• Title/Summary/Keyword: violent crime

Search Result 56, Processing Time 0.037 seconds

A Study on the Realities and Analysis of Crime Related to Security Guard (경호경비 관련 주요범죄에 대한 실태분석)

  • Kim, Chang-Ho;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.65-79
    • /
    • 2008
  • This study started with the need to have a basic understanding of the crimes related to security guard in Korea. For this purpose, it attempted to analyze the crimes related to security guard occurring in Korea for the years, the cause for those crimes to occur, and the basic cause for those crimes such as criminals' educational level, age, occupation and so forth investigate how those crimes occurred. And ultimately it was intended to provide referential materials for perfect security guard from the stage of its planning to the stage of implementation and termination by analyzing how the machinery of law treated those criminals. This study aimed to help security guards to perform their role by investigating the cause and disposition of crimes related to security guard occurring for the years in order to cope with the emergency situation frequently occurring in the job of security guard. To attain the goal of study, this study attempted to do the following tasks: First, to analyze existing crimes and investigate the crimes related to security guard in order to investigate how the criminal act occurred in relation to the crime related to security guard, numerous kinds of crimes. Second, to investigate in what case the criminal act occurred by analyzing the criminal environment, the yearly, monthly and weekly frequency of those crimes and the like in relation to this criminal act. Third, to grope the alternative to cope effectively with all sorts of dangerous situations on the spot of security guard by analyzing the crimes related to security guard and investigating the effective scheme for coping with it.

  • PDF

A study on the distribution of latent fingerprints on paper knife sheaths (간이 칼집에서의 잠재지문 분포에 관한 연구)

  • Kim, Hyo-Mi;Park, Gi-Hyun;Lee, Su-Bhin;Yu, Je-Seol
    • Analytical Science and Technology
    • /
    • v.34 no.6
    • /
    • pp.251-258
    • /
    • 2021
  • Knives are most frequently used as weapons in violent crimes. Criminals leave behind knife sheaths made of paper and tape at crime scenes. It is difficult to develop fingerprints using tape attached to a porous surface, resulting in the need to explore effective techniques for identifying fingerprints as well as the distribution of fingerprints on each surface, when evidence such as paper knife sheaths are found. In this study, 50 knife sheaths were prepared. The cyanoacrylate fuming (CA fuming) method was applied to develop fingerprints on the non-adhesive side of the tape, and a dual-purpose 1,2-indanedione/Zn (1,2-IND/Zn) reagent was used to separate tape from paper while simultaneously developing fingerprints on the paper. The fingerprints on the adhesive side of the tape were developed using Wet Powder Black®. Using the R statistical analysis program (The R Foundation for Statistical Computing), we used a heat map to indicate the location of fingerprints developed from each surface. More fingerprints were detected at the ends than in the center of the adhesive side of the tape, and although the non-adhesive sides of tape and paper did not present clear distribution patterns, many fingerprints were developed that had sufficient clarity for personal identification. The results of this study may be applicable for processing evidence when paper sheaths are found at crime scenes.

An Investigation of Technical Methods to Solve the Internet Negative-Function (인터넷 역기능을 해결키 위한 기술적 방법론에 대한 검토)

  • 조동욱;신승수
    • The Journal of the Korea Contents Association
    • /
    • v.2 no.4
    • /
    • pp.40-45
    • /
    • 2002
  • The network community provides people a new area which is called a cyber area, not physical area. However, today in the cyber area, the negative function has been causing social problem. In fact, it has not been causing by original function. Specifically speaking, main reason why it's leading to the negative function is that teenagers are logging into inappropriate sites (such as: violent, adult sites) to unnecessary sites (such as: e-mails with unknown signs combined with words, inappropriate language used in certain web board). Not only that, private password and ID's are being used by unknown user to accomplish illegal access. If this problem does not get solved through immediate development of technologies method, the cyber crime will increase in short period of time. The purpose of this paper is to understand each analyzed method which can cope with negative internet function, to discuss suitable management in certain web board an to check with fuzzy intercommunication mood.

  • PDF

Identifying the Difference between Actual Reporting Voices and False Reporting Voices for Development of the False Report Discrimination System (허위 신고 판별 시스템 개발을 위한 실제 신고 음성과 허위 신고 음성의 차이 규명)

  • Lee, Bum Joo;Cho, Dong Uk;Park, Young;Jeong, Yeon Man
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.4
    • /
    • pp.848-854
    • /
    • 2017
  • Recently, false reports to governmental offices such as police stations have not been decreased. As a result, if a violent crime or a fire occurs that needs to be promptly responded to and reacted to these accidents in real time, it may lead to serious results such as loss of life. Also, the waste of police enforcement and administration due to false reporting can cause serious problems. In this paper, we try to clarify the difference between the actual and false reports based on the actual sound sources which were reported to the police stations. In addition, we will intend to develop a false report discrimination system that can identifies false reports and actual reports based on this.

Object classification and the number of pixels compared with children protection (화소 수 비교를 통한 성인과 유아 구분 방법)

  • Kang, ji-hun;Kim, chang-dae;Ryu, sung-pil;Kim, dong-woo;Ahn, jae-hyeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.725-728
    • /
    • 2014
  • Continue to have an increasingly violent crimes against children every year, and as you know all seriousness is classified as a felony. However, efforts to reduce the underlying crime is low. Therefore, it is necessary to solve this problem, the security system. Is to protect the children and adults that exist that can pose a threat to children to identify and monitor tracking method in this paper. Was based on a Korean standard body size of a person, such as keys, arm length, leg length, head vertical length, head width proposed method. Also, separate the adults and children through the comparison of the reference value, the ratio and the ratio of the number of pixels of the detected object, the proposed method. Processing speed is fast because it detects only a specific object region in the entire image in the handling method in the proposed method the five nine minutes. The advantage is to enable comparison of the specific object, through which there is.

  • PDF

Analysis of the Case with Serial Killer Young Cheol Yoo (유영철 연쇄살인사건 분석)

  • Lee, Jin-Dong;Lee, Sang-Han
    • Journal of forensic and investigative science
    • /
    • v.2 no.1
    • /
    • pp.32-51
    • /
    • 2007
  • Serial violent crimes have occurred more frequently. Additional attention is paid to relevant areas in which discussions has also increased. This study analyzed Young-cheol Yoo, serial killer case. Two of Yoo's crimes were studied for modus operandi. The cases selected were the premeditated break-in homicide of upper-class elderly people and the impulsive homicide of the Hwanghak-Dong street vendor. Crime motives, targets, times, places, means and methods were analyzed. Profiling techniques in Young-cheol Yoo cases were evaluated and the problems discovered during investigation were discussed. The followings are the findings of the analysis of the serial killer Yoo cases. Yoo exhibited a hatred toward the rich, the elderly, and women as well as a fear of diseases and death. Yoo's crime targets were the elderly residing in wealthy houses, street vendors and prostitutes. The numbers of victims were: 3 men and 5 women victims in 4 homicide cases involving the elderly residents in wealthy houses; one man in 1 street vendor homicide case 11 women in 11 prostitute homicide cases, so total 20 persons were murdered in 16 cases. The time of the crimes were between 10 am and noon in the homicide cases of the elderly and very late at night or early in the morning in the prostitute homicide cases. Means and methods facilitated include the use of a knife as a threat and a hammer made by Yoo to strike the head and face of victims. In the homicide cases involving the elderly, he attempted to disguise the crime scene as a burglary or committed arson to destroy the evidence; in the prostitute homicide cases, bodies were mutilated and buried in secret. 1) Generally each serial killer case has different characteristics, motives, and purposes; while some serial killer cases involve similar methods, others use different methods. Unlike other crimes, serial killers' characteristics and tastes are very different, so it is difficult to explain serial killings based on a specific model. It is important to accurately capture modus operandi of each serial killing and for detectives to familiarize themselves with them. The process of tracing and use of imagination which follows a serial killer's psychology and thought must be used to find out what kind of thoughts pushed the killer to commit the crime. In order to investigate and research difficult subjects such as serial killing, various methods, skills, and relevant knowledge should be studied, and institutional endeavors should go hand in hand with individual efforts.

  • PDF

Electronic Roll Book using Electronic Bracelet.Child Safe-Guarding Device System (전자 팔찌를 이용한 전자 출석부.어린이 보호 장치 시스템)

  • Moon, Seung-Jin;Kim, Tae-Nam;Kim, Pan-Su
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.143-155
    • /
    • 2011
  • Lately electronic tagging policy for the sexual offenders was introduced in order to reduce and prevent sexual offences. However, most sexual offences against children happening these days are committed by the tagged offenders whose identities have been released. So, for the crime prevention, we need measures with which we could minimize the suffers more promptly and actively. This paper suggests a new system to relieve the sexual abuse related anxiety of the children and solve the problems that electronic bracelet has. Existing bracelets are only worn by serious criminals, and it's only for risk management and positioning, there is no way to protect the children who are the potential victims of sexual abuse and there actually happened some cases. So we suggest also letting the students(children) wear the LBS(Location Based Service) and USN(Ubiquitous Sensor Network) technology based electronic bracelets to monitor and figure out dangerous situations intelligently, so that we could prevent sexual offences against children beforehand, and while a crime is happening, we could judge the situation of the crime intelligently and take swift action to minimize the suffer. And by checking students' attendance and position, guardians could know where their children are in real time and could protect the children from not only sexual offences but also violent crimes against children like kidnapping. The overall system is like follows : RFID Tag for children monitors the approach of offenders. While an offender's RFID tag is approaching, it will transmit the situation and position as the first warning message to the control center and the guardians. When the offender is going far away, it turns to monitoring mode, and if the tag of the child or the offender is taken off or the child and offender stay at one position for 3~5 minutes or longer, then it will consider this as a dangerous situation, then transmit the emergency situations and position as the second warning message to the control center and the guardians, and ask for the dispatch of police to prevent the crime at the initial stage. The RFID module of criminals' electronic bracelets is RFID TAG, and the RFID module for the children is RFID receiver(reader), so wherever the offenders are, if an offender is at a place within 20m from a child, RFID module for children will transmit the situation every certain periods to the control center by the automatic response of the receiver. As for the positioning module, outdoors GPS or mobile communications module(CELL module)is used and UWB, WI-FI based module is used indoors. The sensor is set under the purpose of making it possible to measure the position coordinates even indoors, so that one could send his real time situation and position to the server of central control center. By using the RFID electronic roll book system of educational institutions and safety system installed at home, children's position and situation can be checked. When the child leaves for school, attendance can be checked through the electronic roll book, and when school is over the information is sent to the guardians. And using RFID access control turnstiles installed at the apartment or entrance of the house, the arrival of the children could be checked and the information is transmitted to the guardians. If the student is absent or didn't arrive at home, the information of the child is sent to the central control center from the electronic roll book or access control turnstiles, and look for the position of the child's electronic bracelet using GPS or mobile communications module, then send the information to the guardians and teacher so that they could report to the police immediately if necessary. Central management and control system is built under the purpose of monitoring dangerous situations and guardians' checking. It saves the warning and pattern data to figure out the areas with dangerous situation, and could help introduce crime prevention systems like CCTV with the highest priority. And by DB establishment personal data could be saved, the frequency of first and second warnings made, the terminal ID of the specific child and offender, warning made position, situation (like approaching, taken off of the electronic bracelet, same position for a certain time) and so on could be recorded, and the data is going to be used for preventing crimes. Even though we've already introduced electronic tagging to prevent recurrence of child sexual offences, but the crimes continuously occur. So I suggest this system to prevent crimes beforehand concerning the children's safety. If we make electronic bracelets easy to use and carry, and set the price reasonably so that many children can use, then lots of criminals could be prevented and we can protect the children easily. By preventing criminals before happening, it is going to be a helpful system for our safe life.

Police security measures for foreign criminals : Focusing on Suwon (외국인범죄자에 대한 경찰의 치안대책 : 경기도 수원시를 중심으로)

  • Park, Chanhyeok;Seo, Bongsung
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.4
    • /
    • pp.622-633
    • /
    • 2015
  • With recent news reports on violent crimes committed by foreigners, public hatred toward foreign criminals and fear about such crimes are growing, calling into question public safety measures implemented by the police and the immigration system. At the same time, due to globalization and structural changes in the labor market, it is certain that the influx of migrant workers will continue to increase. Against this backdrop, this paper seeks to examine the current status of foreign nationals staying in Korea and their criminal records focusing on Suwon city, and propose public safety measures the police could take with regard to crimes committed by foreigners. Also, the paper looks into public safety measures of the Korea Immigration Service and Suwon city, and suggests short- and long-term measures to prevent crimes committed by foreigners. The paper begins by examining the current public safety measures of the police and Suwon City concerning crimes committed by foreign nationals residing in Korea. Based on such examination, it points out insufficient patrol and investigation personnel as problems, and recommends short- and long-term measures for future improvement. This paper maintains that for the Korean society to successfully deal with the increasing number of foreigners in Korea, the current immigration system and public safety measures of the police will have to change. While the police alone cannot reduce the crime rates at local and national levels, nonetheless, proactive measures by the police are needed given the growing number of migrant workers and immigrants in Korea. Also important are mindset changes not only of relevant authorities, but also of the public. The paper recommends a set of short-and long-term public safety measures the police should institute to efficiently deal with crimes committed by foreigners.

Legal and Technical Issues of Using Location Information for Police Rescue (경찰 위치추적권 활용의 법적·기술적 문제와 개선방안)

  • Park, Kwang-Ju;Jang, Yun-Sik;Park, Ro-Seop
    • Korean Security Journal
    • /
    • no.53
    • /
    • pp.211-228
    • /
    • 2017
  • In May 2012, the police was empowered to electronically obtain location information of mobile devices from the telecommunication service provides for the purpose of rescue by the Act on the Protection, Use, ETC. of Location Information, after years of pressure with repeated serious violent crime outbreaks and controversy concerning the risk of breaching privacy. This study examines the environmental, legal, and technological challenges related to location tracking at the time of five years after the amendment of the law. The bottom line of police's locating power is to secure the lives of people in deadly emergent circumstance. Therefore, location tracking using given information should be swiftly proceeded after consideration and judgment of justification in timely manner to electronically request information to mobile carriers, and it is necessary to have somewhat flexibility of interpretation to be applied to diverse situation. In addition, location tracking technology should be continuously updated through cooperation with the stake-holders. Recognizing substantial problems in practice, we identified and explored the issues including obtaining prior consent for tracking the user's location in case of emergency, confirmation of emergency situation requiring police presence, qualification of legitimate requester, and limited applicability in various circumstances, which are required to reconsidered in conjunction with the personal information protection laws. Additional practical issues may include the expenses for information provision and other incentives to promote active cooperation by the telecom companies.

  • PDF

Perception of Offender Profiling and its Development Strategies (범죄자 프로파일링에 대한 인식과 발전 방향)

  • Park, Ji-Sun;Choi, Nak-Bum
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.6
    • /
    • pp.413-423
    • /
    • 2012
  • Offender profiling, as a crime investigation technique, aims to respond more effectively to violent crimes. However, attitude that police investigators hold toward offender profiling is quite skeptical, which prevents offender profiling from making effective and practical contributions to police investigations. Therefore, the present study explored development strategies of offender profiling by examining perceptions of offender profiling among 156 Korean National Police University students. Furthermore, a total of 166 students from other universities also participated as a control group. As a result, participants showed positive attitude toward offender profiling, in terms of its necessity, effectiveness, and reliability. However, they believed that Korean police agencies are not making the good use of offender profiling and that profilers are not necessarily taking the lead in solving cases. In terms of the profiler education, the majority of the students who showed interest in becoming a profiler did not know what to learn and how to prepare for becoming one. Finally, limitations of the present study were discussed and suggestions for further research were made.