440 likes | 731 Views
Cyber Crime:How to Tackle it?. By Angom Buboo Singh NIELIT Imphal (Formerly DOEACC Centre Imphal) In Co-ordination with Dept of IT, Govt. of Manipur. What is Cyber Crime?. Any unlawful activity which involve Computer, Network or mobile devices. Is it for real.
E N D
Cyber Crime:How to Tackle it? By Angom Buboo Singh NIELIT Imphal (Formerly DOEACC Centre Imphal) In Co-ordination with Dept of IT, Govt. of Manipur
What is Cyber Crime? • Any unlawful activity which involve Computer, Network or mobile devices.
To… Co-ordinated, State sponsored Cyber war on other country
To… Co-ordinated, State sponsored Cyber war on other country
Hence… • We are all vulnerable to cyber crime… no matter what we are or where we are, we can be victim of cyber crime.
What then?... • Get aware
IT Act 2000 / Amendment 2008 • Enacted on 17th May 2000 • India is 12th nation in the world to adopt cyber laws • Various Cases solved based on the act
Why??? • No proper Agency ??? • No Adequate Infrastructure ??? • No General Awareness ??? • Or • No Crime !!!
NIELIT Imphal’s Initiative… • Established Cyber Forensic Training Lab
NIELIT Imphal’s Initiative… • With Latest Hardware…
NIELIT Imphal’s Initiative… • With Latest Hardware…
NIELIT Imphal’s Initiative… • With Latest Hardware…
NIELIT Imphal’s Initiative… • With Latest Software…
NIELIT Imphal’s Initiative… • Trained more than 80 participants including two batches from Manipur State Police Department
Famous Cyber pornography cases • DPS MMS case • Delhi Public School Multimedia Messaging Service • Air Force Bal Bharati School case • Miss Jammu MMS case • Recent Karnataka Assembly Case IT Act 2000 Section 67 : Publishing of obscene material in electronic form
Forgery • Andhra Pradesh Tax Case In the explanation of the Rs. 22 Crore which was recovered from the house of the owner of a plastic firm by the sleuths of vigilance department, the accused person submitted 6000 vouchers to legitimize the amount recovered, but after careful scrutiny of vouchers and contents of his computers it revealed that all of them were made after the raids were conducted . All vouchers were fake computerized vouchers. Deleted data such as computer file, photos or videos from camera can be recovered using forensic tools
Email Spoofing • PranabMitra , former executive of Gujarat Ambuja Cement posed as a woman, Rita Basu, and created a fake e-mail ID through which he contacted one V.R. Ninawe an Abu Dhabi businessmen . After long cyber relationship and emotional messages Mitra sent an e-mail that ‘‘she would commit suicide’’ if Ninawe ended the relationship. He also gave him ‘‘another friend RuchiraSengupta’s’’ e-mail ID which was in fact his second bogus address. When Ninawe mailed at the other ID he was shocked to learn that Mitra had died and police is searching Ninawe. Mitra extorted few lacs Rupees as advocate fees etc. Mitra even sent e-mails as high court and police officials to extort more money. Ninawe finally came down to Mumbai to lodge a police case. • Late Dr.Kishan email Spoofing case. Email can be traced back to the sender
Online Fraud • Cyber lotto case:In Andhra Pradesh one Kola Mohan created a website and an email address on the Internet with the address 'eurolottery@usa.net.' which shows his own name as beneficiary of 12.5 million pound in Euro lottery. After getting confirmation with the email address a telgu newspaper published this as news. He gathered huge sums from the public as well as from some banks. The fraud came to light only when a cheque amounting Rs 1.73 million discounted by him with Andhra bank got dishonored. • Various Online Network Marketing, forex , stock, gold etc Internet access logs stores information of who, what and where of Internet activities
Online Extortion • The complainant has received a threatening email and demanded protection from unknown person claiming to be the member of Halala Gang, Dubai. Police registered a case u/s. 384/506/511 IPC. • The sender of the email used the email ID xyz@yahoo.com & abc@yahoo.com and signed as Chengez Babar. • Both the email accounts were tracked, details collected from ISP’s & locations were identified. • The Cyber cafes from which the emails has been made were monitored and the accused person was nabbed red handed. Internet access logs stores information of who, what and where of Internet activities
Online Threat • Mrs. SONIA GANDHI RECEIVED THREATENING E-MAILS • E- MAIL FROM • missonrevenge84@khalsa.com • missionrevenge84@hotmail.com • THE CASE WAS REFERRED • ACCUSED PERSON LOST HIS PARENTS DURING 1984 RIOTS Internet access logs stores information of who, what and where of Internet activities Email can be traced back to the sender
Online Defamation • Impersonation, Defamation on social networking sites such as Facebook, Orkut are common Internet access logs stores information of who, what and where of Internet activities
How to Tackle Cyber Crime? • Setup Cyber Crime Cell • Train Law Enforcement Agencies • Awareness training for Government Employees • Mass Awareness for general public • Workshops/seminar for schools and colleges • Awareness through print / electronic media