Professional Documents
Culture Documents
technology is encountered.
Computer forgery.
programs.
Spamming
Cyber terrorism
Unauthorized access to computer systems and service.
programs .
Harassment.
Drug trafficking.
Theft, Piracy
Illegal Goods and Services
Conspiracy
Harassment
Vandalism, Destruction of Property
Interpersonal/Social Violence
Lack of understanding
Complexity of case
Juveniles
Multinational activity
No international laws for computer crimes
Complexity
Networked attacks hard to trace
The role in combating cyber crime is essentially
two-fold:
Earlier – 5 years
Now- Reduced to 3 years
digital secrets.
Corporate India.