1. Home
  2. /
  3. Miscellaneous
  4. /
  5. IPLMS: The credible counter attack on Cyber Crimes

IPLMS: The credible counter attack on Cyber Crimes

Posted By :
Today’s economy is digital economy with internet as the enabler.  Like any other tool it is also open to abuse. Cyber crimes where the suspects are utilizing a range of new technology innovations to ramp up attacks. Government and Intelligence agencies are realizing and adapting similar technology as a tool to effectively counter those attacks. Out of all the available tools, tracking IP address and subscriber logs have proven time and again to be a dependable way for authorities to track down a range of cyber crimes such as financial frauds, vengeful spurned-lovers, blackmailers, derogatory social media posts and terrorists. Based on research conducted by the center for Internet & society, below are a few incidents on how various law enforcement authorities / investigating agencies have used IP address to trace individuals responsible for particular crimes based on their usage.
  • In September 2009, a man was arrested by the Delhi Police in Mumbai for blackmailing classical musician Anoushka Shankar. The culprit had allegedly hacked into her email account and downloaded copies of personal photographs. He was traced by using his IP address
  • In May 2010, an Army officer stationed in Mumbai was arrested for distributing child pornography from his computer. He was traced by the Mumbai Police after the German Federal Police alerted Interpol that objectionable pictures were being uploaded from the IP address he was using.
  • In 2015 Hyderabadi woman, Afsha Jabeen was arrested for carrying out online recruitment for ISIS on Facebook
  • In 2015 Abdul Basith, a 22 year old student and an ISIS sympathizer from Chandrayangutta was arrested when he tried to leave the country to join ISIS.
To help secure the physical layer of any network an intelligent physical layer management solutions (IPLMS) is required. These systems often combine intelligent patch panels with software features to provide information on the connectivity status of each port in the system. IPLMS can enable instant notification and documentation of moves, adds or changes (MACs) with constant updating of data-bases. These systems also can perform physical mapping of the network’s active devices, enabling the location of each device on the network, from the switch port on one end through the patch panel and outlet on the other. Thus it is clearly evident that why govt. authorities want all ISPs to log all customers Internet Protocol address for a minimum of six months to control cyber-terrorism, online crime and data theft across both public and private networks. This is where ISPs need an intelligent IP log Management System which helps them capture subscriber details such as Time & Date stamp, Source Private IP, Source Port, MSISDN No, Destination IP, Destination Port, MACID, NATed Public IP. Moreover GUI based operations allows operators to achieve subscriber details easily with Offline and Online search. MIS report offers operators with the flexibility to filter, analyze and generate reports based on log messages. To know more on how Elitecore has enabled a leading European operator with IP Log Management System Click Here.

Leave a Reply

Your email address will not be published.

Our Latest Blogs


Uncategorized

Disadvantages of Cloud Computing

Meta Title: Disadvantages of Cloud Computing | STL Tech Blog Meta Description: In this STL Tech blog, we'll examine the...
Read More
Uncategorized

DATA CENTER IN CLOUD COMPUTING

According to Gartner, the cloud computing business is expected to grow by 20.4% in 2022 in terms of global investment...
Read More
Uncategorized

Building Energy-efficient Data Centers For A Sustainable Future

Energy Efficient Data Center Data Center Energy Consumption has become a focal point since more and more industries are using...
Read More
Uncategorized

Modernization of Radio Access Networks

Traditional Radio Access Networks will present difficulties in establishing a 5G infrastructure. As a result, telcos will have to modernize...
Read More
Uncategorized

Storage And Management Of Digital Fuel Through Data Center Services

Data Center Services for data storage and management The demand for data is skyrocketing and further fueled by consistently evolving...
Read More
Uncategorized

Building a Faster, Scalable, and Optimized Fibre Network Infrastructure

The foundation of network infrastructure, fibre optics technology enables new and existing technologies to communicate more quickly and with greater...
Read More
Uncategorized

Tailoring The Legacy of Fiber Deployment with End-To-End Fiber Automation

The Era of Automated End-to End-Fiber deployment has begun Today, everyone needs a high-speed internet connection at home and office...
Read More
Uncategorized

Providing hyper-scale Fibre deployment services

Today's digital world is built on the foundation of hyper-scale and cloud data centers. Hyper-scale operators optimize their data centers...
Read More
Uncategorized

How Are Semiconductors Pivotal For Hi-Tech Manufacturing?

Semiconductor in Hi-tech Manufacturing The global disruptions caused by the COVID-19 pandemic provided an additional push to the already growing...
Read More
Uncategorized

The East is Leading the Digital Evolution

China topped the list of Digital Risers for 2021 and was followed by Saudi Arabia and Brazil. When it comes...
Read More
Uncategorized

Moonlighting – And Different Perspectives Around It

Self-employment is becoming more common as new technology makes it easier than ever to be self-employed — and economic changes...
Read More
Uncategorized

Fibre vs. satellite: Which is a better approach for rural connectivity?

Source With a rural-urban area distribution of 68.84% and 31.16%, respectively, India is a predominantly rural-centric country. However, development-wise, urban...
Read More
Uncategorized

DIFFERENCE BETWEEN TCP/ IP AND OSI MODEL

Image TCP/IP vs OSI Model: Differentiating Factors If you are thinking about layer 2 switches and layer 3 Ethernet switches,...
Read More
Uncategorized

Fiber-Distributed Data Interface

Fiber Distributed Data Interface or FDDI in computer network is a technology primarily used as an internet backbone in Metropolitan...
Read More
Uncategorized

How Does Beamforming Improve Network Service?

Beamforming principles have been known since the 1940s, but the technology is now playing an important role in upgrading modern...
Read More
Uncategorized

Privileged Access Management: Explained

Privileged access management (PAM) refers to the cybersecurity techniques and technologies used to regulate enhanced ("privileged") access and authorization for...
Read More
Data centre Uncategorized

Power in a Three-Phase Circuit Explained

You can make two types of AC circuits: single-phase and three-phase. The single-phase circuits are easier to implement but are...
Read More
Data Network Uncategorized

Role of Gateways in a Computer Network

Gateway in a Computer Network A gateway is a computer on a network that provides the interface between two applications...
Read More
Data Network Uncategorized

Difference Between a Network Hub and Network Switch

Hubs and switches have their uses in a computer network. However, they both have different mods of operation and produce...
Read More
Access Solution Wireless Spectrum

Access Point (AP) in Wireless LAN

WThe Internet has become part of everyone's life through broadband or mobile network 4G and the currently booming 5G. India...
Read More

Our Services


Uncategorized

Disadvantages of Cloud Computing

Meta Title: Disadvantages of Cloud Computing | STL Tech Blog Meta Description: In this STL Tech blog, we'll examine the...
Read More
Uncategorized

DATA CENTER IN CLOUD COMPUTING

According to Gartner, the cloud computing business is expected to grow by 20.4% in 2022 in terms of global investment...
Read More
Uncategorized

Building Energy-efficient Data Centers For A Sustainable Future

Energy Efficient Data Center Data Center Energy Consumption has become a focal point since more and more industries are using...
Read More
Uncategorized

Modernization of Radio Access Networks

Traditional Radio Access Networks will present difficulties in establishing a 5G infrastructure. As a result, telcos will have to modernize...
Read More
Uncategorized

Storage And Management Of Digital Fuel Through Data Center Services

Data Center Services for data storage and management The demand for data is skyrocketing and further fueled by consistently evolving...
Read More
Uncategorized

Building a Faster, Scalable, and Optimized Fibre Network Infrastructure

The foundation of network infrastructure, fibre optics technology enables new and existing technologies to communicate more quickly and with greater...
Read More
Uncategorized

Tailoring The Legacy of Fiber Deployment with End-To-End Fiber Automation

The Era of Automated End-to End-Fiber deployment has begun Today, everyone needs a high-speed internet connection at home and office...
Read More
Uncategorized

Providing hyper-scale Fibre deployment services

Today's digital world is built on the foundation of hyper-scale and cloud data centers. Hyper-scale operators optimize their data centers...
Read More
Uncategorized

How Are Semiconductors Pivotal For Hi-Tech Manufacturing?

Semiconductor in Hi-tech Manufacturing The global disruptions caused by the COVID-19 pandemic provided an additional push to the already growing...
Read More
Uncategorized

The East is Leading the Digital Evolution

China topped the list of Digital Risers for 2021 and was followed by Saudi Arabia and Brazil. When it comes...
Read More
Uncategorized

Moonlighting – And Different Perspectives Around It

Self-employment is becoming more common as new technology makes it easier than ever to be self-employed — and economic changes...
Read More
Uncategorized

Fibre vs. satellite: Which is a better approach for rural connectivity?

Source With a rural-urban area distribution of 68.84% and 31.16%, respectively, India is a predominantly rural-centric country. However, development-wise, urban...
Read More
Uncategorized

DIFFERENCE BETWEEN TCP/ IP AND OSI MODEL

Image TCP/IP vs OSI Model: Differentiating Factors If you are thinking about layer 2 switches and layer 3 Ethernet switches,...
Read More
Uncategorized

Fiber-Distributed Data Interface

Fiber Distributed Data Interface or FDDI in computer network is a technology primarily used as an internet backbone in Metropolitan...
Read More
Uncategorized

How Does Beamforming Improve Network Service?

Beamforming principles have been known since the 1940s, but the technology is now playing an important role in upgrading modern...
Read More
Uncategorized

Privileged Access Management: Explained

Privileged access management (PAM) refers to the cybersecurity techniques and technologies used to regulate enhanced ("privileged") access and authorization for...
Read More
Data centre Uncategorized

Power in a Three-Phase Circuit Explained

You can make two types of AC circuits: single-phase and three-phase. The single-phase circuits are easier to implement but are...
Read More
Data Network Uncategorized

Role of Gateways in a Computer Network

Gateway in a Computer Network A gateway is a computer on a network that provides the interface between two applications...
Read More
Data Network Uncategorized

Difference Between a Network Hub and Network Switch

Hubs and switches have their uses in a computer network. However, they both have different mods of operation and produce...
Read More
Access Solution Wireless Spectrum

Access Point (AP) in Wireless LAN

WThe Internet has become part of everyone's life through broadband or mobile network 4G and the currently booming 5G. India...
Read More