• Title/Summary/Keyword: Evidence of illegal collection

Search Result 6, Processing Time 0.022 seconds

Digital forensic framework for illegal footage -Focused On Android Smartphone- (불법 촬영물에 대한 디지털 포렌식 프레임워크 -안드로이드 스마트폰 중심으로-)

  • Kim, Jongman;Lee, Sangjin
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.39-54
    • /
    • 2018
  • Recently, discussions for the eradication of illegal shooting have been carried out in a socially-oriented way. The government has established comprehensive measures to eradicate cyber sexual violence crimes such as illegal shooting. Although the social interest in illegal shooting has increased, the illegal film shooting case is evolving more and more due to the development of information and communication technology. Applications that can hide confused videos are constantly circulating around the market and community sites. As a result, field investigators and professional analysts are experiencing difficulties in collecting and analyzing evidence. In this paper, we propose an evidence collection and analysis framework for illegal shooting cases in order to give practical help to illegal shooting investigation. We also proposed a system that can detect hidden applications, which is one of the main obstacles in evidence collection and analysis. We developed a detection tool to evaluate the effectiveness of the proposed system and confirmed the feasibility and scalability of the system through experiments using commercially available concealed apps.

A Study on the Improvement of the Malware Evidence Collection Module Based On Windows (윈도우 기반 악성코드 증거 수집 모듈 개선에 관한 연구)

  • Heo, Geon-Il;Park, Chan-Uk;Park, Won-Hyung;Kuk, Kwang-Ho
    • Convergence Security Journal
    • /
    • v.10 no.3
    • /
    • pp.61-68
    • /
    • 2010
  • Recently a malware is increasing for leaking personal data, credit information, financial information, etc. The secondary damage is also rapidly increasing such as the illegal use of stolen name, financial fraud, etc. But when a system is infected by a malware of leaking information, the existing malware evidence collection tools do not provide evidences conveniently or sometimes cannot provide necessary evidences. So security officials have much difficulty in responding to malwares. This paper analyzes the current status and problems of the existing malware evidence collection tools and suggests new ways to improve those problems.

A study of the preparation And procedures by Smartphone Mobile Forensic evidence collection and analysis (스마트폰 모바일 포렌식 증거 수집 분석을 위한 준비사항 및 절차 연구)

  • Lee, Jae-Hyun;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.269-272
    • /
    • 2011
  • The lawsuit is being made on the smart phone. And recent is getting a lot of evidence for the smart phone data in a court of law. Thus, the evidence of illegal use smartphone for the extraction of data and evidence collection, forensic procedure is a need for research. In this paper, evidence of phone forensic procedure for the extraction of the data suggests. And, by collecting forensic evidence from smartphones ensure the integrity of digital evidence and how to solve the case investigated. With this study, smartphone forensic will be able to contribute to the development.

  • PDF

A Blocking Distribution Channels to Prevent Illegal Leakage in Supply Chain using Digital Forensic

  • HWANG, Jin-Hee
    • Journal of Distribution Science
    • /
    • v.20 no.7
    • /
    • pp.107-117
    • /
    • 2022
  • Purpose: The scope of forensic investigations serves to identify malicious activities, including leakage of crucial corporate information. The investigations also identify security lapses in available networks. The purpose of the present study is to explore how to block distribution channels to protect illegal leakage in supply chain through digital forensic method. Research design, data and methodology: The present study conducted the qualitative textual analysis and its data collection process entails five steps: identifying and collecting data, determining coding categories, coding the content, checking validity and reliability, and analyzing and presenting the results. This methodology is a significant research method due to its high quality of previous resources. Results: Applying previous literature analysis to the results of this study, the author figured out that there are four solutions as an evidences to block distribution channels, preventing illegal leakage regarding company information. The following subtitles show clear solutions: (1) Communicate with Stakeholders, (2) Preventing and addressing illegal leakage, (3) Victims of Data Breach, (4) Focusing Solely on Technical Teams. Conclusion: There are difficult scenarios that continue to introduce difficult questions surrounding engagement with digital evidence. Consequently, it is important to enhance data handling to provide answers for organizations that suffer due to illegal leakages of sensitive information.

A study on procedures of search and seize in digital data

  • Kim, Woon Go
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.2
    • /
    • pp.133-139
    • /
    • 2017
  • Today, the activities of individuals and corporations are dependent not only on digital technology but also on the future of society, which is referred to as the fourth industrial revolution. Since the traces that arise from the crimes that occur in the digital society are also inevitably developed into a society that should be found in the digital, the judicial dependence of judging by the digital evidence is inevitably increased in the criminal procedure. On the other hand, considering the fact that many users are using virtual shared computing resources of service providers considering the fact that they are being converted into a cloud computing environment system, searching for evidence in cloud computing resources is not related to crime. The possibility of infringing on the basic rights of the criminal procedure is increased, so that the ability of evidence of digital data which can be used in the criminal procedure is limited. Therefore, considering these two aspects of digital evidence, this point should be fully taken into account in judging the evidence ability in the post-seizure warrant issuance and execution stage as well as the pre-emptive control. There is a view that dictionary control is useless, but it needs to be done with lenient control in order to materialize post-modern control through judging ability of evidence. In other words, more efforts are needed than ever before, including legislation to ensure proper criminal procedures in line with the digital age.

A Study on the Development of a Platform for the Prevention of Digital Sexual Crimes in the Virtual-Reality Metaverse (가상현실 메타버스 디지털 성범죄 예방을 위한 플랫폼 구축 제안 연구)

  • Jae-Won, Hwang;Jung-Heum, Park;Sang-Jin, Lee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.6
    • /
    • pp.1157-1166
    • /
    • 2022
  • With the advent of the non-face-to-face era, a new type of digital sexual crime with avatars is emerging on the Metaverse virtual reality platform. Due to the lack of clearly established in legal and regulatory systems, it is challenging to punish offenders and acquire digital proof for sexual crimes using these avatars. This research aims to suggest a service and technological solution is development platform that may assist crime prevention and the collection of digital evidence, with a particular emphasis on digital sex crimes that occur in the metaverse, a virtual reality realm. This study explores the reasons behind the difficulty of legal application in the metaverse and then determines the types of digital sex crimes that may occur in the metaverse. In addition, it is suggested what service components the metaverse should contain from the stage of construction and design, can be utilized what element of metaverse in order to prevent illegal activity of avatars.