• 제목/요약/키워드: Crime Investigation

Search Result 205, Processing Time 0.024 seconds

Analysis of Cybercrime Investigation Problems in the Cloud Environment

  • Khachatryan, Grigor
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.315-319
    • /
    • 2022
  • Cloud computing has emerged to be the most effective headway for investigating crime especially cybercrime in this modern world. Even as we move towards an information technology-controlled world, it is important to note that when innovations are made, some negative implications also come with it, and an example of this is these criminal activities that involve technology, network devices, and networking that have emerged as a result of web improvements. These criminal activities are the ones that have been termed cybercrime. It is because of these increased criminal activities that organizations have come up with different strategies that they use to counter these crimes, and one of them is carrying out investigations using the cloud environment. A cloud environment has been defined as the use of web-based applications that are used for software installation and data stored in computers. This paper examines problems that are a result of cybercrime investigation in the cloud environment. Through analysis of the two components in play; cybercrime and cloud environment, we will be able to understand what are the problems that are encountered when carrying out investigations in cloud forensics. Through the use of secondary research, this paper found out that most problems are associated with technical and legal channels that are involved in carrying out these investigations. Investigator's mistakes when extracting pieces of evidence form the most crucial problems that take a lead when it comes to cybercrime investigation in the cloud environment. This paper not only flags out the challenges that are associated with cybercrime investigation in cloud environments but also offer recommendations and suggested solutions that can be used to counter the problems in question here. Through a proposed model to perform forensics investigations, this paper discusses new methodologies solutions, and developments for performing cybercrime investigations in the cloud environment.

A Study on Difference between Private Security and Private Investigation (민간경비업과 민간조사업의 차이점 연구)

  • Son, Dong-Woon;Jo, Sung-Gu;Kim, Dong-Je
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.295-317
    • /
    • 2014
  • In advanced country, private investigation system is made up of private security and in domestic, there is growing need constantly to introduce private investigation but it is not passed until now in assembly so a messenger office which is run illegally is growing because of demand by subdividing business areas. That is a proof that both the police and private security don't meet demand of public peace to the public. that's why the police has own businesses like a investigation, traffic, intelligence, crime prevention and private security's business areas are limited like a facilities security, escort security, protection of a person, machine security, special security as the Private Security Act. This study attempts to know structural difference between private security system and private investigation system in case private investigation system becomes one of the private security. on some question, respondents reply like that private security and private investigation is very different(71.2%), different(22.4%), average(6.3%), similar(0.0%), very similar(0.0%). the result seems like respondents recognize private security and private investigation as different businesses. In the result of non-quantity analysis, the differences seem like a business character, expense, business scope, public power, scale of organization, object of threat, legislation. In domestic, effort to legislate private investigation system has undergone difficulty since congressman Ha Soon Bong's motion in 1999 and today, congressman Yoon Jae Ok's All Amendments Private Security Act and congressman Song Young Geun's Private Inveswtigation Act are pending in assembly. This study's result is intended for examining difference in exploration between private security and private investigation and then there is going to propose to the policy in case private investigation system is passed in assembly by amending Private Security Act like congressman Yoon Jea Ok's All Amendment Private Security Act.

  • PDF

Variables Associated with Adolescent Deviant Behaviors (청소년의 경비행에 영향을 미치는 요인)

  • Kang, Hee Kyung
    • Korean Journal of Childcare and Education
    • /
    • v.6 no.3
    • /
    • pp.45-63
    • /
    • 2010
  • The purpose of this investigation was to examine the mediating effects of delinquent peers between attachment to parents, low self-control and adolescent deviant behaviors. After specifying a research model based on Gottfredson and Hirschi's general theory of crime and Hirschi's control theory of delinquency, the study analysed the model using structural equation modeling. The data for this investigation came from a sample of 2,448 Korean adolescents. The results showed the both measurement model and structural model had a good fit to the data and all paths of structural model were statistically significant. The main findings were the attachment to parents and low self-control had direct and indirect effects on adolescent deviant behaviors through delinquent peers. The implications for practical intervention and further research in the field of delinquency were discussed.

Evaluation of developing efficiency on latent fingerprint (잠재지문 현출효율 평가에 대한 연구)

  • Kim, Man-Ki;Park, Sung-Woo;Ohgami, Yusuke
    • Analytical Science and Technology
    • /
    • v.22 no.2
    • /
    • pp.166-171
    • /
    • 2009
  • Powder method is simple and very effective method for developing latent finger and palm print in crime scene. This technique has been actively studied to enhance effectiveness. In general, the evaluation for developing powder is mainly performed by the subjective opinion of researcher from comparison of the results obtained with existing and new one to develope finger and palm deposition. The purpose of this work is to present objective method of powder-treated latent fingerprint for evaluating method by developing efficiency. We indicated three evaluating methods of objective developing efficiency, which are measuring the number of minutiae in same sections on print, scattering level of developing reagent and contrast between developing reagent and background materials.

Priority Scheduling of Digital Evidence in Forensic (포렌식에서 디지털 증거의 우선순위 스케쥴링)

  • Lee, Jong-Chan;Park, Sang-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.9
    • /
    • pp.2055-2062
    • /
    • 2013
  • Digital evidence which is the new form of evidence to crime makes little difference in value and function with existing evidences. As time goes on, digital evidence will be the important part of the collection and the admissibility of evidence. Usually a digital forensic investigator has to spend a lot of time in order to find clues related to the investigation among the huge amount of data extracted from one or more potential containers of evidence such as computer systems, storage media and devices. Therefore, these evidences need to be ranked and prioritized based on the importance of potential relevant evidence to decrease the investigate time. In this paper we propose a methodology which prioritizes order in which evidences are to be examined in order to help in selecting the right evidence for investigation. The proposed scheme is based on Fuzzy Multi-Criteria Decision Making, in which uncertain parameters such as evidence investigation duration, value of evidence and relation between evidence, and relation between the case and time are used in the decision process using the aggregation function in fuzzy set theory.

How to Acquire the Evidence Capability of Video Images Taken by Drone (드론으로 촬영한 영상물의 증거능력 확보방안)

  • Kim, Yong-Jin;Song, Jae-Keun;Lee, Gyu-An
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.1
    • /
    • pp.163-168
    • /
    • 2018
  • With the advent of the fourth industrial revolution era, the use of drone has been progressing rapidly in various fields. Now the drones will be used extensively in the area of investigation. Until now the criminal photographs stayed in 2D digital images, it would be possible to reproduce not only 3D images but also make a crime scene with 3D printer. Firstly, the video images taken by the investigation agency using the drones are digital image evidence, and the requirements for securing the evidence capability are not different from the conditions for obtaining the proof of digital evidence. However, when the drones become a new area of scientific investigation, it is essential to systematize the authenticity of the images taken by the drones so that they can be used as evidence. In this paper, I propose a method to secure the evidence capability of digital images taken by drone.

Validation of new saliva test using SALIgAE® (사건현장 검사를 위해 변형된 SALIgAE® 타액검사법의 유효성 검토)

  • Lim, Si-Keun;Kwak, Kyung-Don;Choi, Dong-Ho;Han, Myun-Soo
    • Analytical Science and Technology
    • /
    • v.21 no.1
    • /
    • pp.48-52
    • /
    • 2008
  • A new forensic saliva test method using $SALIgAE^{(R)}$ was evaluated in this study. The sensitivity and specificity of $SALIgAE^{(R)}$ were examined and compared to those of other saliva test methods such as agarose gel diffusion method and $Phadebas^{(R)}$ test sheet method. $SALIgAE^{(R)}$ showed high sensitivity and specificity to human saliva in addition to quickness. Moreover modified $SALIgAE^{(R)}$ method was cheap and easy to use in crime scene and DNA laboratory. $SALIgAE^{(R)}$ was very stable at room temperature and had no effect on STR typing.

Comparative Analysis of Anti-Terrorism Act and its Enforcement Ordinance for Counter-Terrorism Activities (대테러 활동을 위한 테러 방지법과 시행령의 비교 분석)

  • Yoon, Hae-Sung
    • Korean Security Journal
    • /
    • no.48
    • /
    • pp.259-285
    • /
    • 2016
  • As the need for anti-terrorism legislation has been continuously argued, Anti-terrorism act has been enacted and enforced. On the other hand, there still remain a lot of points to be discussed regarding the definition of the concept of terrorism, matters of human rights violations, strengthening authority of the investigation and intelligence agencies, and mobilization military forces for the suppression of terrorism. Also, reviewing Anti-terrorism act and its enforcement ordinance draft, this legislation seems to regulate terrorist groups like IS. If so, in the case of terrorism of North Korea or domestic anti-government organizations, whether this law would be applied could become an issue. In the case of terrorism of North Korea, Ministry of National Defense has a right of commandership in the military operations, however, it is also possible to apply the article 4 of Natural Security Act a crime of performing objective-or a crime of foreign exchange on Criminal law as legal grounds for not military terrorisms but general investigations. Therefore, it is necessary to involve consideration about this matter. Furthermore, in the view of investigation, Anti-terrorism act and its enforcement ordinance draft do not mention Supreme Prosecutors Office and Ministry of Justice that conduct investigations. In the case of terrorism, the police and prosecution should conduct to arrest criminals and determine crimes at the investigation stage, however, any explicit article related to this content in Anti-terrorism act and its enforcement ordinance draft was unable to be found. Although Anti-terrorism act is certainly toward preventive aspects, considering some matters such as prevention, actions on the scene, maneuver after terrorism, arresting terrorists, investigation direction, cooperation, and mutual assistance, it is necessary to reflect these contents in Anti-terrorism act. In other words, immediately after terrorists attacks, it is possible to mobilize the military operations by Integrated Defense act in order to arrest them in the case of military terrorism. Nevertheless, because both military terrorism and general one are included in the investigation stage, it needs to begin an investigation under the direction of the prosecution. Therefore, above all, a device for finding out the truth behind the case at the investigation stage is not reflected in the current Anti-terrorism act and its enforcement ordinance draft. Accordingly, if National Intelligence Service approaches information at the prevention level in this situation, it may be necessary to come up with follow-up measures of the police, the prosecution, and military units.

  • PDF

A Study on the Impact of Organizational Capabilities of the Criminal Investigation Police upon Organizational Concentration (수사경찰의 조직역량이 조직몰입에 미치는 영향에 관한 연구)

  • Ko, Hyun Gyoo;Lee, Yun Hwan
    • Journal of Digital Convergence
    • /
    • v.10 no.9
    • /
    • pp.59-72
    • /
    • 2012
  • The police, as an advance guard for performing governmental functions, should conduct their duties to protect lives, physical bodies, and properties in the nation against various kinds of crimes, prevent from a public risk by detecting a factor that can menace public safeguard and public order and suppress it when a risk factor occurs. Practically it is impossible to protect lives, physical bodies, and properties in the nationprovided that social stability is not taken as security. The roles of the criminal investigation police that take a countermeasure to prevent a risk in prior by detecting hindrance factor of social stability and process any occurred crime in conformity with pertinent laws could control a successful performance in each of the police activities themselves. The study assumes that the organizational capabilities of the criminal investigation police exercises a significant influence upon organizational concentration. In spite of the fact that it is natural that the organizational capabilities of the criminal investigation police exercises a significant influence upon organizational concentration, until now it is very deficient in studies of this field. It is a viewpoint that an organizational concentration would be improved when a capability of the organizational staff will be improved, they would have a targeting capability for sharing organizational goals and vision and a systematic capability would be supported by the dimension of the criminal investigation police. The study was aimed to deduce a developmental method for the criminal investigation police by conducting an analysis on the impact of the organizational capabilities of the criminal investigation police upon organizational concentration that it suggest method that the criminal investigation police will make a contribution for maintaining a social order.

Implementation of Ontology-based Analytics Service by Exploiting Massive Crime Investigation Records (대규모 범죄 수사 기록을 활용한 온톨로지 기반 분석 서비스 구현)

  • Ko, Gun-Woo;Kim, Seon-Wu;Park, Sung-Jin;No, Yoon-Joo;Choi, Sung-Pil
    • Annual Conference on Human and Language Technology
    • /
    • 2018.10a
    • /
    • pp.477-481
    • /
    • 2018
  • 본 논문은 범죄 수사 기록 문서로부터 추출한 정보를 트리플로 구성하여 특정 분야의 온톨로지를 구축하고, 더 나아가 온톨로지 기반의 검색 서비스를 구현하는 일련의 과정을 설명한다. 특히 비정형 데이터로 부터 얻어낸 정보를 통해 온톨로지를 구축하고, 이를 토대로 실제 사용할 수 있는 레벨의 서비스를 구현하는 것이 특징이다. 서비스의 성능을 확인하기 위하여 사건 검색에 대한 정확도 측정 방법 중 하나인 Top-K 방식의 정확도 측정 실험을 수행하였으며, 실험 결과 완전 일치 실험에서는 약 93.52%, 유사 필드 활용 실험에서는 약 88.91%의 결과를 얻어낼 수 있었다.

  • PDF