• Title/Summary/Keyword: Criminal Record

Search Result 29, Processing Time 0.023 seconds

A Study on the allowed range of viewing and copying right of criminal victim's investigation records (범죄 피해자의 수사기록 열람·등사권의 허용 범위에 관한 연구)

  • NAM, SEON MO
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.1
    • /
    • pp.127-137
    • /
    • 2019
  • In this study, I set the allowable range of viewing / copying rights of investigation records on criminal victims and bereaved families in the procedure of investigation. I tried to grasp the contents of the suspect's statement at an early stage and support it in order to cope appropriately Recently, the social consideration of people suffering from crime victims is expanding in fact. The scope of the investigation is set by the lawyer of the suspect in relation to the subordinate statute concerning the investigation and reading of the investigation record. In parallel, it is necessary to apply to the victim's lawyer or bereaved. This is a part that coincides with the purpose of certifying private rights such as browsing of litigation records to the victim and ultimately has a purpose related to the allowable range. Although it is the right to receive the investigation result at each stage, it is not used properly. Especially when distorted investigation progresses, if the suspect is not prosecuted, the victim may be in a state of regret. The important part can be summarized as the question of whether the investigation of the victim's lawyer is allowed to view and access the criminal records. This section has been reviewed with a focus on the current Act and its functional aspects should be emphasized and revised in accordance with the legal environment. These findings will contribute to ensuring victims' rights in the future. It is also used as an important resource in the legislative process, including the revision of the criminal procedure law.

Carving deleted voice data in mobile (삭제된 휴대폰 음성 데이터 복원 방법론)

  • Kim, Sang-Dae;Byun, Keun-Duck;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.57-65
    • /
    • 2012
  • People leave voicemails or record phone conversations in their daily cell phone use. Sometimes important voice data is deleted by the user accidently, or purposely to cover up criminal activity. In these cases, deleted voice data must be able to be recovered for forensics, since the voice data can be used as evidence in a criminal case. Because cell phones store data that is easily fragmented in flash memory, voice data recovery is very difficult. However, if there are identifiable patterns for the deleted voice data, we can recover a significant amount of it by researching images of it. There are several types of voice data, such as QCP, AMR, MP4, etc.. This study researches the data recovery solutions for EVRC codec and AMR codec in QCP file, Qualcumm's voice data format in cell phone.

Research on the prevention of legal dispute over 119 rescue team (119구급대의 법적분쟁 예방에 관한 연구)

  • Lim, Jae-Man
    • The Korean Journal of Emergency Medical Services
    • /
    • v.13 no.1
    • /
    • pp.19-33
    • /
    • 2009
  • Purpose : To check the legal relation between rescue team and patient as well as legal responsibility for patient's damage intentionally or erroneously caused by rescue member, a public official, in the performance of relevant job ; to prevent legal dispute over rescue team and to present program for fair settlement of dispute and equitable and feasible burden of damage. Method : First, the legal principle of Civil Law, Criminal Law and Administrative Law related to the theme of this research will be investigated around research by literature. Second, the case of dispute related to rescue team will be introduced. Result: 1. If 119 rescue members as a public official intentionally or erroneously cause damage to patient in the performance of job, they shall bear civil, criminal and administrative responsibility. They shall bear civil responsibility for indemnity for damage due to default or tort. The typical criminal responsibility includes accidental homicide arising out of duty, preparing falsified official document, dereliction of duty, etc. In the administrative side, the state is responsible for indemnity for peculiar status of the rescue member, public official. 2. Though raising civil petition or legal dispute over unsatisfactory rescue service may be reasonable to guarantee the right of nation, such action may cause stress to rescue member as well as may lead to mental shrinking and defensive attitude only to take the basic first aid treatment which has low possibility of mistake instead of active first aid treatment so as to avoid legal responsibility. 3. The program that may prevent legal dispute over 119 rescue team includes expansion of manpower specialized in first aid treatment, enhancement of education on legal environment, development and application of standard job guideline, formation of mutual trust with patient, detailed explanation, preparing and keeping minute record, improvement of the rescue members' ability of first aid treatment and development of medical instruction mode. Conclusion : The best policy is to prevent legal dispute. If it is impossible to basically exclude the possibility of dispute, however, we need to make effort to minimize the occurrence, settle fairly and divide damage equitably and feasibly. To improve the preventible death rate of our first aid system to the level of advanced country, 119 rescue team which is in charge of the stage before hospital needs to positively enforce special first aid by improving the qualitative level of rescue service and to strive to prevent legal dispute that may occur in the process.

  • PDF

Implementation of Ontology-based Service by Exploiting Massive Crime Investigation Records: Focusing on Intrusion Theft (대규모 범죄 수사기록을 활용한 온톨로지 기반 서비스 구현 - 침입 절도 범죄 분야를 중심으로 -)

  • Ko, Gun-Woo;Kim, Seon-Wu;Park, Sung-Jin;No, Yoon-Joo;Choi, Sung-Pil
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.53 no.1
    • /
    • pp.57-81
    • /
    • 2019
  • An ontology is a complex structure dictionary that defines the relationship between terms and terms related to specific knowledge in a particular field. There have been attempts to construct various ontologies in Korea and abroad, but there has not been a case in which a large scale crime investigation record is constructed as an ontology and a service is implemented through the ontology. Therefore, this paper describes the process of constructing an ontology based on information extracted from instrusion theft field of unstructured data, a crime investigation document, and implementing an ontology-based search service and a crime spot recommendation service. In order to understand the performance of the search service, we have tested Top-K accuracy measurement, which is one of the accuracy measurement methods for event search, and obtained a maximum accuracy of 93.52% for the experimental data set. In addition, we have obtained a suitable clue field combination for the entire experimental data set, and we can calibrate the field location information in the database with the performance of F1-measure 76.19% Respectively.

Network Forensic Evidence Generation and Verification Scheme (효율적인 인터넷 범죄수사를 위한 범행호스트 탐지 및 범죄행위 입증기술)

  • Kim, Hyung-Seok;Kim, Eun-Jin;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.719-731
    • /
    • 2012
  • One of the most important point in the Internet crime investigation is tracing back and pointing out a criminal host. However, criminals can forge a crime record stored in the crime host, or can utilize malicious applications in order not to leave a crime record. In addition, criminals can change the source IP address of a crime host and deny their involvement. In this study, we suggests the Network Forensic Evidence Generation and Verification Scheme (NFEGVS) to rectify the current limitation of Network Forensic technologies. This scheme can prove who and when the crime has occurred. In addition, this prevents leaking of symmetric key for guaranteeing certification and integrity of Forensic Evidence by proposing the Timestamp Secret Key Distribution Scheme, and minimizes performance degradation of router when generating forensic evidence with the Flow-Based Selection Scheme. In this paper, we implement the proposed scheme and evaluate overall performance of the proposed system.

Analysis of the Possibility of Recovering Deleted Flight Records by DJI Drone Model (DJI 드론 모델별 삭제 비행기록 복구 가능성 분석)

  • YeoHoon Yoon;Joobeom Yun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.4
    • /
    • pp.609-619
    • /
    • 2023
  • Recently, crimes using drones, one of the IoT industries have been continuously reported. In particular, drones are characterized by easy access and free movement, so they are used for various crimes such as transporting explosives, transporting drugs, and illegal recording. In order to analyze and investigate these criminal acts, drone forensic research is highly emphasized. Media data, PII, and flight records are digital forensic artifacts that can be acquired from drones, in particluar flight records are important artifacts since they can be used to trace drone activities. Therefore, in this paper, the characteristics of the deleted flight record files of DJI drones are presented and verified using the Phantom3, Phantom4 andMini2 models, two drones with differences in characteristics. Additionally, the recovery level is analyzed using the flight record file characteristics, and lastly, drones with the capacity to recover flight records for each drone model and drone models without it are classified.

By the GNC Solution, Removal Effect Offensive Odorous Compounds Generated from Food (GNC용액을 이용한 음식물 쓰레기처리장에서 발생되는 악취 규제물질 제거 효과에 관한 연구)

  • Hong, Jong-Soon;Kim, Jae-Woo
    • Journal of environmental and Sanitary engineering
    • /
    • v.22 no.2
    • /
    • pp.35-40
    • /
    • 2007
  • It disposes positively in the air pollution damage which is serious, in order help period the place where it improves the quality of existence and life of the local residents. It removed the offensive odor regulation material and the technique it will be able to prevent to sleep it researched it did. After scattering the GNC solution which develops the offensive odor regulation material which occurs from the food and trash treatment plant which is located to the S from the H, company after scattering the GNC solution which it develops collection it did a control criminal record control kind air and it analyzed. In this study, we investigated the emission concentrations of offensive odorous compounds of hydrogen sulfide, methyl mercaptan, dimethyl sulfide and dimethyl disulfide, trimethylamine, formaldehyde, acetaldehyde, propionaldehyde, buthylaldehyde, iso-valeric aldehyde, n-valeric aldehyde, ammonia. The concentrations of odorous compounds are determined by gas chromatography, HPLC and uv-vis spectroscopy. Hydrogen sulfide, methyl mercaptan, dimethyl sulfide and dimethyl disulfide were not detected at any point examined.

Digitalization of Seafarer's Book for Authentication and e-Navigation

  • Huh, Jun-Ho;Seo, Kyungryong
    • Journal of Information Processing Systems
    • /
    • v.15 no.1
    • /
    • pp.217-232
    • /
    • 2019
  • Currently, the crew working on a ship is required to carry a seafarer's book in most countries around the world, including the Republic of Korea (ROK). Yet, many fishermen working in the international waters of the ROK do not abide by this rule as the procedure of obtaining it is rather inconvenient or they do not understand the necessity or the benefits of having it. Also, as the regulation of carrying the certificate has been strengthened, it is important for them to avoid making a criminal record unintentionally. This study discusses the digitalization of the seafarer's book based on several security measures in addition to BLE Beacon-based positioning technology, which can be useful for the e-Navigation. Normally, seamen's certificates are recorded by the captain, medical institution, or issuing authority and then kept in an onboard safe or a certificate cabinet. The material of the certificates is a cloth that can withstand salinity as the certificate could be contaminated by mold. In the past, the captains and their crews were uncooperative when the ROK's maritime police tried to inspect several ships simultaneously because of the time and cost involved. Thus, a system with which the maritime police will be able to conveniently manage the crews is proposed.

Study on Recovery Techniques for the Deleted or Damaged Event Log(EVTX) Files (삭제되거나 손상된 이벤트 로그(EVTX) 파일 복구 기술에 대한 연구)

  • Shin, Yonghak;Cheon, Junyoung;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.387-396
    • /
    • 2016
  • As the number of people using digital devices has increased, the digital forensic, which aims at finding clues for crimes in digital data, has been developed and become more important especially in court. Together with the development of the digital forensic, the anti-forensic which aims at thwarting the digital forensic has also been developed. As an example, with anti-forensic technology the criminal would delete an digital evidence without which the investigator would be hard to find any clue for crimes. In such a case, recovery techniques on deleted or damaged information will be very important in the field of digital forensic. Until now, even though EVTX(event log)-based recovery techniques on deleted files have been presented, but there has been no study to retrieve event log data itself, In this paper, we propose some recovery algorithms on deleted or damaged event log file and show that our recovery algorithms have high success rate through experiments.

A study of dental hygiene students on school subject degree of recognition before admission and satisfaction (치위생과 학생들의 입학전 학과 인지도와 만족도 및 취업의식에 관한 조사)

  • Kim, Hwa-Ju;Lim, Kun-Ok;Kim, Yun-Jeong
    • Journal of Korean society of Dental Hygiene
    • /
    • v.6 no.2
    • /
    • pp.115-127
    • /
    • 2006
  • A purpose of this study is degree of recognition and consciousness investigation about a satisfaction duty before admission about a school subject of some academic dental hygiene students. From responses to individual written survey questionnaires answered by 608 students who are studying Dental Hygiene at colleges in Mokpo, Iksan, Gangneung. The following are the results regarding their satisfaction levels with their majors and their interest in working abroad: 1. Regarding the motivating factors to major in Dental Hygiene, most students(51.3%), particularly most freshmen(57.3%), have chosen this major because of more job opportunities than students with other majors. The most common source of information in choosing majors is the Internet(30.8%). 2. Most students do not want to change their majors even if they are provided with the chance to do so(65.5%). They are in general satisfied with their studies. The result shows that the Dental Hygiene majors are positive toward their major. 3. Most students will choose their jobs by their own choices(40.6%), and the most important factor in their choices is the opportunity of self-growth and development(33.1%). The survey results show that the Dental Hygiene students value their own decisions and self-realization. 4. Showed the difference that as a result of having seen a knowledge degree advance a school subject of major in Dental Hygiene by a school year and ash students, an admission motive, relevance of an information acquisition path, all noted. 5. And were able to see the difference that noted in an adviser, work selection bases in case of work selection whether or not there was a dissatisfaction reason about a major and a criminal record.

  • PDF