Saturday, January 8, 2011

Kollam cyber cell visit



Date: 29 December 2010

Team Members: Jinesh M.K, Manu R Krishnan, Vinitha V Prabhu, Shyju Mol

What is cybercrime?

Any crime which is done using devices which have an IC (Integrated Chip) is termed as a cybercrime. So comes the doubt that is taking a photo in a mobile phone is a crime or not? According to cyber law it is not actually a crime, but capturing, editing and transferring is a crime

Procedures to complaint a cyber crime

Initially we have to give written complaint to our nearest local police station,but not directly to cyber cell. If the complaint comes under cyber law, then it will be forward to cyber cell.
The main aim of cyber cell is to just assist the investigation team having technical support.

Main area of crime they handle?

Most of the crime they handle is based on mobile phones and computer. But because of infrastructure limitations in the district cyber cell, they will handle only crime related to mobile phones.

How do victims can help in the investigation?

“Crime may be any type,but only with victim’s help , investigation can be speed up”.
If we take an example, cybercrime related to mobile phone.ie when we lose our mobile phone, IMEI(type *#06#) number of our mobile phone will help cyber cell team to find the phone easily.
So it will be better to save IMEI number of your mobile in secure place (not in your mobile phone)

Cyber cell team in the crime scene

In the case of computer system
1. If it’s working, pull down CPU power cable(Why? post your comment)
2. Seize and seal all the connected devices along with that system in the presences of a witness having computer knowledge
3. Send all this devices to responsible authority for analysis

Who are these authorities?

C-DAC and cyber forensics lab.

How to find the accused?

Let us take an example: suppose a person’s account get hacked and post bad comments, or send fake mails ,then according to victim’s complaint the cyber team will contact with corresponding service providers and get login details, ip address and location of machine. If it is an internet café, then with the register team will find the accused and if it is a home then with the house owner team can find who were the visitors of his computer.

What will do if accused is giving fake address?

Actually the cyber team states that the internet café staffs has to check the identity of each person entering to the café. Now a day’s no one is following this rule .But if the location to find the accused is a internet café then the owner of café will be arrested along with the accused.

What will do if accused is giving spoofed ip (fake ip)?

In all our mail servers like yahoo, gmail, there is an option called full header option. when we go through that option we can find the path through which the mail has arrived.