All you need to know about cybercrime, law

All you need to know about cybercrime, law

All you need to know about cybercrime, law :

  • Cyber Criminals are individuals or a group who use various tools and techniques, gain control and access to victims electronic gadgets either directly or indirectly, and commit malicious activities with the intention of stealing sensitive company information or personal data, and get benefitted out of it.
  • Cybercriminals trade malicious goods and services i.e. sell hacking tools or buy stolen data, information available deep web. Police and Law enforcement agencies often face challenges when it comes to finding, arresting, charging, and proving cybercrime's.

Few Cyber Crime Techniques :

  • Social Engineering
  • Malware
  • Phishing
  • Spoofing / Impersonation
  • Spyware
  • Steganography
  • Virus
  • Worm
  • Zombie Attacks
  • Data Didling
  • Salami Attack
  • Rootkit
  • Sniffer
  • Ransomware

Cyber Crime and Law :

  • Dos or DDoS: An attack on an important service offered by a Website or a Server is denied or disrupted to cause loss to the intended users of the service. Applicable Under Section 66 of IT Act
  • Hacking: Gaining unauthorised access to a system with an intention to cause loss, steal, or destroy the data contained in it. Applicable Under Section 66 of IT Act
  • Spyware, Viruses, and Malware: Injecting and spreading malicious code also can come in the form of viruses, worms, trojans, spyware, adware, and rootkit's, used for and transmit sensitive information. Applicable Under Section 66 or Section 66F of IT Act
  • Spamming: Sending unsolicited and junk e-mails or messages and causing annoyance or inconvenience leading to cybercrime. A Serious Problem leading to Social Engineering Crimes Not Applicable Under any Act
  • Website Destruction: Creating damage to the website like changing visual appearance and posting indecent and obscene messages or make it dysfunctional. Applicable Under Section 66 or Sec.66F IT Act
  • Skimming: Capturing Data of credit/debit/sim cards using a handheld device and perform fake transactions with the clones. Applicable Under Section 66C of IT Act
  • Cyber Terrorism: Creating disruption of computer networks and attack critical infrastructural facilities and they leave a digital evidence letting us know they have taken control of the systems. Applicable Under Section 66F of IT Act
  • Pharming: A kind of cyber-attack intended to redirect a website's traffic to another, fake site. Applicable Under Section 66C, 66D of ITA Act.
  • Financial Crimes: Innocent individuals are lured into a trap by the promise of false opportunities and deceived off their money and other valuables. Applicable Under Many Sections 66D and 420 of IPC
  • Data Alternations: The process of breaking into your IT system to access and alter your data and poses a threat to your environment. Applicable Under Section 66 of IT Act and 403,406,408,409 of IPC.
  • Identity Theft: Process of stealing sensitive identity information such as PAN numbers, passport numbers, credit card numbers, e-mail accounts, and other sensitive data for illegal purposes. Applicable Under Section 66C, 66D of IT Act and 420 of IPC
  • Intellectual property theft: Intellectual property theft involves robbing people or companies of their ideas, inventions, and creative expression. Applicable Under Section 66 of It Act and IPR laws.
  • Cyber Stalking & Cyberbullying: Making threats, sending provocative insults or racial or ethnic slurs, gay-bashing, etc. Though Stalking and bullying is not mentioned on the act it will be Applicable Under Section 67 of IT Act as it leads to display of obscenity and explicit content and sections 500,504,506,507,508,509 of IPC.
  • Pornography: Publishing or transmitting obscene messages, photographs, videos, and text through e-mail, Web sites, chatting, and other forms over the Internet.. Applicable Under Section 66E, 67 and 67 B of IT Act, Section 292 IPC and for child pornography we have POCSO Act.

Filing a complaint on Cyber Crime :

  • A victim can always approach the Local Police station and also file a complaint online by going to the website www.cybercrime.gov.in
  • Advancement in technology has led to increase in cybercrime cases, due to high rate of cases being reported, MHA has created a new unit i.e. “I4C” and part of the campaign Telangana Police Department has established a Cyber Crime Support Centres in almost all civil police stations and here is what you must keep ready while lodging a cybercrime complaint,
  • In all the cybercrime cases the mandatory ones to be kept ready are as below
    Explanation of the issue or offence
    Contents to be kept ready in both soft and hard copies
    Copy of your ID proof and address proof of the complainant

Social Engineering Frauds :

    OTP, Know Your Customer, eCommerce, Lottery Frauds, Marriage, Job, Dating and Fake Customer Support

  • Detailed Bank Statement of the Victim
  • Screen Shot of SMS / Links / Email with Complete Header Details
  • Copy of the Call Details / Call Recordings

Social Media Frauds :

    Cyber Bullying and Cyber Stalking

  • Screenshot of Contents/ Profile
  • Screenshot of Page URL and Page ID
  • Screenshots of the postings done on other websites
  • Screenshots of Messages / Call Details/ Call Recordings/ Email with Complete Header Details, Where threatening or blackmailing happened

Data Theft :

  • Copy of Data / Copyright Certificate Etc which has was stolen
  • Suspects Information, If an Employee provide all HR Records including Customer Contacts
  • Screenshots of Proof of selling off your copyright data
  • Devices used by the suspect

Ransomware :

  • Email ID / Contact Details or any other means of communication through which ransom has been demanded
  • Screenshots of the suspected Email with full header details

Bitcoin :

  • Address / Amount of Bitcoin Involved
  • Address from/to whom purchase/sale of Bitcoins is done.

Reach us at: support@endnowfoundation.org