Posts

बॅंकेतून ऑनलाइन पैसे गेलयास १५५२६० हा हेल्पलाइन क्रमांक करा डायल

बॅंकेतून ऑनलाइन पैसे गेलयास १५५२६० हा हेल्पलाइन क्रमांक करा डायल तंत्रज्ञान जेवढे प्रगत होत जाते तेवढेच त्याच्यामागे धोकेही चालत येतात. ऑनलाइन चोरी हा त्यातलाच एक प्रकार! विशेष म्हणजे शिक्षित, अनुभवी असलेले व्यक्ती याला बळी (Online fraud) पडतात. तुमचे क्रेडिट कार्ड अपडेट करायचे आहे, तुमच्या पिन नंबरची मुदत संपली, तुमच्या खात्यात अमुक रक्कम जमा करायची आहे, अशा एक ना अनेक क्लूप्त्या वापरत सायबर गुन्हेगार नागरिकांना फसवत असतात. अशा सायबर गुन्हेगारांवर आळा घालण्यासाठी केंद्र सरकारने आता पाऊल उचलले आहे. केंद्रीय गृहमंत्रालय आणि दिल्ली पोलिसांच्या सायबर सेलने अशी यंत्रणा विकसित केली की ज्या माध्यमातून लोकांना दिलासा मिळणार आहे. केंद्रीय गृहमंत्रालयाने १५५२६० हा क्रमांक हेल्पलाइन म्हणून जारी केला आहे. ज्यांचे पैसे खात्यातून उडाले असतील त्यांनी त्वरित या क्रमांकावर कॉल करावा. कारण, सायबर गुन्ह्यांमध्ये वेळेला फार महत्त्व असते. जेवढ्या लवकर हेल्पलाइनवर कॉल कराल तेवढे गुन्हेगार शोधून काढण्यास आणि रक्कम परत मिळण्यास मदत होते. इंटरनेटला कुठलीही भौगोलिक मर्यादा नसल्याने अगदी विदेशात बसलेला हॅकरही त...

इलेक्ट्रॉनिक उपकरणांच्या शोध आणि जप्तीसाठीची पोलिसानसाठी मार्गदर्शक तत्त्वे

Image
  पोलिस : इलेक्ट्रॉनिक उपकरणांच्या शोध आणि जप्तीसाठीची मार्गदर्शक तत्त्वे       कर्नाटक उच्च न्यायालय निकाला प्रमाणे -  अ‍ॅड. (डॉ.) प्रशांत माळी, सायबर तज्ज्ञ वकील  महाराष्ट्र सायबरच्या पोलीस अधिकारींच्या माज्या व्याख्यान कार्यक्रमा निमित्त, माझा हा ब्लॉग प्रदर्शित करत आहे. Virendra Khanna Vs State of Karnataka and Ors (2021) वीरेंद्र खन्ना विरुद्ध स्टेट ऑफ कर्नाटक आणि इतर (२०२१) निकालामध्ये स्मार्टफोन, इलेक्ट्रॉनिक उपकरणे किंवा ईमेल खाती यासंबंधात तपासणी दरम्यान जमलेल्या पुराव्यांना जतन करण्यासाठी शोध घेण्याच्या पद्धती संबंधित अनुसरण करण्याचे निर्देश उच्च न्यायालयाने अधोरेखित केले आहेत. कोर्ट एका खटल्याची सुनावणी करीत होते, जेथे आरोपीच्या मोबाईल फोन च्या शोध आणि जप्ती संदर्भात चौकशीचा सहभाग होता, या संदर्भात हा निकाल हायलाइट्स केला गेला कि, ज्या तपासामध्ये इलेक्ट्रॉनिक उपकरणांचा तपासणी दरम्यान समावेश असतो त्या संदर्भात कोणताही विशिष्ट असा कायदा नाही. हा निकाल असा निष्कर्ष काढतो कि, इलेक्ट्रॉनिक उपकरणांच्या शोध आणि जप्ती संदर्भात पोलिस व...

Guidelines for search & seizure of Electronic Devices by Police : Karnataka HC Case Law

Image
Guidelines for search & seizure of Electronic Devices by Police: Karnataka HC Case Law Releasing this Blog on the event on my session for Maharashtra Cyber (MahCyber) police officers : In the case   Virendra Khanna vs. State of Karnataka and others   (2021) , the high court underlined guidelines to be followed by investigating officers regarding the manner of carrying a search and/or for the preservation of evidence gathered during an investigation that concerns smartphones, electronic equipment, or email accounts. The court was hearing a case where the investigation involved the search and seizure of an accused mobile phone. In this context, the judgment highlights that there is no specific law regarding the procedure to be followed during an investigation that involves electronic devices. The judgment concludes that detailed guidelines must be prepared by the police department in relation to the search and seizure of electronic devices. Meanwhile, until such instructions...

APT Groups of India involved in Cyber Warfare

Image
APT Groups of India involved in Cyber Warfare An advanced persistent threat (APT) is a stealthy threat actor, typically a nation-state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period. In recent times, the term may also refer to non-state-sponsored groups conducting large-scale targeted intrusions for specific goals.  Such threat actors' motivations are typically political or economic. Following are some of the Indian APT Groups : SideWinder:  The highly active cyber-espionage entity known as  SideWinder  has been plaguing governments and enterprises since 2012. SideWinder’s most of the activity is heavily focused on South Asia and East Asia, with the group likely supporting Indian political interests. Dropping Elephant : This is allegedly an Indian state-sponsored group  Dropping Elephant  has been known to target the Chinese government via spear-phishing and watering ho...

WhatsApp group admin Liability Case Law

Image
Case Laws for WhatsApp Group Admin Liability “ A vicarious criminal liability can be fastened only by reason of a provision of a statute and not otherwise. In the absence of a special penal law  creating vicarious liability, an Admin of a WhatsApp group cannot be held liable for the objectionable post by a group member." a crime was registered against the first accused under Sections 67B (a),(b) and (d) of the Information Technology Act, 2000 and Sections 13, 14 and 15 of the Protection of Children from Sexual Offence Act. Manual v. State of Kerala [2022] CRL MC No.3654 of 2021 WhatsApp group admin can’t be held liable for member’s post unless common intention shown held by Bombay High Court : Alleged Crime was under Section 67 of the IT Act, 2000 (related to obscenity) Kishor v State of Maharashtra [2021] GCtR 787 (Nagpur, Bombay HC) 01/03/2021 in Criminal Application (APL) 573/2016 " Common intention cannot be established in a case of WhatsApp service user merely acting a...

Police needs warrant to ask PASSWORD from accused

Image
Police need a  warrant to ask password from the accused: Case Law Case Law Details: Virendra Khanna Vs State of Karnataka  Petition No. 11759 of 2020 (GM-RES) A search warrant is necessary for the examination of a smartphone, laptop, or email account of an accused. Held by Karnataka High Court. An accused cannot be constrained to disclose the password/passcode of his gadgets or accounts through a mere order of a trial court to cooperate with. Section 100 of CrPC provides general procedures that need to be necessarily followed at the time of the search. I say that if the Investigation officer leaks the data A case can be filed under section 72 of The IT Act,2000. A search warrant is a written order which is issued by a Judge/ Magistrate or a Court to a police officer or any other person authorizing them to conduct a search of a person, location, or vehicle for evidence of a crime and confiscate illegal evidence of a crime. The court in Kalinga Tubes Ltd. v. D. Suri and in man...

EMP Warfare as a part of Cyber Warfare : China's war on India

Image
EMP Warfare as a part of Cyber Warfare EMPs, or electromagnetic pulses, are intense bursts of electromagnetic energy that can be utilized to damage electronics. Man-made nuclear EMPS are impressive weapons of war that are sparingly used due to their highly destructive nature. China’s has ability to conduct an Electromagnetic Pulse attack on the India. China now has super-EMP weapons, knows how to protect itself against an EMP attack, and has developed protocols to conduct a first-strike attack, even as they deny they would ever do so. China has the most active  ballistic missile development program in the world , so this is doubly troubling. Allegedly China used stolen U.S. technology to develop at least three types of high-tech weapons to attack the electric grid and key technologies that could cause a surprise “Pearl Harbor” attack that could produce a deadly blackout to the entire India. EMPs are one of those things that many people think is fake, or over-blown, or a consp...