Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE

Security Researcher at Adobe, Chapter Leader at OWASP & null
Mar. 28, 2016
Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE
Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE
Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE
Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE
Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE
Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE
Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE
Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE
Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE
Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE
Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE
Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE
Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE
Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE
Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE
Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE
Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE
Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE
Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE
Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE
Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE
Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE
Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE
Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE
Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE
Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE
Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE
Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE
Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE
Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE
Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE
Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE
Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE
Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE
Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE
Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE
1 of 36

More Related Content

Slideshows for you

Class cybercrimeClass cybercrime
Class cybercrimeAryan Ajmer
Sexual harassment laws in Pakistan, Employee privacy issue in Pakistan, Workp...Sexual harassment laws in Pakistan, Employee privacy issue in Pakistan, Workp...
Sexual harassment laws in Pakistan, Employee privacy issue in Pakistan, Workp...Arslan Khalid
2012 Annual Clery report 2012 Annual Clery report
2012 Annual Clery report Houston Community College
Massachusetts Eye and Ear Infirmary HIPAA  ViolationMassachusetts Eye and Ear Infirmary HIPAA  Violation
Massachusetts Eye and Ear Infirmary HIPAA Violationdata brackets
Landmark judgement on 498 a false dowry caseLandmark judgement on 498 a false dowry case
Landmark judgement on 498 a false dowry casegurpreet singh
MalwareMalware
Malwaregalaxy201

Viewers also liked

My Project_FinalMy Project_Final
My Project_FinalHemant Jog
Supreme Court Advocate on Record Association  v. Union of India, 1993Supreme Court Advocate on Record Association  v. Union of India, 1993
Supreme Court Advocate on Record Association v. Union of India, 1993Abhinandan Ray
Cyber Crime & LawCyber Crime & Law
Cyber Crime & LawYash
CybercrimeCybercrime
CybercrimeJohn Ela Echon
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crimeAbhinav Tyagi
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Swant Anand

Similar to Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE

Cyber lawCyber law
Cyber lawFarheen Sultana
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hackLife is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hackAnna Manley
Rakesh n cyberRakesh n cyber
Rakesh n cyberRakeshnavalgund
Important section  of IT Act 2000 & IPC sections related to cyber law. Important section  of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law. KOMALMALLIK
Cyber law Cyber law
Cyber law Arshad_A
Cyber law01Cyber law01
Cyber law01Rakshith Shetty

More from OWASP Delhi

Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesGetting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesOWASP Delhi
Securing dns records from subdomain takeoverSecuring dns records from subdomain takeover
Securing dns records from subdomain takeoverOWASP Delhi
Effective Cyber Security Report WritingEffective Cyber Security Report Writing
Effective Cyber Security Report WritingOWASP Delhi
Data sniffing over Air GapData sniffing over Air Gap
Data sniffing over Air GapOWASP Delhi
UDP HunterUDP Hunter
UDP HunterOWASP Delhi
Demystifying Container EscapesDemystifying Container Escapes
Demystifying Container EscapesOWASP Delhi

Recently uploaded

#11 DataWeave Extension Library using Visual Studio Code#11 DataWeave Extension Library using Visual Studio Code
#11 DataWeave Extension Library using Visual Studio CodeAnoopRamachandran13
What's Coming in CloudStack 4.19What's Coming in CloudStack 4.19
What's Coming in CloudStack 4.19ShapeBlue
An Introduction To Using ChatGPT For BusinessAn Introduction To Using ChatGPT For Business
An Introduction To Using ChatGPT For BusinessPaul Nguyen
NTGapps DTB Platform.pdfNTGapps DTB Platform.pdf
NTGapps DTB Platform.pdfMustafa Kuğu
[KCD GT 2023] Demystifying etcd failure scenarios for Kubernetes.pdf[KCD GT 2023] Demystifying etcd failure scenarios for Kubernetes.pdf
[KCD GT 2023] Demystifying etcd failure scenarios for Kubernetes.pdfWilliam Caban
Diogo Monteiro- KAMK Certificate - Demola Global Project 2023.pdfDiogo Monteiro- KAMK Certificate - Demola Global Project 2023.pdf
Diogo Monteiro- KAMK Certificate - Demola Global Project 2023.pdfDiogoMonteiro786960

Cyber Crime & Law by Neeraj Aarora - Advocate-on-Record, Supreme Court,CISSP, FCMA, CISA, CEH, CFCE

  1. By Neeraj Aarora Advocate-on-Record, Supreme Court CISSP, FCMA, CISA, CEH, CFCE
  2.  DDOs Attacks against Estonian Websites.  First Accessed other People's Computers through Zombie Applications.  Estonian Attack relied on vast Botnets to send Coordinated Crash-inducing Data to Web Servers.  Freezed complete infrastructure. 2N e e r a j A a r o r a3/28/2016
  3. Whoever , (1) with the intent to threaten the unity, integrity, security or sovereignty of India or to strike terror in any section of the people.  one who causes denial of access to computer resources,  or has unauthorized access to a computer resource,  or introduces a virus, or containment  Effect to cause death, injury to person or damage/destruction of property, disruption of essential supplies. (2)unauthorized access to information, data restricted for security of State. 3N e e r a j A a r o r a3/28/2016
  4.  Very Effective, Size: 500 KiloByte.  Attacked in Three Phases.  it targets Microsoft Windows Machines and Networks.  Sought Out Siemens Step7 software (Windows-based used to Program Industrial Control Systems that Operate Equipment, such as Centrifuges).  Compromised Programmable Logic Controllers.  Spy on Industrial Systems and even Cause Fast-Spinning Centrifuges to Tear themselves apart.  Can Spread Stealthily Between Computers running Windows.  Can Spread through USB thumb Drive. 4N e e r a j A a r o r a3/28/2016
  5. Cyber Contravention Cyber Offences + 43, 43A Sec. 65 – 67, 72, 72A Sec 43 Adjudicating Officer Police/Court Sec 66 5N e e r a j A a r o r a3/28/2016
  6.  Unauthorized access –  If any person without permission of the owner or any other person who is the in charge of a computer, computer systems or computer network commits any violation in Section 43 (a) – (j).  Penalty and compensation –  Liable to pay damages by way of compensation to the tune of Rs. 5 Crores. 6N e e r a j A a r o r a3/28/2016
  7.  “If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to three years or with fine which may extend to five lakh rupees or with both.”  Dishonestly or fraudulently as defined u/s 24/25 IPC  Cognizable & Bailable. 7N e e r a j A a r o r a3/28/2016
  8. Sec. 43(a) Unauthorized Access Sec. 43(b) downloads, copies or extracts any data Sec. 43 (c) introduces or causes to be introduced any computer contaminant or computer virus Sec. 43(d) damages or causes to be damaged any computer resource Sec. 43(e) disrupts or causes disruption of any computer, computer system or computer network 8N e e r a j A a r o r a3/28/2016
  9.  Mails along with pdf are being sent.  Virus, Cryptowall encrypts the hard drive.  Also encrypt the external or shared drives.  Hackers demand money.  Difficult to decrypt the data. 9N e e r a j A a r o r a3/28/2016
  10.  Russian hackers attacked the U.S. financial system in mid- August, infiltrating and stealing data from JP Morgan Chase & Co.  Theft of sensitive data belonging to customer of JP Morgan.  Attack was done using a malware.  Misappropriate money converted to legal through layering. 10N e e r a j A a r o r a3/28/2016
  11. Employee Computer Desktop Wiper Malware… 11N e e r a j A a r o r a3/28/2016
  12. Sec. 43(f) denies or causes the denial of access to any person authorized to access any computer Sec. 43(g) provides any assistance to any person in any unauthorized access Sec. 43(h) charges the services availed of by a person to the account of another person Sec. 43(i) destroys, deletes or alters any information residing in a computer resource Sec. 43(j) steals, conceals, destroys or alters any computer source code 12N e e r a j A a r o r a3/28/2016
  13. Sec.66B “Punishment for dishonestly receiving stolen computer resource or communication device-  whoever dishonestly received or  retains any stolen computer resource or  communication device knowing or having reason to believe the same to be stolen  computer resource or  communication device, Sec. 65 conceals, destroys or alters any computer source code used when the computer source code is required to be kept by law 13N e e r a j A a r o r a3/28/2016
  14. Section 66C– Punishment for Identity Theft “Whoever,  fraudulently or dishonestly make use of  the electronic signature, password or any other unique identification feature of any other person, Section 66D – Punishment for Cheating by Personation by Using Computer Resource ; “Whoever,  by means of any communication device or computer resource  cheats by personation, 14N e e r a j A a r o r a3/28/2016
  15.  captures, publishes or transmits  the image of a private area of any person without his or her consent,  under circumstances violating the privacy  “Private Areas” means the naked or undergarment clad genitals, pubic area, buttocks or female breast”  “Under circumstances violating privacy”  One could disrobe in privacy  One’s private area would not be visible to the public 15N e e r a j A a r o r a3/28/2016
  16.  Team of doctors took photographs of the 20-year-old woman undergoing Caesarian Operation.  Through mobile phone and shared the pictures on WhatsApp.  On complaint case, a case u/s Section 354 IPC, Section 66E & Section 67 of IT Act.  Three doctors and four paramedical staff in Kerala arrested. 16N e e r a j A a r o r a3/28/2016
  17.  “Whoever publishes or transmits or causes to be published or transmitted in the electronic form”  any material which is lascivious or appeals to the prurient interest or  if its effect is such as to tend to deprave and corrupt persons  who are likely, having regard to all relevant circumstances,  to read, see or hear the matter contained or embodied in it  Punishment for 3 yrs on first conviction and subsequent 5 yrs. 18N e e r a j A a r o r a3/28/2016
  18.  Accused married with the daughter of the complainant against his will.  Complainant took away his daughter who then was staying with her father.  Accused sent obscene SMS on the mobile used by his wife.  Petition u/s 482 Cr.P.C. was filed.  Contention of accused was, the SMS were sent to the wife and not to the complainant.  Mobile phone used by the daughter.  Exchange of communication between the husband and wife and therefore of a confidential nature. 19N e e r a j A a r o r a3/28/2016
  19.  Bombay High Court held that Section 67 prohibits publishing of information which is obscene in electronic form.  Section even prohibits transmission of such information if it is likely to be read by others. The court held that the SMSs were obscene per se and some of them referred to the complainant. 20N e e r a j A a r o r a3/28/2016
  20. Whoever –  publishes or transmits or causes to be published or transmitted in the electronic form any material.  which contains sexually explicit act or conduct.  shall be punished on first conviction with imprisonment upto 5 yrs & fine upto 10 lac and subsequent conviction upto 7 yrs & fine upto 10 lac.”  This Section covers "Sexually Explicit Content” transmitted in electronic form. 21N e e r a j A a r o r a3/28/2016
  21.  67B. Punishment for publishing or transmitting child Pornography in electronic form- Whoever—  publishes or transmits material depicting children engaged in sexually explicit act  creates text or digital images, collects, seeks, browses, downloads, distributes material in any electronic form depicting children in obscene or indecent or sexually explicit manner; or  cultivates, entices or induces children to online relationship on sexually explicit act  facilitates abusing children online, or records in any electronic form pertaining to sexually explicit act with children, 22N e e r a j A a r o r a3/28/2016
  22. Lt. Colonel arrested for surfing Child Pornography  A serving Indian Army officer of the rank of Lt. Colonel has been nabbed by the Mumbai Police .  He was allegedly uploading, possessing & disseminating obscene pictures of foreign children between the ages of 3 & 10 on the Internet.  The German Federal Bureau spotted the photos on a child pornography site and traced the pictures to India.  The German agency alerted the Interpol which in turn passed the information to CBI which in turned tipped the Mumbai Police.  The Mumbai police has taken two hard drives from the Lt. Colonel’s house as evidence against him. 23N e e r a j A a r o r a3/28/2016
  23. Citibank Mphasis Call Center Fraud  US $3,50,000 were embezzled from the account for US customers.  Data was managed by the Call Center Mphasis, Pune.  Employee of the BPO misuse the information.  The provision of the liability of the body corporate was introduced. 24N e e r a j A a r o r a3/28/2016
  24.  Section 43A –  Where a body corporate possessing, dealing and handling any sensitive personal data.  Which it owns, control or operates  Is negligent in implementing and maintaining reasonable security practices and procedures  Such a body corporate shall be liable to pay compensation.  The Information Technology (Reasonable Security Practices & Procedures & Sensitive Personal Data or Information), Rules 2011. A body corporate means any company includes a firm, sole proprietorship or other association of individual engages in professional and commercial practices. 25N e e r a j A a r o r a3/28/2016
  25.  WhatsApp  Facebook  Truecaller  WeChat 26N e e r a j A a r o r a3/28/2016
  26. Amar Singh Arun Jaitley Sec. 72A  A person including an intermediary is held liable if he discloses “personal information” which he accessed while providing services under a contract. 27N e e r a j A a r o r a3/28/2016
  27.  Where the Central Government or a State Government or any of its officer specially authorized by the Central Government or the State Government, as the case may be, o in this behalf may, if satisfied that it is necessary or expedient so to do o in the interest of the sovereignty or integrity of India, o defence of India, o security of the State, o friendly relations with foreign States or o public order or 28N e e r a j A a r o r a3/28/2016
  28. Contd… o for preventing incitement to the commission of any cognizable offence relating to above or o for investigation of any offence, o it may to intercept, monitor or decrypt or cause to be intercepted or monitored or decrypted any information generated, transmitted, received or stored in any computer resource The Information Technology (Procedure & Safeguards for interception, monitoring and decryption of information) Rules, 2009. 29N e e r a j A a r o r a3/28/2016
  29.  69A: Government gets power to issue directions for blocking for public access of any information through any computer resource.  Directions can be issued in the interest of:- o Sovereignty & Integrity of India, o Defence of India, o Security of the State, o Public Order o Friendly Relations with Foreign States or o Preventing Commission of Cognizable Offence Relating to Above The Information Technology (Procedures & Safeguards for Blocking for access of information by Public) Rules, 2009. 30N e e r a j A a r o r a3/28/2016
  30. (1) The Central Government may,  to enhance cyber security and for identification, analysis and prevention of intrusion or  spread of computer contaminant in the country,  by notification in the Official Gazette, authorise any agency of the Government to monitor and collect traffic data or information generated, transmitted, received or stored in any computer resource. The Information Technology (Procedures & Safeguards for monitoring and collecting traffic data or information) Rules, 2009. 31N e e r a j A a r o r a3/28/2016
  31. Section 70 – Protected System (1) The appropriate Government may, by notification in the Official Gazette, declare any computer resource which directly or indirectly affects the facility of Critical Information Infrastructure, to be a protected system. (2) Unauthorised access or attempt to access is punishable. (3) National Nodal Agency responsible for research and development to protect the critical information structure. 32N e e r a j A a r o r a3/28/2016
  32. Contd… Liability of internet service provider(ISP Liability)–section 79  The Section extends the immunity to the ISP from prosecutions under other laws including IT Act, as the provisions starts with the wordings, “Notwithstanding anything contained in any law…”.  The intermediary is not liable for third party information, data or communication link hosted by him if –  The intermediary function is limited to providing access to communication system.  The intermediary has not initiated the transmission, selected the receiver of the transmission and interfered/modify the transmission.  The intermediary observes due diligence and guidelines of the central government. 33N e e r a j A a r o r a3/28/2016
  33. Contd... Liability of Internet Service Provider  The intermediary is only liable for third party information, data or communication link hosted by him if –  if the intermediary has conspired in the commission of the unlawful act or  if it has actual knowledge or the appropriate government has notified it that any information, data residing in it is being used to commit the unlawful act, and it fails to expeditiously remove on that resource without vitiating the evidence in any manner 34N e e r a j A a r o r a3/28/2016
  34. .
  35. E-mails: nirajdp@gmail.com © HAZEN LEGAL ASSOCIATES, 2015 All Rights Reserved

Editor's Notes

  1. Unauthorized Access 43 (a) Access or secures access to such computer, computer system or computer network or computer resource” Copying information 43 (b) downloads, copies or extracts any data, computer data base or information from such computer, computer system or computer network including information or data held or stored in any removable storage medium. Computer viruses 43 (c) introduces or causes to be introduced any computer contaminant or computer virus into any computer, computer system or computer network. Damaging Computer 43 (d) damages or causes to be damaged any computer, computer system or computer network, data, computer data base or any other programmes residing in such computer, computer system or computer network Disrupting Computer Network 43 (e) disrupts or causes disruption of any computer, computer system or computer network
  2. Denial of Access 43 (f) denies or causes the denial of access to any person authorized to access any computer, computer system or computer network by any means Facilitating Access 43 (g) provides any assistance to any person to facilitate access to a computer, computer system or computer network in contravention of the provisions of this Act, rules or regulations made thereunder” Computer Fraud 43 (h) charges the services availed of by a person to the account of another person by tampering with or manipulating any computer, computer system, or computer network.” Hacking 43 (i) destroys, deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means. Computer Source code Theft 43 (j) steal, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any computer source code used for a computer resource with an intention to cause damage.
  3. Section 65-Tampering with Source Code conceals, destroys or alters any computer source code used when the computer source code is required to be kept or maintained by law for the time being in force Section 66A – Offensive Messages Any person who sends, by means of a computer resource or a communication device,— (a) any information that is grossly offensive or has menacing character; or (b) any information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred or ill will, persistently by making use of such computer resource or a communication device,