• Title/Summary/Keyword: Smartphone crime

Search Result 27, Processing Time 0.023 seconds

Analysis on Smishing Attack Trends and Mobile Forensic (스미싱 공격 동향 분석 및 Mobile Forensic)

  • Noh, Jung-Ho;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.394-397
    • /
    • 2014
  • Most of Koreans have smartphone. By using smartphone, they have done internet-banking, e-commerce and private scheduling. However, convenience of smart phone has been made side effect such as tool of fraud and crime. Especially, Smishing on smartphone has been increased rapidly since 2013. Smishing have utilized social-engineering technique with social issue such as Korean near-sea cruse ship, 'Sewol-Ho', Sinking and traditional thanks-giving holiday, 'Chu-Seok', etc. This paper proposed the oncoming trend of smishing on smartphone after 2014. This paper also analyzed the process and technique of smishing on internal financial fraud. It also covered smartphone forensic for using legal evidence. By discovering the connectivity of smishing and financial fraud, this paper could be reference for social security on smartphone.

  • PDF

Hacking Aattack Trends Analysis of Mobile Smishing and Security Measures (Mobile Smishing 해킹 공격 동향 분석 및 보안대책)

  • Park, Dea-Woo;Yang, Sung-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.283-284
    • /
    • 2015
  • Smartphone, tablet PC, notebook, such as the Internet banking and electronic commerce using a mobile device, as well as process and to their work. While going to high availability and convenience of mobile devices castle, SNS, letters, using an email Smishing financial fraud and leakage of personal information such as crime has occurred many. Smishing smartphone accidents increased sharply from 2013, MERS infection cases, landmine provocative events, such as the delivery of Thanksgiving has occurred cleverly using social engineering techniques. In this paper, i analyze the trends in Smishing hacking attacks on mobile devices since 2014. With regard to social issues, it analyzes the process of hacking attacks Smishing leading to financial fraud to mobile users.

  • PDF

Implementation of a crime prevention System using Smartphone (스마트폰을 활용한 범죄 예방 시스템 구현)

  • Lee, Jae-Gil;Yoon, Seung-Hyun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2014.07a
    • /
    • pp.465-466
    • /
    • 2014
  • 개발된 장치와 앱을 사용하면 시중에 나와 있는 범죄 예방 어플리케이션과는 다르게 스마트폰에서 물리적인 버튼을 사용하지 않고 사용자의 음성으로 이벤트를 발생시켜 자신의 위치정보를 미리 지정한 전화번호로 SMS를 보내고 자신의 스마트폰에서 사이렌을 자동으로 동작시킴으로서 위험한 상황에서도 편리하게 사용 할 수 있어 범죄 예방에 도움이 될 것이다.

  • PDF

A Study on The Measures of Monetary Rewards When Providing The Evidences (범죄증거자료 제보시 범죄신고보상금 지급방안에 관한 연구)

  • Park, Hyung Sik
    • Convergence Security Journal
    • /
    • v.15 no.3_2
    • /
    • pp.43-51
    • /
    • 2015
  • Many of crimes are solved by the report of people. Therefore, countries pay compensation to crime reporter. However, the current system of compensation is focused on the report of criminal fact and criminals arrest, so that there is no compensation on the providing evidence. On the other hand, since the current judicial system adopted the principle of trial by evidence, all the facts are made by the evidence. But it is impossible to obtain all the evidence only by law enforcement agencies. Therefore, it is necessary for people to report the evidence positively. So it is necessary to positively take advantages of smart phones, vehicle black boxes and cctvs. Various incentives such as compensation would be needed to require the evidence of smartphone or black box, cctv. In order to strengthen evidence report, it will be needed the legislation of crime report compensation, smartphone apps development including the provision of various incentives.

Analysis of Mobile Smishing Hacking Trends and Security Measures (Mobile Smishing 해킹 동향 분석 및 보안대책)

  • Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.11
    • /
    • pp.2615-2622
    • /
    • 2015
  • Using the mobile device, such as Smartphones tablet PC, online banking and e-commerce, as well as process and to their work. While going to high availability and convenience of mobile devices castle, SNS, letters, using an email Smishing financial fraud and leakage of personal information such as crime has occurred many. Smishing smartphone accidents increased sharply from 2013, MERS infection cases, landmine provocative events, such as the delivery of Thanksgiving has occurred cleverly using social engineering techniques. In this paper, i analyze the trends in Smishing hacking attacks on mobile devices since 2014. With regard to social issues, it analyzes the process of hacking attacks Smishing leading to financial fraud to mobile users. And, in this paper, i propose a secure way and measures of financial damage for mobile Smishing hacking.

The Development of Anti-Forensic Tools for Android Smartphones (안드로이드 스마트폰을 위한 앤티-포렌식 도구 개발)

  • Moon, Phil-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.1
    • /
    • pp.95-102
    • /
    • 2015
  • Smartphone is very useful for use in the real world, but it has been exposed to a lot of crime by smartphone. Also, it occurs attempting to delete a data of smartphone memory by anti-forensic tools. In this paper, we implement an anti-forensic tool used in the Android. In addition, tests to validate the availability of the anti-forensic tool by the Oxygen Forensic Suite that is a commercial forensic tool.

Forensic Analysis Technology of Smart phone backup data via synchronization (동기화 스마트폰 백업 데이터 포렌식 분석 기술)

  • Lee, Jae-Hyun;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.287-290
    • /
    • 2011
  • The synchronization feature on the smartphone by default (default) value is set. Smartphone synchronization has been set is stored that smartphone data is automatically backed up is stored When connected to a PC with a smartphone dedicated cable. The backup data is a common technique to analyze the content to be difficult to apply forensic techniques can find out information on criminal suspects. In this paper, the backup data is synchronized to the smartphone through forensic analysis is the study of forensic evidence. In a lab environment to send personal financial information on smartphone, smartphone is assumed that the experiment is compromised. Smartphone's backup data by using the forensic tools in crime associated with personal financial information and analyze data. And, to be adopted by the court will study the evidence leveraging forensic technology. Through this paper as a basis for smartphone forensic analysis will be utilized.

  • PDF

On the Availability of Anti-Forensic Tools for Android Smartphones (안드로이드 스마트폰을 위한 앤티-포렌식 도구들의 활용성)

  • Moon, Phil-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.6
    • /
    • pp.855-861
    • /
    • 2013
  • Smartphone is very useful for use in the real life through the improvement of computing power, faster data rate and the variety of applications. On the other hand, using the smartphone has been exposed to a lot of crime. Also, it occurs attempting to delete a data of smartphone memory by anti-forensic tools. In this paper, we investigate and analyze the anti-forensic tools used in the Android smartphone to study the characteristics and techniques of anti-forensic tools. In addition, experiments are performed to validate the availability of anti-forensic tools by the Oxygen Forensic Suite that is a commercial forensic tool.

Testing a Model for the Effect of Low Self-Control on Cybercrime Mediating by Smartphone Addiction and Its Mediating Process (낮은 자기통제력의 스마트폰중독을 통한 사이버범죄 영향의 매개과정 모형구성과 검증)

  • Lee, Seong-Sik;Ryu, Su-Min;Lim, Su-Kyung
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.9
    • /
    • pp.401-411
    • /
    • 2022
  • This study tests a model for the effect of low self-control on cyber crime and its mediating process. Intervening variables include smartphone addiction, social learning and opportunity variables. Analyzing a data from college students in Seoul, it is shown that the effect of low self-control has a significant effect on smartphone addiction. Results also show that smartphone addiction has a positive significant effect on differential association with illegal peers, illegal definition, and illegal opportunity, and in turn cybercrime. In addition, it is found that low self-control has also a direct effect on differential association with illegal peers, illegal definitions, and illegal opportunity without mediating by smartphone addiction. As a result, it is reveal that the effect of low self-control on cybercrime is indirect and its effect is mediated by smartphone addiction, differential association with illegal peers, illegal definitions, and illegal opportunity.

M2M based personage information monitoring system (M2M기반 인물 정보 모니터링 시스템)

  • Lee, Jong-sung;Jeon, Min-ho;Oh, Chang-heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.1000-1003
    • /
    • 2013
  • The monitoring system using a surveillance camera, has the advantage that can be observed in real time the blind spot of the crime, case to be mounted is increasing. However, surveillance camera, is used for the purpose of verification of the crime later than risk detection of crime before advance. Therefore, in this paper, in order to supplement the weak information collection monitoring system using the monitoring camera, by using the position information of the smartphone, infers the person monitoring region, the movement path of the image information other event occurs it is a fusion iT monitoring system that provides information of the user who judged. Result of the experiment, the proposed system confirmed the improved efficiency and usability than conventional systems.

  • PDF