Sei sulla pagina 1di 4

Proceedings of the 4th National Conference; INDIACom-2010

Computing For Nation Development, February 25 26, 2010


Bharati Vidyapeeths Institute of Computer Applications and Management, New Delhi

Dark side of Cyber Crime in India: A Case Study


Namita Singh, Deepshikha Jamwal, G.S Sambyal
Research Scholar, Research Scholar & Professor
namitasingh123@rediff.com, Jamwal.shivani@gmail.com
Department of Computer Science and IT
University of Jammu.

EXTENDED ABSTRACT "extradition treaty". The only safeguard in such a situation is to


use the latest technology to counter these problems. [1].
With Growing Internet-related crimes throughout the world, Forms of Cyber Crime
India is no option. The rapid growth of the Internet and of
computer technology over the past few years has led to the Cyber Crime refers to all activities done with criminal intent
growth of new forms of crimes Internet-related crimes - in cyberspace. These fall into three slots.
throughout the world. With India being home to the fourth Those against persons.
highest number of Internet users in the world, cyber crimes Against Business and Non-business organizations.
under the 2007 IT Act recorded a whopping 50% jump over the Crime targeting the government [2].
previous year. A report by national crime record bureau Let us examine the acts wherein the computer is a tool for an
(NCRB) mentioned the increase in cyber crime with 217 unlawful act. This kind of activity usually involves a
reported cases under the IT act in 2007, registering an increase modification of a conventional crime by using computer.
of 50% from the previous year. It said 46% of the cyber crime Some examples are: Financial Claims, Cyber Pornography,
comes from pornography followed by hacking activity. The Sale of illegal articles, Online ambling, Intellectual Property
cyber crimes ranges from tampering computer document, Crimes, E-Mail spoofing, Forgery, Cyber Defamation,
hacking, cyber pornography to unauthorized access to protected Cyber-Stalking.
computer documents and false electronic evidence. The aim of Let us examine some of the acts herein the computer or
this article is to analyze the adverse impact of "Cyber Crime" computer Network is the target for an unlawful act. It may be
on the national interest of India. noted that in these activities the computer may also be a tool.
This kind of activity is usually out of the purview of
Keywords: cyber crime, Internet, Internet security. conventional criminal law. Some examples are:
Unauthorized access to computer system or network
Introduction Theft of information contained in electronic from E-Mail
The traditional concepts and methods of cyber crime have bombing
taken new dimensions, which are more destructive and deadly Data diddling
in nature. In the age of information technology the cyber crime Salami attacks
has acquired an expertise to produce the most deadly Denial of Service
combination of weapons and technology, which if not properly Virus/worm
safeguarded in due course of time, will take its own toll. The Logic bombs
law in this regard is not sufficient and the problem of cyber Trojan Horse
crime can be tackled properly either by making a separate law Internet Time Theft
in this regard or by making suitable amendments in the already Physically damaging a computer system.
existing Information Technology Act, 2000. The expression Some Indian Case Studies:
"cyber crime" includes an intentional negative and harmful use
of the information technology for producing destructive and 1. Pune Citibank Mphasis Call Center Fraud:
harmful effects to the property, whether tangible or intangible, US $ 3,50,000 from accounts of four US customers were
of others. The nature of "cyber crime " is such that new dishonestly transferred to bogus accounts. This will give a lot
methods and technologies are invented regularly; hence it is not of ammunition to those lobbying against outsourcing in US.
advisable to put the definition in a straightjacket formula or Such cases happen all over the world but when it happens in
pigeons hole. The laws of India have to take care of the India it is a serious matter and we cannot ignore it. It is a case
problems originating at the international level because the of sourcing engineering. Some employees gained the
Internet, through which these criminal activities are carried out, confidence of the customer and obtained their PIN numbers to
recognizes no boundaries. Thus, a cyber crime can collapse the commit fraud. They got these under the guise of helping the
economic structure of a country from a place with which India customers out of difficult situations. Highest security prevails
may not have any reciprocal arrangements, including an in the call centers in India, as they know that they will lose
Proceedings of the National Conference; INDIACom-2007

their business. There was not as much of breach of security but


Robbery 34 60 53
of sourcing engineering.
House burglary 117 107 111
Result: There is need for a strict background check of the call
by Day
center executives. However, best of background checks cannot
eliminate the bad elements from coming in and breaching House burglary by 359 448 375
security. We must still ensure such checks when a person is night
hired. There is need for a national ID and a national database
where a name can be referred. In this case preliminary Theft 1143 1197 102
investigations do not reveal that the criminals had any crime 3
history. Customer education is very important so customers do
not get taken for a ride. Most banks are guilt of not doing this Theft of Two 964 787 677
[3]. wheelers
2.Baazee.comCase Three- wheelers 97 60 56
CEO of Baazee.com was arrested in December 2004 because a
CD with objectionable material was being sold on the website. Four wheelers 107 123 83
The CD was also being sold in the markets in Delhi. The
Mumbai city police and the Delhi Police got into action. The Kidnap 61 73 80
CEO was later released on bail.
Result: This opened up the question as to what kind of Rape 27 36 26
distinction do we draw between Internet Service Provider and
Content Provider. The burden rests on the accused that he was Cheating 1079 924 800
the Service Provider and not the Content Provider. It also raises
a lot of issues regarding how the police should handle the cyber Cyber Crime 4 3 0
crime cases and a lot of education is required [4].
The cyber crimes are registered under the Information
3. Case of Extortion of Money Through Internet: The Technology Act. An officer not less than the rank of Assistant
complainant has received a threatening email demanding Commissioner of Police should investigate the cases in which
protection from unknown person claiming to be the member of provisions of this Act is invoked. However, the Hyderabad
Halala Gang, Dubai. Police registered a case u/s. 384/506/511 Detective Department has not dedicated any ACP to investigate
IPC. The sender of the email used the email ID yz@yahoo.com such cases. This prompted the investigators to register cases
& abc@yahoo.com and signed as Chengez Babar. Both the relating to cyber crimes under the Sections of 420 (cheating)
email accounts were tracked, detail collected from ISPs & and 509 (word, gesture or act intended to insult the modesty of
locations were identified. The Cyber cafes from which the a woman) depending on the content of the complaint. If all
email has been made were monitored and the accused person complaints pertaining to fraud using Internet were taken into
was nabbed red handed [5]. account, the number of cyber crimes would be higher [6].
4. Hyderabad case study: The upward graph of cyber crimes
for the first half of the year is ringing alarm bells for Internet 5. Mumbai Case Study 2008: It was found that India being
surfers in the State capital. From nil in 2007 to three in 2008 home to the fourth highest number of Internet users in the
during the first six months, the online frauds rose to four by the world, cyber crimes under the 2007 IT Act recorded a
end of June this year. Interestingly, more cheatings related to whopping 50% jump over the previous year. What's more, the
Internet were reported during this period, but they could not be majority of offenders were under 30 years of age. A report by
categorized as cyber crimes due to legal formalities. national crime record bureau (NCRB) mentioned the increase
in cyber crime with 217 reported cases under the IT act in
Crime Scene in Hyderabad 2007, registering an increase of 50% from the previous year. It
said 46% of the cyber crime comes from pornography followed
Catergory 09 08 07 by hacking activity. The report said cyber crimes could range
from tampering computer document, hacking, cyber
Murder for gain 4 2 1 pornography to unauthorized access to protected computer
documents and false electronic evidence. The report said that
Murder 73 60 55 cyber crimes are no longer limited to metro cities as only 17
out of 35 mega cities reported 300 cases of cyber crimes.
Attempt to murder 60 62 66 According to the report, Bhopal in Madhya Pradesh reported
the highest incidence of cyber crimes under IPC sections
Dacoity 5 8 1 accounting for 87.8% of the total crimes in the country. The

Copy Right INDIACom 2007 2


Write your paper title here in title case

Internet Crime Complaint Center, in 2009 released its latest Kant informed the bank that an amount of Rs.50, 000 has been
annual report on victims' complaints received and referred to debited from his account without his knowledge [9].
law enforcement. From January 1, 2008 December 31, 2008, Analysis:
the IC3 (Internet Crime Complaint Center's) website received
275,284 complaint submissions. This is a (33.1%) increase
when compared to 2007 when 206,884 complaints were
received. These filings were composed of complaints primarily
related to fraudulent and non-fraudulent issues on the Internet
[7].

Fig2.

Incident wise Breakup.

Fig1. Percentage of Complaints Setup. The menace of cyber crime is not the sole responsibility of
State and its instrumentalities. The citizens as well as the
Non-delivered merchandise and/or payment were, by far,
netizens are equally under a solemn obligation to fight against
the most reported offense, comprising 32.9% of referred
the cyber crime. In fact, they are the most important and
complaints.
effective cyber crime eradication and elimination mechanism.
The only requirement is to encourage them to come forward for
Internet auction fraud accounted for 25.5% of referred
the support of fighting against cyber crime. The government
complaints.
can give suitable incentives to them in the form of monetary
Credit/debit card fraud made up 9.0% of referred awards. It must, however, be noted that their anonymity and
complaints. security must be ensured before seeking their help. The courts
are also empowered to maintain their anonymity if they provide
In order to combat the increasing cases of cyber crime, this any information and evidence to fight against cyber related
year officers are being trained for six weeks in computer crime. The ultimate solution to any problem is not to perform a
hardware and software, computer networks, communication surplus of statutes but their rigorous and dedicated
networks, network protocols, wireless networks and network enforcement. The courts may apply the existing laws in a
security at Guru Gobind Singh Indraprastha University progressive, updating and purposive manner. It must be
(GGSIPU). appreciated that it is not the enactment of a law but the
Following are some general security tips for users as displayed desire, will and efforts to accept and enforce it in its true letter
in the Mumbai Police cyber crime Website. and spirit, which can grant the most strongest, secure and safest
1. Take a test before opening e-mail attachment, install and use protection for any purpose. The enforcement of these rights
an anti-Virus programme. requires a qualitative effort and not a quantitative effort.
2. Use strong password. Thus, till a law dealing expressly with cyber crime is enacted,
3. Protect your Website [8] we must not feel shy and hesitant to use the existing provisions.
6. Case study of Jammu:
Manager of Axis bank on 1st Nov. 2008 lodged a complaint at
Bahu fort Police station, Jammu that one Mr. Deepak Nargotra, FUTURE SCOPE
an account holder of the same bank had befooled some The most effective way of controlling cyber crimes, is to make
customers of the same bank through internet by sending fraud people aware of different crimes by different modes of mass
e-mails on behalf of axis bank to provide customers with their media, as still it plays 43% part on awareness among masses
banking details as the same were needed to be updated by because 60% people afraid negative publicity in reporting the
clicking on a fraudulent self made link. The customers cases.
assuming it to be from the axis bank send their username and And further there is a need of making the application of the
password. It was later, when one of the customers namely TC laws more stringent to check such crimes.

Copy Right INDIACom 2007 3


Proceedings of the National Conference; INDIACom-2007

REFERENCES
[1]. Cooper, W. (2007), Information
technology and internet culture, available at:
www.brandeis.edu/pubs/ jove/HTML/V6/iculture.html
(accessed 4 January 2007).
[2]. National ICT Security and Emergency Response Center
(NISER), Is Cyber crime reigning on a no mans land?
available at: www.niser.org.my/
Resources.html (accessed 25 January 2007).
[3]. K.P. Chow, Digital Evidence Search Kit, SADFE05 0-
7695-2478-8/05 2005 IEEE. [4].
Walden, I., Crime and Security in Cyberspace, Cambridge
Review of International Affairs, Vol. 18, Number 1 2005, pp.
51-68.
[5] Patki, A.B. et.al, Cyber crime information system for
cybernetics awareness, ISBN: 0-7695-1922-9, IEEE, 2003.
[6] Arthur, K.K. et.al, Considerations Towards a Cyber Crime
Profiling System, ISBN: 978-0-7695-3102-1,IEEE, 2008.
[7] Lee, H.C. et.al, Cyber crime and challenges for crime
investigation in the information era, ISBN: 978-1-4244-2414-
6, IEEE, 2008.
[8] Kabeer, S. et.al, The Relationship between Cyber Crime
and Mental Illness, ISBN: 978-1-42443547-0, IEEE, 2008.
[9] Kwan, L. et.al, Towards a Methodology for Profiling
Cyber Criminals, ISSN: 1530-1605
ISBN: 978-0-7695-3075-8, IEEE, 2009.

Copy Right INDIACom 2007 4

Potrebbero piacerti anche