• Title/Summary/Keyword: Forensic Procedures

Search Result 35, Processing Time 0.026 seconds

A study of the preparation And procedures by Smartphone Mobile Forensic evidence collection and analysis (스마트폰 모바일 포렌식 증거 수집 분석을 위한 준비사항 및 절차 연구)

  • Lee, Jae-Hyun;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.269-272
    • /
    • 2011
  • The lawsuit is being made on the smart phone. And recent is getting a lot of evidence for the smart phone data in a court of law. Thus, the evidence of illegal use smartphone for the extraction of data and evidence collection, forensic procedure is a need for research. In this paper, evidence of phone forensic procedure for the extraction of the data suggests. And, by collecting forensic evidence from smartphones ensure the integrity of digital evidence and how to solve the case investigated. With this study, smartphone forensic will be able to contribute to the development.

  • PDF

A Study on Forensic Integrity Proof Standard a Cellular Phone Confiscation Criminal Investigation (휴대폰 압수수색 표준절차와 포렌식 무결성 입증)

  • Lee, Gyu-An;Park, Dae-Woo;Shin, Young-Tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.6C
    • /
    • pp.512-519
    • /
    • 2008
  • The proof of a cellular phone used to a crime important data of a criminal investigation and legal judgment become. A lot of on a process use the file format that do not become that is kind of various cellular phones and model pipe, and collect criminal proof, and to analyze be difficult. Also, standardization is not made, and can be adopted on procedures from confiscation search processes regarding a cellular phone to integrity extractions of Forensic data in courts in the confiscation criminal investigation spots. Standardize confiscation search procedures of a cellular phone at these papers. Use a radio waves interception envelope and radio waves interception device for a movement which a security does integrity of criminal on-site cellular phone confiscation search data by standard procedures, and was devoted to. Analyze corroborative facts of a cellular phone seized, and verify integrity, and present problems regarding cellular phone confiscation search procedures and measures, and will contribute in development of Mobile Forensic through integrity damage experiment.

A Study evidence collection and analysis procedures for smartphone forensic (스마트폰 포렌식을 위한 증거수집 및 분석절차 연구)

  • Lee, Jae-Hyun;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.463-466
    • /
    • 2012
  • Smartphones along with the development of crime evidence has been using smartphones. Phone's internal storage medium can be used as evidence in the case of images, video, phone, GPS information, there are Internet access and other data records. Therefore, these data to collect evidence of a systematic procedure for collecting and analyzing evidence is needed. In this paper, the target mobile phone forensics forensic evidence collection, evidence analysis, and reporting results to the procedures and how to draw. Through this paper, phone forensics and will serve as a basis for the investigation.

  • PDF

A Feature Comparison of Modern Digital Forensic Imaging Software (현대 디지털 포렌식 이미징 소프트웨어 도구 특징 비교에 대한 연구)

  • Ham, Jiyoon;James, Joshua I.
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.6
    • /
    • pp.15-20
    • /
    • 2019
  • Fundamental processes in digital forensic investigation - such as disk imaging - were developed when digital investigation was relatively young. As digital forensic processes and procedures matured, these fundamental tools, that are the pillars of the reset of the data processing and analysis phases of an investigation, largely stayed the same. This work is a study of modern digital forensic imaging software tools. Specifically, we will examine the feature sets of modern digital forensic imaging tools, as well as their development and release cycles to understand patterns of fundamental tool development. Based on this survey, we show the weakness in current digital investigation fundamental software development and maintenance over time. We also provide recommendations on how to improve fundamental tools.

An Log Visualization Method of Network Security Equipment for Private Information Security (개인정보 보호를 위한 네트워크 보안장비의 로그 가시화 방법 연구)

  • Sim, Hee-Youn;Kim, Hyung-Jong
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.31-40
    • /
    • 2008
  • Recently, network forensic research which analyzes intrusion-related information for tracing of attackers, has been becoming more popular than disk forensic which analyzes remaining evidences in a system. Analysis and correlation of logs from firewall, IDS(Intrusion Detect System) and web server are important part in network forensic procedures. This work suggests integrated graphical user interface of network forensic for private information leakage detection. This paper shows the necessity of various log information for network forensic and a design of graphical user interface for security managers who need to monitor the leakage of private information.

  • PDF

Method Validation for the Simultaneous Analysis of Organophosphorous Pesticides in Blood by GC/MS (GC/MS를 이용한 혈액 중 유기인제류 농약의 동시 분석에 관한 방법의 유효화)

  • Park Mee Jung;Yang Ja Youl;Kim Ki Wook;Park Yoo Shin;Chung Hee Sun;Lee Sang Ki
    • Environmental Analysis Health and Toxicology
    • /
    • v.20 no.4 s.51
    • /
    • pp.297-302
    • /
    • 2005
  • The purpose of this study was to provide the standard method for the analysis of organophosphorous pesticides such as chlorpyrifos, diazinon, malathion and parathion in blood. We performed method validation for these pesticides in blood according to EURACHEM (A focus For Analytical Chemistry in Europe) guide. For the analysis of the pesticides, we used solid-phase extraction ,column (Waters Oasis $HLB^{(R)}$. After the extraction, the supernatants were evaporated to dryness under the nitrogen stream. They were analyzed by gas chromatography/mass spectrometry (GC/MS) after reconstituting with ethanol. Terbufos was used as an internal standard. To validate this method, we performed verification procedures with the following parameters: selectivity, linearity of calibration, accuracy, precision, limit of detection and quantification. Validation data according to Eurachem guide were adequate for our purpose for the analysis of chlorpyrifos, diazinon, malathion and parathion in blood.

Sensitivity study of the Yfiler® PLUS PCR Amplification Kit in forensic casework samples (법과학 현장시료에서 Yfiler® PLUS PCR Amplification Kit의 민감도 연구)

  • Jung, Ju Yeon;Kim, Kyoung Sook;Park, Sun Wha;Lim, Si Keun;Lee, Dong Sub;Lee, Yang Han
    • Analytical Science and Technology
    • /
    • v.29 no.1
    • /
    • pp.43-48
    • /
    • 2016
  • A variety of Y-STR analysis kits have been developed and used in the forensic field. Prior to the forensic application of a new kit, laboratory validation and sensitivity tests are essential processes in selecting suitable alternatives and for assuring that standard operating procedures are followed. In this paper, we have performed a sensitivity study of a new commercial kit, the Yfiler® PLUS PCR Amplification Kit (Yfiler plus kit, released in 2014) by comparing it with the AmpF/STR® YfilerTM PCR Amplification Kit (Yfiler kit, released in 2004). The Yfiler plus kit includes the 17 Y-STR loci of the Yfiler kit and has been supplemented with 10 new Y-STR loci. First, we analyzed the sensitivity difference between the two kits using commercial control DNA 2800M and 007. In addition, we compared the detection rate between the two kits from the 16 selected forensic casework samples of less than 0.5 ng concentrations. The results show that the sensitivity and detection rate of the Yfiler plus kit are higher than the corresponding rates of the Yfiler kit. In addition, we were able to obtain more Y-STR profiles with the use of the new kit. Thus, we suggest that Yfiler plus kit is a more effective forensic tool to detect Y-STR profiles from forensic casework samples of low concentrations.

Tools for forensic analysis of concrete structures

  • Vecchios, Frank J.;Bentz, Evan C.;Collins, Michael P.
    • Computers and Concrete
    • /
    • v.1 no.1
    • /
    • pp.1-14
    • /
    • 2004
  • Computer-based analysis tools for forensic assessment of reinforced concrete structures are presented. The analysis tools, mostly in the form of nonlinear finite element procedures, are based on the concepts and formulations of the Modified Compression Field Theory. Relevant details regarding their formulation are provided. Development of realistic constitutive models and corroboration of the analysis procedures, through comprehensive experimental programs, are discussed. Also presented are graphics-based pre- and post-processors, which are of significant aid in structural modeling, input of data, and interpretation of analysis results. The details and results of a case study, illustrating the application and value of such analytical tools, are also discussed.

Identification of Food-Poisoning Bacteria (Bacillus cereus) and the Bacterial Toxin Genes for Application to Forensic Microbiology : A Case Report from National Forensic Service (법미생물 검사를 위한 식중독 세균(Bacillus cereus)의 동정 및 독소 유전자 검사법: 국립과학수사연구원 사례보고)

  • Cho, Yoonjung;Lee, Min Ho;Kim, Hyo Sook;Eom, Kiyoon;Kim, Min-Hee;Kim, Jong-Bae;Lee, Dong Sub
    • Journal of Science Criminal Investigation
    • /
    • v.11 no.3
    • /
    • pp.210-217
    • /
    • 2017
  • In the forensic microbiology laboratories, microorganism analyses from food are requested. There have been several cases of Bacillus cereus isolated from the samples requested to the National Forensic Service. B. cereus is an important pathogenic bacterium which can cause food-borne outbreaks. Therefore, we isolated B. cereus from anchovy aekjeot recently requested for microbial examination and identified using MSId based on the 16S rDNA sequence and real-time PCR method. We also conducted PCR for detection of diarrheal toxin genes and an emetic toxin gene and found the presence of nheABC, bceT and entFM diarrheal toxin genes in the B. cereus isolate. There are several clinically important food-poisoning bacteria that should be noted during inspection. In particular, B. cereus can cause food poisoning even when cooked foods are ingested, because B. cereus forms endo-spore which confers strong environmental resistance and heat resistance to the bacteria, and the bacterial emetic toxin also has heat resistance. Here we highlight the importance to distinguish clinically important bacteria such as B. cereus from food specimens, and we expect this study will provide procedures for identification of B. cereus and detection of the bacterial toxin genes for future cases in the forensic microbiology laboratories.

Digital Forensics Investigation Approaches in Mitigating Cybercrimes: A Review

  • Abdullahi Aminu, Kazaure;Aman Jantan;Mohd Najwadi Yusoff
    • Journal of Information Science Theory and Practice
    • /
    • v.11 no.4
    • /
    • pp.14-39
    • /
    • 2023
  • Cybercrime is a significant threat to Internet users, involving crimes committed using computers or computer networks. The landscape of cyberspace presents a complex terrain, making the task of tracing the origins of sensitive data a formidable and often elusive endeavor. However, tracing the source of sensitive data in online cyberspace is critically challenging, and detecting cyber-criminals on the other hand remains a time-consuming process, especially in social networks. Cyber-criminals target individuals for financial gain or to cause harm to their assets, resulting in the loss or theft of millions of user data over the past few decades. Forensic professionals play a vital role in conducting successful investigations and acquiring legally acceptable evidence admissible in court proceedings using modern techniques. This study aims to provide an overview of forensic investigation methods for extracting digital evidence from computer systems and mobile devices to combat persistent cybercrime. It also discusses current cybercrime issues and mitigation procedures.