NEWS

Sunday 16 July 2017

Digital Way Globalization And Its Trap End!





Online network has empowered global connectivity and economic growth but where is the peace with hole in the pocket due to cyber crime intensity after latest wanna cry including ransomware malicious virtual system attack.


Fastest solution through cyber technology appears best but is it on the other end a trap? Is it easy to take to crime for everyone? Answer is definitely ‘NO’. Logistically if it is possible for everyone to do crime - be it cyber or other then hardly there would have been lawmakers and victims.


Big question is who protects the innocence of the innocent? In Northeast, India especially how well versed people are in system protection rules who are processing online network through computer or laptop or mobile? It is a technical matter which even pronounced sales engineers of showroom won’t reveal details or guide security measure. Non-technical literate to illiterate are prone to vulnerability of malicious online attack.


Assam CID officials arrested Daipayan Das, 30, from Morigaon on accusation of posting pictures and phone numbers of several girls including some anchors of a local satellite TV channel, as call girls by creating a Facebook page. This accusation case against Daipayan Das for misguiding and blackening a person’s identity in public was registered under Sections 66A and 67A of IT Act, 2000.


Potency of growing cyber crime could be estimated from seven years back activities of Das to make attempt in cracking IIT sever codes of Guwahati just for fickle personal purpose to defame his love interest by creating a fake profile of her on top social media.


This NIT Jaipur bachelor's degree electrical engineering student Das had first conceived criminal concept by creating a fake Facebook profile page on the interested girl during his study in Guwahati IIT according to Assam CID cyber crime.

In another 2013 cyber defamation case on 7th Nov in Assam was created through fake page article post with lynching remark by highlighting 43 BC annual 'Assam Rape Festival’ concept that lead to state wide agitation after viral spread through social media.


On this sensitive regional issue the CID of Assam Police had initiated suo motu investigations for creating public offence by tarnishing state’s image. In this investigation process CID additional superintendent of police Nirmal Baishya who was in charge of this cyber crime had exposed Uganda source involvement with U.S., Houston web host.


According to cyber crime cell Kolkata usually there are various crimes conducted through online process like virus dissemination, denial of service attack(DoS), cyber stalking, hacking, software piracy, phishing and bank card fraudulence.


At this vulnerable point unaware user visiting the sites with malicious duplicate links becomes victim when they click to the link for information. The cyber security personnel can track sources through server logging.


Server logging enables cyber security person to track the soft copy of the defaced web page from its hard copy in case of deface complain. Criminal track could be derived from the soft copy of compromised data stored in the victim’s server.

As per to Global Jurisdiction the Information Technology Act of India could empower the CIDs (Criminal Investigation Departments) of any states to open up multiple Cyber Crime Cells to act upon the lodged cyber crime complaint  


Advanced process to access cyber solution is research lab where forensic reports are availed according to Kolkata cyber crime branch of India.

But why labs for cyber crime tracking as cyber attacker could not harm physically? Reason simply because the cyber criminal can be potent in its attack by using sophisticated technology to attack virtually by debiting money from the account and defacing victim in social media circuit.

Cyber Labs Empowers:


  • To develop cyber crime investigation skills.
  • To update on latest cyber crime techniques.
  • To process hard disk cloning in few minutes.  


Such lab is yet to be launched in Assam according to Nirmal Baishya, Dy.SP(CID) though Assam government has already sanctioned fund for installation of the latest forensic lab in Guwahati capital city.  Before proceeding into major forensic lab set up in various economic centres of the state like Jorhat, Tezpur, Dibrugarh and others.



For validation of one’s standpoint, a cyber victim before lodging a complaint need to produce any valid information or documents. Usually one is inquired on possible suspect who dares to operate on the system, attack prone factors that relates to hacking, time of attack and suspect of possible system in the computer network zone and numbers of affected systems.


On the query how the general public apart from organizations with cyber security support could be prepared for cyber attack, Dy.SP(CID), Assam replied “Gadget friendly people should not avert security measures as prescribed in the system before processing online network. Advanced version gadgets with online facilities enable software like the OS of the system or internet support software with higher intruder protection options. The options should be enabled before using the system for online operation. Any pop ups or mail threads will be prevented from harming the system function.”


Ethical hackers of prominent institutions has to say on the contrary that despite system’s defense features a hacker can still process their intrusion and steal information. But only if the user clicks the fake link or fabricated thread with company’s name you are associated with. Especially bank sectors where on to the sent fake link the hackers will add words analytically like ‘to secure your money or for further furnish of information to secure your bank account.’ At this point the user becomes vulnerable to cyber trap and makes the major fault by clicking the link.


Assam CID Additional SP, K.K. Baishya on the query as to how to prevent hackers from computer access added, “Only reliable sources one should take information and make downloads. Pay careful attention to system’s firewall instruction to resist unauthorized activity. Reliable virus scanner like quick heal and other reliable programs should be installed and maintain weekly update of the scanning version as signaled by the software with internet accessibility.”


Users not sensitive to possible hackers’ attack make the major fault by storing confidential information like financial account numbers, confidential personal details and personal identity documents etc., in their system. It is advised to transfer the confidential details in higher capacity portable storage drive.



It’s time cyber security need to enhance its technological integrity to root out cyber crime as its illegal activities has taken to such degrading extent that by using user’s ISP account can do scandalous job like share of dirty video, audios and information to an unknown party.


NEIC Analytic Report : SUMI

No comments:

Post a Comment

Your highlight can be precious enough to make a change in the present system for better progress of the nation and so make a step to comment.