Cyber Privilege Directory Book in Support of I.O (Cyber Crime Investigators) Continuous support from subject matter experts (SMEs) to Investigation Officers A Powerful Hand Book for Cyber Crime Investigators Cyber Crime SOP Modus Operandi (M.O) By Mr. G Vimal Kumar, (GVK), Cyber Expert & Cyber Forensic Investigator, Cyber Privilege Vijayawada.

Digital Trust and Transformation:

 Over the last three years, the Cyber Privilege has been a pioneer in finding the frauds of root causes of Bitcoin trading crimes & helping clients who are victims of Crypto Currency Frauds.

We are specialized team focused primarily on cyber, or internet-based, crimes. Our team investigating and analyzing cybercrime incidents, such as hacking, identity theft, fraud, and other types of cyber-related crimes. Our primary goal is to identify the culprits and gather evidence that can be used to prosecute them in court with the support of Law Enforcement Agencies. We are friendly to all Law Enforcement Agencies.

 We have attached CYBER PRIVILEGE INVESTIGATORS DIRECTORY 2023 Book with this letter; this is an extremely useful directory that provides details about different types of digital services and probable crimes that occur. It also gives an insight to Police Officers helping them with information to be collected from the service providers that they need to investigate crime occurring in the digital world. 

CYBER PRIVILEGE DIRECTORY Book in Support of I.O. (Cyber Crime Investigators) Content:

 Continuous support from subject matter experts (SMEs) to Investigation Officers

 Telecom Service Providers

 Internet Service Providers

 Social Media Service Providers

 Bank and Financial Institutions

 E-Commerce Sites & E-Wallets 

E-mail Service Providers

 Over the Top (OTT) Service Providers 

Other Service Providers

 Grievance Officers of Social Media Platforms

 Templates for Service Providers Sec.91 & 160 Cr.P.C 

30+ Cyber Security Search Engines for researchers 

Cyber Crimes SOP (Standard Operating Procedures)

 IT Act 2008, 65B Electronic Evidence Certificate  

 India Penal Code (IPC) 1860

 Incident Response Unit Work Flow

 Tips and Tricks in Social Media

 Internationalized Domain name (IDN) Homograph Attacks, Anti Cyber Bullying Unit Work Flow

 How to Fix a Hacked Android Phone Fast

 Aadhaar Services on SMS – AePS

 In our Lab we are using (FAW) The first forensic browser, Able to quickly and easily scan web pages that needs to be brought as evidence in criminal and civil proceedings. Capture web pages on the Darkweb through the TOR network. Websites acquisition, Social Network acquisition, Intranet acquisition. 

As a Cyber Forensic Analyst, I believe this directory will aid Police Officers in the collection of information and digital evidence from service providers for the investigation of all cases, especially cybercrime cases. Therefore I strongly recommend it for effectively dealing with the menace of cybercrimes. Due to the rapidly changing nature of electronic and computer technologies and electronic crime, efforts will be periodically undertaking to update the information contained in the directory. The directory and subsequent updates will be made available on the website.

 In this book, Created Templates for Service Providers Draft model format of Notice Under Section 91 OF Cr.P.C under Mutual Legal Assistance Treaty (MLAT) and arrangements of International Conventions under Notice U/Sec.69 (B) of Information Technology Amendment Act, 2008 and Sec.91 & 160 Cr.P.C of India, Notice u/s 91/160 Cr.P.C, Notice U/Sec: 69(A) & 79(3) ITA Act 2008 and Sec.91 & 160 Cr.P.C etc. 

The most prominent form of cybercrime is identity theft, in which criminals use the Internet to steal personal information from other users. Accused grab details from victims which may include login information, such as usernames and passwords, phone numbers, addresses, debit/credit card numbers, bank account numbers, and other information criminals can use to "steal“ person's identity. Sometimes accused get all above details on call using social engineering, sometimes they get them using remote access applications while sometimes accused lure users to fake websites, where they are asked to enter personal information.

 Type of Cyber Frauds /Online Frauds / Online Cyber Frauds

 01. OTP/UPI/Google pay link fraud

02. OLX fraud, Email Related, Sim swapping Frauds

03. Without OTP Frauds, QR code scan Fraud

04. Customer Care Fraud / Helpline Frauds

05. Wallet KYC update , Job fraud , Loan fraud

06. e-Commerce related/ Online shopping Frauds

07. Porn Site fraud, Remote access Fraud

08. Matrimonial fraud / Gift Frauds, Lottery/prize Frauds

09. Chemical/Seeds related Fraud, Social media

10. Internationalized Domain name (IDN) Homograph Attacks

11. Online Revenge Frauds, Cyber Terrorism

12. Morphing, Tampering of Videos and Images

In conclusion, this directory principally for the use of Investigating Officers as well as the officers overseeing the collection of Information and digital evidence process. The goal of this directory is to guide the Investigating Officers through the facility-based collection of critical information and digital evidence from service providers related to desired user account, including but not limited to, subscriber information, transactional records, service history, payment records, log-in and logout records and account content. It also alerts the Investigating Officer to navigate through the correct direction of the investigation process and helps construct a strong case for prosecution.

It would be happy to hear any suggestions, corrections, modifications and further topics to be addressed so that the same will be taken care in the future. Our Valuable Services are Data Recovery, Data Protection, Handscript Writing Analysis, Cyber Forensic Analysis, Digital Evidence, Forensic Acquisition of Websites (FAW), Image Video Content Analytics, Ransomware Removal, Antivirus, Incident Reporting & Response. If any above services required kindly contact us with best efforts as we can in solving the problem of clients/complainant, we expect mutual response while solving any critical issues.