal dusting frequency and ovarian tissue talc concentrations and the lack of a consistent dose-response relationship with ovarian cancer risk. The association between talc exposure and ovarian cancer is as strong as in recent studies. The epidemiological studies to date provided inadequate evidence for the carcinogenicity of either inhaled or ingested talc that does not contain asbestos or asbestosiform fibers. Future studies should focus on seeking evidence in talc-exposed populations, collecting reliable information on age at initial used of body powder, exposure assessments related to talc use and dose response relationship in order to identify possible risk of talc ingested or inhaled.

A Study of Memory Information Collection and Analysis in a view of Digital Forensic in Window System (윈도우 시스템에서 디지털 포렌식 관점의 메모리 정보 수집 및 분석 방법에 관한 고찰)

  • Lee Seok-Hee;Kim Hyun-Sang;Lim JongIn;Lee SangJin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.1
    • /
    • pp.87-96
    • /
    • 2006
  • In this paper, we examine general digital evidence collection process which is according to RFC3227 document[l], and establish specific steps for memory information collection. Besides, we include memory dump process to existing digital evidence collection process, and examine privacy information through dumping real user's memory and collecting pagefile which is part of virtual memory system. Especially, we discovered sensitive data which is like password and userID that exist in the half of pagefiles. Moreover, we suggest each analysis technique and computer forensic process for memory information and virtual memory.

A New Design and Implementation of Digital Evidence Container for Triage and Effective Investigation (디지털 증거 선별 조사의 효율성을 위한 Digital Evidence Container 설계 및 구현)

  • Lim, Kyung-Soo;Lee, Chang-Hoon;Lee, Sang-In
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.4
    • /
    • pp.31-41
    • /
    • 2012
  • The law enforcement agencies in the worldwide are confiscating or retaining computer systems involved in a crime/civil case, if there are any, at the preliminary investigation stage, even though the case does not involve a cyber-crime. They are collecting digital evidences from the suspects's systems and using them in the essential investigation procedure. It requires much time, though, to collect, duplicate and analyze disk images in general crime cases, especially in cases in which rapid response must be taken such as kidnapping and murder cases. The enterprise forensics, moreover, it is impossible to acquire and duplicate hard disk drives in mass storage server, database server and cloud environments. Therefore, it is efficient and effective to selectively collect only traces of the behavior of the user activities on operating systems or particular files in focus of triage investigation. On the other hand, if we acquire essential digital evidences from target computer, it is not forensically sound to collect just files. We need to use standard digital evidence container from various sources to prove integrity and probative of evidence. In this article, we describe a new digital evidence container, we called Xebeg, which is easily able to preserve collected digital evidences selectively for using general technology such as XML and PKZIP compression technology, which is satisfied with generality, integrity, unification, scalability and security.

An Efficient Method of Forensics Evidence Collection at the Time of Infringement Occurrence (호스트 침해 발생 시점에서의 효율적 Forensics 증거 자료 수집 방안)

  • Choi Yoon-Ho;Park Jong-Ho;Kim Sang-Kon;Kang Yu;Choe Jin-Gi;Moon Ho-Gun;Rhee Myung-Su;Seo Seung-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.4
    • /
    • pp.69-81
    • /
    • 2006
  • The Computer Forensics is a research area that finds the malicious users by collecting and analyzing the intrusion or infringement evidence of computer crimes such as hacking. Many researches about Computer Forensics have been done so far. But those researches have focussed on how to collect the forensic evidence for both analysis and poofs after receiving the intrusion or infringement reports of hosts from computer users or network administrators. In this paper, we describe how to collect the forensic evidence of good quality from observable and protective hosts at the time of infringement occurrence by malicious users. By correlating the event logs of Intrusion Detection Systems(IDSes) and hosts with the configuration information of hosts periodically, we calculate the value of infringement severity that implies the real infringement possibility of the hosts. Based on this severity value, we selectively collect the evidence for proofs at the time of infringement occurrence. As a result, we show that we can minimize the information damage of the evidence for both analysis and proofs, and reduce the amount of data which are used to analyze the degree of infringement severity.

Digital forensic framework for illegal footage -Focused On Android Smartphone- (불법 촬영물에 대한 디지털 포렌식 프레임워크 -안드로이드 스마트폰 중심으로-)

  • Kim, Jongman;Lee, Sangjin
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.39-54
    • /
    • 2018
  • Recently, discussions for the eradication of illegal shooting have been carried out in a socially-oriented way. The government has established comprehensive measures to eradicate cyber sexual violence crimes such as illegal shooting. Although the social interest in illegal shooting has increased, the illegal film shooting case is evolving more and more due to the development of information and communication technology. Applications that can hide confused videos are constantly circulating around the market and community sites. As a result, field investigators and professional analysts are experiencing difficulties in collecting and analyzing evidence. In this paper, we propose an evidence collection and analysis framework for illegal shooting cases in order to give practical help to illegal shooting investigation. We also proposed a system that can detect hidden applications, which is one of the main obstacles in evidence collection and analysis. We developed a detection tool to evaluate the effectiveness of the proposed system and confirmed the feasibility and scalability of the system through experiments using commercially available concealed apps.

Research on Advanced Methods for Data Extraction from Corrupted OOXML Files (손상된 OOXML 파일에서의 데이터 추출 고도화 방안 연구)

  • Jiyun Kim;Minsoo Kim;Woobeen Park;Doowon Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.193-206
    • /
    • 2024
  • In tandem with the advancements in the digital era, the significance of digital data has escalated, necessitating an increased focus on digital forensics investigations. However, the process of collecting and analyzing digital evidence faces significant challenges, such as the unidentifiability of damaged files due to issues like media corruption and anti-forensic techniques. Moreover, the technological limitations of existing tools hinder the recovery of damaged files, posing difficulties in the evidence collection process. This paper aims to propose solutions for the recovery of corrupted MS Office files commonly used in digital data creation. To achieve this, we analyze the structure of MS Office files in the OOXML format and present a novel approach to overcome the limitations of current recovery tools. Through these efforts, we aim to contribute to enhancing the quality of evidence collection in the field of digital forensics by efficiently recovering and identifying damaged data.

Development of Evidence Analysis Tool based on Active Data for Digital Forensics (디지털 포렌식을 위한 활성데이터 기반 증거분석도구 개발)

  • Lee, Jun-Yeon
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.99-104
    • /
    • 2012
  • The digital forensics are new kinds of security that investigate and verificate fact relation about activities based on digital data. In this paper, we implemented digital forensic tool that can be used in collecting, analyzing, and reporting evidences. This tool support intuitional GUI that everybody can analyze easily. And a simple operation can collect and analyze active data. Also, we can decrease much time and endeavor by using this forensic tool that support reliable data.

Development of Clinical Practice Guideline for Hwabyung (2) - Tools for Development - (화병 임상진료지침 개발 연구 (2) - 지침 개발에 활용되는 도구 -)

  • Chung, Sun-Yong;Kim, Jong-Woo
    • Journal of Oriental Neuropsychiatry
    • /
    • v.20 no.2
    • /
    • pp.153-162
    • /
    • 2009
  • Objectives : The approach to Hwabyung from all angles is needed to develop the clinical practice guideline. To achieve this approach, various tools should be used practically and systematically. Methods : We gather the tools based on multi aspects of Hwabyung's characteristics. The tools will be used to each steps of clinical practice guideline development. Results : For the clinical practice guideline, there should be applied many kinds of tools, such as for decision and assesment, survey with oriental medicine property, collecting individual stress information, mental and psychological trait, and related or following disease. Conclusions : Application of many objective tools provides the evidence-based medical approaches for development of clinical practice guideline for Hwabyung.

  • PDF

DSM-IV Diagnostic Criteria for Anxiety Disorder: Discriminant Validity (현재 불안 장애의 분류 : 타당한가?)

  • Yu Bum-Hee;Lee In-Soo
    • Anxiety and mood
    • /
    • v.1 no.1
    • /
    • pp.18-24
    • /
    • 2005
  • The Diagnostic and Statistical Manual 4th edition (DSM-IV) has been widely accepted and used for international classification of mental disorder. The DSM has been changed to improve diagnostic reliability and validity through descriptive and categorical approaches which was undertaken atheoretically. The authors reviewed current studies about the DSM-IV classification system and the diagnostic issues of representative categories of anxiety disorder. The authors concluded that the anxiety disorder classification system in DSM-IV has limitations such as a lack of empirical consideration for overlapping features of anxiety disorders and a lack of discriminant validity. To improve diagnostic validity and revise the current DSM-IV classification system, the authors suggested 1) more longitudinal studies for collecting empirical evidence, 2) decreasing the dependence upon operational criteria, 3) deceasing diagnostic boundary blurring, 4) developing disease specific biological diagnostic techniques and 5) continued collaboration between the DSM and International Classification of Diseases (ICD) systems.

  • PDF

Historical Study of "Wuqinxi" as a Medical Exercise (화타오금희(華陀五禽戱)의 의사학적 고찰 및 현대적 활용가능성)

  • Rhee, Jae-June;Lee, Jong-Soo
    • Journal of Korean Medicine Rehabilitation
    • /
    • v.25 no.4
    • /
    • pp.65-74
    • /
    • 2015
  • Objectives The purpose of this study is to describe the origin of Wuqinxi and transition to various forms. Also evaluating the feasibility of Wuqinxi as a modern medical exercise. Methods For collecting data, various documents came from China, Taiwan, and Korea. Also we searched Pubmed, KISS, NDSL and National assembly library using "Wuqinxi (오금희)" for clinical trials. Results In this study, Chinese Wuqinxi can be divided into 10 forms, 15 forms, 18 forms, 20 forms, 30 forms and 40 forms while Taiwanese Wuqinxi can be divided into classic form (125 forms) and short form (84 forms). Also we found some evidence that Wuqinxi played a certain role for health promotion. Conclusions These days Wuqinxi has a 8 different major forms and some of the exercises can be used as a preventive medical exercise to promote health for people.