• Title/Summary/Keyword: Information Communication Law

Search Result 362, Processing Time 0.024 seconds

Massive Surveillance by US-UK intelligence services : Crisis of the Internet and the Rule of Law (미국/영국 정보기관의 무차별 정보수집행위: 인터넷과 법치주의의 위기)

  • Kim, Keechang
    • Review of Korean Society for Internet Information
    • /
    • v.14 no.3
    • /
    • pp.78-85
    • /
    • 2013
  • The revelations made possible by Edward Snowden, a contractor of the US intelligence service NSA, are a sobering reminder that the Internet is not an 'anonymous' means of communication. In fact, the Internet has never been conceived with anonymity in mind. If anything, the Internet and networking technologies provide far more detailed and traceable information about where, when, with whom we communicate. The content of the communication can also be made available to third parties who obtain encryption keys or have the means of exploiting vulnerabilities (either by design or by oversight) of encryption software. Irrebuttable evidence has emerged that the US and the UK intelligence services have had an indiscriminate access to the meta-data of communications and, in some cases, the content of the communications in the name of security and protection of the public. The conventional means of judicial scrutiny of such an access turned out to be ineffectual. The most alarming attitude of the public and some politicians is "If you have nothing to hide, you need not be concerned." Where individuals have nothing to hide, intelligence services have no business in the first place to have a peek. If the public espouses the groundless assumption that State organs are benevolent "( they will have a look only to find out whether there are probable grounds to form a reasonable suspicion"), then the achievements of several hundred years of struggle to have the constitutional guarantees against invasion into privacy and liberty will quickly evaporate. This is an opportune moment to review some of the basic points about the protection of privacy and freedom of individuals. First, if one should hold a view that security can override liberty, one is most likely to lose both liberty and security. Civilized societies have developed the rule of law as the least damaging and most practicable arrangement to strike a balance between security and liberty. Whether we wish to give up the rule of law in the name of security requires a thorough scrutiny and an informed decision of the body politic. It is not a decision which can secretly be made in a closed chamber. Second, protection of privacy has always depended on human being's compliance with the rules rather than technical guarantees or robustness of technical means. It is easy to tear apart an envelope and have a look inside. It was, and still is, the normative prohibition (and our compliance) which provided us with protection of privacy. The same applies to electronic communications. With sufficient resources, surreptitiously undermining technical means of protecting privacy (such as encryption) is certainly 'possible'. But that does not mean that it is permissible. Third, although the Internet is clearly not an 'anonymous' means of communication, many users have a 'false sense of anonymity' which make them more vulnerable to prying eyes. More effort should be made to educate the general public about the technical nature of the Internet and encourage them to adopt user behaviour which is mindful of the possibilities of unwanted surveillance. Fourth, the US and the UK intelligence services have demonstrated that an international cooperation is possible and worked well in running the mechanism of massive surveillance and infiltration into data which travels globally. If that is possible, it should equally be possible to put in place a global mechanism of judicial scrutiny over a global attempt at surveillance.

  • PDF

A Study on the Queueing priority in Communication Network (통신망에 있어서의 큐잉우선도에 관한 연구)

  • 김영동;이재호;송영재
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.10 no.5
    • /
    • pp.218-228
    • /
    • 1985
  • The input messages in communication network are processed according to their priority. If the messages which are had different types of priority are excessively entered to communication network in such prioruty process, and if high priority messages are continuously entered, the messages which are had law priority are experinenced delay beyond their priority. In this case, we proposed average delay compensation method to compensate contonuous delay in low priority messages.

  • PDF

Nonlinear Model Predictive Control for Multiple UAVs Formation Using Passive Sensing

  • Shin, Hyo-Sang;Thak, Min-Jea;Kim, Hyoun-Jin
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.12 no.1
    • /
    • pp.16-23
    • /
    • 2011
  • In this paper, nonlinear model predictive control (NMPC) is addressed to develop formation guidance for multiple unmanned aerial vehicles. An NMPC algorithm predicts the behavior of a system over a receding time horizon, and the NMPC generates the optimal control commands for the horizon. The first input command is, then, applied to the system and this procedure repeats at each time step. The input constraint and state constraint for formation flight and inter-collision avoidance are considered in the proposed NMPC framework. The performance of NMPC for formation guidance critically degrades when there exists a communication failure. In order to address this problem, the modified optimal guidance law using only line-of-sight, relative distance, and own motion information is presented. If this information can be measured or estimated, the proposed formation guidance is sustainable with the communication failure. The performance of this approach is validated by numerical simulations.

The development of module for measurement and wireless communication of SpO2/PPG signals (혈중산소포화도/맥파 신호 측정 및 무선 전송을 위한 모듈 개발)

  • Han, Young-Oh
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.6
    • /
    • pp.981-986
    • /
    • 2011
  • In this paper, the module for measuring SpO2 and PPG(Photo Plethysmo Graphy) signal of human body and the module for wireless communication of these bio-signals to PC were developed. The program was developed to display transmitted SpO2 and PPG signal by various type data and graph without information loss during a emergency transfer. This system can be utilized as appropriate for remote medical care and a new market is expected, to be created according to revision of medical law.

A Study on the Developmental trend of role and the GMDSS Of Marine Communication (해상통신의 역할과 GMDSS의 발전동향에 관한 연구)

  • 오문희;신현식;박연식
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.295-299
    • /
    • 2001
  • 1912 April 14th tietanik is in favor disaster at marine accident to do and the world-wide various nations, to be to a marine, after providing the treaty for an immediacy with international agreement there are by all vessels and the radio communication equipment for immediacy navigation they establish. Also by a vessel immediacy law 4th favor regulation even from our country in order to establish a radio communication equipment. But it is a GMDSS and it follows in introduction of new communication system and the region change is brought about in vessel communication system and the many problem point occurs. Against the problem point of the our country marine communication which it follows hereupon it researches and it does to sleep.

  • PDF

Reversible Watermarking Using Adaptive Edge-Guided Interpolation

  • Dai, Ningjie;Feng, Guorui;Zeng, Qian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.4
    • /
    • pp.856-873
    • /
    • 2011
  • Reversible watermarking is an open problem in information hiding field, with embedding the encoded bit '1' or '0' into some sensitive images, such as the law enforcement, medical records and military images. The technique can retrieve the original image without distortion, after the embedded message has been extracted. Histogram-based scheme is a remarkable breakthrough in reversible watermarking schemes, in terms of high embedding capacity and low distortion. This scheme is lack of capacity control due to the requirement for embedding large-scale data, because the largest hidden capacity is decided by the amount of pixels with the peak point. In this paper, we propose a reversible watermarking scheme to enlarge the number of pixels with the peak point as large as possible. This algorithm is based on an adaptive edge-guided interpolation, furthermore, hides messages by interpolation-error, i.e. the difference between the original and interpolated image value. Simulation results compared with other state-of-the-art reversible watermarking schemes in this paper demonstrate the validity of the proposed algorithm.

A Study on Strengthening of Logistics Security and RFID (물류보안강화와 RFID에 관한 소고)

  • Kim, Jang-Ho;Kim, Jong-Deuk;Kim, Jea-Sung
    • International Commerce and Information Review
    • /
    • v.9 no.4
    • /
    • pp.241-261
    • /
    • 2007
  • 9.11 terrors which happen in 2001 in the U.S. recognize importance about national security and Department of Commerce, country safety department, Federal Communication Commission(FCC) etc. are establishing RFID sticking plan in harbor exit and entrance container for this, and it is real condition that is preparing preparation of law and system that establishes harbor peace law(Safe Port Act) on October, 2006 and acts on for U.S. about container load cargo Europe and Asia each countries. These law and system is logistics security that strengthen search for import and export freight and security to main contents. To meet in these circumstance subsequent, this paper is to examine the following three themes. First, examined necessity of logistics security and logistics security strengthening tendency, and second, examined in achievement of logistics business and RFID, and third, presented logistics security process that utilize change of realization about logistics security and RFID's role for logistics security. Through upper investigation, this paper suggested the realization about logistics security raising, logistics security connection system construction by export step, real-time freight chase that use RFID, construction necessity of executive system and development of logistics security equipment required.

  • PDF

A Homomorphism on Orthoimplication Algebras for Quantum Logic (양자논리를 위한 직교함의 대수에서의 준동형사상)

  • Yon, Yong-Ho
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.3
    • /
    • pp.65-71
    • /
    • 2017
  • The quantum logic was introduced by G. Birkhoff and 1. von Neumann in order to study projections of a Hilbert space for a formulation of quantum mechanics, and Husimi proposed orthomodular law and orthomodular lattices to complement the quantum logic. Abott introduced orthoimplication algebras and its properties to investigate an implication of orthomodular lattice. The commuting relation is an important property on orthomodular lattice which is related with the distributive law and the modular law, etc. In this paper, we define a binary operation on orthoimplication algebra and the greatest lower bound by using this operation and research some properties of this operation. Also we define a homomorphism and characterize the commuting relation of orthoimplication algebra by the homomorphism.

A Study on Digital Forensic Human Training Method (디지털 포렌식 전문인력양성 방안에 관한 연구)

  • Shin, Jun Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.4
    • /
    • pp.779-789
    • /
    • 2014
  • A number of universities around the world provide various undergraduate and graduate programs for digital forensic. In this paper, we propose a cross-layer program suitable for senior students in the IT and law departments to learn multi-disciplinary convergence subjects. We have first analyzed the key ingredients of digital forensic and then the current programs in several universities. After describing the qualifications anticipated for digital forensic specialists, we have critically analyzed the courses currently offered in the IT and law departments. Based on the analysis and discussions, we have proposed an IT+law program and two flexible operation schemes of the program for securing the desired level of convergence education.

A Comparison Study on the Comparative Advertising Regulation among Nations (세계 각국의 비교광고 규제에 관한 비교 연구)

  • Lyi, De-Ryong;Lee, Hyun-Seon
    • Korean journal of communication and information
    • /
    • v.26
    • /
    • pp.209-257
    • /
    • 2004
  • Comparative advertising, in which explicit or implicit comparisons are drawn between the advertised brand and its competitors, is commonplace in today's marketplace. While holding the promise of helping consumers make more informed choices among brands, comparative advertising may actually have the opposite effect when they mislead consumers about the relative merits of competing brands. Therefore government agencies are continuously monitoring the comparative advertising to ensure that it is in the public's interest. The objective of this study is to investigate cross-national differences in comparative advertising regulation. For this, the study analyze the law of comparative advertising in Korea and around the world. The results showed there are differences among nations in the law of comparative advertising and most nations have special legislation on the comparative advertising. The other finding of this study is that the law governing comparative advertising becoming increasingly clear. This study can assist advertisers concerned with providing advertising that is acceptable to countries which they attempt to marker. And this work can contribute to the research scream, building on the work of others in broadening the understanding of that constitutes acceptable comparative advertising in contemporary nations.

  • PDF