Cyber crime
-
Upload
ibateflcom -
Category
Documents
-
view
283 -
download
4
Transcript of Cyber crime
CYBER CRIMECYBER CRIME
&&
CYBER LAWSCYBER LAWS
INDEXIntroduction –
Types of Cyber Crime
Need for Cyber Laws
The IT Act, 2000
Relevance of IT Act
Case Study
Conclusion
Note: To maintain the flow of presentation, please keep your queries for the Interactive Session.
• WORLD IS GLOBAL VILLAGE
• ICE AGE ( INFORMATION, COMMUNICATION,ENTERTAINEMENT)
• cyber laws - laws of the internet and the World Wide Web.
• INDIA IS 12TH NATION THAT FORM CYBER LAWS
INTRODUCTION
Read this...1995 - a 27-year old French student cracked Netscape's encryption system used for commercial transactions.1995 - Russian hacker Vladimir Levin was accused of illegally transferring more than $ l0m from Citibank to private accounts using a laptop computer.1996 - Bell Research Laboratories announced that it had discovered a way of counterfeiting electronic money on smartcards.1998-in a poll of 520 IT specialists working for US corporations, 64% of respondents reported breaches of computer security in the preceding year.They are an IT director's worst nightmare: true computer crimes that would make information managers break out in a cold sweat.
Cyber Crimes
1. HACKING: Hacking in simple terms means an illegal intrusion into a computer system and/or network. There is an equivalent term to hacking i.e. cracking, but from Indian Laws perspective there is no difference between the term hacking and cracking. Every act committed towards breaking into a computer and/or network is hacking. Hackers write or use ready-made computer programs to attack the target computer. They possess the desire to destruct and they get the kick out of such destruction.
Motive Behind The Crime ·Greed
·Power·Publicity·Revenge·Adventure·Desire to access forbidden information·Destructive mindset·Wants to sell n/w security services
2. CHILD PORNOGRAPHYThe Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. Then starts actual exploitation of the children by offering them some money or falsely promising them good opportunities in life. The pedophiles then sexually exploit the children either by using them as sexual objects or by taking their pornographic pictures in order to sell those over the internet. How do they Operate a) Pedophiles use false identity to trap the children/teenagers.b) Pedophiles contact children/teens in various chat rooms which are used by children/teen to interact with other children/teen.c) Befriend the child/teen.d) Extract personal information from the child/teen by winning his confidence.e) Gets the e-mail address of the child/teen and starts making contacts on the victim’s e-mail address as well.f) Starts sending pornographic images/text to the victim including child pornographic images in order to help child/teen shed his inhibitions so that a feeling is created in the mind of the victim that what is being fed to him is normal and that everybody does it.g) Extract personal information from child/teen.h) At the end of it, the pedophile set up a meeting with the child/teen out of the house and then drag him into the net to further sexually assault him or to use him as a sex object. In order to prevent your child/teen from falling into the trap of pedophile, read the tips under Tips & Tricks heading
3. CYBER STALKING Cyber Stalking can be defined as the repeated acts harassment or threatening behavior
of the cyber criminal towards the victim by using internet services. Stalking in General terms can be referred to as the repeated acts of harassment targeting the victim such as following the victim, making harassing phone calls, killing the victims pet, vandalizing victims property, leaving written messages or objects. Stalking may be followed by serious violent acts such as physical harm to the victim and the same has to be treated and viewed seriously. It all depends on the course of conduct of the stalker.
How do they Operate a) Collect all personal information about the victim such as name, family background
ETC.b) The stalker may post this information on any website related to sex-services or
dating services, posing as if the victim is posting this information and invite the people to call .
c) People who are interested in this, call.d) The stalker may post this information on any website related to sex-services or
dating services, posing as if the victim is posting this information and invite the people to call
e) Contact victim via telephone. If the stalker is able to access the victims telephone, he will many times make calls to the victim to threaten, harass, or intimidate them.
f) Track the victim to his/her home
4. Email password cracking and e-blackmailing – if some hacker cracks somebody else’s e-password and misuses that email ID, that is also termed as a crime.
Corporate e-Crimes5. Cyber Squatting – when a prominent upcoming
company’s name is booked by someone else and again sold back to the company on some premium, Technically it is a crime to register somebody else’s domain name.
6. Data Diddling – during e-tender on web for providing software solutions or projects, when some rival company re-routes the data transferred through net and changes the contents and the company receives the wrong data / solutions thus firing the company which is working on the tender / project.
7. Cyber Phishing – designing a pseudo website (look-alike) of some commercial big-name and collecting the money through in name of online transactions.
8. E-Plagiarism – Presenting somebody else’s written work and try to sell / publish that original work in his own name is a crime and known as plagiarism. Eg Kavya Vishwanathan case at Haward.
9. Cyber Bombing – Blocking the mailbox by sending large size or junk mails is also a crime.
10. Spam mails – unsolicited or unwanted mails.
Cyber Crimes/Cases Registered and Persons Arrested under IT Act, 2000
SL.No.
Description Cases Registered
Persons Arrested
1.2.3.4.5.6.
Tampering Source DocumentsHacking of Computer Systemsi) Loss/Damage to Computer resource / utilityii) HackingObscene publication/transmissionin electronic formDigital Signature FraudBreach of Confidentiality/PrivacyOthers
6151133131
291238--4
Total 70 65
Cyber Crimes/Cases Registered and Persons Arrested under IPC during 2002
Sl.No. Description Cases Registered
Persons arrested
1.2.3.4.5.
Fake electronic evidenceDestruction of electronic evidenceForgeryCriminal Breach of Trust/FraudCounterfeitingI)Property markII)TamperingIII)Currency/Stamps
2016751001049
61357785037124
Total 738 1310
Need for Cyber Laws
•Beginning of the rise of new and complex legal issues
•Facilitating e-commerce and electronic governance
•Inefficient existing legal structure of India
•No legal validity or sanction to the activities in Cyberspace
•Pressure from international agencies
Relevant Sections of ITA 2000 •Section 43 Chapter IX
•Section 65 Chapter XI
•Section 66 Chapter XI
•Section 67 Chapter XI
•Section 72 Chapter XI
•Section 74 Chapter XI •Section 79 Chapter XI
Relevance of the ITA 2000
•- not much scope for e-commerce
•- doesn’t define ‘cyber crime’
•- unclear regarding various terms
•- ignores intellectual property rights
•- lack of orientation among law enforcing agencies
•- lack of awareness
Tips to prevent Cyber Crime
•- Tips for children•- Tips for parents•- Tips for yourself and your PC•- Tips for your website
3424324242423456768679709780978858767463536464365463663
5443546546476355436676598769326576788679745664689789798
654643665475465754723673877698565466687443745848743737
4563464756487698787463598729857395462895895998546896790oj
77868658568756754635098q23nb23nhkngf0w74902377054750345089789775
346436464757568657547474754735365363458935790798579078897
45643654764754757574367466453646364645346576436454736745746
6546476454353984739027907550239708957039779034957985587
7577347982759027598407590240986769576895670945709657689575
988977899999999999999999868569694454764576867969709868678675
765766754549357902708957908374395789037394495708967089567
5675674534979006830939076987609837809678969800437908766
56776754597832589075907690769057690547690769876948709765
6757675676756508353-27689279087256768905470347698798657968590685789690
7657757656732905709275890709907985379854566747676546734776557
655756675670289095780327-03-039780-6-08039--=9-9-==--3958038557
65757575677647446846516749845198465198798646514651649867
64746776467474776654465349874546+8498544864864989949467
765765764677647647766418977494849548949584948467994469947
456419784494945949987849869498964998409496984968*48840498498
67747675766746747567489+6784676489597944+4938775486417647898877
4767547474574432161890759079587094074838907908576089476764
4675476547654764342925802769087609849604679486907474655477
6745764747576545478959027806056790578639768947647647896
647474765476474674397302975092875290790750957895098798
435463656502990279026089576094587849076387895490789343
4564564566456324912678965895759540327502709549047079==908-
54645645665616546516+49657164651978615679844198416849654696546
56464645665159468944964949968499497849094089459840778994
76876876885875868841984948964896489648949874978494879499419
54656654646456654764645998499979489871907408949496499949
5465645654645645761984984879845948594949884794899646546
556454646546456545464646546456656344665434643466463446636646
5654645645654645629748698499489549947949849894496894984654645
CASE STUDY:
NIGERIAN SCAM
3424324242423456768679709780978858767463536464365463663
5443546546476355436676598769326576788679745664689789798
654643665475465754723673877698565466687443745848743737
4563464756487698787463598729857395462895895998546896790oj
77868658568756754635098q23nb23nhkngf0w74902377054750345089789775
346436464757568657547474754735365363458935790798579078897
45643654764754757574367466453646364645346576436454736745746
6546476454353984739027907550239708957039779034957985587
7577347982759027598407590240986769576895670945709657689575
988977899999999999999999868569694454764576867969709868678675
765766754549357902708957908374395789037394495708967089567
5675674534979006830939076987609837809678969800437908766
56776754597832589075907690769057690547690769876948709765
6757675676756508353-27689279087256768905470347698798657968590685789690
7657757656732905709275890709907985379854566747676546734776557
655756675670289095780327-03-039780-6-08039--=9-9-==--3958038557
65757575677647446846516749845198465198798646514651649867
64746776467474776654465349874546+8498544864864989949467
765765764677647647766418977494849548949584948467994469947
456419784494945949987849869498964998409496984968*48840498498
67747675766746747567489+6784676489597944+4938775486417647898877
4767547474574432161890759079587094074838907908576089476764
4675476547654764342925802769087609849604679486907474655477
6745764747576545478959027806056790578639768947647647896
647474765476474674397302975092875290790750957895098798
435463656502990279026089576094587849076387895490789343
4564564566456324912678965895759540327502709549047079==908-
54645645665616546516+49657164651978615679844198416849654696546
56464645665159468944964949968499497849094089459840778994
76876876885875868841984948964896489648949874978494879499419
54656654646456654764645998499979489871907408949496499949
5465645654645645761984984879845948594949884794899646546
556454646546456545464646546456656344665434643466463446636646
5654645645654645629748698499489549947949849894496894984654645
conclusion
Conclusion
•- Cyber Forensics
•- Special tribunals
•- 5P mantra
INTERACTIVE SESSIONAny questions, suggestions, compliments, etc.?
Sl. No. State/UT Cases Registered
IT Act IPC Section
(1) (2) (3) (4)
STATES:
1 ANDHRA PRADESH 8 253
2 ARUNACHAL PRADESH 0 0
3 ASSAM 2 0
4 BIHAR 0 0
5 CHHATTISGARH 0 0
6 GOA 4 4
7 GUJARAT 1 249
8 HARYANA 2 0
9 HIMACHAL PRADESH 0 99
10 JAMMU & KASHMIR 1 0
11 JHARKHAND 0 0
12 KARNATAKA 15 0
13 KERALA 3 1
14 MADHYA PRADESH 0 0
15 MAHARASHTRA 12 1
16 MANIPUR 0 0
17 MEGHALAYA 0 0
18 MIZORAM 0 0
19 NAGALAND 0 0
20 ORISSA 4 0
21 PUNJAB 3 26
22 RAJASTHAN 0 0
23 SIKKIM 0 0
24 TAMIL NADU 3 0
25 TRIPURA 0 0
26 UTTAR PRADESH 5 81
27 UTTARANCHAL 0 0
28 WEST BENGAL 0 0
TOTAL (STATES) 63 714
UNION TERRITORIES:
29 A & N ISLANDS 0 15
30 CHANDIGARH 2 0
31 D & N HAVELI 0 0
32 DAMAN & DIU 0 7
33 DELHI 5 2
34 LAKSHADWEEP 0 0
35 PONDICHERRY 0 0
TOTAL (UTs) 7 24
TOTAL (ALL-INDIA) 70 738
Back
Sl.No. State/UT Below 18 years Between 18 – 30 years
Between 30 – 45 years
Between 45 – 60 years
Above 60 years
Total
(1) (2) (3) (4) (5) (6) (7) (8)
STATES:
1 ANDHRA PRADESH 0 2 3 0 0 5
2 ARUNACHAL PRADESH 0 0 0 0 0 0
3 ASSAM 0 2 0 0 0 2
4 BIHAR 0 0 0 0 0 0
5 CHHATTISGARH 0 0 0 0 0 0
6 GOA 0 0 0 0 0 0
7 GUJARAT 0 0 0 0 0 0
8 HARYANA 0 1 0 0 0 1
9 HIMACHAL PRADESH 0 0 0 0 0 0
10 JAMMU & KASHMIR 0 1 0 0 0 1
11 JHARKHAND 0 0 0 0 0 0
12 KARNATAKA 0 11 3 0 0 14
13 KERALA 0 1 0 1 0 2
14 MADHYA PRADESH 0 0 0 0 0 0
15 MAHARASHTRA 0 8 2 0 0 10
16 MANIPUR 0 0 0 0 0 0
17 MEGHALAYA 0 0 0 0 0 0
18 MIZORAM 0 0 0 0 0 0
19 NAGALAND 0 0 0 0 0 0
20 ORISSA 0 4 1 0 0 5
21 PUNJAB 1 0 3 2 0 6
22 RAJASTHAN 0 0 0 0 0 0
23 SIKKIM 0 0 0 0 0 0
24 TAMIL NADU 0 1 1 0 0 2
25 TRIPURA 0 0 0 0 0 0
26 UTTAR PRADESH 0 11 0 0 1 12
27 UTTARANCHAL 0 0 0 0 0 0
28 WEST BENGAL 0 0 0 0 0 0
TOTAL (STATES) 1 42 13 3 1 60
UNION TERRITORIES:
29 A & N ISLANDS 0 0 0 0 0 0
30 CHANDIGARH 0 0 0 0 0 0
31 D & N HAVELI 0 0 0 0 0 0
32 DAMAN & DIU 0 0 0 0 0 0
33 DELHI 0 4 1 0 0 5
34 LAKSHADWEEP 0 0 0 0 0 0
35 PONDICHERRY 0 0 0 0 0 0
Back
TOTAL (UTs) 0 4 1 0 0 5
TOTAL (ALL-INDIA) 1 46 14 3 1 65