This Research project has aim of providing information on RTI acts in India.
The Right to Information (RTI) Act, of 2005 can be a valuable tool for obtaining information related to cyber crime in India, though with some limitations. Here's what you can potentially get through RTI: Information about specific cyber crime cases: ● You can file an RTI application with the relevant law enforcement agency (e.g., police station, cybercrime cell) to seek details about a specific cybercrime case, such as the nature of the crime, its status, and the action taken by the authorities. However, information that could compromise ongoing investigations or endanger witnesses might be withheld. General statistics and trends: ● You can request data on the number and types of cyber crimes reported in a particular area, the trends in cybercrime over time, and the conviction rates for cybercriminals. This information can help understand the cyber crime landscape and identify areas of concern. Policies and procedures: ● You can access information about the policies and procedures followed by law enforcement agencies in dealing with cybercrime. This includes details about complaint registration, investigation processes, and cyber forensics capabilities. Awareness initiatives: ● You can seek information about cyber awareness campaigns and initiatives undertaken by government agencies and other organizations. This can help you stay informed about the latest threats and how to protect yourself online. Limitations: ● Exemptions under RTI Act: Certain information related to cybercrime might be exempt from disclosure under the RTI Act, such as details that could jeopardize national security, ongoing investigations, or the identity of victims. ● Limited scope of RTI: RTI primarily deals with information held by government bodies. While law enforcement agencies fall under this category, private companies or individuals involved in cyber crime might not be subject to RTI requests. ● Incomplete data: Data on cyber crime might not always be comprehensive or readily available, especially in smaller jurisdictions. Tips for filing an RTI: ● Be specific and clear in your request. Mention the exact information you are seeking and the period for which you want the data. ● File your RTI application with the appropriate public authority. You can find contact information for different government agencies on the RTI online portal (https://rtionline.gov.in/). ● If your initial request is denied, you have the right to file an appeal with the higher authority. Remember, using RTI effectively requires patience and persistence. While it may not provide all the answers you seek, it can be a valuable tool for shedding light on cybercrime and holding authorities accountable.
Police Standard SOP: While there may be slight variations depending on specific regions and jurisdictions, police forces generally follow a standardized protocol for investigating cybercrimes. This Standard Operating Procedure (SOP) ensures consistent and effective investigation, upholds the chain of evidence, and strengthens the case for prosecution. Here's a breakdown of the typical SOP: Initial Response:
- First Information Report (FIR): Upon receiving a cybercrime complaint, a detailed FIR is registered, documenting the nature of the crime, date/time, and any available information about the suspect(s) or evidence.
- Scene Examination (if applicable): Depending on the type of crime, officers may examine the physical scene (e.g., victim's home/office) or the affected digital environment (e.g., compromised device) to gather initial evidence and understand the attack vector.
- Identification and Preservation: Potential digital evidence is identified (devices, storage media, online accounts) and preserved using forensically sound methods to prevent data alteration or loss. This often involves isolating devices, acquiring write-protected copies, and maintaining a chain of custody log. Investigation:
- Cyber Forensics: Specialized forensic units analyze the preserved evidence. This might involve data extraction, file system analysis, log examination, malware identification, and network traffic analysis to reconstruct the crime timeline, identify perpetrators, and uncover hidden information.
- Open-Source Investigation (OSINT): Publicly available information is gathered through social media, online records, and internet searches to corroborate evidence, track suspects' online activities, and identify potential leads.
- Witness Interviews: Statements are taken from victims, witnesses, and anyone with relevant information about the crime or the suspect(s).
- Legal Procedures: If necessary, law enforcement obtains warrants and takes legal action to seize additional evidence, search premises, or access online accounts. International cooperation might be required for cross-border investigations. Case Closure and Reporting:
- Analysis and Reporting: Forensic analysis results, witness statements, and other investigative findings are compiled into a comprehensive report summarizing the crime, evidence collected, investigative steps taken, and conclusions reached.
- Prosecution or Case Closure: Based on the investigation's outcome, the case may be forwarded to prosecution authorities for trial, or closed due to insufficient evidence or identification of suspects.
Additional Considerations: • Training: Law enforcement personnel involved in cybercrime investigations receive specialized training in digital forensics, cyber law, and online investigative techniques. • Technology: Advanced forensic tools and technologies are employed to analyze complex digital evidence effectively. • Collaboration: Collaboration between different law enforcement agencies, forensic units, and international partners is crucial for successful cybercrime investigations. Remember, this is a general overview, and specific procedures may vary based on individual cases and jurisdictional norms. It's always advisable to consult with legal professionals or law enforcement agencies for specific details and guidance related to cybercrime investigations.