Cyber crime in india

Arpan Shah
Arpan ShahStudent
A 
Presentation 
On 
“Cyber Crime Laws and 
Cases related to it in India.” 
Presented By: 
RAHUL VAGHELA 
ARPAN SHAH
What is Cyber crime??? 
• Cyber crime is simply defined as crimes that are 
directly related to computers and using 
computers. 
• An increasing number of domestic and 
international criminal activities are using the 
Internet. Computers and other electronic 
devices can be tools to commit crime or are 
targeted by criminals. A personal computer 
connected to the Internet without protection 
may be infected with malicious software in 
under a minute.
• Cybercrime has been used to describe 
a wide range of offences, including 
offences against computer data and 
systems (such as “hacking”), computer-related 
forgery and fraud (such as 
“phishing”), content offences and 
copyright offences (such as the 
dissemination of pirated content). 
 Cybercrime is one of the fastest-growing 
criminal activities on the 
planet. It covers a huge range of 
illegal activity including financial 
scams, computer hacking, virus 
attacks, stalking by e-mail and 
creating websites that promote 
racial hatred.
Denial of 
service 
Malware 
Computer 
Viruses 
Transmission 
of indecent 
material 
Harassment 
(sexual, 
racial, 
religious etc.) 
Computer 
Vandalism 
Transmission 
of harmful 
programs 
Terrorize 
international 
Govt. 
Cracking into 
military 
maintained 
website 
4
WHO ARE CYBER CRIMINALS? 
 Kids (age group 9-16 etc.) 
 Organized hack activists 
 Disgruntled employees 
 Professional hackers (corporate espionage)
Cyber Crime In India 
 The majority of cybercrimes are centered on fraud and Phishing, 
 India is the third-most targeted country for Phishing attacks after the 
US and the UK, 
 Social networks as well as ecommerce sites are major targets, 
 6.9 million bot-infected systems in 2010, 
 14,348 website defacements in 2010, 
 6,850 .in and 4,150 .com domains were defaced during 2011, 
 15,000 sites hacked in 2011, 
 India is the number 1 country in the world for generating spam.
Why India? 
A rapidly growing online user 
base 
 121 Million Internet Users 
 65 Million Active Internet 
Users, up by 28% from 51 
million. 
 50 Million users shop online 
on Ecommerce and Online 
Shopping Sites 
 46+ Million Social Network 
Users 
 346 million mobile users had 
subscribed to Data Packages.
Cyber Laws in India 
Under The Information 
Technology Act, 2000 
CHAPTER XI – OFFENCES – 66. Hacking with 
computer system. 
(1) Whoever with the Intent to cause or knowing 
that he is likely to cause Wrongful Loss or 
Damage to the public or any person Destroys or 
Deletes or Alters any Information Residing in a 
Computer Resource or diminishes its value or 
utility or affects it injuriously by any means, 
commits hack. 
(2) Whoever commits hacking shall be punished with imprisonment up to three years, 
or with fine which may extend up to two lakh rupees, or with both.
Cyber Laws 
Cyber Law is the law governing cyber space. 
Cyber space is a very wide term and includes 
computers, networks, software, data storage 
devices (such as hard disks, USB disks etc), 
the Internet, websites, emails and even 
electronic devices such as cell phones, ATM 
machines etc. 
 Needs for Cyber Law 
 TACKLING CYBER CRIMES 
 Laws are necessary in all segments of society, and e-commerce. 
 All Internet users, including minors, need to be assured of their privacy and 
the safety of their personal information online.
Case 1: 
ONLINE CREDIT CARD FRAUD ON E-BAY 
 e-bay.in is the most popular online shopping mall providing free online auctions for 
products like mobiles/cell phones, cameras, computers, etc. 
 Bhubaneswar: Rourkela police busted a racket involving an online fraud worth Rs 
12.5 lakh. 
 Two persons, including alleged mastermind Debasis Pandit, a BCA student, were 
arrested and forwarded to the court of the subdivisional judicial magistrate, Rourkela 
the other arrested person is Rabi Narayan Sahu. 
 A case has been registered against the accused under Sections 420 and 34 of the 
Indian Penal Code and Section 66 of the IT Act and further investigation is on, he 
said.
 Pandit allegedly hacked into the eBay India site and gathered the details of around 
700 credit cardholders. He then made purchases by using their passwords. 
 The fraud came to the notice of eBay officials when it was detected that 
several purchases were made from Rourkela while the customers were based in 
cities such as Bangalore, Baroda and Jaipur and even London. 
 The company brought the matter to the notice of Rourkela police after 
some customers lodged complaints 
 Pandit used the address of Sahu for delivery of the purchased goods 
 The gang was involved in train, flight and hotel reservations.
Case 2: 
ACCUSESD IN RS 400 MILLION SMS SCAM 
ARRESTED IN MUMBAI 
 Jayanand Nadar, 30, and Ramesh Gala, 26, were arrested late on 
Monday from a hotel in Mira Road in the western suburbs. Nadar, a 
first year college dropout, along with his brother Jayaraj had allegedly 
duped at least 50,000 people of Rs.400 million, said officials in the 
city police's Economic Offences Wing (EOW). 
 The two brothers along with Gala allegedly took help of SMS 
technology and launched the first-of-its-kind SMS fraud in India. 
 As part of the attractive scheme, the Nadar brothers messaged 
random numbers, asking people interested in 'earning Rs.10,000 per 
month' to contact them.
 "Interested 'subscribers' were asked to deposit Rs.500 each. The 
conmen duo claimed to be working with a US-based company named 
Aropis Advertising Company, which wanted to market its client's 
products through SMS'," senior inspector A Thakur said. 
 The brothers are said to have told the subscribers that their American 
clients wanted to conduct a study about local response to their 
advertisement and were using SMS as it was the latest medium of 
communication. 
 "The brothers led an extravagant life. They would stay in top five star 
hotels, throw massive parties for investors and were also known faces 
in the city's Page-3 circuit," Thakur revealed. 
 Gala, who is believed to have looked after the accounts, and Jayanand 
have been remanded to police custody till March 5."
Case 3: 
SONY.SAMBANDH.COM CASE 
 Sony India Private Ltd, which runs a website called www.sony-sambandh. 
com, targeting Non Resident Indians. The website enables NRIs 
to send Sony products to their friends and relatives in India after they pay 
for it online. 
 The company undertakes to deliver the products to the concerned 
recipients. In May 2002, someone logged onto the website under the 
identity of Barbara Campa and ordered a Sony Colour Television set and a 
cordless head phone. 
 At the time of delivery, the company took digital photographs showing the 
delivery being accepted by Arif Azim. The transaction closed at that, but 
after one and a half months the credit card agency informed the company 
that this was an unauthorized transaction as the real owner had denied 
having made the purchase.
 The court, however, felt that as the accused was a young boy of 24 
years and a first-time convict, a lenient view needed to be taken. The 
court therefore released the accused on probation for one year. 
 The judgment is of immense significance for the entire nation. 
Besides being the first conviction in a cybercrime matter, it has 
shown that the the Indian Penal Code can be effectively applied to 
certain categories of cyber crimes which are not covered under the 
Information Technology Act 2000. Secondly, a judgment of this sort 
sends out a clear message to all that the law cannot be taken for a 
ride.
Case 4: 
Pune Citibank MphasiS Call Centre Fraud 
 The crime was obviously committed using "Unauthorized Access" to the 
"Electronic Account Space" of the customers. It is therefore firmly within the 
domain of "Cyber Crimes". 
 ITA-2000 is versatile enough to accommodate the aspects of crime not 
covered by ITA-2000 but covered by other statutes since any IPC offence 
committed with the use of "Electronic Documents" can be considered as a 
crime with the use of a "Written Documents". "Cheating", "Conspiracy", 
"Breach of Trust" etc are therefore applicable in the above case in addition 
to section in ITA-2000. 
 Under ITA-2000 the offence is recognized both under Section 66 and Section 
43. Accordingly, the persons involved are liable for imprisonment and fine as 
well as a liability to pay damage to the victims to the maximum extent of Rs 
1 crore per victim for which the "Adjudication Process" can be invoked.
Case 5: 
India's First ATM Card Fraud 
 The Chennai City Police have busted an international gang involved in cyber 
crime, with the arrest of Deepak PremManwani (22), who was caught red-handed 
while breaking into an ATM in the city in June last, it is reliably 
learnt. 
 At the time of his detention, he had with him Rs 7.5 lakh knocked off from 
two ATMs in T Nagar and Abiramipuram in the city. Prior to that, he had 
walked away with Rs 50,000 from an ATM in Mumbai. 
 Manwani is an MBA drop-out from a Pune college and served as a marketing 
executive in a Chennai-based firm for some time. Interestingly, his 
audacious crime career started in an Internet cafe. While browsing the Net 
one day, he got attracted to a site which offered him assistance in breaking 
into the ATMs.
 Believing that it was a genuine offer from the telecom company in 
question, several lakh subscribers logged on to the site to get back 
that little money, but in the process parted with their PINs. 
 Meanwhile, Manwani also managed to generate 30 plastic cards that 
contained necessary data to enable him to break into ATMS. He was 
so enterprising that he was able to sell away a few such cards to his 
contacts in Mumbai. The police are on the lookout for those persons 
too. 
 On receipt of large-scale complaints from the billed credit card users 
and banks in the United States, the FBI started an investigation into 
the affair and also alerted the CBI in New Delhi that the international 
gang had developed some links in India too. 
 Manwani has since been enlarged on bail after interrogation by the 
CBI. But the city police believe that this is the beginning of the end of 
a major cyber crime.
CONCLUSION 
 “As internet technology advances so does the threat of cyber crime. In 
times like these we must protect ourselves from cyber crime. Anti-virus 
software, firewalls and security patches are just the beginning. 
Never open suspicious e-mails and only navigate to trusted sites. 
 Cyber laws essential feature in today’s world of internet 
 To reduce the damage to critical infrastructures 
 To protect the internet from being abused 
 Achieving global peace and harmony
Cyber crime in india
1 von 20

Recomendados

Cyber Crime and Security von
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
8.9K views25 Folien
Cyber crime von
Cyber crime Cyber crime
Cyber crime Jayant Raj
2.8K views40 Folien
Cyber crime in India PPT .pptx von
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptxTushar Bisen
3.2K views14 Folien
Cyber-crime PPT von
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPTAnshuman Tripathi
217.1K views19 Folien
introduction to cyber law and cyber crime von
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crimeAbhinav Tyagi
7.1K views17 Folien
Cyber crime against children von
Cyber crime against childrenCyber crime against children
Cyber crime against childrenAnchalanshri Dixit
9.3K views22 Folien

Más contenido relacionado

Was ist angesagt?

Cyber crime ppt von
Cyber crime pptCyber crime ppt
Cyber crime pptRitesh Thakur
1.4K views18 Folien
Cyber crime final report von
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
28.9K views11 Folien
Cyber crime von
Cyber  crimeCyber  crime
Cyber crimeJeet Swain
1.8K views15 Folien
Cyber Security in Society von
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
5.9K views23 Folien
Cyber crime ppt von
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
344.1K views30 Folien
Cyber crime ppt von
Cyber crime  pptCyber crime  ppt
Cyber crime pptJournalist Ish
8.2K views24 Folien

Was ist angesagt?(20)

Cyber crime von Jeet Swain
Cyber  crimeCyber  crime
Cyber crime
Jeet Swain1.8K views
Cyber Security in Society von Rubal Sagwal
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
Rubal Sagwal5.9K views
Cyber crime ppt von MOE515253
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253344.1K views
Cyber law In India: its need & importance von Aditya Shukla
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
Aditya Shukla83.7K views
Cyber crime and security ppt von Lipsita Behera
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera604.3K views
Cybercrime von Komal003
CybercrimeCybercrime
Cybercrime
Komal003823 views
Cyberlaw and Cybercrime von Pravir Karna
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
Pravir Karna21.2K views
Cyber crime- a case study von Shubh Thakkar
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
Shubh Thakkar1.2K views

Destacado

Information technology act 2000 von
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
187.3K views27 Folien
Cybercrime.ppt von
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
729K views20 Folien
Cyber law von
Cyber lawCyber law
Cyber lawArnab Roy Chowdhury
108.4K views31 Folien
Asis Verma cyber crime ppt von
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime pptAsish Verma
14.3K views27 Folien
Cyber laws in India von
Cyber laws in IndiaCyber laws in India
Cyber laws in Indiasaumi17
2.4K views23 Folien
Cyberlaw von
CyberlawCyberlaw
Cyberlawambadesuhas
4K views25 Folien

Destacado(20)

Information technology act 2000 von Akash Varaiya
Information technology act 2000Information technology act 2000
Information technology act 2000
Akash Varaiya187.3K views
Cybercrime.ppt von Aeman Khan
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan729K views
Asis Verma cyber crime ppt von Asish Verma
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime ppt
Asish Verma14.3K views
Cyber laws in India von saumi17
Cyber laws in IndiaCyber laws in India
Cyber laws in India
saumi172.4K views
Need And Importance Of Cyber Law von Poonam Bhasin
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
Poonam Bhasin135.6K views
Seminar on Cyber Crime von Likan Patra
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
Likan Patra79.3K views
Cyber Law von fariez91
Cyber  LawCyber  Law
Cyber Law
fariez9133.2K views
An Introduction to Cyber Law - I.T. Act 2000 (India) von Chetan Bharadwaj
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
Chetan Bharadwaj58K views
Privacy and social media for Australian governments von Craig Thomler
Privacy and social media for Australian governmentsPrivacy and social media for Australian governments
Privacy and social media for Australian governments
Craig Thomler1K views
In the Public Realm: Growing Privacy Concerns in Social Media von andreamstewart
In the Public Realm: Growing Privacy Concerns in Social MediaIn the Public Realm: Growing Privacy Concerns in Social Media
In the Public Realm: Growing Privacy Concerns in Social Media
andreamstewart354 views
Public/Private Social Media von For3, LLC
Public/Private Social Media Public/Private Social Media
Public/Private Social Media
For3, LLC454 views
State of Cyber Law in India von amiable_indian
State of Cyber Law in IndiaState of Cyber Law in India
State of Cyber Law in India
amiable_indian1.4K views
Rajveer choudhary cyber crime presentation von Rajveer Choudhary
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
Rajveer Choudhary983 views

Similar a Cyber crime in india

cyber law IT Act 2000 von
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000Yash Jain
1.4K views20 Folien
Cyber law11 von
Cyber law11Cyber law11
Cyber law11maradabudkinsantosh
367 views23 Folien
Presentation1 von
Presentation1Presentation1
Presentation1Shivangi Sharma
396 views19 Folien
Cyber law and ipc codes von
Cyber law and ipc codesCyber law and ipc codes
Cyber law and ipc codesRakesh Otari
670 views8 Folien
Cyber law assignment von
Cyber law assignmentCyber law assignment
Cyber law assignmentVarsha Mali
360 views8 Folien
Cyber law assignment von
Cyber law assignmentCyber law assignment
Cyber law assignmentRini Mahade
3.7K views8 Folien

Similar a Cyber crime in india(20)

cyber law IT Act 2000 von Yash Jain
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000
Yash Jain1.4K views
Cyber law and ipc codes von Rakesh Otari
Cyber law and ipc codesCyber law and ipc codes
Cyber law and ipc codes
Rakesh Otari670 views
Cyber law assignment von Varsha Mali
Cyber law assignmentCyber law assignment
Cyber law assignment
Varsha Mali360 views
Cyber law assignment von Rini Mahade
Cyber law assignmentCyber law assignment
Cyber law assignment
Rini Mahade3.7K views
Cyber law cases and sections(1) von santoshdkamat
Cyber law cases and sections(1)Cyber law cases and sections(1)
Cyber law cases and sections(1)
santoshdkamat310 views
Cyber assignment von sparun
Cyber assignmentCyber assignment
Cyber assignment
sparun333 views
Cyber law cases and sections (1) von Pruthvi Prince
Cyber law cases and sections (1)Cyber law cases and sections (1)
Cyber law cases and sections (1)
Pruthvi Prince239 views
Cyber law cases and sections (1) von Pruthvi Prince
Cyber law cases and sections (1)Cyber law cases and sections (1)
Cyber law cases and sections (1)
Pruthvi Prince264 views
Cyber law cases and sections (1) von Pruthvi Prince
Cyber law cases and sections (1)Cyber law cases and sections (1)
Cyber law cases and sections (1)
Pruthvi Prince302 views
Cyber law cases and sections von vijayjituri
Cyber law cases and sectionsCyber law cases and sections
Cyber law cases and sections
vijayjituri432 views
Cyber Crime(Hacking) - IT acts von Jayati Tiwari
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
Jayati Tiwari133 views

Último

"Surviving highload with Node.js", Andrii Shumada von
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada Fwdays
58 views29 Folien
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... von
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc
176 views29 Folien
Redefining the book supply chain: A glimpse into the future - Tech Forum 2023 von
Redefining the book supply chain: A glimpse into the future - Tech Forum 2023Redefining the book supply chain: A glimpse into the future - Tech Forum 2023
Redefining the book supply chain: A glimpse into the future - Tech Forum 2023BookNet Canada
44 views19 Folien
Generative AI: Shifting the AI Landscape von
Generative AI: Shifting the AI LandscapeGenerative AI: Shifting the AI Landscape
Generative AI: Shifting the AI LandscapeDeakin University
67 views55 Folien
The Power of Heat Decarbonisation Plans in the Built Environment von
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built EnvironmentIES VE
84 views20 Folien
Optimizing Communication to Optimize Human Behavior - LCBM von
Optimizing Communication to Optimize Human Behavior - LCBMOptimizing Communication to Optimize Human Behavior - LCBM
Optimizing Communication to Optimize Human Behavior - LCBMYaman Kumar
38 views49 Folien

Último(20)

"Surviving highload with Node.js", Andrii Shumada von Fwdays
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada
Fwdays58 views
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... von TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc176 views
Redefining the book supply chain: A glimpse into the future - Tech Forum 2023 von BookNet Canada
Redefining the book supply chain: A glimpse into the future - Tech Forum 2023Redefining the book supply chain: A glimpse into the future - Tech Forum 2023
Redefining the book supply chain: A glimpse into the future - Tech Forum 2023
BookNet Canada44 views
The Power of Heat Decarbonisation Plans in the Built Environment von IES VE
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built Environment
IES VE84 views
Optimizing Communication to Optimize Human Behavior - LCBM von Yaman Kumar
Optimizing Communication to Optimize Human Behavior - LCBMOptimizing Communication to Optimize Human Behavior - LCBM
Optimizing Communication to Optimize Human Behavior - LCBM
Yaman Kumar38 views
Digital Personal Data Protection (DPDP) Practical Approach For CISOs von Priyanka Aash
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash162 views
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R... von ShapeBlue
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
ShapeBlue178 views
"Node.js Development in 2024: trends and tools", Nikita Galkin von Fwdays
"Node.js Development in 2024: trends and tools", Nikita Galkin "Node.js Development in 2024: trends and tools", Nikita Galkin
"Node.js Development in 2024: trends and tools", Nikita Galkin
Fwdays33 views
Business Analyst Series 2023 - Week 4 Session 7 von DianaGray10
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7
DianaGray10146 views
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De... von Moses Kemibaro
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...
Moses Kemibaro35 views
Business Analyst Series 2023 - Week 4 Session 8 von DianaGray10
Business Analyst Series 2023 -  Week 4 Session 8Business Analyst Series 2023 -  Week 4 Session 8
Business Analyst Series 2023 - Week 4 Session 8
DianaGray10145 views
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ... von ShapeBlue
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
ShapeBlue120 views
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ... von ShapeBlue
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
ShapeBlue129 views
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... von ShapeBlue
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
ShapeBlue164 views
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit... von ShapeBlue
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
ShapeBlue162 views
Transcript: Redefining the book supply chain: A glimpse into the future - Tec... von BookNet Canada
Transcript: Redefining the book supply chain: A glimpse into the future - Tec...Transcript: Redefining the book supply chain: A glimpse into the future - Tec...
Transcript: Redefining the book supply chain: A glimpse into the future - Tec...
BookNet Canada41 views
Future of AR - Facebook Presentation von Rob McCarty
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentation
Rob McCarty65 views
Why and How CloudStack at weSystems - Stephan Bienek - weSystems von ShapeBlue
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystems
ShapeBlue247 views

Cyber crime in india

  • 1. A Presentation On “Cyber Crime Laws and Cases related to it in India.” Presented By: RAHUL VAGHELA ARPAN SHAH
  • 2. What is Cyber crime??? • Cyber crime is simply defined as crimes that are directly related to computers and using computers. • An increasing number of domestic and international criminal activities are using the Internet. Computers and other electronic devices can be tools to commit crime or are targeted by criminals. A personal computer connected to the Internet without protection may be infected with malicious software in under a minute.
  • 3. • Cybercrime has been used to describe a wide range of offences, including offences against computer data and systems (such as “hacking”), computer-related forgery and fraud (such as “phishing”), content offences and copyright offences (such as the dissemination of pirated content).  Cybercrime is one of the fastest-growing criminal activities on the planet. It covers a huge range of illegal activity including financial scams, computer hacking, virus attacks, stalking by e-mail and creating websites that promote racial hatred.
  • 4. Denial of service Malware Computer Viruses Transmission of indecent material Harassment (sexual, racial, religious etc.) Computer Vandalism Transmission of harmful programs Terrorize international Govt. Cracking into military maintained website 4
  • 5. WHO ARE CYBER CRIMINALS?  Kids (age group 9-16 etc.)  Organized hack activists  Disgruntled employees  Professional hackers (corporate espionage)
  • 6. Cyber Crime In India  The majority of cybercrimes are centered on fraud and Phishing,  India is the third-most targeted country for Phishing attacks after the US and the UK,  Social networks as well as ecommerce sites are major targets,  6.9 million bot-infected systems in 2010,  14,348 website defacements in 2010,  6,850 .in and 4,150 .com domains were defaced during 2011,  15,000 sites hacked in 2011,  India is the number 1 country in the world for generating spam.
  • 7. Why India? A rapidly growing online user base  121 Million Internet Users  65 Million Active Internet Users, up by 28% from 51 million.  50 Million users shop online on Ecommerce and Online Shopping Sites  46+ Million Social Network Users  346 million mobile users had subscribed to Data Packages.
  • 8. Cyber Laws in India Under The Information Technology Act, 2000 CHAPTER XI – OFFENCES – 66. Hacking with computer system. (1) Whoever with the Intent to cause or knowing that he is likely to cause Wrongful Loss or Damage to the public or any person Destroys or Deletes or Alters any Information Residing in a Computer Resource or diminishes its value or utility or affects it injuriously by any means, commits hack. (2) Whoever commits hacking shall be punished with imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both.
  • 9. Cyber Laws Cyber Law is the law governing cyber space. Cyber space is a very wide term and includes computers, networks, software, data storage devices (such as hard disks, USB disks etc), the Internet, websites, emails and even electronic devices such as cell phones, ATM machines etc.  Needs for Cyber Law  TACKLING CYBER CRIMES  Laws are necessary in all segments of society, and e-commerce.  All Internet users, including minors, need to be assured of their privacy and the safety of their personal information online.
  • 10. Case 1: ONLINE CREDIT CARD FRAUD ON E-BAY  e-bay.in is the most popular online shopping mall providing free online auctions for products like mobiles/cell phones, cameras, computers, etc.  Bhubaneswar: Rourkela police busted a racket involving an online fraud worth Rs 12.5 lakh.  Two persons, including alleged mastermind Debasis Pandit, a BCA student, were arrested and forwarded to the court of the subdivisional judicial magistrate, Rourkela the other arrested person is Rabi Narayan Sahu.  A case has been registered against the accused under Sections 420 and 34 of the Indian Penal Code and Section 66 of the IT Act and further investigation is on, he said.
  • 11.  Pandit allegedly hacked into the eBay India site and gathered the details of around 700 credit cardholders. He then made purchases by using their passwords.  The fraud came to the notice of eBay officials when it was detected that several purchases were made from Rourkela while the customers were based in cities such as Bangalore, Baroda and Jaipur and even London.  The company brought the matter to the notice of Rourkela police after some customers lodged complaints  Pandit used the address of Sahu for delivery of the purchased goods  The gang was involved in train, flight and hotel reservations.
  • 12. Case 2: ACCUSESD IN RS 400 MILLION SMS SCAM ARRESTED IN MUMBAI  Jayanand Nadar, 30, and Ramesh Gala, 26, were arrested late on Monday from a hotel in Mira Road in the western suburbs. Nadar, a first year college dropout, along with his brother Jayaraj had allegedly duped at least 50,000 people of Rs.400 million, said officials in the city police's Economic Offences Wing (EOW).  The two brothers along with Gala allegedly took help of SMS technology and launched the first-of-its-kind SMS fraud in India.  As part of the attractive scheme, the Nadar brothers messaged random numbers, asking people interested in 'earning Rs.10,000 per month' to contact them.
  • 13.  "Interested 'subscribers' were asked to deposit Rs.500 each. The conmen duo claimed to be working with a US-based company named Aropis Advertising Company, which wanted to market its client's products through SMS'," senior inspector A Thakur said.  The brothers are said to have told the subscribers that their American clients wanted to conduct a study about local response to their advertisement and were using SMS as it was the latest medium of communication.  "The brothers led an extravagant life. They would stay in top five star hotels, throw massive parties for investors and were also known faces in the city's Page-3 circuit," Thakur revealed.  Gala, who is believed to have looked after the accounts, and Jayanand have been remanded to police custody till March 5."
  • 14. Case 3: SONY.SAMBANDH.COM CASE  Sony India Private Ltd, which runs a website called www.sony-sambandh. com, targeting Non Resident Indians. The website enables NRIs to send Sony products to their friends and relatives in India after they pay for it online.  The company undertakes to deliver the products to the concerned recipients. In May 2002, someone logged onto the website under the identity of Barbara Campa and ordered a Sony Colour Television set and a cordless head phone.  At the time of delivery, the company took digital photographs showing the delivery being accepted by Arif Azim. The transaction closed at that, but after one and a half months the credit card agency informed the company that this was an unauthorized transaction as the real owner had denied having made the purchase.
  • 15.  The court, however, felt that as the accused was a young boy of 24 years and a first-time convict, a lenient view needed to be taken. The court therefore released the accused on probation for one year.  The judgment is of immense significance for the entire nation. Besides being the first conviction in a cybercrime matter, it has shown that the the Indian Penal Code can be effectively applied to certain categories of cyber crimes which are not covered under the Information Technology Act 2000. Secondly, a judgment of this sort sends out a clear message to all that the law cannot be taken for a ride.
  • 16. Case 4: Pune Citibank MphasiS Call Centre Fraud  The crime was obviously committed using "Unauthorized Access" to the "Electronic Account Space" of the customers. It is therefore firmly within the domain of "Cyber Crimes".  ITA-2000 is versatile enough to accommodate the aspects of crime not covered by ITA-2000 but covered by other statutes since any IPC offence committed with the use of "Electronic Documents" can be considered as a crime with the use of a "Written Documents". "Cheating", "Conspiracy", "Breach of Trust" etc are therefore applicable in the above case in addition to section in ITA-2000.  Under ITA-2000 the offence is recognized both under Section 66 and Section 43. Accordingly, the persons involved are liable for imprisonment and fine as well as a liability to pay damage to the victims to the maximum extent of Rs 1 crore per victim for which the "Adjudication Process" can be invoked.
  • 17. Case 5: India's First ATM Card Fraud  The Chennai City Police have busted an international gang involved in cyber crime, with the arrest of Deepak PremManwani (22), who was caught red-handed while breaking into an ATM in the city in June last, it is reliably learnt.  At the time of his detention, he had with him Rs 7.5 lakh knocked off from two ATMs in T Nagar and Abiramipuram in the city. Prior to that, he had walked away with Rs 50,000 from an ATM in Mumbai.  Manwani is an MBA drop-out from a Pune college and served as a marketing executive in a Chennai-based firm for some time. Interestingly, his audacious crime career started in an Internet cafe. While browsing the Net one day, he got attracted to a site which offered him assistance in breaking into the ATMs.
  • 18.  Believing that it was a genuine offer from the telecom company in question, several lakh subscribers logged on to the site to get back that little money, but in the process parted with their PINs.  Meanwhile, Manwani also managed to generate 30 plastic cards that contained necessary data to enable him to break into ATMS. He was so enterprising that he was able to sell away a few such cards to his contacts in Mumbai. The police are on the lookout for those persons too.  On receipt of large-scale complaints from the billed credit card users and banks in the United States, the FBI started an investigation into the affair and also alerted the CBI in New Delhi that the international gang had developed some links in India too.  Manwani has since been enlarged on bail after interrogation by the CBI. But the city police believe that this is the beginning of the end of a major cyber crime.
  • 19. CONCLUSION  “As internet technology advances so does the threat of cyber crime. In times like these we must protect ourselves from cyber crime. Anti-virus software, firewalls and security patches are just the beginning. Never open suspicious e-mails and only navigate to trusted sites.  Cyber laws essential feature in today’s world of internet  To reduce the damage to critical infrastructures  To protect the internet from being abused  Achieving global peace and harmony