SlideShare a Scribd company logo
1 of 25
Cyber Crimes in India:
Present Status & Proposed Reforms
drneetaa@gmail.com
Cyber Crimes
• Combination of Crime and Computer is ‘Cyber Crime’.They are of two types:
• Computer as aWeapon
• Credit Card Frauds
• IPRViolations
• Pornography
• DrugTrafficking
• HumanTrafficking
• Computer as aTarget
• Phishing
• Hacking
• Virus/Worm Attacks
Common Cyber-crimes
• Common Cyber-crime scenarios
• Harassment via fake public profile on social networking site
• Online Hate Community
• Email Account Hacking
• Credit Card Fraud
• Web Defacement
• IntroducingViruses,Worms, Backdoors, Rootkits,Trojans, Bugs
• CyberTerrorism
• Online sale of illegal Articles
• Cyber Pornography
• Phishing and Email Scams
• Theft of Confidential Information
• Source CodeTheft
• Tax Evasion and Money Laundering
• Online ShareTrading Fraud
Cyber Population in India
Current Scenario andTrends
Motivation behind attacks, Sept 2017
Hypothesis
• All the cyber crimes are NOT intimated to the cyber police in India.
• All cyber crimes are NOT properly investigated (and charge sheeted) by cyber police.
• All cyber cases brought before the court are NOT properly handled by court.
• All cyber criminals are NOT prosecuted by court because of technical problems.
• The general public is NOT aware of types of cyber crimes and how to protect themselves from
cyber crimes.
• The Indian cyber police are NOT trained to handle cyber crimes effectively.
• The Indian cyber police are NOT equipped to handle cyber crimes effectively.
• The Indian law courts (and its officials) are NOT trained to handle cyber crimes effectively.
• The Indian law courts (and it’s officials) are NOT equipped to handle cyber crimes effectively.
• The Indian government has NOT been able to effectively handle and control
Phishing
IT Act 2000
IT Legation deals with :
Legal Regal Recognition of Electronic Documentation
Legal Recognition of Digital Signature
Offenses and Contraventions
Justice Dispensation Systems forCyber Crimes
Provisions of IT Act 2000
• Email would now be a valid and legal form of communication
• Companies shall now be able to carry out electronic commerce using the legal
infrastructure
• Digital signatures have been given legal validity and sanction in the Act.
• Corporate companies will be in the business of being Certifying Authorities for
issuing Digital Signatures Certificates.
• Allows Government to issue notification on the web thus heralding e- governance.
• Companies can file any form, application or any other document with any office,
authority, body or agency owned or controlled by the appropriate Government in
electronic form
• A monetary damage, not exceeding Rs.1 crore; if anyone breaks into the computer
systems or network and cause loss.The damages or copies data.
Specific Exclusion(s)
• In the following cases, the IT Act is not applicable.:
• Negotiable instrument (other than a cheque) as per section 13 of Negotiable
Instruments Act 1881
• A power-of attorney as defined in section 1A of the Powers-of-AttorneyAct, 18882
• A trust as defined in section 3 of IndianTrusts Act, 1882
• A will as defined in clause (h) of section 2 of the Indian SuccessionAct 1925 including
any other testamentary disposition
Amendments as per IT Act 2008
• The following departments were included :
• Telecom Services
• Network Services
• Internet Services
• Web Hosting Services
Salient Features of IT Act 2008
• Focus of Data Privacy
• Focus on Information Security
• Defining Cyber Cafe
• Making digital signature technology neutral
• Defining reasonable security practices to be followed by Corporate
• Redefining the role of intermediaries
• Recognizing the role of Indian Computer Emergency ResponseTeam
• Inclusion of some additional cyber crimes like child pornography and cyber
terrorism
• Authorizing an inspector to investigate cyber offenses
LIMITATIONS
• While enough teeth have been given by the Law, yet, due to lack of intent,
meticulous planning and knowledge of Hi-tech intricacies, the offenders
slip away from the clutches of Law.To overcome a HiTech Intelligent Task
Force (HTITF)is required.
• There is a lot of scope for automation and Artificial Intelligence, who can
scan the 24 hr, 365 day video captured data?We need Big Data Analytics
and AI based algorithms to assist us.
Four Vs of Big Data
BIG Data Analytics
• Preparing a data Bank with photographs, descriptions and relevant important
information about anti-national elements.
• Keeping strict vigil on printing /distribution of literature pamphlets,
magazines and propaganda on electronic media to prevent anti-national
designs of ISI.
• Preparing updated information system, incorporating the latest details about
membership, foreign linkages, weapons, transport, bank accounts, lockers,
passports, associates in the bureaucracy, e- mail accounts, mobile phone
numbers, fax and other phone numbers, etc.
• Movement pattern Identification
General Strategy
• Having constant interaction with chartered accountants, I.T. department,
brokers of the stock exchange, property dealers etc. to keep a close watch on
the financial activities of the key players.
• Keeping a close watch on the activities of the hardcore gangsters, public
servants, politicians, support groups, by effective physical surveillance and
telephone & mail interception.
• Identification of financial transactions that appear to launder funds. Havala
and trans border financial activity, foreign funding put to a closer scrutiny.
General Strategy
TECHNICAL INTELLIGENCE
Technology at the state level and experts to intercept terrorist e-mails, satellite phone calls and monitor
banking channels
WHAT NEEDS TO BE DONE
Challenges of Big Data Analytics
• Format variation of data
• Fast moving streaming data
• Highly distributed Input source
• High dimensionally of data
• Trust worthiness of data analytics
• Noisy or Poor quality of data
• Scalability of algorithm
• Feature extraction
• Imbalance input data
• Inadequate data storage
• Unsummarized & uncategorized data
• Data indexing & classification
• Fast information retrieval.
Challenges Ahead of Cyber Crime
• Can we balance data collection for the purpose of national security with
privacy concerns?
• How can we stop the crime to happen?
• What can be done to mitigate the risks of false positives?
• How do we translate the insights into operational relevance?
National
Security
Advisor
National
Security
Council
RAWIB
Defense
Intelligence
Police/ Para
Military
Agency
ANTI-TERRORIST SQADS
STATE INTELLEGENCE AGENCIES
Close coordination between CBI, IB, RAW,
Directorate of Military Intelligence,
Directorate of Revenue Intelligence,
Enforcement Directorate, Customs and
Narcotics Control Bureau.
Dissemination of
information to ground level
and ground forces using
DRONES and Satellite.
Selective
Sharing
Of Data
Single Window Set-Up & Solution
Finally….
• We need very intelligent, passionate and committed cyber workforce.
• Rate Cyber policing very coveted
• Admire them
Bibliography
• www.terrorism.com
• www.siteinstitute.org
• www.counterterrorismblog.org
• www.e-prism.org
• www.jamestown.org
• www.alemarah.org
• Deep learning applications and challenges in big data analytics Najafabadi et.al., Journal of
Big Data, Springer, 2016
• Big data classification: Problems and challenges in network intrusion prediction with machine
learning, Suthaharan, Pittsburg, 2013
• Training products of Experts by minimizing contrastive divergence, Hinton G, Neural
Compute, 2002

More Related Content

What's hot

Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.Niloy Biswas
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in indiaAdv Prashant Mali
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and crackingHarshil Barot
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Dr. Heera Lal IAS
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security lawsNasir Bhutta
 
Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crimeatuljaybhaye
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAHardik Solanki
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Digital forensic
Digital forensicDigital forensic
Digital forensicChandan Sah
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111Yogendra Wagh
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇Charles Mok
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013Vidushi Singh
 

What's hot (20)

Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crime
 
Organised crime
Organised crimeOrganised crime
Organised crime
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIA
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Digital forensic
Digital forensicDigital forensic
Digital forensic
 
It act law ppt
It act law pptIt act law ppt
It act law ppt
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 

Similar to Cyber crimes in india Dr. Neeta Awasthy

Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Andreaa Viv
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
Cyber fraud a threat to E commerce
Cyber fraud a threat to E commerceCyber fraud a threat to E commerce
Cyber fraud a threat to E commerceSudeshna07
 
Computer crime
Computer crimeComputer crime
Computer crimeUc Man
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsGoutama Bachtiar
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Jayati Tiwari
 
cyber-protect-may-17-law-society-presentation.pptx
cyber-protect-may-17-law-society-presentation.pptxcyber-protect-may-17-law-society-presentation.pptx
cyber-protect-may-17-law-society-presentation.pptxParasSehgal12
 
cyber-protect-may-17-law-society-presentation.pptx
cyber-protect-may-17-law-society-presentation.pptxcyber-protect-may-17-law-society-presentation.pptx
cyber-protect-may-17-law-society-presentation.pptxbiswajitghosal4
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Tech and Law Center
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 

Similar to Cyber crimes in india Dr. Neeta Awasthy (20)

Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Cyber fraud a threat to E commerce
Cyber fraud a threat to E commerceCyber fraud a threat to E commerce
Cyber fraud a threat to E commerce
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber of things 2.0
Cyber of things 2.0Cyber of things 2.0
Cyber of things 2.0
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
Computer crime
Computer crimeComputer crime
Computer crime
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber-protect-may-17-law-society-presentation.pptx
cyber-protect-may-17-law-society-presentation.pptxcyber-protect-may-17-law-society-presentation.pptx
cyber-protect-may-17-law-society-presentation.pptx
 
cyber-protect-may-17-law-society-presentation.pptx
cyber-protect-may-17-law-society-presentation.pptxcyber-protect-may-17-law-society-presentation.pptx
cyber-protect-may-17-law-society-presentation.pptx
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber security
 Cyber security Cyber security
Cyber security
 
UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
 
Computer crime
Computer crimeComputer crime
Computer crime
 

More from Prof. Neeta Awasthy

Subhash Chandra Bose, His travels to Freedom
Subhash Chandra Bose, His travels to FreedomSubhash Chandra Bose, His travels to Freedom
Subhash Chandra Bose, His travels to FreedomProf. Neeta Awasthy
 
# 21 tips for a great presentation
# 21 tips for a great presentation# 21 tips for a great presentation
# 21 tips for a great presentationProf. Neeta Awasthy
 
Case study of digitization in india
Case study of digitization in indiaCase study of digitization in india
Case study of digitization in indiaProf. Neeta Awasthy
 
Student dashboard for Engineering Undergraduates
Student dashboard for Engineering UndergraduatesStudent dashboard for Engineering Undergraduates
Student dashboard for Engineering UndergraduatesProf. Neeta Awasthy
 
Handling Capstone projects in Engineering Colllege
Handling Capstone projects in Engineering ColllegeHandling Capstone projects in Engineering Colllege
Handling Capstone projects in Engineering ColllegeProf. Neeta Awasthy
 
Engineering Applications of Machine Learning
Engineering Applications of Machine LearningEngineering Applications of Machine Learning
Engineering Applications of Machine LearningProf. Neeta Awasthy
 
Data Science & Artificial Intelligence for ALL
Data Science & Artificial Intelligence for ALLData Science & Artificial Intelligence for ALL
Data Science & Artificial Intelligence for ALLProf. Neeta Awasthy
 
Big data and Artificial Intelligence
Big data and Artificial IntelligenceBig data and Artificial Intelligence
Big data and Artificial IntelligenceProf. Neeta Awasthy
 
Academic industry collaboration at kec dated 3.6.17 v 3
Academic industry collaboration at kec dated 3.6.17 v 3Academic industry collaboration at kec dated 3.6.17 v 3
Academic industry collaboration at kec dated 3.6.17 v 3Prof. Neeta Awasthy
 
Big data in defence and national security malayasia
Big data in defence and national security   malayasiaBig data in defence and national security   malayasia
Big data in defence and national security malayasiaProf. Neeta Awasthy
 
Artificial Neural Networks for NIU session 2016 17
Artificial Neural Networks for NIU session 2016 17 Artificial Neural Networks for NIU session 2016 17
Artificial Neural Networks for NIU session 2016 17 Prof. Neeta Awasthy
 

More from Prof. Neeta Awasthy (20)

NEP 2020 .pptx
NEP 2020 .pptxNEP 2020 .pptx
NEP 2020 .pptx
 
Subhash Chandra Bose, His travels to Freedom
Subhash Chandra Bose, His travels to FreedomSubhash Chandra Bose, His travels to Freedom
Subhash Chandra Bose, His travels to Freedom
 
# 21 tips for a great presentation
# 21 tips for a great presentation# 21 tips for a great presentation
# 21 tips for a great presentation
 
Comparative Design thinking
Comparative Design thinking Comparative Design thinking
Comparative Design thinking
 
National Education Policy 2020
National Education Policy 2020 National Education Policy 2020
National Education Policy 2020
 
Personalised education (2)
Personalised education (2)Personalised education (2)
Personalised education (2)
 
Case study of digitization in india
Case study of digitization in indiaCase study of digitization in india
Case study of digitization in india
 
Student dashboard for Engineering Undergraduates
Student dashboard for Engineering UndergraduatesStudent dashboard for Engineering Undergraduates
Student dashboard for Engineering Undergraduates
 
Handling Capstone projects in Engineering Colllege
Handling Capstone projects in Engineering ColllegeHandling Capstone projects in Engineering Colllege
Handling Capstone projects in Engineering Colllege
 
Engineering Applications of Machine Learning
Engineering Applications of Machine LearningEngineering Applications of Machine Learning
Engineering Applications of Machine Learning
 
Design thinking in Engineering
Design thinking in EngineeringDesign thinking in Engineering
Design thinking in Engineering
 
Data Science & Artificial Intelligence for ALL
Data Science & Artificial Intelligence for ALLData Science & Artificial Intelligence for ALL
Data Science & Artificial Intelligence for ALL
 
Big data and Artificial Intelligence
Big data and Artificial IntelligenceBig data and Artificial Intelligence
Big data and Artificial Intelligence
 
Academic industry collaboration at kec dated 3.6.17 v 3
Academic industry collaboration at kec dated 3.6.17 v 3Academic industry collaboration at kec dated 3.6.17 v 3
Academic industry collaboration at kec dated 3.6.17 v 3
 
AI in Talent Acquisition
AI in Talent AcquisitionAI in Talent Acquisition
AI in Talent Acquisition
 
Big data in defence and national security malayasia
Big data in defence and national security   malayasiaBig data in defence and national security   malayasia
Big data in defence and national security malayasia
 
Ann a Algorithms notes
Ann a Algorithms notesAnn a Algorithms notes
Ann a Algorithms notes
 
Artificial Neural Networks for NIU session 2016 17
Artificial Neural Networks for NIU session 2016 17 Artificial Neural Networks for NIU session 2016 17
Artificial Neural Networks for NIU session 2016 17
 
Steepest descent method
Steepest descent methodSteepest descent method
Steepest descent method
 
Gradient descent method
Gradient descent methodGradient descent method
Gradient descent method
 

Recently uploaded

Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxolyaivanovalion
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxStephen266013
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxolyaivanovalion
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxolyaivanovalion
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxolyaivanovalion
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationshipsccctableauusergroup
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSAishani27
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAroojKhan71
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiSuhani Kapoor
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998YohFuh
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionfulawalesam
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一ffjhghh
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystSamantha Rae Coolbeth
 

Recently uploaded (20)

Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docx
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
E-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptxE-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptx
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptx
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptx
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICS
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interaction
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data Analyst
 

Cyber crimes in india Dr. Neeta Awasthy

  • 1. Cyber Crimes in India: Present Status & Proposed Reforms drneetaa@gmail.com
  • 2. Cyber Crimes • Combination of Crime and Computer is ‘Cyber Crime’.They are of two types: • Computer as aWeapon • Credit Card Frauds • IPRViolations • Pornography • DrugTrafficking • HumanTrafficking • Computer as aTarget • Phishing • Hacking • Virus/Worm Attacks
  • 3. Common Cyber-crimes • Common Cyber-crime scenarios • Harassment via fake public profile on social networking site • Online Hate Community • Email Account Hacking • Credit Card Fraud • Web Defacement • IntroducingViruses,Worms, Backdoors, Rootkits,Trojans, Bugs • CyberTerrorism • Online sale of illegal Articles • Cyber Pornography • Phishing and Email Scams • Theft of Confidential Information • Source CodeTheft • Tax Evasion and Money Laundering • Online ShareTrading Fraud
  • 7. Hypothesis • All the cyber crimes are NOT intimated to the cyber police in India. • All cyber crimes are NOT properly investigated (and charge sheeted) by cyber police. • All cyber cases brought before the court are NOT properly handled by court. • All cyber criminals are NOT prosecuted by court because of technical problems. • The general public is NOT aware of types of cyber crimes and how to protect themselves from cyber crimes. • The Indian cyber police are NOT trained to handle cyber crimes effectively. • The Indian cyber police are NOT equipped to handle cyber crimes effectively. • The Indian law courts (and its officials) are NOT trained to handle cyber crimes effectively. • The Indian law courts (and it’s officials) are NOT equipped to handle cyber crimes effectively. • The Indian government has NOT been able to effectively handle and control
  • 9. IT Act 2000 IT Legation deals with : Legal Regal Recognition of Electronic Documentation Legal Recognition of Digital Signature Offenses and Contraventions Justice Dispensation Systems forCyber Crimes
  • 10. Provisions of IT Act 2000 • Email would now be a valid and legal form of communication • Companies shall now be able to carry out electronic commerce using the legal infrastructure • Digital signatures have been given legal validity and sanction in the Act. • Corporate companies will be in the business of being Certifying Authorities for issuing Digital Signatures Certificates. • Allows Government to issue notification on the web thus heralding e- governance. • Companies can file any form, application or any other document with any office, authority, body or agency owned or controlled by the appropriate Government in electronic form • A monetary damage, not exceeding Rs.1 crore; if anyone breaks into the computer systems or network and cause loss.The damages or copies data.
  • 11. Specific Exclusion(s) • In the following cases, the IT Act is not applicable.: • Negotiable instrument (other than a cheque) as per section 13 of Negotiable Instruments Act 1881 • A power-of attorney as defined in section 1A of the Powers-of-AttorneyAct, 18882 • A trust as defined in section 3 of IndianTrusts Act, 1882 • A will as defined in clause (h) of section 2 of the Indian SuccessionAct 1925 including any other testamentary disposition
  • 12. Amendments as per IT Act 2008 • The following departments were included : • Telecom Services • Network Services • Internet Services • Web Hosting Services
  • 13. Salient Features of IT Act 2008 • Focus of Data Privacy • Focus on Information Security • Defining Cyber Cafe • Making digital signature technology neutral • Defining reasonable security practices to be followed by Corporate • Redefining the role of intermediaries • Recognizing the role of Indian Computer Emergency ResponseTeam • Inclusion of some additional cyber crimes like child pornography and cyber terrorism • Authorizing an inspector to investigate cyber offenses
  • 14. LIMITATIONS • While enough teeth have been given by the Law, yet, due to lack of intent, meticulous planning and knowledge of Hi-tech intricacies, the offenders slip away from the clutches of Law.To overcome a HiTech Intelligent Task Force (HTITF)is required. • There is a lot of scope for automation and Artificial Intelligence, who can scan the 24 hr, 365 day video captured data?We need Big Data Analytics and AI based algorithms to assist us.
  • 15.
  • 16. Four Vs of Big Data
  • 18. • Preparing a data Bank with photographs, descriptions and relevant important information about anti-national elements. • Keeping strict vigil on printing /distribution of literature pamphlets, magazines and propaganda on electronic media to prevent anti-national designs of ISI. • Preparing updated information system, incorporating the latest details about membership, foreign linkages, weapons, transport, bank accounts, lockers, passports, associates in the bureaucracy, e- mail accounts, mobile phone numbers, fax and other phone numbers, etc. • Movement pattern Identification General Strategy
  • 19. • Having constant interaction with chartered accountants, I.T. department, brokers of the stock exchange, property dealers etc. to keep a close watch on the financial activities of the key players. • Keeping a close watch on the activities of the hardcore gangsters, public servants, politicians, support groups, by effective physical surveillance and telephone & mail interception. • Identification of financial transactions that appear to launder funds. Havala and trans border financial activity, foreign funding put to a closer scrutiny. General Strategy
  • 20. TECHNICAL INTELLIGENCE Technology at the state level and experts to intercept terrorist e-mails, satellite phone calls and monitor banking channels WHAT NEEDS TO BE DONE
  • 21. Challenges of Big Data Analytics • Format variation of data • Fast moving streaming data • Highly distributed Input source • High dimensionally of data • Trust worthiness of data analytics • Noisy or Poor quality of data • Scalability of algorithm • Feature extraction • Imbalance input data • Inadequate data storage • Unsummarized & uncategorized data • Data indexing & classification • Fast information retrieval.
  • 22. Challenges Ahead of Cyber Crime • Can we balance data collection for the purpose of national security with privacy concerns? • How can we stop the crime to happen? • What can be done to mitigate the risks of false positives? • How do we translate the insights into operational relevance?
  • 23. National Security Advisor National Security Council RAWIB Defense Intelligence Police/ Para Military Agency ANTI-TERRORIST SQADS STATE INTELLEGENCE AGENCIES Close coordination between CBI, IB, RAW, Directorate of Military Intelligence, Directorate of Revenue Intelligence, Enforcement Directorate, Customs and Narcotics Control Bureau. Dissemination of information to ground level and ground forces using DRONES and Satellite. Selective Sharing Of Data Single Window Set-Up & Solution
  • 24. Finally…. • We need very intelligent, passionate and committed cyber workforce. • Rate Cyber policing very coveted • Admire them
  • 25. Bibliography • www.terrorism.com • www.siteinstitute.org • www.counterterrorismblog.org • www.e-prism.org • www.jamestown.org • www.alemarah.org • Deep learning applications and challenges in big data analytics Najafabadi et.al., Journal of Big Data, Springer, 2016 • Big data classification: Problems and challenges in network intrusion prediction with machine learning, Suthaharan, Pittsburg, 2013 • Training products of Experts by minimizing contrastive divergence, Hinton G, Neural Compute, 2002