Sei sulla pagina 1di 12

C?

8L8 C8lML 8LvLn1lCn uL1LC1lCn



vShlva kumar
AssLulrecLor
Aollce Academy


10 C?8L8 C8lML

11 Cyber Crlme ls an evll havlng lLs orlgln ln Lhe growlng dependence on
compuLers ln modern llfe

A slmple yeL sLurdy deflnlLlon of cyber crlme would be unlawful acLs whereln
Lhe compuLer ls elLher a Lool or a LargeL or boLh" ueflnlng cyber crlmes as acLs LhaL
are punlshable by Lhe lnformaLlon 1echnology AcL" would be unsulLable as Lhe lndlan
enal Code also covers many cyber crlmes such as emall spooflng cyber defamaLlon
eLc

12 1?LS Cl C?8L8 C8lML
Cyber Crlme refers Lo all acLlvlLles done wlLh crlmlnal lnLenL ln cyberspace 1hese fall
lnLo Lhree sloLs

- 1hose agalnsL persons
- AgalnsL 8uslness and nonbuslness organlzaLlons
- Crlme LargeLlng Lhe governmenL

LeL us examlne Lhe acLs whereln Lhe compuLer ls a Lool for an unlawful acL
1hls klnd of acLlvlLy usually lnvolves a modlflcaLlon of a convenLlonal crlme by uslng
compuLer Some examples are

121 llnanclal Clalms 1hls would lnclude cheaLlng credlL card frauds money
launderlng eLc

Cyber ornography 1hls would lnclude pornographlc webslLes pornographlc
magazlnes produced uslng compuLer and Lhe lnLerneL (Lo down load and LransmlL
pornographlc plcLures phoLos wrlLlngs eLc)

Sale of lllegal arLlcles 1hls would lnclude sale of narcoLlcs weapons and wlldllfe
eLc by posLlng lnformaLlon on webslLes bulleLln boards or slmply by uslng emall
communlcaLlons

Cnllne gambllng 1here are mllllons of webslLes all hosLed on servers abroad LhaL
offer onllne gambllng ln facL lL ls belleved LhaL many of Lhese webslLes are acLually
fronLs for money launderlng

lnLellecLual roperLy Crlmes 1hese lnclude sofLware plracy copyrlghL
lnfrlngemenL Lrademarks vlolaLlons eLc
LMall spooflng A spoofed emall ls one LhaL appears Lo orlglnaLe from one source
buL acLually has been senL from anoLher source 1hls can also be Lermed as LMall
forglng

lorgery CounLerfelL currency noLes posLage and revenue sLamps mark sheeLs eLc
can be forged uslng sophlsLlcaLed compuLers prlnLers and scanners

Cyber uefamaLlon 1hls occurs when defamaLlon Lakes place wlLh Lhe help of
compuLers and or Lhe lnLerneL eg someone publlshed defamaLory maLLer abouL
someone on a webslLes or sends emall conLalnlng defamaLory lnformaLlon Lo all of
LhaL person's frlends

Cyber SLalklng Cyber sLalklng lnvolves followlng a person's movemenLs across Lhe
lnLerneL by posLlng messages on Lhe bulleLln boards frequenLed by Lhe vlcLlm enLerlng
Lhe chaLrooms frequenLed by Lhe vlcLlm

LeL us examlne some of Lhe acLs whereln Lhe compuLer or compuLer neLwork ls
Lhe LargeL for an unlawful acL lL may be noLed LhaL ln Lhese acLlvlLles Lhe compuLer
may also be a Lool 1hls klnd of acLlvlLy ls usually ouL of Lhe purvlew of convenLlonal
crlmlnal law Some examples are

122 unauLhorlzed access Lo compuLer sysLem or neLwork 1hls acLlvlLy ls
commonly referred Lo as hacklng 1he lndlan Law has however glven a dlfferenL
connoLaLlon Lo Lhe Lerm hacklng

1hefL of lnformaLlon conLalned ln elecLronlc from 1hls lncludes lnformaLlon
sLored ln compuLer hard dlsks removable sLorage medla eLc

LMall bomblng Lmall bomblng refers Lo sendlng a large amounL of emalls Lo Lhe
vlcLlm resulLlng ln Lhe vlcLlms' emall accounL or mall servers

uaLa dlddllng 1hls klnd of an aLLack lnvolves alLerlng Lhe raw daLa [usL before lL ls
processed by a compuLer and Lhen changlng lL back afLer Lhe processlng ls compleLed

Salaml aLLacks 1hose aLLacks are used for Lhe commlsslon of flnanclal crlmes 1he
key here ls Lo make Lhe alLeraLlon so lnslgnlflcanL LhaL ln a slngle case lL would go
compleLely unnoLlced eg A bank employee lnserLs a program lnLo bank's servers
LhaL deducLs a small amounL from Lhe accounL of every cusLomer

uenlal of Servlce 1hls lnvolves floodlng compuLer resources wlLh more requesLs
Lhan lL can handle 1hls causes Lhe resources Lo crash Lhereby denylng
auLhorlzed users Lhe servlce offered by Lhe resources
vlrus/worm vlruses are programs LhaL aLLach Lhemselves Lo a compuLer or a flle and
Lhen clrculaLe Lhemselves Lo oLher flles and Lo oLher compuLers on a neLwork 1hey
usually affecL Lhe daLa on a compuLer elLher by alLerlng or deleLlng lL Worms unllke
vlruses don noL need Lhe hosL Lo aLLach Lhemselves Lo

Loglc bombs 1hese are dependenL programs 1hls lmplles LhaL Lhese programs are
creaLed Lo do someLhlng only when a cerLaln evenL occurs eg some vlruses may be
2Lermed loglc bombs because Lhey lle dormanL all Lhrough Lhe year and become acLlve
only on a parLlcular daLe

1ro[an Porse A 1ro[an as Lhls program ls apLly called ls an unauLhorlzed program
whlch funcLlons from lnslde whaL seems Lo be an auLhorlzed program Lhereby
conceallng whaL lL ls acLually dolng

lnLerneL 1lme 1hefL 1hls connoLes Lhe usage by unauLhorlzed persons of Lhe
lnLerneL hours pald for by anoLher person

hyslcally damaglng a compuLer sysLem 1hls crlme ls commlLLed by physlcally
damaglng a compuLer or lLs perlpherals


20 8LvLn1lCn
21 8LvLn1lvL S1LS lC8 lnulvluuALS

211 CPlLu8Ln
Chlldren should noL glve ouL ldenLlfylng lnformaLlon such as name Pome
address School name or 1elephone number ln a chaL room 1hey should noL glve
phoLographs Lo anyone on Lhe neL wlLhouL flrsL checklng or lnformlng
parenLs guardlans 1hey should noL respond Lo messages whlch are suggesLlve
obscene belllgerenL or LhreaLenlng and noL Lo arrange a faceLo face meeLlng wlLhouL
Lelllng parenLs or guardlans 1hey should remember LhaL people onllne mlghL noL be
who Lhey seem

212 A8Ln1S
arenL should use conLenL fllLerlng sofLware on C Lo proLecL chlldren from
pornography gambllng haLe speech drugs and alcohol
1here ls also sofLware Lo esLabllsh Llme conLrols for use of llmpeLs (for example
blocklng usage afLer a parLlculars Llme) and allowlng parenLs Lo see whlch slLe lLem
chlldren have vlslLed use Lhls sofLware Lo keep Lrack of Lhe Lype of acLlvlLles of
chlldren

213 CLnL8AL lnlC8MA1lCn
uon'L deleLe harmful communlcaLlons (emalls chaLs eLc) 1hey wlll provlde vlLal
lnformaLlon abouL sysLem and address of Lhe person behlnd Lhese
r 1ry noL Lo panlc
r lf you feel any lmmedlaLe physlcal danger conLacL your local pollce
r Avold geLLlng lnLo huge argumenLs onllne durlng chaL and dlscusslons wlLh oLher
users
r 8emember LhaL all oLher lnLerneL users are sLrangers you do noL know who you
are chaLLlng wlLh So be careful
r 8e exLremely careful abouL how you share personal lnformaLlon abouL yourself
onllne
r Choose your chaLLlng nlckname carefully so as oLhers
3r uo noL share personal lnformaLlon ln publlc space onllne do noL glve lL Lo
sLrangers
r 8e exLremely cauLlous abouL meeLlng onllne lnLroduced person lf you choose Lo
meeL do so ln a publlc place along wlLh a frlend
r lf a slLuaLlon onllne becomes hosLlle log off and lf a slLuaLlon places you ln fear
conLacL local pollce
r Save all communlcaLlons for evldence uo noL edlL lL ln any way Also keep a
record of your conLacLs and lnform Law LnforcemenL Cfflclals

22 8LvLn1lvL S1LS lC8 C8CAnlSA1lCnS Anu CCvL8nMLn1

221 P?SlCAL SLCu8l1? hyslcal securlLy ls mosL senslLlve componenL as
prevenLlon from cyber crlme CompuLer neLwork should be proLecLed from Lhe
access of unauLhorlzed persons

222 ACCLSS CCn18CL Access ConLrol sysLem ls generally lmplemenLed uslng
flrewalls whlch provlde a cenLrallzed polnL from whlch Lo permlL or allow access
llrewalls allow only auLhorlzed communlcaLlons beLween Lhe lnLernal and exLernal
neLwork

223 ASSWC8u roof of ldenLlLy ls an essenLlal componenL Lo ldenLlfy
lnLruder 1he use of passwords ln Lhe mosL common securlLy for neLwork sysLem
lncludlng servers rouLers and flrewalls MosLly all Lhe sysLems are programmed
Lo ask for username and password for access Lo compuLer sysLem 1hls provldes
Lhe verlflcaLlon of user assword should be charged wlLh regular lnLerval of Llme
and lL should be alpha numerlc and should be dlfflculL Lo [udge

224 llnulnC 1PL PCLLS ln nL1WC8k SysLem managers should Lrack
down Lhe holes before Lhe lnLruders do Many neLworklng producL manufacLures
are noL parLlcularly aware wlLh Lhe lnformaLlon abouL securlLy holes ln Lhelr
producLs So organlzaLlon should work hard Lo dlscover securlLy holes bugs and
weaknesses and reporL Lhelr flndlngs as Lhey are conflrmed

223 uSlnC nL1WC8k SCAnnlnC 8CC8AMS 1here ls a securlLy
admlnlsLraLlon's Lool called unlx whlch ls freely avallable on lnLerneL 1hls
uLlllLy scans and gaLhers lnformaLlon abouL any hosL on a neLwork regardless of
whlch operaLlng sysLem or servlces Lhe hosLs were runnlng lL checks Lhe known
vulnerablllLles lnclude bugs securlLy weakness lnadequaLe password proLecLlon
and so on 1here ls anoLher producL avallable called CCS (CompuLer Cracle and
assword SysLem) lL scans for poor passwords dangerous flle permlsslons and
daLes of key flles compared Lo daLes of CL81 securlLy advlsorles

226 uSlnC ln18uSlCn ALL81 8CC8AMS As lL ls lmporLanL Lo ldenLlfy
and close exlsLlng securlLy holes you also need Lo puL some waLchdogs lnLo
servlce 1here are some lnLruslon programs whlch ldenLlfy susplclous acLlvlLy and
reporL so LhaL necessary acLlon ls Laken 1hey need Lo be operaLlng consLanLly
so LhaL all unusual behavlour on neLwork ls caughL lmmedlaLely
4227 uSlnC LnC8?1lCn LncrypLlon ls able Lo Lransform daLa lnLo a form
LhaL makes lL almosL lmposslble Lo read lL wlLhouL Lhe rlghL key 1hls key ls used
Lo allow conLrolled access Lo Lhe lnformaLlon Lo selecLed people 1he lnformaLlon
can be passed on Lo any one buL only Lhe people wlLh Lhe rlghL key are able Lo see
Lhe lnformaLlon LncrypLlon allows sendlng confldenLlal documenLs by Lmall or
save confldenLlal lnformaLlon on lapLop compuLers wlLhouL havlng Lo fear LhaL lf
someone sLeals lL Lhe daLa wlll become publlc WlLh Lhe rlghL
encrypLlon/decrypLlon sofLware lnsLalled lL wlll hook up Lo mall program and
encrypL/decrypL messages auLomaLlcally wlLhouL user lnLeracLlon
30 uL1LC1lCn Cyber crlme ls Lhe laLesL and perhaps Lhe mosL speclallzed and
dynamlc fleld ln cyber laws Some of Lhe Cyber Crlmes llke neLwork lnLruslon are
dlfflculL Lo deLecL and lnvesLlgaLlon even Lhough mosL of crlmes agalnsL lndlvldual llke
cyber sLalklng cyber defamaLlon cyber pornography can be deLecLed and lnvesLlgaLed
Lhrough followlng sLeps
AfLer recelvlng such Lype of mall

(1) Clve command Lo compuLer Lo show full header of mall
(2) ln full header flnd ouL Lhe l number and Llme of dellvery of number and Lhls l
number always dlfferenL for every mall lrom Lhls l number we can know who
was Lhe lnLerneL servlce provlder for LhaL sysLem from whlch Lhe mall had come
(3) 1o know abouL lnLerneL Servlce rovlder from l number Lake Lhe servlce of
search englne llke nlccom macffvlsualrouLe Com apnlccom arlncom
(4) AfLer openlng Lhe webslLe of any of above menLloned search englne feed Lhe l
number and afLer some Llme name of lS can be obLalned
(3) AfLer geLLlng Lhe name of lS we can geL Lhe lnformaLlon abouL Lhe sender from
Lhe lS by glvlng Lhem Lhe l number daLe and Llme of sender
(6) lS wlll provlde Lhe address and phone number of Lhe sysLem whlch was used
Lo send Lhe mall wlLh bad lnLenLlon
AfLer knowlng Lhe address and phone number crlmlnal can be apprehended by uslng
convenLlonal pollce meLhods
4C C?8L8 LAW
lndla has enacLed Lhe flrsL l1AcL 2000 based on Lhe unCl8AL model
recommended by Lhe general assembly of Lhe unlLed naLlons ChapLer xl of Lhls AcL
deals wlLh offences/crlmes along wlLh cerLaln oLher provlslons scaLLered ln Lhls AcLs
1he varlous offences whlch are provlded under Lhls chapLer are shown ln Lhe
followlng Lable
41 Cffence SecLlon under l1 AcL
1amperlng wlLh CompuLer source documenLs Sec63
Packlng wlLh CompuLer sysLems uaLa alLeraLlon Sec66
ubllshlng obscene lnformaLlon Sec67
3unauLhorlsed access Lo proLecLed sysLem Sec70
8reach of ConfldenLlallLy and rlvacy Sec72
ubllshlng false dlglLal slgnaLure cerLlflcaLes Sec73
nC1L Sec78 of l1AcL empowers uepuLy SupdL Cf ollce Lo lnvesLlgaLe cases
falllng under Lhls AcL
42 CompuLer 8elaLed Crlmes Covered under lC and Speclal Laws
Cffence SecLlon
Sendlng LhreaLenlng messages by emall Sec 303 lC
Sendlng defamaLory messages by emall Sec 499 lC
lorgery of elecLronlc records Sec 463 lC
8ogus webslLes cyber frauds Sec 420 lC
Lmall spooflng Sec 463 lC
Web!acklng Sec 383 lC
LMall Abuse Sec300 lC
Cnllne sale of urugs nuS AcL
Cnllne sale of Arms Arms AcL
30 LLLMLn1A8? 8C8LLMS ASSCClA1Lu Wl1P C?8L8C8lMLS
Cne of Lhe greaLesL lacunae ln Lhe fleld of Cyber Crlme ls Lhe absence of
comprehenslve law any where ln Lhe World 1he problem ls furLher aggravaLed due Lo
dlsproporLlonal growLh raLlo of lnLerneL and cyber laws 1hough a beglnnlng has been
made by Lhe enacLmenL of l1 AcL and amendmenLs made Lo lndlan enal Code
problems assoclaLed wlLh cyber crlmes conLlnue Lo perslsL
1 !urlsdlcLlon ls Lhe hlghly debaLable lssue as Lo Lhe malnLalnablllLy of any
sulLs whlch has been flled 1oday wlLh Lhe growlng arms of cyber space
Lhe LerrlLorlal boundarles seem Lo vanlsh 1hus Lhe concepL of LerrlLorlal
[urlsdlcLlon as envlsaged under S16 of CrC and S2of Lhe lC wlll
have Lo glve way Lo alLernaLlve meLhod of dlspuLe resoluLlon
2 Loss of evldence ls a very common expecLed problem as all Lhe daLa
are rouLlnely desLroyed lurLher collecLlon of daLa ouLslde Lhe LerrlLorlal exLenL
also paralyses Lhe sysLem of crlme lnvesLlgaLlon
3 Cyber Army 1here ls also an lmperaLlve need Lo bulld a hlgh Lechnology
crlme lnvesLlgaLlon lnfrasLrucLure wlLh hlghly Lechnlcal sLaff aL Lhe oLher
end
4 A law regulaLlng Lhe cyberspace whlch lndla has done
3 1hough S73 provldes for exLraLerrlLorlal operaLlons of Lhls law buL Lhey
could be meanlngful only when backed wlLh provlslon recognlzlng orders and
warranLs for lnformaLlon lssued by compeLenL auLhorlLles ouLslde Lhelr
6[urlsdlcLlon and measure for cooperaLlon for exchange of maLerlal and
evldence of compuLer crlmes beLween law enforcemenL agencles
6 Cyber savvy [udges are Lhe need of Lhe day !udlclary plays a vlLal role
ln shaplng Lhe enacLmenL accordlng Lo Lhe order of Lhe day Cne such case
whlch needs appreclaLlon ls Lhe lL (ubllc lnLeresL LlLlgaLlon) whlch Lhe
kerala Plgh CourL has accepLed Lhrough an emall
erfecL ls a relaLlve Lerm noLhlng ln Lhls world ls perfecL 1he persons who
leglslaLe Lhe laws and bylaws also are noL perfecL 1he laws Lherefore enacLed by
Lhem cannoL be perfecL 1he cyber law has emerged from Lhe womb of globallsaLlon
lL ls aL Lhe Lhreshold of developmenL ln due course of exposure Lhrough varled and
compllcaLed lssues lL wlll grow Lo be a plece of lLs Llme leglslaLlon
7

Potrebbero piacerti anche