SlideShare a Scribd company logo
Subject - Cyber Laws & Rights
M. tech. 3rd Sem., ISM.
By: Prashant Vats,
M.tech., Ph.D.
INDIRA GANDHI DELHI TECHNICAL UNIVERSITY
FOR WOMEN
Kinds of Cyber Crimes
In these slides we will cover topics like
• Cyber stalking;
• Cyber pornography;
• Cyber forgery and fraud;
• Crime related to IPRs;
• Cyber terrorism;
• Computer vandalism
• Cyber espionage
• Cyber Sabotage
Cyber stalking
• Cyberstalking is the use of the Internet or other electronic means
to stalk or harass an individual, group, or organization.
• It may include false accusations, defamation, slander and libel.
• It may also include monitoring, identity theft, threats, vandalism,
solicitation for sex, or gathering information that may be used to
threaten, embarrass or harass.
• Cyber stalking is often accompanied by real-time or offline stalking.
• In many jurisdictions, both are criminal offenses. Both are
motivated by a desire to control, intimidate or influence a victim.
• A stalker may be an online stranger or a person whom the target
knows. They may be anonymous and solicit involvement of other
people online who do not even know the target.
• Cyberstalking is a criminal offense under various state anti-
stalking, slander and harassment laws.
• A conviction can result in a restraining order, probation, or criminal
penalties against the assailant, including jail.
Cyber stalking contd.
• There have been a number of attempts by experts and legislators to
define cyberstalking.
• It is generally understood to be the use of the Internet or other
electronic means to stalk or harass an individual, a group, or an
organization.
• Cyberstalking is a form of cyberbullying; the terms are often used
interchangeably in the media. Both may include false
accusations, defamation, slander and libel.
• Cyberstalking may also include monitoring, identity theft, threats,
vandalism, solicitation for sex, or gathering information that may be
used to threaten or harass.
• Cyberstalking is often accompanied by real-time or offline stalking.
Both forms of stalking may be criminal offenses.
• Stalking is a continuous process, consisting of a series of actions,
each of which may be entirely legal in itself.
Cyber stalking contd.
• Cyberstalking is a technologically-based "attack" on
one person who has been targeted specifically for that
attack for reasons of anger, revenge or control.
• Cyberstalking can take many forms, including:
1. harassment, embarrassment and humiliation of the
victim
2. emptying bank accounts or other economic control
such as ruining the victim's credit score
3. harassing family, friends and employers to isolate the
victim
4. scare tactics to instill fear and more.
Kinds Of Cyberstalking
• Women in India whether she is a college student, working
professional or housewife get stalked on a regular basis.
• Stalking itself is a criminal offence either physical or electronic
and is punishable with one to three years of jail.
• Let’s explore the kinds of cyberstalking that till now has been
reported worldwide.
• Catfishing - In Catfishing, Stalkers create a fake profile on social
media to approach victims. Sometimes they copy the existing
user's profile with photos to look it like a real one.
• Monitoring location check-ins on social media - Stalkers keep
an eye on the activities of a victim from their check-ins on
social media such as Facebook and Instagram. This is an easier
job for a stalker to gauge a victim's behavioural pattern quite
accurately.
• Visiting virtually via Google Maps Street View - If a stalker
discovers the victim's address, then it is not hard to find the
area, neighbourhood, and surroundings by using Street View.
Tech-savvy stalkers don't need that too. They can discover the
victim's place from the posts or photos posted on social media.
Kinds Of Cyberstalking
• Hijacking webcam - Computer's webcam hijacking is one of
the most disgusting methods of cyberstalking to invade the
victim's privacy. Stalkers push malware-infected files into the
victim's computer which gives them access to the webcam.
• Installing Stalkerware - One more method which is increasing
its popularity is the use of Stalkerware. It is a kind of software
or spyware which keeps track of the location, enable access to
text and browsing history, make an audio recording, etc. And
an important thing is that it runs in the background without
any knowledge to the victim.
• Looking at geotags to track location - Mostly digital pictures
contain geotags which is having information like the time and
location of the picture when shot in the form of metadata.
Geotags comes in the EXIF format embedded into an image
and is readable with the help of special apps. In this way, the
stalker keeps an eye on the victim and gets the information
about their whereabouts.
Provisions For Cyberstalking In India
• Cyberstalking is a serious crime worldwide and the number of cases of it goes on
increasing every year.
• In India, a large percentage of cases filed against cyberstalking are by women. To deal
with the cyberstalking in India following provisions are available:
• Information Technology Act, 2000 - When a person publishes or sends salacious
material via electronic media is to be charged under Section 67 of the Act.
Data protection is very important to prevent cyberstalking which is easily leaked by
hackers.
• For data protection, IT Amendment Act, Section 43A has been included the provision
for the inclusion of a Body Corporate. If a firm or a company transmits sensitive
information about a person, according to the act such body corporate will be liable to
pay the damages by compensation.
• Under Section 67 of the Act, when a stalker sends or posts any obscene content to the
victim via electronic media then they will be liable to punish with 5 years of jail and
Rs. 1 Lacs fine. If the incidence repeats then they will be liable to punish with 10 years
of jail and Rs. 2 Lacs fine.
• As per the provision provided in the law, when a stalker misuses victim's personal
information to post an obscene message or comment on any electronic media, then
this action is punishable for defaming and harming a person's reputation with
imprisonment of 2 years, fine or both.
• The criminal law (Amendment) Act, 2013 - According to the act, Stalking is an offence
under Section 354D of the IPC (Indian Penal Code).
When a man is trying to communicate with a woman without her interest over the
internet via email, instant messages or any other electronic communication is the
offence of stalking.
Cyber Pornography
• Porn today is more freely and widely available on Internet than ever
before. Younger generation is therefore able to access it very easily and
quickly than ever. This leads to the mentality of unemotional sex.
• And all this is because we have grown up in a culture where parents feel
embarrassed, they are not comfortable to have a healthy conversation
about sex with their children. Well then its time to open up and come out
of our comfort zone to talk about the most hush-hush topic
i.e. Pornography.
• According to City of Youngstown v. DeLoreto (USA , 1969) Pornography is
the portrayal of erotic behavior designed to cause sexual excitement. It is
words, acts, or representations that are calculated to stimulate sex
feelings independent of the presence of another loved and chosen
human being. It is divorced from reality in its sole purpose to stimulate
erotic response.
• It is preoccupied with and concentrates on sex organs for the purpose of
sexual stimulation. It emphasizes them and focuses on them in varying
ways calculated to incite sexual desire.
• The term Pornography refers to any work or art or form dealing with sex
or sexual themes. It involves images , videos of both man and woman
involved in sexual activities and is accessible on internet world wide.
• There has not been only a single definition of the law of the word
pornography applied all over the world.
• The pornography or the pornographic material varies according to
the vision and understanding of the people of different culture
across the world and it has beTen a difficult task to define the
material/content to be a pornographic content/material.
• Basically pornography is nothing but marketing of man or woman
sex, shown as object for those who get involved into sexual acts.
Pornographers use the internet to sell their material to sex addicts
and to the interested parties. Watching and keeping of these kind
of materials is illegal in India. Nowadays pornography has become
a kind of a business to the society as people indulge themselves to
gain the economical benefits from them.
• They even put the hidden cameras and violates the privacy of the
society ex: hotels , paying guest , hostels , changing rooms in
shopping complex etc.
• It has been a market for near about $1 trillion. Pornography has
been in existence since the pre-historic time as it was seen in the
painting or rock
Cyber Pornography
• Therefore, with emerging of time, there was invention of
photography which gave rise to pornography. The world's first law
criminalizing pornography was the English Obscene Publications Act
1857.
• The Act, applied to the United Kingdom and Ireland, and it made
the sale of obscene material a statutory offence, giving the courts
power to seize and destroy offending material.
• Pornographic film production commenced after the invention of the
motion picture in 1895. Sexually explicit films opened producers
and distributors to prosecution.
• Pornography is the literature of an art which have the portrait of
sexuality emphasizing upon emotions and feelings.
• Pornography is of 2 types:
• Soft core and Hardcore, where the pornography work is referred as
the hardcore content and the soft core pornography consists of
nudity or partial nudity in sexual situations. Perhaps, both the kinds
of pornography involve nudity.
Cyber Pornography
Child Pornography In India
• Child pornography is an illegal act in India. Information Technology Act,
2000 & Indian Penal Code, 1860 gives protection against the child
pornography. Child refers to the person who is below the age of 18
years. The Internet is being highly used by its abusers to reach and abuse
children sexually, globally. The internet is becoming a household
commodity in India. Its explosion has made the children a viable victim to
the cyber crime.
• As more homes have access to internet, more children would be using
the internet and more are the chances of falling victim to the aggression
of pedophiles. The easy access to the pornographic contents readily and
freely available over the internet lowers the inhibitions of the children.
• Pedophiles lure the children by distributing pornographic material, then
they try to meet them for sex or to take their nude photographs
including their engagement in sexual positions. Sometimes Pedophiles
contact children in the chat rooms posing as teenagers or a child of
similar age, then they start becoming friendlier with them and win their
confidence.
• Then slowly pedophiles start sexual chat to help children shed their
inhibitions about sex and then call them out for personal interaction.
• The Information Technology Act is set of rules to make it illegal to not
only transmit or create child pornography in electronic form, but even to
surf it The above section covers websites, graphics files, SMS, MMS,
digital photographs etc.
• The punishment for a first offence of publishing, creating,
exchanging, downloading or browsing any electronic depiction of
children in obscene or indecent or sexually explicit manner is
imprisonment for 5years and a fine of Rs 10 lakh.
• Section 67 of the Information and technology Act deals with
publishing obscene information in electronic form.
• Section 67 along with section 67A does not apply to any book,
pamphlet, paper, writing, drawing, painting, representation or
figure in electronic form which is used for religious purposes or is in
the interest of science, literature, art or learning.
• It is a generally that it does not specifically define pornography or
make it an offence, and does not mention child pornography.
• Section 67B lays down the punishment for involving in sexual
explicates electronic or online contents that depicts children's. it is
also illegal to induce children's in sexual acts or into online
relationships.
Child Pornography In India
The IT Act 2000 also criminalizes online child pornography in the
following circumstances
• a) Publication or transmission of any material depicting children in
explicit sexual act or conduct by using any computer resource and
communication device.
• b) Where user uses computer or communication resource for
seeking or collecting or creating digital images or texts or
downloading or promoting etc. any material in any electronic form
depicting children in an obscene or indecent or sexually explicit
manner.
• c) Cultivating, enticing or inducing children to online relationships
with one or more children for and on a sexually explicit act or in a
manner that may offend a reasonable adult on the computer
resource.
• d) Facilitating abusing children online.
• e) Recording in any electronic form owns abuse or that of others
pertaining to sexually explicit activities with children.
Obscenity
• Obscenity has not been defined under any law/statute which penalizes,
prohibits, publishing, importing, mailing, exporting and selling such
obscene material or matter.
• The Court has the duty to examine whether the alleged obscene content
contains obscene matter which is likely to attract the people and corrupt
those minds who are open to such influences.
• Section 292 of the IPC deals with the selling of the obscene books,
magazines etc. Whosoever sells, distributes or publicly exhibits or in any
manner circulates, or imports or exports any obscene book, pamphlet,
paper, drawing, art, painting, representation or figure or any other
obscene object which is in his/ her possession.
• This section, tells that the knowledge of obscenity is not essential for
constitution of an offence.
• It provides punishment on first conviction with imprisonment of either
description for a term which may extend to 2years and fine of 2,000
rupees, and in the subsequent conviction with imprisonment which may
extend to 5 years and also fine which may extend to 5,000 rupees.
• Except the physical contact, demanding or requesting for sexual favors,
showing pornography or making sexually colored remarks shall
constitute grounds for sexual harassment and he/she shall be punish
with imprisonment which may range from to 3years or fine or both , in
first three cases and in fourth case imprisonment which may extend to 1
year or with fine or with both.
• Any man who sees or captures the image of a woman engaging in
private act, within her private space shall be punishable with
imprisonment of not less than 1 year which may extend to 3 years
and with fine and on second conviction imprisonment not less
than 3 years which may extend to 7 years and with fine.
• If any person with intent to induces a girl, who is a minor (below
18 years of age), to move from any place or force her to do any
act, of which he has knowledge that the minor girl will be forced
to perform illicit intercourse with another person, shall be
punishable with imprisonment which may extend to ten years and
fine for procuring a minor girl.
• And if imports any girl of 21 years of age from outside the
territory of India (now including Jammu & Kashmir) for the same
will be punishable with 10years imprisonment and fine on such
importation of girl.
Obscenity
Bazee.com case,
• In the landmark case of Avnish Bajaj v. State popularly known as Bazee.com
case, an IIT Kharagpur student named Ravi Raj placed on bazee.com a listing
offering an obscene MMS video clip for sale for rupees 125 per video with the
username Alice-elec.
• Luckily bazee.com have a filter for posting questionable content. Despite that
the listing never took place with the description, Item 2787748- DPS Girl
having fun!!! Full video + Bazee points.
• Listed on 27th November 2004 and was deactivated around 10 a.m on 29 th
November 2004. Then an event took place where The Crime Branch of Delhi
Police took cognizance of the matter and registered an FIR. Charge sheet was
filed against Ravi Raj, Avnish Bajaj and the owner of the website, Sharat
Digumarti.
• The petitioner contended three issues, namely:
i. There was no intervention of the website as the transmission of the MMS
clip was directly between the buyer and seller. The sellers after receiving
confirmation from the buyer sent the clip to the buyer through an email
attachment. They accepted that the website is responsible for the listing
placed on the website only and does not becomes the subject matter of
section 292/294 of Indian Penal Code, 1860 or section 67 of IT Act, 2000.
• ii. The website removed the objectionable content the moment they received
such information of obscene content be listed on their website.
• iii. Section 67 of IT Act, 2000 plainly covers only the publication of obscene
material and not the transmission of such material.
• The State in reply to the above said contentions said:
i. Section 292 Indian Penal Code, 1860 (IPC) includes not only
obvious acts but also illegal omissions within sections 32, 35
AND 36, IPC.
ii. The failure to have the requisite filter in a system demand
serious consequences and a website cannot escape from
such legal consequences.
iii. The website did not do anything to stop the transaction of
illegal content when the payment was made to the seller.
• In another case, students teased a fellow classmate for
having pockmarked face. The agitated student created a
website and use pictures of his fellow classmates and
teachers in pornographic content.
• Under section 67 of IT Act, 2000 was registered and Police
picked the concerned student and kept him in a juvenile
home.
Bazee.com case,
• Legality:
Coming to the legality prospectus of Pornography, our law does not stop us from
watching pornography privately. All that the law prohibits its production ,
distribution , transmission, publication.
1. Section 67 of IT Act 2000
• · Punishment for publishing or transmitting obscene material in electronic form
· Imprisonment for 3years or fine of 5,00,000.
· For subsequent conviction imprisonment for 5years and with 10,00,000
rupees fine
2. Section 293 of Indian Penal Code (IPC) 1860
• · Sale, etc., of obscene objects to young person
· Imprisonment for 3years or Fine of 2,000 rupees
· For subsequent conviction imprisonment for 7years and also with 5,000.
Suggestions:
· Sex education should be made part of higher education syllabus.
· Organizing sex education conferences and seminars at school, work pace and
other forums for awareness.
· Legislature needs to form a separate law/statute for the prohibition of
pornography.
Bazee.com case,
Computer‐related fraud or forgery
• Under the Council of Europe Cybercrime Convention, fraud and forgery
are considered part of the computer-related offences (i.e., computer-
related forgery and computer-related fraud).
• Article 7 of the Council of Europe Cybercrime Convention
defines computer-related forgery as "intentional… and without right, the
input, alteration, deletion, or suppression of computer data, resulting in
inauthentic data with the intent that it be considered or acted upon for
legal purposes as if it were authentic, regardless whether or not the data
is directly readable and intelligible." This cybercrime is also prohibited
under Article 10 of the Arab Convention on Combating Information
Technology Offences.
• Computer-related forgery involves impersonation of legitimate
individuals, authorities, agencies, and other entities online for
fraudulent purposes.
• Cybercriminals can impersonate people from legitimate organizations and
agencies in order to trick them into revealing personal information and
providing the offenders with money, goods and/or services.
• The email sender pretends to be from a legitimate organization or agency
in an attempt to get users to trust the content and follow the instructions
of the email. Either the email is sent from a spoofed email address
(designed to look like an authentic email from the organization or agency)
or from a domain name similar to the legitimate organization or agency
(with a few minor variations).
Computer‐related fraud or forgery
• A common technique used is the sending of an email
to targets with a website link for users to click on,
which might either download malware onto the users'
digital devices or sends users to a malicious website
that is designed to steal users' credentials ( phishing).
• The "spoofed" website (or pharmed website) looks like
the organization's and/or agency's website and
prompts the user to input login credentials.
• The email provides different prompts to elicit fear,
panic and/or a sense of urgency in order to get the
user to respond to the email (and complete the tasks
requested in the email) as soon as possible, such as the
need to update personal information to receive funds
or other benefits, warnings of fraudulent activity on
the user's account, and other events requiring the
target's immediate attention.
• This tactic is not targeted, the email is sent en masse to catch as many victims as possible.
• A targeted version of phishing is known as spearphishing. This form of fraud occurs when
perpetrators are familiar with the inner workings and positions of company employees and
send targeted emails to employees to trick them into revealing information and/or sending
money to the perpetrators.
• Another technique involves cybercriminals pretending to be higher level executives in a
company (part of the C-suite - Chief Executive Officer, Chief Financial Officer and Chief
Security Officer), lawyers, accountants, and others in positions of authority and trust, in
order to trick employees into sending them funds. This tactic is known as whaling because it
yields the highest payout.
• The US toy company Mattel was a victim of whaling. The cybercriminals behind this attack
had been surreptitiously monitoring the company's networks and communications for
months prior to the incident. After an announcement was made that a new CEO was
appointed, the cybercriminals used the identity of the new CEO (Christopher Sinclair) to
perpetrate the attack.
• Particularly, the cybercriminals sent a message as Christopher Sinclair asking the recipient to
approve a three-million-dollar transfer to a bank in Wenzhou, China, to pay a Chinese supplier.
As the request came from the CEO, the employee transferred the money but later contacted
the CEO about it. The CEO denied making the request. Mattel subsequently contacted US law
enforcement, the US Federal Bureau of Investigation, their bank, and Chinese law enforcement
authorities (Ragan, 2016). The timing of the incident (the money had been transferred on the
eve of a holiday) gave Chinese authorities time to freeze the accounts before the banks
opened, enabling Mattel to recover its money.
Computer‐related fraud or forgery
Cyber terrorism
• Section 66F of the IT Act prescribes punishment for cyber
terrorism.
• Whoever, with intent to threaten the unity, integrity,
security or sovereignty of India or to strike terror in the
people or any section of the people,
• denies or causes the denial of access to any person
authorized to access a computer resource, or attempts to
penetrate or access a computer resource without
authorisation or exceeding authorised access,
• or introduces or causes the introduction of any computer
contaminant, and by means of such conduct causes or
• is likely to cause death or injuries to persons or damage to
or destruction of property or disrupts
• or knowing that it is likely to cause damage or disruption of
supplies or services essential to the life of the community
or adversely affect critical information infrastructure, is
guilty of 'cyber terrorism'.
Cyber terrorism
• Whoever knowingly or intentionally penetrates or accesses a
computer resource without authorisation or exceeding authorised
access,
• and by means of such conduct obtains access to information, data
or computer database that is restricted for reasons for the security
of the State or foreign relations, or any restricted information, data
or computer database, with reasons to believe that such
information, data or computer database so obtained may be used
to cause or likely to cause injury to the interests of the sovereignty
and integrity of India, the security of the State, friendly relations
with foreign States, public order, decency or morality, or in relation
to contempt of court, defamation or incitement to an offence, or to
the advantage of any foreign nation, group of individuals or
otherwise, is also guilty of 'cyber terrorism'.
• Whoever commits or conspires to commit cyber terrorism shall be
punishable with imprisonment which may extend to imprisonment
for life.
• There is no provision in the IPC that mirrors section 66F of the IT
Act, though section 121 of the IPC (waging, or attempting to wage
war, or abetting waging of war, against the Government of India)
does cover this offence partially.
Intellectual Property Theft
• Intellectual property (IP) theft is defined as theft of material that is
copyrighted, the theft of trade secrets, and trademark violations. A
copyright is the legal right of an author, publisher, composer, or other
person who creates a work to exclusively print, publish, distribute, or
perform the work in public. The United States leads the world in the
creation and selling of IP products to buyers nationwide and
internationally. Examples of copyrighted material commonly stolen online
are computer software, recorded music, movies, and electronic games.
• Theft of trade secrets means the theft of ideas, plans, methods,
technologies, or any sensitive information from all types of industries
including manufacturers, financial service institutions, and the computer
industry. Trade secrets are plans for a higher speed computer, designs for
a highly fuel-efficient car, a company's manufacturing procedures, or the
recipe for a popular salad dressing, cookie mix, or barbeque sauce. These
secrets are owned by the company and give it a competitive edge. Theft of
trade secrets damages the competitive edge and therefore the economic
base of a business.
• A trademark is the registered name or identifying symbol of a product that
can be used only by the product's owner. A trademark violation involves
counterfeiting or copying brand name products such as well-known types
of shoes, clothing, and electronics equipment and selling them as the
genuine or original product.
• The two forms of IP most frequently involved in cyber crime are
copyrighted material and trade secrets. Piracy is a term used to describe IP
theft—piracy of software, piracy of music, etc. Theft of IP affects the
entire U.S. economy. Billions of dollars are lost every year to IP pirates. For
example, thieves sell pirated computer software for games or programs to
millions of Internet users. The company that actually produced the real
product loses these sales and royalties rightfully due to the original
creator.
• Historically, when there were no computers, IP crimes involved a lot of
time and labor. Movie or music tapes had to be copied, physically
produced, and transported for sale. An individual had to make the sale in
person. To steal a trade secret, actual paper plans, files, or blueprints
would have to be physically taken from a company's building and likewise
sold in person.
• In the twenty-first century software, music, and trade secret pirates
operate through the Internet. Anything that can be digitized—reduced to
a series of zeroes and ones—can be transmitted rapidly from one
computer to another. There is no reduction of quality in second, third, or
fourth generation copies. Pirated digital copies of copyrighted work
transmitted over the Internet are known as "warez." Warez groups are
responsible for illegally copying and distributing hundreds of millions of
dollars of copyrighted material.
Intellectual Property Theft
• Pirated trade secrets are sold to other companies or illegal
groups. Trade secrets no longer have to be physically stolen
from a company.
• Instead, corporate plans and secrets are downloaded by
pirates onto a computer disc. The stolen information can be
transmitted worldwide in minutes.
• Trade secret pirates find pathways into a company's
computer systems and download the items to be copied.
• Companies keep almost everything in their computer files.
Pirated copies are sold over the Internet to customers who
provide their credit card numbers then download the copy.
Intellectual Property Theft
Cyber/Computer vandalism
• Cyber-Vandalism accounts to the act of damaging someone’s data from the
computer that in a way disrupts the victim’s business or image due to editing
the data into something invasive, embarrassing or absurd.
• The thieves create malevolent programs that prove injurious to the hard disk
data or login credentials of the victim.
• Cyber-vandalism is different from computer viruses that attach into the
programs and Wikipedia being one of the famous sites, is prone to potential
damage of content because anyone can edit the site.
• However, Wikipedia has presently sustained an equilibrium between the
types of users that there are articles that cannot be edited by unregistered or
new users.
• Today’s vandalism felony surrounds the computers and in some countries,
new laws have also been updated that has resulted in the punishment for
vandalism.
• The gaming company networks have paved a productive way for the
computer-literate youth to indulge their knowledge and talents into creating
games rather than becoming malware designers.
• Cyber-Vandalism leads to other risks also that could be dangerous for your
computer system, your identity, your precious personal data and your
finances.
Website Defacement- Another form of Vandalism
• Any kind of attack on the website that changes its
appearance or changes the whole webpage is termed as
website defacement.
• Common means of this activity is through SQL injections
which aids in achieving administrative access and the other
is FTP that can be done once the thief acquires username
and password.
• Basically, government and religious websites are targeted
for defacement due to either political reasons or even for
fun.
• This act may recruit a bad image of the websites and
people may lose faith in these sites due to security reasons.
Such threats affect the victim’s life to a larger magnitude
thus it is indispensable for you to know how to protect your
digital privacy.
There are notable cases of Cyber-
vandalism
• 1. John Seigenthaler, Sr. was defamed in May
2005, as one user edited his biography article on
Wikipedia. One of his friend Victor S. Johnson, Jr.,
noticed the false statements.
• 2. Donald Trump’s complete Wikipedia page was
switched by one single verdict, “Let’s be fair,
nobody cares about him”, in July 2015.
• 3. Hillary Clinton was added to the cast of
Weekend at Bernie’s Wikipedia page in
August 2016 after her “medical episode” at the
9/11 memorial.
Who are the cyber vandals: A genre of people who vandalise
computer systems
• 1. Professional Developers
• As the professional developers have experience and expertise in creating
programs, they are proficient enough to create computer viruses also. They are so
much skilled that they can easily encroach into the data systems or can even
exploit the security susceptibilities and may use many such tricks to impede your
computer system.
• 2. Researchers
• These are the people who can simply counterattack the actions of an antivirus
software in a computer and can discover methods to infect the computer.
Researchers actually do not spread their created programmes but they do
encourage their destructing concepts through the internet. These ideas may be
used in the future, by the wicked folks.
• 3. Skilled and inexperienced youth
• At times the young hackers try to prove their worth and fall into the category of
cyber vandals. Those students who are skilled enough in creating malware they
earn money by selling their ideas to antivirus companies. While those young
people who are still not thorough with the ability to create malware, learn to
create viruses through internet tutorials. It is easily approachable crime for
youngsters that commit the biggest cyber security crimes and leave the victim’s
image completely ruined at once.
How can vandalism crime be a threat?
• • It affects your digital identity and image
• If you have a business, it loses your customers
• It ruins your overall reputation
• Extra expenses, time and labour are involved
• Reduces your profits
• The US government has stated vandalism laws under the
criminal laws section that contains: Federal law, State law,
Evidence and Impediments to prosecution.
• You can protect yourself from Cyber-vandalism by identity
management and by updating your security system.
• One spark neglected may burn the house and your hands
will be completely in ashes. A well working security system
is needed in case you do not want to let your identity be
kept at stake.
Cyber Espionage
• Cyber spying is the act of engaging in an attack or series of
attacks that let an unauthorized user or users view
classified material.
• These attacks are often subtle, amounting to nothing more
than an unnoticed bit of code or process running in the
background of a mainframe or personal workstation, and
the target is usually a corporate or government entity.
• The goal is typically to acquire intellectual property or
government secrets.
• Attacks can be motivated by greed or profit, and can be
used in conjunction with a military operation or as an act of
terrorism.
• Consequences can range from loss of competitive
advantage to loss of materials, data, infrastructure, or loss
of life.
• Cyber espionage attacks can result in damaged reputations and stolen
data, including personal and private information.
• Cyber attacks targeted at the government may cause military operations
to fail, and can also result in lives lost due to leaked classified information.
What exactly is it that cyber-criminals look for when planning an attack?
• Common targets include:
• Internal data – Operations, salaries, research and development.
• Intellectual property – Top-secret projects, formulas, plans or other kinds
of private data. Anything an attacker could sell or use to their own benefit.
• Client and customer information – Who are the clients of this
organization? How much are they paying, and for what services?
• Marketing and competitive intelligence – Short and long-range marketing
goals and competitor knowledge.
• Businesses often consider loss of data as a primary concern, but a
damaged reputation can be just as troubling. If an organization allows its
infrastructure to be used to enable or foster cyber espionage, they can put
themselves at risk – not just from the attackers, but from clients and
shareholders, as well.
Cyber Espionage
Cyber Sabotage
• Cyber Sabotage is yet another new wrinkle in the emerging threats from
cyber space.
• Whether delivered over the internet or purposefully installed during the
manufacturing process, contaminated hardware or software is now a
concern.
• Sabotage is defined as deliberate and malicious acts that result in the
disruption of the normal processes and functions or the destruction or
damage of equipment or information.
• In the commercial sector cyber sabotage could be used to attack
competition and steal market share. In 2007 there were an estimated 269
million PCs shipped worldwide.
• Just imagine the backlash if a saboteur was able to contaminate the
master software file used to image all the computers produced by the
huge computer manufacturer HP.
• The millions of computers they ship each month could pose a significant
threat to the business customers, and consumers and could even pose a
national security threat.
Cyber Sabotage
• In the recent past, we have seen attacks by hackers designed to disrupt
websites and economic activity on the part of groups or individuals trying
to achieve a political agenda - such groups and individuals are known as
Hacktivists.
• The pro-regime Syrian Electronic Army, has been implicated in the
defacement of government and press websites, including that of Forbes
magazine.
• Also, the hacktivist collective known as Anonymous has been involved in
online attacks against government and organizations such as the Church of
Scientology.
• Anonymous is a particularly interesting organization. It is what is known as
a flat organization, lacking any clear hierarchy, and it is made up of
individuals or cells that sometimes work as part of Anonymous, when they
identify with its goals, and sometimes do not.
• Anonymous’s attacks occur when an issue raised motivates hackactivists
to swarm (create informal partnerships in order to take down websites or
engage in other means of sabotage).
Thank you.

More Related Content

What's hot

Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
atuljaybhaye
 
Assignment On Theft & Robbery
Assignment On Theft & Robbery Assignment On Theft & Robbery
Assignment On Theft & Robbery
Hussain Shah
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
Dr Raghu Khimani
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
Adv Prashant Mali
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
PROF. PUTTU GURU PRASAD
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
sunanditaAnand
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
Avani Patel
 
First Information Report (F.I.R)
First Information Report (F.I.R)  First Information Report (F.I.R)
First Information Report (F.I.R)
Law Laboratory
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
Vijay Dalmia
 
Procedure of investigation (Indian Perspective)
Procedure of investigation (Indian Perspective)Procedure of investigation (Indian Perspective)
Procedure of investigation (Indian Perspective)
Vaibhav Laur
 
Crpc sec 160
Crpc sec 160Crpc sec 160
Crpc sec 160
ArundhatiBanerjee6
 
Protection of Women from Sexual Harassment at Workplace Act
Protection of Women from Sexual Harassment at Workplace ActProtection of Women from Sexual Harassment at Workplace Act
Protection of Women from Sexual Harassment at Workplace Act
Bajaj Allianz Life Insurance
 
Criminal Profiling.pptx
Criminal Profiling.pptxCriminal Profiling.pptx
Criminal Profiling.pptx
Ayush Choudhary
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
Talwant Singh
 
Internet Governance
Internet GovernanceInternet Governance
Internet Governance
ARIN
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
Tushar Bisen
 
Securing the Crime Scene
Securing the Crime SceneSecuring the Crime Scene
Securing the Crime Scene
Don Caeiro
 
Indian cyber law
Indian cyber lawIndian cyber law
Indian cyber law
Shreedhar Kalwad
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
rakesh mishra
 
Honour killing in India
Honour killing in IndiaHonour killing in India
Honour killing in India
Altacit Global
 

What's hot (20)

Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Assignment On Theft & Robbery
Assignment On Theft & Robbery Assignment On Theft & Robbery
Assignment On Theft & Robbery
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
First Information Report (F.I.R)
First Information Report (F.I.R)  First Information Report (F.I.R)
First Information Report (F.I.R)
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Procedure of investigation (Indian Perspective)
Procedure of investigation (Indian Perspective)Procedure of investigation (Indian Perspective)
Procedure of investigation (Indian Perspective)
 
Crpc sec 160
Crpc sec 160Crpc sec 160
Crpc sec 160
 
Protection of Women from Sexual Harassment at Workplace Act
Protection of Women from Sexual Harassment at Workplace ActProtection of Women from Sexual Harassment at Workplace Act
Protection of Women from Sexual Harassment at Workplace Act
 
Criminal Profiling.pptx
Criminal Profiling.pptxCriminal Profiling.pptx
Criminal Profiling.pptx
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
Internet Governance
Internet GovernanceInternet Governance
Internet Governance
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
 
Securing the Crime Scene
Securing the Crime SceneSecuring the Crime Scene
Securing the Crime Scene
 
Indian cyber law
Indian cyber lawIndian cyber law
Indian cyber law
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
Honour killing in India
Honour killing in IndiaHonour killing in India
Honour killing in India
 

Similar to Kinds of Cyber Crimes

Introduction.pptx
Introduction.pptxIntroduction.pptx
Introduction.pptx
ssusere71a07
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
Christine Hui Jun Zhong
 
cyber crime
cyber crimecyber crime
cyber crime
Akash Mehta
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
vichu19891
 
Cybercrime
CybercrimeCybercrime
Cybercrime
SERCOD
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
Anshuman Tripathi
 
Living in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptxLiving in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptx
Froilan Cantillo
 
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Scott Mills
 
Respect%20 yourself/Respect Others
Respect%20 yourself/Respect OthersRespect%20 yourself/Respect Others
Respect%20 yourself/Respect Others
nealbd
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
Syed Rizwan Ali
 
Cyber Sexual Violence and Understanding
Cyber Sexual Violence and UnderstandingCyber Sexual Violence and Understanding
Cyber Sexual Violence and Understanding
ssusere22fb9
 
Cyber Laws -Nudrat Mufti
Cyber Laws -Nudrat MuftiCyber Laws -Nudrat Mufti
Cyber Laws -Nudrat Mufti
NUDRAT MUFTI
 
E-Tech_Lesson2.pptx
E-Tech_Lesson2.pptxE-Tech_Lesson2.pptx
E-Tech_Lesson2.pptx
ReyLouieSedigo1
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
hubbysoni
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Arjith K Raj
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
shubham ghimire
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Pardeep Kumar
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ict
cyb1337
 
Dark side of it and cyber crime
Dark side of it and cyber crimeDark side of it and cyber crime
Dark side of it and cyber crime
Puja Dhakal
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
RoshanMaharjan13
 

Similar to Kinds of Cyber Crimes (20)

Introduction.pptx
Introduction.pptxIntroduction.pptx
Introduction.pptx
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Living in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptxLiving in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptx
 
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
 
Respect%20 yourself/Respect Others
Respect%20 yourself/Respect OthersRespect%20 yourself/Respect Others
Respect%20 yourself/Respect Others
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
Cyber Sexual Violence and Understanding
Cyber Sexual Violence and UnderstandingCyber Sexual Violence and Understanding
Cyber Sexual Violence and Understanding
 
Cyber Laws -Nudrat Mufti
Cyber Laws -Nudrat MuftiCyber Laws -Nudrat Mufti
Cyber Laws -Nudrat Mufti
 
E-Tech_Lesson2.pptx
E-Tech_Lesson2.pptxE-Tech_Lesson2.pptx
E-Tech_Lesson2.pptx
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ict
 
Dark side of it and cyber crime
Dark side of it and cyber crimeDark side of it and cyber crime
Dark side of it and cyber crime
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 

More from Dr. Prashant Vats

Multiplexers
MultiplexersMultiplexers
Multiplexers
Dr. Prashant Vats
 
C lab programs
C lab programsC lab programs
C lab programs
Dr. Prashant Vats
 
Financial fucntions in ms e xcel
Financial fucntions in ms e xcelFinancial fucntions in ms e xcel
Financial fucntions in ms e xcel
Dr. Prashant Vats
 
4. text functions in excel
4. text functions in excel4. text functions in excel
4. text functions in excel
Dr. Prashant Vats
 
3. lookup functions in excel
3. lookup functions in excel3. lookup functions in excel
3. lookup functions in excel
Dr. Prashant Vats
 
2. date and time function in excel
2. date and time function in excel2. date and time function in excel
2. date and time function in excel
Dr. Prashant Vats
 
1. statistical functions in excel
1. statistical functions in excel1. statistical functions in excel
1. statistical functions in excel
Dr. Prashant Vats
 
3. subtotal function in excel
3. subtotal function in excel3. subtotal function in excel
3. subtotal function in excel
Dr. Prashant Vats
 
2. mathematical functions in excel
2. mathematical functions in excel2. mathematical functions in excel
2. mathematical functions in excel
Dr. Prashant Vats
 
RESOLVING CYBERSQUATTING DISPUTE IN INDIA
RESOLVING CYBERSQUATTING DISPUTE IN INDIARESOLVING CYBERSQUATTING DISPUTE IN INDIA
RESOLVING CYBERSQUATTING DISPUTE IN INDIA
Dr. Prashant Vats
 
India: Meta-Tagging Vis-À-Vis Trade Mark Misuse: An Overview
India: Meta-Tagging Vis-À-Vis Trade Mark Misuse: An OverviewIndia: Meta-Tagging Vis-À-Vis Trade Mark Misuse: An Overview
India: Meta-Tagging Vis-À-Vis Trade Mark Misuse: An Overview
Dr. Prashant Vats
 
Trademark Cases Arise from Meta-Tags, Frames: Disputes Involve Search-Engine ...
Trademark Cases Arise from Meta-Tags, Frames: Disputes Involve Search-Engine ...Trademark Cases Arise from Meta-Tags, Frames: Disputes Involve Search-Engine ...
Trademark Cases Arise from Meta-Tags, Frames: Disputes Involve Search-Engine ...
Dr. Prashant Vats
 
Scheme for Notifying Examiner of Electronic Evidence Under section 79A of the...
Scheme for Notifying Examiner of Electronic Evidence Under section 79A of the...Scheme for Notifying Examiner of Electronic Evidence Under section 79A of the...
Scheme for Notifying Examiner of Electronic Evidence Under section 79A of the...
Dr. Prashant Vats
 
METHODS OF RESOLVING CYBERSQUATTING DISPUTE IN INDIA
METHODS OF RESOLVING CYBERSQUATTING DISPUTE IN INDIAMETHODS OF RESOLVING CYBERSQUATTING DISPUTE IN INDIA
METHODS OF RESOLVING CYBERSQUATTING DISPUTE IN INDIA
Dr. Prashant Vats
 
Computer Software and Related IPR Issues
Computer Software and Related IPR Issues Computer Software and Related IPR Issues
Computer Software and Related IPR Issues
Dr. Prashant Vats
 
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Dr. Prashant Vats
 
Trademark Issues in cyberspace
Trademark Issues in cyberspace Trademark Issues in cyberspace
Trademark Issues in cyberspace
Dr. Prashant Vats
 
Trade-Related Aspects of Intellectual Property Rights (TRIPS)
Trade-Related Aspects of Intellectual Property Rights (TRIPS)Trade-Related Aspects of Intellectual Property Rights (TRIPS)
Trade-Related Aspects of Intellectual Property Rights (TRIPS)
Dr. Prashant Vats
 
How to Copyright a Website to Protect It under IPR and copyright act
How to Copyright a Website to Protect It under IPR and copyright actHow to Copyright a Website to Protect It under IPR and copyright act
How to Copyright a Website to Protect It under IPR and copyright act
Dr. Prashant Vats
 
International Treaties for protection of IPR
International Treaties for protection of IPRInternational Treaties for protection of IPR
International Treaties for protection of IPR
Dr. Prashant Vats
 

More from Dr. Prashant Vats (20)

Multiplexers
MultiplexersMultiplexers
Multiplexers
 
C lab programs
C lab programsC lab programs
C lab programs
 
Financial fucntions in ms e xcel
Financial fucntions in ms e xcelFinancial fucntions in ms e xcel
Financial fucntions in ms e xcel
 
4. text functions in excel
4. text functions in excel4. text functions in excel
4. text functions in excel
 
3. lookup functions in excel
3. lookup functions in excel3. lookup functions in excel
3. lookup functions in excel
 
2. date and time function in excel
2. date and time function in excel2. date and time function in excel
2. date and time function in excel
 
1. statistical functions in excel
1. statistical functions in excel1. statistical functions in excel
1. statistical functions in excel
 
3. subtotal function in excel
3. subtotal function in excel3. subtotal function in excel
3. subtotal function in excel
 
2. mathematical functions in excel
2. mathematical functions in excel2. mathematical functions in excel
2. mathematical functions in excel
 
RESOLVING CYBERSQUATTING DISPUTE IN INDIA
RESOLVING CYBERSQUATTING DISPUTE IN INDIARESOLVING CYBERSQUATTING DISPUTE IN INDIA
RESOLVING CYBERSQUATTING DISPUTE IN INDIA
 
India: Meta-Tagging Vis-À-Vis Trade Mark Misuse: An Overview
India: Meta-Tagging Vis-À-Vis Trade Mark Misuse: An OverviewIndia: Meta-Tagging Vis-À-Vis Trade Mark Misuse: An Overview
India: Meta-Tagging Vis-À-Vis Trade Mark Misuse: An Overview
 
Trademark Cases Arise from Meta-Tags, Frames: Disputes Involve Search-Engine ...
Trademark Cases Arise from Meta-Tags, Frames: Disputes Involve Search-Engine ...Trademark Cases Arise from Meta-Tags, Frames: Disputes Involve Search-Engine ...
Trademark Cases Arise from Meta-Tags, Frames: Disputes Involve Search-Engine ...
 
Scheme for Notifying Examiner of Electronic Evidence Under section 79A of the...
Scheme for Notifying Examiner of Electronic Evidence Under section 79A of the...Scheme for Notifying Examiner of Electronic Evidence Under section 79A of the...
Scheme for Notifying Examiner of Electronic Evidence Under section 79A of the...
 
METHODS OF RESOLVING CYBERSQUATTING DISPUTE IN INDIA
METHODS OF RESOLVING CYBERSQUATTING DISPUTE IN INDIAMETHODS OF RESOLVING CYBERSQUATTING DISPUTE IN INDIA
METHODS OF RESOLVING CYBERSQUATTING DISPUTE IN INDIA
 
Computer Software and Related IPR Issues
Computer Software and Related IPR Issues Computer Software and Related IPR Issues
Computer Software and Related IPR Issues
 
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
 
Trademark Issues in cyberspace
Trademark Issues in cyberspace Trademark Issues in cyberspace
Trademark Issues in cyberspace
 
Trade-Related Aspects of Intellectual Property Rights (TRIPS)
Trade-Related Aspects of Intellectual Property Rights (TRIPS)Trade-Related Aspects of Intellectual Property Rights (TRIPS)
Trade-Related Aspects of Intellectual Property Rights (TRIPS)
 
How to Copyright a Website to Protect It under IPR and copyright act
How to Copyright a Website to Protect It under IPR and copyright actHow to Copyright a Website to Protect It under IPR and copyright act
How to Copyright a Website to Protect It under IPR and copyright act
 
International Treaties for protection of IPR
International Treaties for protection of IPRInternational Treaties for protection of IPR
International Treaties for protection of IPR
 

Recently uploaded

TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 

Recently uploaded (20)

TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 

Kinds of Cyber Crimes

  • 1. Subject - Cyber Laws & Rights M. tech. 3rd Sem., ISM. By: Prashant Vats, M.tech., Ph.D. INDIRA GANDHI DELHI TECHNICAL UNIVERSITY FOR WOMEN
  • 2. Kinds of Cyber Crimes
  • 3. In these slides we will cover topics like • Cyber stalking; • Cyber pornography; • Cyber forgery and fraud; • Crime related to IPRs; • Cyber terrorism; • Computer vandalism • Cyber espionage • Cyber Sabotage
  • 4. Cyber stalking • Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, group, or organization. • It may include false accusations, defamation, slander and libel. • It may also include monitoring, identity theft, threats, vandalism, solicitation for sex, or gathering information that may be used to threaten, embarrass or harass. • Cyber stalking is often accompanied by real-time or offline stalking. • In many jurisdictions, both are criminal offenses. Both are motivated by a desire to control, intimidate or influence a victim. • A stalker may be an online stranger or a person whom the target knows. They may be anonymous and solicit involvement of other people online who do not even know the target. • Cyberstalking is a criminal offense under various state anti- stalking, slander and harassment laws. • A conviction can result in a restraining order, probation, or criminal penalties against the assailant, including jail.
  • 5. Cyber stalking contd. • There have been a number of attempts by experts and legislators to define cyberstalking. • It is generally understood to be the use of the Internet or other electronic means to stalk or harass an individual, a group, or an organization. • Cyberstalking is a form of cyberbullying; the terms are often used interchangeably in the media. Both may include false accusations, defamation, slander and libel. • Cyberstalking may also include monitoring, identity theft, threats, vandalism, solicitation for sex, or gathering information that may be used to threaten or harass. • Cyberstalking is often accompanied by real-time or offline stalking. Both forms of stalking may be criminal offenses. • Stalking is a continuous process, consisting of a series of actions, each of which may be entirely legal in itself.
  • 6. Cyber stalking contd. • Cyberstalking is a technologically-based "attack" on one person who has been targeted specifically for that attack for reasons of anger, revenge or control. • Cyberstalking can take many forms, including: 1. harassment, embarrassment and humiliation of the victim 2. emptying bank accounts or other economic control such as ruining the victim's credit score 3. harassing family, friends and employers to isolate the victim 4. scare tactics to instill fear and more.
  • 7. Kinds Of Cyberstalking • Women in India whether she is a college student, working professional or housewife get stalked on a regular basis. • Stalking itself is a criminal offence either physical or electronic and is punishable with one to three years of jail. • Let’s explore the kinds of cyberstalking that till now has been reported worldwide. • Catfishing - In Catfishing, Stalkers create a fake profile on social media to approach victims. Sometimes they copy the existing user's profile with photos to look it like a real one. • Monitoring location check-ins on social media - Stalkers keep an eye on the activities of a victim from their check-ins on social media such as Facebook and Instagram. This is an easier job for a stalker to gauge a victim's behavioural pattern quite accurately. • Visiting virtually via Google Maps Street View - If a stalker discovers the victim's address, then it is not hard to find the area, neighbourhood, and surroundings by using Street View. Tech-savvy stalkers don't need that too. They can discover the victim's place from the posts or photos posted on social media.
  • 8. Kinds Of Cyberstalking • Hijacking webcam - Computer's webcam hijacking is one of the most disgusting methods of cyberstalking to invade the victim's privacy. Stalkers push malware-infected files into the victim's computer which gives them access to the webcam. • Installing Stalkerware - One more method which is increasing its popularity is the use of Stalkerware. It is a kind of software or spyware which keeps track of the location, enable access to text and browsing history, make an audio recording, etc. And an important thing is that it runs in the background without any knowledge to the victim. • Looking at geotags to track location - Mostly digital pictures contain geotags which is having information like the time and location of the picture when shot in the form of metadata. Geotags comes in the EXIF format embedded into an image and is readable with the help of special apps. In this way, the stalker keeps an eye on the victim and gets the information about their whereabouts.
  • 9. Provisions For Cyberstalking In India • Cyberstalking is a serious crime worldwide and the number of cases of it goes on increasing every year. • In India, a large percentage of cases filed against cyberstalking are by women. To deal with the cyberstalking in India following provisions are available: • Information Technology Act, 2000 - When a person publishes or sends salacious material via electronic media is to be charged under Section 67 of the Act. Data protection is very important to prevent cyberstalking which is easily leaked by hackers. • For data protection, IT Amendment Act, Section 43A has been included the provision for the inclusion of a Body Corporate. If a firm or a company transmits sensitive information about a person, according to the act such body corporate will be liable to pay the damages by compensation. • Under Section 67 of the Act, when a stalker sends or posts any obscene content to the victim via electronic media then they will be liable to punish with 5 years of jail and Rs. 1 Lacs fine. If the incidence repeats then they will be liable to punish with 10 years of jail and Rs. 2 Lacs fine. • As per the provision provided in the law, when a stalker misuses victim's personal information to post an obscene message or comment on any electronic media, then this action is punishable for defaming and harming a person's reputation with imprisonment of 2 years, fine or both. • The criminal law (Amendment) Act, 2013 - According to the act, Stalking is an offence under Section 354D of the IPC (Indian Penal Code). When a man is trying to communicate with a woman without her interest over the internet via email, instant messages or any other electronic communication is the offence of stalking.
  • 10. Cyber Pornography • Porn today is more freely and widely available on Internet than ever before. Younger generation is therefore able to access it very easily and quickly than ever. This leads to the mentality of unemotional sex. • And all this is because we have grown up in a culture where parents feel embarrassed, they are not comfortable to have a healthy conversation about sex with their children. Well then its time to open up and come out of our comfort zone to talk about the most hush-hush topic i.e. Pornography. • According to City of Youngstown v. DeLoreto (USA , 1969) Pornography is the portrayal of erotic behavior designed to cause sexual excitement. It is words, acts, or representations that are calculated to stimulate sex feelings independent of the presence of another loved and chosen human being. It is divorced from reality in its sole purpose to stimulate erotic response. • It is preoccupied with and concentrates on sex organs for the purpose of sexual stimulation. It emphasizes them and focuses on them in varying ways calculated to incite sexual desire. • The term Pornography refers to any work or art or form dealing with sex or sexual themes. It involves images , videos of both man and woman involved in sexual activities and is accessible on internet world wide.
  • 11. • There has not been only a single definition of the law of the word pornography applied all over the world. • The pornography or the pornographic material varies according to the vision and understanding of the people of different culture across the world and it has beTen a difficult task to define the material/content to be a pornographic content/material. • Basically pornography is nothing but marketing of man or woman sex, shown as object for those who get involved into sexual acts. Pornographers use the internet to sell their material to sex addicts and to the interested parties. Watching and keeping of these kind of materials is illegal in India. Nowadays pornography has become a kind of a business to the society as people indulge themselves to gain the economical benefits from them. • They even put the hidden cameras and violates the privacy of the society ex: hotels , paying guest , hostels , changing rooms in shopping complex etc. • It has been a market for near about $1 trillion. Pornography has been in existence since the pre-historic time as it was seen in the painting or rock Cyber Pornography
  • 12. • Therefore, with emerging of time, there was invention of photography which gave rise to pornography. The world's first law criminalizing pornography was the English Obscene Publications Act 1857. • The Act, applied to the United Kingdom and Ireland, and it made the sale of obscene material a statutory offence, giving the courts power to seize and destroy offending material. • Pornographic film production commenced after the invention of the motion picture in 1895. Sexually explicit films opened producers and distributors to prosecution. • Pornography is the literature of an art which have the portrait of sexuality emphasizing upon emotions and feelings. • Pornography is of 2 types: • Soft core and Hardcore, where the pornography work is referred as the hardcore content and the soft core pornography consists of nudity or partial nudity in sexual situations. Perhaps, both the kinds of pornography involve nudity. Cyber Pornography
  • 13. Child Pornography In India • Child pornography is an illegal act in India. Information Technology Act, 2000 & Indian Penal Code, 1860 gives protection against the child pornography. Child refers to the person who is below the age of 18 years. The Internet is being highly used by its abusers to reach and abuse children sexually, globally. The internet is becoming a household commodity in India. Its explosion has made the children a viable victim to the cyber crime. • As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of pedophiles. The easy access to the pornographic contents readily and freely available over the internet lowers the inhibitions of the children. • Pedophiles lure the children by distributing pornographic material, then they try to meet them for sex or to take their nude photographs including their engagement in sexual positions. Sometimes Pedophiles contact children in the chat rooms posing as teenagers or a child of similar age, then they start becoming friendlier with them and win their confidence. • Then slowly pedophiles start sexual chat to help children shed their inhibitions about sex and then call them out for personal interaction. • The Information Technology Act is set of rules to make it illegal to not only transmit or create child pornography in electronic form, but even to surf it The above section covers websites, graphics files, SMS, MMS, digital photographs etc.
  • 14. • The punishment for a first offence of publishing, creating, exchanging, downloading or browsing any electronic depiction of children in obscene or indecent or sexually explicit manner is imprisonment for 5years and a fine of Rs 10 lakh. • Section 67 of the Information and technology Act deals with publishing obscene information in electronic form. • Section 67 along with section 67A does not apply to any book, pamphlet, paper, writing, drawing, painting, representation or figure in electronic form which is used for religious purposes or is in the interest of science, literature, art or learning. • It is a generally that it does not specifically define pornography or make it an offence, and does not mention child pornography. • Section 67B lays down the punishment for involving in sexual explicates electronic or online contents that depicts children's. it is also illegal to induce children's in sexual acts or into online relationships. Child Pornography In India
  • 15. The IT Act 2000 also criminalizes online child pornography in the following circumstances • a) Publication or transmission of any material depicting children in explicit sexual act or conduct by using any computer resource and communication device. • b) Where user uses computer or communication resource for seeking or collecting or creating digital images or texts or downloading or promoting etc. any material in any electronic form depicting children in an obscene or indecent or sexually explicit manner. • c) Cultivating, enticing or inducing children to online relationships with one or more children for and on a sexually explicit act or in a manner that may offend a reasonable adult on the computer resource. • d) Facilitating abusing children online. • e) Recording in any electronic form owns abuse or that of others pertaining to sexually explicit activities with children.
  • 16. Obscenity • Obscenity has not been defined under any law/statute which penalizes, prohibits, publishing, importing, mailing, exporting and selling such obscene material or matter. • The Court has the duty to examine whether the alleged obscene content contains obscene matter which is likely to attract the people and corrupt those minds who are open to such influences. • Section 292 of the IPC deals with the selling of the obscene books, magazines etc. Whosoever sells, distributes or publicly exhibits or in any manner circulates, or imports or exports any obscene book, pamphlet, paper, drawing, art, painting, representation or figure or any other obscene object which is in his/ her possession. • This section, tells that the knowledge of obscenity is not essential for constitution of an offence. • It provides punishment on first conviction with imprisonment of either description for a term which may extend to 2years and fine of 2,000 rupees, and in the subsequent conviction with imprisonment which may extend to 5 years and also fine which may extend to 5,000 rupees. • Except the physical contact, demanding or requesting for sexual favors, showing pornography or making sexually colored remarks shall constitute grounds for sexual harassment and he/she shall be punish with imprisonment which may range from to 3years or fine or both , in first three cases and in fourth case imprisonment which may extend to 1 year or with fine or with both.
  • 17. • Any man who sees or captures the image of a woman engaging in private act, within her private space shall be punishable with imprisonment of not less than 1 year which may extend to 3 years and with fine and on second conviction imprisonment not less than 3 years which may extend to 7 years and with fine. • If any person with intent to induces a girl, who is a minor (below 18 years of age), to move from any place or force her to do any act, of which he has knowledge that the minor girl will be forced to perform illicit intercourse with another person, shall be punishable with imprisonment which may extend to ten years and fine for procuring a minor girl. • And if imports any girl of 21 years of age from outside the territory of India (now including Jammu & Kashmir) for the same will be punishable with 10years imprisonment and fine on such importation of girl. Obscenity
  • 18. Bazee.com case, • In the landmark case of Avnish Bajaj v. State popularly known as Bazee.com case, an IIT Kharagpur student named Ravi Raj placed on bazee.com a listing offering an obscene MMS video clip for sale for rupees 125 per video with the username Alice-elec. • Luckily bazee.com have a filter for posting questionable content. Despite that the listing never took place with the description, Item 2787748- DPS Girl having fun!!! Full video + Bazee points. • Listed on 27th November 2004 and was deactivated around 10 a.m on 29 th November 2004. Then an event took place where The Crime Branch of Delhi Police took cognizance of the matter and registered an FIR. Charge sheet was filed against Ravi Raj, Avnish Bajaj and the owner of the website, Sharat Digumarti. • The petitioner contended three issues, namely: i. There was no intervention of the website as the transmission of the MMS clip was directly between the buyer and seller. The sellers after receiving confirmation from the buyer sent the clip to the buyer through an email attachment. They accepted that the website is responsible for the listing placed on the website only and does not becomes the subject matter of section 292/294 of Indian Penal Code, 1860 or section 67 of IT Act, 2000. • ii. The website removed the objectionable content the moment they received such information of obscene content be listed on their website. • iii. Section 67 of IT Act, 2000 plainly covers only the publication of obscene material and not the transmission of such material.
  • 19. • The State in reply to the above said contentions said: i. Section 292 Indian Penal Code, 1860 (IPC) includes not only obvious acts but also illegal omissions within sections 32, 35 AND 36, IPC. ii. The failure to have the requisite filter in a system demand serious consequences and a website cannot escape from such legal consequences. iii. The website did not do anything to stop the transaction of illegal content when the payment was made to the seller. • In another case, students teased a fellow classmate for having pockmarked face. The agitated student created a website and use pictures of his fellow classmates and teachers in pornographic content. • Under section 67 of IT Act, 2000 was registered and Police picked the concerned student and kept him in a juvenile home. Bazee.com case,
  • 20. • Legality: Coming to the legality prospectus of Pornography, our law does not stop us from watching pornography privately. All that the law prohibits its production , distribution , transmission, publication. 1. Section 67 of IT Act 2000 • · Punishment for publishing or transmitting obscene material in electronic form · Imprisonment for 3years or fine of 5,00,000. · For subsequent conviction imprisonment for 5years and with 10,00,000 rupees fine 2. Section 293 of Indian Penal Code (IPC) 1860 • · Sale, etc., of obscene objects to young person · Imprisonment for 3years or Fine of 2,000 rupees · For subsequent conviction imprisonment for 7years and also with 5,000. Suggestions: · Sex education should be made part of higher education syllabus. · Organizing sex education conferences and seminars at school, work pace and other forums for awareness. · Legislature needs to form a separate law/statute for the prohibition of pornography. Bazee.com case,
  • 21. Computer‐related fraud or forgery • Under the Council of Europe Cybercrime Convention, fraud and forgery are considered part of the computer-related offences (i.e., computer- related forgery and computer-related fraud). • Article 7 of the Council of Europe Cybercrime Convention defines computer-related forgery as "intentional… and without right, the input, alteration, deletion, or suppression of computer data, resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the data is directly readable and intelligible." This cybercrime is also prohibited under Article 10 of the Arab Convention on Combating Information Technology Offences. • Computer-related forgery involves impersonation of legitimate individuals, authorities, agencies, and other entities online for fraudulent purposes. • Cybercriminals can impersonate people from legitimate organizations and agencies in order to trick them into revealing personal information and providing the offenders with money, goods and/or services. • The email sender pretends to be from a legitimate organization or agency in an attempt to get users to trust the content and follow the instructions of the email. Either the email is sent from a spoofed email address (designed to look like an authentic email from the organization or agency) or from a domain name similar to the legitimate organization or agency (with a few minor variations).
  • 22. Computer‐related fraud or forgery • A common technique used is the sending of an email to targets with a website link for users to click on, which might either download malware onto the users' digital devices or sends users to a malicious website that is designed to steal users' credentials ( phishing). • The "spoofed" website (or pharmed website) looks like the organization's and/or agency's website and prompts the user to input login credentials. • The email provides different prompts to elicit fear, panic and/or a sense of urgency in order to get the user to respond to the email (and complete the tasks requested in the email) as soon as possible, such as the need to update personal information to receive funds or other benefits, warnings of fraudulent activity on the user's account, and other events requiring the target's immediate attention.
  • 23. • This tactic is not targeted, the email is sent en masse to catch as many victims as possible. • A targeted version of phishing is known as spearphishing. This form of fraud occurs when perpetrators are familiar with the inner workings and positions of company employees and send targeted emails to employees to trick them into revealing information and/or sending money to the perpetrators. • Another technique involves cybercriminals pretending to be higher level executives in a company (part of the C-suite - Chief Executive Officer, Chief Financial Officer and Chief Security Officer), lawyers, accountants, and others in positions of authority and trust, in order to trick employees into sending them funds. This tactic is known as whaling because it yields the highest payout. • The US toy company Mattel was a victim of whaling. The cybercriminals behind this attack had been surreptitiously monitoring the company's networks and communications for months prior to the incident. After an announcement was made that a new CEO was appointed, the cybercriminals used the identity of the new CEO (Christopher Sinclair) to perpetrate the attack. • Particularly, the cybercriminals sent a message as Christopher Sinclair asking the recipient to approve a three-million-dollar transfer to a bank in Wenzhou, China, to pay a Chinese supplier. As the request came from the CEO, the employee transferred the money but later contacted the CEO about it. The CEO denied making the request. Mattel subsequently contacted US law enforcement, the US Federal Bureau of Investigation, their bank, and Chinese law enforcement authorities (Ragan, 2016). The timing of the incident (the money had been transferred on the eve of a holiday) gave Chinese authorities time to freeze the accounts before the banks opened, enabling Mattel to recover its money. Computer‐related fraud or forgery
  • 24. Cyber terrorism • Section 66F of the IT Act prescribes punishment for cyber terrorism. • Whoever, with intent to threaten the unity, integrity, security or sovereignty of India or to strike terror in the people or any section of the people, • denies or causes the denial of access to any person authorized to access a computer resource, or attempts to penetrate or access a computer resource without authorisation or exceeding authorised access, • or introduces or causes the introduction of any computer contaminant, and by means of such conduct causes or • is likely to cause death or injuries to persons or damage to or destruction of property or disrupts • or knowing that it is likely to cause damage or disruption of supplies or services essential to the life of the community or adversely affect critical information infrastructure, is guilty of 'cyber terrorism'.
  • 25. Cyber terrorism • Whoever knowingly or intentionally penetrates or accesses a computer resource without authorisation or exceeding authorised access, • and by means of such conduct obtains access to information, data or computer database that is restricted for reasons for the security of the State or foreign relations, or any restricted information, data or computer database, with reasons to believe that such information, data or computer database so obtained may be used to cause or likely to cause injury to the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States, public order, decency or morality, or in relation to contempt of court, defamation or incitement to an offence, or to the advantage of any foreign nation, group of individuals or otherwise, is also guilty of 'cyber terrorism'. • Whoever commits or conspires to commit cyber terrorism shall be punishable with imprisonment which may extend to imprisonment for life. • There is no provision in the IPC that mirrors section 66F of the IT Act, though section 121 of the IPC (waging, or attempting to wage war, or abetting waging of war, against the Government of India) does cover this offence partially.
  • 26. Intellectual Property Theft • Intellectual property (IP) theft is defined as theft of material that is copyrighted, the theft of trade secrets, and trademark violations. A copyright is the legal right of an author, publisher, composer, or other person who creates a work to exclusively print, publish, distribute, or perform the work in public. The United States leads the world in the creation and selling of IP products to buyers nationwide and internationally. Examples of copyrighted material commonly stolen online are computer software, recorded music, movies, and electronic games. • Theft of trade secrets means the theft of ideas, plans, methods, technologies, or any sensitive information from all types of industries including manufacturers, financial service institutions, and the computer industry. Trade secrets are plans for a higher speed computer, designs for a highly fuel-efficient car, a company's manufacturing procedures, or the recipe for a popular salad dressing, cookie mix, or barbeque sauce. These secrets are owned by the company and give it a competitive edge. Theft of trade secrets damages the competitive edge and therefore the economic base of a business. • A trademark is the registered name or identifying symbol of a product that can be used only by the product's owner. A trademark violation involves counterfeiting or copying brand name products such as well-known types of shoes, clothing, and electronics equipment and selling them as the genuine or original product.
  • 27. • The two forms of IP most frequently involved in cyber crime are copyrighted material and trade secrets. Piracy is a term used to describe IP theft—piracy of software, piracy of music, etc. Theft of IP affects the entire U.S. economy. Billions of dollars are lost every year to IP pirates. For example, thieves sell pirated computer software for games or programs to millions of Internet users. The company that actually produced the real product loses these sales and royalties rightfully due to the original creator. • Historically, when there were no computers, IP crimes involved a lot of time and labor. Movie or music tapes had to be copied, physically produced, and transported for sale. An individual had to make the sale in person. To steal a trade secret, actual paper plans, files, or blueprints would have to be physically taken from a company's building and likewise sold in person. • In the twenty-first century software, music, and trade secret pirates operate through the Internet. Anything that can be digitized—reduced to a series of zeroes and ones—can be transmitted rapidly from one computer to another. There is no reduction of quality in second, third, or fourth generation copies. Pirated digital copies of copyrighted work transmitted over the Internet are known as "warez." Warez groups are responsible for illegally copying and distributing hundreds of millions of dollars of copyrighted material. Intellectual Property Theft
  • 28. • Pirated trade secrets are sold to other companies or illegal groups. Trade secrets no longer have to be physically stolen from a company. • Instead, corporate plans and secrets are downloaded by pirates onto a computer disc. The stolen information can be transmitted worldwide in minutes. • Trade secret pirates find pathways into a company's computer systems and download the items to be copied. • Companies keep almost everything in their computer files. Pirated copies are sold over the Internet to customers who provide their credit card numbers then download the copy. Intellectual Property Theft
  • 29. Cyber/Computer vandalism • Cyber-Vandalism accounts to the act of damaging someone’s data from the computer that in a way disrupts the victim’s business or image due to editing the data into something invasive, embarrassing or absurd. • The thieves create malevolent programs that prove injurious to the hard disk data or login credentials of the victim. • Cyber-vandalism is different from computer viruses that attach into the programs and Wikipedia being one of the famous sites, is prone to potential damage of content because anyone can edit the site. • However, Wikipedia has presently sustained an equilibrium between the types of users that there are articles that cannot be edited by unregistered or new users. • Today’s vandalism felony surrounds the computers and in some countries, new laws have also been updated that has resulted in the punishment for vandalism. • The gaming company networks have paved a productive way for the computer-literate youth to indulge their knowledge and talents into creating games rather than becoming malware designers. • Cyber-Vandalism leads to other risks also that could be dangerous for your computer system, your identity, your precious personal data and your finances.
  • 30. Website Defacement- Another form of Vandalism • Any kind of attack on the website that changes its appearance or changes the whole webpage is termed as website defacement. • Common means of this activity is through SQL injections which aids in achieving administrative access and the other is FTP that can be done once the thief acquires username and password. • Basically, government and religious websites are targeted for defacement due to either political reasons or even for fun. • This act may recruit a bad image of the websites and people may lose faith in these sites due to security reasons. Such threats affect the victim’s life to a larger magnitude thus it is indispensable for you to know how to protect your digital privacy.
  • 31. There are notable cases of Cyber- vandalism • 1. John Seigenthaler, Sr. was defamed in May 2005, as one user edited his biography article on Wikipedia. One of his friend Victor S. Johnson, Jr., noticed the false statements. • 2. Donald Trump’s complete Wikipedia page was switched by one single verdict, “Let’s be fair, nobody cares about him”, in July 2015. • 3. Hillary Clinton was added to the cast of Weekend at Bernie’s Wikipedia page in August 2016 after her “medical episode” at the 9/11 memorial.
  • 32. Who are the cyber vandals: A genre of people who vandalise computer systems • 1. Professional Developers • As the professional developers have experience and expertise in creating programs, they are proficient enough to create computer viruses also. They are so much skilled that they can easily encroach into the data systems or can even exploit the security susceptibilities and may use many such tricks to impede your computer system. • 2. Researchers • These are the people who can simply counterattack the actions of an antivirus software in a computer and can discover methods to infect the computer. Researchers actually do not spread their created programmes but they do encourage their destructing concepts through the internet. These ideas may be used in the future, by the wicked folks. • 3. Skilled and inexperienced youth • At times the young hackers try to prove their worth and fall into the category of cyber vandals. Those students who are skilled enough in creating malware they earn money by selling their ideas to antivirus companies. While those young people who are still not thorough with the ability to create malware, learn to create viruses through internet tutorials. It is easily approachable crime for youngsters that commit the biggest cyber security crimes and leave the victim’s image completely ruined at once.
  • 33. How can vandalism crime be a threat? • • It affects your digital identity and image • If you have a business, it loses your customers • It ruins your overall reputation • Extra expenses, time and labour are involved • Reduces your profits • The US government has stated vandalism laws under the criminal laws section that contains: Federal law, State law, Evidence and Impediments to prosecution. • You can protect yourself from Cyber-vandalism by identity management and by updating your security system. • One spark neglected may burn the house and your hands will be completely in ashes. A well working security system is needed in case you do not want to let your identity be kept at stake.
  • 34. Cyber Espionage • Cyber spying is the act of engaging in an attack or series of attacks that let an unauthorized user or users view classified material. • These attacks are often subtle, amounting to nothing more than an unnoticed bit of code or process running in the background of a mainframe or personal workstation, and the target is usually a corporate or government entity. • The goal is typically to acquire intellectual property or government secrets. • Attacks can be motivated by greed or profit, and can be used in conjunction with a military operation or as an act of terrorism. • Consequences can range from loss of competitive advantage to loss of materials, data, infrastructure, or loss of life.
  • 35. • Cyber espionage attacks can result in damaged reputations and stolen data, including personal and private information. • Cyber attacks targeted at the government may cause military operations to fail, and can also result in lives lost due to leaked classified information. What exactly is it that cyber-criminals look for when planning an attack? • Common targets include: • Internal data – Operations, salaries, research and development. • Intellectual property – Top-secret projects, formulas, plans or other kinds of private data. Anything an attacker could sell or use to their own benefit. • Client and customer information – Who are the clients of this organization? How much are they paying, and for what services? • Marketing and competitive intelligence – Short and long-range marketing goals and competitor knowledge. • Businesses often consider loss of data as a primary concern, but a damaged reputation can be just as troubling. If an organization allows its infrastructure to be used to enable or foster cyber espionage, they can put themselves at risk – not just from the attackers, but from clients and shareholders, as well. Cyber Espionage
  • 36. Cyber Sabotage • Cyber Sabotage is yet another new wrinkle in the emerging threats from cyber space. • Whether delivered over the internet or purposefully installed during the manufacturing process, contaminated hardware or software is now a concern. • Sabotage is defined as deliberate and malicious acts that result in the disruption of the normal processes and functions or the destruction or damage of equipment or information. • In the commercial sector cyber sabotage could be used to attack competition and steal market share. In 2007 there were an estimated 269 million PCs shipped worldwide. • Just imagine the backlash if a saboteur was able to contaminate the master software file used to image all the computers produced by the huge computer manufacturer HP. • The millions of computers they ship each month could pose a significant threat to the business customers, and consumers and could even pose a national security threat.
  • 37. Cyber Sabotage • In the recent past, we have seen attacks by hackers designed to disrupt websites and economic activity on the part of groups or individuals trying to achieve a political agenda - such groups and individuals are known as Hacktivists. • The pro-regime Syrian Electronic Army, has been implicated in the defacement of government and press websites, including that of Forbes magazine. • Also, the hacktivist collective known as Anonymous has been involved in online attacks against government and organizations such as the Church of Scientology. • Anonymous is a particularly interesting organization. It is what is known as a flat organization, lacking any clear hierarchy, and it is made up of individuals or cells that sometimes work as part of Anonymous, when they identify with its goals, and sometimes do not. • Anonymous’s attacks occur when an issue raised motivates hackactivists to swarm (create informal partnerships in order to take down websites or engage in other means of sabotage).