SlideShare a Scribd company logo
Cyber Crimes in India:
Present Status & Proposed Reforms
drneetaa@gmail.com
Cyber Crimes
• Combination of Crime and Computer is ‘Cyber Crime’.They are of two types:
• Computer as aWeapon
• Credit Card Frauds
• IPRViolations
• Pornography
• DrugTrafficking
• HumanTrafficking
• Computer as aTarget
• Phishing
• Hacking
• Virus/Worm Attacks
Common Cyber-crimes
• Common Cyber-crime scenarios
• Harassment via fake public profile on social networking site
• Online Hate Community
• Email Account Hacking
• Credit Card Fraud
• Web Defacement
• IntroducingViruses,Worms, Backdoors, Rootkits,Trojans, Bugs
• CyberTerrorism
• Online sale of illegal Articles
• Cyber Pornography
• Phishing and Email Scams
• Theft of Confidential Information
• Source CodeTheft
• Tax Evasion and Money Laundering
• Online ShareTrading Fraud
Cyber Population in India
Current Scenario andTrends
Motivation behind attacks, Sept 2017
Hypothesis
• All the cyber crimes are NOT intimated to the cyber police in India.
• All cyber crimes are NOT properly investigated (and charge sheeted) by cyber police.
• All cyber cases brought before the court are NOT properly handled by court.
• All cyber criminals are NOT prosecuted by court because of technical problems.
• The general public is NOT aware of types of cyber crimes and how to protect themselves from
cyber crimes.
• The Indian cyber police are NOT trained to handle cyber crimes effectively.
• The Indian cyber police are NOT equipped to handle cyber crimes effectively.
• The Indian law courts (and its officials) are NOT trained to handle cyber crimes effectively.
• The Indian law courts (and it’s officials) are NOT equipped to handle cyber crimes effectively.
• The Indian government has NOT been able to effectively handle and control
Phishing
IT Act 2000
IT Legation deals with :
Legal Regal Recognition of Electronic Documentation
Legal Recognition of Digital Signature
Offenses and Contraventions
Justice Dispensation Systems forCyber Crimes
Provisions of IT Act 2000
• Email would now be a valid and legal form of communication
• Companies shall now be able to carry out electronic commerce using the legal
infrastructure
• Digital signatures have been given legal validity and sanction in the Act.
• Corporate companies will be in the business of being Certifying Authorities for
issuing Digital Signatures Certificates.
• Allows Government to issue notification on the web thus heralding e- governance.
• Companies can file any form, application or any other document with any office,
authority, body or agency owned or controlled by the appropriate Government in
electronic form
• A monetary damage, not exceeding Rs.1 crore; if anyone breaks into the computer
systems or network and cause loss.The damages or copies data.
Specific Exclusion(s)
• In the following cases, the IT Act is not applicable.:
• Negotiable instrument (other than a cheque) as per section 13 of Negotiable
Instruments Act 1881
• A power-of attorney as defined in section 1A of the Powers-of-AttorneyAct, 18882
• A trust as defined in section 3 of IndianTrusts Act, 1882
• A will as defined in clause (h) of section 2 of the Indian SuccessionAct 1925 including
any other testamentary disposition
Amendments as per IT Act 2008
• The following departments were included :
• Telecom Services
• Network Services
• Internet Services
• Web Hosting Services
Salient Features of IT Act 2008
• Focus of Data Privacy
• Focus on Information Security
• Defining Cyber Cafe
• Making digital signature technology neutral
• Defining reasonable security practices to be followed by Corporate
• Redefining the role of intermediaries
• Recognizing the role of Indian Computer Emergency ResponseTeam
• Inclusion of some additional cyber crimes like child pornography and cyber
terrorism
• Authorizing an inspector to investigate cyber offenses
LIMITATIONS
• While enough teeth have been given by the Law, yet, due to lack of intent,
meticulous planning and knowledge of Hi-tech intricacies, the offenders
slip away from the clutches of Law.To overcome a HiTech Intelligent Task
Force (HTITF)is required.
• There is a lot of scope for automation and Artificial Intelligence, who can
scan the 24 hr, 365 day video captured data?We need Big Data Analytics
and AI based algorithms to assist us.
Four Vs of Big Data
BIG Data Analytics
• Preparing a data Bank with photographs, descriptions and relevant important
information about anti-national elements.
• Keeping strict vigil on printing /distribution of literature pamphlets,
magazines and propaganda on electronic media to prevent anti-national
designs of ISI.
• Preparing updated information system, incorporating the latest details about
membership, foreign linkages, weapons, transport, bank accounts, lockers,
passports, associates in the bureaucracy, e- mail accounts, mobile phone
numbers, fax and other phone numbers, etc.
• Movement pattern Identification
General Strategy
• Having constant interaction with chartered accountants, I.T. department,
brokers of the stock exchange, property dealers etc. to keep a close watch on
the financial activities of the key players.
• Keeping a close watch on the activities of the hardcore gangsters, public
servants, politicians, support groups, by effective physical surveillance and
telephone & mail interception.
• Identification of financial transactions that appear to launder funds. Havala
and trans border financial activity, foreign funding put to a closer scrutiny.
General Strategy
TECHNICAL INTELLIGENCE
Technology at the state level and experts to intercept terrorist e-mails, satellite phone calls and monitor
banking channels
WHAT NEEDS TO BE DONE
Challenges of Big Data Analytics
• Format variation of data
• Fast moving streaming data
• Highly distributed Input source
• High dimensionally of data
• Trust worthiness of data analytics
• Noisy or Poor quality of data
• Scalability of algorithm
• Feature extraction
• Imbalance input data
• Inadequate data storage
• Unsummarized & uncategorized data
• Data indexing & classification
• Fast information retrieval.
Challenges Ahead of Cyber Crime
• Can we balance data collection for the purpose of national security with
privacy concerns?
• How can we stop the crime to happen?
• What can be done to mitigate the risks of false positives?
• How do we translate the insights into operational relevance?
National
Security
Advisor
National
Security
Council
RAWIB
Defense
Intelligence
Police/ Para
Military
Agency
ANTI-TERRORIST SQADS
STATE INTELLEGENCE AGENCIES
Close coordination between CBI, IB, RAW,
Directorate of Military Intelligence,
Directorate of Revenue Intelligence,
Enforcement Directorate, Customs and
Narcotics Control Bureau.
Dissemination of
information to ground level
and ground forces using
DRONES and Satellite.
Selective
Sharing
Of Data
Single Window Set-Up & Solution
Finally….
• We need very intelligent, passionate and committed cyber workforce.
• Rate Cyber policing very coveted
• Admire them
Bibliography
• www.terrorism.com
• www.siteinstitute.org
• www.counterterrorismblog.org
• www.e-prism.org
• www.jamestown.org
• www.alemarah.org
• Deep learning applications and challenges in big data analytics Najafabadi et.al., Journal of
Big Data, Springer, 2016
• Big data classification: Problems and challenges in network intrusion prediction with machine
learning, Suthaharan, Pittsburg, 2013
• Training products of Experts by minimizing contrastive divergence, Hinton G, Neural
Compute, 2002

More Related Content

What's hot

Forensic psychology introduction
Forensic psychology   introductionForensic psychology   introduction
Forensic psychology introduction
RavinderKaur194
 
Recording of Statements of Suspects
Recording of  Statements of Suspects Recording of  Statements of Suspects
Recording of Statements of Suspects
Nilendra Kumar
 
Vulnerability mapping -INDIA ELECTION
Vulnerability mapping -INDIA ELECTIONVulnerability mapping -INDIA ELECTION
Vulnerability mapping -INDIA ELECTION
Jamesadhikaram land matter consultancy 9447464502
 
Police (FIR)
Police (FIR)Police (FIR)
Police (FIR)
madhikhel
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Sagar Rahurkar
 
Admissibity of Expert Evidence
Admissibity of Expert EvidenceAdmissibity of Expert Evidence
Admissibity of Expert Evidence
Shifan Tariq
 
Internship at office of regional police and dpo office sargodha final report ...
Internship at office of regional police and dpo office sargodha final report ...Internship at office of regional police and dpo office sargodha final report ...
Internship at office of regional police and dpo office sargodha final report ...
hanzil fatima
 
Police Power of Investigation
Police Power of InvestigationPolice Power of Investigation
Police Power of Investigation
Applied Forensic Research Sciences
 
Cyber law case Assignment
Cyber law case AssignmentCyber law case Assignment
Cyber law case Assignment
9945446746
 
Digitalni herbarijum
Digitalni herbarijumDigitalni herbarijum
Digitalni herbarijum
Marko Cibukovac
 
Crpc sec 159
Crpc sec 159Crpc sec 159
Crpc sec 159
ArundhatiBanerjee6
 
Central bureau of investigation
Central bureau of investigationCentral bureau of investigation
Central bureau of investigation
Col Mukteshwar Prasad
 
Judgments on digital Evidence u/s 65 b of IE act
Judgments on digital Evidence u/s 65 b of IE actJudgments on digital Evidence u/s 65 b of IE act
Judgments on digital Evidence u/s 65 b of IE act
ArjunRandhir2
 
Акциони потенцијал и синапса.pdf
Акциони потенцијал и синапса.pdfАкциони потенцијал и синапса.pdf
Акциони потенцијал и синапса.pdf
Mihajlo Maksimovic
 
Crpc sec 162
Crpc sec 162Crpc sec 162
Crpc sec 162
ArundhatiBanerjee6
 
Оскарження Детального плану території багатоквартирної житлової забудови в кв...
Оскарження Детального плану території багатоквартирної житлової забудови в кв...Оскарження Детального плану території багатоквартирної житлової забудови в кв...
Оскарження Детального плану території багатоквартирної житлової забудови в кв...
Олександр Гашпар
 
Overnew of crpc zia ur rehman sb ppt 2 (26318)
Overnew of crpc zia ur rehman sb ppt 2 (26318)Overnew of crpc zia ur rehman sb ppt 2 (26318)
Overnew of crpc zia ur rehman sb ppt 2 (26318)
zulfi799
 
Procedure of investigation (Indian Perspective)
Procedure of investigation (Indian Perspective)Procedure of investigation (Indian Perspective)
Procedure of investigation (Indian Perspective)
Vaibhav Laur
 

What's hot (20)

Forensic psychology introduction
Forensic psychology   introductionForensic psychology   introduction
Forensic psychology introduction
 
Recording of Statements of Suspects
Recording of  Statements of Suspects Recording of  Statements of Suspects
Recording of Statements of Suspects
 
Vulnerability mapping -INDIA ELECTION
Vulnerability mapping -INDIA ELECTIONVulnerability mapping -INDIA ELECTION
Vulnerability mapping -INDIA ELECTION
 
Police (FIR)
Police (FIR)Police (FIR)
Police (FIR)
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...
 
Nuisance
NuisanceNuisance
Nuisance
 
Admissibity of Expert Evidence
Admissibity of Expert EvidenceAdmissibity of Expert Evidence
Admissibity of Expert Evidence
 
Internship at office of regional police and dpo office sargodha final report ...
Internship at office of regional police and dpo office sargodha final report ...Internship at office of regional police and dpo office sargodha final report ...
Internship at office of regional police and dpo office sargodha final report ...
 
Police Power of Investigation
Police Power of InvestigationPolice Power of Investigation
Police Power of Investigation
 
Cyber law case Assignment
Cyber law case AssignmentCyber law case Assignment
Cyber law case Assignment
 
Digitalni herbarijum
Digitalni herbarijumDigitalni herbarijum
Digitalni herbarijum
 
Judicial activism
Judicial activismJudicial activism
Judicial activism
 
Crpc sec 159
Crpc sec 159Crpc sec 159
Crpc sec 159
 
Central bureau of investigation
Central bureau of investigationCentral bureau of investigation
Central bureau of investigation
 
Judgments on digital Evidence u/s 65 b of IE act
Judgments on digital Evidence u/s 65 b of IE actJudgments on digital Evidence u/s 65 b of IE act
Judgments on digital Evidence u/s 65 b of IE act
 
Акциони потенцијал и синапса.pdf
Акциони потенцијал и синапса.pdfАкциони потенцијал и синапса.pdf
Акциони потенцијал и синапса.pdf
 
Crpc sec 162
Crpc sec 162Crpc sec 162
Crpc sec 162
 
Оскарження Детального плану території багатоквартирної житлової забудови в кв...
Оскарження Детального плану території багатоквартирної житлової забудови в кв...Оскарження Детального плану території багатоквартирної житлової забудови в кв...
Оскарження Детального плану території багатоквартирної житлової забудови в кв...
 
Overnew of crpc zia ur rehman sb ppt 2 (26318)
Overnew of crpc zia ur rehman sb ppt 2 (26318)Overnew of crpc zia ur rehman sb ppt 2 (26318)
Overnew of crpc zia ur rehman sb ppt 2 (26318)
 
Procedure of investigation (Indian Perspective)
Procedure of investigation (Indian Perspective)Procedure of investigation (Indian Perspective)
Procedure of investigation (Indian Perspective)
 

Similar to Cyber crimes in india Dr. Neeta Awasthy

Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
Andreaa Viv
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
Journalist Ish
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
Roshan Mastana
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
Cyber fraud a threat to E commerce
Cyber fraud a threat to E commerceCyber fraud a threat to E commerce
Cyber fraud a threat to E commerce
Sudeshna07
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Vansh Verma
 
Cyber of things 2.0
Cyber of things 2.0Cyber of things 2.0
Cyber of things 2.0
Deepak Kumar (D3)
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
Dr. Amitabha Yadav
 
Computer crime
Computer crimeComputer crime
Computer crime
Uc Man
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
Goutama Bachtiar
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
Jayati Tiwari
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
shubham ghimire
 
cyber-protect-may-17-law-society-presentation.pptx
cyber-protect-may-17-law-society-presentation.pptxcyber-protect-may-17-law-society-presentation.pptx
cyber-protect-may-17-law-society-presentation.pptx
ParasSehgal12
 
cyber-protect-may-17-law-society-presentation.pptx
cyber-protect-may-17-law-society-presentation.pptxcyber-protect-may-17-law-society-presentation.pptx
cyber-protect-may-17-law-society-presentation.pptx
biswajitghosal4
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Tech and Law Center
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
Rubal Sagwal
 
Cyber security
 Cyber security Cyber security
Cyber security
Tanu Basoiya
 
UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
KavithaK23
 
Computer crime
Computer crimeComputer crime
Computer crime
Vinil Patel
 

Similar to Cyber crimes in india Dr. Neeta Awasthy (20)

Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Cyber fraud a threat to E commerce
Cyber fraud a threat to E commerceCyber fraud a threat to E commerce
Cyber fraud a threat to E commerce
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber of things 2.0
Cyber of things 2.0Cyber of things 2.0
Cyber of things 2.0
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
Computer crime
Computer crimeComputer crime
Computer crime
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber-protect-may-17-law-society-presentation.pptx
cyber-protect-may-17-law-society-presentation.pptxcyber-protect-may-17-law-society-presentation.pptx
cyber-protect-may-17-law-society-presentation.pptx
 
cyber-protect-may-17-law-society-presentation.pptx
cyber-protect-may-17-law-society-presentation.pptxcyber-protect-may-17-law-society-presentation.pptx
cyber-protect-may-17-law-society-presentation.pptx
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber security
 Cyber security Cyber security
Cyber security
 
UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
 
Computer crime
Computer crimeComputer crime
Computer crime
 

More from Prof. Neeta Awasthy

NEP 2020 .pptx
NEP 2020 .pptxNEP 2020 .pptx
NEP 2020 .pptx
Prof. Neeta Awasthy
 
Subhash Chandra Bose, His travels to Freedom
Subhash Chandra Bose, His travels to FreedomSubhash Chandra Bose, His travels to Freedom
Subhash Chandra Bose, His travels to Freedom
Prof. Neeta Awasthy
 
# 21 tips for a great presentation
# 21 tips for a great presentation# 21 tips for a great presentation
# 21 tips for a great presentation
Prof. Neeta Awasthy
 
Comparative Design thinking
Comparative Design thinking Comparative Design thinking
Comparative Design thinking
Prof. Neeta Awasthy
 
National Education Policy 2020
National Education Policy 2020 National Education Policy 2020
National Education Policy 2020
Prof. Neeta Awasthy
 
Personalised education (2)
Personalised education (2)Personalised education (2)
Personalised education (2)
Prof. Neeta Awasthy
 
Case study of digitization in india
Case study of digitization in indiaCase study of digitization in india
Case study of digitization in india
Prof. Neeta Awasthy
 
Student dashboard for Engineering Undergraduates
Student dashboard for Engineering UndergraduatesStudent dashboard for Engineering Undergraduates
Student dashboard for Engineering Undergraduates
Prof. Neeta Awasthy
 
Handling Capstone projects in Engineering Colllege
Handling Capstone projects in Engineering ColllegeHandling Capstone projects in Engineering Colllege
Handling Capstone projects in Engineering Colllege
Prof. Neeta Awasthy
 
Engineering Applications of Machine Learning
Engineering Applications of Machine LearningEngineering Applications of Machine Learning
Engineering Applications of Machine Learning
Prof. Neeta Awasthy
 
Design thinking in Engineering
Design thinking in EngineeringDesign thinking in Engineering
Design thinking in Engineering
Prof. Neeta Awasthy
 
Data Science & Artificial Intelligence for ALL
Data Science & Artificial Intelligence for ALLData Science & Artificial Intelligence for ALL
Data Science & Artificial Intelligence for ALL
Prof. Neeta Awasthy
 
Big data and Artificial Intelligence
Big data and Artificial IntelligenceBig data and Artificial Intelligence
Big data and Artificial Intelligence
Prof. Neeta Awasthy
 
Academic industry collaboration at kec dated 3.6.17 v 3
Academic industry collaboration at kec dated 3.6.17 v 3Academic industry collaboration at kec dated 3.6.17 v 3
Academic industry collaboration at kec dated 3.6.17 v 3
Prof. Neeta Awasthy
 
AI in Talent Acquisition
AI in Talent AcquisitionAI in Talent Acquisition
AI in Talent Acquisition
Prof. Neeta Awasthy
 
Big data in defence and national security malayasia
Big data in defence and national security   malayasiaBig data in defence and national security   malayasia
Big data in defence and national security malayasia
Prof. Neeta Awasthy
 
Ann a Algorithms notes
Ann a Algorithms notesAnn a Algorithms notes
Ann a Algorithms notes
Prof. Neeta Awasthy
 
Artificial Neural Networks for NIU session 2016 17
Artificial Neural Networks for NIU session 2016 17 Artificial Neural Networks for NIU session 2016 17
Artificial Neural Networks for NIU session 2016 17
Prof. Neeta Awasthy
 
Steepest descent method
Steepest descent methodSteepest descent method
Steepest descent method
Prof. Neeta Awasthy
 
Gradient descent method
Gradient descent methodGradient descent method
Gradient descent method
Prof. Neeta Awasthy
 

More from Prof. Neeta Awasthy (20)

NEP 2020 .pptx
NEP 2020 .pptxNEP 2020 .pptx
NEP 2020 .pptx
 
Subhash Chandra Bose, His travels to Freedom
Subhash Chandra Bose, His travels to FreedomSubhash Chandra Bose, His travels to Freedom
Subhash Chandra Bose, His travels to Freedom
 
# 21 tips for a great presentation
# 21 tips for a great presentation# 21 tips for a great presentation
# 21 tips for a great presentation
 
Comparative Design thinking
Comparative Design thinking Comparative Design thinking
Comparative Design thinking
 
National Education Policy 2020
National Education Policy 2020 National Education Policy 2020
National Education Policy 2020
 
Personalised education (2)
Personalised education (2)Personalised education (2)
Personalised education (2)
 
Case study of digitization in india
Case study of digitization in indiaCase study of digitization in india
Case study of digitization in india
 
Student dashboard for Engineering Undergraduates
Student dashboard for Engineering UndergraduatesStudent dashboard for Engineering Undergraduates
Student dashboard for Engineering Undergraduates
 
Handling Capstone projects in Engineering Colllege
Handling Capstone projects in Engineering ColllegeHandling Capstone projects in Engineering Colllege
Handling Capstone projects in Engineering Colllege
 
Engineering Applications of Machine Learning
Engineering Applications of Machine LearningEngineering Applications of Machine Learning
Engineering Applications of Machine Learning
 
Design thinking in Engineering
Design thinking in EngineeringDesign thinking in Engineering
Design thinking in Engineering
 
Data Science & Artificial Intelligence for ALL
Data Science & Artificial Intelligence for ALLData Science & Artificial Intelligence for ALL
Data Science & Artificial Intelligence for ALL
 
Big data and Artificial Intelligence
Big data and Artificial IntelligenceBig data and Artificial Intelligence
Big data and Artificial Intelligence
 
Academic industry collaboration at kec dated 3.6.17 v 3
Academic industry collaboration at kec dated 3.6.17 v 3Academic industry collaboration at kec dated 3.6.17 v 3
Academic industry collaboration at kec dated 3.6.17 v 3
 
AI in Talent Acquisition
AI in Talent AcquisitionAI in Talent Acquisition
AI in Talent Acquisition
 
Big data in defence and national security malayasia
Big data in defence and national security   malayasiaBig data in defence and national security   malayasia
Big data in defence and national security malayasia
 
Ann a Algorithms notes
Ann a Algorithms notesAnn a Algorithms notes
Ann a Algorithms notes
 
Artificial Neural Networks for NIU session 2016 17
Artificial Neural Networks for NIU session 2016 17 Artificial Neural Networks for NIU session 2016 17
Artificial Neural Networks for NIU session 2016 17
 
Steepest descent method
Steepest descent methodSteepest descent method
Steepest descent method
 
Gradient descent method
Gradient descent methodGradient descent method
Gradient descent method
 

Recently uploaded

State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023
kuntobimo2016
 
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
mzpolocfi
 
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
oz8q3jxlp
 
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
74nqk8xf
 
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
v3tuleee
 
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
dwreak4tg
 
The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...
jerlynmaetalle
 
Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptxData_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
AnirbanRoy608946
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
ahzuo
 
Everything you wanted to know about LIHTC
Everything you wanted to know about LIHTCEverything you wanted to know about LIHTC
Everything you wanted to know about LIHTC
Roger Valdez
 
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdfEnhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
GetInData
 
Machine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptxMachine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptx
balafet
 
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
u86oixdj
 
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
ahzuo
 
Nanandann Nilekani's ppt On India's .pdf
Nanandann Nilekani's ppt On India's .pdfNanandann Nilekani's ppt On India's .pdf
Nanandann Nilekani's ppt On India's .pdf
eddie19851
 
Analysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performanceAnalysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performance
roli9797
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
Walaa Eldin Moustafa
 
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
mbawufebxi
 
Global Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headedGlobal Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headed
vikram sood
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
Timothy Spann
 

Recently uploaded (20)

State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023
 
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
 
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
 
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
 
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
 
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
 
The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...
 
Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptxData_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
Data_and_Analytics_Essentials_Architect_an_Analytics_Platform.pptx
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
 
Everything you wanted to know about LIHTC
Everything you wanted to know about LIHTCEverything you wanted to know about LIHTC
Everything you wanted to know about LIHTC
 
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdfEnhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
 
Machine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptxMachine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptx
 
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
 
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
 
Nanandann Nilekani's ppt On India's .pdf
Nanandann Nilekani's ppt On India's .pdfNanandann Nilekani's ppt On India's .pdf
Nanandann Nilekani's ppt On India's .pdf
 
Analysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performanceAnalysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performance
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
 
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
 
Global Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headedGlobal Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headed
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
 

Cyber crimes in india Dr. Neeta Awasthy

  • 1. Cyber Crimes in India: Present Status & Proposed Reforms drneetaa@gmail.com
  • 2. Cyber Crimes • Combination of Crime and Computer is ‘Cyber Crime’.They are of two types: • Computer as aWeapon • Credit Card Frauds • IPRViolations • Pornography • DrugTrafficking • HumanTrafficking • Computer as aTarget • Phishing • Hacking • Virus/Worm Attacks
  • 3. Common Cyber-crimes • Common Cyber-crime scenarios • Harassment via fake public profile on social networking site • Online Hate Community • Email Account Hacking • Credit Card Fraud • Web Defacement • IntroducingViruses,Worms, Backdoors, Rootkits,Trojans, Bugs • CyberTerrorism • Online sale of illegal Articles • Cyber Pornography • Phishing and Email Scams • Theft of Confidential Information • Source CodeTheft • Tax Evasion and Money Laundering • Online ShareTrading Fraud
  • 7. Hypothesis • All the cyber crimes are NOT intimated to the cyber police in India. • All cyber crimes are NOT properly investigated (and charge sheeted) by cyber police. • All cyber cases brought before the court are NOT properly handled by court. • All cyber criminals are NOT prosecuted by court because of technical problems. • The general public is NOT aware of types of cyber crimes and how to protect themselves from cyber crimes. • The Indian cyber police are NOT trained to handle cyber crimes effectively. • The Indian cyber police are NOT equipped to handle cyber crimes effectively. • The Indian law courts (and its officials) are NOT trained to handle cyber crimes effectively. • The Indian law courts (and it’s officials) are NOT equipped to handle cyber crimes effectively. • The Indian government has NOT been able to effectively handle and control
  • 9. IT Act 2000 IT Legation deals with : Legal Regal Recognition of Electronic Documentation Legal Recognition of Digital Signature Offenses and Contraventions Justice Dispensation Systems forCyber Crimes
  • 10. Provisions of IT Act 2000 • Email would now be a valid and legal form of communication • Companies shall now be able to carry out electronic commerce using the legal infrastructure • Digital signatures have been given legal validity and sanction in the Act. • Corporate companies will be in the business of being Certifying Authorities for issuing Digital Signatures Certificates. • Allows Government to issue notification on the web thus heralding e- governance. • Companies can file any form, application or any other document with any office, authority, body or agency owned or controlled by the appropriate Government in electronic form • A monetary damage, not exceeding Rs.1 crore; if anyone breaks into the computer systems or network and cause loss.The damages or copies data.
  • 11. Specific Exclusion(s) • In the following cases, the IT Act is not applicable.: • Negotiable instrument (other than a cheque) as per section 13 of Negotiable Instruments Act 1881 • A power-of attorney as defined in section 1A of the Powers-of-AttorneyAct, 18882 • A trust as defined in section 3 of IndianTrusts Act, 1882 • A will as defined in clause (h) of section 2 of the Indian SuccessionAct 1925 including any other testamentary disposition
  • 12. Amendments as per IT Act 2008 • The following departments were included : • Telecom Services • Network Services • Internet Services • Web Hosting Services
  • 13. Salient Features of IT Act 2008 • Focus of Data Privacy • Focus on Information Security • Defining Cyber Cafe • Making digital signature technology neutral • Defining reasonable security practices to be followed by Corporate • Redefining the role of intermediaries • Recognizing the role of Indian Computer Emergency ResponseTeam • Inclusion of some additional cyber crimes like child pornography and cyber terrorism • Authorizing an inspector to investigate cyber offenses
  • 14. LIMITATIONS • While enough teeth have been given by the Law, yet, due to lack of intent, meticulous planning and knowledge of Hi-tech intricacies, the offenders slip away from the clutches of Law.To overcome a HiTech Intelligent Task Force (HTITF)is required. • There is a lot of scope for automation and Artificial Intelligence, who can scan the 24 hr, 365 day video captured data?We need Big Data Analytics and AI based algorithms to assist us.
  • 15.
  • 16. Four Vs of Big Data
  • 18. • Preparing a data Bank with photographs, descriptions and relevant important information about anti-national elements. • Keeping strict vigil on printing /distribution of literature pamphlets, magazines and propaganda on electronic media to prevent anti-national designs of ISI. • Preparing updated information system, incorporating the latest details about membership, foreign linkages, weapons, transport, bank accounts, lockers, passports, associates in the bureaucracy, e- mail accounts, mobile phone numbers, fax and other phone numbers, etc. • Movement pattern Identification General Strategy
  • 19. • Having constant interaction with chartered accountants, I.T. department, brokers of the stock exchange, property dealers etc. to keep a close watch on the financial activities of the key players. • Keeping a close watch on the activities of the hardcore gangsters, public servants, politicians, support groups, by effective physical surveillance and telephone & mail interception. • Identification of financial transactions that appear to launder funds. Havala and trans border financial activity, foreign funding put to a closer scrutiny. General Strategy
  • 20. TECHNICAL INTELLIGENCE Technology at the state level and experts to intercept terrorist e-mails, satellite phone calls and monitor banking channels WHAT NEEDS TO BE DONE
  • 21. Challenges of Big Data Analytics • Format variation of data • Fast moving streaming data • Highly distributed Input source • High dimensionally of data • Trust worthiness of data analytics • Noisy or Poor quality of data • Scalability of algorithm • Feature extraction • Imbalance input data • Inadequate data storage • Unsummarized & uncategorized data • Data indexing & classification • Fast information retrieval.
  • 22. Challenges Ahead of Cyber Crime • Can we balance data collection for the purpose of national security with privacy concerns? • How can we stop the crime to happen? • What can be done to mitigate the risks of false positives? • How do we translate the insights into operational relevance?
  • 23. National Security Advisor National Security Council RAWIB Defense Intelligence Police/ Para Military Agency ANTI-TERRORIST SQADS STATE INTELLEGENCE AGENCIES Close coordination between CBI, IB, RAW, Directorate of Military Intelligence, Directorate of Revenue Intelligence, Enforcement Directorate, Customs and Narcotics Control Bureau. Dissemination of information to ground level and ground forces using DRONES and Satellite. Selective Sharing Of Data Single Window Set-Up & Solution
  • 24. Finally…. • We need very intelligent, passionate and committed cyber workforce. • Rate Cyber policing very coveted • Admire them
  • 25. Bibliography • www.terrorism.com • www.siteinstitute.org • www.counterterrorismblog.org • www.e-prism.org • www.jamestown.org • www.alemarah.org • Deep learning applications and challenges in big data analytics Najafabadi et.al., Journal of Big Data, Springer, 2016 • Big data classification: Problems and challenges in network intrusion prediction with machine learning, Suthaharan, Pittsburg, 2013 • Training products of Experts by minimizing contrastive divergence, Hinton G, Neural Compute, 2002