Publications

Our publications such as the Cybercrime Training Material Level-I released in 2011, Handbook on Cybercrime Investigation Procedures, in 2013 and the Cybercrime Training Material Level-II now, have played an integral role in guiding cybercrime investigations.

  • Cybercrime Investigation Manual (2011):
    To standardize the operating procedures for cybercrime investigation, DSCI has prepared Cyber Crime Investigation Manual which is based on its experience of operating the Cyber Labs and working with the police in handling many of the cybercrimes over the last few years. The manual aims to bring a uniform and scientific approach in investigating these crimes and bringing them to the court of law. The manual covers a comprehensive list of Cybercrime topics including procedures for pre-investigation, evidence collection, and handling evidence. It will be a valuable resource in any field investigation, as it provides clear guidance to investigating officers on the procedures to be followed at crime scenes where digital media is involved.
  • Cybercrime Training Material Level I (2011):
  • Pocket Handbook on Cybercrime Investigation (2013):
  • Cyber Forensics - Meeting the Challenges of Cybercrimes (2013):
  • Cybercrime Training Material Level II (2015):
    The training material is created as a standardized curriculum to train police officers in a five day program through DSCI Cyber Labs. The curriculum focuses on the latest developments in technological and legal aspects of cybercrime investigation. The resource material will take police officers through theoretical aspects which include appreciation of cyber forensics tools and technologies used in investigations.
  • FAQs on Information Technology Act 2008:
    The IT (Amendment) Act, 2008 (ITAA 2008) has established a strong data protection regime in India. The Act provides for security of critical infrastructure, by terming such cyber attacks as cyber terrorism; and for establishing a national encryption policy for data security. ITAA 2008 thus enhances trustworthiness of cyberspace.