• Title/Summary/Keyword: Crimes

Search Result 659, Processing Time 0.022 seconds

Artifacts Analysis of Users Behavior in Korea Random Chat Application (국내 랜덤 챗 어플리케이션에서 사용자의 행위에 따른 아티팩트 분석)

  • Seo, Seunghee;Nam, Gihoon;Kim, Yeog;Lee, Changhoon
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.1-8
    • /
    • 2018
  • A random chat application is a type of social dating application that helps people find a lover or spouse by randomly connecting and providing services such as text, voice and video chat. Recently, there has been globally a rapid increase in its use due to the fact that it provides people to quick and convenient encounters at low cost. However, it is used as one of method to prostitute or to trade drugs and become a cause of violent crimes due to various criminal occurring after actual meeting between app users. For this reason, a random chat application is likely to provide proof of prostitution or drug trade and clues to arrest rape, kidnapping and murder suspects. Thus, it is necessary to analyse random chat applications from the viewpoint of digital forensics investigation, but there is no related research at all. Therefore, in this paper, we analyzed artifacts of 6 Korea random chat application's user behaviors; Ranchat, AngTalk, SsumgThing, DaTalk, EveryTalk and Sail. As a result, we found that it is remain on mobile device that time and contents of message transmission/reception, sender/receiver, friend profile and user account creation time when user is using the applications.

A Study on Measures for Strengthening Intelligence-Led Policing Using HUMINT (휴민트를 이용한 정보지향적 경찰활동 강화방안)

  • Shin, Jae-Hun;Kim, Sang-Woon
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.2
    • /
    • pp.112-120
    • /
    • 2019
  • This study conducts survey on currently working police officers to examine the actual utilization of HUMINT and suggest measures for strengthening the effective intelligence police activity, Intelligence Led Policing. For the completeness of study, this study presented evidences based on survey data from police officers at sites and this study also suggested improvement measures. in regulating the scope of duty, "Act on the Performance of Duties by Police Officers" regulates that 'Gathering, preparation, and distribution of public safety information' is the duty of police officer and defines the information gathering activity of police as the unique work of police officer. Thus, in accordance with "Act on the Performance of Duties by Police Officers", police officers gather various information to prevent crimes and maintain orders. Among the information gathering methods used by police officer, HUMINT is the oldest measure and it is still utilized. HUMINT has the advantages of low expense, high accuracy, and critical impact on the other. Nevertheless, due to limitations in data objectification, measurement, and responses to double attack, HUMINT is underappreciated. With awareness on such HUMINT issues, this study conducted survey on in-service police officers and examined the actual state of HUMINT. Based on the survey result, this study suggested Intelligence-Led Policing as the effective application method.

A Study on the Change of Perceptions of Child Abuse Before and After Special Law (아동학대 범죄의 처벌 등에 관한 특례법 전후의 아동학대 인식 변화에 대한 고찰)

  • Lee, Keung-Eun;Kim, Do-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.9
    • /
    • pp.629-636
    • /
    • 2019
  • In order to infer whether the Special Act on the Punishment of Child Abuse Crimes, etc. actually brought about a change in the social perception shared about child abuse in our society, we used big data to examine the change in the perception of child abuse by the public. This study selected 'child abuse' as the keyword and collected and analyzed. The results of this study are as follows. First, before the implementation of the Special Act in 2013, the words "china" are kindergarten, teacher, body, problem, reporting obligation and neglect compared to the following. After the implementation of the special law, daycare centers, incidents, eradication, campaigns, domestic violence and preventive education were newly introduced. Second, the interconnection of key words in the previous picture of 2013 shows that the left group focuses on measures to introduce to prevent child abuse while the right group consists of keyword intended to view child abuse in conjunction with domestic violence. They are still seen as a group of divorces, discipline, neglect and parental education, which they still perceive as a family problem. Since the implementation of the Special Act in 2013, it will be divided into four groups, and the top group will be highlighted by the keyword related to child abuse cases, part of suspected cases and awareness of child abuse. In addition, the Act on the Special Cases of Child Abuse and the Child Protection Agency clearly appear as a child protection system.

A Study on the Trends of Korean Juvenile Gambling (청소년 도박의 국내 연구동향 분석)

  • Ko, Do-Hyun;Kim, Sang-Mi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.1
    • /
    • pp.660-671
    • /
    • 2021
  • This paper analyzed the research trends of juvenile gambling, which is increasing due to recent changes in the internet environment. The number of domestic studies on juvenile gambling has increased, but there are few studies that analyzed both degrees and academic papers in a more comprehensive manner than addiction to the Internet, games, and drugs related to youth. The current state of juvenile gambling can lead to secondary crimes, such as illegal loans and thefts for gambling funds beyond the level of addiction, school violence and money extortion, which have been a major shock to Korean society. Therefore, it is urgent to prepare social measures because the age of adolescents who are exposed to gambling is becoming lower. Accordingly, this study analyzed 52 dissertations, 86 academic papers, and three other research reports published in Korea from 2003 to March 2020. As a result, quantitative research, research subjects, and research topics were concentrated, and there was a limit to generalization. In addition, these results will provide rich information to future studies by confirming the academic characteristics according to the times and interdisciplinary research trends that transcend individual science areas.

Development and Effectiveness Analysis of Workshop Program for Child Safety Map Making (아동안전지도 제작을 위한 워크숍 프로그램 개발 및 효과분석)

  • Son, Dong-Pil;Lee, Kyung-Hwan;Chae, Han-Hee
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.35 no.7
    • /
    • pp.109-117
    • /
    • 2019
  • Recently, child safety map making education has attracted attention as a way to reduce crimes against children. In Korea, the Ministry of Gender Equality and Family organized a child safety map making education program in 2011. The program's manual was revised in 2013 and the Ministry implemented it as a project to promote the rights of women and children. Child safety map making education aims to raise a child's understanding of their neighborhood, to have voluntary control and normal consciousness as a local inhabitant, to be aware of wrong behavior and crime, and to be part of creating a safe urban environment. However, when compared to educational programs in other major developed countries, the child safety map making education program in Korea currently does not improve a child's awareness of their surroundings. In this workshop study, we proposed and ran a new program to improve children's awareness of their environment based on the active participation of children in the existing safety map educational program. The workshop was held for 4 weeks for 48 students from 5th and 6th grade at Osan Daeho Elementary School. We analyzed this new program's effects with the following results. First, an analysis of the effects of the program on children's recognition of safe and dangerous spaces revealed that their understanding of these spaces increased by 30.4% after the workshop. The safety-related factor in the mind map key concept increased from 0.94 to 4.94, indicating that the children's perception of neighborhood risk and safety factors improved. Second, the analysis of the effects of the program on the children's coping ability in dangerous situations showed that their understanding of how to deal with dangerous situations increased by 11.3%. The children's understanding of facilities they could ask for help, such as police boxes and child safety guard houses, improved by 17.9%. Third, analysis of the effects of child safety map making education on children's understanding of their neighborhood, their perception of responsibility in the neighborhood, and their neighborhood attachment showed that these levels of children's understanding of the neighborhood improved by 6.0% after the workshop.

Cooperative Architecture for Centralized Botnet Detection and Management (협업 기반의 중앙집중형 봇넷 탐지 및 관제 시스템 설계)

  • Kwon, Jong-Hoon;Im, Chae-Tae;Choi, Hyun-Sang;Ji, Seung-Goo;Oh, Joo-Hyung;Jeong, Hyun-Cheol;Lee, Hee-Jo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.83-93
    • /
    • 2009
  • In recent years, cyber crimes were intended to get financial benefits through malicious attempts such as DDoS attacks, stealing financial information and spamming. Botnets, a network composed of large pool of infected hosts, lead such malicious attacks. The botnets have adopted several evasion techniques and variations. Therefore, it is difficult to detect and eliminate them. Current botnet solutions use a signature based detection mechanism. Furthermore, the solutions cannot cover broad areas enough to detect world-wide botnets. In this study, we suggest an architecture to detect and regulate botnets using cooperative design which includes modules of gathering network traffics and sharing botnet information between ISPs or nations. Proposed architecture is effective to reveal evasive and world-wide botnets, because it does not depend on specific systems or hardwares, and has broadband cooperative framework.

An Efficient Method of Forensics Evidence Collection at the Time of Infringement Occurrence (호스트 침해 발생 시점에서의 효율적 Forensics 증거 자료 수집 방안)

  • Choi Yoon-Ho;Park Jong-Ho;Kim Sang-Kon;Kang Yu;Choe Jin-Gi;Moon Ho-Gun;Rhee Myung-Su;Seo Seung-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.4
    • /
    • pp.69-81
    • /
    • 2006
  • The Computer Forensics is a research area that finds the malicious users by collecting and analyzing the intrusion or infringement evidence of computer crimes such as hacking. Many researches about Computer Forensics have been done so far. But those researches have focussed on how to collect the forensic evidence for both analysis and poofs after receiving the intrusion or infringement reports of hosts from computer users or network administrators. In this paper, we describe how to collect the forensic evidence of good quality from observable and protective hosts at the time of infringement occurrence by malicious users. By correlating the event logs of Intrusion Detection Systems(IDSes) and hosts with the configuration information of hosts periodically, we calculate the value of infringement severity that implies the real infringement possibility of the hosts. Based on this severity value, we selectively collect the evidence for proofs at the time of infringement occurrence. As a result, we show that we can minimize the information damage of the evidence for both analysis and proofs, and reduce the amount of data which are used to analyze the degree of infringement severity.

Artificial Intelligence-based Security Control Construction and Countermeasures (인공지능기반 보안관제 구축 및 대응 방안)

  • Hong, Jun-Hyeok;Lee, Byoung Yup
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.1
    • /
    • pp.531-540
    • /
    • 2021
  • As cyber attacks and crimes increase exponentially and hacking attacks become more intelligent and advanced, hacking attack methods and routes are evolving unpredictably and in real time. In order to reinforce the enemy's responsiveness, this study aims to propose a method for developing an artificial intelligence-based security control platform by building a next-generation security system using artificial intelligence to respond by self-learning, monitoring abnormal signs and blocking attacks.The artificial intelligence-based security control platform should be developed as the basis for data collection, data analysis, next-generation security system operation, and security system management. Big data base and control system, data collection step through external threat information, data analysis step of pre-processing and formalizing the collected data to perform positive/false detection and abnormal behavior analysis through deep learning-based algorithm, and analyzed data Through the operation of a security system of prevention, control, response, analysis, and organic circulation structure, the next generation security system to increase the scope and speed of handling new threats and to reinforce the identification of normal and abnormal behaviors, and management of the security threat response system, Harmful IP management, detection policy management, security business legal system management. Through this, we are trying to find a way to comprehensively analyze vast amounts of data and to respond preemptively in a short time.

The Effect of Involvement and Severity on Acceptance of Artificial Intelligence Judgment (사건 관여도와 심각성이 인공지능 판결에 대한 수용도에 미치는 효과)

  • Doh, Eun Yeong;Lee, Guk-Hee;Jung, Ji Eun
    • Korean Journal of Cognitive Science
    • /
    • v.32 no.4
    • /
    • pp.169-191
    • /
    • 2021
  • With the development of artificial intelligence(AI), the jobs of many human experts are threatened, and this also applies to the legal profession. This study attempted to investigate whether AI can actually replace humans in the legal profession, especially the role of judges making final judgments. For this purpose, from the perspective of uniqueness neglect, this study was conducted to confirm the effect of involvement and the severity on acceptance of the judgment made by the AI judge (Experiment 1) and the AI jury (Experiment 2). The involvement was manipulated as if the subject who was sentenced for committing a crime was his or her family (mother, father) or stranger, and the severity was manipulated by the extent of the damage, the perception of the crime, and the number of applied crimes. In Experiment 1, the interactive effect of involvement and severity was found. Specifically, when the involvement was low, the acceptance of AI judges was higher in high severity (vs. low severity). Conversely, when the involvement was high, the acceptance of AI judges was higher in low severity (vs. high severity). The same interactions as in Experiment 1 occurred in Experiment 2. Specifically, when the involvement was low, a larger number of AI jury members were allocated in high severity (vs. low severity). On the other hand, when the involvement was high, the number of AI juries increased in low severity (vs. high severity). This study has implications in that it is the first experimental study in Korea on artificial intelligence legal judgment and that it presents the prospects for the jobs of legal experts.

A Study on STR Analysis According to the Method of Developing Latent Fngerprints Deposited on Non-Porous Surfaces in the Marine Environment (해양환경 내 비다공성 표면에 유류된 잠재지문 현출방법에 따른 STR 분석 연구)

  • Kim, Jin-Sun;Kim, Sea-In;Yoon, Hyun-Kyoung;Choo, Min-kyu
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.10
    • /
    • pp.733-741
    • /
    • 2022
  • Among the various evidence found in maritime crimes, fingerprints and DNA are very important in that they can identify a suspect. In this study, 5 types of non-porous surfaces (plastic, stainless, glass, ceramic, FRP), which are often found as evidence in the actual marine environment, were selected, and latent and blood fingerprints were passed down and immersed at the Donghae Maritime Police Station's exclusive pier for about 7 days. After that, DNA extraction, quantification, and STR profile were analyzed after fingerprint developing CA fumming method and 4 powder methods (Swedish black powder, Concentrated black powder, Supranano red powder, Dazzle orange powder). Among the fingerprint developing methods, when Supranano red powder was applied, a relatively high amount of DNA was found. As a result of STR profile analysis, an average of 16.8 to 9 loci were secured, and all 20 were confirmed in glass and ceramic materials. As a result of the study, it was possible to secure the STR profile by extracting and quantifying DNA after applying the fingerprint developing method to virtual evidence immersed for about 7 days, and further research is needed to secure the STR profile by analyzing DNA after applying various fingerprint developing methods such as VMD and SPR.