共查询到20条相似文献,搜索用时 31 毫秒
1.
在信息全球化和科学技术突飞猛进的今天,出现了一大批以电子计算机、互联网、系统软件、通信工程技术为犯罪手段的犯罪活动,而且发展速度逐年加快。侦破此类案件的过程中,大量的相关电子信息被广泛使用。因此,非常必要找出一种能够涵盖整个电子数据现场的取证方法。我国应当借鉴和推广“独立于特定技术和计算机犯罪的抽象取证模式”,加大计算机证据的识别力度。在面对海量的数据,识别是最重要的一个环节,能够将计算机犯罪证据与普通合法的数据区别开来,还要注重数据分析方法的创新,优化原有的数据分析方法,寻找出适合计算机数据分析的新方法。 相似文献
2.
3.
4.
食品药品生产流通领域的信息化在各级食品药品监管部门的应用不断扩大,电子数据在食药监执法中的价值日益突出。由于当前我国行政诉讼领域中电子数据取证规则尚未明确,在行政执法实践中存在操作不够规范的问题。本文旨在探讨在现行法律环境下电子数据在食药监稽查取证环节中需要注意的问题,并提出相应的电子数据的取证规范。 相似文献
5.
随着电子数据技术的飞速发展和广泛应用,电子取证技术已经成为侦查破案、诉讼审判等司法活动中越来越重要的技术手段。苏州市人民检察院电子取证工作从2008年开始进行探索与实践,在全国检察机关起步较早。通过几年的实践,电子取证技术队伍逐步健全,鉴定能力不断提升,实验室多名技术人员获得检察机关电子取证鉴定资格。2011年10年,市院电子取证实验室通过了CNAS国家认可现场评审,电子物证检验鉴定门类通过专家评审在江苏省检察机关为第一家,标志着苏州市检察院司法鉴定实验室进一步迈入科学化、规范化轨道。本文结合几年来的探索实践,分析电子取证的内涵、电子取证的原则和方法以及苏州检察电子取证工作发展的构想。 相似文献
6.
1案例简介某年2月以来,犯罪嫌疑人谢某、刘某等人在我省某市租用了多处廉价房间,利用电脑、手机采用群发虚假短信的方式,骗取受害人钱财,老百姓反映强烈。4月该市刑侦支队联合网技等部门采取统一专项行动,抓获犯罪嫌疑人100余名,缴获银行卡、电话卡、电脑、手机等一大批作案工具和赃款,彻底摧毁了该电信诈骗犯罪集团。通过对扣押的作案工具进行检验发现,该犯罪集团统一采用发送虚假短信方式进行诈骗, 相似文献
7.
电子证据在我国的司法实践中被列为法定证据种类的时间相对较短,我国司法机关对此的取证工作由于缺少实践经验还不成熟不完备,当下无论从立法方面、组织机构、司法人员、取证流程等方面都缺乏合理的规范,这无疑会削弱电子证据的证明力.有鉴于此,完善电子证据取证的相关工作已是迫在眉睫.应着力从立法、司法方面构建良好的运行机制,对预防和打击这方面的犯罪具有重要的影响. 相似文献
8.
随着计算机深入千家万户,成为人们工作和生活不可缺少的一部分之后,计算机犯罪也以网络入侵、网络诈骗、网络盗窃和盗用知识产权等各种形式出现。打击计算机犯罪的关键是如何将犯罪者留在计算机及相关设备中的“电子痕迹”作为有效的诉讼证据提供给法庭,以便将犯罪者绳之以法,成为目前人们研究、关注及迫切解决的技术问题,这即是计算机电子证据取证技术。它是取证技术人员使用软件和工具,全面地检查计算机系统,以提取有关计算机犯罪的电子证据,并对该证据进行的确定、收集、保护、分析、归档以及法庭出示的过程。1电子证据的特点计算机电子… 相似文献
9.
本文综述了对于asp类型网站的电子取证知识及应用技术。分别从ASP网站结构、IIS信息及日志文件的获取、网站文件内容的取证、后台数据库信息的获取几个方面展开进行介绍。 相似文献
10.
11.
12.
How is it that digital investigators are always busy and still never have enough time to actually dig deep into digital evidence? In this paper we will explore the current implementation of the digital forensic process and analyze factors that impact the efficiency of this process. Next we explain how in the Netherlands a Digital Forensics as a Service implementation reduced case backlogs and freed up digital investigators to help detectives better understand the digital material. 相似文献
13.
Globe positioning system (GPS) devices are an increasing importance source of evidence, as more of our devices have built-in GPS capabilities. In this paper, we propose a novel framework to efficiently recover National Marine Electronics Association (NMEA) logs and reconstruct GPS trajectories. Unlike existing approaches that require file system metadata, our proposed algorithm is designed based on the file carving technique without relying on system metadata. By understanding the characteristics and intrinsic structure of trajectory data in NMEA logs, we demonstrate how to pinpoint all data blocks belonging to the NMEA logs from the acquired forensic image of GPS device. Then, a discriminator is presented to determine whether two data blocks can be merged. And based on the discriminator, we design a reassembly algorithm to re-order and merge the obtained data blocks into new logs. In this context, deleted trajectories can be reconstructed by analyzing the recovered logs. Empirical experiments demonstrate that our proposed algorithm performs well when the system metadata is available/unavailable, log files are heavily fragmented, one or more parts of the log files are overwritten, and for different file systems of variable cluster sizes. 相似文献
14.
通过介绍几种常用的电子数据司法鉴定工具的发展概况和特点,并对X—WaysForensics的磁盘快照等功能,在电子数据司法鉴定工作中的应用进行了阐述。 相似文献
15.
随着计算机越来越广泛地应用于国家和社会的各行各业中,软件带来的经济利益不断增多。各种软件不断地开发和应用,随之而来对软件的侵权行为也越来越多,只有完善法律法规,并大力打击侵权行为,才能有效保障软件开发者的利益。如何判断软件侵权行为是保护正版打击盗版的前提条件,这就是侦查和司法鉴定的计算机取证。 相似文献
16.
Nicole R. Odom M.S.F.S. Jesse M. Lindmar B.S. John Hirt B.S. Josh Brunty M.S. 《Journal of forensic sciences》2019,64(6):1673-1686
Wearable devices allow users the ability to leave mobile phones behind while remaining connected to the digital world; however, this creates challenges in the examination, acquisition, identification, and analysis of probative data. This preliminary research aims to provide an enhanced understanding of where sensitive user data and forensic artifacts are stored on smartwatch wearable devices, both through utilization as a connected and standalone device. It also provides a methodology for the forensically sound acquisition of data from a standalone smartwatch wearable device. The results identify significant amounts of data on the Samsung? Gear S3 Frontier, greater than that stored on the companion mobile phone. An Apple Watch® Series 3 manual examination method which produces native screenshots was identified; however, the companion mobile phone was found to store the greatest amount of data. As a result of this research, a data extraction tool for the Samsung? Gear S3 Frontier was created. 相似文献
17.
The big data era has a high impact on forensic data analysis. Work is done in speeding up the processing of large amounts of data and enriching this processing with new techniques. Doing forensics calls for specific design considerations, since the processed data is incredibly sensitive. In this paper we explore the impact of forensic drivers and major design principles like security, privacy and transparency on the design and implementation of a centralized digital forensics service. 相似文献
18.
Eoghan Casey Ph.D. 《Journal of forensic sciences》2018,63(5):1383-1391
This work introduces novel methods for conducting forensic analysis of file allocation traces, collectively called digital stratigraphy. These in‐depth forensic analysis methods can provide insight into the origin, composition, distribution, and time frame of strata within storage media. Using case examples and empirical studies, this paper illuminates the successes, challenges, and limitations of digital stratigraphy. This study also shows how understanding file allocation methods can provide insight into concealment activities and how real‐world computer usage can complicate digital stratigraphy. Furthermore, this work explains how forensic analysts have misinterpreted traces of normal file system behavior as indications of concealment activities. This work raises awareness of the value of taking the overall context into account when analyzing file system traces. This work calls for further research in this area and for forensic tools to provide necessary information for such contextual analysis, such as highlighting mass deletion, mass copying, and potential backdating. 相似文献
19.
得益于虚拟仿真技术的发展,计算机仿真取证目前已在我国悄然兴起,其可以很大程度上弥补传统静态取证证据获取能力之不足,但由于适用环境条件不成熟,仿真取证的司法应用问题一直未能解决。有鉴于此,从技术、法律和程序三个方面分析了仿真取证司法应用过程中亟待解决的问题,同时对仿真取证的法律、技术和程序标准的内容进行了系统构思。 相似文献
20.
微软复合文档结构分析及文件恢复 总被引:1,自引:0,他引:1
本文分析了微软复合文档类型的结构,对于数据恢复中因文件头损坏不能正常打开的情况,可通过分析整个文件结构,合理重构文件头,修复文件。 相似文献