Skip to main content

Cyber Intelligence Alternatives to Offset Online Sedition by in-Website Image Analysis Through WebCrawler Cyberforensics

  • Conference paper
  • First Online:
Soft Computing and Signal Processing

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 900))

Abstract

Any illegal activity carried out through the usage of the Internet is cybercrime. In this paper, we present a case study of a cybercrime with respect to the Culprit organization Government of Telangana (CGoT) that has been purportedly prevalent during 2011–2015 approximately as indicated in the website home page image of http://jntuhjac.com. Interestingly, the crime is registered against identity theft under Section 66-C under IT Act 2000–2008, whereas the complaint was against sedition crime. The culprit website of JNTUHJAC organization under CGoT was operational in the JNTUH University before the enactment of Andhra Pradesh Reorganization Act 2014. Through the culprit website, approximately 2000 registrations were obtained for the organizations. A snapshot of the culprit website obtained through a web crawler tool was submitted to the police to substantiate evidence. We present, in the case study, the many facets of the moot cybercrime issues related to the JNTUH University academic environment and how they are handled. The crime is on account of the abusive usage of an image in the home page of the aforementioned website. The image usage is nationally abusive during 2011–14 because of the mention of “Government of Telangana,” whereas there was no such government formed by any constitutional provision such as enactment through parliament. The analysis of the image impresses us immediately about the seditiously organized group of pupils by the JNTUHJAC, an unregistered outfit in the JNTUH academic environment. Image analytics and crime analytics show that the crime is a big data crime. We have come up with remedial forum by a website approach which is unique to spread awareness about the online sedition owing to it that the police showed abject inattention to register the crime under sedition.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. http://www.hyderabadpolice.gov.in/Cybercrimes.html

  2. http://archive.org/web/

  3. P. Usha Gayatri, S. Neeraja, Ch. Leela Poornima, K. Chandra Sekharaiah, M. Yuvaraj, Exploring Cyber intelligence alternatives for countering cyber crime, in Proceedings of the 8th INDIACom; INDIACom-2014, International Conference on Computing for Sustainable Global Development (Bharatiya Vidyapeeth’s Institute of Computer Applications and Management (BVICAM), New Delhi, India, 2014)

    Google Scholar 

  4. P. Usha Gayatri, K.C. Sekharaiah, Encasing the baneful side of internet, in National Conference on Computer Science & Security (COCSS 2013) (Sardar Vallabhbhai Patel Institute of Technology, Vasad, Gujarat, India, 5–6 April 2013)

    Google Scholar 

  5. P. Usha Gayatri, K.C. Sekharaiah, D. Radhika, G. Sruthi, K. Satish, S. Mounika, K. Shravani, A. Kulshreshtha, Exploring cyber intelligence alternatives for countering cyber crime: a continuing case study for the nation, in Proceedings of the IEEE CSI-2015 International Conference @Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM), New Delhi, (INDIA), Dec. 2015 (Presented)

    Google Scholar 

  6. P. Usha Gayatri, B. Tirupathi Kumar, K.C. Sekharaiah, Exploring cyber intelligence alternatives for countering cyber crime: a continuing case study for the nation, in Presented in 1st International Conference on Advancements and Innovations in Engineering, Technology, & Management(ICAIETM2017)@JBREC, Hyderabad & published in International Journal of Innovations & Advancement in Computer Science(IJIACS) 6(12), 394–397 (2017). ISSN 2347-8616

    Google Scholar 

  7. B. Tirupathi Kumar, K.C. Sekharaiah, P. Mounitha, A Case Study Of Web Content Mining In Handling Cybercrime, In Proceedings of 2nd International Conference on Science, Technology and Management, (Delhi University, New Delhi, 27 Sep 2015), pp. 2290–2293. 971-81-931039-6-8 & Int. J. Adv. Res. Sci. Eng. 4(01), 665–668 (2015). ISSN 2319-8354

    Google Scholar 

  8. P. Usha Gayatri, K.C. Sekharaiah, A Case study of multiple cybercrimes against the union of india. Int. J. Comput. Math. Sci. IJCMS ISSN 2347-8527 6(3), 71–79 (2017) presented in NCIST’2017@Manipur Institute of Technology, Manipur University, Imphal, India

    Google Scholar 

  9. P. Punitha, S. Vidyavathi, K.C. Sekharaiah, Spatial cognition applications towards swachch digital India. Presented in 1st International Confirence on Advancements and Innovations in Engineering, Technology, & Management(ICAIETM2017)@JBREC, Hyderabad & published in Int. J. Innovations Adv. Comput, Sci. (IJIACS) 6(12), 233–236 (2017). ISSN 2347-8616

    Google Scholar 

  10. K.M. Mohan, K.C. Sekharaiah, P. Premchand, A case study of ICT solutions against ICT abuse: an RTI Act 2005 success story, in Presented in @Institution of Engineers(I), Khairatabad, Hyderabad and published in Int. J. Eng. Technol. Sci. Res. (IJETSR) 4(11) (2017). ISSN 2394-3386

    Google Scholar 

  11. R. Kumar, G. Shankar, K.C. Sekharaiah, Cybercrimes-trends and challenges in achieving swachch digital India: a sase study, in Presented in National Seminar on “Concept, Measurement and Enhancement of QoL” @Jnana Prabodhini’s Institute of Psychology(JPIP), Pune, Maharashtra, 17–18 Nov 2017

    Google Scholar 

  12. https://sites.google.com/site/sekharaiahk/apeoples-governanceforumwebpage

  13. J. Ramesh Babu, A. Radha Krishna, K. Madan Mohan, K.C. Sekharaiah, Adaptive management of cybercriminal, maladaptive organizations, in the offing, that imperil the nation, in Proceedings. 27th Annual Conference of National Academy of Psychology (NAoP)@IIT, Kharagpur, Theme: Psychology of Millennials, 22–24 Dec 2017

    Google Scholar 

  14. J. Ramesh Babu, K.C. Sekharaiah, Adaptive management of cybercriminal, maladaptive organizations, in the offing, that imperil the nation, in Presented in 2nd International Conference on Data Management, Analytics & Innovation (ICDMAI2018)@Pune 19–21 Jan 2018, (Presented)

    Google Scholar 

  15. B. Tirupathi Kumar, K.C. Sekharaiah, D.S. Babu, Towards National Integration by Analyzing the Web Mining Results of a Case of Cybercrime, in Proceedings of ACM 2nd International Conference on Information and Communication Technology for Competitive Strategies (ICTCS-2016), Udaipur, Rajasthan, India, March 4–5, 2016, ACM—ICPS Volume ISBN No 978-1-4503-3962-9

    Google Scholar 

  16. P. Ushagayatri, K.C. Sekharaiah, Reviewing a judicial case study of multiple cybercrimes, in Proceedings of National Confirence in OU Law Deportment 2016 & presented in India COM 2016 International Confirence, BVICAM, New Delhi, March 2016

    Google Scholar 

  17. K. Chandra Sekharaiah, Impact of the RTI Act within a public authority organization towards employee employer engagement: a case study, in Proceedings of International Conference 2015, Enriching Employee Engagement in Organization Role of Psychology, Chennai, Tamil Nadu, India, 30 Jan–1 Feb. 2015

    Google Scholar 

  18. N. Santhoshi, K. Chandra Sekharaiah, K. Madan Mohan, Nagalaksmi kumari, “ICT based social policing for Swatchh Digital India”, in Procds. of National Conference on Role of Law Enforcement Authorities and Government in Upholding Justice, SOL, Pondicherry, India, 2–3 Mar. 2018, pp 151–152

    Google Scholar 

  19. http://www.rmlnlu.ac.in/webj/sedition.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. Santhoshi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Santhoshi, N., Chandra Sekharaiah, K., Madan Mohan, K., Ravi Kumar, S., Malathi, B. (2019). Cyber Intelligence Alternatives to Offset Online Sedition by in-Website Image Analysis Through WebCrawler Cyberforensics. In: Wang, J., Reddy, G., Prasad, V., Reddy, V. (eds) Soft Computing and Signal Processing . Advances in Intelligent Systems and Computing, vol 900. Springer, Singapore. https://doi.org/10.1007/978-981-13-3600-3_18

Download citation

Publish with us

Policies and ethics