Cyber crime

25
CYBER CYBER CRIME CRIME & & CYBER CYBER

Transcript of Cyber crime

Page 1: Cyber crime

CYBER CRIMECYBER CRIME

&&

CYBER LAWSCYBER LAWS

Page 2: Cyber crime

INDEXIntroduction –

Types of Cyber Crime

Need for Cyber Laws

The IT Act, 2000

Relevance of IT Act

Case Study

Conclusion

Note: To maintain the flow of presentation, please keep your queries for the Interactive Session.

Page 3: Cyber crime

• WORLD IS GLOBAL VILLAGE

• ICE AGE ( INFORMATION, COMMUNICATION,ENTERTAINEMENT)

• cyber laws - laws of the internet and the World Wide Web.

• INDIA IS 12TH NATION THAT FORM CYBER LAWS

INTRODUCTION

Read this...1995 - a 27-year old French student cracked Netscape's encryption system used for commercial transactions.1995 - Russian hacker Vladimir Levin was accused of illegally transferring more than $ l0m from Citibank to private accounts using a laptop computer.1996 - Bell Research Laboratories announced that it had discovered a way of counterfeiting electronic money on smartcards.1998-in a poll of 520 IT specialists working for US corporations, 64% of respondents reported breaches of computer security in the preceding year.They are an IT director's worst nightmare: true computer crimes that would make information managers break out in a cold sweat.

Page 4: Cyber crime

Cyber Crimes

1. HACKING: Hacking in simple terms means an illegal intrusion into a computer system and/or network. There is an equivalent term to hacking i.e. cracking, but from Indian Laws perspective there is no difference between the term hacking and cracking. Every act committed towards breaking into a computer and/or network is hacking. Hackers write or use ready-made computer programs to attack the target computer. They possess the desire to destruct and they get the kick out of such destruction.

Motive Behind The Crime ·Greed

·Power·Publicity·Revenge·Adventure·Desire to access forbidden information·Destructive mindset·Wants to sell n/w security services

Page 5: Cyber crime

2.  CHILD PORNOGRAPHYThe Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. Then starts actual exploitation of the children by offering them some money or falsely promising them good opportunities in life. The pedophiles then sexually exploit the children either by using them as sexual objects or by taking their pornographic pictures in order to sell those over the internet. How do they Operate a) Pedophiles use false identity to trap the children/teenagers.b) Pedophiles contact children/teens in various chat rooms which are used by children/teen to interact with other children/teen.c) Befriend the child/teen.d) Extract personal information from the child/teen by winning his confidence.e) Gets the e-mail address of the child/teen and starts making contacts on the victim’s e-mail address as well.f) Starts sending pornographic images/text to the victim including child pornographic images in order to help child/teen shed his inhibitions so that a feeling is created in the mind of the victim that what is being fed to him is normal and that everybody does it.g) Extract personal information from child/teen.h) At the end of it, the pedophile set up a meeting with the child/teen out of the house and then drag him into the net to further sexually assault him or to use him as a sex object. In order to prevent your child/teen from falling into the trap of pedophile, read the tips under Tips & Tricks heading

Page 6: Cyber crime

3.  CYBER STALKING Cyber Stalking can be defined as the repeated acts harassment or threatening behavior

of the cyber criminal towards the victim by using internet services. Stalking in General terms can be referred to as the repeated acts of harassment targeting the victim such as following the victim, making harassing phone calls, killing the victims pet, vandalizing victims property, leaving written messages or objects. Stalking may be followed by serious violent acts such as physical harm to the victim and the same has to be treated and viewed seriously. It all depends on the course of conduct of the stalker.

How do they Operate a) Collect all personal information about the victim such as name, family background

ETC.b) The stalker may post this information on any website related to sex-services or

dating services, posing as if the victim is posting this information and invite the people to call .

c) People who are interested in this, call.d) The stalker may post this information on any website related to sex-services or

dating services, posing as if the victim is posting this information and invite the people to call

e) Contact victim via telephone. If the stalker is able to access the victims telephone, he will many times make calls to the victim to threaten, harass, or intimidate them.

f) Track the victim to his/her home

Page 7: Cyber crime

4. Email password cracking and e-blackmailing – if some hacker cracks somebody else’s e-password and misuses that email ID, that is also termed as a crime.

Corporate e-Crimes5. Cyber Squatting – when a prominent upcoming

company’s name is booked by someone else and again sold back to the company on some premium, Technically it is a crime to register somebody else’s domain name.

6. Data Diddling – during e-tender on web for providing software solutions or projects, when some rival company re-routes the data transferred through net and changes the contents and the company receives the wrong data / solutions thus firing the company which is working on the tender / project.

Page 8: Cyber crime

7. Cyber Phishing – designing a pseudo website (look-alike) of some commercial big-name and collecting the money through in name of online transactions.

8. E-Plagiarism – Presenting somebody else’s written work and try to sell / publish that original work in his own name is a crime and known as plagiarism. Eg Kavya Vishwanathan case at Haward.

9. Cyber Bombing – Blocking the mailbox by sending large size or junk mails is also a crime.

10. Spam mails – unsolicited or unwanted mails.

Page 9: Cyber crime

Cyber Crimes/Cases Registered and Persons Arrested under IT Act, 2000

SL.No.

Description Cases Registered

Persons Arrested

1.2.3.4.5.6.

Tampering Source DocumentsHacking of Computer Systemsi) Loss/Damage to Computer resource / utilityii) HackingObscene publication/transmissionin electronic formDigital Signature FraudBreach of Confidentiality/PrivacyOthers

6151133131

291238--4

Total 70 65

Cyber Crimes/Cases Registered and Persons Arrested under IPC during 2002

Sl.No. Description Cases Registered

Persons arrested

1.2.3.4.5.

Fake electronic evidenceDestruction of electronic evidenceForgeryCriminal Breach of Trust/FraudCounterfeitingI)Property markII)TamperingIII)Currency/Stamps

2016751001049

61357785037124

Total 738 1310

Page 10: Cyber crime

Need for Cyber Laws

•Beginning of the rise of new and complex legal issues

•Facilitating e-commerce and electronic governance

•Inefficient existing legal structure of India

•No legal validity or sanction to the activities in Cyberspace

•Pressure from international agencies

Page 11: Cyber crime
Page 12: Cyber crime

Relevant Sections of ITA 2000 •Section 43 Chapter IX

•Section 65 Chapter XI

•Section 66 Chapter XI

•Section 67 Chapter XI

•Section 72 Chapter XI

•Section 74 Chapter XI •Section 79 Chapter XI

Page 13: Cyber crime

Relevance of the ITA 2000

•- not much scope for e-commerce

•- doesn’t define ‘cyber crime’

•- unclear regarding various terms

•- ignores intellectual property rights

•- lack of orientation among law enforcing agencies

•- lack of awareness

Page 14: Cyber crime

Tips to prevent Cyber Crime

•- Tips for children•- Tips for parents•- Tips for yourself and your PC•- Tips for your website

Page 15: Cyber crime

3424324242423456768679709780978858767463536464365463663

5443546546476355436676598769326576788679745664689789798

654643665475465754723673877698565466687443745848743737

4563464756487698787463598729857395462895895998546896790oj

77868658568756754635098q23nb23nhkngf0w74902377054750345089789775

346436464757568657547474754735365363458935790798579078897

45643654764754757574367466453646364645346576436454736745746

6546476454353984739027907550239708957039779034957985587

7577347982759027598407590240986769576895670945709657689575

988977899999999999999999868569694454764576867969709868678675

765766754549357902708957908374395789037394495708967089567

5675674534979006830939076987609837809678969800437908766

56776754597832589075907690769057690547690769876948709765

6757675676756508353-27689279087256768905470347698798657968590685789690

7657757656732905709275890709907985379854566747676546734776557

655756675670289095780327-03-039780-6-08039--=9-9-==--3958038557

65757575677647446846516749845198465198798646514651649867

64746776467474776654465349874546+8498544864864989949467

765765764677647647766418977494849548949584948467994469947

456419784494945949987849869498964998409496984968*48840498498

67747675766746747567489+6784676489597944+4938775486417647898877

4767547474574432161890759079587094074838907908576089476764

4675476547654764342925802769087609849604679486907474655477

6745764747576545478959027806056790578639768947647647896

647474765476474674397302975092875290790750957895098798

435463656502990279026089576094587849076387895490789343

4564564566456324912678965895759540327502709549047079==908-

54645645665616546516+49657164651978615679844198416849654696546

56464645665159468944964949968499497849094089459840778994

76876876885875868841984948964896489648949874978494879499419

54656654646456654764645998499979489871907408949496499949

5465645654645645761984984879845948594949884794899646546

556454646546456545464646546456656344665434643466463446636646

5654645645654645629748698499489549947949849894496894984654645

CASE STUDY:

NIGERIAN SCAM

Page 16: Cyber crime

3424324242423456768679709780978858767463536464365463663

5443546546476355436676598769326576788679745664689789798

654643665475465754723673877698565466687443745848743737

4563464756487698787463598729857395462895895998546896790oj

77868658568756754635098q23nb23nhkngf0w74902377054750345089789775

346436464757568657547474754735365363458935790798579078897

45643654764754757574367466453646364645346576436454736745746

6546476454353984739027907550239708957039779034957985587

7577347982759027598407590240986769576895670945709657689575

988977899999999999999999868569694454764576867969709868678675

765766754549357902708957908374395789037394495708967089567

5675674534979006830939076987609837809678969800437908766

56776754597832589075907690769057690547690769876948709765

6757675676756508353-27689279087256768905470347698798657968590685789690

7657757656732905709275890709907985379854566747676546734776557

655756675670289095780327-03-039780-6-08039--=9-9-==--3958038557

65757575677647446846516749845198465198798646514651649867

64746776467474776654465349874546+8498544864864989949467

765765764677647647766418977494849548949584948467994469947

456419784494945949987849869498964998409496984968*48840498498

67747675766746747567489+6784676489597944+4938775486417647898877

4767547474574432161890759079587094074838907908576089476764

4675476547654764342925802769087609849604679486907474655477

6745764747576545478959027806056790578639768947647647896

647474765476474674397302975092875290790750957895098798

435463656502990279026089576094587849076387895490789343

4564564566456324912678965895759540327502709549047079==908-

54645645665616546516+49657164651978615679844198416849654696546

56464645665159468944964949968499497849094089459840778994

76876876885875868841984948964896489648949874978494879499419

54656654646456654764645998499979489871907408949496499949

5465645654645645761984984879845948594949884794899646546

556454646546456545464646546456656344665434643466463446636646

5654645645654645629748698499489549947949849894496894984654645

conclusion

Page 17: Cyber crime

Conclusion

•- Cyber Forensics

•- Special tribunals

•- 5P mantra

Page 18: Cyber crime

INTERACTIVE SESSIONAny questions, suggestions, compliments, etc.?

Page 19: Cyber crime
Page 20: Cyber crime

Sl. No. State/UT Cases Registered

IT Act IPC Section

(1) (2) (3) (4)

STATES:

1 ANDHRA PRADESH 8 253

2 ARUNACHAL PRADESH 0 0

3 ASSAM 2 0

4 BIHAR 0 0

5 CHHATTISGARH 0 0

6 GOA 4 4

7 GUJARAT 1 249

8 HARYANA 2 0

9 HIMACHAL PRADESH 0 99

10 JAMMU & KASHMIR 1 0

11 JHARKHAND 0 0

12 KARNATAKA 15 0

13 KERALA 3 1

14 MADHYA PRADESH 0 0

15 MAHARASHTRA 12 1

16 MANIPUR 0 0

17 MEGHALAYA 0 0

18 MIZORAM 0 0

19 NAGALAND 0 0

Page 21: Cyber crime

20 ORISSA 4 0

21 PUNJAB 3 26

22 RAJASTHAN 0 0

23 SIKKIM 0 0

24 TAMIL NADU 3 0

25 TRIPURA 0 0

26 UTTAR PRADESH 5 81

27 UTTARANCHAL 0 0

28 WEST BENGAL 0 0

TOTAL (STATES) 63 714

UNION TERRITORIES:

29 A & N ISLANDS 0 15

30 CHANDIGARH 2 0

31 D & N HAVELI 0 0

32 DAMAN & DIU 0 7

33 DELHI 5 2

34 LAKSHADWEEP 0 0

35 PONDICHERRY 0 0

TOTAL (UTs) 7 24

TOTAL (ALL-INDIA) 70 738

Back

Page 22: Cyber crime

Sl.No. State/UT Below 18 years Between 18 – 30 years

Between 30 – 45 years

Between 45 – 60 years

Above 60 years

Total

(1) (2) (3) (4) (5) (6) (7) (8)

STATES:

1 ANDHRA PRADESH 0 2 3 0 0 5

2 ARUNACHAL PRADESH 0 0 0 0 0 0

3 ASSAM 0 2 0 0 0 2

4 BIHAR 0 0 0 0 0 0

5 CHHATTISGARH 0 0 0 0 0 0

6 GOA 0 0 0 0 0 0

7 GUJARAT 0 0 0 0 0 0

8 HARYANA 0 1 0 0 0 1

9 HIMACHAL PRADESH 0 0 0 0 0 0

10 JAMMU & KASHMIR 0 1 0 0 0 1

11 JHARKHAND 0 0 0 0 0 0

12 KARNATAKA 0 11 3 0 0 14

13 KERALA 0 1 0 1 0 2

14 MADHYA PRADESH 0 0 0 0 0 0

15 MAHARASHTRA 0 8 2 0 0 10

16 MANIPUR 0 0 0 0 0 0

17 MEGHALAYA 0 0 0 0 0 0

18 MIZORAM 0 0 0 0 0 0

19 NAGALAND 0 0 0 0 0 0

20 ORISSA 0 4 1 0 0 5

21 PUNJAB 1 0 3 2 0 6

22 RAJASTHAN 0 0 0 0 0 0

23 SIKKIM 0 0 0 0 0 0

24 TAMIL NADU 0 1 1 0 0 2

Page 23: Cyber crime

25 TRIPURA 0 0 0 0 0 0

26 UTTAR PRADESH 0 11 0 0 1 12

27 UTTARANCHAL 0 0 0 0 0 0

28 WEST BENGAL 0 0 0 0 0 0

TOTAL (STATES) 1 42 13 3 1 60

UNION TERRITORIES:

29 A & N ISLANDS 0 0 0 0 0 0

30 CHANDIGARH 0 0 0 0 0 0

31 D & N HAVELI 0 0 0 0 0 0

32 DAMAN & DIU 0 0 0 0 0 0

33 DELHI 0 4 1 0 0 5

34 LAKSHADWEEP 0 0 0 0 0 0

35 PONDICHERRY 0 0 0 0 0 0

Back

TOTAL (UTs) 0 4 1 0 0 5

TOTAL (ALL-INDIA) 1 46 14 3 1 65

Page 24: Cyber crime
Page 25: Cyber crime