protector full 1234....cdr - The Protector
protector full 1234....cdr - The Protector
protector full 1234....cdr - The Protector
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Investigation<br />
Bringing<br />
Tech-Savvy<br />
to Book<br />
Cyber Criminals<br />
Times have evolved; so have crimes. 2000. <strong>The</strong> sleuths from this Cell have former employment for illtreating her.<br />
With the advancement of technology<br />
and the outbreak of Internet, a new<br />
form of crime has erupted on the<br />
scene. With the information highway<br />
having entered almost every<br />
middleclass home in the form of<br />
Internet, the society at large is at<br />
increasing risk of being affected by<br />
Cybercrime. It is far more sinister<br />
than the conventional crime and as<br />
such harder to detect because the<br />
perpetrators are educated and techsavvy.<br />
Cyber crimes include<br />
siphoning of funds through internet<br />
banking through credit and debit<br />
solved many crimes since then.<br />
Following are some of the cases they<br />
solved, to cite a few.<br />
• A reputed financial institution<br />
registered a crime stating that some<br />
persons perpetrated it through<br />
misleading emails ostensibly<br />
emanating from ICICI Bank's email<br />
ID. It was done to defraud the<br />
customers by securing details of their<br />
debit cards required for e-banking.<br />
Investigation led to the accused<br />
located at the southern city of<br />
Vijayawada in Andhra Pradesh.<br />
• An engineering student from Pune<br />
was arrested on various counts of<br />
cheating and forgery for duping a<br />
Payment Gateway.<br />
• A hacker was arrested for hacking<br />
into a financial website. <strong>The</strong> 10th<br />
Pass youngster was a computer<br />
addict. <strong>The</strong>n using various<br />
techniques, such as obtaining a<br />
password file, he gets into the<br />
administrator's shoes and hacks the<br />
website and to see the entire directory<br />
structure of that website.<br />
card frauds. <strong>The</strong>re is also enough<br />
evidence of information systems<br />
being used in drug trafficking,<br />
gambling, money laundering and<br />
weapons trade just to name a few.<br />
• A lady complainant started<br />
receiving obscene and threatening<br />
emails over a period of two years.<br />
<strong>The</strong> email sender, who happened to<br />
be a woman, was traced and<br />
<strong>The</strong> Cyber Crime Cell arrested a 52-<br />
year-old man, Chairman and<br />
Managing Director of a a company<br />
based in Chennai for cheating<br />
<strong>The</strong> Mumbai Police was quick to arrested. On interrogation it was thousands of people from Mumbai<br />
recognize the gravity of this threat. It found to be a case of a disgruntled by promising them a higher monthly<br />
launched the Cyber Crime employee taking revenge on a senior income of Rs 15,000 for their<br />
Investigation Cell on 18 December colleague in the organization of her deposits of Rs 4,000-6000. <br />
THE PROTECTOR<br />
Sept-Oct 2009 46