Police Oath

Police Outh


Cyber Crime

DGP Haryana Police

Computer Crime, E-Crime, Hi-Tech Crime or Electronic Crime is where a computer is the target of a crime or is the means adopted to commit a crime. Most of these crimes are not new. Criminals simply devise different ways to undertake standard criminal activities such as fraud, theft, blackmail, forgery, and embezzlement using the new medium, often involving the Internet


Characteristics of Cyber Crime

Commission of an illegal act using a computer, its systems, or applications

Unlawful acts wherein the computer is either a tool or a target or both

Crimes Perpetrated in Computer Environment

Criminals are young and smart with technology

Trans-National /Inter State criminals

Jurisdiction Issues

Strong Audit trail

Mostly non violent crimes

Veil of Anonymity

Sometimes difficult to work out

Types of Cyber Crimes

1. Hacking, Email Id Hacking, Web Site Hacking (Defacement)

2. Cyber Stalking (Social Networks and Emails)

3. Cyber Defamation (Social Networks and Emails)

4. Cyber Bullying ( Social Networks and Emails)

5. Phishing

6. Vishing

7. Online Banking Frauds

8. Job Scams/ Frauds

9. Debit Cards/Credit Cards Cloning

10. Data Theft

11. Mobile Crimes

12. Spoofing ( EMAIL/ SMS)

13. VOIP CALLS for THREATNING/RANSOM/FRAUDS

14. Ecommerce Frauds with Identity Theft

15. Photo Morphing

16. SPAMS

17. Malicious Emails



Organized Cyber Crime

Trojan Horse

Spywares/Malwares
RAT (Remote Access Tools) 
Keyloggers

Trojan Horse
   
 

Botnets

A botnet (also known as a zombie army) is a number of Internet computers that, although their owners are unaware of it, have been set up to forward transmissions (including spam or viruses) to other computers on the Internet. Any such computer is referred to as a zombie - in effect, a computer "robot" or "bot" that serves the wishes of some master spam or virus originator. Most computers compromised in this way are home-based.
Botnets
 

Denial of Service Attacks (DOS)

Denial-of-service attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic.
Denial of Service Attacks
 
 

Group Hacking

Group Hacking targeted Politician Websites   Group Hacking targeted Govt. Organisation Websites
     
Group Hacking targeted Army Websites    

Pornography (Adult/Child)

The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. The internet is very fast becoming a household commodity in India . It’s explosion has made the children a viable victim to the cyber crime. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of paedophiles.

The easy access to the pornographic contents readily and freely available over the internet lowers the inhibitions of the children. Paedophiles lure the children by distributing pornographic material, then they try to meet them for sex or to take their nude photographs including their engagement in sexual positions. Sometimes Paedophiles contact children in the chat rooms posing as teenagers or a child of similar age, then they start becoming friendlier with them and win their confidence. Then slowly paedophiles start sexual chat to help children shed their inhibitions about sex and then call them out for personal interaction