Skip to main content

Uses of Mobile Application in Crime Scene Investigation

How to Avoid Common Cyber Attacks in day to day life?



By,

We all are living in the digital era, where we are bound to use the smart devices in our day to day life for almost every work. Life has become so comfortable with these smart devices and digitalization of the technology, in the banking sector, purchasing and selling industry, social media sharing, and other information sharing. With this tremendous digitalization comes the great responsibility of the users and the service providers to keep the data safe as far as possible. Below are some standard techniques to avoid yourself being a cyber victim of bullying or hacking.



Avoid unnecessary file transfer and follow Links while chatting online: 

Do not follow any links that you receive from strange people as it may contain viruses or code that may allow someone to hack your device. In is always recommended to check the folder with anti-virus software before you open any file received through emails, especially from strangers.

While Chatting Online: 

Always tell your parents / authorities if someone upsets you or makes you uncomfortable when chatting. Most importantly, never give your pictures or any type of personal data to strangers. It may look lucrative for time being, but in long run it may create a big issue.




Do not give your personal details: 

such as your name, location, credit card information, etc. during chat, because the other person may be too physically or digitally watching the conversation.

Internet chat documentation for future references: 

Always try to document your chat and online conversation for future reference. By using the information you received during an online conversation, you will be at ease to catch the person who interacts with you, if he misuses the information or does any crime.

Never meet a weird cyberpalist:

The person you meet online every day may or may not be the right person. He may give wrong information about his details. `so, be careful in meeting a stranger on the internet. If you choose to meet, do so in a public place and take along a friend.



Avoid Providing third person's information without their consent while you are in chatting: 

Children love using chat rooms, they should be aware that people are strangers in chat rooms and may not be honest guys. The privacy policies may not disclose information you are sharing through a conversation. Never talk about your personal information like your name, home address, email phone, etc.

Avoid Chatting with Unknown Person: 

Never entertain chatting with an unknown person. Avoid adding an unknown person as friends. This will definitely be a breech in your privacy and may harm you. As I said before, it may be exciting for a while but hard paying later-on. 

Restrict access to your profile picture by enabling profile picture sharing only to contacts: 

Whatsapp has become a universal messenger nowadays with the help of mobile numbers. You can check the profile photo of any particular user. This may not be safe if the number falls in to wrong hands. They may misuse your photo and can harm you mentally. To avoid this, set the privacy settings of your profile photo only to my contacts.

Always Logout when you use WhatsApp web: 

Many people prefer to use WhatsApp web as a matter of ease at larger screens and others. On your laptop or computer, when you use WhatsApp web, always disable “Keep me signed in” in options before scanning the QR. By doing this, you will be logged out after a certain time of inactivity.

Always take back-up of your important files: 

If you are a typical home computer user, back up any critical file as and when they are changed and do the full back up once a week or month. Keep the back up into a separate location so that you will have at least one back up even in case of a disaster.

Do not leave your laptop at the airport, library or cafeteria unattended: 

Make sure you enter a key to sign in to your laptop. Please keep your device traveling with you. Do not use your mobile devices in public areas and use non-traditional bags to look after your laptops.  

Think twice before your Post: 

Most of us like to share our daily lives on social media. I have seen people taking number of selfies every day and posting them freely (openly) on social media. The only requirement here is to keep account private and adding people whom you know to your social networks. This will avoid you being a victim of online stalking.




Delete chain-emails and spam as quick as possible: 

Do not forward or reply to any of them. Avoid sending out separate alerts and receiving reward chain emails. Many of these email types are scams. Some of them are dangerous. By sending them to others, you contribute to the problem and become an email bullying executor.




Comments

Popular posts from this blog

Crime Scene Search Methods

The Crime Scene is search for the physical evidences (visible or invisible). There are various types of search methods employed by the investigating officers and the forensic scientists at the scene of crime. The searching methods mainly depends on: Type of Crime (Rape, murder, burglary, theft, etc.) Nature of Crime (Homicide, suicide, or accident) Size of the crime scene (macroscopic or microscopic) Location of the crime scene (indoor, outdoor, combination of indoor or outdoor, or any remote area like underwater, desert, etc.) Complexity of the crime scene  Before deciding the search method, all the investigators and the forensic experts must follow the general guidelines (check list) to observe the crime scene after due recording: 1. Are the doors and windows locked or unlocked? Open or shut?  2. Are there signs of forced entry, such as tool marks or broken locks? 3. Is the house or the crime scene is in good order? If not, do

Introduction to Forensic Ballistics

By Dr. Bhoopesh Kumar Sharma Forensic Expert & Associate Professor Introduction to Ballistics: The term ballistics refers to the science of study of the action, motion and  behaviour  of a projectile during its flight in any given medium. The flight path of a bullet includes:  • Travel down the barrel  (Internal Ballistics), • Path through the air  (External Ballistics),  and  • Path through a target  (Terminal Ballistics) Forensic Ballistics: Is that branch of forensic science which deals with the examination of the firearm and related evidences encountered at the scene of crime in a shooting incident, and their linkage to the firearm, and Identification of the shooter. A ballistic expert need to answer the following questions: 1. Type of The Firearms used 2. Identification of the Firearm 3. Individual Characteristics of Firearm 4. Range of Firing 5. Direction of Firing 6. Identification of the Shooter 7. Medico legal aspects: - Suic

Blood Spatter Analysis

What is Blood Spatter Analysis? Blood Spatter Analysis or Blood Pattern Analysis (BPA) is the examination of bloodstain shapes, locations, and distribution patterns, to provide an interpretation of the physical events that gave rise to their origin. In forensic investigations, it is ubiquitous to encounter blood on the crime scene. This blood can be in the form of a pool, dried stains, spatter, expirated blood, etc. Hence, the investigators are required to understand these bloodstains to interpret the events that have occurred on the crime scene, to create a possible hypothesis of the modus operandi, to identify the type of weapon, the direction of the blow, severity of the injury, applicable forces, etc. This whole interpretation is known as Blood Pattern Analysis or Blood Spatter Analysis. What are the Types of Blood Patterns? There are many classifications given by blood spatter analyst around the world. I will be using the most common here, to make it understand in