• Title/Summary/Keyword: 수사기관과 정보기관

Search Result 67, Processing Time 0.026 seconds

Base Location Prediction Algorithm of Serial Crimes based on the Spatio-Temporal Analysis (시공간 분석 기반 연쇄 범죄 거점 위치 예측 알고리즘)

  • Hong, Dong-Suk;Kim, Joung-Joon;Kang, Hong-Koo;Lee, Ki-Young;Seo, Jong-Soo;Han, Ki-Joon
    • Journal of Korea Spatial Information System Society
    • /
    • v.10 no.2
    • /
    • pp.63-79
    • /
    • 2008
  • With the recent development of advanced GIS and complex spatial analysis technologies, the more sophisticated technologies are being required to support the advanced knowledge for solving geographical or spatial problems in various decision support systems. In addition, necessity for research on scientific crime investigation and forensic science is increasing particularly at law enforcement agencies and investigation institutions for efficient investigation and the prevention of crimes. There are active researches on geographic profiling to predict the base location such as criminals' residence by analyzing the spatial patterns of serial crimes. However, as previous researches on geographic profiling use simply statistical methods for spatial pattern analysis and do not apply a variety of spatial and temporal analysis technologies on serial crimes, they have the low prediction accuracy. Therefore, this paper identifies the typology the spatio-temporal patterns of serial crimes according to spatial distribution of crime sites and temporal distribution on occurrence of crimes and proposes STA-BLP(Spatio-Temporal Analysis based Base Location Prediction) algorithm which predicts the base location of serial crimes more accurately based on the patterns. STA-BLP improves the prediction accuracy by considering of the anisotropic pattern of serial crimes committed by criminals who prefer specific directions on a crime trip and the learning effect of criminals through repeated movement along the same route. In addition, it can predict base location more accurately in the serial crimes from multiple bases with the local prediction for some crime sites included in a cluster and the global prediction for all crime sites. Through a variety of experiments, we proved the superiority of the STA-BLP by comparing it with previous algorithms in terms of prediction accuracy.

  • PDF

A Study on the Characteristics and Progress of New Voice Phishing Based on Psychological Descriptions (심리적 기재를 기반으로 한 신종 보이스피싱의 특성 및 진행과정에 관한 연구)

  • SeiYouen Oh;HyeJin Song
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.3
    • /
    • pp.510-518
    • /
    • 2023
  • Purpose: This study compares and analyzes the characteristics and progress of existing voice phishing and new voice phishing to present a basic policy plan to prepare countermeasures against new voice phishing based on psychological descriptions. Method: The criminal progress and characteristics of the two were compared and analyzed through damage cases on various portal sites centered on voice phishing crime scenarios. Result: As a result of analyzing the progress of the third stage of new voice phishing, the scenario of new voice phishing that can deceive victims was written more carefully and the scope of the crime was expanded. In the crime execution stage, the victim was socially isolated, reducing the victim's judgment ability, making it more difficult for investigative agencies to investigate, and in the final stage, the continuity and expansion of criminal damage such as extortion of money and valuables are shown. Conclusion: There were differences in the target and scope of the crime and the method of the crime strategy between the two, and the possibility of damage is much greater, so a more efficient response strategy should be prepared.

A Design of Traceable and Privacy-Preserving Authentication in Vehicular Networks (VANET 환경에서 프라이버시를 보호하면서 사고 발생 시 추적 가능한 인증 프로토콜)

  • Kim, Sung-Hoon;Kim, Bum-Han;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.115-124
    • /
    • 2008
  • In vehicular networks, vehicles should be able to authenticate each other to securely communicate with network-based infrastructure, and their locations and identifiers should not be exposed from the communication messages. however, when an accident occurs, the investigating authorities have to trace down its origin. As vehicles communicate not only with RSUs(Road Side Units) but also with other vehicles, it is important to minimize the number of communication flows among the vehicles while the communication satisfies the several security properties such as anonymity, authenticity, and traceability. In our paper, when the mutual authentication protocol is working between vehicles and RSUs, the protocol offers the traceability with privacy protection using pseudonym and MAC (Message Authentication Code) chain. And also by using MAC-chain as one-time pseudonyms, our protocol does not need a separate way to manage pseudonyms.

A Study on the Appropriate Management of Maritime Police Authority in Korea Coast Guard: Focusing on the Japan Coast Guard (해양경비안전본부의 해양경찰권 적정 운영방안에 관한 연구: -일본 해상보안청과의 비교를 중심으로-)

  • Son, Yeong-Tae
    • Korean Security Journal
    • /
    • no.42
    • /
    • pp.361-391
    • /
    • 2015
  • Regarding the [Government Organization Act; which is legislated on 19th November, 2014] Korea Coast Guard(KCG) has been re-organized and belong from Korea Coast Guard shall be established under the Minister of Oceans and Fisheries to Ministry of Public Safety and Security. Furthermore, National Police Agency(NPA) Commissioner has the right for administer duties concerning investigation and information by succession from Korea Coast Guard Commissioner. That means that main rule has been moved from prior KCG to Ministry of Public Safety and Security(MPSS) and NPA currently which is dual structure. Meanwhile, This kind of organization change has been effective to investigative agency which exert KCG's call of duty and causes needs of variety problems. In other words, There are quite huge changes such as KCG's reduction of their work, call of duty and re-organization regarding revised government organization act. However this change - including re-organization by government, was not able to take current MPSS's special features such as organization specialty and legal rights. It means, the current change has not been taken present law system CRIMINAL PROCEDURE LAW and there was no preparation to stable maritime police authority action as well. To sum up, this revised GOVERNMENT ORGANIZATION ACT is supposed to provide total, quick security service by establishing strong disasters and safety control tower. However they only contains few area such as organization revision regarding 'Sewol Ferry Disaster', they was not able to contain the other parts of Society. Therefore, in this article I would like to check the part of re-evaluation of current change made by KCC's organization revision. It is supposed to provide better legal stability by making clear of work area by government agencies who acts maritime police authority.

  • PDF

A study on The Private Investigator usage for Enterprise Security Activity: Focusing on countermeasure to the Industrial Spy (민간조사원(탐정)을 활용한 기업보안활동의 강화방안: 산업 스파이에 대한 대응방안을 중심으로)

  • Sin, Sung-Gyun;Park, Sang-Jin
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.199-228
    • /
    • 2009
  • National security of post cold-war since 1990's shift that conception of the national security transfer traditional military strength to economic strength. Accordingly, the national interest about how to protect the of the high-technology industry enterprises has become contentious social issue. The U.S. and advanced countries promote the policy to protect The United State's Economic Espionage Act(EEA). The Korea reaching to high level a field at IT, Shipbuilding, Steel, Automobile Industry and huge capital investment to high-technology & development. But, systematic industry security activity not an unfold. So private investigator collect the evidence and information of business case for prevent danger is efficient. The private investigator system, deal with the matter efficiently, will good system to prevent economic loss of business, state and nation through make a good use in business crime that machinery of law difficult to intervene. This article countermeasure about industry spy through make a good use of private investigator.

  • PDF

A Study on the Industrial Security Policies in Germany (독일의 산업보안 정책과 시사점)

  • Lee, Sung-Yong
    • Korean Security Journal
    • /
    • no.38
    • /
    • pp.57-82
    • /
    • 2014
  • The purpose of this paper is to introduce the industrial security policies in Germany and to look for the implication for the development of korean industrial security. Due to highly developed economy and industrial technology, Germany has become the main stage for the industrial espionage for a long time. In Germany industrial espionage is classified into two categories; Economy-espionage and Competition-espionage. While economy-espionage is related to the Espionage of foreign intelligence agencies, Competition-espionage means the act of espionage, that is implemented by the private sector. When it comes to economy-espionage, prevention of economy-espionage is the duty of the State, because it threat the national interest. Otherwise, the private sector has to take the responsibility of prevention of competition-espionage. It goes without saying that, the state has to investigate the crime, when espionage happens. But Prevention is more important than investigation in this regard. For the realization of Public-Private-Partnership, the private sector should be the genuine counterpart of the Public through the sharing responsibility of industrial-espionage prevention. Another talking point this paper suggest, is the national ethic in connection with economy-espionage. The State could be not only a actor of espionage prevention, but also a perpetrator. The economy-espionage for the purpose of national interest would not be justified, unless it has nothing to do with national security.

  • PDF

A Study of Network Forensics related to Internet Criminal at UCC (UCC와 관련된 인터넷 범죄에 대한 네트워크 포렌식 연구)

  • Lee, Gyu-An;Park, Dea-Woo;Shin, Young-Tae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.2
    • /
    • pp.143-151
    • /
    • 2008
  • 74% of Internet users use the UCC, and You Tube using firearms in a crime occurred. Internet crime occurred in the online, non-face transaction, anonymous, encapsulation. In this paper, we are studied a Network Forensic Way and a technique analyze an aspect criminal the Internet haying appeared at Internet UCC, and to chase. Study ID, IP back-tracking and position chase through corroborative facts collections of the UCC which used UCC search way study of the police and a public prosecutor and storage way and network forensic related to crimes of Internet UCC. Proof data encrypt, and store, and study through approach control and user authentication so that they are adopted to legal proof data through integrity verification after transmission and storages. This research via the Internet and criminal conspiracy to block the advance promotion, and for the criminal investigative agencies of the Internet will contribute to the advancement forensics research.

  • PDF

A Legislative Proposal to Prevent the Infringement of Privacy and to Solve Operational Problems by Drones (드론에 의한 프라이버시 침해 방지 및 운용 상 문제 해결을 위한 입법 제안)

  • Kim, Yongho;Rhee, Kyung-Hyune
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1141-1147
    • /
    • 2017
  • An unmanned aerial vehicle(UAV), commonly known as a drone, is an aircraft without a human pilot aboard, which is operated by wireless device. A drone provides the capability for the aerial search and traffic control as a police equipment. It has benefits for the missions for the aerial photography with the high resolution camera which can replace eye-dependent search processes. Moreover it has advantage of retrieving several times for the recorded videos. However, if the law enforcement agency misuse and overuse a drone for investigations and search missions without certain regulations and principles, it breaches privacy and personal information infringement. In this paper, we issue a lawful challenges on drone operations and discuss solutions to those challenges.

A Privacy Preserving Efficient Route Tracing Mechanism for VANET (VANET에서 프라이버시를 보호하는 효율적인 경로 추적 방법)

  • Lee, Byeong-Woo;Kim, Sang-Jin;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.53-62
    • /
    • 2010
  • In VANETs (Vehicular Ad hoc NETwork), conditional anonymity must be provided to protect privacy of vehicles while enabling authorities to identify misbehaving vehicles. To this end, previous systems provide a mechanism to revoke the anonymity of individual messages. In VANET, if we can trace the movement path of vehicles, it can be useful in determining the liability of vehicles in car accidents and crime investigations. Although route tracing can be provided using previous message revocation techniques, they violate privacy of other vehicles. In this paper, we provide a route tracing technique that protects privacy of vehicles that are not targeted. The proposed method can be employed independently of the authentication mechanism used and includes a mechanism to prevent authorities from abusing this new function.

Enactment of Anti-terrorism law In the Third World And The Instruction for Us (제3세계 국가의 테러방지법제정과 우리나라에 있어서 시사점)

  • Cho, Sung-Je;Soung, Jea-Hyen
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.10
    • /
    • pp.274-283
    • /
    • 2009
  • To effectively and quickly respond to new forms of terrorism, a more organically integrated and coordinated system will be needed. As establishing the grounds of such a system based on laws would be most in congruence with legalism, it would be desirable to fundamentally establish an antiterrorism act. However, enactment of such counter-terrorism laws must be accomplished by means with which human rights violations against citizens may be minimized, contrary to what has been the case with third world nations. The act will need to include clauses that may relieve organizations, such as national human rights committees or citizen groups, of concerns over potential human rights violations. To address vulnerabilities of investigative rights issues which relate to cases relevant to acts of terrorism being delegated to the National Intelligence Service, the investigative jurisdiction shall be assigned to the public prosecutors and law enforcement officials as with other criminal proceedings. As for public concern that establishing the Anti-Terrorism Center under the National Intelligence Service, a secret service agency, may infringe upon human rights, functional and organizational dualism of the Anti -terrorism Center would be worth taking into account.