National Conference of CIRC On Corporate Laws-: Cybercrimes and Legal Enforcement in India
National Conference of CIRC On Corporate Laws-: Cybercrimes and Legal Enforcement in India
National Conference of CIRC On Corporate Laws-: Cybercrimes and Legal Enforcement in India
Corporate laws-
Ghaziabad , 20th & 21st Dec 2008
Partner,
SETH ASSOCIATES
ADVOCATES AND LEGAL CONSULTANTS © copyrighted Seth Associates Dec 2008
Introduction to Cyber Crime
Cyber crimes
Web jacking
Denial of Trojan
Information E-mail Salami Service
Hacking attacks
Theft bombing attacks attacks
Types of Cyber crimes
Credit card frauds
Cyber pornography
Sale of illegal articles-narcotics, weapons, Crime against Government
wildlife
Online gambling
Intellectual Property crimes- software
piracy, copyright infringement, trademarks
violations, theft of computer source code Crime against property
Email spoofing
Forgery
Defamation
Cyber stalking (section 509 IPC)
Phising Crime against persons
Cyber terrorism
TYPES OF CYBER CRIMES
E-Mail bombing: Email bombing refers to sending a large amount of e-mails
to the victim resulting in interruption in the victims’ e-mail account or mail
servers.
Data diddling: This kind of an attack involves altering the raw data just before
it is processed by a computer and then changing it back after the processing
is completed.
Salami attacks: These attacks are used for the commission of financial
crimes. The key here is to make the alteration so insignificant that in a single
case it would go completely unnoticed e.g. A bank employee inserts a
program into bank’s servers, that deducts a small amount from the account of
every customer
Types of viruses
There are two main types of spam, and they have different effects on Internet
users.Cancellable Usenet spam is a single message sent to 20 or more Usenet
newsgroups. (Through long experience, Usenet users have found that any message
posted to so many newsgroups is often not relevant to most or all of them.) Usenet spam
is aimed at "lurkers", people who read newsgroups but rarely or never post and give their
address away. Usenet spam robs users of the utility of the newsgroups by overwhelming
them with a barrage of advertising or other irrelevant posts. Furthermore, Usenet spam
subverts the ability of system administrators and owners to manage the topics they accept
on their systems.
Email spam targets individual users with direct mail messages. Email spam lists are often
created by scanning Usenet postings, stealing Internet mailing lists, or searching the Web
for addresses. Email spams typically cost users money out-of-pocket to receive. Many
people - anyone with measured phone service - read or receive their mail while the meter
is running, so to speak. Spam costs them additional money. On top of that, it costs money
for ISPs and online services to transmit spam, and these costs are transmitted directly to
subscribers.
Frequency of incidents of Cyber
crimes in India
Denial of Service: Section 43
Virus: Section: 66, 43
Data Alteration: Sec. 66
U/A Access: Section 43
Email Abuse: Sec. 67,
500, Other IPC Sections
Data Theft: Sec 66, 65
• Punishment
– imprisonment up to three years, and / or
– fine up to Rs. 2 lakh
• Cognizable, Non Bailable,
Section 66 covers data theft aswell as data alteration
Sec. 67. Pornography
Ingredients
Publishing or transmitting or causing to be published
in the electronic form,
Obscene material
Punishment
On first conviction
imprisonment of either description up to five years and
On subsequent conviction
imprisonment of either description up to ten years and
Section covers
Internet Service Providers,
Search engines,
Pornographic websites
Cognizable, Non-Bailable, JMIC/ Court of Sessions
Computer Related Crimes under IPC and
Special Laws
The plaintiff was able to identify the defendant with the help of a
private computer expert and moved the Delhi High Court. The court
granted an ad-interim injunction and restrained the employee from
sending, publishing and transmitting e-mails, which are defamatory
or derogatory to the plaintiffs.
Online gambling: virtual casinos,
Cases of money laundering
Cyber lotto case: In Andhra Pradesh one Kola
Mohan created a website and an email address on the
Internet with the address 'eurolottery@usa.net.' which
shows his own name as beneficiary of 12.5 million
pound in Euro lottery. After getting confirmation with the
email address a telgu newspaper published this as news.
He gathered huge sums from the public as well as from
some banks. The fraud came to light only when a
cheque amounting Rs 1.73 million discounted by him
with Andhra bank got dishonored.
FIR NO 76/02 PS PARLIAMENT
STREET
Mrs. SONIA GANDHI RECEIVED THREATING
E-MAILS
E- MAIL FROM
missonrevenge84@khalsa.com
missionrevenge84@hotmail.com
THE CASE WAS REFERRED
ACCUSED PERSON LOST HIS PARENTS
DURING 1984 RIOTS
Cyber Crime Online Challenges
Brand exploitation
Domain Name
Graphical user interface (GUI) based tools that exploit known software
vulnerabilities.
Electronic World
Electronic document produced by a
computer. Stored in digital form, and
cannot be perceived without using a
computer
It can be deleted, modified and rewritten
without leaving a mark
Integrity of an electronic document is
“genetically” impossible to verify
A copy is indistinguishable from the original
It can’t be sealed in the traditional way,
where the author affixes his signature
The functions of identification, declaration,
proof of electronic documents carried out
using a digital signature based on
cryptography.
Electronic World
Digital signatures created and verified using
cryptography
Public key System based on Asymmetric keys
An algorithm generates two different and related keys
Public key
Private Key
Private key used to digitally sign.
Public key used to verify.
Public Key Infrastructure
Allow parties to have free access to the signer’s
public key
This assures that the public key corresponds to
the signer’s private key
Trust between parties as if they know one another
Parties with no trading partner agreements,
operating on open networks, need to have
highest level of trust in one another
Role of the Government
Email worms
Password Authentication protocol
Use strong encryption - in case they are trying to break it, make
it harder for them.
Use MAC filtering - you give keys to your home only to trusted people
- do the same with the wireless network.
Isolate the wireless LAN from the rest of the network - why did you
think Titanic sank? Create levels of protection.
Control the wireless signal - unless you want to power the whole city,
there is no need to use signal amplifiers.
SETH ASSOCIATES
ADVOCATES AND LEGAL CONSULTANTS