1. Cyber Crime
• Various Types of Cyber Crime:
• Phishing : By using e-mail messages which completely
resembles the original mail messages of customers,
hackers can ask for verification of certain information,
like account numbers or passwords etc. here customer
might not have knowledge that the e-mail messages
are deceiving and would fail to identify the originality
of the messages, this results in huge financial loss
when the hackers use that information for fraudulent
acts like withdrawing money from customers account
without him having knowledge of it
2. Role of IT Act in Ecommerce
• The IT Act 2000 empowers the government
departments to accept filing, creating and retention
of official documents in the digital format
• From the perspective of e-commerce in India, the IT
Act 2000 and its provisions contain many positive
aspects. Firstly, the implications of these provisions for
the e-businesses would be that email would now be a
valid and legal form of communication in our country
that can be duly produced and approved in a court of
law.
3. • Case: Techie’s wife loses Rs.11 lakh to
phishing, ends life.
• In January 2016, in what is said to be the first
case of its kind, a phishing scam has claimed
the life of a 44-year-old woman in the city's
police limits.
4. • Hacking: Basically it’s trying to get into
computer systems in order to steal , corrupt,
or illegitimately view data. Hacking in simple
terms means an illegal intrusion into a
computer system and/or network. Hackers
write or use ready-made computer programs
to attack the target computer. They possess
the desire to destruct and they get the kick
out of such destruction.
5. • Case : Former Air India employee arrested for
hacking the airlines website, illegally selling
tickets
• July 2016, Anitesh Goswami, a former employee
hacked the airline’s website and obtained tickets
by redeeming miles of members of the Flying
Returns programme. He has been booked under
the IT Act. He is an IT expert and was well versed
with the functioning of the intranet and internet
based systems of Air India.
6. • Cyber Stalking : Cyberstalking is a crime in
which the attacker harasses a victim using
electronic communication, such as e-
mail or instant messaging (IM), or messages
posted to a Web site or a discussion group.
7. • Case: Cyber stalker accused of sending
obscene messages to over 2000 women
arrested
• July 7, 2016 Delhi Police arrested a 31-year-
old named Mohammad Khalid on charges of
sending obscene messages and pornographic
video clips to over 2000 women in New Delhi
following a complaint from a woman residing
at Ashok Vihar
8. • Child Pornography: Cyber pornography is
believed to be one of the largest businesses
on the Internet today. The millions of
pornographic websites that flourish on the
Internet are testimony to this. The Internet is
being highly used by its abusers to reach and
abuse children sexually, worldwide.
9. • Virus Dissemination: Viruses stop the normal
function of the system programs and also to
the whole computer system. They can also
ruin/mess up your system and render it
unusable without reinstallation of the
operating system
10. • Salami attacks : These attacks are used for the
commission of financial crimes. The key here is to
make the alteration so insignificant that in a
single case it would go completely unnoticed. E.g.
a bank employee inserts a program, into the
bank’s servers, that deducts a small amount of
money (say Rs. 5 a month) from the account of
every customer. No account holder will probably
notice this unauthorized debit, but the bank
employee will make a sizable amount of money
every month.
11. • Sale of illegal articles : This category of cyber
crimes includes sale of narcotics, weapons and
wildlife etc., by posting information on
websites, auction websites, and bulletin
boards or simply by using email
communication.
• Online gambling : There are millions of
websites; all hosted on servers abroad, that
offer online gambling.
12. • Forgery : Computers, printers and scanners are
used to forge counterfeit currency notes, postage
and revenue stamps, mark sheets etc. These are
made using computers, and high quality scanners
and printers.
• Credit Card Fraud: Credit card frauds are the
scams committed using others’ card in a
fraudulent way. It is the case where one’s card is
used without their knowledge or authorization to
purchase goods or services
13. • Case: 50 year old duped twice in credit card
fraud.
• July 10, 2016. A 50 year old man was duped
twice by unidentified suspects. After learning
about an unknown transaction worth over Rs
12,250 on his credit card, was done by some
unidentified suspects, he contacted the bank
requesting to block his card. But to his dismay, a
few days later he got another message regarding
a transaction made on his credit card was used
for shopping worth Rs 89,899.
14. Emerging Trends of Cyber Law
• Stringent regulatory rules are put in place by
many countries to prevent unauthorized
access to networks. Such acts are declared as
penal offences.
• Stakeholders of the mobile companies will call
upon the governments of the world to
reinforce cyber-legal systems and
administrations to regulate the emerging
mobile threats and crimes
15. • Cloud computing is another major growing
trend. With more advances in the technology,
huge volumes of data will flow into the cloud
which is not completely immune to cyber-
crimes.
• The growth of Bitcoins and other virtual
currency is yet another trend to watch out for.
Bitcoin crimes are likely to multiply in the near
future.
17. E- Governance
• e-Governance is basically associated with
carrying out the functions and achieving the
results of governance through the utilization
of ICT (Information and Communications
Technology).
Through e-governance, government services
will be made available to citizens in a
convenient, efficient and transparent manner.
18. • Government to Citizen:
• Computerization of Land Records : Ensuring
landowners get computerized copies of
ownership, crop and tenancy and updated
copies of Record of Rights on demand
19. • Government to Business:
• MCA 21 : By the Ministry of Corporate Affairs,
the project aims at providing easy and secure
online access to all registry related services
provided by the Union Ministry of Corporate
Affairs
20. • No clear provision for handling of domain name issues.
• It is covered into the civil procedure.
• There are not any clear provision.
• CASE : 2012: First PIL filed by a law student Shreya
Singhal seeking amendent in section 66A, after two
girls Shaheen Dhada and Rinu Shrinivasan were
arrested in Palghar in Thane district as one of them
posted a commect against the shut down in Mumbai
following the Shiv Sena Leader Bal Thackery’s death
and the other “liked” it.
21. • Section 43: Penalty and Compensation for Damage to
Computer, computer system etc.
• If any person without permission of the owner or any
other person who is in-charge of a computer, computer
system or computer network
• accesses or secures access to such computer, computer
system or computer network or computer resource
(ITAA2008)
• downloads, copies or extracts any data, computer data
base or information from such computer, computer
system or computer network including information or
data held or stored in any removable storage medium
22. • Case: Mphasis BPO Fraud, 2005.
• In December 2004, four call centre employees
working at an outsourcing facility operated by
MphasiS in India obtained PIN codes of 4
customers of Mphasis’ client, CitiGroup. They
were not authorised and yet they opened
accounts at Indian banks using false identities.
They transferred money from the bank accounts
of CitiGroup customers to their new accounts
with the Indian Banks. April 2005, they were
caught by the police on the basis of a tip off.
23. • Section 66 : Computer Related Offences
amended vide Information Technology
Amendment Act 2008 reads as under:
• If any person, dishonestly, or fraudulently,
does any act referred to in section 43, he shall
be punishable with imprisonment for a term
which may extend to two three years or with
fine which may extend to five lakh rupees or
with both.
24. • Section 66C – Punishment of Identity Theft
• Whoever, fraudulently or dishonestly make
use of the electronic signature, password or
any other unique identification feature of any
other person, shall be punished with
imprisonment of either description for a term
which may extend to three years and shall also
be liable to fine which may extend to rupees
one lakh
25. • Case: Man posing as actor held for Blackmailing
aspiring models:
• June 29, 2016. The cyber cell of the local police
arrested a man for allegedly luring aspiring models by
posing as renowned Punjabi actor Darshan Aulakh. The
accused was also allegedly blackmailing the models
and minting money from them on the pretext of giving
them roles in movies and music albums. The actor
lodged a complaint alleging that somebody was
misusing his name and misleading models by using the
name of Darshan Aulakh Productions.
26. • Section 66 D - Punishment for cheating by
personation by using computer resource
• Whoever, by means of any communication
device or computer resource cheats by
personation, shall be punished with
imprisonment of either description for a term
which may extend to three years and shall also
be liable to fine which may extend to one lakh
rupees
27. • Section 66E : Punishment for violation of privacy
• Whoever, intentionally or knowingly captures,
publishes or transmits the image of a private area
of any person without his or her consent, under
circumstances violating the privacy of that
person, shall be punished with imprisonment
which may extend to three years or with fine not
exceeding two lakh rupees, or with both
28. • Case: Man held for taking nude photos of aunt.
• July 18, 2016. Colaba police arrested a 32-year old man for
allegedly forcing his aunt to establish physical relationship
with him, clicking her nude photograph and threatening to
make her photograph viral if she did not comply to his
demands. The accused sent the victim's nude photograph
to her husband's mobile phone. When the husband
confronted her, she narrated her entire ordeal to him. The
husband complained to the Police and the accused was
caught while he was on the run by Immigration Authorities
and was booked under sections 66E (punishment for
violation of privacy) and 67A (punishment for publishing or
transmitting of material containing sexually explicit act in
electronic form) of the Information Technology Act.
29. • Section 66F : Punishment for cyber terrorism:
• Whoever,-
• (A) with intent to threaten the unity, integrity,
security or sovereignty of India or to strike
terror in the people or any section of the
people