• Title/Summary/Keyword: Hidden Crime

Search Result 13, Processing Time 0.021 seconds

Analysis of Prostitution Survey Using Randomized Response Model(RRM) (확률화응답모형(RRM)을 활용한 성매매조사 분석)

  • Son, Chang-Kyoon;Joo, Jae-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.10
    • /
    • pp.65-71
    • /
    • 2017
  • It is true that there is a possibility of distortion in the statistical surveys or actual surveys depending on which investigator, what purpose, and how research method. Even statistical results are more likely to be 'lying', and statistics on crime or delinquent are sometimes referred to as 'whopper'. There are many reasons for not trusting statistics on crime or delinquent, but one of the main causes is the existence of a hidden crime or an unreported crime. In order to overcome these hidden crime problems, victim surveys or self-report surveys are being used. However, this method also has the problem of underreporting or overreporting depending on the type of crime. Because investigations into crime, delinquency, and deviant behavior are very sensitive, the subjects have a psychological burden. A randomized response model has been developed and used in the field of statistics as a way to induce a true answer to the sensitive content which is burdensome to reveal the experiences of the survey subjects. This technique is a very useful way to solve the problems of victim surveys or self-report surveys. Nevertheless, there are very few cases in the field of criminology in Korea. Therefore, in order to examine the applicability of the randomized response model in the field of criminology, this study used the randomized response model to actually measure the content of prostitution for college students and the effectiveness of the randomized response model was confirmed.

Technique for Indentifying Cyber Crime Using Clue (수사단서를 이용한 동일 사이버범죄 판단기법)

  • Kim, Ju Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.767-780
    • /
    • 2015
  • In recent years, as smart phone penetration rate is growing explosively, new forms of cyber crime data is poured out beyond the limits of management system for cyber crime investigation. These new forms of data are collected and stored in police station but, some of data are not systematically managed. As a result, investigators sometimes miss the hidden data which can be critical for a case. Crime data is usually generated by computer which produces complex and huge data and records many logs automatically, so it is necessary to simplify a collected data and cluster by crime pattern. In this paper, we categorize all kinds of cyber crime and simplify crime database and extract critical clues relative to other cases. Through data mining and network-visualization, we found there is correlation between clues of a case. From this result, we conclude cyber crime data mining helps crime prevention, early blocking and increasing the efficiency of the investigation.

A Study on Effective Response of Police Officer against Cybercrime (경찰의 사이버범죄에 대한 효율적 대응방안에 관한 연구)

  • Park, Chang-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.3
    • /
    • pp.189-196
    • /
    • 2008
  • In this modern society, a main tendency of crime is to increase in the incidence frequency of cyber crime. Varied criminal techniques from simple crimes to highly specialized crimes appear through cyber space. With the expansion of Internet spread, ordinary people increasingly have an opportunity to have access to information media and their possibilities to be involuntary associated with crimes get higher. In this sense, its seriousness is great. This study examined the present state of cyber crimes that appear through their several types and characteristics and the problems of police response to cyber crimes, and suggest effective response of police officer.

  • PDF

A Study on Improvement of Crime Prevention Environment Design in Gyeongui Line Forest Park - In Case of Changjeon-dong section - (경의선 숲길공원의 범죄예방 환경디자인 개선점 연구 - 창전동 구간을 중심으로 -)

  • Kim, Yeon-Kyeong;Yoo, Daun
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.36 no.1
    • /
    • pp.113-124
    • /
    • 2020
  • The purpose of this study is to suggest an improvement for the CPTED(Crime Prevention Through Environmental Design) guidelines for the urban linear park. We analysed the Changjeon-dong section of Gyeongui Line Forest Park into 12 sub-areas and evaluated CPTED design applied on the park based on analysis framework derived from 15 precedent studies by conducting on-site observations. Both surveys and in-depth interviews on users of the park were conducted and the results of analysis on the evaluation from users and the on-site observation were compared. We found that the lighting condition and the height of wall and trees at the park boundaries are very important to insure natural surveillance since the adjacent areas are easy to be hidden from passers-by and subject to invasion and threat of crime while protecting the privacy of residents on the boundary. There should be improvement on management facilities and crime prevention facilities for more safe and convenient use of the linear park and the adjacent commercial use during nighttime also need to be managed for conflicts between various type of users.

Cybercrime as a Discourse of Interpretations: the Semantics of Speech Silence vs Psychological Motivation for Actual Trouble

  • Matveev, Vitaliy;Eduardivna, Nykytchenko Olena;Stefanova, Nataliia;Khrypko, Svitlana;Ishchuk, Alla;PASKO, Katerina
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.203-211
    • /
    • 2021
  • The article studies the discourse and a legal uncertainty of the popular and generally understandable concept of cybercrime. The authors reveal the doctrinal approaches to the definition of cybercrime, cyberspace, computer crime. The analysis of international legal acts and legislation of Ukraine in fighting cybercrime is carried out. The conclusion is made about the need to improve national legislation and establish international cooperation to develop the tools for countering cybercrime and minimizing its negative outcomes. The phenomenon of nicknames is studied as a semantic source, which potentially generates a number of threats and troubles - the crisis of traditional anthroponymic culture, identity crisis, hidden sociality, and indefinite institutionalization, incognito style, a range of manifestations of loneliness - from voluntary solitude to traumatic isolation and forced detachment. The core idea is that it is the phenomenon of incognito and hidden name (nickname and other alternatives) that is the motivational stimulus for the fact of information trouble or crime.

Development of IR Thermal Camera Detector based on Smartphone Interlocking for Hidden Camera Crime Prevention (몰래카메라 범죄방지를 위한 스마트폰 연동 기반의 IR 열카메라 탐지기 개발)

  • Kang, Young-Gil;Cho, Pil-Gu;Kim, Young-Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.6
    • /
    • pp.1-8
    • /
    • 2021
  • The performance of hidden camera cameras is improving day by day due to miniaturization and advanced technology integration according to the speed of technological development of smartphones. As this external networking computing environment is advanced and diversified, exposure to hidden cameras in addition to general safety cameras is also increasing. On the other hand, the technology for detecting and preventing hidden cameras is not keeping up with the development and speed of these hidden cameras. Therefore, in this study, the heat of the hidden camera was detected using infrared thermal detection technology based on general image and thermal image synthesis technology, and the reflectance of each wavelength according to the difference in ambient temperature was analyzed to reduce the false positive rate.

A Study of Bitcoin Transaction Tracking Method through Illegal Community (불법 커뮤니티를 통한 비트코인 거래 추적 방법에 관한 연구)

  • Jeong, Sejin;Kwak, Nohyun;Kang, Brent Byunghoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.717-727
    • /
    • 2018
  • When illegal transactions are made with bitcoin, it's not easy to track all the bitcoins used in the transaction and seize them. Especially, if criminals distribute illegal transactions by spreading them to several bitcoin addresses, it's difficult to track hidden bitcoins other than confiscated bitcoins even if some bitcoins are confiscated. This paper proposes a method for tracking and monitoring all bitcoin transactions suspected of illegal transactions. This method estimates bitcoin addresses that are highly relevant to crime among all bitcoin addresses that dealing with the address based on the bitcoin address list of the alleged crime, and keeps track of addresses that are relevant to crime and help to investigate illegal bitcoin transaction.

Influence of Police Officer's Networking on Humint Application (경찰관의 인적네트워크수준이 휴민트를 이용한 경찰활동에 미치는 영향)

  • Shin, Jae-Hun;Kim, Sang-Woon
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.9
    • /
    • pp.606-613
    • /
    • 2018
  • The purpose of this study is to investigate on Humint, one of the intelligence activity conducted by police officer to prevent the possibility of crime in advance and to handle crime in short time. Also, this study aims to identify how interpersonal relationship of police influences Humint acquisition in order to find out the influence of Humint on actual policy activity. For completion, this study conducted survey on current police officer and developed the study based on these data. Humint refers to information acquired by contact between people and to information acquired by intangible contact. Humint, the intangible information, is delivered fast and identifies the other's hidden intention. Humint also approaches inaccessible information and has strength of acquiring information based on five senses instead of using machine. Humint plays vital role in human relations. The investigation on the influence of level, trust, and range of human relations on Humint application demonstrated that people with wide human relations applied Humint effectively on identifying trend. Also, people with wide range of human relations used Humint effectively when utilizing information to handle the crime.

Construction of an Audio Steganography Botnet Based on Telegram Messenger (텔레그램 메신저 기반의 오디오 스테가노그래피 봇넷 구축)

  • Jeon, Jin;Cho, Youngho
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.127-134
    • /
    • 2022
  • Steganography is a hidden technique in which secret messages are hidden in various multimedia files, and it is widely exploited for cyber crime and attacks because it is very difficult for third parties other than senders and receivers to identify the presence of hidden information in communication messages. Botnet typically consists of botmasters, bots, and C&C (Command & Control) servers, and is a botmasters-controlled network with various structures such as centralized, distributed (P2P), and hybrid. Recently, in order to enhance the concealment of botnets, research on Stego Botnet, which uses SNS platforms instead of C&C servers and performs C&C communication by applying steganography techniques, has been actively conducted, but image or video media-oriented stego botnet techniques have been studied. On the other hand, audio files such as various sound sources and recording files are also actively shared on SNS, so research on stego botnet based on audio steganography is needed. Therefore, in this study, we present the results of comparative analysis on hidden capacity by file type and tool through experiments, using a stego botnet that performs C&C hidden communication using audio files as a cover medium in Telegram Messenger.

Reversible Data Hiding based on QR Code for Binary Image (이진 이미지를 위한 QR 코드 기반의 가역적인 데이터 은닉)

  • Kim, Cheonshik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.281-288
    • /
    • 2014
  • QR code (abbreviated from Quick Response Code) is code system that is strong in against to apply image processing techniques (skew, warp, blur, and rotate) as QR codes can store several hundred times the amount of information carried by ordinary bar codes. For this reason, QR code is used in various fields, e.g., air ticket (boarding control system), food(vegetables, meat etc.) tracking system, contact lenses management, prescription management, patient wrist band (patient management) etc. In this paper, we proposed reversible data hiding for binary images. A reversible data hiding algorithm, which can recover the original image without any distortion from the marked (stego) image after the hidden data have been extracted, because it is possible to use various kinds of purposes. QR code can be used to generate by anyone so it can be easily used for crime. In order to prevent crimes related QR code, reversible data hiding can confirm if QR code is counterfeit or not as including authentication information. In this paper, we proved proposed method as experiments.