Google India may face Multiple Criminal Defamation cases in India for all cases arising before 2009, Other websites also can face the same fate if courts with jurisdiction agree for delay condoning.
Tuesday, December 10, 2019
Wednesday, December 4, 2019
Saturday, November 30, 2019
Order Copy For Downloading Below
State of Maharashtra Versus Ogeuri Emmanual Chinaso & ors
Friday, November 29, 2019
Memory card is a Document and Pen drive is a document
Gopalkrishnan @ Dileep v. State of Kerala, Crl.A. No. 1794 of 2019 SC November 29, 2019
Gopalkrishnan @ Dileep v. State of Kerala, Crl.A. No. 1794 of 2019 SC November 29, 2019
Saturday, November 2, 2019
Tuesday, October 15, 2019
In theory, An ultrasonic fingerprint sensor works by bouncing a sonic pulse wave off of your fingertip to create a three-dimensional image. It's much more secure than optical in-display sensors and will work even if your fingers are greasy, dirty, or wet.
Sunday, October 13, 2019
By Prashant Mali
Case No. 1 : Positive order
BSNL Bengaluru and the Union Bank of India have been ordered to pay Rs 9.6 lakh to a businessman after fraudsters siphoned off money from his bank account in what was described as a sim swap fraud. The national telecom provider was pulled up for issuing a duplicate sim to fraudsters without adhering to Know Your Customer (KYC) norms and the bank for not alerting the customer on time. Nagarathpet resident Ramesh Kumar has been using a mobile phone with a BSNL sim card for many years and had linked it to his account at Union Bank of India’s BVK Iyengar Road branch. On September 22, 2015, Kumar checked his email to find that an unknown beneficiary had been added to his online bank account. By the time he could alert bank authorities about the breach, the fraudsters managed to transfer Rs 9,62,700 from his account. The sim card on his cellphone that was supposed to receive a one-time password (OTP) mysteriously remained de-activated all the while. The 52-year-old businessman lodged a complaint with his bank branch and the cybercrime wing of Bengaluru police only to realise he had fallen prey to a sim swap fraud.
With neither the Union Bank of India nor BSNL acting towards compensating his loss for months, Kumar approached the Bangalore urban 2nd additional district consumer disputes redressal forum on May 5, 2016 to reclaim his money. The consumer forum heard the case in which BSNL and Union Bank of India blamed each other for facilitating the fraud. BSNL claimed it is only a service provider and wasn’t aware that Kumar had linked his cellphone number to his bank account, and that it was the bank’s responsibility to notify him immediately when there was a fraudulent attempt. The bank argued that a BSNL customer centre executive in KG Road was at fault for issuing a duplicate sim card to a fraudster who pretended to be Kumar, deactivated his existing sim card and obtained a replacement.
After 31 months of hearing, the court blasted BSNL and Union Bank of India for the loss their customer suffered. The judges pointed to the BSNL staffer’s carelessness in issuing a duplicate sim and deactivating Kumar’s original sim. They criticised Union Bank of India authorities for not immediately alerting the customer on the illegal addition of a beneficiary, which he came to know through an official email. In a verdict pronounced last month,
the forum ordered BSNL Bengaluru telecom district and Union Bank of India, BVK Iyengar Road branch, to jointly refund Rs 9,62,700 to Kumar with interest and an additional Rs 10,000 towards his court expenses within 45 days. What is it Fraudsters, armed with confidential bank details of customers, deactivate sim cards linked to bank accounts by impersonating the victims and submitting fake documents with cellphone service providers and obtaining duplicate sims. The original sims on the victims’ phones get deactivated in the process. The active duplicate sims with the fraudsters receive OTPs and other bank communications, enabling illegal online transfers of large sums of money, while the victims remain clueless.
Lawyer, Bombay High Court
+919821763157 | email@example.com
Friday, October 4, 2019
By Prashant Mali
1. SIM SWAP FRAUD explained in HINDI Language on ABP News, Youtube Video
2. SIM SWAP Fraud Explained in MARATHI Language on ABP Majha News, Youtube Video
3. How to Protect yourself from SIM Swap Fraud Express Computer News
Cyber Lawyer, Bombay High Court
Author, Speaker & Thought Leader.
+919821763157 | firstname.lastname@example.org
Tuesday, September 24, 2019
Collecting key logs and browser histories
Monday, September 23, 2019
Internet Access is a fundamental Right held by
Kerala High Court.
i.e. that the right to have access to the #Internet is part of the right to education as well as the right to privacy under Article 21 of the Indian Constitution .The verdict came on a petition filed by a Kozhikode college student challenging her expulsion for not adhering to restrictions on the use of mobile phone
Justice P.V. Asha made the observation while ordering the Principal of Sree Narayanaguru College, Kozhikode, to re-admit a student who had been expelled from the college hostel for using her mobile phone beyond the restricted hours.
The court observed, “When the Human Rights Council of the United Nations has found that the right of access to Internet is a fundamental freedom and a tool to ensure right to education, a rule or instruction which impairs the said right of the students cannot be permitted to stand in the eye of law.”The verdict came on a petition filed by Faheema Shirin, a third-semester B.A. English student of the college at Chelanur, challenging her expulsion for not adhering to restrictions on the use of mobile phone. As per the rules of the girls’ hostel, inmates were restrained from using mobile phones from 6 p.m. to 10 p.m. every day. She, along with a few other inmates, had protested against the restriction, as it was hampering their learning process.
Monday, September 2, 2019
May 2019, the Israel Defense Forces (IDF) launched a physical attack on Hamas in immediate response to an alleged cyber-assault. The IDF hit a building in the Gaza Strip with an airstrike after claiming the site had been used by Hamas cyber operatives to attack Israel’s cyber space. It came amid days of intense fighting between the IDF and terror groups in the Gaza Strip.
The IDF claimed it stopped the attack online before launching its airstrike on Hamas. It claims it has now wiped out Hamas’ cyber operational capabilities.
Israel Defense Forces said via Twitter: “We thwarted an attempted Hamas cyber offensive against Israeli targets. Following our successful cyber defensive operation, we targeted a building where the Hamas cyber operatives work. HamasCyberHQ.exe has been removed.”
It could mark a change in modern cyber warfare tactics, given that it is the first time a cyber-attack has been met with immediate physical retaliation in real-time during active conflict. However, allegedly the US is still the first country to respond to cyber-attacks with military force. In 2015, USA launched a drone strike to kill the British national in charge of ISIL’s hacker groups Junaid Hussain. Hussain had also dumped personal details of US military forces online.
This 2019 attack is different to the 2015 US retaliation: The IDF apparently reacted immediately, rather than planning its response over weeks or months.
Operations in cyber space are not governed by the rules of warfare. However, the Geneva protocols and international law do cover a response occurring in the physical domain. There have been attempts to bring in rules for cyber warfare with the Tallinn Manual on the International Law applicable to Cyber Warfare, but this has not been ratified or adopted by any nation or multinational organization.
Saturday, August 24, 2019
First Space #cybercrime of #identitytheft in ISS
Nasa is investigating a claim that an astronaut Ms. Anne McClain the first Lady astronaut has allegedly accessed the bank account of her estranged husband from the International Space Station.
Accused has acknowledged the crime but denied any wrongdoing When her husband Mr Summer Worden, had filed a complaint with the Federal Trade Commission FTC. Lady astronaut has since returned to Earth.
The astronaut claims, she was merely making sure that the family's finances were in order and there was enough money to pay bills and care for Ms Worden's son - who they had been raising together prior to the divorce in 2018
How does the law work in space?
Thursday, August 22, 2019
One Vikas Kumar from Patna was Convicted in #cybercrime for 2 years with Rs. 5,000/- fine for operating fake #Patanjali Website & promising distributorship in lieu of ₹3 Lacks by Ahmednagar Court in Maharashtra.
FIR was Registered under S66D of the IT Act,2000 & S420 of IPC
1. District - Ahmednagar
2. Police Station - Cyber Police Station
3. C.R.No. 02/2017, IPC Sections 419, 420,467, 468 IT Act Section 66C
4. Name of Accused - Vikas Kumar, r/o Nalanda, Bihar.
5. Facts of the case - Accused in the said case had allegedly offered Distributorship through a fake website of Patanjali and thereby duped the Complainant to the tune of Rs. 3 Lacs.
Proceedings of the said case were conducted before the Court of Chief Magistrate, Ahmednagar .
Almost everyone knows someone has been a Victim. But, there's still an attitude that somehow it always happens to the other guy. But, what if you are the other guy?
All across India, the fastest growing Cyber Crime in the nation has been identified as Identity Theft- and its affecting each one of us in insidious ways.
We have all heard of the problem, but only few have recognized the theft of the identity can be so devastating.
Types of identity theft
1. Criminal identity theft
2. Financial identity theft
3. Identity cloning and concealment
Identity Theft as a term refers to Fraud that involves stealing money or getting other benefits by pretending to be someone else. The term is relatively new and is actually a misnomer, since it is not inherently possible to steal an identity, only to use it. The person whose identity is used can suffer various consequences when they are held responsible for the perpetrator's actions.
Section 66C of the IT Act,2000 :
Punishment for identity theft.- Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine.
Sunday, April 7, 2019
What does Google know about YOU?
Did you know that unlike searching , when you search on Google, they ? That means they know every search you’ve ever done on Google. That alone is pretty scary, but it’s just the shallow end of the that they try to collect on people.
What most people don’t realize is that even if you don’t use any Google products directly, they’re still trying to track as much as they can about you. Google trackers have been found on . This means they're also trying to track most everywhere you go on the internet, trying to slurp up your browsing history!
Most people also don’t know that Google runs most of the ads you see across the internet and in apps – you know those ones that follow you around everywhere? Yup, that’s Google, too. They aren’t really a search company anymore – they’re a tracking company. They are tracking as much as they can for these annoying and intrusive ads, including recording every time you see them, where you saw them, if you clicked on them, etc.
But even that’s not all…
If You Use Google Products
If you do use Google products, they try to track even more. In addition to tracking everything you’ve ever searched for on Google (e.g. “weird rash”), Google also tracks every video you’ve ever watched on YouTube. Many people actually don’t know that ; now you know.
And if you use Android (yeah, Google owns that too), then Google is also usually tracking:
Every place you’ve been via Google Location Services.
How often you use your apps, when you use them, where you use them, and whom you use them to interact with. (This is just excessive by any measure.)
All of your text messages, which unlike on iOS, .
Your photos .
If you use Gmail, they of course also have all your e-mail messages. If you use Google Calendar, they know all your schedule. There’s a pattern here: For all Google products (Hangouts, Music, Drive, etc.), you can expect the same level of tracking: that is, pretty much anything they can track, they will.
Oh, and if you use Google Home, they also store a live recording of every command you’ve (or anyone else) has ever said to your device! Yes, you heard that right (err… they heard it) – you can check out all the recordings .
Essentially, if you allow them to, they’ll track pretty close to, well, everything you do on the Internet. In fact, even if you tell them to stop tracking you, Google has been known to not really listen, for example with .
You Become the Product
Why does Google want all of your information anyway? Simple: as stated, Google isn’t a search company anymore, they’re a tracking company. All of these data points allow Google to build a pretty robust profile about you. In some ways, by keeping such close tabs on everything you do, they, at least in some ways, may know you better than you know yourself.
It is alleged that Google also listens to you when the mobile is near you through its App using its ambient noise technology.
And Google uses your personal profile to sell ads, not only on their search engine, but also on over three million other websites and apps. Every time you visit one of these sites or apps, Google is following you around with hyper-targeted ads.
It’s exploitative. By allowing Google to collect all this info, you are allowing hundreds of thousands of advertisers to bid on serving you ads based on your sensitive personal data. Everyone involved is profiting from your information, except you. You are the product.
It doesn’t have to be this way. It is entirely possible for a web-based business to be profitable without making you the product – since 2014, has been profitable without storing or sharing any personal information on people at all. You can read more about our business model .
The Myth of “Nothing to Hide”
Some may argue that they have “nothing to hide,” so they are not concerned with the amount of information Google has collected and stored on them, but that argument is fundamentally flawed .
Everyone has information they want to keep private: Do you close the door when you go to the bathroom? Privacy is about control over your personal information. You don’t want it in the hands of everyone, and certainly don’t want people profiting on it without your consent or participation.
In addition, privacy is essential to democratic institutions like voting and everyday situations such as getting medical care and performing financial transactions. Without it, there can be significant harms.
On an individual level, lack of privacy leads to putting you into a , getting manipulated by ads, , fraud, and identity theft. On a societal level, it can lead to deepened polarization and societal manipulation like we’ve unfortunately been seeing multiply in recent years.
You Can Live Google Free
Basically, Google tries to track too much. It’s creepy and simply just more information than one company should have on anyone.
Thankfully, there are many good ways to reduce your Google footprint, even close to zero! If you are ready to live without Google, for services to replace their suite of products, as well as instructions for . It might feel like you are trapped in the Google-verse, but it is possible to break free.
For starters, just switching the search engine for all your searches goes a long way. After all, you share your most intimate questions with your search engine; at the very least, shouldn’t those be kept private? If you switch to the you will not only make your searches anonymous, but also block Google’s most widespread and invasive trackers as you navigate the web.
If you’re unfamiliar with DuckDuckGo, they are an Internet privacy company that empowers you to seamlessly take control of your personal information online, without any tradeoffs. DuckDuckGo is a search engine alternative to Google at , and offer a to protect you from Google, Facebook and other trackers, no matter where you go on the Internet.
#privacy #dataprotection #cyber #searchengine
Navy man gets 2 years Jail for Child Pornography, cyber crime in India : Cyber crime conviction By Prashant Mali In the case of D...
OTP SMS Bombing : A new type of revenge cyber crime technique by people who just get sadist pleasure. Victim‘s Mobile Phone will start get...
IT Act is a Special Act: case laws Sharat Babu Digumarti Vs . Govt. of NCT of Delhi. MANU /SC/1592/2016. Gagan Harsh Sharma and Or...
1st November 2019 the legal seed of Balkanisation of Internet is sowed, a controversial new law took effect in Russia: The so-called "s...