• Title/Summary/Keyword: Police Agencies

Search Result 101, Processing Time 0.025 seconds

A Study on the Effective Utilization of Public Service Drones - Focused on Search and Rescue Drones - (공공임무용 드론의 효과적 활용방안에 관한 연구 - 실종자 수색용 드론을 중심으로 -)

  • Kang, Wook
    • Korean Security Journal
    • /
    • no.62
    • /
    • pp.65-86
    • /
    • 2020
  • Drones, which were originally developed for military purpose, have expanded rapidly not only in hobbies, leisure, but also in broadcasting, filming, and public sectors, and search and rescue drones have been used to find four Korean teachers who went to Nepal for volunteer work but went missing in the avalanche. The government is encouraging the use of drones in the public sector as a policy to foster the drone industry, and the market is expected to expand in the future. This study presents improvement measures and specific directions for use of drones by public agencies at a time when the use of drones is expanding in the public sector. To that end, this research reviewed the interviews of relevant experts, analysis of drone operation regulations by public agencies, and the cases of operation of drones for searching missing persons by police. First of all, it will have to secure skilled personnel before the introduction of the drones and then determine the specifications of the drones through sufficient review, and then be put into the mission after careful examination of the drones. Next, it is necessary to draw up a base rule for drone operation and draw up a manual accordingly. Finally, drone flight has the risk of a crash, and it is essential to secure dedicated personnel for drone operation, especially since drones in the public sector are specialized in large scale compared to hobby drones to achieve their purpose. This research only conducted a detailed analysis of the National Police Agency's drones for searching for missing persons, and there are limitations to the number of people interviewed. Subsequent studies will require analysis of various public institutions, and in addition to interviews, surveys will require analysis of various data and statistics.

Study on Police-led National Response against CBRN Terror by Strengthening the Standing Cooperation System of the Interagencies (다부처 상설 협력체계 구축을 통한 경찰주도 국가 화생방 테러대응 발전방안)

  • Cha, Jang-Hyeon;Kang, Taeho;Kim, Daesoo;Lee, Hochan
    • Korean Security Journal
    • /
    • no.59
    • /
    • pp.217-242
    • /
    • 2019
  • Nowadays, Terrorism has become bloodier. Unlike the past, the recent terrorism has been indiscriminate in the purpose of mass- killing. Given this aspect, the threat of a CBRN attack is the biggest one to modern society. Notably, the possibility of terrorist attacks in Korea by international terrorist groups such as ISIL is higher than ever in consideration of its allusion; crusades and the devil's allied forces. To overcome these circumstances, various measures have been taken for counter terrorism at the state level including anti-terrorist legislation. Under the anti-terrorist act, police have to lead relevant inter agencies when it comes to the CBRN terror. At first glance, current countermeasures would work well. However, in order to respond quickly, the standing cooperations system of related departments need to be set up. In this sense, this article proposed a coagulatory body that could not only consider institutional-oriented organizational restructuring and response but also integrate and operate functions of various specialized institutions. It also stressed that the council should move toward a consultative body of information gathering, distribution and working- level consultation. With this cooperation system, counter-terrorism agencies can respond rapidly, stop wasting their effort and assets by about 30%. Also, they could design the atypical aspect of terrorism into standardized.

A Study on the Improvement of Aviation Security System for the Prevention of Terrorism in Aircraft - Focusing on the Prevention, Preparedness, Response and Punishment Regulations of the Aviation Security Act -

  • Moon, Hyeon-Cheol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.4
    • /
    • pp.189-195
    • /
    • 2020
  • The whole world is anxious that aircraft could be used as a tool for terrorism after 9/11. The disappearance of Malaysia Airlines is again adding to fears about aircraft. Because these aircraft attacks cause many human casualties, the purpose of the study is to analyze the problems in the current air security system and to present alternatives. The methodology of the study used a literature research methodology to review the current status of aircraft terrorism and related regulations, such as current aviation-related laws and anti-terrorism laws, and prior studies. The purpose of the Chapter is to present an aviation security system that promotes the safety of air traffic through the prevention of aircraft terror by presenting the roles and improvement measures of aviation security personnel, foreign police officers, intelligence agencies, and legal blind spots and flaws.

Records Management Systems of the Colonial Chosun Government General (조선총독부의 기록관리제도)

  • Yi, Kyung-Yong
    • The Korean Journal of Archival Studies
    • /
    • no.10
    • /
    • pp.226-273
    • /
    • 2004
  • The characteristics of the records management systems of the Japanese colonial government can be summarized as follows. First, the Government General adopted a "decentralized retention" of public records. The Government General did not establish its own archives for central preservation of permanent public records. Colonial agencies established its own records office and the records office managed the records its agency created. Secret records and police records were exception. They were retained by the Secretary Office of the General Affairs Division and Police Division of the Chosun Government General respectively. Second, filing systems and retention periods of the public records followed the hierarchic structure of organization. In the headquarter of the government, records were filed by a "bureau-division-activity-file" classification system and a retention period of a file was given automatically by each unit the file belonged. A closed and cut-off file was retained and arranged according to its creating unit, creating year, and retention period. The filing system was easy to use once the filing system was established well, but to make it work effectively changes in activities and organizations should be on a reflected regular basis. It had an advantageous effect that permanent records could be preserved in a unified way throughout the organization. However, it is very critical to determine the permanent records in a professional way. Selection of the permanent records should be done professionally and in a historical perspective. Otherwise, the records retained as permanent records were not the records having an enduring value. And that was not done by the colonial government. Third, classification and scheduling of records were carried out by a creating division, rather than by the Records Office, mostly from the 1920s. Compilation of the records was also done by the creating agency. It implies that the records management lacked the professionalism. In conclusion, the records management system of the Chosun Government General wes nither modern nor user oriented. It managed the records for solely administrative purpose, i.e. effective colonial rule. The legacy of the colonial records system still exists in the public records system in Korean government. One should criticize the lack of will and efforts to modernize the public records system since the establishment of the Korean government while should reflect the historical origins of the records system in Korea.

The China Coast Guard Law (2021): A New Tool for Intimidation and Aggression (중국해안경비법(Coast Guard Law)(2021): 위협과 공격을 위한 도구)

  • Pedrozo, Raul (Pete)
    • Maritime Security
    • /
    • v.3 no.1
    • /
    • pp.1-44
    • /
    • 2021
  • China's new Maritime Policy Law (MPL) purports to regulate the duties of China's maritime police agencies, including the China Coast Guard, and safeguard China's sovereignty, security, and rights and interest. The MPL has potentially far-reaching application, as China claims extensive maritime areas off its mainland and in the South China Sea. This expansive application of maritime law enforcement jurisdiction is problematic given that most of China's maritime claims are inconsistent with international law. To the extent that the MPL purports to assert jurisdiction over foreign flagged vessels in disputed areas or on the high seas, it contravenes international law. Numerous provisions of the MPL regarding the use of force are also inconsistent with international rules and standards governing the use of maritime law enforcement jurisdiction, as well as the UN Charter's prohibition on the threat or use of force against the territorial integrity or political independence of any state. China could use the MPL as a subterfuge to advance its illegal territorial and maritime claims in the South and East China Seas and interfere with coastal State resource rights in their respective exclusive economic zone.

  • PDF

A Study on the Characteristics and Progress of New Voice Phishing Based on Psychological Descriptions (심리적 기재를 기반으로 한 신종 보이스피싱의 특성 및 진행과정에 관한 연구)

  • SeiYouen Oh;HyeJin Song
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.3
    • /
    • pp.510-518
    • /
    • 2023
  • Purpose: This study compares and analyzes the characteristics and progress of existing voice phishing and new voice phishing to present a basic policy plan to prepare countermeasures against new voice phishing based on psychological descriptions. Method: The criminal progress and characteristics of the two were compared and analyzed through damage cases on various portal sites centered on voice phishing crime scenarios. Result: As a result of analyzing the progress of the third stage of new voice phishing, the scenario of new voice phishing that can deceive victims was written more carefully and the scope of the crime was expanded. In the crime execution stage, the victim was socially isolated, reducing the victim's judgment ability, making it more difficult for investigative agencies to investigate, and in the final stage, the continuity and expansion of criminal damage such as extortion of money and valuables are shown. Conclusion: There were differences in the target and scope of the crime and the method of the crime strategy between the two, and the possibility of damage is much greater, so a more efficient response strategy should be prepared.

Study of the Progressive Party Case Records through the Lens of Archival Science (진보당 형사사건기록에 대한 기록학적 고찰)

  • Lee, JuYoung;Jeon, HyunSoo
    • The Korean Journal of Archival Studies
    • /
    • no.77
    • /
    • pp.109-150
    • /
    • 2023
  • Prior researchers interpreted the records of criminal cases involving the Progressive Party from a historical perspective. In marked contrast to existing trends, this study examines the Progressive Party case records through the lens of archival science. This study dissects the Progressive Party case records as a single and complete record group and at each stage of their life cycle from police investigation through criminal prosecution to trial. This approach enables a holistic analysis of archival characteristics of the records. This study begins with an appraisal of the nature and types of case records generated and maintained by the various agencies in light of the investigatory authorities delegated to each institution. This study then dissects the police, prosecution, and Counter Intelligence Corps records leading up to the indictment of Progressive Party members as well as the court records of the trial that followed. In particular, this study reveals the insufficiency and illegality of the evidence against the defendants in the Progressive Party case from an archival standpoint. Setting aside the admissibility or strength of the evidence under criminal law, the present study demonstrates that the records lack reliability, authenticity, and integrity-the fundamental attributes required for evidentiary efficacy of records from an archival standpoint.

Research trend analysis of the introduction at the issue of private investigation institution (민간조사제도 도입시 쟁점에 대한 연구동향 분석)

  • Seo, Jin-Seok
    • Convergence Security Journal
    • /
    • v.15 no.3_2
    • /
    • pp.11-19
    • /
    • 2015
  • This paper, so far to analyze the research trends in the issue that has been discussed for the introduction of private investigation institutions, by projecting its suggestion, want the investigation purpose of presenting the desirable introduction direction. The analyzed issue was extracted for existing research material on the introduction of private investigation institutions. Investigators pointed out issue is the name, business scope, corporate, qualification system (eligibility criteria and test), education, association establishment, regulatory agencies, has been included in the eight categories such as legislation form. For the name, I think there is a need to unify under the name "detective". For the scope of work, the amendment is difficult law, place an overview of the general business rules, more specific and detailed investigation business content, to discipline through the ordinance it is possible to be rational. Private investigation institutions, I think the need for limited operations of the corporation. For education, the new education and re-education on a regular basis I do for the private investigation workers. You must be one of the National Police Agency to the management authority. Legislative form, not to be defined by its own law, the revision of the security law, but that is to complement the provisions for private sector research system is effective.

Designing SMS Phishing Profiling Model (스미싱 범죄 프로파일링 모델 설계)

  • Jeong, Youngho;Lee, Kukheon;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.293-302
    • /
    • 2015
  • With the attack information collected during SMS phishing investigation, this paper will propose SMS phishing profiling model applying criminal profiling. Law enforcement agencies have used signature analysis by apk file hash and analysis of C&C IP address inserted in the malware. However, recently law enforcement agencies are facing the challenges such as signature diversification or code obfuscation. In order to overcome these problems, this paper examined 169 criminal cases and found out that 89% of serial number in cert.rsa and 80% of permission file was reused in different cases. Therefore, the proposed SMS phishing profiling model is mainly based on signature serial number and permission file hash. In addition, this model complements the conventional file hash clustering method and uses code similarity verification to ensure reliability.

Design and Implementation of a Protocol for u-Safety Service (u-안심 서비스 프로토콜 설계 및 구현)

  • Cho, Byung Soon;Lee, Jae Min
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.12
    • /
    • pp.117-128
    • /
    • 2013
  • u-safety service system inter-works with the diverse operation agencies, through CCTV network, such as the emergency call terminal with built-in GPS, the mobile communication network, u-safety service provider, relay system and CCTV control center. In the case of the emergency call, this service searches the location of caller in real time, and then continues to search the location of caller through the control of CCTV in the searched place, and can provide the several agencies like guardian, police office, fire station, hospitals, relief organizations and municipalities, with the diverse information necessary for the secure rescue through SMS and wired network. In this paper, a new protocol and specification for u-safety service relay system is designed and implemented. The effectiveness of presented protocol is verified by computer simulation. The designed protocol of u-safety service is applied to real 3GPP and 3GPP2 mobile communication networks to verify its performance.