Cyber Crime is the latest and perhaps the most complicated problem in the cyber world. Computer crime can broadly be defined as criminal activity involving an information technology infrastructure, including illegal or unauthorized access, illegal interception, data interference, unauthorized damaging, deletion, deterioration, alteration or suppression of computer data, systems interference i.e. interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data, misuse of devices, forgery (ID theft), and electronic fraud, etc. The cyber criminals constitute of various groups or categories. They may be the children and adolescents between the age group of 6-18 years, organized hackers, Professional hackers or crackers, discontented employees, competitors, etc.

In most of the Cyber Crimes, computer may be used as a tool in the activities like financial crimes, sale of illegal articles, pornography, online gambling, intellectual property crime, e-mail spoofing, forgery, cyber defamation, cyber stalking. The computer may however be target for unlawful acts in the cases like unauthorized access to computer/ computer system/ computer networks, theft of information contained in the electronic form, e-mail bombing, data dialing, salami attacks, logic bombs, Trojan attacks, internet time thefts, web jacking, theft of computer system, physically damaging the computer system, etc.

Computers are vulnerable so rule of law is required to protect of safeguard them against cyber crime. The reasons for the vulnerability of computers may be: Capacity to store data in comparatively small space, Easy to access, Complex, Negligence, Loss of evidence. Cyber Crime are generally classified into three groups; Against Individuals, Against Organization, and Against Society at large. A technical advisor and network security consultant has constitutes a 5P mantra for prevention of Cyber Crime or online security: Precaution, Prevention, Protection, Preservation and Perseverance.

Role of a Cyber Crime Investigator

Cyber forensic is an investigative branch of forensic science, A Cyber Crime Investigation has to discover, analyze and reconstruct the evidence from computer systems, networks, storage media and peripherals to solve the crime and facilitate administration of criminal justice. The investigators of cyber crime has to have professional knowledge and necessary expertise in computers and programming logic. The seizer and collection of evidence must fully meet the requirement of law for successful prosecution of offender. The evidence related to computer crime may be found in the computer memory, storage media or printouts. It may involve imaging of storage media, recovering of deleted files, searching for slack and free space. In a network system the information which is transient in nature and is distributed over a large geographical area, makes, location of evidence and identity of culprit a much more difficult task. The ready availability of IP (Internet Protocol) address of computer users, the domain name etc. can help the investigator to nab the culprit at the earliest.


ALFA has a team of highly skilled cyber crime investigators who have proved their expertise in many cases related to Cyber Crime at various places. They also have given experts opinions on many cases like; Deleted File Recovery, Deleted Partition Recovery, E-Mail Tracing, IP Tracking, Audio/video authentication, software piracy detection, child pornography detection, Web Security, Speaker Identification, Tape authentication, Secure Web Designing, e-Discovery, e-Documents and Document Security, Evidence Preservation Expert Opinions, Consultancy, Virus Dissemination, Software Piracy, IRC Crime, Credit Card Fraud, Net Extortion, Encryption, Cyber Security, Network Security, Business Security Solutions, Financial Security, e-Commerce Security, Bank fraud, Identity theft, Extortion, Evidence Recovery, Data Recovery, Online Security, Data Protection, Information Security, Evidence Collection, Phishing, cyber terrorism, Obscene or offensive content, Harassment, Drug Trafficking, Documented cases, Transmitted virus or worms, Computer vandalism, Cyber stalking, Harassment via e-mails, E mail spoofing, unauthorized control/ access over computer systems, Web jacking, Internet time theft, Trojan attacks, Logic bombs, Virus or worm attacks, Denial of service attacks, Salami attacks, Data diddling, Email bombing, Theft of information in electronic form, Networks hacking, etc.