LCI Learning

Share on Facebook

Share on Twitter

Share on LinkedIn

Share on Email

Share More

Articles by Neeraj Aarora

avatarView Full Profile

Intercepted Mobile Evidence on CD: Infringement of Constitutional Right of Defence

  Neeraj Aarora   17 March 2017 at 10:37

Intercepted communications is one of the crucial evidence collected by the investigation agencies in large number of cases relating to Corruption, Fraud and various other offences of heinous nature. Recently CBI registered the case against the former ..

Posted in Legal Documents  3 comments |   2825 Views

Every Computer Output does not require 65B Certificate-IEA, 1872

  Neeraj Aarora   01 March 2017 at 12:06

Every Computer Output does not require 65B Certificate-IEA, 1872 ..

Posted in Legal Documents  2 comments |   1135 Views

TMC VS CPM Morphed Photo Row: A Picture Worth a Thousand Words

  Neeraj Aarora   02 May 2016 at 13:36

Each picture is a story and each story is a part of big picture and the morphed photograph released by the TMC showing Union Minister, Shri Rajnath Singh offering sweets to former CPM Secr ..

Posted in Others |   964 Views

Police Action In Kangana Hirthik Case - Invasion Into Privacy

  Neeraj Aarora   28 April 2016 at 11:03

The allegations � counter allegations in the Kangana Hrithik episode are mounting everyday with roping of opinions from lawyers, forensic experts and the police. With each succeeding day, the personal communications between the parties have bec ..

Posted in Others  2 comments |   807 Views

Restriction on WhatsApp Group in J&K- An Another Failed Attempt To Regulate The Internet

  Neeraj Aarora   25 April 2016 at 11:10

The philosophy of Prof. Lawrence Lessing regarding the control of internet through its code and �the declaration of independence of cyberspace� by John Perry Barlaw are in interlocked stage. The movement of the governance of internet is s ..

Posted in Others  1 comments |   551 Views

How to become a cyber forensic examiner

  Neeraj Aarora   29 December 2015 at 11:24

Introduction From corporate crimes to murder, computer place a role in nefarious activities either as a target, medium or containing evidence and thus, requiring specialist with a skill in the various technologies and legal knowledge to gather eviden ..

Posted in Others |   1587 Views

Admissibility of Electronic Evidence: Challenges for Legal Fraternity

  Neeraj Aarora   08 December 2015 at 10:33

Due to the boom in the industry of e-commerce and tremensdous increase in e-crimes, electronic evidence gained its importance and it has involved into a fundamental pillar of communication, processing and documentation. The various forms of evidence ..

Posted in Others  3 comments |   1848 Views

ONGC 197 CR. Fraud: Hacker using Apt for Cyberheist

  Neeraj Aarora   02 December 2015 at 11:00

International business trade is facing an unprecedented threat of frauds from organized crime, particularly, an intelligent, knowledgeable group of hackers and recent fraud with ONGC is one of the crime involving huge amount of Rs. 197 Cr. Such scams ..

Posted in Others  2 comments |   1009 Views

Hash value: Authentication and admissibility in Indian perspective

  Neeraj Aarora   05 November 2015 at 15:30

Hash value plays a significant role in establishing the authenticity and integrity of data/evidence in the digital world particularly in Cryptography, Data Analyses and Forensic Imaging etc. Hash Value popularly known as Fingerprint of data is the cr ..

Posted in Others |   6046 Views