This document discusses various types of cyber crimes including cyber stalking, cyber pornography, cyber forgery and fraud, cyber crimes related to intellectual property rights, cyber terrorism, computer vandalism, cyber espionage, and cyber sabotage. It provides details on cyber stalking such as definitions, behaviors that constitute stalking, and laws related to stalking. It also discusses cyber pornography including definitions of pornography, types of pornography, and laws related to child pornography and obscenity in India. Key cases related to obscenity such as the Bazee.com case are also summarized.
An insight on Specific Offences under Indian Penal Code 1860. A detail presentation on specific offences with criminal Amendment Act 2013 has been included under this slide. Offences against women, children have also been discussed at length.
Computer crime or Cyber Crime is criminal activity that involves unlawful access to computer systems.
Cyber crime is an illegal activity committed on the internet.
hackin is an unauthorized access to the computer system by a hacker..
#Stay_Secure :)
An insight on Specific Offences under Indian Penal Code 1860. A detail presentation on specific offences with criminal Amendment Act 2013 has been included under this slide. Offences against women, children have also been discussed at length.
Computer crime or Cyber Crime is criminal activity that involves unlawful access to computer systems.
Cyber crime is an illegal activity committed on the internet.
hackin is an unauthorized access to the computer system by a hacker..
#Stay_Secure :)
Theft, in layman the act of dishonestly taking something that belongs to someone else and keeping it. We generally describe theft to be the act of stealing property belonging to somebody else. However, theft under IPC has certain specific requirements and ingredients. According to Section 378, theft means dishonestly taking any movable property out of the possession of a person. This taking must always be without the concerned person’s consent. Therefore, in order to constitute theft under IPC, the following conditions must exist:
Ingredients: To constitute theft, the following ingredients are required:
a) The accused must have a dishonest intention to take the property,
b) The property must be movable,
c) The property must be taken out of the possession of another person,
d) Resulting in wrongful gain by one and wrongful loss to another,
e) Taking must be without the person’s consent (implied or expressed)
All of these requirements must exist in order to complete the offence of theft. If anyone of them is missing, the offender is not guilty of theft. For example, a person may take and move somebody else’s property thinking it actually belongs to him. In this case, since the offender moved the property as a mistake, he did not commit theft.
Introduction to Cyber Crime is very necessary and useful for Forensic Science students serving in the cybercrime field and also useful for the general public. Types and Examples of Cyber Crime, How to prevent and report cybercrime, investigating cybercrime.
Electronic or Digital evidence in India Courts
ip address as evidence
cdr address as evidence
electronic evidence under indian evidence act
electronic record in india
Cyber crime is an activity done using computers and internet.
Cyber forensics is the science of collecting, examining, analyzing and reporting electronic evidence.
this ppt contents Introduction
Categories of Cyber Crime
Principles of Computer Security
Types of Cyber Crime
Types of Cyber Attack by Percentage
Cyber Threat Evolution
Advantages of Cyber Security
Safety Tips to Cyber Crime
Detailed Presentation on First Information Report (F.I.R)
Made By:
Edited By: Ayush Patria, Sangam University, Bhilwara
Follow us on Instagram: @law_laboratory
Website: www.lawlaboratory.in
The Indian Government has passed the first ever bill that protects women all over India from sexual harassment at their workplace. This slideshare explains the salient features of the Protection of Women from Sexual Harassment at Workplace Act, including - responsibilities of the employer, channels for redressal, compensation, etc.
Electronic Evidence is found in all computer and multimedia as well as communication devices. Increasingly most of the business transactions are done in paperless mode but when the disputes arise, then where to look for evidence? This presentation will help you in this field.
This presentation details Internet Governance. This issue impacts everyone who uses the Internet and must be understood and acted upon to ensure the continued growth and operation of the Internet. PPTX version available at: https://www.arin.net/knowledge/general.html
Here i had uploaded PPt on cyber crime in india : current scenario and survey. The data which was included was from the google data and survey up to the year 2021 .
Do you know every year around 750 Australian teens between the ages of 13 and 17 commit suicide because of cyber bullying? It’s a statistic sure to concern any parent. The best way to address cyberbullying is to stop it before it starts. This presentation provides valuable legal tips on how to stop cyberbullying.
At Owen Hodge Lawyers we understand that experiences relating to cyberbullying are extremely traumatic. The personal information shared and the hateful content and rumours spread often leaves people in untter despair and hopelessness. We are here to help! If you have any questions in relation to cyberbullying, please feel free to contact our team at Owen Hodge Lawyers on 1800 770 780.
Theft, in layman the act of dishonestly taking something that belongs to someone else and keeping it. We generally describe theft to be the act of stealing property belonging to somebody else. However, theft under IPC has certain specific requirements and ingredients. According to Section 378, theft means dishonestly taking any movable property out of the possession of a person. This taking must always be without the concerned person’s consent. Therefore, in order to constitute theft under IPC, the following conditions must exist:
Ingredients: To constitute theft, the following ingredients are required:
a) The accused must have a dishonest intention to take the property,
b) The property must be movable,
c) The property must be taken out of the possession of another person,
d) Resulting in wrongful gain by one and wrongful loss to another,
e) Taking must be without the person’s consent (implied or expressed)
All of these requirements must exist in order to complete the offence of theft. If anyone of them is missing, the offender is not guilty of theft. For example, a person may take and move somebody else’s property thinking it actually belongs to him. In this case, since the offender moved the property as a mistake, he did not commit theft.
Introduction to Cyber Crime is very necessary and useful for Forensic Science students serving in the cybercrime field and also useful for the general public. Types and Examples of Cyber Crime, How to prevent and report cybercrime, investigating cybercrime.
Electronic or Digital evidence in India Courts
ip address as evidence
cdr address as evidence
electronic evidence under indian evidence act
electronic record in india
Cyber crime is an activity done using computers and internet.
Cyber forensics is the science of collecting, examining, analyzing and reporting electronic evidence.
this ppt contents Introduction
Categories of Cyber Crime
Principles of Computer Security
Types of Cyber Crime
Types of Cyber Attack by Percentage
Cyber Threat Evolution
Advantages of Cyber Security
Safety Tips to Cyber Crime
Detailed Presentation on First Information Report (F.I.R)
Made By:
Edited By: Ayush Patria, Sangam University, Bhilwara
Follow us on Instagram: @law_laboratory
Website: www.lawlaboratory.in
The Indian Government has passed the first ever bill that protects women all over India from sexual harassment at their workplace. This slideshare explains the salient features of the Protection of Women from Sexual Harassment at Workplace Act, including - responsibilities of the employer, channels for redressal, compensation, etc.
Electronic Evidence is found in all computer and multimedia as well as communication devices. Increasingly most of the business transactions are done in paperless mode but when the disputes arise, then where to look for evidence? This presentation will help you in this field.
This presentation details Internet Governance. This issue impacts everyone who uses the Internet and must be understood and acted upon to ensure the continued growth and operation of the Internet. PPTX version available at: https://www.arin.net/knowledge/general.html
Here i had uploaded PPt on cyber crime in india : current scenario and survey. The data which was included was from the google data and survey up to the year 2021 .
Do you know every year around 750 Australian teens between the ages of 13 and 17 commit suicide because of cyber bullying? It’s a statistic sure to concern any parent. The best way to address cyberbullying is to stop it before it starts. This presentation provides valuable legal tips on how to stop cyberbullying.
At Owen Hodge Lawyers we understand that experiences relating to cyberbullying are extremely traumatic. The personal information shared and the hateful content and rumours spread often leaves people in untter despair and hopelessness. We are here to help! If you have any questions in relation to cyberbullying, please feel free to contact our team at Owen Hodge Lawyers on 1800 770 780.
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfvichu19891
Cyber Crime:
As Internet usage is growing daily the world is coming closer. The World Wide Web sounds like
a vast phenomenon but surprisingly one of its qualities is bringing the world closer making it a
smaller place to live in for its users. However, it has also managed to create another problem for
people who spend long hours browsing the Cyber World – which is cyber crimes. While law
enforcement agencies are trying to tackle this problem, it is growing steadily and many people
have become victims of hacking, theft, identity theft and malicious software. One of the best
ways to avoid being a victim of cyber crimes and protecting your sensitive information is by
making use of impenetrable security that uses a unified system of software and hardware to
authenticate any information that is sent or accessed over the Internet. However, before you can
understand more about this system, let us find out more about cyber crimes.
Types of Cyber Crimes:
When any crime is committed over the Internet it is referred to as a cyber crime. There are many
types of cyber crimes and the most common ones are explained below:
1.Hacking: This is a type of crime wherein a person’s computer is broken into so that his
personal or sensitive information can be accessed. In the United States, hacking is classified as a
felony and punishable as such. This is different from ethical hacking, which many organizations
use to check their Internet security protection. In hacking, the criminal uses a variety of software
to enter a person’s computer and the person may not be aware that his computer is being
accessed from a remote location.
2.Theft: This crime occurs when a person violates copyrights and downloads music, movies,
games and software. There are even peer sharing websites which encourage software piracy and
many of these websites are now being targeted by the FBI. Today, the justice system is
addressing this cyber crime and there are laws that prevent people from illegal downloading.
3.Cyber Stalking: This is a kind of online harassment wherein the victim is subjected to a barrage
of online messages and emails. Typically, these stalkers know their victims and instead of
resorting to offline stalking, they use the Internet to stalk. However, if they notice that cyber
stalking is not having the desired effect, they begin offline stalking along with cyber stalking to
make the victims’ lives more miserable.
4.Identity Theft: This has become a major problem with people using the Internet for cash
transactions and banking services. In this cyber crime, a criminal accesses data about a person’s
bank account, credit cards, Social Security, debit card and other sensitive information to siphon
money or to buy things online in the victim’s name. It can result in major financial losses for the
victim and even spoil the victim’s credit history.
5.Malicious Software: These are Internet-based software or programs that are used to disrupt a
network. The software is used to gain ac.
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...Scott Mills
Boost For Kids sponsored "Social Media For Investigations" education protocol training at Toronto Police College. Presentation slides of Detective Jeff Bangild
PRESENTATION REPORT ON CYBER CRIME
1. INTRODUCTION
2. DIFFERENT TYPES OF CYBER CRIME
3.THE FIRST NATIONAL CONFERENCE ON NATIONAL CRIME INVESTIGATION AND CRIME FORENSICS
4.CYBER CRIME AWARENESS
5.CYBER SECURITY
6.CONCLUSION
7.FAQ
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
3. In these slides we will cover topics like
• Cyber stalking;
• Cyber pornography;
• Cyber forgery and fraud;
• Crime related to IPRs;
• Cyber terrorism;
• Computer vandalism
• Cyber espionage
• Cyber Sabotage
4. Cyber stalking
• Cyberstalking is the use of the Internet or other electronic means
to stalk or harass an individual, group, or organization.
• It may include false accusations, defamation, slander and libel.
• It may also include monitoring, identity theft, threats, vandalism,
solicitation for sex, or gathering information that may be used to
threaten, embarrass or harass.
• Cyber stalking is often accompanied by real-time or offline stalking.
• In many jurisdictions, both are criminal offenses. Both are
motivated by a desire to control, intimidate or influence a victim.
• A stalker may be an online stranger or a person whom the target
knows. They may be anonymous and solicit involvement of other
people online who do not even know the target.
• Cyberstalking is a criminal offense under various state anti-
stalking, slander and harassment laws.
• A conviction can result in a restraining order, probation, or criminal
penalties against the assailant, including jail.
5. Cyber stalking contd.
• There have been a number of attempts by experts and legislators to
define cyberstalking.
• It is generally understood to be the use of the Internet or other
electronic means to stalk or harass an individual, a group, or an
organization.
• Cyberstalking is a form of cyberbullying; the terms are often used
interchangeably in the media. Both may include false
accusations, defamation, slander and libel.
• Cyberstalking may also include monitoring, identity theft, threats,
vandalism, solicitation for sex, or gathering information that may be
used to threaten or harass.
• Cyberstalking is often accompanied by real-time or offline stalking.
Both forms of stalking may be criminal offenses.
• Stalking is a continuous process, consisting of a series of actions,
each of which may be entirely legal in itself.
6. Cyber stalking contd.
• Cyberstalking is a technologically-based "attack" on
one person who has been targeted specifically for that
attack for reasons of anger, revenge or control.
• Cyberstalking can take many forms, including:
1. harassment, embarrassment and humiliation of the
victim
2. emptying bank accounts or other economic control
such as ruining the victim's credit score
3. harassing family, friends and employers to isolate the
victim
4. scare tactics to instill fear and more.
7. Kinds Of Cyberstalking
• Women in India whether she is a college student, working
professional or housewife get stalked on a regular basis.
• Stalking itself is a criminal offence either physical or electronic
and is punishable with one to three years of jail.
• Let’s explore the kinds of cyberstalking that till now has been
reported worldwide.
• Catfishing - In Catfishing, Stalkers create a fake profile on social
media to approach victims. Sometimes they copy the existing
user's profile with photos to look it like a real one.
• Monitoring location check-ins on social media - Stalkers keep
an eye on the activities of a victim from their check-ins on
social media such as Facebook and Instagram. This is an easier
job for a stalker to gauge a victim's behavioural pattern quite
accurately.
• Visiting virtually via Google Maps Street View - If a stalker
discovers the victim's address, then it is not hard to find the
area, neighbourhood, and surroundings by using Street View.
Tech-savvy stalkers don't need that too. They can discover the
victim's place from the posts or photos posted on social media.
8. Kinds Of Cyberstalking
• Hijacking webcam - Computer's webcam hijacking is one of
the most disgusting methods of cyberstalking to invade the
victim's privacy. Stalkers push malware-infected files into the
victim's computer which gives them access to the webcam.
• Installing Stalkerware - One more method which is increasing
its popularity is the use of Stalkerware. It is a kind of software
or spyware which keeps track of the location, enable access to
text and browsing history, make an audio recording, etc. And
an important thing is that it runs in the background without
any knowledge to the victim.
• Looking at geotags to track location - Mostly digital pictures
contain geotags which is having information like the time and
location of the picture when shot in the form of metadata.
Geotags comes in the EXIF format embedded into an image
and is readable with the help of special apps. In this way, the
stalker keeps an eye on the victim and gets the information
about their whereabouts.
9. Provisions For Cyberstalking In India
• Cyberstalking is a serious crime worldwide and the number of cases of it goes on
increasing every year.
• In India, a large percentage of cases filed against cyberstalking are by women. To deal
with the cyberstalking in India following provisions are available:
• Information Technology Act, 2000 - When a person publishes or sends salacious
material via electronic media is to be charged under Section 67 of the Act.
Data protection is very important to prevent cyberstalking which is easily leaked by
hackers.
• For data protection, IT Amendment Act, Section 43A has been included the provision
for the inclusion of a Body Corporate. If a firm or a company transmits sensitive
information about a person, according to the act such body corporate will be liable to
pay the damages by compensation.
• Under Section 67 of the Act, when a stalker sends or posts any obscene content to the
victim via electronic media then they will be liable to punish with 5 years of jail and
Rs. 1 Lacs fine. If the incidence repeats then they will be liable to punish with 10 years
of jail and Rs. 2 Lacs fine.
• As per the provision provided in the law, when a stalker misuses victim's personal
information to post an obscene message or comment on any electronic media, then
this action is punishable for defaming and harming a person's reputation with
imprisonment of 2 years, fine or both.
• The criminal law (Amendment) Act, 2013 - According to the act, Stalking is an offence
under Section 354D of the IPC (Indian Penal Code).
When a man is trying to communicate with a woman without her interest over the
internet via email, instant messages or any other electronic communication is the
offence of stalking.
10. Cyber Pornography
• Porn today is more freely and widely available on Internet than ever
before. Younger generation is therefore able to access it very easily and
quickly than ever. This leads to the mentality of unemotional sex.
• And all this is because we have grown up in a culture where parents feel
embarrassed, they are not comfortable to have a healthy conversation
about sex with their children. Well then its time to open up and come out
of our comfort zone to talk about the most hush-hush topic
i.e. Pornography.
• According to City of Youngstown v. DeLoreto (USA , 1969) Pornography is
the portrayal of erotic behavior designed to cause sexual excitement. It is
words, acts, or representations that are calculated to stimulate sex
feelings independent of the presence of another loved and chosen
human being. It is divorced from reality in its sole purpose to stimulate
erotic response.
• It is preoccupied with and concentrates on sex organs for the purpose of
sexual stimulation. It emphasizes them and focuses on them in varying
ways calculated to incite sexual desire.
• The term Pornography refers to any work or art or form dealing with sex
or sexual themes. It involves images , videos of both man and woman
involved in sexual activities and is accessible on internet world wide.
11. • There has not been only a single definition of the law of the word
pornography applied all over the world.
• The pornography or the pornographic material varies according to
the vision and understanding of the people of different culture
across the world and it has beTen a difficult task to define the
material/content to be a pornographic content/material.
• Basically pornography is nothing but marketing of man or woman
sex, shown as object for those who get involved into sexual acts.
Pornographers use the internet to sell their material to sex addicts
and to the interested parties. Watching and keeping of these kind
of materials is illegal in India. Nowadays pornography has become
a kind of a business to the society as people indulge themselves to
gain the economical benefits from them.
• They even put the hidden cameras and violates the privacy of the
society ex: hotels , paying guest , hostels , changing rooms in
shopping complex etc.
• It has been a market for near about $1 trillion. Pornography has
been in existence since the pre-historic time as it was seen in the
painting or rock
Cyber Pornography
12. • Therefore, with emerging of time, there was invention of
photography which gave rise to pornography. The world's first law
criminalizing pornography was the English Obscene Publications Act
1857.
• The Act, applied to the United Kingdom and Ireland, and it made
the sale of obscene material a statutory offence, giving the courts
power to seize and destroy offending material.
• Pornographic film production commenced after the invention of the
motion picture in 1895. Sexually explicit films opened producers
and distributors to prosecution.
• Pornography is the literature of an art which have the portrait of
sexuality emphasizing upon emotions and feelings.
• Pornography is of 2 types:
• Soft core and Hardcore, where the pornography work is referred as
the hardcore content and the soft core pornography consists of
nudity or partial nudity in sexual situations. Perhaps, both the kinds
of pornography involve nudity.
Cyber Pornography
13. Child Pornography In India
• Child pornography is an illegal act in India. Information Technology Act,
2000 & Indian Penal Code, 1860 gives protection against the child
pornography. Child refers to the person who is below the age of 18
years. The Internet is being highly used by its abusers to reach and abuse
children sexually, globally. The internet is becoming a household
commodity in India. Its explosion has made the children a viable victim to
the cyber crime.
• As more homes have access to internet, more children would be using
the internet and more are the chances of falling victim to the aggression
of pedophiles. The easy access to the pornographic contents readily and
freely available over the internet lowers the inhibitions of the children.
• Pedophiles lure the children by distributing pornographic material, then
they try to meet them for sex or to take their nude photographs
including their engagement in sexual positions. Sometimes Pedophiles
contact children in the chat rooms posing as teenagers or a child of
similar age, then they start becoming friendlier with them and win their
confidence.
• Then slowly pedophiles start sexual chat to help children shed their
inhibitions about sex and then call them out for personal interaction.
• The Information Technology Act is set of rules to make it illegal to not
only transmit or create child pornography in electronic form, but even to
surf it The above section covers websites, graphics files, SMS, MMS,
digital photographs etc.
14. • The punishment for a first offence of publishing, creating,
exchanging, downloading or browsing any electronic depiction of
children in obscene or indecent or sexually explicit manner is
imprisonment for 5years and a fine of Rs 10 lakh.
• Section 67 of the Information and technology Act deals with
publishing obscene information in electronic form.
• Section 67 along with section 67A does not apply to any book,
pamphlet, paper, writing, drawing, painting, representation or
figure in electronic form which is used for religious purposes or is in
the interest of science, literature, art or learning.
• It is a generally that it does not specifically define pornography or
make it an offence, and does not mention child pornography.
• Section 67B lays down the punishment for involving in sexual
explicates electronic or online contents that depicts children's. it is
also illegal to induce children's in sexual acts or into online
relationships.
Child Pornography In India
15. The IT Act 2000 also criminalizes online child pornography in the
following circumstances
• a) Publication or transmission of any material depicting children in
explicit sexual act or conduct by using any computer resource and
communication device.
• b) Where user uses computer or communication resource for
seeking or collecting or creating digital images or texts or
downloading or promoting etc. any material in any electronic form
depicting children in an obscene or indecent or sexually explicit
manner.
• c) Cultivating, enticing or inducing children to online relationships
with one or more children for and on a sexually explicit act or in a
manner that may offend a reasonable adult on the computer
resource.
• d) Facilitating abusing children online.
• e) Recording in any electronic form owns abuse or that of others
pertaining to sexually explicit activities with children.
16. Obscenity
• Obscenity has not been defined under any law/statute which penalizes,
prohibits, publishing, importing, mailing, exporting and selling such
obscene material or matter.
• The Court has the duty to examine whether the alleged obscene content
contains obscene matter which is likely to attract the people and corrupt
those minds who are open to such influences.
• Section 292 of the IPC deals with the selling of the obscene books,
magazines etc. Whosoever sells, distributes or publicly exhibits or in any
manner circulates, or imports or exports any obscene book, pamphlet,
paper, drawing, art, painting, representation or figure or any other
obscene object which is in his/ her possession.
• This section, tells that the knowledge of obscenity is not essential for
constitution of an offence.
• It provides punishment on first conviction with imprisonment of either
description for a term which may extend to 2years and fine of 2,000
rupees, and in the subsequent conviction with imprisonment which may
extend to 5 years and also fine which may extend to 5,000 rupees.
• Except the physical contact, demanding or requesting for sexual favors,
showing pornography or making sexually colored remarks shall
constitute grounds for sexual harassment and he/she shall be punish
with imprisonment which may range from to 3years or fine or both , in
first three cases and in fourth case imprisonment which may extend to 1
year or with fine or with both.
17. • Any man who sees or captures the image of a woman engaging in
private act, within her private space shall be punishable with
imprisonment of not less than 1 year which may extend to 3 years
and with fine and on second conviction imprisonment not less
than 3 years which may extend to 7 years and with fine.
• If any person with intent to induces a girl, who is a minor (below
18 years of age), to move from any place or force her to do any
act, of which he has knowledge that the minor girl will be forced
to perform illicit intercourse with another person, shall be
punishable with imprisonment which may extend to ten years and
fine for procuring a minor girl.
• And if imports any girl of 21 years of age from outside the
territory of India (now including Jammu & Kashmir) for the same
will be punishable with 10years imprisonment and fine on such
importation of girl.
Obscenity
18. Bazee.com case,
• In the landmark case of Avnish Bajaj v. State popularly known as Bazee.com
case, an IIT Kharagpur student named Ravi Raj placed on bazee.com a listing
offering an obscene MMS video clip for sale for rupees 125 per video with the
username Alice-elec.
• Luckily bazee.com have a filter for posting questionable content. Despite that
the listing never took place with the description, Item 2787748- DPS Girl
having fun!!! Full video + Bazee points.
• Listed on 27th November 2004 and was deactivated around 10 a.m on 29 th
November 2004. Then an event took place where The Crime Branch of Delhi
Police took cognizance of the matter and registered an FIR. Charge sheet was
filed against Ravi Raj, Avnish Bajaj and the owner of the website, Sharat
Digumarti.
• The petitioner contended three issues, namely:
i. There was no intervention of the website as the transmission of the MMS
clip was directly between the buyer and seller. The sellers after receiving
confirmation from the buyer sent the clip to the buyer through an email
attachment. They accepted that the website is responsible for the listing
placed on the website only and does not becomes the subject matter of
section 292/294 of Indian Penal Code, 1860 or section 67 of IT Act, 2000.
• ii. The website removed the objectionable content the moment they received
such information of obscene content be listed on their website.
• iii. Section 67 of IT Act, 2000 plainly covers only the publication of obscene
material and not the transmission of such material.
19. • The State in reply to the above said contentions said:
i. Section 292 Indian Penal Code, 1860 (IPC) includes not only
obvious acts but also illegal omissions within sections 32, 35
AND 36, IPC.
ii. The failure to have the requisite filter in a system demand
serious consequences and a website cannot escape from
such legal consequences.
iii. The website did not do anything to stop the transaction of
illegal content when the payment was made to the seller.
• In another case, students teased a fellow classmate for
having pockmarked face. The agitated student created a
website and use pictures of his fellow classmates and
teachers in pornographic content.
• Under section 67 of IT Act, 2000 was registered and Police
picked the concerned student and kept him in a juvenile
home.
Bazee.com case,
20. • Legality:
Coming to the legality prospectus of Pornography, our law does not stop us from
watching pornography privately. All that the law prohibits its production ,
distribution , transmission, publication.
1. Section 67 of IT Act 2000
• · Punishment for publishing or transmitting obscene material in electronic form
· Imprisonment for 3years or fine of 5,00,000.
· For subsequent conviction imprisonment for 5years and with 10,00,000
rupees fine
2. Section 293 of Indian Penal Code (IPC) 1860
• · Sale, etc., of obscene objects to young person
· Imprisonment for 3years or Fine of 2,000 rupees
· For subsequent conviction imprisonment for 7years and also with 5,000.
Suggestions:
· Sex education should be made part of higher education syllabus.
· Organizing sex education conferences and seminars at school, work pace and
other forums for awareness.
· Legislature needs to form a separate law/statute for the prohibition of
pornography.
Bazee.com case,
21. Computer‐related fraud or forgery
• Under the Council of Europe Cybercrime Convention, fraud and forgery
are considered part of the computer-related offences (i.e., computer-
related forgery and computer-related fraud).
• Article 7 of the Council of Europe Cybercrime Convention
defines computer-related forgery as "intentional… and without right, the
input, alteration, deletion, or suppression of computer data, resulting in
inauthentic data with the intent that it be considered or acted upon for
legal purposes as if it were authentic, regardless whether or not the data
is directly readable and intelligible." This cybercrime is also prohibited
under Article 10 of the Arab Convention on Combating Information
Technology Offences.
• Computer-related forgery involves impersonation of legitimate
individuals, authorities, agencies, and other entities online for
fraudulent purposes.
• Cybercriminals can impersonate people from legitimate organizations and
agencies in order to trick them into revealing personal information and
providing the offenders with money, goods and/or services.
• The email sender pretends to be from a legitimate organization or agency
in an attempt to get users to trust the content and follow the instructions
of the email. Either the email is sent from a spoofed email address
(designed to look like an authentic email from the organization or agency)
or from a domain name similar to the legitimate organization or agency
(with a few minor variations).
22. Computer‐related fraud or forgery
• A common technique used is the sending of an email
to targets with a website link for users to click on,
which might either download malware onto the users'
digital devices or sends users to a malicious website
that is designed to steal users' credentials ( phishing).
• The "spoofed" website (or pharmed website) looks like
the organization's and/or agency's website and
prompts the user to input login credentials.
• The email provides different prompts to elicit fear,
panic and/or a sense of urgency in order to get the
user to respond to the email (and complete the tasks
requested in the email) as soon as possible, such as the
need to update personal information to receive funds
or other benefits, warnings of fraudulent activity on
the user's account, and other events requiring the
target's immediate attention.
23. • This tactic is not targeted, the email is sent en masse to catch as many victims as possible.
• A targeted version of phishing is known as spearphishing. This form of fraud occurs when
perpetrators are familiar with the inner workings and positions of company employees and
send targeted emails to employees to trick them into revealing information and/or sending
money to the perpetrators.
• Another technique involves cybercriminals pretending to be higher level executives in a
company (part of the C-suite - Chief Executive Officer, Chief Financial Officer and Chief
Security Officer), lawyers, accountants, and others in positions of authority and trust, in
order to trick employees into sending them funds. This tactic is known as whaling because it
yields the highest payout.
• The US toy company Mattel was a victim of whaling. The cybercriminals behind this attack
had been surreptitiously monitoring the company's networks and communications for
months prior to the incident. After an announcement was made that a new CEO was
appointed, the cybercriminals used the identity of the new CEO (Christopher Sinclair) to
perpetrate the attack.
• Particularly, the cybercriminals sent a message as Christopher Sinclair asking the recipient to
approve a three-million-dollar transfer to a bank in Wenzhou, China, to pay a Chinese supplier.
As the request came from the CEO, the employee transferred the money but later contacted
the CEO about it. The CEO denied making the request. Mattel subsequently contacted US law
enforcement, the US Federal Bureau of Investigation, their bank, and Chinese law enforcement
authorities (Ragan, 2016). The timing of the incident (the money had been transferred on the
eve of a holiday) gave Chinese authorities time to freeze the accounts before the banks
opened, enabling Mattel to recover its money.
Computer‐related fraud or forgery
24. Cyber terrorism
• Section 66F of the IT Act prescribes punishment for cyber
terrorism.
• Whoever, with intent to threaten the unity, integrity,
security or sovereignty of India or to strike terror in the
people or any section of the people,
• denies or causes the denial of access to any person
authorized to access a computer resource, or attempts to
penetrate or access a computer resource without
authorisation or exceeding authorised access,
• or introduces or causes the introduction of any computer
contaminant, and by means of such conduct causes or
• is likely to cause death or injuries to persons or damage to
or destruction of property or disrupts
• or knowing that it is likely to cause damage or disruption of
supplies or services essential to the life of the community
or adversely affect critical information infrastructure, is
guilty of 'cyber terrorism'.
25. Cyber terrorism
• Whoever knowingly or intentionally penetrates or accesses a
computer resource without authorisation or exceeding authorised
access,
• and by means of such conduct obtains access to information, data
or computer database that is restricted for reasons for the security
of the State or foreign relations, or any restricted information, data
or computer database, with reasons to believe that such
information, data or computer database so obtained may be used
to cause or likely to cause injury to the interests of the sovereignty
and integrity of India, the security of the State, friendly relations
with foreign States, public order, decency or morality, or in relation
to contempt of court, defamation or incitement to an offence, or to
the advantage of any foreign nation, group of individuals or
otherwise, is also guilty of 'cyber terrorism'.
• Whoever commits or conspires to commit cyber terrorism shall be
punishable with imprisonment which may extend to imprisonment
for life.
• There is no provision in the IPC that mirrors section 66F of the IT
Act, though section 121 of the IPC (waging, or attempting to wage
war, or abetting waging of war, against the Government of India)
does cover this offence partially.
26. Intellectual Property Theft
• Intellectual property (IP) theft is defined as theft of material that is
copyrighted, the theft of trade secrets, and trademark violations. A
copyright is the legal right of an author, publisher, composer, or other
person who creates a work to exclusively print, publish, distribute, or
perform the work in public. The United States leads the world in the
creation and selling of IP products to buyers nationwide and
internationally. Examples of copyrighted material commonly stolen online
are computer software, recorded music, movies, and electronic games.
• Theft of trade secrets means the theft of ideas, plans, methods,
technologies, or any sensitive information from all types of industries
including manufacturers, financial service institutions, and the computer
industry. Trade secrets are plans for a higher speed computer, designs for
a highly fuel-efficient car, a company's manufacturing procedures, or the
recipe for a popular salad dressing, cookie mix, or barbeque sauce. These
secrets are owned by the company and give it a competitive edge. Theft of
trade secrets damages the competitive edge and therefore the economic
base of a business.
• A trademark is the registered name or identifying symbol of a product that
can be used only by the product's owner. A trademark violation involves
counterfeiting or copying brand name products such as well-known types
of shoes, clothing, and electronics equipment and selling them as the
genuine or original product.
27. • The two forms of IP most frequently involved in cyber crime are
copyrighted material and trade secrets. Piracy is a term used to describe IP
theft—piracy of software, piracy of music, etc. Theft of IP affects the
entire U.S. economy. Billions of dollars are lost every year to IP pirates. For
example, thieves sell pirated computer software for games or programs to
millions of Internet users. The company that actually produced the real
product loses these sales and royalties rightfully due to the original
creator.
• Historically, when there were no computers, IP crimes involved a lot of
time and labor. Movie or music tapes had to be copied, physically
produced, and transported for sale. An individual had to make the sale in
person. To steal a trade secret, actual paper plans, files, or blueprints
would have to be physically taken from a company's building and likewise
sold in person.
• In the twenty-first century software, music, and trade secret pirates
operate through the Internet. Anything that can be digitized—reduced to
a series of zeroes and ones—can be transmitted rapidly from one
computer to another. There is no reduction of quality in second, third, or
fourth generation copies. Pirated digital copies of copyrighted work
transmitted over the Internet are known as "warez." Warez groups are
responsible for illegally copying and distributing hundreds of millions of
dollars of copyrighted material.
Intellectual Property Theft
28. • Pirated trade secrets are sold to other companies or illegal
groups. Trade secrets no longer have to be physically stolen
from a company.
• Instead, corporate plans and secrets are downloaded by
pirates onto a computer disc. The stolen information can be
transmitted worldwide in minutes.
• Trade secret pirates find pathways into a company's
computer systems and download the items to be copied.
• Companies keep almost everything in their computer files.
Pirated copies are sold over the Internet to customers who
provide their credit card numbers then download the copy.
Intellectual Property Theft
29. Cyber/Computer vandalism
• Cyber-Vandalism accounts to the act of damaging someone’s data from the
computer that in a way disrupts the victim’s business or image due to editing
the data into something invasive, embarrassing or absurd.
• The thieves create malevolent programs that prove injurious to the hard disk
data or login credentials of the victim.
• Cyber-vandalism is different from computer viruses that attach into the
programs and Wikipedia being one of the famous sites, is prone to potential
damage of content because anyone can edit the site.
• However, Wikipedia has presently sustained an equilibrium between the
types of users that there are articles that cannot be edited by unregistered or
new users.
• Today’s vandalism felony surrounds the computers and in some countries,
new laws have also been updated that has resulted in the punishment for
vandalism.
• The gaming company networks have paved a productive way for the
computer-literate youth to indulge their knowledge and talents into creating
games rather than becoming malware designers.
• Cyber-Vandalism leads to other risks also that could be dangerous for your
computer system, your identity, your precious personal data and your
finances.
30. Website Defacement- Another form of Vandalism
• Any kind of attack on the website that changes its
appearance or changes the whole webpage is termed as
website defacement.
• Common means of this activity is through SQL injections
which aids in achieving administrative access and the other
is FTP that can be done once the thief acquires username
and password.
• Basically, government and religious websites are targeted
for defacement due to either political reasons or even for
fun.
• This act may recruit a bad image of the websites and
people may lose faith in these sites due to security reasons.
Such threats affect the victim’s life to a larger magnitude
thus it is indispensable for you to know how to protect your
digital privacy.
31. There are notable cases of Cyber-
vandalism
• 1. John Seigenthaler, Sr. was defamed in May
2005, as one user edited his biography article on
Wikipedia. One of his friend Victor S. Johnson, Jr.,
noticed the false statements.
• 2. Donald Trump’s complete Wikipedia page was
switched by one single verdict, “Let’s be fair,
nobody cares about him”, in July 2015.
• 3. Hillary Clinton was added to the cast of
Weekend at Bernie’s Wikipedia page in
August 2016 after her “medical episode” at the
9/11 memorial.
32. Who are the cyber vandals: A genre of people who vandalise
computer systems
• 1. Professional Developers
• As the professional developers have experience and expertise in creating
programs, they are proficient enough to create computer viruses also. They are so
much skilled that they can easily encroach into the data systems or can even
exploit the security susceptibilities and may use many such tricks to impede your
computer system.
• 2. Researchers
• These are the people who can simply counterattack the actions of an antivirus
software in a computer and can discover methods to infect the computer.
Researchers actually do not spread their created programmes but they do
encourage their destructing concepts through the internet. These ideas may be
used in the future, by the wicked folks.
• 3. Skilled and inexperienced youth
• At times the young hackers try to prove their worth and fall into the category of
cyber vandals. Those students who are skilled enough in creating malware they
earn money by selling their ideas to antivirus companies. While those young
people who are still not thorough with the ability to create malware, learn to
create viruses through internet tutorials. It is easily approachable crime for
youngsters that commit the biggest cyber security crimes and leave the victim’s
image completely ruined at once.
33. How can vandalism crime be a threat?
• • It affects your digital identity and image
• If you have a business, it loses your customers
• It ruins your overall reputation
• Extra expenses, time and labour are involved
• Reduces your profits
• The US government has stated vandalism laws under the
criminal laws section that contains: Federal law, State law,
Evidence and Impediments to prosecution.
• You can protect yourself from Cyber-vandalism by identity
management and by updating your security system.
• One spark neglected may burn the house and your hands
will be completely in ashes. A well working security system
is needed in case you do not want to let your identity be
kept at stake.
34. Cyber Espionage
• Cyber spying is the act of engaging in an attack or series of
attacks that let an unauthorized user or users view
classified material.
• These attacks are often subtle, amounting to nothing more
than an unnoticed bit of code or process running in the
background of a mainframe or personal workstation, and
the target is usually a corporate or government entity.
• The goal is typically to acquire intellectual property or
government secrets.
• Attacks can be motivated by greed or profit, and can be
used in conjunction with a military operation or as an act of
terrorism.
• Consequences can range from loss of competitive
advantage to loss of materials, data, infrastructure, or loss
of life.
35. • Cyber espionage attacks can result in damaged reputations and stolen
data, including personal and private information.
• Cyber attacks targeted at the government may cause military operations
to fail, and can also result in lives lost due to leaked classified information.
What exactly is it that cyber-criminals look for when planning an attack?
• Common targets include:
• Internal data – Operations, salaries, research and development.
• Intellectual property – Top-secret projects, formulas, plans or other kinds
of private data. Anything an attacker could sell or use to their own benefit.
• Client and customer information – Who are the clients of this
organization? How much are they paying, and for what services?
• Marketing and competitive intelligence – Short and long-range marketing
goals and competitor knowledge.
• Businesses often consider loss of data as a primary concern, but a
damaged reputation can be just as troubling. If an organization allows its
infrastructure to be used to enable or foster cyber espionage, they can put
themselves at risk – not just from the attackers, but from clients and
shareholders, as well.
Cyber Espionage
36. Cyber Sabotage
• Cyber Sabotage is yet another new wrinkle in the emerging threats from
cyber space.
• Whether delivered over the internet or purposefully installed during the
manufacturing process, contaminated hardware or software is now a
concern.
• Sabotage is defined as deliberate and malicious acts that result in the
disruption of the normal processes and functions or the destruction or
damage of equipment or information.
• In the commercial sector cyber sabotage could be used to attack
competition and steal market share. In 2007 there were an estimated 269
million PCs shipped worldwide.
• Just imagine the backlash if a saboteur was able to contaminate the
master software file used to image all the computers produced by the
huge computer manufacturer HP.
• The millions of computers they ship each month could pose a significant
threat to the business customers, and consumers and could even pose a
national security threat.
37. Cyber Sabotage
• In the recent past, we have seen attacks by hackers designed to disrupt
websites and economic activity on the part of groups or individuals trying
to achieve a political agenda - such groups and individuals are known as
Hacktivists.
• The pro-regime Syrian Electronic Army, has been implicated in the
defacement of government and press websites, including that of Forbes
magazine.
• Also, the hacktivist collective known as Anonymous has been involved in
online attacks against government and organizations such as the Church of
Scientology.
• Anonymous is a particularly interesting organization. It is what is known as
a flat organization, lacking any clear hierarchy, and it is made up of
individuals or cells that sometimes work as part of Anonymous, when they
identify with its goals, and sometimes do not.
• Anonymous’s attacks occur when an issue raised motivates hackactivists
to swarm (create informal partnerships in order to take down websites or
engage in other means of sabotage).