Académique Documents
Professionnel Documents
Culture Documents
|
|
||'.
|
||'.
! "##$
ß
|
,
|
|
,
|
,, %
|
%
|
or
|
is where
a computer is the target of
a crime or is the means
adopted to commit a crime.
ß -ost of these crimes are
not new. Criminals simply
devise different ways to
undertake standard criminal
activities such as fraud
fraud,,
theft,, blackmail
theft blackmail,, forgery
forgery,,
and embezzlement using
the new medium, often
involving the Internet
|
&
ß |
ß Ease of access
ß Complexity of technology
ß Human error
ß One of the key elements that keeps most members of any society
honest is fear of being caught Ɯ the deterrence factor. Cyberspace
changes two of those rules. First, it offers the criminal an opportunity
of attacking his victims from the remoteness of a different continent
and secondly, the results of the crime are not immediately apparent.
ß Need new laws and upgraded technology to combat cyber crimes
|
ß Credit card frauds
ß Cyber pornography
ß Sale of illegal articles-
articles-narcotics, |
weapons, wildlife
ß Online gambling
ß Intellectual Property crimes-
crimes-
software piracy, copyright
infringement, trademarks
violations, theft of computer |
source code
ß Email spoofing
ß Forgery
ß Defamation
ß Cyber stalking (section 509 |
IPC)
ß Phising
ß Cyber terrorism
|
'
ß '
ß A computer virus is a
computer program that (
can infect other
computer programs by
modifying them in such
a way as to include a
(possibly evolved) copy
of it. Note that a
program does not have
to perform outright
damage (such as
deleting or corrupting
files) in order to be
called a "virus".
|
!
|
ß Technological measures-
measures-
Public key cryptography,
Digital signatures ,Firewalls,
honey pots
ß Cyber investigation-
investigation-
Computer forensics is the
process of identifying,
preserving, analyzing and
presenting digital evidence in
a manner that is legally
acceptable in courts of law.
ß These rules of evidence
include admissibility (in
courts), authenticity (relation
to incident), completeness,
reliability and believability.
ß Legal framework-
framework-laws &
enforcement
&
ß representatives from the 26 ß -ain objectives-
objectives-
Council of Europe members, the
United States,
States, Canada
Canada,, Japan and ß Create effective cyber crime
South Africa in 2001 signed a laws
convention on cybercrime in efforts
to enhance international ß Handle jurisdiction issues
cooperation in combating
computer--based crimes.
computer ß Cooperate in international
investigations
The Convention on Cybercrime,
Cybercrime,
drawn up by experts of the Council ß Develop acceptable
of Europe, is designed to practices for search and
coordinate these countries' policies
and laws on penalties on crimes in seizure
cyberspace, define the formula
guaranteeing the efficient ß Establish effective
operation of the criminal and public/private sector
judicial authorities, and establish interaction
an efficient mechanism for
international cooperation.
ß In 1997, The G-8 -inisters agreed
to ten "Principles to Combat High-
High-
Tech Crime" and an "Action Plan to
High-Tech Crime."
Combat High-
Frequency of incidents of Cyber crimes in India
1
No. of Indian web-sites defaced
8000
7039
7000
6000
5000
4000
3000 2219
2000
1002
1000 441
0
1998 1999 2000 2001
Ö.
Number of Indian sites hacked
ÖÖ
r r
Ö
2001 C4I/FBI Computer Crime and 4ecurity 4urvey
Ö&
È
(
)
ß Cyber crime is now a bigger threat to India Inc than
physical crime. In a recent survey by IB-, a greater
number of companies (44%) listed cyber crime as a
bigger threat to their profitability than physical
crime (31%).
Ö
4
0-.01
ß Ingredients
ƛ Publishing or transmitting or causing to be published
ƛ in the electronic form,
ƛ Obscene material
ß Punishment
ƛ On first conviction
ß imprisonment of either description up to five years and
ß fine up to rs. 1 lakh
ƛ On subsequent conviction
ß imprisonment of either description up to ten years and
ß fine up to rs. 2 lakh
ß Section covers
ƛ Internet Service Providers,
ƛ Search engines,
ƛ Pornographic websites
ß Cognizable, Non-
Non-Bailable, J-IC/ Court of Sessions
4
-2/
ß Ingredients
ƛ Controller issues order to Government agency to
intercept any information transmitted through any
computer resource.
ƛ Order is issued in the interest of the
ß sovereignty or integrity of India,
ß the security of the State,
ß friendly relations with foreign States,
ß public order or
ß preventing incitement for commission of a cognizable
offence
ƛ Person in charge of the computer resource fails to
extend all facilities and technical assistance to
decrypt the information-
information-punishment upto 7 years.
4
.#1
4
ß Ingredients
ƛ Securing unauthorised access or attempting to
secure unauthorised access
ƛ to Ɲprotected systemƞ
ß Acts covered by this section:
ƛ Switching computer on / off
ƛ Using installed software / hardware
ƛ Installing software / hardware
ƛ Port scanning
ß Punishment
ƛ Imprisonment up to 10 years and fine
ß Cognizable, Non-
Non-Bailable, Court of Sessions
|
&
ß Sending pornographic or obscene emails are punishable under Section 67 of the IT Act.
ß An offence under this section is punishable on first conviction with imprisonment for a
term, which may extend to five years and with fine, which may extend to One lakh
rupees.
ß Emails that are defamatory in nature are punishable under Section 500 of the Indian
Penal Code (IPC), which recommends an imprisonment of upto two years or a fine or
both.
ß Threatening emails are punishable under the provisions of the IPC pertaining to criminal
intimidation, insult and annoyance (Chapter XXII), extortion (Chapter XVII)
ß
Email spoofing is covered under provisions of the IPC relating to
fraud, cheating by personation (Chapter XVII), forgery (Chapter XVIII)
Computer Related Crimes under IPC
and 4pecial Laws
4ending threatening messages by email 4ec 503 IPC
'
Cognizability and Bailability
Not mentioned in the Act
Rely on Part II of 4chedule I of CrPC
If punishable with death, imprisonment for life or
imprisonment for more than 7 years: Cognizable,
Non-Bailable, Court of 4ession
If punishable with imprisonment for 3 years and
upwards but not more than 7 years: Cognizable, Non -
Bailable, Magistrate of First Class
If punishable with imprisonment of less than 3 years:
Non-Cognizable, Bailable, Any Magistrate (or
Controller of CAs)
,
1
1
&
ß 8
0469+:+9%|'%+9:
8
0469+:+9%|'%+9:
8+4
ß 8+;68
ƛ
&
$,<*
0
ƛ
&
$,< 0
ß %|+4È+4;
ß +||=4146964%41+94=9:
>2$,64
&-
+4=4&
8"##?
8"##?
|
ß Non reporting-
reporting-causes
*3#*/4
ß 60% feared negative
#||Ö15 publicity
ß 23% did not know
6#$#*Ö5
police equipped to
handle cyber crimes
ß 9% feared further
cyber attacks
##&&5
ß 8% had no awareness
of cyber laws
ß False arrest concerns
5
&
ß -umbai Cyber lab is a joint initiative of -umbai police and
NASSCO- ƛmore exchange and coordination of this kind
ß Suggested amendments to the IT Act,2000-
Act,2000-new provisions for
child pornography, etc
ß -ore Public awareness campaigns
ß Training of police officers to effectively combat cyber crimes
ß -ore Cyber crime police cells set up across the country
ß Effective E-
E-surveillance
ß Websites aid in creating awareness and encouraging reporting
of cyber crime cases.
ß Specialised Training of forensic investigators and experts
ß Active coordination between police and other law enforcement
agencies and authorities is required.
ß In case you have any queries Ʀplease feel free to write in at
Karnika@sethassociates.com
4%+446|+4
ADVOCATES AND LEGAL CONSULTANTS
6
:: C-
6
C-1/16, Daryaganj, New Delhi-
Delhi-110002,
India
Tel:+91 (11) 55352272, +91 9868119137
6
: B-
|
6
: B-10, Sector 40, NOIDA-
NOIDA-201301, N.C.r,
India
Tel: +91 (120) 4352846, +91 9810155766
Fax: +91 (120) 4331304
E-mail: mail@sethassociates.com www.sethassociates.com