Documente Academic
Documente Profesional
Documente Cultură
Most of these Crimes are not new. Criminals simply devise different ways to undertakeStandard Criminal Activities such as Fraud, Theft, Blackmail, Forgery and Embezzlement using the New Medium, Often Involving the Internet.
Sale of illegal articles-narcotics, weapons, wildlife Online gambling , Intellectual Property crimes- software piracy, copyright infringement, trademarks violations, theft of computer source code
Defamation
Cyber stalking (section 509 IPC) Phishing Cyber terrorism
1977
1995
2000
2003-04
2005-06
2007-08
8000 7000 6000 5000 4000 3000 2000 1000 0 1998 1999 2000 441 1002 2219
7039
2001
25 20 15 10 6 5 0 0 1998
25
12
1999
2000
2001
REPORTED CASES
State versus Amit Pasari and Kapil Juneja Delhi Police
M/s Softweb Solutions Website www.go2nextjob.com hosted Complaint of hacking by web hosting service
Criminal intimidation of employers and crashing the companys server Phoenix Global solutions
IT Act, 2000 IT (Amendment) Bill, 2006 Data Protection & Computer crimes Best Practice ISO 27001 Security Assurance Framework- IT/ITES/BPO Companies
Security Incident Early Warning & Response CERT-In National Cyber Alert System
Information Exchange with international CERTs Skill & Competence development Training of law enforcement agencies and judicial officials in the collection and analysis of digital evidence Training in the area of implementing information security in collaboration with Specialised Organisations in US Domain Specific training Cyber Forensics Network Monitoring Biometric Authentication Network Security
Capacity building
International Collaboration
Global Issues: Most of the IP addresses retrieved during investigation leads to servers or computers located abroad which have no identity, hence further investigations are blocked and closed. Correspondence with bodies such as Google, Yahoo, Hotmail is quite time consuming and prolong the investigations.
Recently China has been manufacturing mobile phones that have cloned IME numbers which is a current challenge faced in Mobile forensics. Wireless or Wi-Fi, Bluetooth, Infrared Issues: Latest wireless technologies which provide internet connections causes exploitation especially when it is not secured. This is the present technology terrorists and radical activists exploit. This is another vulnerability that law enforcement faces.
Think bef
THANK YOU
QUERIES!!!!!!!