About

Message from the Commissioner of Police

It is a great pleasure to welcome you to this portal of Kolkata Police.

Computer and Internet-Related Crime

There are no precise, reliable statistics on the amount of computer crime and the economic loss to victims, partly because many of these crimes are apparently not detected by victims, many of these crimes are never reported to authorities, and partly because the losses are often difficult to calculate.
Internet fraud takes many forms. The Internet's promise of substantial consumer benefits is coupled with the potential for fraud and deception. Fraud operators are opportunists who are among the first to appreciate the potential of a new technology. There is nothing new about Internet fraud, however, the size and potential market, relative ease, low cost, and speed with which a scam can be perpetrated has increased tremendously.
Nevertheless, in this section we have posted some Tips for Avoiding Computer Crime, which includes suggestions for increasing the security and reliability of personal computers, as well as protection against cyber crime.

Causes of Computer Crime

  • * Sharing Identification numbers and passwords
  • * Unauthorised access from remote location (hacking)
  • * Unauthorised access by non-authorised employee
  • * Security system by-passed
  • * Poor physical security
  • * Poor system security
  • * Abuse of legitimate access
  • * Viruses etc or other willful damage by disgruntled employee or competitor
  • * Appropriate computer security changes not done when employees with access leave or are transfered.
  • * Data files and listings not held under proper security

Recommended Prevention Measures

  • Develop and Implement appropriate system failure procedures
  • Shred computer listings after use
  • Do not share Identification numbers and passwords
  • Change passwords regularly
  • Regularly monitor usage of dial-up facilities.
  • Implement a system of controlling employees with access to data.
  • Physical security of equipment and diskettes.

Hacking, Computerised Fraud And Other Computer Crimes

A "hacker" is a dedicated programming expert who believes in sharing his expertise and experiences with other hackers. A hacker does not believe in vandalizing or maliciously destroying data, or in stealing data of any kind. He may find your credit card number stored there from buying online, or use the information gleaned from your computer to use your ISP account for illegal activity, like distributing child pornography


How can I stop hackers from gaining access to my computer?

  • * Only download or accept files from reliable sources.
  • * Use a firewall to block unauthorized access to your computer.
  • * Install a good virus scanner program and update virus information files at least weekly
  • * Do not keep passwords, bank or financial account numbers, or other personal and confidential information on your computer's hard drive. Store this type of information on removable disks (floppies or zip disks).

The Hijack

It is a relatively new form of fraud unique to the Internet. Consumers are prompted to download a purported "viewer program" to see computer images for free. Once downloaded, the consumer's computer is "hijacked" by the viewer program, which turns off the consumer's modem speakers, disconnects the computer from the local Internet provider, dials an international number and connects the consumer to a remote site. The expensive international costs are charged to the consumer's telephone bill until the telephone is turned off.

Child Safety

  • * Place the computer in a centrally located area in your home - not in a child's bedroom. This prevents "secret" communications or access and also allows all members of the family to use it.
  • * Talk to your children about the Internet. Explain that it is an excellent source of information, but some sites are inappropriate and they are expected to stay away from these sites.
  • * Establish time frames for Internet access. This will encourage your children to obtain information in a timely manner and discourage aimless wandering.
  • * Keep an open line of communication with your children.
  • * Discuss their Internet experiences and guide them to sites that are age-appropriate.
  • * Consider using software that can block or filter Internet sites or certain words that may indicate inappropriate sites.
  • * In a chat room never give out any personal information including: name, address, city, state, school attended, telephone number, family names or other personal family information.
  • * Never respond to someone who wants to meet in person or send photographs. Instruct your children to exit the chat room and notify you immediately if this happens.
  • * Most importantly, if your child visits a particular chat room, spend at least five or ten minutes monitoring the conversation to see if it is appropriate.
  • * Consider purchasing computer software products that can help you monitor and control your child's access to the Internet.
  • * Monitor your children's Internet activity by checking all of the sites visited.

Viruses

Simply stated, a virus, Trojan or worm is a small program written to cause harm to one or more computers or networks. A Virus, Worm or Trojan can also be designed to retrieve information from your computer to be delivered to an attacker for future use. For example credit card information, passwords, and security access codes.

If You Have Any Of The Following Symptoms, Your Computer May Be Infected

  • * Does your computer suddenly take longer to start up?
  • * Do program sizes keep changing?
  • * Do you keep running out of disk space?
  • * Do you keep getting 32 bit error messages?
  • * Your computer won't boot up.
  • * File names are strange or keep changing.
  • * You can't access your hard drive without booting from a floppy startup disk.
  • * Your computers CMOS settings keep changing - and you have a new CMOS battery.
  • * Your computer is sending out emails that you didn't write.
  • * Strange unexplained things are happening with your computer; e.g. the CD ROM opens and closes when no one is using the computer.
  • * Monitor your children's Internet activity by checking all of the sites visited.

How can I protect my computer against future infections?

Install and configure a good anti-virus program on your computer. Keep the virus definition files up to date. Anti-virus software programs can be configured to automatically check for new dat files (virus definitions) and your anti-virus program should be setup to do this at least weekly. Your anti-virus program should be configured to scan email, all files and folders, boot sectors and all removable disks (floppy and zip disks). If you receive an attachment or file via email, IRC, ICQ or removable disk, that attachment should be scanned for viruses before opening it.

Tips to keep you safe online

  • * Never send money to an unsolicited e-mail or a posting you spotted on the Web.
  • * Never agree to a meeting with someone who has posted a fabulous offer. In-person meetings give the con artist a chance to turn on high-pressure sales tactics or even rob you.
  • * If you are setting up an online identity for e-mail, be very vague. Do not give out personal information in a profile.
  • * Contact your ISP or local law enforcement if you receive suspicious or threatening e-mail.
  • * Be alert for any responses to e-mail that you don't believe you have sent.
  • * Be alert to e-mail bearing a return address you recognize, but with content that does not match the personality of the sender.
  • * Look carefully at message headers for discrepancies between sender and provider.
  • * Acquire and use encryption software if you send e-mail containing confidential or sensitive information.
  • * Web sites whose purposes are to commit fraud appear and disappear quickly, making it difficult for them to be tracked. If you find a suspicious Web site, print the screen and any correspondence. Present this information when filing a complaint with your ISP or Kolkata Police.

Consumer Fraud

It's not always easy to spot con artists. They're smart, extremely persuasive, and aggressive. They invade your home by telephone and mail, advertise in well-known newspapers and magazines, and come to your door.
Most people think they're too smart to fall for a scam. But con artists rob all kinds of people - from investment counselors and doctors to teenagers and elderly widows - of crores of rupees every year.
Just remember... if it sounds too good to be true, it probably is.

If Someone Rips You Off

  • * Report con games to the police, your city or state consumer protection office, or a consumer advocacy group.
  • * Don't feel foolish. Reporting is vital. Very few frauds are reported, which leaves the con artists free to rob other people of their money - and their trust.

Buying online

  • * Make sure your web-browser is set to the highest level of security notification and monitoring. These options are not always automatically activated when your computer is set-up, so check your manual or the "Help" option.
  • * Check whether you are using a recent version of your web-browser as they often include better security features - up-to-date versions can be downloaded free from the Microsoft or Netscape websites.
  • * Before purchasing from a website, make a record of the retailer's contact details, including the street address and landline phone number. If these details are not available on the website, consider going elsewhere to buy, do not rely on the e-mail address alone.
  • * Do not enter personal details unless the security icon is displayed (this is a small padlock that normally appears at the bottom of your browser when you begin your transaction over the Internet). You can click on the padlock to see if the retailer has an encryption certificate. This should explain the type and extent of security and encryption it uses. Only use companies that have an encryption certificate and use secure transaction technology. The address of the page where you enter personal details should also start with https://.
  • * If you have any queries or concerns, telephone the company before giving them your card details to reassure yourself that it is legitimate.
  • * Print out your order and consider keeping copies of the retailer's terms and conditions and returns policy. Be aware that there may well be additional charges such as postage and taxes. When buying from overseas always err on the side of caution and remember that it may be difficult to seek redress if problems arise.
  • * Check statements from your bank or card issuer carefully as soon as you receive them. Raise any discrepancies with the retailer concerned in the first instance. If you find any transaction on your statement that you are certain you did not make, contact your card issuer immediately.
  • * Ensure that you are fully aware of any payment commitments you are entering into, including whether you are instructing a single payment or a series of payments.
  • * Never disclose your card's PIN number to anyone, including people claiming to be from your bank or the police, and never write it down or send it over the Internet.
  • * If you have any doubts about using your card, find another method of payment.

Be a Wise Consumer

  • * Don't buy health products or treatments that include: a promise for a quick and dramatic cure. Quackery can delay an ill person from getting timely treatment.
  • * Never give a caller your credit card, phone card, or bank account number over the phone.
  • * Investigate before you invest. Never make an investment with a stranger over the phone. Beware of promises that include the terms "get rich quick," or "a once in a lifetime opportunity."
  • * Look closely at offers that come in the mail. Con artists often use official-looking forms and bold graphics to lure victims. If you receive items in the mail that you did not order, you are under no obligation to pay for them - throw them out, or return them.
  • * Be suspicious of ads that promise quick cash working from your home. After you have paid for the supplies or a how-to book to get started, you often find there's no market for the product and there's no way to get your money back.
  • * Beware of cheap home repair work that would otherwise be expensive, regardless of the reason given. The con artist may just do part of the work, use shoddy materials and untrained workers, or simply take your deposit and never return.

New Crime Trends

  • * Email Scam and Phishing
  • * Cyber Stalking / Cyber Bullying
  • * Identity Theft
  • * Obscene Content
  • * Online Financial Frauds
  • * Job Fraud
  • * Matrimonial Fraud
  • * Attacks through Mobile Applications
  • * Credit/Debit Card Skimming
  • * Phishing / Vishing / Smishing
  • * Lottery Fraud
  • * Virus Attacks on Personal Computers/Laptops