Professional Documents
Culture Documents
ACKNOWLEDGEMENT
I feel highly elated to work on this dynamic and highly important topic that is
“CYBERCRIME: A HIDDEN THREAT” This topic instantly drew my attention and attracted
me to research on it.
I am fortunate to be provided with an opportunity to write my paper under the kind
supervision of Mr. Avadhut Joshi (Asst. Prof., MATS Law School) and I am thankful to her
for providing me with the appropriate guidance while writing the paper.
This paper would not have been possible without her valuable inputs, honest remarks and
earnest effort to guide me throughout the drafting of the paper. I would like to extend my sincere
thank to her for giving me her valuable time to view my research from her busy schedule.
I am highly indebted to the library staff to help me find the relevant books and journals,
and other officials and office staffs, who have also extended their help whenever needed.
I would like to extend my sincere thanks to my friends and for their review and honest
remarks.
So, I hope I have tried my level best to bring in new ideas and thoughts regarding the
basics of this topic. Not to forget my deep sense of regard and gratitude to my faculty adviser,
Mr. Avadhut Joshi who played the role of a protagonist. Last but not the least; I thank all the
members of the MATS Law School and all others who have helped me in making this project a
success.
P a g e |3
INTRODUCTION
We are living in a technology driven world and this technology has become an
integral part of our day to day life. But as we all know everything can have both
positive as well as negative consequences. So does this cyber world has a negative
impact and is becoming a serious threat from past few years. Today, most people rely
on the internet and other technologies and as a result, they are potentially opening
themselves up to attacks from criminals anywhere in the world. Cybercrimes are those
unlawful acts where the computer is used as a tool or a target or both. Cybercrime
mainly consists of unauthorized access to computer systems data alteration, data
destruction, theft of intellectual properly. Cybercrime in the context of national security
may involve hack activism, traditional espionage, or information warfare and related
activities.
Computer crime refers to any crime that involves a computer and a network. The
computer may have been used in the commission of a crime, or it may be the target. Net
crime refers to criminal exploitation of the Internet. Cybercrimes are defined as:
"Offences that are committed against individuals or groups of individuals with a
criminal motive to intentionally harm the reputation of the victim or cause physical or
mental harm to the victim directly or indirectly, using modern telecommunication
networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile
phones (SMS/MMS)". Such crimes may threaten a nation’s security and financial
health.
P a g e |4
CHAPTER-1
CYBER CRIME
Hence, the computer will be looked at as either a target or tool for simplicity’s
sake. For example, hacking involves attacking the computer’s information and other
resources. It is important to take note that overlapping occurs in many cases and it is
impossible to have a perfect classification system.
This Act aims to provide the legal infrastructure for e-commerce in India. And
the cyber laws have a major impact for e-businesses and the new economy in India. So,
it is important to understand what are the various perspectives of the IT Act, 2000 and
what it offers.
The Information Technology Act, 2000 also aims to provide for the legal framework
so that legal sanctity is accorded to all electronic records and other activities carried out
P a g e |5
by electronic means. The Act states that unless otherwise agreed, an acceptance of
contract may
be expressed by electronic means of communication and the same shall have legal
validity and enforceability.
5. The IT Act, 2000 has not tackled several vital issues pertaining to e- commerce
sphere like privacy and content regulation to name a few. Privacy issues have
not been touched at all.
6. Another grey area of the IT Act is that the same does not touch upon any anti-
trust
P a g e |7
7. The most serious concern about the Indian Cyber law relates to its
implementation. The IT Act, 2000 does not lay down parameters for its
implementation. Also, when internet penetration in India is extremely low and
government and police officials, in general are not very computer savvy, the
new Indian cyber law raises more questions than it answers. It seems that the
Parliament would be required to amend the IT Act, 2000 to remove the grey
areas mentioned above.
P a g e |8
CHAPTER-2
Cyber Crimes Against Person
There are certain common cyber threats which are discussed below:
person by hacking his mail account and sending some mails with using vulgar
language to unknown persons mail account.
Hacking: It means gaining unauthorized control or access over computer system
and act of hacking completely destroys the whole data as well as computer
programs. Hackers usually hacks telecommunication and mobile network.
Cracking: It is act of breaking into your computer systems without your
knowledge and consent and this also included tampering with precious
confidential data and information.
E-Mail Spoofing: A spoofed e-mail may be said to be one, which misrepresents
its origin. It shows it’s origin to be different from which actually it originates.
SMS Spoofing: Spoofing is a blocking through spam which means the unwanted
uninvited messages. In case of SMS Spoofing an offender steals identity of
another person in the form of mobile phone number and sends SMS via internet
and receiver gets the SMS from the mobile phone number of the victim. It is
very serious cybercrime against any individual.
Cheating & Fraud: It means the person who is doing the act of cybercrime i.e.
stealing password and data storage has done it with having guilty mind which
leads to fraud and cheating.
Child Pornography: In this cybercrime defaulters create, distribute, or access
materials that sexually exploit underage children. Among the largest businesses
on Internet. Pornography may not be illegal in many countries, but child
pornography is. Provisions Applicable: - Sections 67, 67A and 67B of the IT
Act.
Assault by Threat: It refers to threatening a person with fear for their lives or
lives of their families through the use of a computer network i.e. E-mail, videos
or phones.
Carding: It means false ATM cards i.e. Debit and Credit cards used by
criminals for their monetary benefits through withdrawing money from the
victim’s bank account.
There is always unauthorized use of ATM cards in this type of cybercrimes.
P a g e | 10
CHAPTER-3
Cyber-crimes against property
There are certain offences which affects person’s property which is as follows:
CHAPTER-4
Cybercrimes against government
potential security holes in critical systems. A cyber terrorist is someone who intimidates
or coerces a government or organization to continue their political or social objectives
through the introduction of a computer -based attack against computers, the network
and the information stored in them. Cyber terrorism in general, can be defined as an act
of terrorism that has occurred through the use of cyberspace or computer resources. For
example, simple bad information on the internet, there will be bomb attacks during the
holidays can be considered cyber terrorism. In addition there are also hacking activities
for individuals, families, organized by groups within networks, tending to cause fear
among people, demonstrate power, collecting appropriate information to ruin lives,
robberies, extortion, blackmail etc. cyber is a type of cyber terrorism on a web page,
email server, or computer system is subjected to the repeated denial of service attacks
or other evil hackers, who demand money in exchange for the promise to stop attacks.
Cyber terrorism is one distinct kind of crime in this category. The growth of
internet has shown that the medium of Cyberspace is being used by individuals and
groups to threaten the international governments as also to threaten the citizens of a
country. This crime manifests itself into terrorism when an individual "cracks" into a
government or military maintained website. The Parliament attack in Delhi and the
recent Mumbai attack fall under this category. India had enacted its first Cyber Law
through IT Act 2000. It has been amended and now in 2008 the revised version is under
implementation.
P a g e | 14
CHAPTER-5
Cybercrimes against Society at large
An unlawful act done with the intention of causing harm to the cyberspace will
affect large number of persons. These offences include: Child Pornography: In this act
there is use of computer networks to create, distribute, or access materials that sexually
exploit underage children. It also includes activities concerning indecent exposure and
obscenity.
Cyber Trafficking: It involves trafficking in drugs, human beings, arms
weapons etc. which affects large number of persons. Trafficking in the
cybercrime is also a gravest crime. Online Gambling: Online fraud and cheating
is one of the most lucrative businesses that are growing today in the cyber space.
In India a lot of betting and gambling is done on the name of cricket through
computer and internet. There are many cases that have come to light are those
pertaining to credit card crimes, contractual crimes, offering jobs, etc.
Financial Crimes: This type of offence is common as there is huge growth in
the users of networking sites and phone networking where culprit will try to
attack by sending bogus mails or messages through internet. Ex: Using credit
cards by obtaining password illegally. Forgery: It means to deceive large number
of persons by sending threatening mails as online business transactions are
becoming the habitual need of today’s life style.
There is as such no defense from cybercrime which can secure someone completely
against it but by taking certain precautions one can avoid being a victim of these
cybercrimes to a great extent. Like any other criminal activity, those who are most
vulnerable are tending to be the targeted first.
Ideally, in case of a specific threat one need to work with an IT security expert to
assess specific needs and vulnerabilities, but there are certainly some universal steps
which can be taken to reduce your likelihood of attack.
P a g e | 15
CHAPTER-6
Conclusion
It has been deduced from this study that reliance on terrestrial laws is still an untested
approach despite progress being made in many countries, they still rely on standard
terrestrial laws to prosecute cybercrimes and these laws are archaic statutes that have
been in existence before the coming of the cyberspace. Also weak penalties limit
deterrence: countries with updated criminal statutes still have weak penalties on the
criminal statutes; this cannot deter criminals from committing crimes that have large-
scale economic and social effect on the society. Also a global patchwork of laws creates
little certainty; little consensus exist among countries regarding which crimes need to
be legislated against. Self-protection remains the first line of defence and a model
approach is needed by most countries; especially those in the developing world looking
for a model to follow. They recognize the importance of outlawing malicious computer-
related acts in a timely manner or in order to promote a secure environment for e-
commerce.
Cyber-crime with its complexities has proven difficult to combat due to its
nature. Extending the rule of law into the cyberspace is a critical step towards creating a
trustworthy environment for people and businesses. Since the provision of such laws to
effectively deter cyber-crime is still a work in progress, it becomes necessary for
individuals and corporate bodies to fashion out ways of providing security for their
systems and data. To provide this self-protection, organizations should focus on
implementing cyber-security plans addressing people, process and technology issues,
more resources should be put in to educate employees of organizations on security
practices, “develop thorough plans for handling sensitive data, records and transactions
and incorporate robust security technology- -such as firewalls, anti-virus software,
intrusion detection tools and authentication services--.”
cyber-crimes in similar manner, to enable them pass legislation that would fight cyber-
crimes locally and internationally. With the information highway having entered our
very homes, we are all at increasing risk of being affected by Cybercrime. Everything
about our lives is in some manner affected by computers. Under the circumstances, it’s
high time we sat up and took notice of the events shaping our destinies on the
information highway. Cybercrime is everyone’s problem. And it’s time we did
something to protect ourselves. Information is the best form of protection. Your safety
is in your hand. One should be very careful while accessing the important and
confidential data. Besides it, strict law is required to handle the issue of cybercrime. It
is crime against individual, society and sometimes very serious issue in nation security.
Cyber Army, There is also an imperative need to build a high technology crime &
investigation infrastructure, with highly technical staff at the other end. Judiciary plays
a vital role in shaping the enactment according to the order of the day Cyber savvy
judges are the need of the day.