SlideShare a Scribd company logo
NEW FORMS OF CYBER
CRIMES (PART-I)
MOHAMMED HAROON RASHEED
B.A.LL.B (Hons.), B.S.W., LL.M, PGDCLCF, PGDADR
ADVOCATE & ARBITRATOR (I.I.A.M.)
Contact: +91-9686034210 / adv.mdharoon@gmail.com
23-02-2023 1
(c) Adv. Md. Haroon Rasheed (Contact: 9686034210 / adv.mdharoon@gmail.com)
CYBER CRIME
• Cyber Can be Traced Back to the 40s
• Before there was cyberpunk or cybersecurity, there was cybernetics. In the late 1940s,
cybernetics arose as the study of control systems and communications between people and
machines. Today, it has evolved into a transdisciplinary approach to regulatory systems.
Cybernetics influences game, system, and organizational theory.
• Cybernetics derives from the Greek kubernētēs, which refers to a pilot or steersman. Related
is the Greek word kubernēsis which means “the gift of governance” and applies to leadership.
Because the study of cybernetics involves the fields of computer science, engineering, and
biology and their advancements, it calls to mind all things futuristic.
• Cyber can be attached to almost anything to make it sound futuristic or technical, but its
origins are ancient: it can be found in Greek translations of the Old Testament.
Source: https://www.ciso.inc/blog-posts/origin-
cyber/#:~:text=Cyber%20Can%20be%20Traced%20Back%20to%20the%2040s&text=Cybernetics%20influences%20game%2C%20system%2C%20and,governance%E2%80%9D%20and%20applies%20to%20leade
rship.
23-02-2023 2
(c) Adv. Md. Haroon Rasheed (Contact: 9686034210 / adv.mdharoon@gmail.com)
Crime
• In ordinary language, a crime is an unlawful act punishable by a state or other
authority.
• One proposed definition is that a crime or offence (or criminal offence) is an act
harmful not only to some individual but also to a community, society, or the state
("a public wrong"). Such acts are forbidden and punishable by law.
• Etymology
• The word crime is derived from the Latin root cernō, meaning "I decide, I give
judgment". Originally the Latin word crīmen meant "charge" or "cry of distress".
The Ancient Greek word κρίμα, krima, with which the Latin crimen is cognate,
typically referred to an intellectual mistake or an offense against the community,
rather than a private or moral wrong.
• In 13th century English crime meant "sinfulness", according to the Online
Etymology Dictionary. It was probably brought to England as Old
French crimne (12th century form of Modern French crime), from Latin crimen (in
the genitive case: criminis). In Latin, crimen could have signified any one of the
following: "charge, indictment, accusation; crime, fault, offense".
• The word may derive from the Latin cernere – "to decide, to sift" (see crisis,
mapped on Kairos and Chronos). But Ernest Klein (citing Karl Brugmann) rejects
this and suggests *cri-men, which originally would have meant "cry of distress".
Thomas G. Tucker suggests a root in "cry" words and refers to
English plaint, plaintiff, and so on. The meaning "offense punishable by law"
dates from the late 14th century. The Latin word is glossed in Old English
by facen, also "deceit, fraud, treachery", [cf. fake]. Crime wave is first
23-02-2023
3
(c) Adv. Md. Haroon Rasheed (Contact: 9686034210 / adv.mdharoon@gmail.com)
ORIGINS OF CYBER LAW IN INDIA
• The Computer Fraud and Abuse Act of 1986 was the first cyber law that was
ever to be enacted. It prohibits unauthorized access to computers and the
illegal use of digital information.
• In India, cyber crimes are covered by the Information Technology Act,
2000 and the Indian Penal Code, 1860. It is the Information Technology
Act, 2000, which deals with issues related to cyber crimes and electronic
commerce. However, in the year 2008, the Act was amended and outlined the
definition and punishment of cyber crime. Several amendments to the Indian
Penal Code 1860 and the Reserve Bank of India Act were also made.
• Source: https://blog.ipleaders.in/cyber-crime-laws-in-
india/#:~:text=The%20Computer%20Fraud%20and%20Abuse,illegal%20use%20of%20digital%20information.
23-02-2023 4
(c) Adv. Md. Haroon Rasheed (Contact: 9686034210 / adv.mdharoon@gmail.com)
Classification of Cyber Crimes
Sources:
(a.) https://intellipaat.com/blog/what-is-cybercrime/ (b.)
http://ignited.in//J/JASRAE/4/18)
Cybercrimes are broadly categorized into four
fields:
1.Individual/Person
2. Property
3. Government
4. Society
23-02-2023 (c) Adv. Md. Haroon Rasheed (Contact: 9686034210 / adv.mdharoon@gmail.com) 5
TYPES OF CYBER CRIMES
Broadly-
• Stealing Personal Information - When someone steals personal
information like usernames, passwords, OTP, PIN codes, personal
pictures or videos, the original owner becomes vulnerable, both
socially or financially.
• Using Device for Illegal Activities - If someone has access to
your devices, they can perform any illegal activity. If
tracked, the authorities will trace you behind such activities
since the proxy address/ other such links will indicate towards
the original users while some hacker plays his/ her tricks from
miles away.
• Committing Financial Fraud - In the world of internet banking,
giving access to account number, one time password (OTP), or
any such confidential information to someone else is an
invitation to fraudsters to empty your bank account.
• Interrupted Web Services - Someone sitting miles away can hack
your website and cause interruption in smooth run of such a
website. This affects the services being provided through such
websites or the brand built through years, whatever the case
23-02-2023 6
(c) Adv. Md. Haroon Rasheed (Contact: 9686034210 / adv.mdharoon@gmail.com)
14 Types of Cyber crimes
1. Hacking
2. Virus Dissemination
3. Credit Card Frauds
4. Phishing
5. Identity Theft
6. Cyber Harassment and Identity Theft
7. Social Engineering
8. Denial of Service (DoS)
9. Ransomware
10. Malware Attacks
11. Cyberstalking
12. Web Jacking
13. Botnets
14. Prohibited Content
• Source:
a. https://www.vidhikarya.com/legal-blog/types-of-cyber-crime-and-
prevention
b. https://www.legalserviceindia.com/legal/article-3042--types-of-
cyber-crime-and-its-causes.html
23-02-2023 7
(c) Adv. Md. Haroon Rasheed (Contact: 9686034210 / adv.mdharoon@gmail.com)
NEW FORMS OF CYBER
CRIMES
(Source:
a. https://www.clearias.com/cybercrime/
b. https://u-next.com/blogs/cyber-security/types-of-cyber-crime/)
o 1. Pornography OR Sexually Abusive Material
o 2. Cyber Bullying
o 3. Cyber Stalking
o 4. Cyber Grooming
o 5. Online Job Fraud
o 6. Online Sextortion
o 7. Phishing (Spear & Whale Phishing)
o 8. Vishing
o 9. Smishing
o 10. Sexting
o 11. SIM Swap Scam
o 12. Credit Card Fraud or Debit Card Fraud
o 13. Impersonation and identity theft
o 14. Spamming
o 15. Ransomware
o 16. Viruses, Worms, and Trojans
o 17. Data Breach
o 18. Denial of Services (DoS) attack
o 19. Website Defacement
o 20. Cyber-Squatting
o 21. Pharming
o 22. Crypto jacking
o 23. Online Drug Trafficking
o 24. Espionage
o 25. Man-in-middle Attacks
o 26. AI Powered Attacks
o 27. Web Attacks
o 28. SQL Injections
o 29. Cross-Site Scripting
o 30. DDOS Attacks
o 31. Password Attacks
o 32. Eavesdropping Attacks
o 33. Brute-Force & Dictionary Network Attacks
o 34. Insider Threats & 35. Drive-by Attacks
o 36. Ping of Death Attack & 37. PUP’s
o 38. Tear Drop Attack
23-02-2023 8
(c) Adv. Md. Haroon Rasheed (Contact: 9686034210 / adv.mdharoon@gmail.com)
LAWS-
• Constitution of India
• Indian Penal Code 1860
• Information Technology Act 2000
• Intellectual Property Laws (IPR)
• Banking Law & Reserve Bank Act
• Latest Crypto Laws & Other allied legislations
23-02-2023 9
(c) Adv. Md. Haroon Rasheed (Contact: 9686034210 / adv.mdharoon@gmail.com)
LEGAL REMEDIES
• How to file a
Cybercrime complaint
online in India?
• A cybercrime complaint
can be filed using
the National Crime
Reporting Portal of
India.
• Website link is –
https://cybercrime.gov
.in/
23-02-2023 10
(c) Adv. Md. Haroon Rasheed (Contact: 9686034210 / adv.mdharoon@gmail.com)
23-02-2023 11
(c) Adv. Md. Haroon Rasheed (Contact: 9686034210 / adv.mdharoon@gmail.com)

More Related Content

Similar to NEW FORMS OF CYBER CRIMES MDHR.pptx

Cyber Security & Crime In Bangladesh
Cyber Security & Crime In BangladeshCyber Security & Crime In Bangladesh
Cyber Security & Crime In BangladeshHome
 
Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues Fahad Saleem
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrTushar Rajput
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws Aman Bhargava
 
English in written
English in writtenEnglish in written
English in writtenazhar manap
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxchrixymae
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxVipinRawat52
 
Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...
Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...
Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...Tech and Law Center
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxwrite12
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxbkbk37
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problemijbuiiir1
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Faridah Husin
 

Similar to NEW FORMS OF CYBER CRIMES MDHR.pptx (20)

Cybercrime final-ppt
Cybercrime final-pptCybercrime final-ppt
Cybercrime final-ppt
 
Cyber Security & Crime In Bangladesh
Cyber Security & Crime In BangladeshCyber Security & Crime In Bangladesh
Cyber Security & Crime In Bangladesh
 
Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues
 
Unit 1
Unit 1Unit 1
Unit 1
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hr
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
English in written
English in writtenEnglish in written
English in written
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptx
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
Present Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in BangladeshPresent Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in Bangladesh
 
Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...
Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...
Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
19 21
19 2119 21
19 21
 
CYBERCRIME.pptx
CYBERCRIME.pptxCYBERCRIME.pptx
CYBERCRIME.pptx
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Recently uploaded

7 Basic Steps of Trust Administration.pdf
7 Basic Steps of Trust Administration.pdf7 Basic Steps of Trust Administration.pdf
7 Basic Steps of Trust Administration.pdfGoodman Estate Law
 
Embed-1-4.pdf Decision of the High Court
Embed-1-4.pdf Decision of the High CourtEmbed-1-4.pdf Decision of the High Court
Embed-1-4.pdf Decision of the High Courtbhavenpr
 
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...Dr. Oliver Massmann
 
REVIVING OUR STAR GOD IMAGES FROM MARRYING OUR 4 HOLY LAWS OF STAR GODS
REVIVING OUR STAR GOD IMAGES FROM MARRYING OUR 4 HOLY LAWS OF STAR GODSREVIVING OUR STAR GOD IMAGES FROM MARRYING OUR 4 HOLY LAWS OF STAR GODS
REVIVING OUR STAR GOD IMAGES FROM MARRYING OUR 4 HOLY LAWS OF STAR GODSCheong Man Keong
 
indian evidence act.pdf.......very helpful for law student
indian evidence act.pdf.......very helpful for law studentindian evidence act.pdf.......very helpful for law student
indian evidence act.pdf.......very helpful for law studentAaruKhanduri
 
Dandan Liu is the worst real estate agent on earth..pdf
Dandan Liu is the worst real estate agent on earth..pdfDandan Liu is the worst real estate agent on earth..pdf
Dandan Liu is the worst real estate agent on earth..pdfbraydenstoch777
 
Casa Tradicion v. Casa Azul Spirits (S.D. Tex. 2024)
Casa Tradicion v. Casa Azul Spirits (S.D. Tex. 2024)Casa Tradicion v. Casa Azul Spirits (S.D. Tex. 2024)
Casa Tradicion v. Casa Azul Spirits (S.D. Tex. 2024)Mike Keyes
 
Everything You Should Know About Child Custody and Parenting While Living in ...
Everything You Should Know About Child Custody and Parenting While Living in ...Everything You Should Know About Child Custody and Parenting While Living in ...
Everything You Should Know About Child Custody and Parenting While Living in ...AvinashMittal5
 
Application of Doctrine of Renvoi by foreign courts under conflict of laws
Application of Doctrine of Renvoi by foreign courts under conflict of lawsApplication of Doctrine of Renvoi by foreign courts under conflict of laws
Application of Doctrine of Renvoi by foreign courts under conflict of lawsanvithaav
 
DNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptxDNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptxpatrons legal
 
Solidarity and Taxation: the Ubuntu approach in South Africa
Solidarity and Taxation: the Ubuntu approach in South AfricaSolidarity and Taxation: the Ubuntu approach in South Africa
Solidarity and Taxation: the Ubuntu approach in South AfricaUniversity of Ferrara
 
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptxPRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptxOmGod1
 
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptxRIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptxOmGod1
 

Recently uploaded (15)

7 Basic Steps of Trust Administration.pdf
7 Basic Steps of Trust Administration.pdf7 Basic Steps of Trust Administration.pdf
7 Basic Steps of Trust Administration.pdf
 
Embed-1-4.pdf Decision of the High Court
Embed-1-4.pdf Decision of the High CourtEmbed-1-4.pdf Decision of the High Court
Embed-1-4.pdf Decision of the High Court
 
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
 
REVIVING OUR STAR GOD IMAGES FROM MARRYING OUR 4 HOLY LAWS OF STAR GODS
REVIVING OUR STAR GOD IMAGES FROM MARRYING OUR 4 HOLY LAWS OF STAR GODSREVIVING OUR STAR GOD IMAGES FROM MARRYING OUR 4 HOLY LAWS OF STAR GODS
REVIVING OUR STAR GOD IMAGES FROM MARRYING OUR 4 HOLY LAWS OF STAR GODS
 
Justice Advocates Legal Defence Firm
Justice Advocates Legal Defence FirmJustice Advocates Legal Defence Firm
Justice Advocates Legal Defence Firm
 
indian evidence act.pdf.......very helpful for law student
indian evidence act.pdf.......very helpful for law studentindian evidence act.pdf.......very helpful for law student
indian evidence act.pdf.......very helpful for law student
 
Charge and its essentials rules Under the CRPC, 1898
Charge and its essentials rules Under the CRPC, 1898Charge and its essentials rules Under the CRPC, 1898
Charge and its essentials rules Under the CRPC, 1898
 
Dandan Liu is the worst real estate agent on earth..pdf
Dandan Liu is the worst real estate agent on earth..pdfDandan Liu is the worst real estate agent on earth..pdf
Dandan Liu is the worst real estate agent on earth..pdf
 
Casa Tradicion v. Casa Azul Spirits (S.D. Tex. 2024)
Casa Tradicion v. Casa Azul Spirits (S.D. Tex. 2024)Casa Tradicion v. Casa Azul Spirits (S.D. Tex. 2024)
Casa Tradicion v. Casa Azul Spirits (S.D. Tex. 2024)
 
Everything You Should Know About Child Custody and Parenting While Living in ...
Everything You Should Know About Child Custody and Parenting While Living in ...Everything You Should Know About Child Custody and Parenting While Living in ...
Everything You Should Know About Child Custody and Parenting While Living in ...
 
Application of Doctrine of Renvoi by foreign courts under conflict of laws
Application of Doctrine of Renvoi by foreign courts under conflict of lawsApplication of Doctrine of Renvoi by foreign courts under conflict of laws
Application of Doctrine of Renvoi by foreign courts under conflict of laws
 
DNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptxDNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptx
 
Solidarity and Taxation: the Ubuntu approach in South Africa
Solidarity and Taxation: the Ubuntu approach in South AfricaSolidarity and Taxation: the Ubuntu approach in South Africa
Solidarity and Taxation: the Ubuntu approach in South Africa
 
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptxPRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
 
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptxRIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
 

NEW FORMS OF CYBER CRIMES MDHR.pptx

  • 1. NEW FORMS OF CYBER CRIMES (PART-I) MOHAMMED HAROON RASHEED B.A.LL.B (Hons.), B.S.W., LL.M, PGDCLCF, PGDADR ADVOCATE & ARBITRATOR (I.I.A.M.) Contact: +91-9686034210 / adv.mdharoon@gmail.com 23-02-2023 1 (c) Adv. Md. Haroon Rasheed (Contact: 9686034210 / adv.mdharoon@gmail.com)
  • 2. CYBER CRIME • Cyber Can be Traced Back to the 40s • Before there was cyberpunk or cybersecurity, there was cybernetics. In the late 1940s, cybernetics arose as the study of control systems and communications between people and machines. Today, it has evolved into a transdisciplinary approach to regulatory systems. Cybernetics influences game, system, and organizational theory. • Cybernetics derives from the Greek kubernētēs, which refers to a pilot or steersman. Related is the Greek word kubernēsis which means “the gift of governance” and applies to leadership. Because the study of cybernetics involves the fields of computer science, engineering, and biology and their advancements, it calls to mind all things futuristic. • Cyber can be attached to almost anything to make it sound futuristic or technical, but its origins are ancient: it can be found in Greek translations of the Old Testament. Source: https://www.ciso.inc/blog-posts/origin- cyber/#:~:text=Cyber%20Can%20be%20Traced%20Back%20to%20the%2040s&text=Cybernetics%20influences%20game%2C%20system%2C%20and,governance%E2%80%9D%20and%20applies%20to%20leade rship. 23-02-2023 2 (c) Adv. Md. Haroon Rasheed (Contact: 9686034210 / adv.mdharoon@gmail.com)
  • 3. Crime • In ordinary language, a crime is an unlawful act punishable by a state or other authority. • One proposed definition is that a crime or offence (or criminal offence) is an act harmful not only to some individual but also to a community, society, or the state ("a public wrong"). Such acts are forbidden and punishable by law. • Etymology • The word crime is derived from the Latin root cernō, meaning "I decide, I give judgment". Originally the Latin word crīmen meant "charge" or "cry of distress". The Ancient Greek word κρίμα, krima, with which the Latin crimen is cognate, typically referred to an intellectual mistake or an offense against the community, rather than a private or moral wrong. • In 13th century English crime meant "sinfulness", according to the Online Etymology Dictionary. It was probably brought to England as Old French crimne (12th century form of Modern French crime), from Latin crimen (in the genitive case: criminis). In Latin, crimen could have signified any one of the following: "charge, indictment, accusation; crime, fault, offense". • The word may derive from the Latin cernere – "to decide, to sift" (see crisis, mapped on Kairos and Chronos). But Ernest Klein (citing Karl Brugmann) rejects this and suggests *cri-men, which originally would have meant "cry of distress". Thomas G. Tucker suggests a root in "cry" words and refers to English plaint, plaintiff, and so on. The meaning "offense punishable by law" dates from the late 14th century. The Latin word is glossed in Old English by facen, also "deceit, fraud, treachery", [cf. fake]. Crime wave is first 23-02-2023 3 (c) Adv. Md. Haroon Rasheed (Contact: 9686034210 / adv.mdharoon@gmail.com)
  • 4. ORIGINS OF CYBER LAW IN INDIA • The Computer Fraud and Abuse Act of 1986 was the first cyber law that was ever to be enacted. It prohibits unauthorized access to computers and the illegal use of digital information. • In India, cyber crimes are covered by the Information Technology Act, 2000 and the Indian Penal Code, 1860. It is the Information Technology Act, 2000, which deals with issues related to cyber crimes and electronic commerce. However, in the year 2008, the Act was amended and outlined the definition and punishment of cyber crime. Several amendments to the Indian Penal Code 1860 and the Reserve Bank of India Act were also made. • Source: https://blog.ipleaders.in/cyber-crime-laws-in- india/#:~:text=The%20Computer%20Fraud%20and%20Abuse,illegal%20use%20of%20digital%20information. 23-02-2023 4 (c) Adv. Md. Haroon Rasheed (Contact: 9686034210 / adv.mdharoon@gmail.com)
  • 5. Classification of Cyber Crimes Sources: (a.) https://intellipaat.com/blog/what-is-cybercrime/ (b.) http://ignited.in//J/JASRAE/4/18) Cybercrimes are broadly categorized into four fields: 1.Individual/Person 2. Property 3. Government 4. Society 23-02-2023 (c) Adv. Md. Haroon Rasheed (Contact: 9686034210 / adv.mdharoon@gmail.com) 5
  • 6. TYPES OF CYBER CRIMES Broadly- • Stealing Personal Information - When someone steals personal information like usernames, passwords, OTP, PIN codes, personal pictures or videos, the original owner becomes vulnerable, both socially or financially. • Using Device for Illegal Activities - If someone has access to your devices, they can perform any illegal activity. If tracked, the authorities will trace you behind such activities since the proxy address/ other such links will indicate towards the original users while some hacker plays his/ her tricks from miles away. • Committing Financial Fraud - In the world of internet banking, giving access to account number, one time password (OTP), or any such confidential information to someone else is an invitation to fraudsters to empty your bank account. • Interrupted Web Services - Someone sitting miles away can hack your website and cause interruption in smooth run of such a website. This affects the services being provided through such websites or the brand built through years, whatever the case 23-02-2023 6 (c) Adv. Md. Haroon Rasheed (Contact: 9686034210 / adv.mdharoon@gmail.com)
  • 7. 14 Types of Cyber crimes 1. Hacking 2. Virus Dissemination 3. Credit Card Frauds 4. Phishing 5. Identity Theft 6. Cyber Harassment and Identity Theft 7. Social Engineering 8. Denial of Service (DoS) 9. Ransomware 10. Malware Attacks 11. Cyberstalking 12. Web Jacking 13. Botnets 14. Prohibited Content • Source: a. https://www.vidhikarya.com/legal-blog/types-of-cyber-crime-and- prevention b. https://www.legalserviceindia.com/legal/article-3042--types-of- cyber-crime-and-its-causes.html 23-02-2023 7 (c) Adv. Md. Haroon Rasheed (Contact: 9686034210 / adv.mdharoon@gmail.com)
  • 8. NEW FORMS OF CYBER CRIMES (Source: a. https://www.clearias.com/cybercrime/ b. https://u-next.com/blogs/cyber-security/types-of-cyber-crime/) o 1. Pornography OR Sexually Abusive Material o 2. Cyber Bullying o 3. Cyber Stalking o 4. Cyber Grooming o 5. Online Job Fraud o 6. Online Sextortion o 7. Phishing (Spear & Whale Phishing) o 8. Vishing o 9. Smishing o 10. Sexting o 11. SIM Swap Scam o 12. Credit Card Fraud or Debit Card Fraud o 13. Impersonation and identity theft o 14. Spamming o 15. Ransomware o 16. Viruses, Worms, and Trojans o 17. Data Breach o 18. Denial of Services (DoS) attack o 19. Website Defacement o 20. Cyber-Squatting o 21. Pharming o 22. Crypto jacking o 23. Online Drug Trafficking o 24. Espionage o 25. Man-in-middle Attacks o 26. AI Powered Attacks o 27. Web Attacks o 28. SQL Injections o 29. Cross-Site Scripting o 30. DDOS Attacks o 31. Password Attacks o 32. Eavesdropping Attacks o 33. Brute-Force & Dictionary Network Attacks o 34. Insider Threats & 35. Drive-by Attacks o 36. Ping of Death Attack & 37. PUP’s o 38. Tear Drop Attack 23-02-2023 8 (c) Adv. Md. Haroon Rasheed (Contact: 9686034210 / adv.mdharoon@gmail.com)
  • 9. LAWS- • Constitution of India • Indian Penal Code 1860 • Information Technology Act 2000 • Intellectual Property Laws (IPR) • Banking Law & Reserve Bank Act • Latest Crypto Laws & Other allied legislations 23-02-2023 9 (c) Adv. Md. Haroon Rasheed (Contact: 9686034210 / adv.mdharoon@gmail.com)
  • 10. LEGAL REMEDIES • How to file a Cybercrime complaint online in India? • A cybercrime complaint can be filed using the National Crime Reporting Portal of India. • Website link is – https://cybercrime.gov .in/ 23-02-2023 10 (c) Adv. Md. Haroon Rasheed (Contact: 9686034210 / adv.mdharoon@gmail.com)
  • 11. 23-02-2023 11 (c) Adv. Md. Haroon Rasheed (Contact: 9686034210 / adv.mdharoon@gmail.com)