Tuesday, March 10, 2015

WhatsApp How to Use it Carefully in Marathi Language

वॉटस्एपचा वापर !!


वॅाट्सअप वर अनेक नवनवे समूह बनतात. अनेक समूहात तेच तेच लोक सगळीकडे सामाईक असतात. त्यामुळे मजकूरही तोच तोच वाचावा लागतो. वॅाट्सअपचा नेमका वापर कसा करावा, याबाबतीत मात्र बहुतांशी लोक गोंधळलेले दिसतात. सगळ्यांनी मोबाईलवर टाकलंय म्हणून आपणही वॅाट्सअप घेतलेलं असतं. एकदा नंबर लोकांकडे गेला की धडाधड संदेश यायला सुरुवात होऊन, आपण त्या चक्रव्युहात कधी गुरफटून जातो, आपलं आपल्यालाच कळत नाही. त्याचं कारण एकच. गंतव्य स्थान निश्चित असल्याशिवाय गाडीत बसायचं नसतं किंवा गाडी सुरु करायची नसते. जायचं कुठे, निश्चित नसेल तर गाडी गोल गोल फिरत राहते, पेट्रोल जाळत, कोणत्याही उद्दिष्टाशिवाय...ज्यांना काहीच सुचत नाही, ते सगळ्यात जवळचा पर्याय गुड मॉर्निंग, गुड नाईट चा स्वीकारतात. मधल्या काळात काय करायचं म्हणून इतरांचा आलेला मजकूर कॉपीपेस्ट, शेअर्ड, फॅारवर्ड करतात. गुड मॉर्निंग, गुड नाईट वैयक्तिकरित्या करा, पण समूहात अजिबात नको. यामुळे इतरांना काय मनस्ताप होतो, याची जाणीव कोणी ठेवत नाही. अनेक चांगले लोक या प्रकारांना कंटाळून समूह सोडणे पसंत करतात. शिवाय, असले फुटकळ संदेश पाठवणारे लोकच अफवा पसरवणाऱ्या प्रवृत्तीचा "गिऱ्हाईक" बनतात.

जगात विकृत माणसांची कमी नाही. आयुष्यात चांगलं काही करायचंच नाही, आणि वाईटाचा शक्यतोवर प्रचार प्रसार करत राहायचा, या एकाच ध्येयाने ही माणसं झपाटलेली असतात. बरे हल्ली सुसंस्कृत आणि विकृतांची अशी काय सरमिसळ झाली आहे की जे पसरत आहे किंवा पसरवलं जात आहे, त्याची शहानिशा करण्याची कोणाला आवश्यकता वाटत नाही. सद्याच्या पैसा कमावण्याच्या नादात कोणाला तितका वेळही नाही.

पैसा आहे म्हणून हातात स्मार्ट फोन आहे. पण म्हणून व्यक्ती स्मार्ट असेलच, याची शाश्वती नसते. बघा ना, वॅाट्सअप वर ज्या पद्धतीने बुद्धिवादी म्हणवणारे लोकही आंधळेपणाने खोट्याचा प्रचार करतात, तेंव्हा त्यांच्या स्मार्टपणाची खरोखर कीव करावीशी वाटते.

आयुष्य लहान आहे, ही सुरेश भटांची नसलेली कविता बिनधास्त त्यांच्या नावावर खपवली जाते.

खबरदारीचे इशारे बिनधास्त एखाद्या पोलीस अधिकाऱ्याचे नाव टाकून पोस्ट केले जातात. आपल्याकडे जी कोणतीही पोस्ट येईल, त्यात असलेल्या नंबरवर कॉल करण्याची सवय लावा. पोस्ट खरी असेल, तरच पुढे पाठवा. पोस्ट खोटी असेल, तर तसे स्पष्ट करणारी नवी पोस्ट तयार करून टाका.

मंगळ हा ग्रह आहे, तो तारा नाही, तिथून किरणोत्सर्ग होऊ शकत नाही, हे माहित असतानाही त्यावरच्या कॉस्मिक किरणांनी पृथ्वीवर दुष्परिणाम होणार असल्याचं भय पसरवलं जातं. अशा प्रकारच्या ज्या कोणत्याही पोस्ट येतील, त्यातील शब्द वापरून इंटरनेटवर सर्च करा, तुम्हाला सत्य काय ते कळेल. www.hoax.com वर तुम्हाला जगभरात चाललेल्या खोट्या पोस्टची माहिती मिळते. त्यांचा खरा खुलासा कळतो. आपल्याला एक कळतं की जे आज आपण मोठ्या कौतुकाने शेअर्ड करतोय, ते जगात आठ दहा वर्षांपूर्वी खोटं ठरलंय.

भारताच्या राष्ट्रगीताला जगातलं सर्वोत्तम राष्ट्रगीत म्हणून दर्जा मिळाल्याची आवई उठवली जाते. वास्तविक युनेस्कोच्या वेबसाईट वर लगेच जाऊन उलट तपासणी करणं शक्य असतं, पण आपण आपल्या नकली देशप्रेमापोटी नकळत आपल्याच राष्ट्रगीताचा अपमान करतो, हे आपण लक्षात घेत नाही. म्हणून नियमितपणे indian hoex जरूर तपासा.

जम्मू काश्मीर मध्ये तिरंगा फडकावण्यास मनाई असल्याचा कांगावा केला जातो. पण जर आपण जम्मू काश्मीर सरकारच्या वेबसाईटवर गेलो, तर चित्र वेगळं दिसतं. जाती धर्मात तेढ पसरवणाऱ्या अनेक पोस्ट वॅाट्सअपवर वेगाने फिरत असतात. अशा पोस्ट खऱ्या असो वा खोट्या ताबडतोब डिलीट करा. मुलामुलींना किंवा कोणालाही मारहाण करतानाचे विडीयो, कोणाचीही वैयक्तिक विशेषतः स्त्रियांची बदनामी करणारे विडीयो साहस असेल, पोलिसांना कळवा, अन्यथा डिलीट करा.

केंद्र सरकारने महिला अत्याचाराच्या कायद्यातील ज्या कलमात सुधारणा करून महिलांना हल्ल्यावेळी समोरच्याचा खून करण्याची परवानगी दिली म्हणून सांगितलं जातं., ते कलम नकली नाणे बनविण्याबाबत आहे. पण आपण आंधळेपणाने तो धादांत खोटा मजकूर आणखी शंभर लोकांना पाठवतो. ही सवय आजच सोडा.

कधी शीतपेयांमध्ये एड्सबाधित माणसाचं रक्त मिसळलं असल्याचा खोटा प्रचार केला जातो. इबोलावर मीठ पाण्याचा उपचार चालतो, म्हणून खोटं पसरवलं जातं. कडक लिंबांच्या किसाचा उपचार डॉ. प्रकाश आमटेंसारख्या समाजसुधारकांच्या नावावर खोटा खपवला जातो. देशाच्या उपराष्ट्रपतींच्या देशभक्तीबाबत संशय निर्माण करून त्यांची अर्वाच्य भाषेत बदनामी केली जाते. देशाचे पंतप्रधान, अनेक राजकीय नेत्यांची खालच्या स्तराचे विनोद करून खिल्ली उडवली जाते. ही एक विकृती आहे. तिची सवय लावून घेऊ नका.

काय मिळत असेल, या लोकांना असं खोटंनाटं पसरवून असा भाबडा प्रश्न आपल्या मनात येत असेल. पण त्याचं उत्तर त्या भाबडेपणातच आहे. आपलं खोटं या देशातले लोक किती बेफिकीरीने पुढे पुढे ढकलताहेत, हे पाहून जगातली संबंधित विकृत माणसं पोट धरून हसत असतील, आपल्या मूर्खपणावर किंवा अति शहाणपणावर !!!

त्या विकृतांना असुरी आनंद सुद्धा होत असेल. कारण आपण दिवसेंदिवस बधीर होत चाललो आहोत, याची त्यांना जाणीव आहे. एक दिवस आपणच आपल्या बेजबाबदारपणामुळे आपलीच घरेदारे पेटवण्यास कारणीभूत ठरणार आहोत.
आपली नजरचुकीने पुढे पाठवलेली पोस्ट एक दिवस दंगेधोपे घडविण्यास कारणीभूत ठरू शकते. ती आपणावर कायदेशीर कारवाई होण्याचे कारण तर ठरेलच पण आपल्याच प्रियजणांच्या विनाशाचेही कारण बनू शकते.

आपले डोळे उघडतील. पण तोपर्यंत उशीर झालेला असेल.

तेंव्हा वेळीच जागे व्हा.

स्वतःची आणि स्वतःचीच, पुरेपूर खात्री असल्याशिवाय कोणतीही पोस्ट शेअर किंवा फोरवर्ड करू नका.

कोणतीही कविता, लेख, विचार ज्याचे असतील, त्याचे नाव टाकल्याशिवाय पोस्ट करू नका.

संवेदनशील विषय पोस्ट करण्याचे किंवा शेअर करण्याचे टाळा.

कोणाही व्यक्तीची, समाजाची, धर्माची तारतम्य सोडून बदनामी करेल असे मजकूर, फोटो, चित्रे, कार्टून्स, विनोद पोस्ट करू नका.

महिलांना अवमानित करणारे विनोद, पोस्ट टाळा.

अपघात, खून, बलात्कार संबंधी पोस्ट करताना जाणीवपूर्वक काळजी घ्या. पिडीत महिलेचे नाव कोणत्याही परिस्थितीत उघड होणार नाही, हे पाहा.

रक्तरंजित किंवा भावना भडकवणारे फोटो पोस्ट करू नका.

ग्रुपवर आपसात बोलतानाही आपलं लिखाण ग्रुपमधील सर्व सदस्य वाचत असतात, याचे भान राखा. ते समूहाचा विचार सोडून नसावं, याची काळजी घ्या.

देशाची सुरक्षितता धोक्यात येईल अशी माहिती घाईघाईने उघड करू नका.

हे सोशल नेट्वर्किंग आहे, कचरा डेपो नाही, याची जाणीव असू द्या. सोशल नेट्वर्किंगचा वापर सकारात्मक करा.

हातात नुसता स्मार्टफोन असून उपयोग नाही. खऱ्या अर्थाने " स्मार्ट " व्हा.

Wednesday, March 4, 2015

India lost around 500 Crores in last 4 years in cyber frauds

As many as 37,721  cyber fraud cases involving Rs 497 crore have been reported by the RBI and CBI in the last four years.

Several cyber attack techniques are used in committing frauds and losses and are normally reported such as ATM/Debit cards, credit cards, As many as 37,721  Cyber Fraud Cases involving Rs 497 crore have been reported by the RBI and CBI in the last four years,

"As per information provided by the RBI , 10,048, 8,765, 9,500 and 9,362 cyber fraud cases and losses of Rs 38 crore, Rs 67 crore, Rs 78 crore and Rs 60 crore have been reported to the RBI during 2011-12, 2012-13, 2013-14 and April-December 2014, respectively," 

"CBI has also registered 46 cases (14 PEs (Preliminary Enquiry) and 32 RCs (Regular Case)) relating to cyber crime in various parts of the country during the last 3 years that is 2012, 2013, 2014 and 2015 (till date)." 

In these cases 34 persons have been arrested, he said. "An amount of Rs 90 crore, Rs 158 crore and Rs 6 crore was involved in these cases registered during the year 2012, 2013 and 2014, respectively," 

Incidents of  malware infections in India cyber space are reported to and tracked by the Indian Computer Emergency Response Team (CERT-In), which works with the Internet Service Providers (ISps) to identify the infected systems and organisations, 
"Cert-In, Department of Electronics and IT has initiated action with active participation of service providers and industry to set up a centre for detection of computer systems infected by malware and to notify, enable cleaning and securing systems of end users to prevent further malware infections," 

As reported to parliament by IT Minister of India

Wednesday, February 4, 2015

Top cyber security breaches of 2014



Top Cyber Security breaches of 2014

Here are some of the leading security breaches in the US last year
Date (2014)CompanyNumber of records exposedTypes of records
25 JanMichael's2,600,000payment cards
6 FebHome Depot20,000employee info
14 MarSally Beauty Supply25,000credit/debit card
17 AprAaron Brothers400,000payment cards
22 AprIowa State University48,729student social security numbers
30 MayHome Depot30,000credit/debit card
22 JulGoodwill Industries868,000payment systems
18 AugCommunity Health Systems4,500,000patient data
21 AugUnited Postal Service105,000credit/debit card
28 AugJP Morgan Chase1,000,000financial information
2 SepHome Depot56,000,000credit/debit card
2 SepViator/Trip Advisor880,000payment cards
25 SepCentral Dermatology76,258patient data
7 NovHome Depot53,000,000email addresses
10 NovUS Postal Service800,000personal data
18 NovStaples1,200,000credit/debit card

Friday, January 23, 2015

Omission to produce CCTV footage raises doubts about prosecution case:SC

The Supreme Court of India in Tomaso Bruno & Anr. Vs. State of U.P. dated 20-01-2015 viewed that "omission to produce CCTV footage which is the best evidence, raises serious doubts about the prosecution case."



A full bench of Justices Anil R. Dave, Kurian Joseph and R. Banumathi held that "to invoke Section 106 of the Evidence Act, the main point to be established by the prosecution is that the accused persons were present in the hotel room at the relevant time.

Hotel Manager stated that CCTV cameras are installed in the boundaries, near the reception, in the kitchen, in the restaurant and all three floors. Since CCTV cameras were installed in the prominent places, CCTV footage would have been best evidence to prove whether the accused remained inside the room and whether or not they have gone out.

CCTV footage is a strong piece of evidence which would have indicated whether the accused remained inside the hotel and whether they were responsible for the commission of a crime. It would have also shown whether or not the accused had gone out of the hotel.

CCTV footage being a crucial piece of evidence, it is for the prosecution to have produced the best evidence which is missing. Omission to produce CCTV footage, in our view, which is the best evidence, raises serious doubts about the prosecution case." Court added.
Allowing the appeal and setting aside the convictions of the accused under Section 302/34 IPC the Court further held that:

With the advancement of information technology, scientific temper in the individual and at the institutional level is to pervade the methods of investigation. With the increasing impact of technology in everyday life and as a result, the production of electronic evidence in cases has become relevant to establish the guilt of the accused or the liability of the defendant.

Electronic documents strictu sensu are admitted as material evidence. With the amendment to the Indian Evidence Act in 2000, Sections 65A and 65B were introduced into Chapter V relating to documentary evidence. Section 65A provides that contents of electronic records may be admitted as evidence if the criteria provided in Section 65B is complied with.

The computer generated electronic records in evidence are admissible at a trial if proved in the manner specified by Section 65B of the Evidence Act. Sub-section (1) of Section 65B makes admissible as a document, paper print out of electronic records stored in optical or magnetic media produced by a computer, subject to the fulfilment of the conditions specified in sub-section (2) of Section 65B.

Secondary evidence of contents of document can also be led under Section 65 of the Evidence Act. PW-13 stated that he saw the full video recording of the fateful night in the CCTV camera, but he has not recorded the same in the case diary as nothing substantial to be adduced as evidence was present in it.

Production of scientific and electronic evidence in court as contemplated under Section 65B of the Evidence Act is of great help to the investigating agency and also to the prosecution.
Relevance of electronic evidence

The trial court in its judgment held that non-collection of CCTV footage, incomplete site plan, non-inclusion of all records and sim details of mobile phones seized from the accused are instances of faulty investigation and the same would not affect the prosecution case. Non-production of CCTV footage, noncollection of call records (details) and sim details of mobile phones seized from the accused cannot be said to be mere instances of faulty investigation but amount to withholding of best evidence. It is not the case of the prosecution that CCTV footage could not be lifted or a CD copy could not be made.

As per Section 114 (g) of the Evidence Act, if a party in possession of best evidence which will throw light in controversy withholds it, the court can draw an adverse inference against him notwithstanding that the onus of proving does not lie on him. The presumption under Section 114 (g) of the Evidence Act is only a permissible inference and not a necessary inference.

Unlike presumption under Section 139 of Negotiable Instruments Act, where the court has no option but to draw statutory presumption under Section 114 of the Evidence Act.

Under Section 114 of the Evidence Act, the Court has the option; the court may or may not raise presumption on the proof of certain facts. Drawing of presumption under Section 114 (g) of Evidence Act depends upon the nature of fact required to be proved and its importance in the controversy, the usual mode of proving it; the nature, quality and cogency of the evidence which has not been produced and its accessibility to the party concerned, all of which have to be taken into account. It is only when all these matters are duly considered that an adverse inference can be drawn against the party.

The High Court held that even though the appellants alleged that the footage of CCTV is being concealed by the prosecution for the reasons best known to the prosecution, the accused did not invoke Section 233 Cr.P.C. and they did not make any application for production of CCTV camera footage.

The High Court further observed that the accused were not able to discredit the testimony of PW-1, PW-12 and PW-13 qua there being no relevant material in the CCTV camera footage. Notwithstanding the fact that the burden lies upon the accused to establish the defence plea of alibi in the facts and circumstances of the case, in our view, prosecution in possession of the best evidence–CCTV footage ought to have produced the same.

In our considered view, it is a fit case to draw an adverse inference against the prosecution under Section 114 (g) of the Evidence Act that the prosecution withheld the same as it would be unfavourable to them had it been produced.

In the present case, the courts below have not properly appreciated the evidence and the gap in the chain of circumstances sought to be established by the prosecution. The courts below have ignored the importance of best evidence i.e. CCTV camera in the instant case and also have not noticed the absence of symptoms of strangulation in the medical reports.

Upon consideration of the facts and circumstances of the case, we are of the view that the circumstances and the evidence adduced by the prosecution do not form a complete chain pointing to the guilt of the accused and the benefit of doubt is to be given to the accused and the conviction of the appellants is liable to be set aside", the Court Said..

Thursday, January 22, 2015

What if Police Station Doesn't File Your FIR in Cyber Crime/fraud matters?

When A Police Station do not File your FIR in any Cyber Crime Matter what to do ? 
Step 1. Write down the complaint and submit it in the ACP/DCP /SP office and take acknowledgement copy or send the complaint via post.Wait for 10-15 days.
Step 2, If action is not taken yet then send the complaint to Commissioner /IG of Police in the same above manner. Procedure is mentioned under 154(3) of Cr.P.C.
Step 3. You can directly approach to the " CONCERNED" Magistrate of that Police Station with your Written "COMPLAINT".as per section 200 of the Cr.P.C.
The Procedure is very simple:
(i) First you prepare your "PRIVATE COMPLAINT" as per the format for the alleged offences, attach all the documents along with your complaint separately as "LIST OF DOCUMENTS/EXHIBITS", and mention names of the witnesses to the alleged offences in your complaint in  "LIST OF WITNESSES/EXHIBITS", then approaching to the "CONCERNED" Magistrate who is granted with Jurisdiction of that Police Station, file your complaint in the "PRESENCE" of "COMPLAINANT" with the help of an Advocate.
(ii) Then on your Complaint, if and only if  the Magistrate considers, would verify documents and either direct you to produce witnesses  (Complainant/Witnesses as per List) on the same day or any other day  to record the "EVIDENCE".
(iii) After recording of such Evidence, Magistrate may directly "ORDER"  for issuance of "SUMMONS" to the "ACCUSED".  
Step 3(a)
For The Complaints,  If filed Under Section 200  Read With Sec.156 (3) of the Cr.P.c.
(a) Then,  on your Complaint, if and only if  the Magistrate considers, may either direct you to produce witnesses  ( Complainant/Witnesses as per List) on the same day or any other day  to record the "EVIDENCE".
(b) After recording of such Evidence, Or otherwise Magistrate may " REFER/SEND YOUR COMPLAINT TO THE CONCERNED POLICE STATION" with the directions to
(i) Register a "FIR" U/S. 154 of Cr.P.C on this Complaint for the Alleged Offences against Accused 
(ii) Investigate the matter 
(iii) Submit Report.
Note: People or Organisations who had approached me for filing a FIR related to Cyber Crime/fraud, my success rate has remained 95%, but lawyer is not always required as he charges professional legal fees for all services from drafting, consultation to liasoning with police. 
Feedback: cyberlawconsulting@gmail.com | Twitter: @CyberMahaGuru

Communication with Cyber Terrorist

Communication with Cyber Terrorist
Direct messaging techniques use “counter narratives” to directly undermine and refute cyber terrorist 
messages, denigrate messengers, or disturb those within violent extremists’ ranks. Such techniques
include refutation, denigration, condemnation, and agitation. These can be effective when targeting
mobilized audiences by creating confusion, distraction, or paranoia among extremists, as well as
preventing the further spread of extremist narratives by embroiling extremist communicators in
defensive argumentation. They can also prevent the ceding of ground to extremists by offering a
competing response and by reducing the incentive to spread extremist ideas by making them appear
less defensible or appealing. There are risks to such messages, however, which include the possibility
of inadvertently bringing attention to extremist narratives, and forcing cyber terrorist communicators to engage on the latter’s terms. Actually changing the minds of mobilized audiences through counter messaging is difficult, however. Adherents to extremist narratives who have acted upon them tend to be strongly
resistant to counter evidence or direct argumentation, according to narrative theory. Direct
confrontation often creates more resistance to change in individuals with deep-rooted beliefs, which
risks further entrenching extremist beliefs. This is especially the case for mobilized audiences consisting of hard-line extremists who have acted upon their beliefs, thus solidifying and further embedding these attitudes. In contrast, radicalized audiences those who agree with the violent extremist narrative but have not yet engaged in supporting activities may be shakier in their beliefs and possibly more open to counter argumentation. In such cases, direct messaging techniques can be employed to trigger enough uncertainty to deter them from mobilizing to violence.
Often, however, indirect messaging techniques may be more effective in changing the minds of radicalized audiences. Indirect techniques use “alternative narratives,” designed to distract from or supplant the adversary’s narrative without directly referencing it and to galvanize non-participatory audiences against it. These narratives work by indirectly destabilizing the credibility and appeal of extremist arguments, rather than directly challenging them through argumentation. Extremist narratives are oversimplified and reductionist, which serves as both a strength and a weakness. While extremist narratives are simple enough to be easily understood and spread, their simplicity makes them brittle and vulnerable to destabilization in the face of additional details, complexities, and alternate explanations that can inspire curiosity and uncertainty among the
adherents. By introducing complexity into extremist narratives, these techniques gradually deflate
their appeal by fracturing the underlying belief system, triggering doubt among radicalized audiences.
However, doubt and curiosity can only grow in the adherent when they aren’t feeling threatened,
according to narrative theory, implying that alternative narratives which aren’t confrontational, but
rather seek to add new information, could be most effective. Government-directed efforts to employ
indirect messaging are difficult, however. Such messaging requires a deep understanding of the culture, as well as credibility with audiences who may be deeply suspicious of the government. As a result, it may require partnering with local messengers and engaging in capacity building to train credible communicators. Such techniques also tend to require continuous, intensive efforts to build relationships, trust, and the necessary nuance to succeed. They are long-term strategies that seek to cause change through a gradual insertion of doubt, and as such, are less useful for crisis communication immediately following an event. Communications with cyber terrorist are most effective when integrated with complementary policy actions that reinforce and extend the messaging themes, but often matching words to actions can be nonviable. At times, the best course of action may even be “strategic silence” when a communication response could exacerbate matters.

Taxation of E-Commerce

The Taxation of E-Commerce will depend on the business model adopted by the Company.Let me try to explain 2 types of E-Commerce transition and taxation for the same.

1.   Business to Customer 
In this type of business model, the E-Commerce Company sells goods directly to customer. In this case Sales Tax is charged on sale of goods. 

How goods taxed and what is Sales Tax?
Sales tax is a tax which is levied on sale of goods, constitution of India empowers state to levy tax on sale or purchase of goods.

Type of Sales

a)    Interstate Sale 

When sale or purchase is made from one state to another it is governed by Central Sales Tax Act 1956, the rate applicable for particular goods will be taxed according. (i.e 1%, 2%, 4%, 12.5%)
 
Note: Industrial inputs are taxed at moderate rate & Luxury goods are usually taxed at higher percent 
 
b)   Intrastate Sale

If buyer and seller are situated in the same state, the taxation will be as per the Local Sales tax as per the state law.( Ex. In Karnataka the tax rates are 1%, 2%, 5.5%, 14.5%)
 
c)    Export Sale

Any export sale made is exempt from Sales tax.
 
Illustration

Suppose a customer orders a goods from Bangalore, and the E-Commerce company is having a place of business in Delhi, one the sale of goods CST is charged as per Central Sale Tax Act 1956( i.e 1%, 2%, 4%, 12.5%) 
 
2.   Customer to Customer 
 
In this case websites doesn't sell goods directly but they bring buyer and seller together and in turn charges commission. This commission in turn is a service fee and service tax has to be collected from the E-commerce company. Hence there is no concept of Sales Tax in this type of transaction.

FIR : All you want to know about in a criminal case

FIR - What is?  The first information report is a report giving information of the commission of a cognizable crime,  which may be made by t...