Report Cyber Crime

Click here to Report Cyber Crime

Cyber Crime refers to all activities done with criminal intent in cyberspace. These fall into three slots. 

  • Those against persons
  • Against Business and Non-business organizations
  • Crime targeting the government

Cyber crime activity usually involves a modification of a conventional crime by using computer.  Some examples are;

Cyber Defamation:

This occurs when defamation takes place with the help of computers and or the Internet e.g. someone published defamatory matter about someone on a websites or sends e-mail containing defamatory information to all of that person’s friends.

E-Mail spoofing:

A spoofed email is one that appears to originate from one source but actually has been sent from another source.  This can also be termed as E-Mail forging. 

Financial Claims:

This would include cheating, credit card frauds, money laundering etc. 

Cyber Pornography:

This would include pornographic websites; pornographic magazines produced using computer and the Internet (to down load and transmit pornographic pictures, photos, writings etc.) 

Sale of illegal articles:

This would include sale of narcotics, weapons and wildlife etc., by posting information on websites, bulletin boards or simply by using e-mail communications. 

Online gambling:

There are millions of websites; all hosted on servers abroad, that offer online gambling. In fact, it is believed that many of these websites are actually fronts for money laundering. 

Intellectual Property Crimes:

These include software piracy, copyright infringement, trademarks violations etc. 

Forgery:

Counterfeit currency notes, postage and revenue stamps, ma r k sheets etc., can be forged using sophisticated computers, printers and scanners. 

Cyber Stalking:

Cyber stalking involves following a person’s movements across the Internet by posting messages on the bulletin boards frequented by the victim, entering the chat-room s frequented by the victim.   

Let us examine some of the acts wherein the computer or computer Network is the target for an unlawful act. It may be noted that in these activities the computer ma y also be a tool. This kind of activity is usually out of the purview of conventional criminal law.  Some examples are:  

Unauthorized access to computer system or network:

This activity is commonly referred to as hacking.  The Indian Law has however given a different connotation to the term hacking. 

Theft of information contained in electronic from:

This includes information stored in computer hard disks, removable storage media etc.   

E-Mail bombing:

Email bombing refers to sending a large amount of e-m ails to the victim resulting in the victims’ e-mail account or mail servers.     

Data diddling:

This kind of an attack involves altering the raw data just before it is processed by a computer and then changing it back after the processing is completed.   

Salami attacks:

Those attacks are used for the commission of financial crimes.  The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed e.g.  A bank employee inserts a program into bank’s servers that deducts a small amount from the account of every customer. 

Denial of Service:

This involves flooding computer resources with more requests than it can handle.  This causes the resources to crash thereby denying authorized users the service offered by the resources.

Virus/worm:

Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. They usually affect the data o n a computer, either by altering or deleting it. Worms, unlike viruses don not need the host to attach themselves to.  

Logic bombs:

These are dependent programs.   This implies that these program s are created to do something only when a certain event occurs, e.g. some viruses may be termed logic bombs because they lie dorm ant all through the year and become active only on a particular date. 

Trojan horse:

A Trojan as this program is aptly called is an unauthorized program which functions from inside what seem s to be an authorized program, thereby concealing what it is actually doing.  

Internet Time Theft:

This connotes the usage by unauthorized persons of the Internet hours paid for by another person.   

Physically damaging a computer system:

This crime is committed by physically damaging a computer or its peripherals