Friday, September 29, 2006

//Dil Se Desi// Cyber Crime VS pornography

Hi Jeeya
 
You have sent two mails to me regarding this Dinesh Sharma episode. Below I am reproducing the questions raised by you through those mails. I am doing it in front of the entire group, as your questions are very pertinent and deserve to be answered in front of the entire group for their knowledge and indepth understanding of what actually constitutes cyber crime. At the end of my question vs. answer session, I have also reproduced your mails to me and the article on cyber crime which I had sent to the group first on 19/12/05 and on request resent it about 3 weeks back, on request of several members who wanted to know more about cyber crime. Point by point here are the answers to your queries.
 
1) i am surprised to note and happy u informed, i think same person was sending under different names, godial, and some lady sharma name too
i think he had many mails..
 
ANS. Yes thats true. In Nov. 05 I had banned his Dinesh Sharma ID alongwith Shobha sharma id, which was a fake female ID. At that time he had sent 5-6 mails appologising and had promised me that he will not send porno material again to any of the group members, very much like he is doing now. But he changed his new ID slightly and is back to the same pervertedness and mental deficiency.
 
2)tell me more about it.. that how to report to cyber crime police , and who can be reported for such crime.. this is for education..
 
ANS. My article below explains what all constitutes Cyber Crime. You can report it to the local Cyber Crime cell of your city police. Fortunately we have the SP of Cyber Crime Cell, Delhi with us in the group and we take his help to hammer such idiots.
 
3) and other groups who send porn material.. they are not banned.. there are many groups sending porno
 
ANS. Transmitting is the correct legal word instead of 'sending' porn material. On internet you dont send but TRANSMIT. My article below will clearly differentiate that. Those groups who are allowed to have porno stuff in their groups have to also follow certain laws and norms under International Cyber Crime Laws. For example take Yahoo Groups. If somebody wants to create an adult group like Bogelindah in Yahoo groups then there are many formalities to be followed. Like protection of minors accessing such groups, the yahoo profile of all the members should be there for display, showing their name, location, and age. AND ABOVE ALL IF THAT GROUP DOES NOT BIND ITSELF WITHIN YAHOO TERMS OF AGREEMENT (YTA) THEN YAHOO RESRVES THE RIGHT TO DELETE SUCH GROUPS FROM THE NET. Many such cases have already happened. A good example is an adult  Yahoo Group named 'Chudaai Ka Jadoo" . This yahoo groups crossed its limits by organising orgies across main metroes of India. Yahoo Customer Care deleted it forever.
Hence One has to abide by many International/National laws to run such adult groups. Adult groups cannot be source of commercial propaganda for prostitutes/pimps/call girls/porno sites/ adult groups and their owners & members. I know all these violations are occuring on the net. BUT THEN IT IS ALL AGAINST THE INTERNATIONAL CYBER CRIME LAWS.
 
OUT OF ALL THE INTERNET SERVICE PROVIDERS, I WOULD LIKE TO CONGRATULATE THE YAHOO INC. THE MOST FOR IMPLEMENTING SUCH STRINGENT CYBER LAWS. THEY ARE THE STRICTEST IN THIER TERMS OF AGREEMENT FOR FLOUTING SUCH ADULT GROUPS, AND HAVE A STRINGENT POLICING TEAM / POLICING TO MONITOR THAT IN THE YAHOOGROUPS. DONT BE SURPRISED IF YOU SEND SOME MAIL TO THE GROUP WHICH AROUSES RELIGIOUS PASSIONS/CASTEISM/RACISM/ PPORNOGRAPHY WITHOUT LICENSES ETC AND SOME PERSON CALLING HIMSELF AS YAHOO MODZ /YAHOO POLICE INTERCEPTS YOU AND TELLS YOU TO STOP THIS NONSENSE OR ELSE YOUR ID WOULD BE PERMANENTLY SUSPENDED.
 
4) individuals also such mails .. can they be reported?
pl enlighten me
 thx in advance
 
4) ANS. Surely such violaters can be reported to the local Cyber crime police and also the original service provider e.g. Yahoo, Hotmail, Gmail, AOL, Rediffmail, etc.
 
5) and also let me know rule that to forward such mail from bogel.. etc is also crime..
as we r list aware of this new rules..
and if i send this forward to my friends.. is it a crime?
then in such casees we have to be careful..
however i avoid, but yes in some mails
pl reply
 
ANS. forwarding / sending/ transmitting all such mails from any of the adult groups to your friends/enemies/relatives/unknown people is Cyber Crime, As you do it without proper licenses and permits and copyrights, and the necessary controls for the minors etc.
 
I hope I clear the doubts about Cyber Crime VS pornography to most of the members.
 
 
Luv & Regards
Rajesh Kainth
Owner DIL SE DESI GROUP

 
 
jeeya mehta <jeeya.mehta@gmail.com>
Mailed-By: gmail.com
To: Rajesh Kainth <rajeshkainth003@gmail.com>
Date: Sep 29, 2006 6:24 PM
Subject: Re: Dinesh Sharma id dinesh_s_05@yahoo.co.in.. Reported to Cyber Crime Police
Reply | Reply to all | Forward | Print | Add sender to Contacts list | Delete this message | Report phishing | Show original | Message text garbled?
rajesh,
i am surprised to note and happy u informed, i think same person was sending under different names, godial, and some lady sharma name too
i think he had many mails..
tell me more about it.. that how to report to cyber crime police , and who can be reported for such crime.. this is for education.. and other groups who send porn material.. they are not banned.. there are many groups sending porno and individuals also such mails .. can they be reported?
pl enlighten me
 thx in advance
From: jeeya mehta <jeeya.mehta@gmail.com> Mailed-By: gmail.com
To: Rajesh Kainth <rajeshkainth003@gmail.com>
Date: Sep 29, 2006 6:39 PM
Subject: Fwd: Fwd: [Bogelindah] SWEET FARM GIRL & HAIRY ALL
Images from this sender are always displayed. Don't display from now on.
Reply | Reply to all | Forward | Print | Add sender to Contacts list | Delete this message | Report phishing | Show original | Message text garbled?
rajesh,
u mean same person?
who writes under different name..
why he is not keeping his list undisclosed..
and also let me know rule that to forward such mail from bogel.. etc is also crime..
as we r list aware of this new rules..
and if i send this forward to my friends.. is it a crime?
then in such casees we have to be careful..
however i avoid, but yes in some mails
pl reply
From: Rajesh Kainth <rajeshkainth03@gmail.com> Mailed-By: returns.groups.yahoo.com
Date: Dec 19, 2005 7:01 PM
Subject: [dilsedesigroup] Cyber-crime: Next time you get that mail, be careful
Images from this sender are always displayed. Don't display from now on.
Reply | Reply to all | Forward | Print | Add sender to Contacts list | Delete this message | Report phishing | Show original | Message text garbled?
 
 
 
Cyber-crime: Next time you get that mail, be careful



What is cyber-crime ?
Any criminal activity that uses a computer either as an instrument, target or a means for perpetuating further crimes comes within the ambit of cyber crime. A generalised definition of cyber crime may be "unlawful acts, wherein the computer is either a tool or target or both".
   The computer may be used as a tool in the following kinds of activity — financial crimes, sale of illegal articles, pornography, online gambling, intellectual property crime, email spoofing, forgery, cyber defamation, harassment, cyber stalking (following a person's movement through the Internet).
   The computer may, however, be target for unlawful acts in the following cases — unauthorised access to the computer, computer system, computer networks, theft of information contained in the electronic form, email bombing, Trojan attacks, Internet time thefts, theft of computer system, physically damaging the computer system.
   Cyber crimes could be directed against individuals (in person or property), organisations (government or firms) or the society at large.
What is cyber-terrorism?
    Cyber-terrorism is the convergence of terrorism and cyberspace. It is generally understood to mean unlawful attacks and threats of at tack against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in the furtherance of political or social objectives.
   Further, to qualify as cyber terrorism, an attack should result in violence against persons or property, or at least cause enough harm to generate fear. Serious attacks against critical infrastructure could be acts of cyber terrorism, depending on their impact. Attacks that disrupt non-essential services or that are mainly a costly nuisance would not.
How is an email traced?
    Emails are one of the most common tools to carry out a crime. In the recent Parliament bomb scare, an email was used to convey the threat. So, email tracking is one of the most common duties of cyber crime investigators. The investigator needs to look at each point through which the email passed, working step by step back to the originating computer, and, eventu ally, the perpetrator. Forensic email tracing relies on computer logs. A computer log is a record of each email message that passes through a computer in a network and provides an audit trail of every machine an e-mail has passed through.
   Any computer on a network has an Internet protocol address (the virtual equivalent of a street address). For evidence purposes, an investigator needs to prove that a certain email originating address travelled through a machine by verifying the message ID on a log of email transactions together with the date and time the address was recorded.
   If an email is not faked, it becomes a matter of determining who used the machine at the time the suspect message was sent.
   More sophisticated suspects will fake their emails, however. There are several ways of faking email, which include spoofing, remailing, relaying, spamming, stealing, and bogus accounts. Some of these use email programmes that strip the message header from the message before delivering it to the recipient or bury the message header within the email programme.
   In other cases, the "from" line in a message header is faked. Other offenders steal someone else's email account or set one up temporarily using bogus address information when they registered. Once the physical presence of the perpetrator's PC has been located, it is confiscated, and the forensic analyst makes exact copies (called image copies) of the computer's hard drives. The forensic analyst looks for file fragments or portions of any emails that contain specific refer ences to the offending message.
Why is email tracing becoming more difficult?
    There are worrisome trends that suggest email tracing will become more difficult in the future. For example, some new products coming on the market strip email headers, encrypt the message, and then destroy it after a period of time. Al-Qaida terrorists were found to be resorting to using the "dead letter box" system: someone creates an email account, gives the password to several members of a group and communicates by saving messages in a draft messages folder without sending them.
   Communication by this method cannot be monitored because government systems for tracking emails work only if someone sends an email.
   Smart programmers are always looking for ways to get around the audit trail, and investigators always seem to be playing catch-up when tracing email. However, email tracing is likely to remain an essential part of computer forensics.

 


__._,_.___

***NEW: DESI TALK!! The Shout box in the group home page***
Comments, suggestions or just plain chatting... you can do it right here!
Homepage: http://groups.yahoo.com/group/dilsedesigroup

***DIL SE DESI GROUP***
You can join the group by clicking the below link or by copying and pasting it in the browser bar and then pressing 'Enter'.

http://groups.yahoo.com/group/dilsedesigroup/join

OWNER/MODERATOR : rajeshkainth003@gmail.com; {Rajesh Kainth}     
MODERATOR       : a.amitkumar13@gmail.com; {Amit Kumar}           
MODERATOR       : manisha.hatkar@gmail.com; {Manisha Hatkar}     
MODERATOR       : preeti.hande@gmail.com; {Preeti Hande}           
MODERATOR       : immortally69@yahoo.com {Rahul Joshi}           
MODERATOR       : kaustubh.basu@gmail.com {Kaustubhshobhan Basu}
MODERATOR      : planetofprince@yahoo.com (Prem)
MODERATOR       : abhijeet-bhurke@bridgestone.co.in (Abhijeet)

To modify your list subscription, please send a blank email to:           

SUBSCRIBE            :  dilsedesigroup-subscribe@yahoogroups.com      
UNSUBSCRIBE            :  dilsedesigroup-unsubscribe@yahoogroups.com      
INDIVIDUAL MAILS      :  dilsedesigroup-normal@yahoogroups.com           
DAILY DIGEST            :  dilsedesigroup-digest@yahoogroups.com           
VACATION HOLD            :  dilsedesigroup-nomail@yahoogroups.com     
FOR POSTING MESSAGES  :  dilsedesigroup@yahoogroups.com





SPONSORED LINKS
Desi arnaz

Your email settings: Individual Email|Traditional
Change settings via the Web (Yahoo! ID required)
Change settings via email: Switch delivery to Daily Digest | Switch to Fully Featured
Visit Your Group | Yahoo! Groups Terms of Use | Unsubscribe

__,_._,___