1 / 44

Cyber Crime:How to Tackle it?

Cyber Crime:How to Tackle it?. By Angom Buboo Singh NIELIT Imphal (Formerly DOEACC Centre Imphal) In Co-ordination with Dept of IT, Govt. of Manipur. What is Cyber Crime?. Any unlawful activity which involve Computer, Network or mobile devices. Is it for real.

kylene
Download Presentation

Cyber Crime:How to Tackle it?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber Crime:How to Tackle it? By Angom Buboo Singh NIELIT Imphal (Formerly DOEACC Centre Imphal) In Co-ordination with Dept of IT, Govt. of Manipur

  2. What is Cyber Crime? • Any unlawful activity which involve Computer, Network or mobile devices.

  3. Is it for real...

  4. News from around the world…

  5. News from around the world…

  6. News from around the world…

  7. News from around the world…

  8. News from India…

  9. News from India…

  10. News from India…

  11. And the Victims…

  12. From… ordinary citizen

  13. To… big shots

  14. Severity of the crime…

  15. From… Simple prank or Hoax

  16. From… Simple prank or Hoax

  17. To… Co-ordinated, State sponsored Cyber war on other country

  18. To… Co-ordinated, State sponsored Cyber war on other country

  19. Hence… • We are all vulnerable to cyber crime… no matter what we are or where we are, we can be victim of cyber crime.

  20. What then?... • Get aware

  21. IT Act 2000 / Amendment 2008 • Enacted on 17th May 2000 • India is 12th nation in the world to adopt cyber laws • Various Cases solved based on the act

  22. No Cyber Crime reported in Manipur in 2010

  23. Why??? • No proper Agency ??? • No Adequate Infrastructure ??? • No General Awareness ??? • Or • No Crime !!!

  24. What about other States?...

  25. What about other States?...

  26. What about other States?...

  27. What about other States?...

  28. NIELIT Imphal’s Initiative… • Established Cyber Forensic Training Lab

  29. NIELIT Imphal’s Initiative… • With Latest Hardware…

  30. NIELIT Imphal’s Initiative… • With Latest Hardware…

  31. NIELIT Imphal’s Initiative… • With Latest Hardware…

  32. NIELIT Imphal’s Initiative… • With Latest Software…

  33. NIELIT Imphal’s Initiative… • Trained more than 80 participants including two batches from Manipur State Police Department

  34. Some cyber crime cases…

  35. Famous Cyber pornography cases • DPS MMS case • Delhi Public School Multimedia Messaging Service • Air Force Bal Bharati School case • Miss Jammu MMS case • Recent Karnataka Assembly Case IT Act 2000 Section 67 : Publishing of obscene material in electronic form

  36. Forgery • Andhra Pradesh Tax Case In the explanation of the Rs. 22 Crore which was recovered from the house of the owner of a plastic firm by the sleuths of vigilance department, the accused person submitted 6000 vouchers to legitimize the amount recovered, but after careful scrutiny of vouchers and contents of his computers it revealed that all of them were made after the raids were conducted . All vouchers were fake computerized vouchers. Deleted data such as computer file, photos or videos from camera can be recovered using forensic tools

  37. Email Spoofing • PranabMitra , former executive of Gujarat Ambuja Cement posed as a woman, Rita Basu, and created a fake e-mail ID through which he contacted one V.R. Ninawe an Abu Dhabi businessmen . After long cyber relationship and emotional messages Mitra sent an e-mail that ‘‘she would commit suicide’’ if Ninawe ended the relationship. He also gave him ‘‘another friend RuchiraSengupta’s’’ e-mail ID which was in fact his second bogus address. When Ninawe mailed at the other ID he was shocked to learn that Mitra had died and police is searching Ninawe. Mitra extorted few lacs Rupees as advocate fees etc. Mitra even sent e-mails as high court and police officials to extort more money. Ninawe finally came down to Mumbai to lodge a police case. • Late Dr.Kishan email Spoofing case. Email can be traced back to the sender

  38. Online Fraud • Cyber lotto case:In Andhra Pradesh one Kola Mohan created a website and an email address on the Internet with the address 'eurolottery@usa.net.' which shows his own name as beneficiary of 12.5 million pound in Euro lottery. After getting confirmation with the email address a telgu newspaper published this as news. He gathered huge sums from the public as well as from some banks. The fraud came to light only when a cheque amounting Rs 1.73 million discounted by him with Andhra bank got dishonored. • Various Online Network Marketing, forex , stock, gold etc Internet access logs stores information of who, what and where of Internet activities

  39. Online Extortion • The complainant has received a threatening email and demanded protection from unknown person claiming to be the member of Halala Gang, Dubai. Police registered a case u/s. 384/506/511 IPC. • The sender of the email used the email ID xyz@yahoo.com & abc@yahoo.com and signed as Chengez Babar. • Both the email accounts were tracked, details collected from ISP’s & locations were identified. • The Cyber cafes from which the emails has been made were monitored and the accused person was nabbed red handed. Internet access logs stores information of who, what and where of Internet activities

  40. Online Threat • Mrs. SONIA GANDHI RECEIVED THREATENING E-MAILS • E- MAIL FROM • missonrevenge84@khalsa.com • missionrevenge84@hotmail.com • THE CASE WAS REFERRED • ACCUSED PERSON LOST HIS PARENTS DURING 1984 RIOTS Internet access logs stores information of who, what and where of Internet activities Email can be traced back to the sender

  41. Online Defamation • Impersonation, Defamation on social networking sites such as Facebook, Orkut are common Internet access logs stores information of who, what and where of Internet activities

  42. How to Tackle Cyber Crime? • Setup Cyber Crime Cell • Train Law Enforcement Agencies • Awareness training for Government Employees • Mass Awareness for general public • Workshops/seminar for schools and colleges • Awareness through print / electronic media

  43. ?

More Related