Hiding Behind Incognito Browsing

Malaika Naidu

A major hype word and internet trend today is data privacy. Add to this the vulnerability brought in by excess use of social media and the integration of technology into all aspects of our day to day life. You’ll realise it’s a tricky world online. So, what do you do?
“Trust private browsing to protect your online activity and your data.” Well, yes and no.

Private browsing is a privacy feature available with all popular browsers. In Chrome, the most common browser, this feature is called incognito browsing. This feature ensures that while in use, your browser will not save any cookies, passwords, or search results. The main benefit is that if there are multiple users on a single computer, they won’t be able to see each other’s history and usage. However, this does not prevent your Internet Service Provider (ISP) from tracking your online activity.  

When using incognito browsing, a wholly isolated browsing session is launched that does not interact with regular browsing. For example, if you’re logged into your Facebook account on your regular browser and you open Facebook on incognito browser, you can log in with a different account and won’t be automatically logged in. Incognito does not save any passwords or websites visited earlier.

            Now here’s the crux.

Private browsing prevents your browser from saving online activity and passwords, but it cannot stop other applications on your computer from monitoring the same. Spyware, key loggers and third-party programs can continue to collect this data. The same applies to your ISP, routers or main servers at colleges and organisations. Also, when you visit any website, the data bytes leave your computer and travel through the network to the website’s server, where they will get tracked and saved. This cannot be prevented by private browsing.

To reiterate, private browsing only makes sure that no history is saved on your computer,  preventing other users from gaining access to your browsing history.

So, what can you do?

If you really need to mask your online activity, you could try Tor browsing. Tor is an encrypted network that reroutes your traffic through relays, making it difficult to track your actual IP address. This prevents your ISP and any other monitors from viewing your browsing history. And the websites you visit will not be able to log your IP address. Keep in mind, Tor speeds are considerably slower than regular internet browsing due to the relays.

Because of the anonymity that Tor offers, it is often used to bypass internet censorship and intense monitoring. People living under repressive government with strict laws and censorship tend to use Tor networks for access to the internet. However, it’s not a great idea to use Tor for regular browsing. The anonymity is not worth the significantly slower browsing speed.

If you would like to know more about Tor browsing, it’s pros and cons, and how it fits into the legal framework, let us know in the comment. You can also write to us on any of our social media pages. Till then, keep reading, stay updated, be aware!

IndiaCoin - an experimental "training" cryptocurrency

IndiaCoin is an experimental cryptocurrency for training police & other enforcement officials.

Why IndiaCoin?

Virtual currencies provide a powerful new tool for criminals, terrorist financiers and other sanctions evaders to move and store illicit funds, out of the reach of law enforcement and other authorities. (Source: Financial Action Task Force Report on Virtual Currencies).

The use of virtual currencies by criminals is well known. A classic example would be the use of bitcoin by users of the now shut-down Silk Road - an illegal online marketplace that facilitated the sale of hundreds of millions of dollars worth of drugs, guns, stolen financial information & more. All Silk Road transactions were conducted exclusively in bitcoin.

There are hundreds of virtual currencies in the world today. These are primarily divided into four categories - convertible, non-convertible, centralized and decentralised. The mathematics and technology behind these virtual currencies is very complex.

It is essential for police and other enforcement officials to have a strong knowledge of how cryptocurrencies work.

The high cost of bitcoin makes it expensive for training and experimentation. That's where IndiaCoin steps in - it's free!

To learn more about crypto-currencies, see:

Math Money: A simple introduction to crypto-currencies

Virtual Currencies Key Definitions and Potential AML/CFT Risks

Training Scenarios

  1. Money Laundering
  2. Organized Crime
  3. Rogue Bank
  4. Tax Evasion
  5. Terrorism Financing

Request for Access to IndiaCoin

Access to IndiaCoin is provided free-of-charge to serving officers of the police and other enforcement agencies. For details, visit: https://www.indiacoin.in/request.php

Visit the IndiaCoin site at:

Leap Courses - Quick and Free Online Courses.jpg

52 free online courses for you

A warm hello and a Happy New Year !!

We started LeapCourses.com in 2014 with a simple objective - to provide quick learning programs to busy professionals and students.

22 countries and 2847 students later, we are proud to present the all-new LEAP 2016 for you.

LEAP now features 52 courses across 9 tracks:

  • Counter terrorism (10 courses)
  • Cryptography (3 courses)
  • Digital Marketing (4 courses)
  • Financial Law (4 courses)
  • Forensics & Investigation (6 courses)
  • Fraud Control (4 courses)
  • Tech Law (11 courses)
  • Doing Business Globally (2 courses)
  • Hacking & Security (8 courses)

All LEAP courses are free to learn.

Start Learning NOW

About LEAP Courses

Leap Courses are quick & free online courses for busy people.

Each Leap Course:

  • is FREE to learn
  • features a research assignment (optional)
  • is designed by a subject expert

LeapCourses.com is a project of LEXCODE Regulatory Compliance Technologies Pvt. Ltd. (Incubated by Science & Technology Park promoted by Department of Science and Technology, Government of India).

How it works

1. Register

Simply fill up an online form. New accounts are usually processed within 1 working day. No fee is charged for this.

2. Learn

Study as many Leap Courses as you want. For FREE. No time limits, no deadlines. 100% flexibility.

3. Assessments (Optional)

Studied hard? Complete a short research / practical assignment for assessment by our experts. A fee of Rs. 1,200 is charged for this.

4. Get certified (Optional)

If you obtain A, B, C or D grade in your assignment, you will be issued a "verifiable" electronic certificate. No fee is charged for this.

Start Learning NOW

The Leap Courses Grading System

At LeapCourses.com, we believe that:

  • assessments are a part of the learning process of a course,
  • a research-based assignment is a superior learning opportunity as compared to an objective test.

That's why the assessment for each Leap Course is a short research or practical based assignment that is graded by our subject matter experts.

Grade A:
Excellent performance in mastering of the subject. Achievement of superior quality.

Grade B:
Good performance beyond the usual requirements of the course. Achievement of high quality.

Grade C:
Performance of a satisfactory nature. Achievement demonstrating an understanding of the subject sufficient for continued study in the discipline.

Grade D:
Minimally acceptable performance. Achievement demonstrating below average understanding of the basic elements of the course.

Grade F:
Achievement at a level insufficient to demonstrate understanding of the basic elements of the course.


Start Learning NOW

Get experts' answers to your cyber questions with the Lexcode Cyber Helpline

  • Police officer kills himself after he is exposed as user of infidelity site Ashley Madison.
  • Victims still unaware of remedies as cyber crimes rise.
  • Cyber extortion: New crime on the block.
  • Net banking fraud tops cyber crime.
  • Cyber crimes involving morphed photos rising.
  • Frauds cash in on lack of cyber awareness.

These are not just headlines, they are the harsh truth about the impact that cyber crime has on our lives today.

How can the helpline help you?

  • Suspicious about an email? Our experts will tell you if it's fake / phished / spoofed / safe.
  • Suspicious about a file / attachment you need to download? Our experts will tell you if it's safe or malware infected.
  • Victim of a cyber fraud? Get expert advice on what to do next.
  • Using your gmail account for work? Use our comprehensive gmail security checklist.
  • Suspecting that someone's hacked into your laptop / Facebook account / email account? Get expert advice on what to do next.
  • Your company needs to set up an Incident Response system? Get expert advice on how to go about it.
  • There's an eCommerce website / app offering a huge discount but you're not sure if it's real or a fake? Ask our experts to check if it's a credible site.
  • Received a suspicious call asking for your bank details? Ask our experts what to do.
  • Should your company go for cyber insurance cover? Ask our experts.

The Helpline has been built by Lexcode Regulatory Compliance Technologies Pvt. Ltd. and powered by Asian School of Cyber Laws.

To register for a free account, visit: https://www.asianlaws.org/helpline.php

Online Tool for checking Data Privacy Law Compliance

The Data Privacy Law in India is contained primarily in sections 43A & 72A of the Information Technology Act and the Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011.

Non-compliance with the provisions of the data privacy law may be penalized with penalty and even imprisonment in some cases.

DP-43 is an Online Tool for checking Data Privacy Law Compliance. DP-43 has been developed by Asian School of Cyber Laws and Lexcode Regulatory Compliance Technologies Pvt. Ltd.

We respect your privacy. You will NOT be required to enter your company name or your name.

To get started, click the button below:

Create my account

ASCL Cyber Museum

Watch the history of all things cyber at ASCL's Cyber Museum

Watch the birth of the Internet, the first tweet, 'search' Google's past, experience the first ever cyber crime - watch the history of all things cyber at ASCL's Cyber Museum.

ASCL's Cyber Museum

ASCL's Cyber Museum

Currently the Cyber Museum has the following sections:

A. Internet

  1. Domain names & websites
  2. Protocols & RFCs that have shaped the Internet
  3. The history of Google

B. Social Media

  1. The history of social media
  2. Facebook Timeline
  3. Twitter Timeline

C. Cyber Crime

  1. The history of malware
  2. 2014 Cyber Crime Timeline


Empowering enforcement agencies to tackle cases involving digital evidence

Collaborative Online Investigation Network

Collaborative Online Investigation Network (COIN) is an interactive platform empowering the world's enforcement agencies to tackle cyber crime & other cases involving digital evidence.

COIN has been conceptualized by Asian School of Cyber Laws with inputs and encouragement from the Government of Maharashtra.

COIN has been conceptualized by Asian School of Cyber Laws with inputs and encouragement from the Government of Maharashtra. It was launched by Shri Devendra Fadnavis, Hon'ble Chief Minister of Maharashtra on 27th July, 2015 at the c4 Conference on Cyber Crime Control, 2015 at Mumbai.

COIN being launched by Shri Devendra Fadnavis, Hon'ble Chief Minister of Maharashtra on 27th July, 2015 at the c4 Conference on Cyber Crime Control, 2015 at Mumbai

COIN being launched by Shri Devendra Fadnavis, Hon'ble Chief Minister of Maharashtra on 27th July, 2015 at the c4 Conference on Cyber Crime Control, 2015 at Mumbai

COIN is a privately owned platform that is offerred free of charge to law enforcement agencies in India. For other users we levy a subscription fee to meet the costs of sustaining and further developing COIN.

The marketing of COIN is handled by Lexcode Regulatory Compliance Technologies Pvt. Ltd. which is a company incubated by Science & Technology Park, promoted by Department of Science and Technology, Government of India.

COIN is envisaged to change the way cyber crime is dealt with in the future. Our endeavour is to make it the biggest platform globally and we actively invite participation from all stakeholders.

COIN is proudly made in India.

COIN is an interactive platform empowering the world's enforcement agencies to tackle cyber crime & other cases involving digital evidence.

COIN Features

A. Checklists & SOPs

  1. COIN Forensic Field Guides
  2. Counter Terrorism Checklists
  3. IT Act Compliance Checklists
  4. COIN eInvestigator
  5. COIN eForensics
  6. COIN 27037

B. Collaboration

  1. COIN Collab
  2. COIN Suspect Tracker
  3. COIN Intelligence Center

C. Efficiency Boosters

  1. COIN Cyber Crime Helpline
  2. COIN Learning Center
  3. COIN News Center
  4. COIN Section Finder
  5. COIN Toolkit
  6. COIN eLibrary
  7. COIN Mega Search
  8. COIN Planet
  9. Bitcoin Forensics


COIN is proudly made in India.

ASCL Cyber Task Force

Cyber Task Force identifies remedial, legal, legislative and policy solutions for building and sustaining a secure cyberspace for all humanity.

Cyber Task force:

  1. Deliberates upon issues relating to the security of cyberspace.
  2. Issue advisories that empower stakeholders to build and sustain a more secure cyberspace.

For more information, click here.

You can also send an email on info@asianlaws.org

ASCL Alumni Network

We are very proud to announce the launch of the ASCL Alumni Network.

Some of the benefits of joining the ASCL Alumni Network:

  1. Re-connect with former friends and classmates.
  2. Network with all ASCL alumni.
  3. Get exclusive access to free online courses.
  4. Earn points for referring students to do ASCL courses. These points can be exchanged for courses and even cash.
  5. Learn about the latest business opportunities in cyberspace.

For more information visit www.asianlaws.org/aan.php