spacer

Cyber Crime

Computer Crime, E-Crime, Hi-Tech Crime or Electronic Crime is where a computer is the target of a crime or is the means adopted to commit a crime. Most of these crimes are not new. Criminals simply devise different ways to undertake standard criminal activities such as fraud, theft, blackmail, forgery, and embezzlement using the new medium, often involving the Internet.

The complainant can call at Cyber Crime Complaint No. (1930), working round the clock (24*7).

Characteristics of Cyber Crime

  • Commission of an illegal act using a computer, its systems, or applications
  • Unlawful acts wherein the computer is either a tool or a target or both
  • Crimes Perpetrated in Computer Environment
  • Criminals are young and smart with technology
  • Trans-National /Inter State criminals
  • Jurisdiction Issues
  • Strong Audit trail
  • Mostly non violent crimes
  • Veil of Anonymity
  • Sometimes difficult to work out

Types of Cyber Crimes


 

  • 1. Hacking, Email Id Hacking, Web Site Hacking (Defacement)
  • 2. Cyber Stalking (Social Networks and Emails)
  • 3. Cyber Defamation (Social Networks and Emails)
  • 4. Cyber Bullying ( Social Networks and Emails)
  • 5. Phishing
  • 6. Vishing
  • 7. Online Banking Frauds
  • 8. Job Scams/ Frauds
  • 9. Debit Cards/Credit Cards Cloning
  • 10. Data Theft
  • 11. Mobile Crimes
  • 12. Spoofing ( EMAIL/ SMS)
  • 13. VOIP CALLS for THREATNING/RANSOM/FRAUDS
  • 14. Ecommerce Frauds with Identity Theft
  • 15. Photo Morphing
  • 16. SPAMS
  • 17. Malicious Emails

 


Organized Cyber Crime

Trojan Horse

Spywares/Malwares
RAT (Remote Access Tools) 
Keyloggers

Trojan Horse
   
 

Botnets

A botnet (also known as a zombie army) is a number of Internet computers that, although their owners are unaware of it, have been set up to forward transmissions (including spam or viruses) to other computers on the Internet. Any such computer is referred to as a zombie - in effect, a computer "robot" or "bot" that serves the wishes of some master spam or virus originator. Most computers compromised in this way are home-based.
Botnets
 

Denial of Service Attacks (DOS)

Denial-of-service attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic.
Denial of Service Attacks
 
 

Group Hacking

Group Hacking targeted Politician Websites   Group Hacking targeted Govt. Organisation Websites
     
Group Hacking targeted Army Websites    

Pornography (Adult/Child)

The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. The internet is very fast becoming a household commodity in India . It’s explosion has made the children a viable victim to the cyber crime. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of paedophiles.

The easy access to the pornographic contents readily and freely available over the internet lowers the inhibitions of the children. Paedophiles lure the children by distributing pornographic material, then they try to meet them for sex or to take their nude photographs including their engagement in sexual positions. Sometimes Paedophiles contact children in the chat rooms posing as teenagers or a child of similar age, then they start becoming friendlier with them and win their confidence. Then slowly paedophiles start sexual chat to help children shed their inhibitions about sex and then call them out for personal interaction

 


spacer
  • Police Stations
Go to Navigation