News

Blog

The secret of electronic forensics technology to assist in case detection


In recent years, electronic evidence has been paid more and more attention by the public security department because of its increasing proportion in the actual criminal investigation. On August 16, the 4th China Internet Security Conference (ISC 2016) opened at the Beijing International Convention Center. At the Electronic Forensics Technology and Development Forum on the afternoon of the 17th, well-known experts at home and abroad, such as Li Changyu, an expert in criminal forensics known as contemporary Sherlock Holmes, honorary chairman of the Connecticut Science Consulting Center, and researcher Ding Liping, a leading expert in electronic forensics of the Chinese Academy of Sciences, took turns to give speeches and shared many typical cases of using electronic forensics technology to assist in the detection of cases.

In recent years, electronic evidence has been paid more and more attention by the public security department because of its increasing proportion in the actual criminal investigation. On August 16, the 4th China Internet Security Conference (ISC 2016) opened at the Beijing International Convention Center. At the Electronic Forensics Technology and Development Forum on the afternoon of the 17th, well-known experts at home and abroad, such as Li Changyu, an expert in criminal forensics known as contemporary Sherlock Holmes, honorary chairman of the Connecticut Science Consulting Center, and researcher Ding Liping, a leading expert in electronic forensics of the Chinese Academy of Sciences, took turns to give speeches and shared many typical cases of using electronic forensics technology to assist in the detection of cases.

  Electronic evidence helps detectives crack "three no female corpses" case

On the eve of the forum, Dr. Li Changyu first held a book signing conference. Li Changyu's "Return to the Scene" series of books showed Dr. Li Changyu's involvement in the investigation of President Kennedy's murder, Simpson's murder and so on, including the credit of electronic evidence collection. The sale of books caused a sensation at the scene, and many "Yu rice noodles" queued up to buy books.

Electronic forensics technology to assist in case detection

Dr. Li Changyu was the first to give a speech on the stage. He focused on an example of using electronic forensics technology to detect a headless female corpse: one day, the police received a report and found a headless female corpse in a certain place. What is very cruel is that the female corpse is not only headless, but also all her hands, feet and legs are cut off, which can be called the "three no female corpse" without head, hands and feet ". In subsequent investigations, the police were never able to find the deceased's head and limbs. This makes the identification of the deceased extremely difficult. Headless means that the identity of the deceased cannot be identified by his appearance. And since there are no hands and feet, it is not possible to retrieve the identity of the deceased by fingerprints or foot prints. DNA testing of the deceased also found no matching DNA database information. Then, if, from the perspective of traditional criminal detection, the identity of the deceased cannot be confirmed, the case cannot be detected.

However, first, in the Facebook searching for you, the search for female data whose missing time coincides with the time of death of the deceased and conforms to the specific body hair characteristics was carried out, and then the scope of criminal investigation was narrowed down through the surveillance video of the area near the place where the body was found.

The police also used the email and phone records of the deceased before his death to retrieve all the text messages sent by the deceased within one hour before his death, and finally identified the suspect.

In Li Changyu's view: in the detection of criminal cases in the Internet era, electronic evidence is often the key factor to associate physical evidence with suspects. On the one hand, it can provide more related information and itinerary intelligence clues for case detection, and finally lock the suspect. On the other hand, it can help to find more material evidence that can be recognized by law, and finally form a chain of evidence, so that the suspect can be convicted.

SectionTechnology Development Electronic Forensics into a Case-solving Weapon

In addition to Dr. Li Changyu, Ji Ping, professor of computer science at the doctoral school of the City University of New York, Ding Liping, researcher of the Software Research Institute of the Chinese Academy of Sciences and the first person in electronic forensics in China, Li Xiaoning, security researcher of Intel Laboratory, Yan Ting, CEO of PeerSafe Company, Wu Songyang, deputy director of the Network Security Center of the Third Research Institute of the Ministry of Public Security, Dai Shijian, and Xu Zhiqiang, zhao Yong, deputy general manager of Xiamen Meiya Baike Information Co., Ltd., and other national electronic guests took the stage one after another to share their latest research results and typical cases in electronic forensics.

Among them, Apple's mobile phone is called the safest mobile phone, but it may still become a tool for criminals to cheat. Zhang Xuan, a lecturer at the Cyberspace Security and Law Enforcement Collaborative Innovation Center of Shandong Police College, shared the country's first case of refund fraud using the Apple platform. The suspect Xu received orders publicly on the online shopping platform, pretended to be a player, applied to Apple for a refund for fictitious reasons, and committed dozens of refunds within six months. The public security department also used Xu's electronic data exchanges to crack the case.

Wu Songyang, deputy director of the Network Security Center of the Third Research Institute of the Ministry of Public Security, introduced three methods to crack the lock screen password of iOS devices. It only takes 15 minutes to crack the 4-digit simple password, which is even more stunned.

  Electronic forensics is related to the national economy and people's livelihood

At present, the Internet has been inseparable from the work and life of the people, and cyber crime cases are increasing year by year, showing a high incidence. Electronic evidence is the core evidence in cyber crime cases, which has the characteristics of no trace, variability and unsuitability for preservation. The sharing and narration of the participants will undoubtedly have an important enlightening effect on the subsequent effective use of electronic evidence, standardization of evidence collection operations, determination of search scope, timely seizure of electronic evidence, and data backup. The use of data analysis and mining, on-site and remote data inspection, system reconstruction and investigation experiments, psychological testing, technical evidence review and other means to assist in handling cases will undoubtedly have important enlightenment.

Dai Shijian, a professor at the School of Criminal Justice of China University of Political Science and Law, emphasized in his speech that open big data and electronic data evidence involve all aspects of national management and people's lives, such as economy, medical care, industry, people's livelihood, national defense, production, etc., and must be more related to national security. How to classify data and legislate is a problem that the current legal circle has to face and need to solve.

The 4th China Internet Security Conference was hosted by the Internet Society of China, the China Cyberspace Security Association and the 360 Internet Security Center. With the theme of "Collaborative Linkage to Build a Community of Security Destiny", the conference gathered hundreds of well-known experts in the field of Internet security around the world, including John McAfee, founder of McAfee, John Davis, Networks vice president and chief security officer of Palo Alto, Gordeychik Sergey, director of global security services and deputy chief technology officer of Kaspersky, Davydor Denis, chairman of the Russian Security Internet Alliance, and Li Changyu, a famous criminal forensic expert, chu Chengyun, director of network security strategy at Microsoft's Trusted Computing Department, and Zhou Hongyi, founder of 360, were present to discuss Internet security.

Online Message

Submit Message