• Title/Summary/Keyword: Crimes in Cyberspace

Search Result 12, Processing Time 0.025 seconds

Overcoming Cybercrime in Ukraine (Cyberterrorism)

  • Pravdiuk, Andrey;Gerasymenko, Larysa;Tykhonova, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.181-186
    • /
    • 2021
  • Ensuring national security in cyberspace is becoming an increasingly important issue, given the growing number of cybercrimes due to adaptation to new security and protection technologies. The purpose of this article is to study the features of counteracting, preventing, and detecting crimes in the virtual space of Ukraine on the example of cases and analysis of the State Center for Cyber Defense and Countering Cyber Threats CERT-UA and the Cyber Police Department of the National Police of Ukraine. The research methodology is based on the method of analysis and study of cases of crime detection in the virtual environment of the State Center for Cyber Defense and Countering Cyber Threats CERT-UA and the Cyber Police Department of the National Police of Ukraine. The results show that the consistent development of the legal framework in 2016-2020 and the development of a cyber-defense strategy for 2021-2025 had a positive impact on the institution-building and detection of cybercrime in Ukraine. Establishing cooperation with developed countries (USA) has helped to combat cybercrime by facilitating investigations by US law enforcement agencies. This means that international experience is effective for developing countries as a way to quickly understand the threats and risks of cybercrime. In Ukraine, the main number of incidents concerns the distribution of malicious software in the public sector. In the private sector, cyber police are largely confronted with the misappropriation of citizens' income through Internet technology. The practical value of this study is to systematize the experience of overcoming cybercrime on the example of cases of crime detection in a virtual environment.

Digital Forensics Investigation Approaches in Mitigating Cybercrimes: A Review

  • Abdullahi Aminu, Kazaure;Aman Jantan;Mohd Najwadi Yusoff
    • Journal of Information Science Theory and Practice
    • /
    • v.11 no.4
    • /
    • pp.14-39
    • /
    • 2023
  • Cybercrime is a significant threat to Internet users, involving crimes committed using computers or computer networks. The landscape of cyberspace presents a complex terrain, making the task of tracing the origins of sensitive data a formidable and often elusive endeavor. However, tracing the source of sensitive data in online cyberspace is critically challenging, and detecting cyber-criminals on the other hand remains a time-consuming process, especially in social networks. Cyber-criminals target individuals for financial gain or to cause harm to their assets, resulting in the loss or theft of millions of user data over the past few decades. Forensic professionals play a vital role in conducting successful investigations and acquiring legally acceptable evidence admissible in court proceedings using modern techniques. This study aims to provide an overview of forensic investigation methods for extracting digital evidence from computer systems and mobile devices to combat persistent cybercrime. It also discusses current cybercrime issues and mitigation procedures.

A Study on Improving Support for Victims of Cyber-Violence (사이버 폭력의 피해자 지원에 대한 개선방안)

  • Park, Jong-Ryeol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.1
    • /
    • pp.227-233
    • /
    • 2012
  • Recently, violence in cyberspace has been increasing and it causes not only severe emotional distress to the victims but also hampers a healthy cyber culture. This paper aims to find out about characteristics and the actual state of Cyber-Violence, and Evaluate the measures concerning it. Cyber crime is characterized as non face to face, anonymity, non-limitary, difficulties in attracting evidence, the Cyber Violence of these cyber crimes was shown in the form of cyber-insult, cyber-defamation, cyber-stalking, circulation of cyber-pornography, and that is the reality there are lack of practical measures. As a measure for protection the establishment of positive laws are needed on the cyber-contempt, adopting the Internet real-name system, strengthening the ISP's responsibility and legislation for criminal penalties. As a more fundamental measure, a greater effort of netizen's self-purification and systematic training and promotion for the prevention of damage is necessary.

Status of Illegal Hazardous Information for Chemical on Internet - Monitoring Cases of Chemical Cyber Surveillance - (인터넷 상 화학물질 불법 유해정보 현황 고찰 - 화학물질 사이버감시단 신고 사례를 중심으로 -)

  • Hwang, Man Sik;Im, Ji Young;Jeon, Da Young;Song, Ki Bong;Lee, Sang Mok;Ryu, Ji Sung;Lee, Ji Ho
    • Korean Journal of Hazardous Materials
    • /
    • v.6 no.2
    • /
    • pp.13-22
    • /
    • 2018
  • Recently, social crimes using chemicals at home and abroad are increasing. These chemicals are readily available in the internet. Therefore, the NICS(national institute of chemical safety) runs a 'Chemical Cyber Surveillance' to help the public take control of the internet and create a healthy cyberspace through voluntary participation of the public. The study analyzed more than 1,000 sites suspected illegal hazardous information or blocked among cyber surveillance 3,500 case reports in the past yeas. And, the number of illegal hazardous information reported in the past three years is analyzed by type and substance. They want to examine the characteristics of hazardous chemical information on the internet and use it as a basic data to establish illegal information management measures that spread over cyberspace.

The Regulations by Criminal Law against any Libel in Cyberspace (사이버명예훼손행위와 형사법적 대응방안)

  • Yoo, In-Chang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.5
    • /
    • pp.177-183
    • /
    • 2012
  • There occur various crimes in cyber space hiding behind anonymity to avoid punishment by criminal law. One of the most serious crimes committed in cyber space is defamation against others under the cloak of freedom of expression. The infringements by defamations in cyber space are made all of a certain and widespread that the victims have no time to react, and for that reason, the shocks by the defamation are much serious and severe compared with that committed in off line. However, press and publication shouldn't infringe on other's honors, right, public order or social ethics in liberal democrat society which values much the human dignities and values as stipulated in Article 21 section 4 of the Constitution. Protection of personal honor is also the basic rights guaranteed by the Constitution as much as the freedom of expression, and by extension, such harmful behaviour shouldn't be included in the freedom of expression area. In this way, slander can be considered as the minimum limitation of the freedom of expression.

Generation of Forensic Evidence Data from Script (Script에서 Forensic 증거자료 확보 방안)

  • Kim, Seul-gi;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.353-355
    • /
    • 2017
  • Recently developed digital devices are being used in cyberspace. Digital device users are engaged in activities such as financial settlement and e-commerce using cyber-connected terminals. With the activation of cyber trading, cyber crimes against users are increasing. Forensic evidence should be obtained from investigations of cybercrime. However, there is a lot of information to analyze digital forensic evidence. In many of these digital information, Scripts are an effective way to secure evidence for cybercrime. In this paper, we study how to secure forensic evidence using scripts. Extract evidence from EnCase and study how to obtain evidence using scripts. This study will be used as the basic data for cyber security for the safe life of the people.

  • PDF

A Study on the Development of Cyberpolice Volunteer System Using the Collective Intellectual Network (집단지성 네트워크형 사이버폴리스 자원봉사시스템 구축에 관한 연구)

  • Kim, Doo-Hyun;Park, Sung-Joon;Na, Gi-Sung
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.59-85
    • /
    • 2019
  • In the reality that the boundary between the real world and the virtual world disappears with the 4th Industrial Revolution, cyber crimes that occur beyond time and space have clear limitations in fulfilling their duties only with the police force of government organizations established under the real law system. The research method of this thesis is based on the literature research and the experience of security work. The purpose of this paper is to establish a social system where collective intelligence of each social field can participate voluntarily to respond to cyber crimes occurring beyond the time and space before the law and institutionalization. In addition, the social system in which collective intelligence in each social sector can participate voluntarily was established to define crime types in cyberspace in real time and to prevent crimes defined by the people themselves and the counter-measures had been proposed in order to form social consensus. First, it is necessary to establish a collective intelligent network-type cyberpolice volunteer system. The organization consists of professors of security and security related departments at universities nationwide, retired public officials from the National Intelligence Service, the National Police Agency, and the National Emergency Management Agency, security companies and the organizations, civilian investigators, security & guard, firefighting, police, transportation, intelligence, security, national security, and research experts. Second, private sector regulation should be established newly under the Security Business Act. Third, the safety guard of the collective intelligent cyberpolice volunteer system for the stability of the people's lives should strengthen volunteer work. Fourth, research lessons and legal countermeasures against cybercrime in advanced countries should be introduced. Fifth, the Act on the Protection of Personal Information, the Act on Promotion of Information and Communication Network Utilization and Information Protection, the Act on the Utilization and Protection of Credit Information, and the Special Act on the Materials and Parts Industry should be amended. Sixth, police officers should develop cybercrime awareness skills for proactive prevention activities.

The probable use of UAV(Unmanned Aerial Vehicle) in crime, cybercrime, and terrorism and responses (무인기 개발과 범죄, 사이버 범죄, 테러 활용 가능성과 대응방안)

  • Joh, Hyeon-Jin;Yun, Min-Woo
    • Korean Security Journal
    • /
    • no.46
    • /
    • pp.189-216
    • /
    • 2016
  • In March 2015, the North Korean UAVs (Unmanned Aerial Vehicles) were found and countries around the world have actively developed UAVs. UAVs or Drone have become commercialized and more civilians use UAVs for leisure. The positive possibilities of UAV use expand. However, there could be the negative sides of UAV use. The UAVs could be used for the purpose of various crime, cybercrime, and terrorism. For instance, hacking devices attached drone could be infiltrated into the sensitive networks to steal personal informations and public data. This could be a new dimension of cybercrime. As the number of internet users and cyberspace rapidly expands, problems of crimes could be worsened both quantitatively and qualitatively. By contrast, defensive measures against such threats are limited. Especially, the Korean society is vulnerable despite its well-advanced internet and computer network technology. This article investigates the current UAV types and its developments, discusses various possibilites of UAV-related crime, cybercrime, and terrorism, and proposes responses.

  • PDF

Narratives and Emotions on Immigrant Women Analyzing Comments from the Agora Internet Community(Daum Portal Site) (이주여성에 관한 혐오 감정 연구 다음사이트 '아고라' 담론을 중심으로)

  • Han, Hee Jeong
    • Korean journal of communication and information
    • /
    • v.75
    • /
    • pp.43-79
    • /
    • 2016
  • An increase in the number of immigrants to Korea since the late 1980s' has signified the proliferation of globalization and global capitalism. In Korea, most married immigrants are women, as the culture emphasizes patrilineage and the stability of the institution of marriage, particularly in rural areas. Immigrant women have experienced dual ordeals. The Aogra Internet community in Korea has been one of the most representative sites that has shown the power of communities in cyberspace since 2002, leading the discussion of social issues and deliberative democracy both online and offline. This paper analyzed Koreans' writings (such as long comments) on immigrant women in the Agora community. The analysis revealed the following results: first, immigrant women were referred to using terms related to prostitution, with excessive expression of disgust, which is called a "narrative of identity." Second, anti-multiculturalists called Korean men victims of married immigrant women and expressed hatred toward immigrant women, which is called a "narrative of sacrifice." Third, anti-multiculturalists justified their emotions as just resentment based on ideas of justice, equality, and patriotism, concealing the emotion of disgust, which is called the "narrative of justice, equality." Fourth, antimulticulturalists played roles to spread the emotion of disgust, by repeatedly referring to international marriage fraud and immigrant workers' crimes, which is called "narrative of crime." Fifth, some positive writings on immigrant women were based on empathy(a concept defined in this context by Martha Nussbaum), but they can be analyzed as narratives encouraging cultural integration through the perspective of orientalism. Therefore, comments on immigrant women in the Agora represent a "catch-22" dilemma. To deal with conflicts arising from disgust and violations of human rights, civic education focusing on humanism is needed in this multicultural era.

  • PDF

Exploring the Nature of Cybercrime and Countermeasures: Focusing on Copyright Infringement, Gambling, and Pornography Crimes (사이버 범죄의 특성과 대응방안 연구: 저작권 침해, 도박, 음란물 범죄를 중심으로)

  • Ilwoong Kang;Jaehui Kim;So-Hyun Lee;Hee-Woong Kim
    • Knowledge Management Research
    • /
    • v.25 no.2
    • /
    • pp.69-94
    • /
    • 2024
  • With the development of cyberspace and its increasing interaction with our daily lives, cybercrime has been steadily increasing in recent years and has become more prominent as a serious social problem. Notably, the "four major malicious cybercrimes" - cyber fraud, cyber financial crime, cyber sexual violence, and cyber gambling - have drawn significant attention. In order to minimize the damage of cybercrime, it's crucial to delve into the specifics of each crime and develop targeted prevention and intervention strategies. Yet, most existing research relies on indirect data sources like statistics, victim testimonials, and public opinion. This study seeks to uncover the characteristics and factors of cybercrime by directly interviewing suspects involved in 'copyright infringement', 'gambling' related to illicit online content, and 'pornography crime'. Through coding analysis and text mining, the study aims to offer a more in-depth understanding of cybercrime dynamics. Furthermore, by suggesting preventative and remedial measures, the research aims to equip policymakers with vital information to reduce the repercussions of this escalating digital threat.