SlideShare a Scribd company logo
1 of 15
NAME – ANKUSH
REG. NO. – 12108390
ROLL NO. – RL2103A06
B.A. LL.B. HONOURS
LAW228
STUDENT CENTRIC
ACTIVITIES III
ETP VIVA PRESENTATION
“CYBERCRIME: WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL
PLAYGROUND"
INTRODUCTI
ON
 Cybercrime is a growing concern in the modern digital world.
 It refers to criminal activity that involves the use of computer
systems or networks.
 Cybercrime takes many forms, including hacking, identity theft,
and financial fraud.
 The impact of cybercrime can range from financial loss to physical
harm and national security threats.
 Cybercrime poses unique challenges for law enforcement due to
its anonymous and cross-jurisdictional nature.
 As cybercrime continues to grow, it is essential to understand the
risks and take steps to protect ourselves and our digital assets.
 Lawmakers and law enforcement agencies must work together to
combat cybercrime and hold perpetrators accountable.
 Cybercrime is a socio-legal issue that affects both society and the
law.
EVOLUTION OF CYBERCRIMES IN INDIA
 Cybercrime in India emerged in the 1990s with the growth of the internet and the
adoption of technology in businesses and government.
 In 2000, the Information Technology Act (IT Act) was passed, which provided legal
recognition to electronic documents and digital signatures and established provisions
for cybercrime prevention and punishment.
 The IT Act was amended in 2008 to broaden its scope and increase penalties for
cybercrime offenses such as hacking, identity theft, and cyber terrorism.
 Over the years, there have been several high-profile cybercrime cases in India,
including the 2016 breach of over 3 million debit cards from Indian banks.
 The government has taken steps to strengthen India's cybersecurity, including
launching the National Cyber Security Policy in 2013 and establishing the National
Cyber Coordination Centre (NCCC) in 2017.
 However, despite these efforts, cybercrime continues to be a significant problem in
India, with increasing incidents of online financial fraud, cyberbullying, and
cyberstalking.
 The COVID-19 pandemic has also resulted in a rise in cybercrime, with criminals
exploiting vulnerabilities in remote working and online transactions.
TYPES OF CYBER CRIMES IN INDIA
 Hacking: Unauthorized system access
 Phishing: Fraudulent emails/websites
 Identity theft: Personal info theft
 Online financial fraud: Internet-based deception
 Cyberstalking/harassment: Online harassment
 Illegal content distribution: Unlawful content
sharing
 Cyberbullying: Online intimidation
 Cyber espionage: Sensitive data theft
 Cyber terrorism: Tech-based terrorism
 Ransomware: Malware extortion
 DoS attacks: Network overload
MOTIVES BEHIND CYBERCRIMES
WHY DO HACKERS HACK ?
Financial gain: Money motive
Political/ideological reasons: Agenda-driven
Revenge: Retaliation factor
For Publicity
Thrill-seeking: Excitement motive
Espionage: Competitive advantage
Intellectual challenge: Recognition &
Achievement
Cyberbullying: Personal reasons
Access to personal information: Identity theft
motive
DARK WEB AND
CYBERCRIMES
 The Dark Web is an unindexed part of the internet only
accessible using specialized software.
 Criminals use the anonymity of the Dark Web for illegal
activities, including cybercrime such as hacking and
malware distribution.
 Cybercrime on the Dark Web is a significant threat as it
allows criminals to evade law enforcement.
 Cybercrime on the Dark Web is difficult to track and
investigate due to encryption and cryptocurrency use.
 Criminals use the Dark Web to sell stolen data, such as
credit card information, and to conduct illegal transactions,
such as drug and weapon sales.
IMPACT OF CYBERCRIMES ON SOCIETY
Financial loss - Loss of money
Privacy invasion - Breach of privacy
Psychological impact - Mental stress
National security threats - Threat to security
Damage to reputation - Loss of credibility
Increase in online scams - Rise in fraud
Impact on employment - Job loss
Disruption of critical services - Service
interruption
Hindrance to digitalization - Digital setback
CYBERCRIME PREVENTION STRATEGIES IN
INDIA
 Cyber Swachhta Kendra: It is an initiative launched by the Indian government to provide free tools and software to
remove malware and viruses from computer systems.
 Cyber Crime Reporting Portal: The government has set up a portal where individuals can report cybercrime incidents
and seek help.
 Cyber Forensic Labs: The government has set up several cyber forensic labs across the country to investigate and solve
cybercrime cases.
 National Cyber Coordination Centre: The government has set up a center to monitor and respond to cyber threats in
real-time.
 Cybersecurity Awareness Programs: The government conducts awareness programs to educate individuals and
organizations about cyber threats and preventive measures.
 National Cyber Security Policy: The government has formulated a national cybersecurity policy to protect critical
infrastructure and combat cybercrime.
 Cybercrime Investigation Cells: The government has set up specialized investigation cells to tackle cybercrime cases.
 Cybersecurity Standards: The government has introduced cybersecurity standards for critical sectors such as banking,
telecom, and power to ensure the security of digital infrastructure.
 Cybersecurity Cooperation with other countries: The government collaborates with other countries to combat cross-
A CYBER FORENSIC LAB IN RIBANDAR, GOA
INTERNATIONAL COOPERATION IN
FIGHTING CYBERCRIMES
 Mutual Legal Assistance Treaties (MLATs): India signed
MLATs with various countries to facilitate international
cooperation in investigating and prosecuting cybercrime.
 INTERPOL: India is a member of INTERPOL, which helps
member countries to cooperate and share information to prevent
and combat cybercrime
 Cybersecurity Dialogue: India holds cybersecurity dialogues
with various countries to enhance cooperation on cybersecurity,
sharing best practices, exchanging information, and building
trust.
 Global Conferences and Workshops: India participates in
various global conferences and workshops on cybersecurity and
cybercrime prevention to share experiences, exchange ideas,
and build partnerships.
 Joint Investigations: India conducts joint investigations with
other countries to share expertise, resources, and information to
successfully prosecute cybercriminals.
LEGISLATIVE
RESPONSE
 Information Technology Act, 2000: This Act provides a legal framework for e-commerce and governs the use of
computers, computer networks, and communication devices. The Act also includes provisions to deal with various
cyber crimes, such as hacking, data theft, cyberstalking, and cyber terrorism.
 The Indian Penal Code (IPC): The IPC was amended in 2013 to include several new offenses related to cybercrime,
such as identity theft, cyber stalking, and unauthorized access to computer systems.
 The Criminal Procedure Code (CrPC): The CrPC was amended in 2008 to include provisions for the investigation
and prosecution of cyber crimes.
 National Cyber Security Policy, 2013: The policy provides a comprehensive framework for addressing various cyber
threats and outlines measures to be taken to enhance the security of the country's cyberspace.
 The Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016: This Act
provides a legal framework for the use of the Aadhaar number, a 12-digit unique identification number, and sets out
the rules for the collection, storage, and sharing of personal information.
 The Prevention of Money Laundering Act, 2002: The Act provides for the prevention, detection, and prosecution of
money laundering offenses, including those committed through the use of computers or the internet.
 The IT (Amendment) Act, 2008: The amendment to the IT Act expanded the scope of cybercrime to include new
offenses such as phishing, pharming, and identity theft.
IMPORTANT PROVISIONS UNDER THE
CONSTITUTION
INFORMATION TECHNOLOGY ACT, 2000:
• Section 43: Penalty for unauthorized access to computer systems, data, or networks.
• Section 66: Penalty for hacking.
• Section 66A: Penalty for sending offensive messages through communication services.
• Section 66B: Penalty for dishonestly receiving stolen computer resources or communication devices.
• Section 66C: Penalty for identity theft.
• Section 66D: Penalty for cheating by personation by using a computer resource.
• Section 66E: Penalty for violation of privacy.
THE PREVENTION OF MONEY LAUNDERING ACT, 2002:
• Section 3: Punishment for money laundering.
INDIAN PENAL CODE:
• Section 420: Cheating and dishonestly inducing delivery of property.
• Section 463: Forgery.
• Section 465: Punishment for forgery.
• Section 468: Forgery for the purpose of cheating.
• Section 469: Forgery for purpose of harming reputation.
• Section 471: Using as genuine a forged document or electronic record.
• Section 506: Punishment for criminal intimidation.
THE AADHAAR (Targeted Delivery of Financial and Other Subsidies, Benefits and Services)
ACT, 2016:
• Section 29: Protection of information collected under Aadhaar.
• Section 37: Punishment for unauthorized access to the Central Identities Data Repository (CIDR).
JUDICIAL OUTLOOK
 Shreya Singhal v. Union of India (2015): The Supreme Court of India struck down Section 66A of the Information
Technology Act, 2000, which criminalized online speech that was deemed "offensive" or "menacing." The court held that
the provision was unconstitutional and violated the right to free speech.
 Vishal Kumar v. State of Rajasthan (2016): The Rajasthan High Court held that cyberstalking, which involves using the
internet to harass or intimidate someone, is a serious offense and can lead to punishment under the Indian Penal Code.
 State of Tamil Nadu v. Suhas Katti (2016): The Madras High Court held that creating a fake profile on social media and
posting offensive content can be considered an offense under the IT Act and the IPC.
 Shalu Ojha v. Prashant Ojha (2017): The Supreme Court held that a person can be prosecuted for cyberstalking even if
the victim has not specifically asked the offender to stop the harassing behavior.
 Google India Pvt. Ltd. v. Visakha Industries (2017): The Delhi High Court held that search engines such as Google
can be held liable for hosting defamatory content and ordered Google to remove the defamatory content from its search
results.
 Amazon Seller Services Pvt. Ltd. v. Amway India Enterprises Pvt. Ltd. (2019): The Supreme Court held that e-
commerce platforms can be held liable for selling counterfeit goods and ordered Amazon to stop selling counterfeit
products on its platform.
CONCLUSION &
SUGGESTIONS
• Cybercrime is a significant threat to India's security, economy, and society, with incidents on the rise in recent
years.
• The Indian government has taken steps to address cybercrime through legislation, specialized agencies, and
international cooperation, but more needs to be done.
SUGGESTIONS:
• Increase funding for cybersecurity initiatives, including research and development of new technologies to
combat cyber threats.
• Develop a national cybersecurity strategy and action plan to guide efforts to prevent and combat cybercrime.
• Strengthen the capacity of law enforcement agencies to investigate and prosecute cybercrime cases by
providing specialized training, tools, and resources.
• Promote greater collaboration and information sharing among stakeholders, including government agencies,
private sector organizations, and civil society groups.
• Raise awareness among individuals and organizations about the risks of cybercrime and how to protect
themselves from cyber threats.

More Related Content

Similar to CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND

Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdfkratoskkd
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securityMehediHasan996
 
138740042-cyber-law.pptx
138740042-cyber-law.pptx138740042-cyber-law.pptx
138740042-cyber-law.pptxRahuljain40418
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importanceAditya Shukla
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Jayati Tiwari
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p ptHemant
 
Law ppt final
Law ppt   finalLaw ppt   final
Law ppt final79850
 
Cyber security by nayan pandey
Cyber security by nayan pandeyCyber security by nayan pandey
Cyber security by nayan pandeyRithikaD1
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistanSajeel Bhatti
 

Similar to CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND (20)

Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
CYBERCRIME VICTIMS
CYBERCRIME VICTIMSCYBERCRIME VICTIMS
CYBERCRIME VICTIMS
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
138740042-cyber-law.pptx
138740042-cyber-law.pptx138740042-cyber-law.pptx
138740042-cyber-law.pptx
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
Cyber crime-in-bangladesh
Cyber crime-in-bangladesh Cyber crime-in-bangladesh
Cyber crime-in-bangladesh
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
 
IT ACT-OVERVIEW
IT ACT-OVERVIEWIT ACT-OVERVIEW
IT ACT-OVERVIEW
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p pt
 
Law ppt final
Law ppt   finalLaw ppt   final
Law ppt final
 
Pre itact
Pre itactPre itact
Pre itact
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
 
Cyber security by nayan pandey
Cyber security by nayan pandeyCyber security by nayan pandey
Cyber security by nayan pandey
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber .pptx
cyber .pptxcyber .pptx
cyber .pptx
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 

CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND

  • 1. NAME – ANKUSH REG. NO. – 12108390 ROLL NO. – RL2103A06 B.A. LL.B. HONOURS LAW228 STUDENT CENTRIC ACTIVITIES III ETP VIVA PRESENTATION “CYBERCRIME: WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND"
  • 2. INTRODUCTI ON  Cybercrime is a growing concern in the modern digital world.  It refers to criminal activity that involves the use of computer systems or networks.  Cybercrime takes many forms, including hacking, identity theft, and financial fraud.  The impact of cybercrime can range from financial loss to physical harm and national security threats.  Cybercrime poses unique challenges for law enforcement due to its anonymous and cross-jurisdictional nature.  As cybercrime continues to grow, it is essential to understand the risks and take steps to protect ourselves and our digital assets.  Lawmakers and law enforcement agencies must work together to combat cybercrime and hold perpetrators accountable.  Cybercrime is a socio-legal issue that affects both society and the law.
  • 3. EVOLUTION OF CYBERCRIMES IN INDIA  Cybercrime in India emerged in the 1990s with the growth of the internet and the adoption of technology in businesses and government.  In 2000, the Information Technology Act (IT Act) was passed, which provided legal recognition to electronic documents and digital signatures and established provisions for cybercrime prevention and punishment.  The IT Act was amended in 2008 to broaden its scope and increase penalties for cybercrime offenses such as hacking, identity theft, and cyber terrorism.  Over the years, there have been several high-profile cybercrime cases in India, including the 2016 breach of over 3 million debit cards from Indian banks.  The government has taken steps to strengthen India's cybersecurity, including launching the National Cyber Security Policy in 2013 and establishing the National Cyber Coordination Centre (NCCC) in 2017.  However, despite these efforts, cybercrime continues to be a significant problem in India, with increasing incidents of online financial fraud, cyberbullying, and cyberstalking.  The COVID-19 pandemic has also resulted in a rise in cybercrime, with criminals exploiting vulnerabilities in remote working and online transactions.
  • 4. TYPES OF CYBER CRIMES IN INDIA  Hacking: Unauthorized system access  Phishing: Fraudulent emails/websites  Identity theft: Personal info theft  Online financial fraud: Internet-based deception  Cyberstalking/harassment: Online harassment  Illegal content distribution: Unlawful content sharing  Cyberbullying: Online intimidation  Cyber espionage: Sensitive data theft  Cyber terrorism: Tech-based terrorism  Ransomware: Malware extortion  DoS attacks: Network overload
  • 5. MOTIVES BEHIND CYBERCRIMES WHY DO HACKERS HACK ? Financial gain: Money motive Political/ideological reasons: Agenda-driven Revenge: Retaliation factor For Publicity Thrill-seeking: Excitement motive Espionage: Competitive advantage Intellectual challenge: Recognition & Achievement Cyberbullying: Personal reasons Access to personal information: Identity theft motive
  • 6. DARK WEB AND CYBERCRIMES  The Dark Web is an unindexed part of the internet only accessible using specialized software.  Criminals use the anonymity of the Dark Web for illegal activities, including cybercrime such as hacking and malware distribution.  Cybercrime on the Dark Web is a significant threat as it allows criminals to evade law enforcement.  Cybercrime on the Dark Web is difficult to track and investigate due to encryption and cryptocurrency use.  Criminals use the Dark Web to sell stolen data, such as credit card information, and to conduct illegal transactions, such as drug and weapon sales.
  • 7. IMPACT OF CYBERCRIMES ON SOCIETY Financial loss - Loss of money Privacy invasion - Breach of privacy Psychological impact - Mental stress National security threats - Threat to security Damage to reputation - Loss of credibility Increase in online scams - Rise in fraud Impact on employment - Job loss Disruption of critical services - Service interruption Hindrance to digitalization - Digital setback
  • 8. CYBERCRIME PREVENTION STRATEGIES IN INDIA  Cyber Swachhta Kendra: It is an initiative launched by the Indian government to provide free tools and software to remove malware and viruses from computer systems.  Cyber Crime Reporting Portal: The government has set up a portal where individuals can report cybercrime incidents and seek help.  Cyber Forensic Labs: The government has set up several cyber forensic labs across the country to investigate and solve cybercrime cases.  National Cyber Coordination Centre: The government has set up a center to monitor and respond to cyber threats in real-time.  Cybersecurity Awareness Programs: The government conducts awareness programs to educate individuals and organizations about cyber threats and preventive measures.  National Cyber Security Policy: The government has formulated a national cybersecurity policy to protect critical infrastructure and combat cybercrime.  Cybercrime Investigation Cells: The government has set up specialized investigation cells to tackle cybercrime cases.  Cybersecurity Standards: The government has introduced cybersecurity standards for critical sectors such as banking, telecom, and power to ensure the security of digital infrastructure.  Cybersecurity Cooperation with other countries: The government collaborates with other countries to combat cross-
  • 9. A CYBER FORENSIC LAB IN RIBANDAR, GOA
  • 10. INTERNATIONAL COOPERATION IN FIGHTING CYBERCRIMES  Mutual Legal Assistance Treaties (MLATs): India signed MLATs with various countries to facilitate international cooperation in investigating and prosecuting cybercrime.  INTERPOL: India is a member of INTERPOL, which helps member countries to cooperate and share information to prevent and combat cybercrime  Cybersecurity Dialogue: India holds cybersecurity dialogues with various countries to enhance cooperation on cybersecurity, sharing best practices, exchanging information, and building trust.  Global Conferences and Workshops: India participates in various global conferences and workshops on cybersecurity and cybercrime prevention to share experiences, exchange ideas, and build partnerships.  Joint Investigations: India conducts joint investigations with other countries to share expertise, resources, and information to successfully prosecute cybercriminals.
  • 11. LEGISLATIVE RESPONSE  Information Technology Act, 2000: This Act provides a legal framework for e-commerce and governs the use of computers, computer networks, and communication devices. The Act also includes provisions to deal with various cyber crimes, such as hacking, data theft, cyberstalking, and cyber terrorism.  The Indian Penal Code (IPC): The IPC was amended in 2013 to include several new offenses related to cybercrime, such as identity theft, cyber stalking, and unauthorized access to computer systems.  The Criminal Procedure Code (CrPC): The CrPC was amended in 2008 to include provisions for the investigation and prosecution of cyber crimes.  National Cyber Security Policy, 2013: The policy provides a comprehensive framework for addressing various cyber threats and outlines measures to be taken to enhance the security of the country's cyberspace.  The Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016: This Act provides a legal framework for the use of the Aadhaar number, a 12-digit unique identification number, and sets out the rules for the collection, storage, and sharing of personal information.  The Prevention of Money Laundering Act, 2002: The Act provides for the prevention, detection, and prosecution of money laundering offenses, including those committed through the use of computers or the internet.  The IT (Amendment) Act, 2008: The amendment to the IT Act expanded the scope of cybercrime to include new offenses such as phishing, pharming, and identity theft.
  • 12. IMPORTANT PROVISIONS UNDER THE CONSTITUTION INFORMATION TECHNOLOGY ACT, 2000: • Section 43: Penalty for unauthorized access to computer systems, data, or networks. • Section 66: Penalty for hacking. • Section 66A: Penalty for sending offensive messages through communication services. • Section 66B: Penalty for dishonestly receiving stolen computer resources or communication devices. • Section 66C: Penalty for identity theft. • Section 66D: Penalty for cheating by personation by using a computer resource. • Section 66E: Penalty for violation of privacy. THE PREVENTION OF MONEY LAUNDERING ACT, 2002: • Section 3: Punishment for money laundering.
  • 13. INDIAN PENAL CODE: • Section 420: Cheating and dishonestly inducing delivery of property. • Section 463: Forgery. • Section 465: Punishment for forgery. • Section 468: Forgery for the purpose of cheating. • Section 469: Forgery for purpose of harming reputation. • Section 471: Using as genuine a forged document or electronic record. • Section 506: Punishment for criminal intimidation. THE AADHAAR (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) ACT, 2016: • Section 29: Protection of information collected under Aadhaar. • Section 37: Punishment for unauthorized access to the Central Identities Data Repository (CIDR).
  • 14. JUDICIAL OUTLOOK  Shreya Singhal v. Union of India (2015): The Supreme Court of India struck down Section 66A of the Information Technology Act, 2000, which criminalized online speech that was deemed "offensive" or "menacing." The court held that the provision was unconstitutional and violated the right to free speech.  Vishal Kumar v. State of Rajasthan (2016): The Rajasthan High Court held that cyberstalking, which involves using the internet to harass or intimidate someone, is a serious offense and can lead to punishment under the Indian Penal Code.  State of Tamil Nadu v. Suhas Katti (2016): The Madras High Court held that creating a fake profile on social media and posting offensive content can be considered an offense under the IT Act and the IPC.  Shalu Ojha v. Prashant Ojha (2017): The Supreme Court held that a person can be prosecuted for cyberstalking even if the victim has not specifically asked the offender to stop the harassing behavior.  Google India Pvt. Ltd. v. Visakha Industries (2017): The Delhi High Court held that search engines such as Google can be held liable for hosting defamatory content and ordered Google to remove the defamatory content from its search results.  Amazon Seller Services Pvt. Ltd. v. Amway India Enterprises Pvt. Ltd. (2019): The Supreme Court held that e- commerce platforms can be held liable for selling counterfeit goods and ordered Amazon to stop selling counterfeit products on its platform.
  • 15. CONCLUSION & SUGGESTIONS • Cybercrime is a significant threat to India's security, economy, and society, with incidents on the rise in recent years. • The Indian government has taken steps to address cybercrime through legislation, specialized agencies, and international cooperation, but more needs to be done. SUGGESTIONS: • Increase funding for cybersecurity initiatives, including research and development of new technologies to combat cyber threats. • Develop a national cybersecurity strategy and action plan to guide efforts to prevent and combat cybercrime. • Strengthen the capacity of law enforcement agencies to investigate and prosecute cybercrime cases by providing specialized training, tools, and resources. • Promote greater collaboration and information sharing among stakeholders, including government agencies, private sector organizations, and civil society groups. • Raise awareness among individuals and organizations about the risks of cybercrime and how to protect themselves from cyber threats.