• Shri Nagendra Tripathi , IPS, D.C.P. Traffic/DD.

  • Shri Sudeep Sarkar, IPS, D.C.P. (HQ).

  • Shri Gaurav Lal, IPS, D.C.P. Zone-I

  • Shri Tarun Halder, IPS, D.C.P. Zone-II

  • Shri Sunil Kumar Choudhary, IPS, C.P.


There are no precise, reliable statistics on the amount of computer crime and the economic loss to victims, partly because many of these crimes are apparently not detected by victims, many of these crimes are never reported to authorities, and partly because the losses are often difficult to calculate.

Internet fraud takes many forms. The Internet's promise of substantial consumer benefits is coupled with the potential for fraud and deception. Fraud operators are opportunists who are among the first to appreciate the potential of a new technology. There is nothing new about Internet fraud, however, the size and potential market, relative ease, low cost, and speed with which a scam can be perpetrated has increased tremendously.

Nevertheless, in this section we have posted some Tips for Avoiding Computer Crime, which includes suggestions for increasing the security and reliability of personal computers, as well as protection against cyber crime.

Causes of Computer Crime

Sharing Identification numbers and passwords

Unauthorised access from remote location (hacking)

Unauthorised access by non-authorised employee

Security system by-passed

Poor physical security

Poor system security

Abuse of legitimate access

Viruses etc or other willful damage by disgruntled employee or competitor

Appropriate computer security changes not done when employees with access leave or are transfered.

Data files and listings not held under proper security

Hacking, Computerized Fraud And Other Computer Crimes

A "hacker" is a dedicated programming expert who believes in sharing his expertise and experiences with other hackers. A hacker does not believe in vandalizing or maliciously destroying data, or in stealing data of any kind. He may find your credit card number stored there from buying online, or use the information gleaned from your computer to use your ISP account for illegal activity, like distributing child pornography