Skip to main content

Cyber crime cases up 50% in India


According to The Times of India AHMEDABAD: Gujarat has reported an almost 50% rise in crimes under the Information Technology Act, 2000. Compared to 35 cases in 2010, 2011 reported 52 cases as per the 'Crime In India' report published by National Crime Records Bureau (NCRB). Twenty cases were registered under IPC sections this year, against 15 the previous year. From the cases reported, the highest came from Ahmedabad (36), followed by Vadodara (10). Surat and Rajkot reported one and two cases respectively.
Nationally, Andhra Pradesh (349) ranked first, followed by Maharashtra (306) and Kerala (227). In cities, Bangalore (117) reported the most incidents while Visakhapatnam (107) and Pune (83) ranked second and third.
Nationally, most cases were reported about loss of computer resources and obscene publications online. All over the country 157 cases of hacking were reported and 65 persons were arrested for the offence. Other offences include misuse of digital signatures, forging digital documents, unauthorized access and breach of confidentiality.
State police arrested 36 persons for cyber crimes in 2011 of which 17 were below 30 years of age. 18 of the arrests were from Ahmedabad.

Pathetic Situation in Andhra Pradesh

 Cyber crime cases, phishing and transmission of obscene content in electronic form has seen a rise in Andhra Pradesh which has also witnessed a two-fold increase in the arrest of cyber offenders in 2011. From 197 cyber crime cases reported in 2010, the number went up to 350 in 2011 and the cases were registered at three Cyber Crime police stations, including the Cyber Crime wing of CID here and different Cyber Crime units functioning across the state, a senior police officer said. 


"Close to 100 offenders were arrested during 2011 as compared to about 60 in the previous year in connection with various cyber offences," Superintendent of Police (CID-Cyber Crime) U Rama Mohan told PTI. 

Over 90 cases pertaining to the posting of objectionable content targeting women and girls on social networking sites and sending vulgar emails were registered in 2011, besides some other important cyber crime incidents. 
Cyber sleuths are in touch with the Interpol, MHA and other agencies like Computer Emergency Response Team and National Technological Research Organisation to improve monitoring and coordinating detection of cyber crimes. 
"We have sought help from the Interpol that will enable us in getting information on overseas servers (used in cyber crimes) and help in extradition of such offenders," he said. 
Recently, Interpol's help was sought for a case, in which a person from England was "harassing" a girl in Andhra Pradesh, he added.

Comments

Popular posts from this blog

CIA Triad for- Base of Information security

The essential security principles of confidentiality, integrity, and availability are often  referred to as the  CIA Triad. All security controls must address these principles. These three  security principles serve as common threads throughout the CISSP CBK. Each domain  addresses these principles in unique ways, so it is important to understand them both in  general terms and within each specific domain: Confidentiality is the principle that objects are not disclosed to unauthorized subjects. Integrity is the principle that objects retain their veracity and are intentionally modified by  authorized subjects only. Availability is the principle that authorized subjects are granted timely access to objects  with sufficient bandwidth to perform the desired interaction. Different security mechanisms address these three principles in different ways and offer varying  degrees of support or application of these principles. Objects must be properly classified

List of Company Slogans

·          3M : "Innovation" ·          Agere Systems : "How Communication Happens" ·          Agilent : "Dreams Made Real" ·          Airbus : "Setting the Standards" ·          Amazon.com : "…and You're Done" ·          AMX : "It's Your World. Take Control" ·          Anritsu : "Discover What's Possible ·          AT&T : "Your World. Delivered" ·          ATG Design Services : "Circuit Design for the RF Impaired" ·          ATI Technologies : "Get In the Game" ·          BAE Systems : "Innovating for a Safer World" ·          Ball Corporation : "The Leader in Small Space and Rocket Systems" ·          BellSouth : "Listening, Answering" ·          Blackhawk : "Powering DSP Development" ·          Boeing : "Forever New Frontiers" ·          Bose Corporation : "Better Sound Through Research" ·          Bowers & Wil

My Article :- હેકર બનવું છે? કઈ રીતે?

મારી ૨ વર્ષ ની કારકિર્દી માં મને કેટલાય  લોકોએ, ખાસ કરીને કોલેજ ના વિદ્યાર્થીઓએ ઘણી વાર પૂછ્યું છે કે "મારે હેકર બનવું છે. તો હું શું કરું? " અને મારા બ્લોગ્સ માં પણ પૂછવામાં આવે છે કે એક સારો હેકર કઈ રીતે બની શકાય? એવું હું શું કરું અથવા તો મારા માં કઈ લાયકત હોવી જોઈએ એક હેકર બનવા માટે? આ પ્રશ્ન નો સંતોષકારક જવાબ આપવા માટે મેં internet પર શોધખોળ કર્યા પછી મને જે કઈ માહિતી મળી તેને હું આજે અહી રજુ કરું છું. મિત્રો, સૌપ્રથમ હેકર કઈ રીતે બનવું એ જાણવા પહેલા એ જાણવું જરૂરી છે કે ખરેખર હેકિંગ શું છે ? અને હેકર કોને કહેવાય. હેકિંગ ની સીધી અને સરળ વ્યાખ્યા નીચે મુજબ છે.  "તમારા કમ્પ્યુટર,નેટવર્ક(ઈન્ટરનેટ કે LAN દ્વારા) કે કોઈ ડીવાઈસ માં (ફોન, ટેબ્લેટ) માં કરવામાં આવતા ગેરકાયદેસર પ્રવેશ અને ઉપયોગ એ હેકિંગ કહેવાય છે."અને હેકિંગ કરતા લોકોને હેકર કહેવાય છે. હવે તમને થશે કે આવું શું કામ કરવું જોઈએ? આ તો ક્રાઈમ છે. તો તમને જણાવી દઉં કે હેકર મુખ્યત્વે ૨ પ્રકારના હોય છે.    વાઈટ હેટ હેકર્સ (એથીકલ હેકર્સ) : ધારો કે તમે તમારો ફેસબુક નો પાસવર્ડ ભૂલી ગયા(ખરેખર ના ભૂલતા ક્યારેય..)કે ત