You are on page 1of 20

CYBER CRIMES

TYPES, IMPACTS AND JURISDICTION

TYPES OF CYBER CRIME


1.Hacking
It refers to an unauthorized control or
access over someones computer to access
his personal or sensitive information.
In hacking, the criminal users a variety of
software to enter a personss computer
and the person my not be aware that his
computer is being accessed from a remote
location.

2 Cyber-stalking
In very general terms, stalking refers to harassing or
threatening behavior that an individual engages in
repeatedly towards another person.
Stalking can be defined as a wilful course of conduct
involving repeated or continuing harassment of another
individual that actually causes the victim to fell terrorized,
frightened, threatened, harassed and that would cause a
reasonable person to feel so.
Cyber-stalking is a kind of online harassment in which the
stalkers follow a victims movements across the internet by
posting messages (sometimes threatening) on the bulleting
board generally used by the victim, entering the chat
rooms frequented by the victim, constantly bombarding the
victim with online message, emails etc for harassment.
It is very similar to harassing emotionally blackmailing
through letters.

3.Dissemination of obscene material/Indecent

Exposure/Pornography (basically child


pornography/Polluting through indecent exposure
Pornography on the net may take various forms.
It may include the hosting of web site containing
these prohibited obscene materials by producing
such material using computer or downloading
through internet.
These obscene materials may cause harm to the
mind of the adolescent and tent to deprave or
corrupt their mind.
The Internet has provided a medium for the
facilitation of crimes like pornography.
Cyber porn as it is popularly known is
widespread.

4. Defamation
It is an act of imputing any person with an intention
to defame him in the society generally or to cause
him to be shunned or avoided or the expose him to
hatred, contempt or ridicule.
Cyber defamation is same as conventional
defamation except the involvement of a virtual
medium
Defamation is defined as an intentional false
communication, either published or publicly spoken,
that injures anothers reputation or good name.
Defamation includes the common law of torts of
libel (involving written or printed statement) and
slander (involving oral statements).

5.Email and SMS spoofing


Spoofing is the act of disguising one computer to
electronically look like another computer, in
order to gain access to a system that would
normally be restricted.
It is a fraudulent email activity in which the
sender address and other parts of the email
header are altered to appear as through the mail
originated from a different source.
Email spooling is a technique commonly used for
spam email and phishing to hide the origin of an
email message.
By changing certain properties of the email, such
as the From Return-path and Reply to fields, all
intentioned users can make the email appear to
be from someone other than the actual sender.

6.Computer Vandalism
Vandalism means deliberately destroying or
damaging property of another
Thus cyber vandalism means destroying or
damaging the data when a network service is
stopped or disrupted.
It may include with in its purview any kind of
physical harm done to the computer of any person
These acts may take the form of the theft of a
computer, some part of a computer or a peripheral
attached to the computer.
Malicious Software Internet-based software or
programs are also there which are used to disrupt
a network.

7.Transmitting virus/worms
Viruses are programs that attach themselves to a
computer or a file and then circulate themselves to
other files and to other computers on a network.
They usually alter or delete the data available on a
computer.
Worms are different from the viruses as they do
not need to attach themselves to a computer.
Worms are different from the viruses as they do
not need to attach themselves to a computer.
They create functional copies of themselves which
is turn create even more copies and eventually
swamp the system by eating up all the available
space on a computers memory.

8.Intellectual property crimes / Distribution


of pirated software / theft.
Intellectual property consists of a bundle of
rights.
Any unlawful act by which the owner is deprived
completely or partially of his rights is an offence.
The common form of IPR violation may be said to
be software piracy, copyright infringement,
trademark and service mark violation, theft of
computer source code, etc.
when a person violates copyrights and
downloads music, moves, games and software to
known as theft on virtual medium.

9.Cyber terrorism against the government


organization
Cyber terrorism may be defined to be the premediated
use of disruptive activities, or the threat thereof, in cyber
space, with the intention to further social, ideological,
religious, political or similar objectives, or to intimidate
any person in furtherance of such objectives. It involves
the use of computer as a means or ends to achieve their
negative objectives like
Putting the public or any section of the public in fear or
Affecting adversely the harmony between different
religious, racial language or regional groups or castes or
communities; or
Coercing the government of any nation; or
Endangering the sovereignty and integrity of the nation.

10.Trafficking
Trafficking may assume different forms. It
may be trafficking in drugs, human beings,
arms weapons etc. These forms of
trafficking are going unchecked because
they are carried on under pseudonyms.
Trafficking in the cyberspace is also a
gravest crime. A racket was busted in
Chennai where drugs were being sold under
the pseudonym of honey.
In todays world, buying a child for sex online
can be just as easy as selling your old couch
or posting an updated resume.

11.Fraud and Cheating Identity theft


Online fraud and cheating is one of the most lucrative
businesses that are growing today in the cyber space.
Most Internet fraud is done through the use of stolen
credit card information which is obtained in many ways,
the simplest being copying information form relations,
either online or offline.
Some of the cases of online fraud and cheating that
have come to light are these pertaining to credit card
crimes contractual crimes, offering jobs, identify theft
etc.
Identify Theft has become a major problem with people
using the online services for cash transaction and
banking services.
A criminal accesses date about a persons bank
account credit cards, social security, debit card.

12.Phishing
It is one of the forms of identify theft.
This involves sending fake emails by hackers which are
covered by the illusion that the communication is
legitimate and is from some hank or financial institution.
These fake emails ask users to surrender their sensitive
information related to their bank account or credit/debit
card.
Once gained access, hackers make use of the information
either to gain access into users account online and
transfer money.
CASES
UTI Bank Ahmadabad Case
ICICI Bank case

DOMAIN AND DISPUTES


Domain name refers to the internet protocol address of an
organization.
It is a valuable asset for an organization and is primarily
used as a business identifier for the work.
It provides an organization a unique presence / identify on
the internet as same domain name cannot be registered
by two organizations like two individuals cannot have same
permanent account number.
Domain name can because worldwide to access the same
web page, send e-mails, accessing information on the
cyber space share files etc to run business activities over
internet.
Domain names are granted by the accredited registrars of
the Internet Corporation for Assigned Names and Numbers
(ICANN) on first-come first-serve-basis.

EXAMPLES
Domain Names
www.microsoft.com
www.google.com
www.tcs.com
Top Level Domains(TLDs)
Com used for commercial and personal sites
Org used by Non-profit/charitable
organization
Gov used by government organization.

DIFFERENCE BETWEEN TRADE


MARKS AND DOMAIN NAMES
Basis
Proprietary rights
Identity
Form
Class of goods or services
Validity period
Cases
Bharti Cellular Case
Yahoo Inc Vs. Akash Arora
Travel.indiatimes Vs. indiatimestravel

How to Solve Domain Name Dispute


Filing of complaint with ICANN
The defendant against whom the complaint
has been filed is asked to file his response.
Administration panel consisting of 1-3
persons is appointed by ICANN to decide the
dispute.
Decision is to be taken by the administrative
panel.
Final decision of the panel is to be
implemented by the registrar.

Categories of Cyber Crime

Against
Against
Against
Against

Individual.
Organization.
government.
society at Large.

Cyber forensics
Cyber forensics is the branch of digital forensic science
which uses scientific processes of identification,
acquisition, authentication, analysis, documentation and
preservation of digital evidences involved in cyber
crimes committed using digital systems.
Computer forensics requires specialized expertise and
tools at goes above and beyond the normal data
collection and preservation techniques available to end
users or system support personnel.
It is the art and science of applying computer science to
conduct a systematic inspection of the computer systems
and its contents to find evidence or supportive evidence
of a civil wrong or a criminal act.

CYBER SPACE JURISDICTION


The concept of cyber space jurisdiction refers
to which agent or the court has the authority
to administer justice by hearing and
determining controversies in a matter of cyber
crimes and offences.
The primary source of cyber law n India is the
Information Technology Act, 2000 which
empowers an adjudicating officer or the Cyber
Appellate Tribunal to take action and provide
judgments in the cases of cyber crimes under
section 61.

You might also like