22.03.2013 Views

protector full 1234....cdr - The Protector

protector full 1234....cdr - The Protector

protector full 1234....cdr - The Protector

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Investigation<br />

Bringing<br />

Tech-Savvy<br />

to Book<br />

Cyber Criminals<br />

Times have evolved; so have crimes. 2000. <strong>The</strong> sleuths from this Cell have former employment for illtreating her.<br />

With the advancement of technology<br />

and the outbreak of Internet, a new<br />

form of crime has erupted on the<br />

scene. With the information highway<br />

having entered almost every<br />

middleclass home in the form of<br />

Internet, the society at large is at<br />

increasing risk of being affected by<br />

Cybercrime. It is far more sinister<br />

than the conventional crime and as<br />

such harder to detect because the<br />

perpetrators are educated and techsavvy.<br />

Cyber crimes include<br />

siphoning of funds through internet<br />

banking through credit and debit<br />

solved many crimes since then.<br />

Following are some of the cases they<br />

solved, to cite a few.<br />

• A reputed financial institution<br />

registered a crime stating that some<br />

persons perpetrated it through<br />

misleading emails ostensibly<br />

emanating from ICICI Bank's email<br />

ID. It was done to defraud the<br />

customers by securing details of their<br />

debit cards required for e-banking.<br />

Investigation led to the accused<br />

located at the southern city of<br />

Vijayawada in Andhra Pradesh.<br />

• An engineering student from Pune<br />

was arrested on various counts of<br />

cheating and forgery for duping a<br />

Payment Gateway.<br />

• A hacker was arrested for hacking<br />

into a financial website. <strong>The</strong> 10th<br />

Pass youngster was a computer<br />

addict. <strong>The</strong>n using various<br />

techniques, such as obtaining a<br />

password file, he gets into the<br />

administrator's shoes and hacks the<br />

website and to see the entire directory<br />

structure of that website.<br />

card frauds. <strong>The</strong>re is also enough<br />

evidence of information systems<br />

being used in drug trafficking,<br />

gambling, money laundering and<br />

weapons trade just to name a few.<br />

• A lady complainant started<br />

receiving obscene and threatening<br />

emails over a period of two years.<br />

<strong>The</strong> email sender, who happened to<br />

be a woman, was traced and<br />

<strong>The</strong> Cyber Crime Cell arrested a 52-<br />

year-old man, Chairman and<br />

Managing Director of a a company<br />

based in Chennai for cheating<br />

<strong>The</strong> Mumbai Police was quick to arrested. On interrogation it was thousands of people from Mumbai<br />

recognize the gravity of this threat. It found to be a case of a disgruntled by promising them a higher monthly<br />

launched the Cyber Crime employee taking revenge on a senior income of Rs 15,000 for their<br />

Investigation Cell on 18 December colleague in the organization of her deposits of Rs 4,000-6000. <br />

THE PROTECTOR<br />

Sept-Oct 2009 46

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!