共查询到17条相似文献,搜索用时 62 毫秒
1.
2.
系统鉴定法检验可疑文件真伪1例 总被引:1,自引:1,他引:0
1案例资料 1.1简要案情 2004年,临江某木业公司持一份该公司与长春市某家具有限公司签定的关于还款与质量处理协议,起诉至法院,要求家具有限公司偿还拖欠的货款。家具有限公司对《协议》的真伪产生疑义,提请鉴定。法院将此协议送我单位鉴定。 相似文献
3.
利用邮件头分析电子邮件的真伪 总被引:3,自引:0,他引:3
目的通过分析电子邮件头,鉴别电子邮件的真伪,为电子邮件的真实性鉴定提供一些技术方法。方法运用邮件头的关键字段的构建机制对电子邮件的邮件头进行分析处理。结果示例邮件的邮件头的多处关键字段按照邮件传递时间和邮件传递地址的分析,不符合正常规律,系伪造的电子邮件。结论利用邮件头分析电子邮件不仅为确保电子邮件证据的证据效力提供了强有力的支持,也为获取破案的线索提供了条件。 相似文献
4.
6.
7.
8.
9.
作为物证鉴定技术的文件检验,其根本目的是揭露案件事实真相,为打击犯罪和维护公民的合法权益提供法律保障。但在实际检案中有时会遇到这种情况:如果按照委托单位的鉴定要求进行检验,得出的鉴定结论却恰恰与案件事实相反,作者在检案中就遇到这种情况,举例如下:1998年7月5日,黄山市徽州公安分局刑警大队送来一份共4页的打印合同,最后一页有双方的签名和印章,要求鉴定签名印章的真伪。通过检验,很快认定签名及印章均为真实。但根据案情反映这份合同疑点很大,于是对该4页合同进行全面分析,结果发现前3页文件的打印机与第… 相似文献
10.
11.
The undertaking of e-mail investigations was previously limited mainly to law enforcement agencies. However, UK organisations are increasingly undertaking e-mail investigation activities for incidents such as fraud, accessing or distributing indecent images and harassment amongst others. Organisations are also increasingly using computer forensic analysts to search through e-mail archives in order to gather evidence relating to e-mail misuse. In this paper we examine the legal aspects of UK corporate e-mail investigations. 相似文献
12.
Denis Trček Ph.D. Habtamu Abie Ph.D. Åsmund Skomedal Ph.D. Iztok Starc B.Sc. 《Journal of forensic sciences》2010,55(6):1471-1480
Abstract: Recent trends in global networks are leading toward service‐oriented architectures and sensor networks. On one hand of the spectrum, this means deployment of services from numerous providers to form new service composites, and on the other hand this means emergence of Internet of things. Both these kinds belong to a plethora of realms and can be deployed in many ways, which will pose serious problems in cases of abuse. Consequently, both trends increase the need for new approaches to digital forensics that would furnish admissible evidence for litigation. Because technology alone is clearly not sufficient, it has to be adequately supported by appropriate investigative procedures, which have yet become a subject of an international consensus. This paper therefore provides appropriate a holistic framework to foster an internationally agreed upon approach in digital forensics along with necessary improvements. It is based on a top‐down approach, starting with legal, continuing with organizational, and ending with technical issues. More precisely, the paper presents a new architectural technological solution that addresses the core forensic principles at its roots. It deploys so‐called leveled message authentication codes and digital signatures to provide data integrity in a way that significantly eases forensic investigations into attacked systems in their operational state. Further, using a top‐down approach a conceptual framework for forensics readiness is given, which provides levels of abstraction and procedural guides embellished with a process model that allow investigators perform routine investigations, without becoming overwhelmed by low‐level details. As low‐level details should not be left out, the framework is further evaluated to include these details to allow organizations to configure their systems for proactive collection and preservation of potential digital evidence in a structured manner. The main reason behind this approach is to stimulate efforts on an internationally agreed “template legislation,” similarly to model law in the area of electronic commerce, which would enable harmonized national implementations in the area of digital forensics. 相似文献
13.
D.C. Paul J. Taylor Henry Mwiki Ali Dehghantanha Alex Akibini Kim Kwang Raymond Choo Mohammad Hammoudeh Reza Parizi 《Science & justice》2019,59(3):337-348
Minecraft, a Massively Multiplayer Online Game (MMOG), has reportedly millions of players from different age groups worldwide. With Minecraft being so popular, particularly with younger audiences, it is no surprise that the interactive nature of Minecraft has facilitated the commission of criminal activities such as denial of service attacks against gamers, cyberbullying, swatting, sexual communication, and online child grooming. In this research, there is a simulated scenario of a typical Minecraft setting, using a Linux Ubuntu 16.04.3 machine (acting as the MMOG server) and Windows client devices running Minecraft. Server and client devices are then examined to reveal the type and extent of evidential artefacts that can be extracted. 相似文献
14.
Video file format standards define only a limited number of mandatory features and leave room for interpretation. Design decisions of device manufacturers and software vendors are thus a fruitful resource for forensic video authentication. This paper explores AVI and MP4-like video streams of mobile phones and digital cameras in detail. We use customized parsers to extract all file format structures of videos from overall 19 digital camera models, 14 mobile phone models, and 6 video editing toolboxes. We report considerable differences in the choice of container formats, audio and video compression algorithms, acquisition parameters, and internal file structure. In combination, such characteristics can help to authenticate digital video files in forensic settings by distinguishing between original and post-processed videos, verifying the purported source of a file, or identifying the true acquisition device model or the processing software used for video processing. 相似文献
15.
16.
司法鉴定技术准入标准问题研究 总被引:1,自引:0,他引:1
司法鉴定科学的发展史表明,鉴定科学的产生是以一般科学技术的发展为前提的,司法鉴定科学的发展也是以一般科学技术的发展为条件的。没有自然科学、技术科学的飞速发展,现代司法鉴定技术也不能得到真正的发展。而司法鉴定中所应用的科学技术必须是稳定成熟并已被证实为科学的,才能被吸纳。然而,由于我国司法鉴定制度的不完善, 相似文献
17.
With professional and home Internet users becoming increasingly concerned with data protection and privacy, the privacy afforded by popular cloud file synchronisation services, such as Dropbox, OneDrive and Google Drive, is coming under scrutiny in the press. A number of these services have recently been reported as sharing information with governmental security agencies without warrants. BitTorrent Sync is seen as an alternative by many and has gathered over two million users by December 2013 (doubling since the previous month). The service is completely decentralised, offers much of the same synchronisation functionality of cloud powered services and utilises encryption for data transmission (and optionally for remote storage). The importance of understanding BitTorrent Sync and its resulting digital investigative implications for law enforcement and forensic investigators will be paramount to future investigations. This paper outlines the client application, its detected network traffic and identifies artefacts that may be of value as evidence for future digital investigations. 相似文献