Intercepted communications is one of the crucial evidence collected by the investigation agencies in large number of cases relating to Corruption, Fraud and various other offences of heinous nature. Recently CBI registered the case against the former ..
Every Computer Output does not require 65B Certificate-IEA, 1872 ..
Each picture is a story and each story is a part of big picture and the morphed photograph released by the TMC showing Union Minister, Shri Rajnath Singh offering sweets to former CPM Secr ..
The allegations � counter allegations in the Kangana Hrithik episode are mounting everyday with roping of opinions from lawyers, forensic experts and the police. With each succeeding day, the personal communications between the parties have bec ..
The philosophy of Prof. Lawrence Lessing regarding the control of internet through its code and �the declaration of independence of cyberspace� by John Perry Barlaw are in interlocked stage. The movement of the governance of internet is s ..
Introduction From corporate crimes to murder, computer place a role in nefarious activities either as a target, medium or containing evidence and thus, requiring specialist with a skill in the various technologies and legal knowledge to gather eviden ..
Due to the boom in the industry of e-commerce and tremensdous increase in e-crimes, electronic evidence gained its importance and it has involved into a fundamental pillar of communication, processing and documentation. The various forms of evidence ..
International business trade is facing an unprecedented threat of frauds from organized crime, particularly, an intelligent, knowledgeable group of hackers and recent fraud with ONGC is one of the crime involving huge amount of Rs. 197 Cr. Such scams ..
Hash value plays a significant role in establishing the authenticity and integrity of data/evidence in the digital world particularly in Cryptography, Data Analyses and Forensic Imaging etc. Hash Value popularly known as Fingerprint of data is the cr ..