• Title/Summary/Keyword: search and seizure

Search Result 25, Processing Time 0.024 seconds

E-mail Header-Based Search and Seizure for Internet Portal Digital Forensics (포털 전자메일 압수수색을 위한 메일헤더기반 디지털포렌식)

  • Lee, Hae-Jin;Shon, Tae-Shik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1129-1140
    • /
    • 2018
  • In accordance with the spread of the Internet and the development of various digital devices, the amount of electronic information is rapidly increasing. Selection of electronic information seizure searches continues to increase for third parties, such as portal sites e-mails that persons do not possess directly from the electronic information, and it is also used as evidence in court. However, the current method of searching for houses has many problems such as the absence of notice of seizure search result, seizure searches are proceeded indiscriminately against whole e-mail after calculating only during the seizure period, and seizure search procedure And presented the improvement points.

A Study on the Procedure, Method of Search and Seizure for HIS (Hospital Information System) (의료정보시스템의 압수수색 절차와 방법에 대한 연구)

  • Kim, Taehoon;Lee, Sangjin
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.83-96
    • /
    • 2018
  • Electronic medical records in the hospital information system are the important evidence related to the crime and are subject to search and seizure. In the case of a large general hospital, it is possible to search for seizures through cooperation of the staff, but it is impossible in small hospitals. The investigation agency copies the database of electronic medical records and then selects relevant content. This approach has an issue of excessive search and seizure. In this paper, we propose field selection procedures and methods for electronic medical records while ensuring integrity, reproducibility, and chain of custody. Currently, it is necessary to study the procedures and methods of search and seizure of medical information system so that it can respond to next changing cloud hospital information system.

The problem point and improvement program of the scene search and seizure of digital evidence at practical affairs (실무상 디지털증거의 현장압수수색 문제점과 개선방안)

  • Kim, Yong-Ho;Lee, Daesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.11
    • /
    • pp.2595-2601
    • /
    • 2013
  • Currently, under being related with confiscation method of digital store medium from the court of justice, "the sorting confiscation method of principle, the exceptional medium confiscation method" from in section3 no.106 of the criminal procedure code disregard the actual fields of investigation. What is more, there are many difficulties to execute cases by observing this for the achievement of confiscation purpose. At this point, I present the problems of the present confiscation search method and the desirable scene confiscation search method and the improvement program under the new technology circumstance.

A Study on the Search and Seizure of Digital Evidence (디지털 증거의 압수·수색에 관한 연구)

  • Lee, Ga Yun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2014.07a
    • /
    • pp.139-141
    • /
    • 2014
  • IT산업의 발전에 따른 IT기기의 사용이 우리의 일상에서 없어서는 안되는 존재로 자리잡음으로써 우리의 생활의 편리함과 풍요로움을 가져다준 동시에 수많은 범죄에 악용되면서 위험에 노출되어져 있기도 하다. 이러한 범죄가 증가함에 따라 기존에 우리가 접하던 유형물 형태의 증거에서 무형의 디지털 증거가 급격히 늘어났고 형사소송법의 영역에서 매우 중요한 자리를 차지하게 되었으나 아직까지 미비한 부분들이 많고 구체적인 확립이 되지 않은 실정이기에 디지털 증거의 압수 수색에 대한 문제점을 간략히 알아보고 그에 대한 개선방안을 알아보려 한다.

  • PDF

A Study on the Providing the Integrity of Digital Evidence while Deleting the irrelevant File (디지털 이미지 증거에서 사건과 무관한 파일 삭제시 무결성 제공 방안 연구)

  • Kim, TaeKyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.4
    • /
    • pp.111-116
    • /
    • 2019
  • The digital forensic analysis ensures the integrity of confiscated data by calculating hash values for seizure and search of digital evidence and receiving confirmation and signature from participants. However, evidence that is irrelevant to the alleged offense needs to be deleted even after seizure from the point of view of privacy. But the hash value is altered by deleting the irrelevant data from the image file, one will not be able to prove that the file is in the initial state when it was seized. Therefore, in this paper, a study was conducted to support the integrity of the digital evidence, even if some of the seized digital evidence was deleted or damaged during the seizure search. The hash value of each data is calculated and hash value of the combination of hash values are also calculated. Even if the unrelated evidence is deleted from the seized evidence regardless of file system such as FAT or NTFS, the suggested method presented a way to provide the integrity that proves there is no change in the evidence file.

Effects of Ukgansan (Yokukansan in Japanese, Yigansan in chinese) on the Locomotor Velocity and Glutamate-Induce Paroxysm in Planarian (Planarian 모델을 이용한 억간산의 항발작 효과)

  • Park, Woong;Yoo, Du Man;So, June No
    • KSBB Journal
    • /
    • v.29 no.1
    • /
    • pp.67-71
    • /
    • 2014
  • Planaria were recently reported to be a simple and sensitive model to investigate the mechanistic aspect of seizure and to screen potential anticonvulsants. Using planarian model, we analyzed the pharmacological effect of ukgansan (UGS), an oriental herbal medicine containing seven medicinal herbs, on the planarian locomotor velocity (pLMV) and glutamate-induced seizure-like activity (pSLA). To test whether D. japonica is suitable for studying anti-seizure agents, we investigated the effect of glutamate on pLMV and pSLA in D. japonica. In the present study we first confirmed that pSLA in D. japonica was induced by L-glutamate. Glutamate significantly produced pSLA in a dose dependent manner, but did not affect pLMV. These glutamate-induced paroxysms were decreased by antiepileptic drug, topiramate. A similar inhibitory effect on glutamate-induced pSLA was observed after the treatment of UGS. The present results suggest that UGS and its active constituents possess useful substance inhibiting seizure in planarian and that D. japonica provides a convenient model to search active herbs containing anti-seizure activity.

The Limited Investigation of the Cyber-police and the Reinforcement of its Investigative Ability (사이버경찰의 수사한계와 수사력 강화방안)

  • Choi, Eung-Ryul;Hwang, Young-Gu
    • Korean Security Journal
    • /
    • no.8
    • /
    • pp.379-407
    • /
    • 2004
  • The cyber-crime is one of the results occurring from the increased dependency toward information-telecommunication devices. Currently, the Korean National Police Agency and many other related law enforcement agencies have made efforts to respond against the cyber-crimes. However, the number of cyber-crime is increasing steadily. The worse problem is that the arresting rate for the cyber-crime has been decreased than before. The reasons of decreasing arresting rate come from many different kinds of cyber-crime methods with the developed computer and network technology, Also, the easy concealment of the cyber-crime by the violater and the difficulty of specification against the data objected to search and seizure make the crackdown difficult. The other difficulties come from the lack of professionally trained investigators, the lack of high-technological investigation devices, and the failure of the technology development for the search and seizure of evidences because of the budget deficit. That is to say, these phenomenon show the comprehensive problem of the cyber-police system. Accordingly, to respond against newly changed cyber-crime activities and to investigate effectively, the cyber-police has to take consideration into the professional reorganization of the cyber-police, the development of the investigation technology, and the adjustment of current cyber-crime laws. Most importantly, the cyber-police needs the high-technological investigation devices, the development of the investigation methods, and the training for the professional human resources with the enough budget support.J

  • PDF

A Study on the Seizure and Search Problems of Smart Phone Digital Evidence and Improvement measures (스마트폰 디지털증거의 압수·수색 문제점과 개선방안)

  • Yoon, Hyun-Seok
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.187-188
    • /
    • 2020
  • 형사소송법 제106조에서 '범위를 정하여 출력 또는 복제하는 방법이 불가능하거나 압수의 목적을 달성하기에 현저히 곤란하다고 인정되는 때에는 정보저장매체 등을 압수할 수 있다'의 규정과 제122조에서 '급속을 요하는 때'의 예외 규정을 근거로 스마트폰 압수·수색과정에서 범죄혐의와 관련성에 대한 구분 없이 정보가 무분별하게 탐색 복제되는 등 기본권을 침해하고 있으며, 영장주의 원칙에 반하는 위법한 집행이 되고 있는 실정이다. 이에 본 연구에서는 긴급압수 후 사후영장 발부 전에 별건의 범죄혐의를 확인하거나 증거로 활용한다면 위법한 압수에 해당할 수 있는 디지털증거 압수·수색 원칙의 문제, 디지털정보의 검색과 추출과정에서 참여권 보장의 문제, 스마트폰 정보에 대한 무결성 확보 등을 문제점으로 도출하였다. 이러한 문제점을 개선하기 위해 사전영장 없는 범죄사실과 관련성이 없는 정보의 탐색이나 추출 금지, 정보검색이나 추출과정에서 피압수자의 참여권 보장 및 디지털증거 분야 전문가로부터 조력을 받을 권리 보장, 무결성 확보를 위한 절차적·실체적 적법절차 준수 등 개선방안을 제시하였다.

  • PDF

Forensic Evidence of Search and Seized Android and Windows Mobile Smart Phone (압수 수색된 안드로이드와 윈도우모바일 스마트폰의 포렌식 증거 자료)

  • Yoon, Kyung-Bae;Chun, Woo-Sung;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.2
    • /
    • pp.323-331
    • /
    • 2013
  • There are three ways how to extract forensic evidence from mobile phone, such as SYN, JTAG, Revolving. However, it should be a different way to extract forensic evidence due to the differences of their usage and technology between them(mobile phone and smart phone). Therefore, in this paper, I will come up with extraction method that forensics evidence by search and seizure of a smart phone. This study aims to analyze specifications and O.S., backup analysis, evidence in smart to analyze for search and seizure of a smart phone commonly used google android and windows mobile smart phone. This study also aim to extract forensics evidence related to google android and phone book, SMS, photos, video of window mobile smart phone to make legal evidence and forensics report. It is expected that this study on smart phone forensics technology will contribute to developing mobile forensics technology.

Smart Phone Copyright Violation and Forensic Apply Method (Smart Phone 저작권 위반과 포렌식 적용 방안)

  • Yi, Jeong-Hoon;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.11
    • /
    • pp.2491-2496
    • /
    • 2010
  • Smart Phone with domestic demand increasing rapidly, the utilization of multimedia services have become diverse. Smart Phone users use the copyrighted multimedia contents illegally from hacking their Smart Phone with Jail Breaking and Rooting. Legal issues according to the Korea-U.S. FTA. and high relevance with crime as mobile communication terminal, the utilization of created and saved digital evidence is high, the mobile forensic evidence study is required. This paper studied method and notice of legal seizure and search assuming the Smart Phone copyright violation. Research the status of Smart Phone copyright violation and related violation by category as broadcasting, movies, music, e-book etc. Research the method of submit a report to the court by applying techniques to forensic. The results of this research will contribute to the provide of Smart Phone crime evidence and mobile forensic technology.