In recent years, increased attention from the media, the international community and policy makers has highlighted the destabilizing effects criminal networks have on the legitimacy of democratic politics, as well as ...In recent years, increased attention from the media, the international community and policy makers has highlighted the destabilizing effects criminal networks have on the legitimacy of democratic politics, as well as the capacity of democratic systems to deliver basic services. Indeed, the Organization for Economic Co-operation and Development highlighted in 2014 how illicit financial flows drain the state from resources needed to provide basic services (OECD, 2014). While this problem affects not only developing and fragile states, these countries are particularly affected as this phenomenon tends to exacerbate inequality (Briscoe, Perdomo & Uribe Burcher, 2014). Mapping the factors that make politics vulnerable to the influence of organized crime is a key element in the effort to implement adequate strategies to prevent and mitigate this phenomenon. This paper explores 21 threat factors identified, understood as some of the conditions that may contribute to the likelihood that political corruption linked to organized crime takes place. These threat factors underline institutional weaknesses--including those related to illicit political fmance---and organized crime activities, which create opportunities for illicit networks to penetrate democratic political systems. The paper also discusses how these institutional weaknesses interrelate to specific criminal markets and networks. The paper draws from extensive desk research in 2015, which complements previous desk and field research on the same topic carded out in 2011-2014 in the Baltic States, Latin America and West Africa.展开更多
In order to quickly and accurately find the implementer of the network crime,based on the user portrait technology,a rapid detection method for users with abnormal behaviors is proposed.This method needs to construct ...In order to quickly and accurately find the implementer of the network crime,based on the user portrait technology,a rapid detection method for users with abnormal behaviors is proposed.This method needs to construct the abnormal behavior rule base on various kinds of abnormal behaviors in advance,and construct the user portrait including basic attribute tags,behavior attribute tags and abnormal behavior similarity tags for network users who have abnormal behaviors.When a network crime occurs,firstly get the corresponding tag values in all user portraits according to the category of the network crime.Then,use the Naive Bayesian method matching each user portrait,to quickly locate the most likely network criminal suspects.In the case that no suspect is found,all users are audited comprehensively through matching abnormal behavior rule base.The experimental results show that,the accuracy rate of using this method for fast detection of network crimes is 95.9%,and the audit time is shortened to 1/35 of that of the conventional behavior audit method.展开更多
Digital forensics is the science of identifying, extracting, analyzing and presenting the digital evidence that has been stored in the digital devices. Various digital tools and techniques are being used to achieve th...Digital forensics is the science of identifying, extracting, analyzing and presenting the digital evidence that has been stored in the digital devices. Various digital tools and techniques are being used to achieve this. Our paper explains forensic analysis steps in the storage media, hidden data analysis in the file system, network forensic methods and cyber crime data mining. This paper proposes a new tool which is the combination of digital forensic investigation and crime data mining. The proposed system is designed for finding motive, pattern of cyber attacks and counts of attacks types happened during a period. Hence the proposed tool enables the system administrators to minimize the system vulnerability.展开更多
文摘In recent years, increased attention from the media, the international community and policy makers has highlighted the destabilizing effects criminal networks have on the legitimacy of democratic politics, as well as the capacity of democratic systems to deliver basic services. Indeed, the Organization for Economic Co-operation and Development highlighted in 2014 how illicit financial flows drain the state from resources needed to provide basic services (OECD, 2014). While this problem affects not only developing and fragile states, these countries are particularly affected as this phenomenon tends to exacerbate inequality (Briscoe, Perdomo & Uribe Burcher, 2014). Mapping the factors that make politics vulnerable to the influence of organized crime is a key element in the effort to implement adequate strategies to prevent and mitigate this phenomenon. This paper explores 21 threat factors identified, understood as some of the conditions that may contribute to the likelihood that political corruption linked to organized crime takes place. These threat factors underline institutional weaknesses--including those related to illicit political fmance---and organized crime activities, which create opportunities for illicit networks to penetrate democratic political systems. The paper also discusses how these institutional weaknesses interrelate to specific criminal markets and networks. The paper draws from extensive desk research in 2015, which complements previous desk and field research on the same topic carded out in 2011-2014 in the Baltic States, Latin America and West Africa.
基金This research is supported by The National Natural Science Foundation of China under Grant(No.61672101)Beijing Key Laboratory of Internet Culture and Digital Dissemination Research(No.ICDDXN004)Key Lab of Information Network Security of Ministry of Public Security(No.C18601).
文摘In order to quickly and accurately find the implementer of the network crime,based on the user portrait technology,a rapid detection method for users with abnormal behaviors is proposed.This method needs to construct the abnormal behavior rule base on various kinds of abnormal behaviors in advance,and construct the user portrait including basic attribute tags,behavior attribute tags and abnormal behavior similarity tags for network users who have abnormal behaviors.When a network crime occurs,firstly get the corresponding tag values in all user portraits according to the category of the network crime.Then,use the Naive Bayesian method matching each user portrait,to quickly locate the most likely network criminal suspects.In the case that no suspect is found,all users are audited comprehensively through matching abnormal behavior rule base.The experimental results show that,the accuracy rate of using this method for fast detection of network crimes is 95.9%,and the audit time is shortened to 1/35 of that of the conventional behavior audit method.
文摘Digital forensics is the science of identifying, extracting, analyzing and presenting the digital evidence that has been stored in the digital devices. Various digital tools and techniques are being used to achieve this. Our paper explains forensic analysis steps in the storage media, hidden data analysis in the file system, network forensic methods and cyber crime data mining. This paper proposes a new tool which is the combination of digital forensic investigation and crime data mining. The proposed system is designed for finding motive, pattern of cyber attacks and counts of attacks types happened during a period. Hence the proposed tool enables the system administrators to minimize the system vulnerability.