• Title/Summary/Keyword: criminal investigation

Search Result 218, Processing Time 0.026 seconds

The Effect of Investigator's Belief about Veracity of Suspect on Distortions of Paper Records (수사관의 심증이 조서의 왜곡에 미치는 영향)

  • Lee, Hyoung Keun;Jo, Eunkyung;Yi, Mi Sun
    • Korean Journal of Forensic Psychology
    • /
    • v.11 no.3
    • /
    • pp.267-285
    • /
    • 2020
  • The Statement evidence is an important method of proof in the criminal investigation and trial. Under certain conditions set by Korean Criminal Procedure Law, paper records of interrogations are admissible in criminal courts. However, it is shown that distortions are ever-present in paper records. Therefore, this study attempted to examine the effect of the investigator's belief about the veracity of a suspect on distortions of paper records. Ninety police investigators were randomly allocated into one of the three conditions('guilty belief', 'innocent belief', 'neutral belief'), and all the investigators were then asked to document a paper record while watching a prefilmed interrogation interview of the crime. The results showed that (1) the investigator's belief had significant effects on distortions. (2) All groups did more commissions than omissions. (3) matters subject to interrogation also had significant effects on distortions. In the conclusion, implications and limitations of the study were disscussed.

  • PDF

Control of International Cyber Crime

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.2
    • /
    • pp.137-144
    • /
    • 2016
  • The followings are required to establish uniform principle of criminal jurisdiction for international cyber crime into customary international law; (1) clear guideline of UN for promoting national practice (2) formation of general practices based on these guidelines (3) these general practices should obtain legal confidence. International society is in close cooperation for investigating and controlling cyber threat. The US FBI has closed down the largest online crime space called 'Darkcode' and prosecuted related hackers based on joint investigation with 19 countries including England, Australia, Canada, Bosnia, Croatia, Israel, and Rumania. More and more people in Korea are raising their voices for joining cyber crime treaty, 'Budapest Treaty.' Budapest Treaty is the first international treaty prosecuting cyber crime by setting out detailed regulations on internet criminal act. Member countries have installed hotline for cyber crime and they act together. Except European countries, America, Canada, and Japan have joined the treaty. In case of Korea, from few years before, it is reviewing joining with Ministry of Foreign affairs, Ministry of Justice and the National Police but haven't made any conclusion. Different from offline crime, cyber crime is planned in advance and happens regardless of border. Therefore, international cooperation based on position of punishing criminals and international standards. Joining of Budapest international cyber crime treaty shall be done as soon as possible for enhancing national competence.

Synthesis of Composite Particles with Fe3O4 core and Ag Shell for the Development of Fingerprints

  • Zhang, Ling-Yan;Chu, Ting
    • Bulletin of the Korean Chemical Society
    • /
    • v.34 no.5
    • /
    • pp.1457-1461
    • /
    • 2013
  • The $Fe_3O_4$-core and Ag-shell ($Fe_3O_4@Ag$ nanoeggs) were prepared through the encapsulation of 3-aminopropyltriethoxysilane-coated magnetite nanoparticle in nano-Ag shell by a simple chemically controlled procedure. The $Fe_3O_4@Ag$ nanoeggs were characterized by scanning electron microscopy, transmission electron microscopy, UV-vis spectrum and superconducting quantum interference device magnetometer, respectively. A detailed analysis is provided of how the hydrolysis and condensation of 3-aminopropyltriethoxysilane and the pH value are vital in fabricating the $Fe_3O_4@Ag$ nanoeggs. The prepared $Fe_3O_4@Ag$ nanoeggs possessed uniform size, improved monodispersity, stability against aggregation and high magnetization, which were utilized for the detection of latent fingerprints deposited onto different surfaces. The experimental results showed that the latent fingerprints developed with the $Fe_3O_4@Ag$ nanoeggs powders exhibited excellent ridge details with minimal background staining.

Evaluation of developing efficiency on latent fingerprint (잠재지문 현출효율 평가에 대한 연구)

  • Kim, Man-Ki;Park, Sung-Woo;Ohgami, Yusuke
    • Analytical Science and Technology
    • /
    • v.22 no.2
    • /
    • pp.166-171
    • /
    • 2009
  • Powder method is simple and very effective method for developing latent finger and palm print in crime scene. This technique has been actively studied to enhance effectiveness. In general, the evaluation for developing powder is mainly performed by the subjective opinion of researcher from comparison of the results obtained with existing and new one to develope finger and palm deposition. The purpose of this work is to present objective method of powder-treated latent fingerprint for evaluating method by developing efficiency. We indicated three evaluating methods of objective developing efficiency, which are measuring the number of minutiae in same sections on print, scattering level of developing reagent and contrast between developing reagent and background materials.

The Next Generation Malware Information Collection Architecture for Cybercrime Investigation

  • Cho, Ho-Mook;Bae, Chang-Su;Jang, Jaehoon;Choi, Sang-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.11
    • /
    • pp.123-129
    • /
    • 2020
  • Recently, cybercrime has become increasingly difficult to track by applying new technologies such as virtualization technology and distribution tracking avoidance. etc. Therefore, there is a limit to the technology of tracking distributors based on malicious code information through static and dynamic analysis methods. In addition, in the field of cyber investigation, it is more important to track down malicious code distributors than to analyze malicious codes themselves. Accordingly, in this paper, we propose a next-generation malicious code information collection architecture to efficiently track down malicious code distributors by converging traditional analysis methods and recent information collection methods such as OSINT and Intelligence. The architecture we propose in this paper is based on the differences between the existing malicious code analysis system and the investigation point's analysis system, which relates the necessary elemental technologies from the perspective of cybercrime. Thus, the proposed architecture could be a key approach to tracking distributors in cyber criminal investigations.

A pilot study of a new fingerprint powder application method for the reduction of health risk

  • Kim, Eun-Ji;Lee, Da-Eun;Park, Suk-Won;Seo, Kyung-Suk;Choi, Sung-Woon
    • Analytical Science and Technology
    • /
    • v.32 no.5
    • /
    • pp.196-209
    • /
    • 2019
  • As a traditional method to apply fingerprint powder, brush method ("dusting") can create a risk to the health of crime scene investigators due to the inhalation toxicity of harmful and fine powders. Therefore, as a new method of applying powders, we tried to evaluate the potential of a chamber method for the development of latent fingerprint using fans in a closed chamber with a fixed capacity that can prevent the powders from being blown outside and exposed to the users, by comparing with the development results of the conventional brush method. Fingerprints on glass and plastic (PET) were extracted with black powder and green fluorescent powder, and the sharpness and minutiae of the developed fingerprints were compared for each method. The results of the black powder showed similar results, but the effect of the chamber method was slightly decreased when the green fluorescent powder was used. In order to improve the development with the green fluorescent powder, the mixture (50 : 50) of the fluorescent powder with the silica gel was tested and the results were similar to those of the brush method. It is expected that the chamber method has a high potential as a new powder application method considering the health of the crime scene investigator after fine tuning of development conditions with additional studies.

Criminal Law Issues in Epidemiological Investigations Under the INFECTIOUS DISEASE CONTROL AND PREVENTION ACT (감염병의 예방 및 관리에 관한 법률상 역학조사와 관련된 형사법적 쟁점)

  • Jang, Junhyuk
    • The Korean Society of Law and Medicine
    • /
    • v.23 no.3
    • /
    • pp.3-44
    • /
    • 2022
  • As a result of a close review focusing on the case of obstruction of epidemiological investigation by a religious group A in Daegu, which was a problem when the pandemic of Covid-19 infection began in Korea around February 2, 2020, when an epidemiological investigator requested a specific group to submit a list, While there have been cases where an act of not responding or submitting an edited omission list was sentenced to the effect that the act did not fall under an epidemiological investigation, in the case of non-submission of the visitor list for the B Center, even though a 'list of visitors' was requested. Regarding the fact of refusal without a justifiable reason, 'providing a list of persons entering the building is a key factual act that forms a link between epidemiological investigations accompanying an epidemiological investigation, and refusing to do so is also an act of refusal and obstruction of an epidemiological investigation. There are cases where it is possible to demand criminal punishment. Regardless of whether the request for submission of the membership list falls under the epidemiological investigation, there are cases in which the someones' actions correspond to the refusal or obstruction of the epidemiological investigation. A lower court ruling that if an epidemiological investigation is rejected or obstructed as a result of interfering with factual acts accompanying an epidemiological investigation, comprehensively considering whether or not the list has been diverted for purposes other than epidemiological investigation, the logic is persuasive. Epidemiological investigations such as surveys and human specimen collection and testing are conducted for each infectious disease patient or contact confirmed as a result of the epidemiological investigation, but epidemiological investigations conducted on individual individuals cannot exist independently of each other, and the This is because the process of identification and tracking is essential to an epidemiological investigation, and if someone intentionally interferes with or rejects the process of confirming this link, it will result in direct, realistic, and widespread interference with the epidemiological investigation. In this article, ① there are differences between an epidemiological investigation and a request for information provision under the Infectious Disease Control and Prevention Act, but there are areas that fall under the epidemiological investigation even in the case of a request for information, ② Considering the medical characteristics of COVID-19 and the continuity of the epidemiological investigation, the epidemiological investigator the fact that the act of requesting a list may fall under the epidemiological investigation, ③ that the offense of obstructing the epidemiological investigation in certain cases may constitute 'obstruction of Performance of Official Duties by Fraudulent Means', and ④ rejecting the request for information provision under the Infectious Disease Control and Prevention Act from September 29, 2020 In this case, it is intended to be helpful in the application of the Infectious Disease control and Prevention Act and the practical operation of epidemiological investigations in the future by pointing out the fact that a new punishment regulation of imprisonment or fine is being implemented.

Developing of latent fingerprint on human skin (생체피부에서의 잠재지문 현출)

  • Lee, Hee-Il;Choi, Mi-Jung;Kim, Jai-Hoon;Park, Sung-Woo
    • Analytical Science and Technology
    • /
    • v.21 no.3
    • /
    • pp.222-228
    • /
    • 2008
  • On living skin the chances of a successfully developing latent fingerprint are very limited. This is due to the fact that continual perspiration and rapid absorption diffuse into the lipophillic layer on skin. A study was conducted to investigate effectively developing method of latent fingerprints on human skin surfaces and pig skin likely corpse's skin. We used commercial fingerprint powder, black powders, black magnetic powder, fluorescence magnetic powder, Cyanoacrylate fuming (CA) and direct lifting methods (lifting paper, glasses and photo glossy paper). Developing of fresh fingerprints on living skin was achieved with S-powderblack, CA fuming and CA fuming following S-powder, fluorescence powder. The other powder tends to overwhelm the latent print and the background. But, latent fingerprint residue was disappeared with time after deposit on a living surface. In case of pig skin likely corpse's skin, latent fingerprint detection was achieved with CA fuming following S-powder and deposited print during 6 hr at $25^{\circ}C$, 40% relative moisture yielded excellent fingerprints with clear ridge details using 1 min CA fuming. And enhancement of fingerprint detection image using forensic light source was achieved.

The Protection of Criminal Victims and the Improvement of Relevant Laws (범죄피해자 보호와 관련한 법률의 개선방안)

  • Song, Kwang-Soub
    • Korean Security Journal
    • /
    • no.13
    • /
    • pp.235-258
    • /
    • 2007
  • Every crime involves a victim and an offender. The offender, from the start of the criminal investigation, is considered as a suspect. After prosecution, he/she becomes the accused, and under consitutional law and criminal procedural law, has the right to enforce the contests of the acts. On the other hand, the victim or his/her family, despite being the person harmed, has very few and comparatively weak rights. To overcome this problem, the Korean criminal justice has recently recognised 'the protection and support of the victim' as a major proposition, and the police as well as the prosecutor's office have been releasing improvement plans for the protection of victims. Setting the above as the background, this thesis deals with the current victim protection acts and discusses the methods to improve them. This study will investigate a more reasonable and effective method of victim support and protection. Currently korea's laws regarding victim protection are not satisfactory, however it is fitting to say that it is certainly an external outline of what it should be. This has been due to the enforcement and creation of 'criminal victim protection' and has acted as a key to more improvements ever since. Despite this, the lack of commitment in human and financial resources to enforce these laws has now produced a possibility of the laws proving to be nothing but an unopened letter. To prevent this from happening, the victim nothing but an unopened letter. To prevent this from happening, the victim protection related laws need to be revised to be more practical and secure. Despite this, the lack of commitment in human resources and financial resources to enforce these laws has now produced a possibility of the laws proving to be nothing but an unopened letter. To prevent this from happening, the victim nothing but an unopened letter. To prevent this from happening, the victim protection related laws need to be revised to be more practical and secure.

  • PDF

An exploration of factors affecting the Crime-Terror Nexus (테러집단의 범죄 집단과의 결합현상(Crime-Terror Nexus)에 영향을 미치는 요인들에 대한 탐색적 분석연구)

  • Kim, Eun-Young
    • Korean Security Journal
    • /
    • no.37
    • /
    • pp.83-108
    • /
    • 2013
  • Since the end of the Cold War and rapid globalization and technical developments, terrorist groups actively involved in criminal activities. Also criminal entrepreneurs became a major financial revenue for these terrorists groups. This newly patternized activities among terrorist groups is now called as Crime-Terror Nexus" indicating the changing nature of terrorism, which means two traditionally separate phenomena, crime and terrorism, became more similar. This new pattern of terrorism is considered to create synergy for the criminal organizations and terrorist groups, scholars believe that it would become a significant threat to the security of world community in the near future. Although the phenomenon of this crime-terror nexus is significant and imminent threats, there is lack of studies investigation this new evolution of terrorism with empirical data. Moreover there is literally no studies exploring factors relevant to the Crime-Terror Nexus. Therefore, this current study aims to conduct explorative investigation of factors affecting the "Crime-Terror Nexus" with a world terrorism data, MAROB(the Minorities at Risk Organizational Behavior), which is developed by START and Minority at Risk project and contains information terrorist groups in Middle-East and Africa region. Considering the significance of this new terrorism patterns and the challenging nature of conducting empirical studies on this topic, this study has great contribution on the development in the field of criminal justice as well as terrorism.

  • PDF