Overview & Timeline of Activities

As technologies become ever more sophisticated, so does the modus operandi of criminals, who are increasingly using Information and Communication Technologies (ICTs) to carry out such illegal activities. The issue of cybercrimes has emerged as a big challenge for Law Enforcement Agencies (LEAs) around the world and India is no exception.

Committed to combating cybercrimes and capacity building, DSCI continues to train Law Enforcement Agencies (LEAs) on cyber forensics to help them in cybercrime investigation, through its Cyber Labs initiative, with sustained support of the industry.

The Cybercrime and Cyber Forensics Training Facilities (“Cyber Labs) are operational in Mumbai, Pune, Bengaluru, Kolkata, Chennai, Hyderabad and Madhuban, are located in police premises and engaged in sensitizing the Law Enforcement Agencies on cybercrime investigations and handling of digital evidence. These are done through standard course curriculum and resource materials developed by DSCI with the active involvement of subject matter experts from law enforcement, prosecution, judiciary and IT industry. These labs provide a platform where various stakeholders from the law enforcement, industry and academia come together in creating awareness and developing methods to effectively tackle cybercrimes. Besides training in the cyber forensics, DSCI is also provides technical guidance (advisory) to assist investigation.

  • Timeline of activities
  • Whitepapers and position papers
    • Cyber Crimes - Where it is going?

      Cybercrimes are today more organized and make use of common exploits which are easily available over the internet. Cyber attacks are now moving away from server side to client side attacks. Since, most of internet users are not aware of the kind of attacks that can be mounted on their systems, they are most vulnerable. According to Cisco Security Intelligence Operations, one in every 600 PDF files downloaded from the web contains malicious software. In this paper, we have tried to showcase how a commonly known PDF vulnerability can be exploited to implant malwares and used to compromise a machine and the network, where it resides.