1. Cyber Crimes in India:
Present Status & Proposed Reforms
drneetaa@gmail.com
2. Cyber Crimes
• Combination of Crime and Computer is ‘Cyber Crime’.They are of two types:
• Computer as aWeapon
• Credit Card Frauds
• IPRViolations
• Pornography
• DrugTrafficking
• HumanTrafficking
• Computer as aTarget
• Phishing
• Hacking
• Virus/Worm Attacks
3. Common Cyber-crimes
• Common Cyber-crime scenarios
• Harassment via fake public profile on social networking site
• Online Hate Community
• Email Account Hacking
• Credit Card Fraud
• Web Defacement
• IntroducingViruses,Worms, Backdoors, Rootkits,Trojans, Bugs
• CyberTerrorism
• Online sale of illegal Articles
• Cyber Pornography
• Phishing and Email Scams
• Theft of Confidential Information
• Source CodeTheft
• Tax Evasion and Money Laundering
• Online ShareTrading Fraud
7. Hypothesis
• All the cyber crimes are NOT intimated to the cyber police in India.
• All cyber crimes are NOT properly investigated (and charge sheeted) by cyber police.
• All cyber cases brought before the court are NOT properly handled by court.
• All cyber criminals are NOT prosecuted by court because of technical problems.
• The general public is NOT aware of types of cyber crimes and how to protect themselves from
cyber crimes.
• The Indian cyber police are NOT trained to handle cyber crimes effectively.
• The Indian cyber police are NOT equipped to handle cyber crimes effectively.
• The Indian law courts (and its officials) are NOT trained to handle cyber crimes effectively.
• The Indian law courts (and it’s officials) are NOT equipped to handle cyber crimes effectively.
• The Indian government has NOT been able to effectively handle and control
9. IT Act 2000
IT Legation deals with :
Legal Regal Recognition of Electronic Documentation
Legal Recognition of Digital Signature
Offenses and Contraventions
Justice Dispensation Systems forCyber Crimes
10. Provisions of IT Act 2000
• Email would now be a valid and legal form of communication
• Companies shall now be able to carry out electronic commerce using the legal
infrastructure
• Digital signatures have been given legal validity and sanction in the Act.
• Corporate companies will be in the business of being Certifying Authorities for
issuing Digital Signatures Certificates.
• Allows Government to issue notification on the web thus heralding e- governance.
• Companies can file any form, application or any other document with any office,
authority, body or agency owned or controlled by the appropriate Government in
electronic form
• A monetary damage, not exceeding Rs.1 crore; if anyone breaks into the computer
systems or network and cause loss.The damages or copies data.
11. Specific Exclusion(s)
• In the following cases, the IT Act is not applicable.:
• Negotiable instrument (other than a cheque) as per section 13 of Negotiable
Instruments Act 1881
• A power-of attorney as defined in section 1A of the Powers-of-AttorneyAct, 18882
• A trust as defined in section 3 of IndianTrusts Act, 1882
• A will as defined in clause (h) of section 2 of the Indian SuccessionAct 1925 including
any other testamentary disposition
12. Amendments as per IT Act 2008
• The following departments were included :
• Telecom Services
• Network Services
• Internet Services
• Web Hosting Services
13. Salient Features of IT Act 2008
• Focus of Data Privacy
• Focus on Information Security
• Defining Cyber Cafe
• Making digital signature technology neutral
• Defining reasonable security practices to be followed by Corporate
• Redefining the role of intermediaries
• Recognizing the role of Indian Computer Emergency ResponseTeam
• Inclusion of some additional cyber crimes like child pornography and cyber
terrorism
• Authorizing an inspector to investigate cyber offenses
14. LIMITATIONS
• While enough teeth have been given by the Law, yet, due to lack of intent,
meticulous planning and knowledge of Hi-tech intricacies, the offenders
slip away from the clutches of Law.To overcome a HiTech Intelligent Task
Force (HTITF)is required.
• There is a lot of scope for automation and Artificial Intelligence, who can
scan the 24 hr, 365 day video captured data?We need Big Data Analytics
and AI based algorithms to assist us.
18. • Preparing a data Bank with photographs, descriptions and relevant important
information about anti-national elements.
• Keeping strict vigil on printing /distribution of literature pamphlets,
magazines and propaganda on electronic media to prevent anti-national
designs of ISI.
• Preparing updated information system, incorporating the latest details about
membership, foreign linkages, weapons, transport, bank accounts, lockers,
passports, associates in the bureaucracy, e- mail accounts, mobile phone
numbers, fax and other phone numbers, etc.
• Movement pattern Identification
General Strategy
19. • Having constant interaction with chartered accountants, I.T. department,
brokers of the stock exchange, property dealers etc. to keep a close watch on
the financial activities of the key players.
• Keeping a close watch on the activities of the hardcore gangsters, public
servants, politicians, support groups, by effective physical surveillance and
telephone & mail interception.
• Identification of financial transactions that appear to launder funds. Havala
and trans border financial activity, foreign funding put to a closer scrutiny.
General Strategy
20. TECHNICAL INTELLIGENCE
Technology at the state level and experts to intercept terrorist e-mails, satellite phone calls and monitor
banking channels
WHAT NEEDS TO BE DONE
21. Challenges of Big Data Analytics
• Format variation of data
• Fast moving streaming data
• Highly distributed Input source
• High dimensionally of data
• Trust worthiness of data analytics
• Noisy or Poor quality of data
• Scalability of algorithm
• Feature extraction
• Imbalance input data
• Inadequate data storage
• Unsummarized & uncategorized data
• Data indexing & classification
• Fast information retrieval.
22. Challenges Ahead of Cyber Crime
• Can we balance data collection for the purpose of national security with
privacy concerns?
• How can we stop the crime to happen?
• What can be done to mitigate the risks of false positives?
• How do we translate the insights into operational relevance?
24. Finally….
• We need very intelligent, passionate and committed cyber workforce.
• Rate Cyber policing very coveted
• Admire them
25. Bibliography
• www.terrorism.com
• www.siteinstitute.org
• www.counterterrorismblog.org
• www.e-prism.org
• www.jamestown.org
• www.alemarah.org
• Deep learning applications and challenges in big data analytics Najafabadi et.al., Journal of
Big Data, Springer, 2016
• Big data classification: Problems and challenges in network intrusion prediction with machine
learning, Suthaharan, Pittsburg, 2013
• Training products of Experts by minimizing contrastive divergence, Hinton G, Neural
Compute, 2002