• Title/Summary/Keyword: 수사기관과 정보기관

Search Result 67, Processing Time 0.021 seconds

A Case Study on the Institute of Disaster Causes Investigation (국내외 재난원인조사기관의 전문인력 교육 사례 조사 연구)

  • Park, Nam-Hee;Yeo, Wook-Hyun;Lee, Ji-Soo;Jeong, Gun-Sik
    • Proceedings of the Korean Society of Disaster Information Conference
    • /
    • 2017.11a
    • /
    • pp.372-373
    • /
    • 2017
  • 본 논문에서는 국내외 재난원인조사기관의 전문인력 교육 사례를 조사하여 조사인력의 전문적 역량을 확대하고 인력 수요에 부응할 수 있는 방안을 모색하고자 하였다. 조사자료는 국립과학수사연구원, 안전보건공단, 한국시설안전공단, JNIOSH(일본) 등의 관계자 면접조사를 통해 수집하였다. 조사항목은 사고조사인원의 전문성 정도 및 확보 방안, 사고조사인원의 전문성을 위한 교육 여부/목적/내용/중점 방향/교육체계, 사고조사인원의 관련 자격증, 조사 전문인력의 역량 강화를 위한 전문교육 및 훈련 프로그램 등이다.

  • PDF

Analyzing the Language Usage Characteristics of Korean Dark Web Users (국내 다크웹 사용자들의 언어 사용 특성 분석)

  • Youjin Lee;Dayeon Yim;Yongjae Lee
    • Annual Conference on Human and Language Technology
    • /
    • 2022.10a
    • /
    • pp.397-402
    • /
    • 2022
  • 익명 네트워크 기술에 기반한 다크웹은 일반 표면웹보다 더 강화된 익명성을 제공한다. 최근 이 익명성을 악용하여 다수의 다크웹 사용자들이 다크웹 내에서 범죄 행위를 모의하는 행위가 꾸준히 발생하고 있다. 특히, 국내 다크웹 사용자들은 마약 유포를 위한 방법을 공유하거나 성착취물 유포 행위 등에 직간접적으로 가담하고 있다. 이와 같은 범죄 행위들은 수사 기관의 눈을 피해 현재까지도 계속해서 발생하고 있어 국내 다크웹 범죄 동향 파악의 필요성이 증대되고 있다. 그러나 다크웹 특성상 범죄 행위를 논의하는 게시글을 수집하기가 어렵고, 다크웹 내에서의 언어 사용 특성에 대한 이해 부족으로 그동안 다크웹 사용자들이 어떤 내용의 범죄를 모의하는지 파악하기가 어려웠다. 본 논문에서는 국내 사용자들이 활동하는 다크웹 포럼들을 중심으로 사용자들의 언어 사용 특성을 연구하고, 이를 통해 다크웹에서 다뤄지는 범죄 유형들을 분석한다. 이를 위해, 자연어처리 기반의 분석 방법론을 적용하여 다크웹에서 공유되는 게시글을 수집하고 다크웹 사용자들의 은어와 특정 범죄군에서 선호되는 언어 특성을 파악한다. 특히 현재 다크웹 내에서 사용자들 사이에 관측되는 어휘들에 대한 기술통계 분석과 유의어 관계 분석을 수행하였고, 실제 다크웹 내에서 사용자들이 어떠한 범죄에 관심이 많은지를 분석하였으며, 더 나아가 수사의 효율성을 증대시키기 위한 소셜미디어, URL 인용 빈도에 대한 연구를 진행하였다.

  • PDF

Enabling Environment for Participation in Information Storage Media Export and Digital Evidence Search Process using IPA (정보저장매체 반출 및 디지털 증거탐색 과정에서의 참여권 보장 환경에 대한 중요도-이행도 분석)

  • Yang, Sang Hee;Lee, Choong C.;Yun, Haejung
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.3
    • /
    • pp.129-143
    • /
    • 2018
  • Recently, the use of digital media such as computers and smart devices has been rapidly increasing, The vast and diverse information contained in the warrant of the investigating agency also includes the one irrelevant to the crime. Therefore, when confiscating the information, the basic rights, defense rights and privacy invasion of the person to be seized have been the center of criticism. Although the investigation agency guarantees the right to participate, it does not have specific guidelines, so they are various by the contexts and environments. In this process, the abuse of the participation right is detrimental to the speed and integrity of the investigation, and there is a side effect that the digital evidence might be destroyed by remote initialization. In this study, we conducted surveys of digital evidence analysts across the country based on four domains and thirty measurement items for enabling environment for participation in information storage media export and digital evidence search process. The difference between the level of importance and the performance was analyzed by the IPA matrix based on process, location, people, and technology dimensions. Seven items belonging to "concentrate here" area are one process-related, three location-related, and three people-related items. This study is meaningful to be a basis for establishing the proper policies and strategies for ensuring participation right, as well as for minimizing the side effects.

Expanded Workflow Development for OSINT(Open Source Intelligence)-based Profiling with Timeline (공개정보 기반 타임라인 프로파일링을 위한 확장된 워크플로우 개발)

  • Kwon, Heewon;Jin, Seoyoung;Sim, Minsun;Kwon, Hyemin;Lee, Insoo;Lee, Seunghoon;Kim, Myuhngjoo
    • Journal of Digital Convergence
    • /
    • v.19 no.3
    • /
    • pp.187-194
    • /
    • 2021
  • OSINT(Open Source Intelligence), rapidly increasing on the surface web in various forms, can also be used for criminal investigations by using profiling. This technique has become quite common in foreign investigative agencies such as the United States. On the other hand, in Korea, it is not used a lot, and there is a large deviation in the quantity and quality of information acquired according to the experience and knowledge level of investigator. Unlike Bazzell's most well-known model, we designed a Korean-style OSINT-based profiling technique that considers the Korean web environment and provides timeline information, focusing on the improved workflow. The database schema to improve the efficiency of profiling is also presented. Using this, we can obtain search results that guarantee a certain level of quantity and quality. And it can also be used as a standard training course. To increase the effectiveness and efficiency of criminal investigations using this technique, it is necessary to strengthen the legal basis and to introduce automation technologies.

Blocking and investigation of child pornography using child pornography profiling system of National Police Agency (경찰청 아동음란물프로파일링 시스템을 이용한 아동음란물 차단 및 수사 방안)

  • Lee, Sang Duk
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.97-108
    • /
    • 2018
  • Computer technology and Internet advances enable easy massive file transfer by messenger, email, and web hard service users this means that a child pornography file owner who is illegally possessing itself can quickly transfer that to other users However there are currently no specific ways to prevent or block the distribution of child pornography between messenger, email, and web hard service users. in this paper, we propose a method to prevent the distribution of child pornography using the MD5, SHA-1 hash value stored in the 'police Child pornography Profiling system' and to identify the child pornography suspects using the subscriber information. the user extracts the hash value of the file before distributing the file, compared it with police system, and if it has the same value, blocks the transmission of the file and sends warning to the owner. the service provider sends the subscriber information to investigation agency child pornography owners can conduct a quick and accurate investigation.

On the Transfer of Classified Records of the Special Records Center (특수기록관 비공개기록의 이관에 관한 연구)

  • Kwak, Kun-Hong
    • The Korean Journal of Archival Studies
    • /
    • no.42
    • /
    • pp.327-361
    • /
    • 2014
  • 'Special Records' means the records created by the government power authorities like security, investigation, intelligence agencies. Even after the enactment of the Public Records Act, these kinds of records were out of the control of the National Archives of Korea. The reason was certainly complex including the loss of control power caused by the National Archives' low status, limitation of the legislation and lack of positive measures for the transfer of classified records. But core records of the government power authorities should be transferred to the National Archives for the righteous records culture in the democracy. This paper investigates the problems concerned with the transfer of classified records of the special records center, looking for a practical alternative.

A Study on the Secure Key Escrow System (안전한 키 위탁 시스템에 관한 연구)

  • 채승철
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.2
    • /
    • pp.83-92
    • /
    • 1999
  • Cryptography techniques can prevent eavesdroppers from maliciously intercepting or modifying sensitive information. however misuses of encryption may cause other problems First if the encryption key is lost or damaged even an authorized access to the original data will be denied. Second criminals can prevent authorized law enforcement officers from examining the necessary information by using the strong encrypted data can provide solutions for the situations. In this paper we propose a new key escrow system based on the ElGamal cryptosystem. Our system provide time-bound eavesdropping under court authorized permission protect from trustee's cheating and prevent user's shadow public key generation.

A Study on the Major Country's Domestic Intelligence Operation and Architecture: Focusing on UK, USA, France and Korea (주요 국가의 국내정보 활동 및 조직체계 연구 : 영국·미국·프랑스·우리나라의 국내정보기구를 중심으로)

  • Moon, Kyeong-Hwan
    • Korean Security Journal
    • /
    • no.41
    • /
    • pp.153-183
    • /
    • 2014
  • Nowadays, proactive intelligence activities are required because of enhanced nation wide threats of terrorism and complexity of multidimensional factors of national security. South Korea not only need to draw up plans of information sharing among agencies for more effective national intelligence activities, but also have to evaluate the structure of Domestic Intelligence Agency and its right direction of activities. In this vein, this paper conducts comparative studies of structures and range of activities of intelligence Agencies by reviewing U.K, U.S.A, and France cases and suggests a potential model of 'domestic information specified agency' that we can adopt and methods to share information among agencies. The focus of this paper is on the reviewing of necessity of establishing new 'domestic information specified agency' which will mainly conduct anti-terrorism and counterintelligence activities, and its appropriate form. After reviewing the cases of U.K, U.S.A. and France, we conclude that overcoming the people's distrust about an invasion of freedom and rights caused by centralized and integrated independent intelligence agency is a prerequisite. Disputable issues of FBI, DHS, and South Korea's intelligence agency cases suggest that plans for restoring trust have to be considered if a new 'domestic information specified agency' is established in NIS. If it is established under government ministries such as MSPA focusing on implementing anti-terrorism and counterintelligence activities, organizations such as NCTC, NIC, that can carry out information sharing and cooperating with agencies concerned have to be established. Additionally, measures to solve structural problems caused by carrying out law enforcement functions by domestic information specified agency should be considered.

  • PDF

The Nature of Reform in the U.S., UK, Germany National Intelligence Systems and Implications for Reform of the Korean National Intelligence Service (미국·영국·독일 국가정보체계 개혁 양상과 한국 국가정보원 개혁에 대한 시사점)

  • Yoon, Taeyoung
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.167-177
    • /
    • 2018
  • Major countries, such as the U.S., UK and Germany have reformed their national intelligence systems in the face of transnational, asymmetric and comprehensive threats since September 11, 2001 and have strengthened the intelligence capacity involved in countering terrorism and WMD proliferation, right/left extremism threats. The Korean Moon Jae-in government is preparing a reform plan to eliminate illegal political intervention and abuse of power by the National Intelligence Service(NIS) and to rebuild it as an efficient national intelligence agency for national security. In discussing the reform direction of the NIS, it is necessary to discuss in detail whether adopting a separate model of intelligence agencies to restrict domestic intelligence activities of the NIS and concentrate on foreign intelligence activities or establish new domestic intelligence agencies. Second, as for the issue of transferring anti-Communism investigation authority of the NIS to the police, it needs to be carefully considered in terms of balancing the efficiency and professionalism of intelligence agency activity in the context of North Korea's continuous military provocation, covert operations and cyber threats. Third, it should strive to strengthen the control and supervision functions of the administration and the National Assembly to ensure the political neutrality of the NIS in accordance with the democratization era, to guarantee citizens' basic rights and to improve the transparency of budget execution.

  • PDF

Police Networks for Criminal Intelligence Functions: Based on Informal Social Network Analysis (경찰 범죄정보 수집 활동의 관계망 분석: 비공식적 사회연결망 분석을 중심으로)

  • Choi, Yeong Jin;Yang, Chang Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.1
    • /
    • pp.448-459
    • /
    • 2020
  • Recently, the necessities of gathering, producing, and sharing criminal information are critically important as intelligence functions of police agencies to improving public safety and national security. However, the inadequacies and barriers within which police agencies have in regard to intelligence functions impede criminal information gathering, intelligence producing within their agency, and intelligence sharing with other agencies. In this study, we analyzed informal networks constructed from a survey dataset of information and intelligence sharing among officers in police agencies. The results revealed the different structural properties of intelligence networks between police agencies. We did find that officers with high indegree and outdegree in a network played critical role on the dynamics and degree of intelligence gathering and assessment responsibilities. Finally, we could find evidence that the potential role of intermediary triggered relational dynamics for developing and sharing critical information among all police agencies.