• Title/Summary/Keyword: 불법무기

Search Result 12, Processing Time 0.022 seconds

Similarity on Types of Illegal Weapon Self-report (불법무기 자진신고의 대상별 유사성)

  • Joo, Il-Yeob;Cho, Kwang-Rae
    • Korean Security Journal
    • /
    • no.53
    • /
    • pp.137-157
    • /
    • 2017
  • The purpose of this study was to analyze similarity on types of illegal weapon self-report such as firearms, swords, shells, bullets, explosives in 16 regions of Korea in 2011, 2015. The results of this study were as follows. First, the types of illegal weapon self-report in 2011 were divided into two clusters, such as (1) 'cluster 1' including firearms, swords, shells and explosives, (2) 'cluster 2' including bullets. Second, the multidimensional scales on the types of illegal weapon self-report in 2011 were firearms located in the lower right corner(4/4), swords located in the lower right corner(4/4), shells located in the lower right corner(4/4), bullets located in the center left corner(3/4), explosives located in the higher right corner(1/4). Third, the types of illegal weapon self-report in 2015 were divided into two clusters, such as (1) 'cluster 1' including firearms, swords, shells and explosives, (2) 'cluster 2' including bullets. Forth, the multidimensional scales on the types of illegal weapon self-report in 2015 were firearms located in the lower right corner(4/4), swords located in the higher right corner(1/4), shells located in the higher right corner(1/4), bullets located in the center left corner(2/4), explosives located in the center right corner(4/4).

  • PDF

Electronic Cash System based on Fair Blinding Signature for Mobile-Commerce Service (M-Commerce향상을 위한 전자화폐 공정 은닉 서명 시스템)

  • 이현주;이충세
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10c
    • /
    • pp.568-570
    • /
    • 2002
  • 무선 전자상거래(M-Commerce)는 이동 통신 네트워크 기술과 무선 단말기를 기반으로 하여 언제 어디서나 필요한 시점에서 행할 수 있는 상거래를 의미하며 이때, 전자지불 방식의 하나인 전자화폐는 실물화폐와 유사한 성질을 만족해야 한다. 본 논문에서는 이산대수문제에 기반한 메타-메시지 복원과 은닉 서명 기법을 이용하여 전자화폐가 이중사용, 돈 세탁 그리고 불법 무기 구매 둥 부정한 수단으로 악용되었을 때 신뢰센터가 사용자의 익명성을 제어하고 지불 금액을 다시 복원할 수 있는 알고리즘을 제안한다.

  • PDF

Development of a Collection System of Bait Links to Social Media on Dark Web to Track Drug Crimes (마약 범죄 추적을 위한 다크웹 상의 소셜미디어 유인 링크 수집체계 개발)

  • Sol-Kyu Park;Jiyeon Kim;Chang-Hoon Kim
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2024.01a
    • /
    • pp.123-125
    • /
    • 2024
  • 다크웹(Dark Web)은 마약, 불법 촬영물, 해킹, 무기 등 불법 콘텐츠의 공유 및 거래가 이루어지는 인터넷 영역으로서 최근에는 소셜미디어와 연계된 형태로 범죄 양상이 변화하고 있다. 본 논문에서는 최근 국내 외 사회 문제로 대두되고 있는 마약 범죄를 추적하기 위한 다크웹 수사 기술로서 다크웹 사용자를 소셜미디어로 유인하는 마약 정보 수집체계를 개발한다. 먼저 미국 마약단속국에서 공개한 대표적인 마약 용어 3개의 표준어 및 은어를 검색 키워드로 사용하여 마약 관련 다크웹을 수집하고, 수집된 다크웹을 크롤링하여 소셜미디어 계정 링크를 추출한다. 본 논문에서는 다양한 소셜미디어 중, 트위터 및 텔레그램 접속 링크를 수집하였으며 실험 결과, 접속 가능한 총 54개 다크웹 도메인의 9,046개 웹 페이지에서 트위터 유인 링크 567개, 텔레그램 유인 링크 118개를 추출하였다.

  • PDF

A Study on 2010 Beijing Convention for Antiterrorism of International Aviation - Compared Beijing Convention(2010) with Montreal Protocol - (국제항공테러방지 북경협약(2010)에 관한 연구 - 몬트리올협약과의 비교를 중심으로 -)

  • Hwang, Ho-Won
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.25 no.2
    • /
    • pp.79-112
    • /
    • 2010
  • The Beijing Convention of 2010 taken together effectively establishes a new broader and stronger civil aviation security framework. This adoption would significantly advance cooperation in prevent of the full range of unlawful acting relation to civil aviation and the prosecution and punishment of offenders. First, the Beijing Convention of 2010 will require parties to criminalize a number of new and emerging threats to the safety of civil aviation, including using aircraft as a weapon and organizing, directing and financing acts of terrorism. These new treaties reflect the international community's shared effort to prevent acts of terrorism against civil aviation and to prosecute and punish those who would commit them. Second, this convention will also require States to criminalize the transport of biological, chemical, nuclear weapons and related material. These provisions reflect the nexus between non-proliferation and terrorism and ensure that the international community will act to combat both. Third, this Convention shall not apply to aircraft used in military, customs or police services. As a substitute, International Humanitarian Law will be applied in a case. Moreover, the National Jurisdiction and the application of the law will be extended farther. The treaty promotes cooperation between States while emphasizing the human rights and fair treatment of terrorist suspects.

  • PDF

Derivation of Anti-Tamper System Requirements Based on CMVP Standard for Technology Protection of Weapon Systems (무기 시스템의 기술 보호를 위한 CMVP 표준 기반의 Anti-Tamper 시스템 요구사항 도출)

  • Lee, Min-Woo;Lee, Jae-Chon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.4
    • /
    • pp.470-478
    • /
    • 2019
  • As the growth of the domestic defense industry is remarkable regarding technology level and export size, technology protection is necessary. Particularly, there is a need to apply anti-tamper measures to prevent critical technologies from illegally being taken out of weapon systems. However, there is no security protection strategy and system built yet in ROK. Precedent studies discussed the trend analysis and technical research for specific protective techniques, and the application of anti-tamper using limited procedures was provided. Recently, methods of how to select the technology for protection were studied based on risk management. Nonetheless, these studies cannot be associated with the acquisition process for the whole life-cycle, having difficulty with actual development and evaluation of the weapon systems. The objective of our study is to derive the system requirements of the weapon system for which anti-tamper measures have been determined to apply. Specifically, requirements items suitable for the development of anti-tamper weapon systems were derived based on ISO/IEC 19790, the CMVP standard for the development and verification of cryptographic modules. Also, its utilization in technical reviews and test & evaluations was presented. The usefulness of the research results was confirmed through inductive inference and comparative evaluation. The result can be expected to play a role in initiating extensive activities needed for technology protection of the weapon systems.

Risk Management-Based Application of Anti-Tampering Methods in Weapon Systems Development (무기 시스템 개발에서 기술보호를 위한 위험관리 기반의 Anti-Tampering 적용 기법)

  • Lee, Min-Woo;Lee, Jae-Chon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.12
    • /
    • pp.99-109
    • /
    • 2018
  • Tampering involves illegally removing technologies from a protected system through reverse engineering or developing a system without proper authorization. As tampering of a weapon system is a threat to national security, anti-tampering measures are required. Precedent studies on anti-tampering have discussed the necessity, related trends, application cases, and recent cybersecurity-based or other protection methods. In a domestic situation, the Defense Technology Protection Act focuses on how to prevent technology leakage occurring in related organizations through personnel, facilities and information systems. Anti-tampering design needs to determine which technologies are protected while considering the effects of development cost and schedule. The objective of our study is to develop methods of how to select target technologies and determine counter-measures to protect these technologies. Specifically, an evaluation matrix was derived based on the risk analysis concept to select the protection of target technologies. Also, based on the concept of risk mitigation, the classification of anti-tampering techniques was performed according to its applicability and determination of application levels. Results of the case study revealed that the methods proposed can be systematically applied for anti-tampering in weapon system development.

수입식품에 불법 첨가한 비아그라 유사체의 규명과 대응

  • Hong, Mu-Gi
    • Proceedings of the Korean Society of Food Hygiene and Safety Conference
    • /
    • 2004.05a
    • /
    • pp.49-68
    • /
    • 2004
  • New analogues of Sildenafil (Viagra${\circledR}$)were identified in the imported Chinese herb drinks, which have been added illegally for affecting penile erectile dysfunction. In order to elucidate the chemical structures of Sildenafil analogues, separation and purification were carried out and followed by analysis of the routine 1D and 2D NMR spectroscopy and FAB mass spectrometry. Based on analytical data one compound was maned as Homosildenafil contains ethylpiperazine switched with methylpiperazine of Sildenafil and the other one was called an Hongdenafil contains ethylpiperazine switched with methylpiperazine and acetyl group instead of sulfonyl group of Sildenafil. As results, Homosildenafil and Hongdenafil were put on the list as new inspection items of the imported food for protectiong public health in Korea.

  • PDF

Classification of Service Types using Website Fingerprinting in Anonymous Encrypted Communication Networks (익명 암호통신 네트워크에서의 웹사이트 핑거프린팅을 활용한 서비스 유형 분류)

  • Koo, Dongyoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.4
    • /
    • pp.127-132
    • /
    • 2022
  • An anonymous encrypted communication networks that make it difficult to identify the trace of a user's access by passing through several virtual computers and/or networks, such as Tor, provides user and data privacy in the process of Internet communications. However, when it comes to abuse for inappropriate purposes, such as sharing of illegal contents, arms trade, etc. through such anonymous encrypted communication networks, it is difficult to detect and take appropriate countermeasures. In this paper, by extending the website fingerprinting technique that can identify access to a specific site even in anonymous encrypted communication, a method for specifying and classifying service types of websites for not only well-known sites but also unknown sites is proposed. This approach can be used to identify hidden sites that can be used for malicious purposes.

Study on Biodegradable Polyurethane Foam for Non-lethal Weapon (비 살상 무기 개발을 위한 생분해성 발포 폴리우레탄에 대한 연구)

  • Lee, Hyang Moo;Kim, Young Hyun;Kim, Kyung Won;Cheong, In Woo
    • Journal of Adhesion and Interface
    • /
    • v.17 no.1
    • /
    • pp.21-28
    • /
    • 2016
  • Foam-type biodegradable polyurethane adhesives were developed as a non-lethal weapon against illegal fishing boats. The adhesives were prepared from a hardener of polymeric methylene diphenyl diisocyanate (MDI) and a base composed of polyester and/or polyether polyols. In order to accelerate biodegradability, starch, dextrin, and amylase were added into the base, and which present about 34% degradability within 4 weeks confirmed by OECD 301C method. For proper mixing and corresponding prompt foam reaction, viscosities of hardener and base compositions were investigated in the temperature ranges from 0 to $50^{\circ}C$. For fast completion of the foam forming and corresponding adhesion, rising time was recorded in the same temperature range, and the rising time of the adhesive was varied within around 1 minute. T-peel adhesion tests with cotton fabrics were performed which showed 20.78 N/cm and 11.95 N/cm as the maximum and the average values, respectively.

The Nature of Reform in the U.S., UK, Germany National Intelligence Systems and Implications for Reform of the Korean National Intelligence Service (미국·영국·독일 국가정보체계 개혁 양상과 한국 국가정보원 개혁에 대한 시사점)

  • Yoon, Taeyoung
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.167-177
    • /
    • 2018
  • Major countries, such as the U.S., UK and Germany have reformed their national intelligence systems in the face of transnational, asymmetric and comprehensive threats since September 11, 2001 and have strengthened the intelligence capacity involved in countering terrorism and WMD proliferation, right/left extremism threats. The Korean Moon Jae-in government is preparing a reform plan to eliminate illegal political intervention and abuse of power by the National Intelligence Service(NIS) and to rebuild it as an efficient national intelligence agency for national security. In discussing the reform direction of the NIS, it is necessary to discuss in detail whether adopting a separate model of intelligence agencies to restrict domestic intelligence activities of the NIS and concentrate on foreign intelligence activities or establish new domestic intelligence agencies. Second, as for the issue of transferring anti-Communism investigation authority of the NIS to the police, it needs to be carefully considered in terms of balancing the efficiency and professionalism of intelligence agency activity in the context of North Korea's continuous military provocation, covert operations and cyber threats. Third, it should strive to strengthen the control and supervision functions of the administration and the National Assembly to ensure the political neutrality of the NIS in accordance with the democratization era, to guarantee citizens' basic rights and to improve the transparency of budget execution.

  • PDF