Friday, December 27, 2019
Cyber Crime Through Social Media - 1516 Words
  Introduction  Cybercrime is a quickly developing range of crime. More criminals are abusing the rate, accommodation and obscurity of the Internet to perpetrate a different scope of criminal exercises that know no borders, either physical or virtual, cause genuine damage and posture real dangers to victims around the world.    Case details  Case - Hosting Obscene Profiles  Country - India   State - Tamil nadu   City - Chennai  Section of laws - 67 of Information Technology Act 2000, 469, 509 of the Indian Panel code  Business:  Cyber Crime through social media  Business Function: false account of girl  Business process: harassment   Issues: insulting by fake id and wrong details  67 of Information Technology Act 2000: - Punishment for publishing orâ⬠¦show more contentâ⬠¦The case was documented in February 2004 and in a short time period around seven months from the recording of the FIR, the Chennai Cyber Crime Cell accomplished the conviction. In the case, a lady complained to the police around a man who was sending her vulgar, defamatory and irritating messages in a Yahoo message group. The denounced additionally sent messages got in a fake record opened by him in the casualty s name. The complainant expressed that some obscure individual had made an email ID using her name and had used this ID to post messages on five Web pages depicting her as a call girl alongside her contact numbers. As a result, she got wrong calls from men. The victim also received phone calls by people who believed she was soliciting for sex work.    Investigation  In view of a complaint made by the victim in February 2004, the Police followed the accused in Mumbai and captured him within the few days. The blamed was a known family friend of lady and wants to marry her. She married to someone else. This marriage later finished in separation and the accused began reaching her again. On her rejection to marry him, the accused took up the harassment through the Internet for taking revenge.   Investigation   After the complainant found out about the Web pages with her contact information, she made a username to get to and see these pages. using the    
Subscribe to:
Post Comments (Atom)
 
 
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.