{"id":482,"date":"2003-11-23T00:00:00","date_gmt":"2003-11-23T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/11\/23\/cyber-crime-investigators-crack-down-illegal-internet-activities-in-korea\/"},"modified":"2021-12-30T11:37:26","modified_gmt":"2021-12-30T11:37:26","slug":"cyber-crime-investigators-crack-down-illegal-internet-activities-in-korea","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/11\/23\/cyber-crime-investigators-crack-down-illegal-internet-activities-in-korea\/","title":{"rendered":"Cyber Crime Investigators Crack Down Illegal Internet Activities in Korea"},"content":{"rendered":"<p>With more than half the nation&#8217;s population logging online on a regular basis, it&#8217;s needless to say that the Internet is now an essential part of everyday life here in Korea.  The Cyber Crime Investigation division of the Seoul Metropolitan Police Agency say fighting cyber crime is an uphill battle as more and more people are using the Internet to do many tasks such as business, shopping as well as to get information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recently the CCI arrested 11 members of a local hacking clan on charges of stealing personal information since July, 2000 from over 90 websites of mainly online shopping malls, universities and the National Tax Service security server.<\/p>\n<p>Even at this moment these Cyber Crime Investigators are monitoring to track down any irregularities in cyber space to help provide Koreans with a safe and healthy online environment.<\/p>\n<p>More info: [url=http:\/\/english.chosun.com\/w21data\/html\/news\/200311\/200311230001.html]http:\/\/english.chosun.com\/w21data\/html\/news\/200311\/200311230001.html[\/url]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-482","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/482","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=482"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/482\/revisions"}],"predecessor-version":[{"id":2969,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/482\/revisions\/2969"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=482"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=482"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=482"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}