SlideShare uma empresa Scribd logo
1 de 22
Cyber Crime Cell :    A need of the hour in Assam Dr Baharul Islam ,  LLM ( IT & Telecom Law, UK ), PhD Chairman, State Knowledge Commission, Mizoram & CEO, South Asia Development Gateway
OUTLINE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cases Registered under IT Act : NCRB
Persons Arrested under IT Act:  NCRB
Cases Registered under IPC :  NCRB
Persons Arrested under IPC :  NCRB
Source: Internet Crime Complaint Center, USA
Source: Internet Crime Complaint Center, USA
Source: Internet Crime Complaint Center, USA
Provisions of the Info. Tech Act 2000 ,[object Object],[object Object],[object Object]
Examples from other States ,[object Object],[object Object],[object Object],[object Object],[object Object]
CYBER CRIME POLICE STATION BANGALORE ,[object Object],[object Object],[object Object],[object Object],[object Object]
CCPS BANGALORE… Contd ,[object Object],[object Object],[object Object]
AP Cyber Crime Police Station Hyderabad ,[object Object],[object Object],[object Object],[object Object]
Cyber Crime Cell Ahmedabad ,[object Object],[object Object],[object Object],[object Object],[object Object]
Others Places ,[object Object],[object Object],[object Object],[object Object]
Proposal for Assam  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Proposed Specialized Cells/Units ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Rationale ,[object Object],[object Object],[object Object],[object Object],[object Object]
Rationale …contd. ,[object Object],[object Object],[object Object]
Conclusion ,[object Object],[object Object]
Thank You !! ,[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

Understanding h.r. 1540 the national defense authorization act for fy2012 se...
Understanding h.r. 1540  the national defense authorization act for fy2012 se...Understanding h.r. 1540  the national defense authorization act for fy2012 se...
Understanding h.r. 1540 the national defense authorization act for fy2012 se...Kristal Snider
 
Modern trends in police force
Modern trends in police forceModern trends in police force
Modern trends in police forceK J Singh
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeVishni Ganepola
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In PakistanShakeel Ahmed
 
Computer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lankaComputer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lankaVishni Ganepola
 

Mais procurados (8)

Understanding h.r. 1540 the national defense authorization act for fy2012 se...
Understanding h.r. 1540  the national defense authorization act for fy2012 se...Understanding h.r. 1540  the national defense authorization act for fy2012 se...
Understanding h.r. 1540 the national defense authorization act for fy2012 se...
 
Modern trends in police force
Modern trends in police forceModern trends in police force
Modern trends in police force
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information Age
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In Pakistan
 
Imran batada
Imran batadaImran batada
Imran batada
 
CCTNS In Karnataka, Experience Sharing
CCTNS In Karnataka, Experience SharingCCTNS In Karnataka, Experience Sharing
CCTNS In Karnataka, Experience Sharing
 
Computer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lankaComputer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lanka
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 

Semelhante a Cyber Crime In Ne Conf 27 April 08

Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technologyTalwant Singh
 
Computer Forensics & Cyber Crimes
Computer Forensics & Cyber CrimesComputer Forensics & Cyber Crimes
Computer Forensics & Cyber CrimesAnamZunaira
 
Survey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningSurvey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningIRJET Journal
 
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...IJARIIT
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningVenkat Projects
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningVenkat Projects
 
3.abstract (cyber crime)
3.abstract (cyber crime)3.abstract (cyber crime)
3.abstract (cyber crime)JIEMS Akkalkuwa
 
Computer Forensics: The Emerging Significance to Law Enforcement
Computer Forensics: The Emerging Significance to Law Enforcement Computer Forensics: The Emerging Significance to Law Enforcement
Computer Forensics: The Emerging Significance to Law Enforcement Lillian Ekwosi-Egbulem
 
Online crime investigation
Online crime investigationOnline crime investigation
Online crime investigationData Source
 
An insight view of digital forensics
An insight view of digital forensicsAn insight view of digital forensics
An insight view of digital forensicsijcsa
 
Crime rate analysis using k nn in python
Crime rate analysis using k nn in python Crime rate analysis using k nn in python
Crime rate analysis using k nn in python CloudTechnologies
 
Internet Crime Control Authority
Internet Crime Control AuthorityInternet Crime Control Authority
Internet Crime Control AuthorityDaily 10 Minutes
 
Disadvantages Of Intelligence Led Policing
Disadvantages Of Intelligence Led PolicingDisadvantages Of Intelligence Led Policing
Disadvantages Of Intelligence Led PolicingChristina Ramirez
 
An application development for police stations in pakistan
An application development for police stations in pakistanAn application development for police stations in pakistan
An application development for police stations in pakistanSalam Shah
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber CrimeASO6KM
 

Semelhante a Cyber Crime In Ne Conf 27 April 08 (20)

Ijcta2012030301
Ijcta2012030301Ijcta2012030301
Ijcta2012030301
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
Computer Forensics & Cyber Crimes
Computer Forensics & Cyber CrimesComputer Forensics & Cyber Crimes
Computer Forensics & Cyber Crimes
 
Survey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningSurvey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine Learning
 
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data mining
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data mining
 
Walker, Chapter 15
Walker, Chapter 15Walker, Chapter 15
Walker, Chapter 15
 
3.abstract (cyber crime)
3.abstract (cyber crime)3.abstract (cyber crime)
3.abstract (cyber crime)
 
Computer Forensics: The Emerging Significance to Law Enforcement
Computer Forensics: The Emerging Significance to Law Enforcement Computer Forensics: The Emerging Significance to Law Enforcement
Computer Forensics: The Emerging Significance to Law Enforcement
 
Istory of cbcid
Istory of cbcidIstory of cbcid
Istory of cbcid
 
Online crime investigation
Online crime investigationOnline crime investigation
Online crime investigation
 
Case.pptx
Case.pptxCase.pptx
Case.pptx
 
An insight view of digital forensics
An insight view of digital forensicsAn insight view of digital forensics
An insight view of digital forensics
 
Crime rate analysis using k nn in python
Crime rate analysis using k nn in python Crime rate analysis using k nn in python
Crime rate analysis using k nn in python
 
Internet Crime Control Authority
Internet Crime Control AuthorityInternet Crime Control Authority
Internet Crime Control Authority
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Disadvantages Of Intelligence Led Policing
Disadvantages Of Intelligence Led PolicingDisadvantages Of Intelligence Led Policing
Disadvantages Of Intelligence Led Policing
 
An application development for police stations in pakistan
An application development for police stations in pakistanAn application development for police stations in pakistan
An application development for police stations in pakistan
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Mais de Prof K M Baharul Islam

Outer Circle In The Digital World Dr Islam
Outer Circle In The Digital World   Dr IslamOuter Circle In The Digital World   Dr Islam
Outer Circle In The Digital World Dr IslamProf K M Baharul Islam
 
E Government Pilot Project Strategies For The Gambia
E Government Pilot Project  Strategies For The GambiaE Government Pilot Project  Strategies For The Gambia
E Government Pilot Project Strategies For The GambiaProf K M Baharul Islam
 
Eac Regional E Govt Framework Presentation At Eac Ws 27 June 05
Eac Regional E Govt Framework   Presentation At Eac Ws 27 June 05Eac Regional E Govt Framework   Presentation At Eac Ws 27 June 05
Eac Regional E Govt Framework Presentation At Eac Ws 27 June 05Prof K M Baharul Islam
 
Baharul Islam Cdr Presentation Feb 2008
Baharul Islam   Cdr  Presentation Feb 2008Baharul Islam   Cdr  Presentation Feb 2008
Baharul Islam Cdr Presentation Feb 2008Prof K M Baharul Islam
 
Strategies For Use Of Ict In Edn Ictes 2004
Strategies For Use Of Ict In Edn Ictes 2004Strategies For Use Of Ict In Edn Ictes 2004
Strategies For Use Of Ict In Edn Ictes 2004Prof K M Baharul Islam
 
Entreprenurship And Inct For African Women Aec 2009
Entreprenurship And Inct For African Women   Aec 2009Entreprenurship And Inct For African Women   Aec 2009
Entreprenurship And Inct For African Women Aec 2009Prof K M Baharul Islam
 

Mais de Prof K M Baharul Islam (12)

E Govt In Gambia Eac Ws Dr Islam
E Govt In Gambia  Eac Ws   Dr IslamE Govt In Gambia  Eac Ws   Dr Islam
E Govt In Gambia Eac Ws Dr Islam
 
Local Govt Presentation Dr Islam
Local Govt Presentation   Dr IslamLocal Govt Presentation   Dr Islam
Local Govt Presentation Dr Islam
 
Outer Circle In The Digital World Dr Islam
Outer Circle In The Digital World   Dr IslamOuter Circle In The Digital World   Dr Islam
Outer Circle In The Digital World Dr Islam
 
E Government Pilot Project Strategies For The Gambia
E Government Pilot Project  Strategies For The GambiaE Government Pilot Project  Strategies For The Gambia
E Government Pilot Project Strategies For The Gambia
 
Eac Regional E Govt Framework Presentation At Eac Ws 27 June 05
Eac Regional E Govt Framework   Presentation At Eac Ws 27 June 05Eac Regional E Govt Framework   Presentation At Eac Ws 27 June 05
Eac Regional E Govt Framework Presentation At Eac Ws 27 June 05
 
Baharul Islam Cdr Presentation Feb 2008
Baharul Islam   Cdr  Presentation Feb 2008Baharul Islam   Cdr  Presentation Feb 2008
Baharul Islam Cdr Presentation Feb 2008
 
Spafa Presentation B Islam Nov 2008
Spafa  Presentation  B Islam   Nov 2008Spafa  Presentation  B Islam   Nov 2008
Spafa Presentation B Islam Nov 2008
 
Baharul Icadla June09
Baharul   Icadla June09Baharul   Icadla June09
Baharul Icadla June09
 
Baharul Iim Idr 24 Mar 08
Baharul   Iim Idr 24 Mar 08Baharul   Iim Idr 24 Mar 08
Baharul Iim Idr 24 Mar 08
 
Baharul Lcd Addis 22 May 2008
Baharul   Lcd Addis 22 May 2008Baharul   Lcd Addis 22 May 2008
Baharul Lcd Addis 22 May 2008
 
Strategies For Use Of Ict In Edn Ictes 2004
Strategies For Use Of Ict In Edn Ictes 2004Strategies For Use Of Ict In Edn Ictes 2004
Strategies For Use Of Ict In Edn Ictes 2004
 
Entreprenurship And Inct For African Women Aec 2009
Entreprenurship And Inct For African Women   Aec 2009Entreprenurship And Inct For African Women   Aec 2009
Entreprenurship And Inct For African Women Aec 2009
 

Cyber Crime In Ne Conf 27 April 08