You are on page 1of 7

Ministry/Organization Name : Government of

Andhra Pradesh
Problem statement : Solutions required to solve the
challenges faced by the Law Investigation Officers
(LEOs ) in Cyber Crimes.
Team Name : Cyber Enhancers
Team Leader Name : Tejasri Kalipatnapu
Solution 1:
Method 1:
In order to retrieve the information relating to transmission of a disputed posting and immediate
deletion of the same message we have to insert a confirmation dialogue box before sending the
message so that within a stipulated time , if a person cannot decide whether to confirm it or not then
the message will be permanently deleted and the further transmission of the message is stopped.
Method 2:
In this method, we develop a software that automatically detects the disputed posts or any posts that
are harmful and abusing for the users . The system itself identifies the issue and it does not perform
the further transmission.
Solution 2:
The messages that were sent in WhatsApp messenger can be decrypted and also the QR code can be
scanned , with this code we can grab the ID of a particular person so that the persons location can be
traced. As the WhatsApp messages are in encrypted form they are decrypted only by the professional
hackers.
Solution 3:
To find the initial user of a certain post in WhatsApp and Facebook , we will develop an application
that displays timing of particular messages that were forwarded from various people so that it will be
easy to catch the exact person with the help of the information obtained through the above data.
Solution 4:
A code is developed on a chip and that chip is embedded in the device so that we can ping any social
media account without acceptance of the targeted user. It will get a default accessibility with other
systems, so that we can obtain the credentials and capture the IP address of the user.
Solution 5:
GPS will be the best solution for this because once we send a signal through the source mobile to
target mobile then the signal captures the exact location and with the help of that location it
checks and calculates the total distance and also the direction in which the target mobile is located
and displays it.
Technology Stack:
-IOT
- Machine Learning
- Artificial Intelligence
- Web Based Technologies.
Use Case diagram for cyber crime prosecution information
system
Dependencies /showstopper:
Technology and forensic dependencies plays a
major role in the investigation of the cyber crime cases.
References:
1.https://www.unodc.org/e4j/en/cybercrime/module-3/key-
issues/references.html
2.https://www.communicationstoday.co.in/services/ cyber-crime-
in-internet-of-things/

You might also like