• Title/Summary/Keyword: Financial Crime

Search Result 66, Processing Time 0.022 seconds

A Proposal for amendment of the Financial Intelligence Unit Law (『특정금융정보(FIU)법』의 개정을 위한 제언)

  • Lee, Dae Sung;Ahn, Young Kyu
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.71-76
    • /
    • 2015
  • Financial Intelligence Unit Law doesn't include investigation on important cases that could influence the security and existence of the nation that are the core jobs of national intelligence agency. So the agency has a difficulty to investigate the international crime of North Korea and other security incidents. It is also difficult to catch an international crime organization working in Korea. It also produces problems such as difficulty in investigating the illegal leak of strategic materials and investigating people related to illegal funding to international terrorism. So it is urgently needed to revise Financial Intelligence Law as soon as possible. Foreign intelligence agencies use the information of financial intelligence unit in many different ways. National Security Agency of China and Australian Security Intelligence Organization freely use the information of financial intelligence unit based on their own laws and systems. Central Intelligence Agency and Federal Bureau of Investigation of USA and Secret Intelligence Service and Security Service of Britain request financial intelligence units to supply them with the information of financial intelligence unit. But the national intelligence agency of Korea isn't able to approach to FIU and can't share the FIU information with foreign intelligence agencies. To solve the problem, they should revise Financial Intelligence Unit Law so that national intelligence agency can receive or request information from Korean Financial Intelligence Unit.

A Study of International Confrontation on the Prevention of Cyber Crime (사이버범죄에 대한 국제적 대응방안)

  • Jeong, Jeong-Ile
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.323-354
    • /
    • 2005
  • As with the vast array of computer technology and its rapid development, along with the entry of the internet as one of the necessities of life, the so-called cyber space has become a vital component of our modern day living. While such cyber space has provided the society with much convenience and utility as to the gathering and acquiring of information, crimes involving cyber space has accordingly increased in both number and form, Nevertheless, the conventional law as existed before the development of the cyber space were unable to meet the demands of this new breed of crime, which inevitably led to the gap in the government ability to punish such criminals, Thus, in response to the rising number of cyber crimes, a large number of nations have either created or is in the process of committing human and financial resources to strengthen the investigative powers relating to cyber crimes and creating a new area of prohibiting such crimes. As a overview of cyber crime, (1)defines the terms, describes features of cyber crime, (2)explains the international prevention necessity of cyber crime, and (3)the necessity of legislating the cyber crime Fundamental Act (4)the recognition of the evidential values on the confiscated electronic records and reviews types of cyber crime including cyberterror. Lastly, emphasizes necessity on international cooperation for prevention of cyber crime as usual.

  • PDF

Hacking Aattack Trends Analysis of Mobile Smishing and Security Measures (Mobile Smishing 해킹 공격 동향 분석 및 보안대책)

  • Park, Dea-Woo;Yang, Sung-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.283-284
    • /
    • 2015
  • Smartphone, tablet PC, notebook, such as the Internet banking and electronic commerce using a mobile device, as well as process and to their work. While going to high availability and convenience of mobile devices castle, SNS, letters, using an email Smishing financial fraud and leakage of personal information such as crime has occurred many. Smishing smartphone accidents increased sharply from 2013, MERS infection cases, landmine provocative events, such as the delivery of Thanksgiving has occurred cleverly using social engineering techniques. In this paper, i analyze the trends in Smishing hacking attacks on mobile devices since 2014. With regard to social issues, it analyzes the process of hacking attacks Smishing leading to financial fraud to mobile users.

  • PDF

The Relationship between Work Environment factors, Perception of Insurance Crime and Job Satisfaction among Special Investigation Unit(SIU) (보험범죄특별조사팀(SIU)의 근무환경과 보험범죄에 대한 일반적 인식이 직무만족도에 미치는 영향)

  • Yun, Myeong-Seong;Lee, Wan-Hee;Lee, Seung-Ae
    • Korean Security Journal
    • /
    • no.32
    • /
    • pp.151-176
    • /
    • 2012
  • Government organizations (including police, prosecutor, and Financial Supervisory Service) and programs to uncover or prevent from insurance crime are not well developed. However, insurance crime are increasing among not only private insurances such as life insurance, indemnity insurance, and auto insurance but also public insurances including national health insurance and industrial accident compensation insurance. The damages of crimes are serious in both economical and ethical perspectives. Insurance crime deteriorates a current account of insurance companies and the leakages due to insurance fraud worsen loss ratio. Consequently, insurance crime increases customers' costs of insurance. For this reason, insurance companies stated to establish Special Investigation Unit(SIU) to detect insurance crime and fraud by themselves. However, organizational and operational efficiencies are limited. The purpose of this study is to examine the relationship between work environment factors, perception of insurance crime and job satisfaction among Special Investigation Units. Therefore, this study investigated the perception of work environments of Special Investigation Units. In addition, this study examined how their work environments and general perception of insurance crime influence their job satisfaction. In order test the purpose of this study, reliability test, exploratory factor analysis(EFA), multiple regression were employed. The results of this study suggested that clarity of insurance company, distress/difficulty of resolve, compensation, perception of work pressure are statistically significant on jab satisfaction among Special Investigation Unit in South Korea. This exploratory study expected to contribute to understanding of Special Investigation Unit, and their insurance crime prevention system. The results from this analysis will be examined in light of previous findings and policy implications discussed.

  • PDF

A Study on the Improvement of User Identification of Non-Face-to-Face Financial Transactions with Messenger Phishing Case (비대면 금융거래 사용자 확인 개선방안 연구 - 메신저피싱 사례를 중심으로)

  • Eun Bi Kim;Ik Rae Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.353-362
    • /
    • 2023
  • Messenger phishing, communications frauds crime, exploits remote control of smartphones and non-face-to-face financial transactions, causing property damage due to money transfers, as well as account opening and loans in the name of victims. Such financial accidents may be careless of victims, but the current messenger phishing criminal method is intelligent and can be seen as digging into loopholes in the non-face-to-face user verification process. In this paper we analyze how messenger phishing uses loopholes in user identification procedures in non-face-to-face financial transactions. Through experiments, it is suggested to improve the non-face-to-face verification process for safer financial transactions.

Dynamic Evaluation Methods for SMS Phishing Blocking App Based on Detection Setup Function (감지설정기능을 적용한 스미싱 차단앱의 동적 평가방법에 관한 연구)

  • Kim, Jang Il;Kim, Myung Gwan;Kwon, Young Man;Jung, Yong Gyu
    • Journal of Service Research and Studies
    • /
    • v.5 no.2
    • /
    • pp.111-118
    • /
    • 2015
  • Although the development of mobile devices are made us a free life, they were displayed the subject of this financial crime and attacking forces in the other side. Among finance-related crime is become a serious crime that are targeting smartphones by SMS phishing, phishing, pharming, voice phishing etc. In particular, SMS phishing is increased according to phenomenon using the nature of a text message in the mobile. SMS phishing is become new crime due to the burden to the smartphone user. Their crime is also the advanced way from the existing fraud, such as making the malicious apps. Especially it generates loopholes in the law by a method such as using a foreign server. For safe from SMS phishing attacks, proactive pre-diagnosis is even more important rather than post responses. It is necessary to deploy blocking programs for detecting SMS phishing attacks in advance to do this. In this paper we are investigating the process of block types and block apps that are currently deployed and presenting the evaluation of the application of the detection block setting app.

An exploration of factors affecting the Crime-Terror Nexus (테러집단의 범죄 집단과의 결합현상(Crime-Terror Nexus)에 영향을 미치는 요인들에 대한 탐색적 분석연구)

  • Kim, Eun-Young
    • Korean Security Journal
    • /
    • no.37
    • /
    • pp.83-108
    • /
    • 2013
  • Since the end of the Cold War and rapid globalization and technical developments, terrorist groups actively involved in criminal activities. Also criminal entrepreneurs became a major financial revenue for these terrorists groups. This newly patternized activities among terrorist groups is now called as Crime-Terror Nexus" indicating the changing nature of terrorism, which means two traditionally separate phenomena, crime and terrorism, became more similar. This new pattern of terrorism is considered to create synergy for the criminal organizations and terrorist groups, scholars believe that it would become a significant threat to the security of world community in the near future. Although the phenomenon of this crime-terror nexus is significant and imminent threats, there is lack of studies investigation this new evolution of terrorism with empirical data. Moreover there is literally no studies exploring factors relevant to the Crime-Terror Nexus. Therefore, this current study aims to conduct explorative investigation of factors affecting the "Crime-Terror Nexus" with a world terrorism data, MAROB(the Minorities at Risk Organizational Behavior), which is developed by START and Minority at Risk project and contains information terrorist groups in Middle-East and Africa region. Considering the significance of this new terrorism patterns and the challenging nature of conducting empirical studies on this topic, this study has great contribution on the development in the field of criminal justice as well as terrorism.

  • PDF

A Study on the Analysis of Fraud Crime Types according to NFT Transactions (NFT 거래에 따른 사기범죄 유형 분석에 관한 연구)

  • HyeJin Song
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.4
    • /
    • pp.908-915
    • /
    • 2023
  • Purpose: The purpose of this study is to examine the types of fraudulent crimes among various crimes taking place during NFT transactions, and to approach institutional problems caused by crime types analysis and crackdown methods and legal limitations. Method: IIn order to classify the types of fraudulent crimes that appear in NFT transactions, the crime types were analyzed through the results of previous studies and cases of current incidents. Result: Most of the crimes that are taking place through NFTs are various types of fraudulent crimes such as rug pools, thefts, personal information theft fraud, and pig murder. Therefore, these types were classified and various damage cases were also analyzed. It is a matter of copyright. Conclusion: Currently, the financial problems caused by the occurrence of fraudulent crimes in NFTs worldwide are the most worrisome, and the scale will be even greater as the market grows in the future. Therefore, in Korea, various institutional supplements and policies should be prepared through analysis of crime types that can affect crime prevention and investigation and arrest activities.

A Study on Damage and Countermeasures of SMS Phishing (스미싱의 피해와 대응방안에 관한 연구)

  • Kim, Jang Il;Lee, Heui Seok;Kim, Ji Ung;Jung, Yong-Gyu
    • Journal of Service Research and Studies
    • /
    • v.5 no.1
    • /
    • pp.71-78
    • /
    • 2015
  • Created, but the development of mobile devices to have a margin of life have appeared in the opposite forces that are considered to be the target of financial crime and attacks them. Financial crime among crimes that target the smartphone SMS phishing, phishing, pharming, phishing, etc. voice and, in particular, a phenomenon that is growing a lot of SMS phishing is by nature a text message to your mobile. Ye Jin proactive rather than post responses in order to be safe from the SMS phishing attack individuals and businesses, and asset protection is even more important in the country. For this, the SMS phishing attack detected in advance and that can block the development program, it is necessary to deploy.

Fraudulent Financial Reporting Practices: Case Study of Satyam Computer Limited

  • Bhasin, Madan Lal
    • The Journal of Economics, Marketing and Management
    • /
    • v.4 no.3
    • /
    • pp.12-24
    • /
    • 2016
  • Fraudulent financial reporting practices can have significant consequences for organizations and all stakeholders, as well as, for public confidence in the capital and security markets. In fact, comprehensive, accurate and reliable financial reporting is the bedrock upon which our markets are based. Keen to project a rosy picture of the Satyam to investors, employees and analysts, Mr. Raju (CEO and Chairman) fudged the account books so that it appeared to be a far bigger enterprise, with high profits and fast growth rate, than it actually was. The Satyam fraud has shattered the dreams of different categories of investors, shocked the government and regulators alike, and led to questioning of the accounting practices of statutory auditors and corporate governance norms in India. This is an exploratory study based on secondary sources of information. An attempt has been made to provide an explanation for various intriguing questions about Satyam scam. After thorough investigations by the CBI and SEBI, they have unveiled the methodology by which Satyam fraud was engineered. Finally, we recommend "Fraudulent reporting practices should be considered as a serious crime, and accounting bodies, courts and other regulatory authorities in India need to adopt very strict punitive measures to stop such unethical practices."