All You Need to Know About Cyber Crime and Law.

The police man with handcuffs to catch the thief on a computer screen, Abstract security protection digital data with thefts data,  data security concept, isolated flat vector illustration

Who are Cyber Criminals :

Cyber Criminals are individuals or a group who use various tools and techniques, gain control and access to victim’s electronic gadgets either directly or indirectly, and commit malicious activities with the intention of stealing sensitive company information or personal data, and get benefitted out of it.

Cybercriminals trade malicious goods and services i.e. sell hacking tools or buy stolen data, information available deep web. Police and Law enforcement agencies often face challenges when it comes to finding, arresting, charging, and proving cybercrimes.

Few Cyber Crime Techniques :

  • Social Engineering
  • Malware
  • Phishing
  • Spoofing / Impersonation
  • Spyware
  • Steganography
  • Virus
  • Worm
  • Zombie Attacks
  • Data Didling
  • Salami Attack
  • Rootkit
  • Sniffer
  • Ransomware

Cyber Crime and Law :

Dos or DDoS: An attack on an important service offered by a Website or a Server is denied or disrupted to cause loss to the intended users of the service. Applicable Under Section 66 of IT Act

Hacking: Gaining unauthorized access to a system with an intention to cause loss, steal, or destroy the data contained in it. Applicable Under Section 66 of IT Act

Spyware, Viruses, and Malware: Injecting and spreading malicious code also can come in the form of viruses, worms, trojans, spyware, adware, and rootkit, used for and transmit sensitive information. Applicable Under Section 66 or Section 66F of IT Act

Spamming: Sending unsolicited and junk e-mails or messages and causing annoyance or inconvenience leading to cybercrime. A Serious Problem leading to Social Engineering Crimes Not Applicable Under any Act

Website Destruction: Creating damage to the website like changing visual appearance and posting indecent and obscene messages or make it dysfunctional. Applicable Under Section 66 or Sec.66F IT Act

Skimming: Capturing Data of credit/debit/sim cards using a handheld device and perform fake transactions with the clones. Applicable Under Section 66C of IT Act

Cyber Terrorism: Creating disruption of computer networks and attack critical infrastructural facilities and they leave digital evidence letting us know they have taken control of the systems. Applicable Under Section 66F of IT Act

Pharming: A kind of cyber-attack intended to redirect a website’s traffic to another, fake site. Applicable Under Section 66C, 66D of ITA Act.

Financial Crimes: Innocent individuals are lured into a trap by the promise of false opportunities and deceived off their money and other valuables. Applicable Under Many Sections 66D and 420 of IPC

Data Alternations: The process of breaking into your IT system to access and alter your data and poses a threat to your environment. Applicable Under Section 66 of IT Act and 403,406,408,409 of IPC.

Identity Theft: Process of stealing sensitive identity information such as PAN numbers, passport numbers, credit card numbers, e-mail accounts, and other sensitive data for illegal purposes. Applicable Under Section 66C, 66D of IT Act and 420 of IPC

Intellectual property theft: Intellectual property theft involves robbing people or companies of their ideas, inventions, and creative expression. Applicable Under Section 66 of It Act and IPR laws.

Cyber Stalking & Cyberbullying: Making threats, sending provocative insults or racial or ethnic slurs, gay-bashing, etc. Though Stalking and bullying are not mentioned in the act they will be Applicable Under Section 67 of the IT Act as it leads to the display of obscenity and explicit content and sections 500,504,506,507,508,509 of IPC.

Pornography: Publishing or transmitting obscene messages, photographs, videos, and text through e-mail, Web sites, chatting, and other forms over the Internet… Applicable Under Section 66E, 67, and 67 B of IT Act, Section 292 IPC, and for child pornography we have the POCSO Act.

Filing a complaint on Cyber Crime :

A victim can always approach the Local Police station and also file a complaint online by going to the website www.cybercrime.gov.in

Advancement in technology has led to an increase in cybercrime cases, due to the high rate of cases being reported, MHA has created a new unit i.e. “I4C” and as part of the campaign, Telangana Police Department has established Cyber Crime Support Centres in almost all civil police stations and here is what you must keep ready while lodging a cybercrime complaint.

In all the cybercrime cases the mandatory ones to be kept ready are as below

  • Explanation of the issue or offence
  • Contents to be kept ready in both soft and hard copies
  • Copy of your ID proof and address proof of the complainant

Social Engineering Frauds: OTP, Know Your Customer, eCommerce, Lottery Frauds, Marriage, Job, Dating and Fake Customer Support

  • Detailed Bank Statement of the Victim
  • Screen Shot of SMS / Links / Email with Complete Header Details
  • Copy of the Call Details / Call Recordings

Social Media Frauds: Cyber Bullying and Cyber Stalking

  • Screenshot of Contents/ Profile
  • Screenshot of Page URL and Page ID
  • Screenshots of the postings done on other websites
  • Screenshots of Messages / Call Details/ Call Recordings/ Email with Complete Header Details, Where threatening or blackmailing happened

Data Theft:

  • Copy of Data / Copyright Certificate Etc which has was stolen
  • Suspects Information, If an Employee provide all HR Records including Customer Contacts
  • Screenshots of Proof of selling off your copyright data
  • Devices used by the suspect

Ransomware:

  • Email ID / Contact Details or any other means of communication through which ransom has been demanded
  • Screenshots of the suspected Email with full header details

Bitcoin

  • Address / Amount of Bitcoin Involved
  • Address from/to whom purchase/sale of Bitcoins is done.

Share on facebook
Facebook
Share on telegram
Telegram
Share on whatsapp
WhatsApp
Share on twitter
Twitter
Share on linkedin
LinkedIn
Share on facebook
Share on telegram
Share on whatsapp
Share on twitter
Share on linkedin

Leave a Reply

Your email address will not be published. Required fields are marked *