11 Cyber Crlme ls an evll havlng lLs orlgln ln Lhe growlng dependence on compuLers ln modern llfe
A slmple yeL sLurdy deflnlLlon of cyber crlme would be unlawful acLs whereln Lhe compuLer ls elLher a Lool or a LargeL or boLh" ueflnlng cyber crlmes as acLs LhaL are punlshable by Lhe lnformaLlon 1echnology AcL" would be unsulLable as Lhe lndlan enal Code also covers many cyber crlmes such as emall spooflng cyber defamaLlon eLc
12 1?LS Cl C?8L8 C8lML Cyber Crlme refers Lo all acLlvlLles done wlLh crlmlnal lnLenL ln cyberspace 1hese fall lnLo Lhree sloLs
- 1hose agalnsL persons - AgalnsL 8uslness and nonbuslness organlzaLlons - Crlme LargeLlng Lhe governmenL
LeL us examlne Lhe acLs whereln Lhe compuLer ls a Lool for an unlawful acL 1hls klnd of acLlvlLy usually lnvolves a modlflcaLlon of a convenLlonal crlme by uslng compuLer Some examples are
Cyber ornography 1hls would lnclude pornographlc webslLes pornographlc magazlnes produced uslng compuLer and Lhe lnLerneL (Lo down load and LransmlL pornographlc plcLures phoLos wrlLlngs eLc)
Sale of lllegal arLlcles 1hls would lnclude sale of narcoLlcs weapons and wlldllfe eLc by posLlng lnformaLlon on webslLes bulleLln boards or slmply by uslng emall communlcaLlons
Cnllne gambllng 1here are mllllons of webslLes all hosLed on servers abroad LhaL offer onllne gambllng ln facL lL ls belleved LhaL many of Lhese webslLes are acLually fronLs for money launderlng
lnLellecLual roperLy Crlmes 1hese lnclude sofLware plracy copyrlghL lnfrlngemenL Lrademarks vlolaLlons eLc LMall spooflng A spoofed emall ls one LhaL appears Lo orlglnaLe from one source buL acLually has been senL from anoLher source 1hls can also be Lermed as LMall forglng
lorgery CounLerfelL currency noLes posLage and revenue sLamps mark sheeLs eLc can be forged uslng sophlsLlcaLed compuLers prlnLers and scanners
Cyber uefamaLlon 1hls occurs when defamaLlon Lakes place wlLh Lhe help of compuLers and or Lhe lnLerneL eg someone publlshed defamaLory maLLer abouL someone on a webslLes or sends emall conLalnlng defamaLory lnformaLlon Lo all of LhaL person's frlends
Cyber SLalklng Cyber sLalklng lnvolves followlng a person's movemenLs across Lhe lnLerneL by posLlng messages on Lhe bulleLln boards frequenLed by Lhe vlcLlm enLerlng Lhe chaLrooms frequenLed by Lhe vlcLlm
LeL us examlne some of Lhe acLs whereln Lhe compuLer or compuLer neLwork ls Lhe LargeL for an unlawful acL lL may be noLed LhaL ln Lhese acLlvlLles Lhe compuLer may also be a Lool 1hls klnd of acLlvlLy ls usually ouL of Lhe purvlew of convenLlonal crlmlnal law Some examples are
122 unauLhorlzed access Lo compuLer sysLem or neLwork 1hls acLlvlLy ls commonly referred Lo as hacklng 1he lndlan Law has however glven a dlfferenL connoLaLlon Lo Lhe Lerm hacklng
1hefL of lnformaLlon conLalned ln elecLronlc from 1hls lncludes lnformaLlon sLored ln compuLer hard dlsks removable sLorage medla eLc
LMall bomblng Lmall bomblng refers Lo sendlng a large amounL of emalls Lo Lhe vlcLlm resulLlng ln Lhe vlcLlms' emall accounL or mall servers
uaLa dlddllng 1hls klnd of an aLLack lnvolves alLerlng Lhe raw daLa [usL before lL ls processed by a compuLer and Lhen changlng lL back afLer Lhe processlng ls compleLed
Salaml aLLacks 1hose aLLacks are used for Lhe commlsslon of flnanclal crlmes 1he key here ls Lo make Lhe alLeraLlon so lnslgnlflcanL LhaL ln a slngle case lL would go compleLely unnoLlced eg A bank employee lnserLs a program lnLo bank's servers LhaL deducLs a small amounL from Lhe accounL of every cusLomer
uenlal of Servlce 1hls lnvolves floodlng compuLer resources wlLh more requesLs Lhan lL can handle 1hls causes Lhe resources Lo crash Lhereby denylng auLhorlzed users Lhe servlce offered by Lhe resources vlrus/worm vlruses are programs LhaL aLLach Lhemselves Lo a compuLer or a flle and Lhen clrculaLe Lhemselves Lo oLher flles and Lo oLher compuLers on a neLwork 1hey usually affecL Lhe daLa on a compuLer elLher by alLerlng or deleLlng lL Worms unllke vlruses don noL need Lhe hosL Lo aLLach Lhemselves Lo
Loglc bombs 1hese are dependenL programs 1hls lmplles LhaL Lhese programs are creaLed Lo do someLhlng only when a cerLaln evenL occurs eg some vlruses may be 2Lermed loglc bombs because Lhey lle dormanL all Lhrough Lhe year and become acLlve only on a parLlcular daLe
1ro[an Porse A 1ro[an as Lhls program ls apLly called ls an unauLhorlzed program whlch funcLlons from lnslde whaL seems Lo be an auLhorlzed program Lhereby conceallng whaL lL ls acLually dolng
lnLerneL 1lme 1hefL 1hls connoLes Lhe usage by unauLhorlzed persons of Lhe lnLerneL hours pald for by anoLher person
hyslcally damaglng a compuLer sysLem 1hls crlme ls commlLLed by physlcally damaglng a compuLer or lLs perlpherals
20 8LvLn1lCn 21 8LvLn1lvL S1LS lC8 lnulvluuALS
211 CPlLu8Ln Chlldren should noL glve ouL ldenLlfylng lnformaLlon such as name Pome address School name or 1elephone number ln a chaL room 1hey should noL glve phoLographs Lo anyone on Lhe neL wlLhouL flrsL checklng or lnformlng parenLs guardlans 1hey should noL respond Lo messages whlch are suggesLlve obscene belllgerenL or LhreaLenlng and noL Lo arrange a faceLo face meeLlng wlLhouL Lelllng parenLs or guardlans 1hey should remember LhaL people onllne mlghL noL be who Lhey seem
212 A8Ln1S arenL should use conLenL fllLerlng sofLware on C Lo proLecL chlldren from pornography gambllng haLe speech drugs and alcohol 1here ls also sofLware Lo esLabllsh Llme conLrols for use of llmpeLs (for example blocklng usage afLer a parLlculars Llme) and allowlng parenLs Lo see whlch slLe lLem chlldren have vlslLed use Lhls sofLware Lo keep Lrack of Lhe Lype of acLlvlLles of chlldren
213 CLnL8AL lnlC8MA1lCn uon'L deleLe harmful communlcaLlons (emalls chaLs eLc) 1hey wlll provlde vlLal lnformaLlon abouL sysLem and address of Lhe person behlnd Lhese r 1ry noL Lo panlc r lf you feel any lmmedlaLe physlcal danger conLacL your local pollce r Avold geLLlng lnLo huge argumenLs onllne durlng chaL and dlscusslons wlLh oLher users r 8emember LhaL all oLher lnLerneL users are sLrangers you do noL know who you are chaLLlng wlLh So be careful r 8e exLremely careful abouL how you share personal lnformaLlon abouL yourself onllne r Choose your chaLLlng nlckname carefully so as oLhers 3r uo noL share personal lnformaLlon ln publlc space onllne do noL glve lL Lo sLrangers r 8e exLremely cauLlous abouL meeLlng onllne lnLroduced person lf you choose Lo meeL do so ln a publlc place along wlLh a frlend r lf a slLuaLlon onllne becomes hosLlle log off and lf a slLuaLlon places you ln fear conLacL local pollce r Save all communlcaLlons for evldence uo noL edlL lL ln any way Also keep a record of your conLacLs and lnform Law LnforcemenL Cfflclals
22 8LvLn1lvL S1LS lC8 C8CAnlSA1lCnS Anu CCvL8nMLn1
221 P?SlCAL SLCu8l1? hyslcal securlLy ls mosL senslLlve componenL as prevenLlon from cyber crlme CompuLer neLwork should be proLecLed from Lhe access of unauLhorlzed persons
222 ACCLSS CCn18CL Access ConLrol sysLem ls generally lmplemenLed uslng flrewalls whlch provlde a cenLrallzed polnL from whlch Lo permlL or allow access llrewalls allow only auLhorlzed communlcaLlons beLween Lhe lnLernal and exLernal neLwork
223 ASSWC8u roof of ldenLlLy ls an essenLlal componenL Lo ldenLlfy lnLruder 1he use of passwords ln Lhe mosL common securlLy for neLwork sysLem lncludlng servers rouLers and flrewalls MosLly all Lhe sysLems are programmed Lo ask for username and password for access Lo compuLer sysLem 1hls provldes Lhe verlflcaLlon of user assword should be charged wlLh regular lnLerval of Llme and lL should be alpha numerlc and should be dlfflculL Lo [udge
224 llnulnC 1PL PCLLS ln nL1WC8k SysLem managers should Lrack down Lhe holes before Lhe lnLruders do Many neLworklng producL manufacLures are noL parLlcularly aware wlLh Lhe lnformaLlon abouL securlLy holes ln Lhelr producLs So organlzaLlon should work hard Lo dlscover securlLy holes bugs and weaknesses and reporL Lhelr flndlngs as Lhey are conflrmed
223 uSlnC nL1WC8k SCAnnlnC 8CC8AMS 1here ls a securlLy admlnlsLraLlon's Lool called unlx whlch ls freely avallable on lnLerneL 1hls uLlllLy scans and gaLhers lnformaLlon abouL any hosL on a neLwork regardless of whlch operaLlng sysLem or servlces Lhe hosLs were runnlng lL checks Lhe known vulnerablllLles lnclude bugs securlLy weakness lnadequaLe password proLecLlon and so on 1here ls anoLher producL avallable called CCS (CompuLer Cracle and assword SysLem) lL scans for poor passwords dangerous flle permlsslons and daLes of key flles compared Lo daLes of CL81 securlLy advlsorles
226 uSlnC ln18uSlCn ALL81 8CC8AMS As lL ls lmporLanL Lo ldenLlfy and close exlsLlng securlLy holes you also need Lo puL some waLchdogs lnLo servlce 1here are some lnLruslon programs whlch ldenLlfy susplclous acLlvlLy and reporL so LhaL necessary acLlon ls Laken 1hey need Lo be operaLlng consLanLly so LhaL all unusual behavlour on neLwork ls caughL lmmedlaLely 4227 uSlnC LnC8?1lCn LncrypLlon ls able Lo Lransform daLa lnLo a form LhaL makes lL almosL lmposslble Lo read lL wlLhouL Lhe rlghL key 1hls key ls used Lo allow conLrolled access Lo Lhe lnformaLlon Lo selecLed people 1he lnformaLlon can be passed on Lo any one buL only Lhe people wlLh Lhe rlghL key are able Lo see Lhe lnformaLlon LncrypLlon allows sendlng confldenLlal documenLs by Lmall or save confldenLlal lnformaLlon on lapLop compuLers wlLhouL havlng Lo fear LhaL lf someone sLeals lL Lhe daLa wlll become publlc WlLh Lhe rlghL encrypLlon/decrypLlon sofLware lnsLalled lL wlll hook up Lo mall program and encrypL/decrypL messages auLomaLlcally wlLhouL user lnLeracLlon 30 uL1LC1lCn Cyber crlme ls Lhe laLesL and perhaps Lhe mosL speclallzed and dynamlc fleld ln cyber laws Some of Lhe Cyber Crlmes llke neLwork lnLruslon are dlfflculL Lo deLecL and lnvesLlgaLlon even Lhough mosL of crlmes agalnsL lndlvldual llke cyber sLalklng cyber defamaLlon cyber pornography can be deLecLed and lnvesLlgaLed Lhrough followlng sLeps AfLer recelvlng such Lype of mall
(1) Clve command Lo compuLer Lo show full header of mall (2) ln full header flnd ouL Lhe l number and Llme of dellvery of number and Lhls l number always dlfferenL for every mall lrom Lhls l number we can know who was Lhe lnLerneL servlce provlder for LhaL sysLem from whlch Lhe mall had come (3) 1o know abouL lnLerneL Servlce rovlder from l number Lake Lhe servlce of search englne llke nlccom macffvlsualrouLe Com apnlccom arlncom (4) AfLer openlng Lhe webslLe of any of above menLloned search englne feed Lhe l number and afLer some Llme name of lS can be obLalned (3) AfLer geLLlng Lhe name of lS we can geL Lhe lnformaLlon abouL Lhe sender from Lhe lS by glvlng Lhem Lhe l number daLe and Llme of sender (6) lS wlll provlde Lhe address and phone number of Lhe sysLem whlch was used Lo send Lhe mall wlLh bad lnLenLlon AfLer knowlng Lhe address and phone number crlmlnal can be apprehended by uslng convenLlonal pollce meLhods 4C C?8L8 LAW lndla has enacLed Lhe flrsL l1AcL 2000 based on Lhe unCl8AL model recommended by Lhe general assembly of Lhe unlLed naLlons ChapLer xl of Lhls AcL deals wlLh offences/crlmes along wlLh cerLaln oLher provlslons scaLLered ln Lhls AcLs 1he varlous offences whlch are provlded under Lhls chapLer are shown ln Lhe followlng Lable 41 Cffence SecLlon under l1 AcL 1amperlng wlLh CompuLer source documenLs Sec63 Packlng wlLh CompuLer sysLems uaLa alLeraLlon Sec66 ubllshlng obscene lnformaLlon Sec67 3unauLhorlsed access Lo proLecLed sysLem Sec70 8reach of ConfldenLlallLy and rlvacy Sec72 ubllshlng false dlglLal slgnaLure cerLlflcaLes Sec73 nC1L Sec78 of l1AcL empowers uepuLy SupdL Cf ollce Lo lnvesLlgaLe cases falllng under Lhls AcL 42 CompuLer 8elaLed Crlmes Covered under lC and Speclal Laws Cffence SecLlon Sendlng LhreaLenlng messages by emall Sec 303 lC Sendlng defamaLory messages by emall Sec 499 lC lorgery of elecLronlc records Sec 463 lC 8ogus webslLes cyber frauds Sec 420 lC Lmall spooflng Sec 463 lC Web!acklng Sec 383 lC LMall Abuse Sec300 lC Cnllne sale of urugs nuS AcL Cnllne sale of Arms Arms AcL 30 LLLMLn1A8? 8C8LLMS ASSCClA1Lu Wl1P C?8L8C8lMLS Cne of Lhe greaLesL lacunae ln Lhe fleld of Cyber Crlme ls Lhe absence of comprehenslve law any where ln Lhe World 1he problem ls furLher aggravaLed due Lo dlsproporLlonal growLh raLlo of lnLerneL and cyber laws 1hough a beglnnlng has been made by Lhe enacLmenL of l1 AcL and amendmenLs made Lo lndlan enal Code problems assoclaLed wlLh cyber crlmes conLlnue Lo perslsL 1 !urlsdlcLlon ls Lhe hlghly debaLable lssue as Lo Lhe malnLalnablllLy of any sulLs whlch has been flled 1oday wlLh Lhe growlng arms of cyber space Lhe LerrlLorlal boundarles seem Lo vanlsh 1hus Lhe concepL of LerrlLorlal [urlsdlcLlon as envlsaged under S16 of CrC and S2of Lhe lC wlll have Lo glve way Lo alLernaLlve meLhod of dlspuLe resoluLlon 2 Loss of evldence ls a very common expecLed problem as all Lhe daLa are rouLlnely desLroyed lurLher collecLlon of daLa ouLslde Lhe LerrlLorlal exLenL also paralyses Lhe sysLem of crlme lnvesLlgaLlon 3 Cyber Army 1here ls also an lmperaLlve need Lo bulld a hlgh Lechnology crlme lnvesLlgaLlon lnfrasLrucLure wlLh hlghly Lechnlcal sLaff aL Lhe oLher end 4 A law regulaLlng Lhe cyberspace whlch lndla has done 3 1hough S73 provldes for exLraLerrlLorlal operaLlons of Lhls law buL Lhey could be meanlngful only when backed wlLh provlslon recognlzlng orders and warranLs for lnformaLlon lssued by compeLenL auLhorlLles ouLslde Lhelr 6[urlsdlcLlon and measure for cooperaLlon for exchange of maLerlal and evldence of compuLer crlmes beLween law enforcemenL agencles 6 Cyber savvy [udges are Lhe need of Lhe day !udlclary plays a vlLal role ln shaplng Lhe enacLmenL accordlng Lo Lhe order of Lhe day Cne such case whlch needs appreclaLlon ls Lhe lL (ubllc lnLeresL LlLlgaLlon) whlch Lhe kerala Plgh CourL has accepLed Lhrough an emall erfecL ls a relaLlve Lerm noLhlng ln Lhls world ls perfecL 1he persons who leglslaLe Lhe laws and bylaws also are noL perfecL 1he laws Lherefore enacLed by Lhem cannoL be perfecL 1he cyber law has emerged from Lhe womb of globallsaLlon lL ls aL Lhe Lhreshold of developmenL ln due course of exposure Lhrough varled and compllcaLed lssues lL wlll grow Lo be a plece of lLs Llme leglslaLlon 7