• Title/Summary/Keyword: Police Investigation

Search Result 243, Processing Time 0.025 seconds

A Study for the Management of the Wireless Communication for Safety of Firefighteer in Fire Scene (소방공무원 현장안전을 위한 무선통신망 운영에 관한 연구)

  • Son, Eun-Soo;Park, Tae-Sun;Kim, Jong-Nak;Yoon, Myong-O
    • Fire Science and Engineering
    • /
    • v.27 no.1
    • /
    • pp.60-65
    • /
    • 2013
  • From an accident at 2:00 a.m. in November 2nd, 2012 that one fire-fighter died while suppressing the E land World Inc. Fire in Bupyeong-Gu, Incheon, we concluded the problem and the improvement method of using the wireless communication (the two-way radio) that the fire safety officer and the safety crew use when identifying the safety of the fire scene. And after the investigation, we could find that the communication between the fire safety officer and the safety crew was difficult in the scene of the fire by voice because of much noise, so they could rely solely on the wireless communication. Therefore, we investigated the wireless communication and its frequency now used in Incheon Fire Safety Devision. Also, we compared with those of the military and the police. As a result, by making use of the wireless communication and its frequency currently possessed in Incheon Fire Safety Division, we found that the fire safety officer and the safety crew rescuing people at the risk of their own life in the various fire scene can communicate effectively.

A Study on Modus Operandi of Serial Killer -Centering on Ryu Young Chul's case- (연쇄살인범 MO(Modus Operandi)에 대한 고찰 -유영철 사건을 중심으로-)

  • Oh, Yoon-Sung
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.177-200
    • /
    • 2005
  • 2004 summer, most of Korean were shocked from serial killer Ryo young chul's criminal behavior. He had kept anger to society and selected the victim randomly. He killed many females and senior persons. Korean National Police's investigation method to homicide depend on traditional homicide investigative methods. But serial killer's criminal behaviour is evolving frequently. Therefore traditional investigative method is no effective to serial homicide anymore. If traditional investigative method is old version virus vaccine, serial killer's criminal behaviour is newly appeared computer virus. Fortunately all of criminal has modus operandi independently. Any person comes into contact with an object or another persons, a cross-transfer of physical evidence happens. In the future it is impossible to escape from confrontation with serial killer. It can be prospect that more severe copycat serial killer will appear in Korean society. Based on the Ryo young chul's criminal behavior. I'll try to analyse the serial killer's modus operandi through various aspects.

  • PDF

Designing SMS Phishing Profiling Model (스미싱 범죄 프로파일링 모델 설계)

  • Jeong, Youngho;Lee, Kukheon;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.293-302
    • /
    • 2015
  • With the attack information collected during SMS phishing investigation, this paper will propose SMS phishing profiling model applying criminal profiling. Law enforcement agencies have used signature analysis by apk file hash and analysis of C&C IP address inserted in the malware. However, recently law enforcement agencies are facing the challenges such as signature diversification or code obfuscation. In order to overcome these problems, this paper examined 169 criminal cases and found out that 89% of serial number in cert.rsa and 80% of permission file was reused in different cases. Therefore, the proposed SMS phishing profiling model is mainly based on signature serial number and permission file hash. In addition, this model complements the conventional file hash clustering method and uses code similarity verification to ensure reliability.

A Simulation program for verify and reappearance of motor vehicle accident (교통사고 조사 및 재현을 위한 시뮬레이션 프로그램에 관한 연구)

  • Kim, Dong-Hyun;Jeong, Yang-Kwon;Choi, Jae-Ho
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.1
    • /
    • pp.1-9
    • /
    • 2010
  • The research which needs when the traffic accident occurs, the assailant and the victim as the assault person the gain and loss as the damage person does in necessity. Produces shame information which is scientific about the traffic accident which occurs, importance in the effect of visual, about the program which based on the fact that provides the tool which is used from the process which reappears an accident embodies is a thing in the objective self-acknowledgement assailant and the victim. From the research which sees traffic accident site easily, will compose and the fact that applies according to in necessary accident investigation process of the simulation program will be able to reappear goal. From the insurance company and the police station expressed the frame about traffic accident and the sample result to apply reappears from the side of visual the application value was expected with the tool which appropriate in accident control is easy very and is.

A Methodological Study of Korean In-Depth Accident Study DB (한국형 교통사고심층분석자료 구축방법론에 대한 연구)

  • Youn, Younghan;Lee, S.;Park, G.Y.;Kim, M.;Kim, I.;Kim, S.;Lee, J.
    • Journal of Auto-vehicle Safety Association
    • /
    • v.7 no.2
    • /
    • pp.15-18
    • /
    • 2015
  • The availability of in-depth accident data is a prerequisite for each efficient traffic safety management system. Identification and definition of the relevant problem together with knowledge of the data and parameters describing this problem is essential for its successful solution. Comprehensive, up-to-date, accident data is needed for recognition of the scope of road safety problems and for raising public awareness. Reliable and relevant data enable the identification of the contributory factors of the individual accidents, and an unveiling of the background of the risk behaviour of the road users. It offers the best way to explore the prevention of accidents, and ways to implement measures to reduce accident severity. In this study, reviewing the existing iGlad and GIDAS system, KIDAS data format can be finalized through feasibility evaluation. The progressive approach is proposed to successful settlement of Korea in-depth accident study. As the initial stage of in-depth investigation DB construction, the KIDAS is not repetition of the current police based TAAS. It is essential part of improving vehicle safety and reduction of traffic fatality in Korea. 72 Contributing factors like road and traffic characteristics, vehicle parameters, and information about the people involved in the accident have to be investigated and registered as well in the KIDAS.

Comparison of Remaining Data According to Deletion Events on Microsoft SQL Server (Microsoft SQL Server 삭제 이벤트의 데이터 잔존 비교)

  • Shin, Jiho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.223-232
    • /
    • 2017
  • Previous research on data recovery in Microsoft SQL Server has focused on restoring data based on in the transaction log that might have deleted records exist. However, there was a limit that was not applicable if the related transaction log did not exist or the physical database file was not connected to Server. Since the suspect in the crime scene may delete the data records using a different deletion statements besides "delete", we need to check the remaining data and a recovery possibility of the deleted record. In this paper, we examined the changes "Page Allocation information" of the table, "Unallocation deleted data", "Row Offset Array" in the page according to "delete", "truncate" and "drop" events. Finally it confirmed the possibility of data recovery and availability of management tools in Microsoft SQL Server digital forensic investigation.

A Study on Solution of Impeachment Evidence in Criminal Proceedings for Employ by the Convergence (소송절차상 탄핵증거사용 문제에 있어서 융합적 해결에 대한 소고)

  • Lee, Chan-Yeub
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.5
    • /
    • pp.207-217
    • /
    • 2015
  • A Study on Problem of Impeachment Evidence in Criminal Proceedings for Employ by the Convergence Meaning of impeachment evidence in criminal proceedings is liking the spread of the branches moment. The first, there is to set limits of impeachment evidence. The amicable solution is to accept moving flexibly. In a concrete way must to make away with a constituent element unlawfulness. The second, problem a return to probative force exist. This problem agree in principle to resolve an issue for the testimony of an eyewitness. The third, how to admit that institution of criminal investigation after the testimony of an eyewitness exist. This attendant conditions are to eliminate illegality for the authenticity in he testimony of an eyewitness and for the observe due process. Therefore, we must observe due process without illegality to solve the problem for the convergence.

Fire Patterns According to the Blood Hb-CO Concentration of Charred Bodies (소사체의 혈중 헤모글로빈-일산화탄소 농도에 따른 연소형태 연구)

  • Choi, Seung-Bok;Oh, Bu-Yeol;Choi, Don-Mook
    • Fire Science and Engineering
    • /
    • v.26 no.3
    • /
    • pp.40-48
    • /
    • 2012
  • Fire patterns have been used to determine the origin and cause of fires in every setting imaginable. However, it is very difficult to identify fire patterns and causes from the fire-damaged remains of a devastated structure. If someone was killed by the fire, it is possible to identify fire patterns by analyzing the Hb-CO concentration in charred bodies of deceased as well as the pace of the fire. For example, a low level of Hb-CO concentration in the charred bodies indicate a rapid fire with accelerants and the death was caused by severe heat and thick toxic fumes. However, a high level of Hb-CO concentration in the charred bodies demonstrates that the fire was slow and/or there was a flameless form of combustion. Thus, it is possible to identify fire patterns through analyzing the level of Hb-CO concentration on the dead from the fire. In this study, the Hb-CO concentration in the charred bodies was from 3 % at the case of gas burning oneself to death to 93 % at the death caused by smoldering fire.

Yi et al.'s Group Key Exchange Protocol : A Security Vulnerability and its Remediation (Yi등이 제안한 그룹 키 교환 프로토콜의 보안 취약성 및 개선 방법)

  • Lee, Young-Sook;Kim, Jee-Yeon;Won, Dong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.4
    • /
    • pp.91-98
    • /
    • 2012
  • A group key exchange (GKE) protocol is designed to allow a group of parties communicating over a public network to establish a common secret key. As group-oriented applications gain popularity over the Internet, a number of GKE protocols have been suggested to provide those applications with a secure multicast channel. Among the many protocols is Yi et al.'s password-based GKE protocol in which each participant is assumed to hold their individual password registered with a trusted server. A fundamental requirement for password-based key exchange is security against off-line dictionary attacks. However, Yi et al.'s protocol fails to meet the requirement. In this paper, we report this security problem with Yi et al.'s protocol and show how to solve it.

Vulnerability Analysis on Digital Signature Function of Word Processors (워드프로세서의 전자서명 기능에 대한 취약성 분석)

  • Lee, Chang-Bin;Park, Sun-Woo;Lee, Kwang-Woo;Kim, Jee-Yeon;Nam, Jung-Hyun;Lee, Young-Sook;Won, Dong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.8
    • /
    • pp.109-118
    • /
    • 2011
  • Recently, electronic documents are deployed in many areas. However, trust concerns arise owing to the fact that detecting whether an electronic document is modified or not is not an easy process. To facilitate this process, many word processors provide digital signature capabilities on themselves. However, there were not much research on the security of digital signature function of various programs including Microsoft Word and Hancom Hangul. Therefore, in this paper, we analyze the security of Microsoft Word and Hancom Hangul, and propose improvements for their digital signature schemes.