CS Unit 3
CS Unit 3
Cybercrime Overview
Cybercrime is the largest illegal industry worldwide, involving various forms of digital attacks, frauds,
and unauthorized activities. It consists of highly coordinated attacks targeting a nation's information
infrastructure.
The Information Technology Act (ITA) 2000 and its subsequent modification in ITA 2008 provide the
legal framework for addressing cybercrime in India. Initially introduced as the IT Bill, the amendments in
ITA 2008 strengthened legal provisions to tackle cyber threats.
Cybersecurity Perspective
Cybersecurity is the practice of protecting systems, networks, and data from cyber threats.
Strict Regulations in the EU: European Union (EU) member countries enforce stringent laws for
data and privacy protection, ensuring individuals' rights against cyber threats.
Intrusion Detection Systems (IDS): These are critical tools in cybersecurity, used to monitor
networks for malicious activities or security violations.
Categories of Cybercrime
1. Cybercrime in a restrictive sense – Specific activities such as hacking, phishing, and malware
attacks.
2. Cybercrime in a general sense – Any criminal act involving a computer or network, including
financial fraud, identity theft, and data breaches.
Hacking: Gaining unauthorized access to a computer system by bypassing security controls (e.g.,
passwords, firewalls).
Cracking: Hacking with the intent of committing a crime within the computer system.
1. First-Degree Access
2. Second-Degree Access
3. Third-Degree Access
4. Fourth-Degree Access
The first-degree access is the most serious crime, leading to severe legal penalties.
Phishing is a type of cybercrime where attackers deceive individuals into revealing sensitive
information. Different forms include:
John Podesta Phishing (2016) – Attackers accessed emails from Hillary Clinton’s campaign.
Target Corporation Data Breach (2013) – Began with phishing emails sent to contractors, leading
to a massive breach.
Google & Facebook Scam (2013-2015) – Attackers impersonated suppliers and stole over $100
million.
Phishing Methods
1. Dragnet – Mass emails impersonating companies with fake logos and links.
2. Rod-and-Reel – Personalized phishing targeting individuals for financial data.
3. Lobsterpot – Spoofed websites that mimic legitimate ones.
4. Gillnet – Injecting malicious code into websites or emails.
1. Deceptive phishing
2. Malware-based phishing
3. Keyloggers
4. Session hijacking
5. In-session phishing
6. Web Trojans
7. Pharming
Mishing
Vishing
1. Identity theft
2. Purchasing goods using stolen information
3. Transferring money illegally
4. Monitoring victim’s bank accounts
1. United States
The Computer Fraud and Abuse Act (CFAA) criminalizes unauthorized computer access.
The Electronic Communications Privacy Act (ECPA) protects online privacy.
2. Canada
The Personal Information Protection and Electronic Documents Act (PIPEDA) regulates
data protection.
The Criminal Code of Canada includes cybercrime offenses like hacking, identity theft, and
online fraud.
3. Europe
The General Data Protection Regulation (GDPR) enforces strict privacy laws.
Cybercrimes are addressed under the Convention on Cybercrime (Budapest Convention).
4. Asia-Pacific
India: Information Technology Act, 2000 & 2008 for cybercrime penalties.
China: Cybersecurity Law (2017) restricts data storage and cross-border data transfers.
Japan: Act on Prohibition of Unauthorized Computer Access protects against hacking.
5. Africa
The African Union Convention on Cyber Security and Data Protection provides a legal
framework for cybersecurity across the continent.
Conclusion
Cybercrime is a growing global threat, requiring strong legal frameworks and cybersecurity measures.
Governments worldwide have established laws to combat cybercrimes, but criminals continue to
develop new tactics. Stringent legal enforcement, advanced cybersecurity practices, and increased
public awareness are essential to prevent cyber threats and protect digital assets.
Limitations: The Act did not initially focus much on data privacy, cyber terrorism, and identity
theft, which led to later amendments in 2008.
Secure Electronic Records & Defines security standards for electronic records
5
Secure Digital Signatures and digital signatures.
Applies to the whole of India and offenses committed outside India if they involve Indian systems.
Certifying Authorities (CAs) must obtain licenses to issue digital signature certificates.
Cybercrimes and penalties are defined.
Police and enforcement authorities are given powers to investigate and take action against
cybercriminals.
Penalty:
The IT Act was amended in 2008 to address growing cyber threats and new technologies. Key
amendments include:
1. Stronger data protection laws
Section 43A: Companies handling personal data must ensure its security.
Section 66C & 66D target fraud involving personal identity misuse.
Platforms like Google, Facebook, and ISPs are not responsible for user actions if they follow
due diligence.
✅ What Works
Legal recognition of digital contracts and e-signatures.
Provides intermediary liability protection for platforms like social media companies.
8. Conclusion
The IT Act, 2000, along with its 2008 amendments, is India's primary cybersecurity law, ensuring legal
recognition of electronic transactions and protection against cybercrimes. However, with evolving
cyber threats, the Act still needs further modifications, especially regarding data privacy and AI-
based cyber threats. The upcoming Digital Personal Data Protection Act (DPDP Act) aims to fill
some gaps left by the IT Act.
This information provides a comprehensive analysis of the Indian Information Technology Act, 2000
(ITA 2000), its positive aspects, limitations, and amendments made in 2008. Below is a detailed
breakdown of the key points mentioned:
Positive Aspects of the ITA 2000
Despite its criticisms, the ITA 2000 introduced significant legal recognition for electronic transactions
and cybersecurity measures. Some of its key benefits include:
Before ITA 2000, emails and other electronic records were not considered valid legal evidence
in Indian courts.
ITA 2000 recognized electronic documents and digital signatures, allowing them to be used
in legal proceedings.
Before ITA 2000, there was no legal framework to regulate online transactions, which
hindered e-commerce growth.
With ITA 2000, businesses could now legally conduct transactions online, promoting digital
commerce.
The law granted legal validity to digital signatures, enabling secure authentication of
electronic transactions.
Before ITA 2000, there were no specific laws to deal with hacking, data breaches, or online
fraud.
ITA 2000 introduced legal provisions to seek monetary compensation (up to ₹10,000,000) for
damages caused by cybercrimes.
ITA 2000 defined various cybercrimes, such as hacking, data theft, and identity fraud,
providing legal redress for businesses and individuals.
1. Jurisdictional Conflicts
E-commerce and cybercrimes often involve multiple countries. ITA 2000 does not address
jurisdictional disputes, leading to enforcement challenges.
The Act does not define domain names or the rights and responsibilities of domain owners,
creating gaps in cyber law.
3. Intellectual Property Rights (IPR) Issues
ITA 2000 does not protect online copyrights, trademarks, or patents, leading to loopholes in
digital content protection.
ITA 2000 defines cyber offenses narrowly, making it seem as though the listed offenses are the
only ones punishable.
Many modern cybercrimes like cyberstalking, phishing, and identity theft were not initially
covered.
ITA 2000 does not clearly define privacy rights for individuals.
It does not regulate electronic payments, content regulation, or data protection.
Law enforcement and judiciary officials were not well-trained in handling cybercrime cases.
Internet penetration in India was still low, limiting the impact of the law.
To address some of these limitations, the Information Technology (Amendment) Act, 2008
introduced key updates:
The amendment allowed the government to declare any system as a "protected system"
and define security protocols for it.
The central government can now intercept, monitor, and decrypt any system or network
for national security.
ITA 2008 explicitly covered phishing, identity theft, online scams, and child pornography.
Sections 43A and 72A introduced data protection provisions for handling personal
information.
ITA 2008 introduced stricter cyber terrorism laws, making hacking into government systems a
serious offense.
Section 67C required intermediaries (such as social media platforms and ISPs) to store user
data for a period specified by the government.
Or both
The authority for cybercrime investigations was lowered from Deputy Superintendent of Police
(DSP) to Inspectors, making it easier to file cybercrime complaints.
Companies and their directors are held liable for data breaches and cyber offenses committed
by the organization.
Online platforms, ISPs, and other intermediaries must store and retain user data for a specified
duration as per government guidelines.
The Act does not provide a clear framework for individuals to protect their personal data.
While digital signatures were recognized, electronic payments and online contract validity
were not properly defined.
The law does not differentiate between ethical hacking and malicious hacking, leading to
legal ambiguities.
The IT Act does not regulate monopolies or unfair trade practices in the digital space.
Conclusion
While ITA 2000 and its 2008 amendment provided a strong foundation for India's cyber laws, it still
has gaps in privacy protection, jurisdictional clarity, and enforcement mechanisms. There is an
increasing need for stricter data privacy laws, better IP protection, and more comprehensive
cybercrime regulations.
Cyber Laws and Legal & Ethical Aspects Related to New Technologies
With the rapid evolution of technologies like Artificial Intelligence (AI), Machine Learning (ML), Internet
of Things (IoT), Blockchain, Darknet, and Social Media, legal and ethical concerns have emerged
regarding their use. These concerns revolve around privacy, security, accountability, and regulation.
This document explores various cyber law cases and legal and ethical issues in emerging technologies.
Incident:
Two school students recorded a pornographic clip on their mobile phone and shared it via MMS.
An IIT student received the clip and posted it for auction on Baazee.com (now eBay India).
The Delhi Cyber Crime Cell arrested:
The case invoked Section 67 of the IT Act, 2000 for “Publishing obscene material in electronic
form.”
Conclusion:
This case highlighted the liability of online platforms for user-generated content.
It raised questions on intermediary liability, where platforms might be held accountable for third-
party content.
It emphasized the importance of content moderation and surveillance mechanisms on e-
commerce websites.
The police arrested the owners of the cyber cafés, as their internet services were used to commit
the crimes.
Sections 65 (Tampering with computer source documents) and 66 (Hacking with computer
systems) of the IT Act, 2000 were invoked.
Conclusion:
This case underlined the responsibility of internet service providers and cybercafé owners.
It led to the requirement of maintaining user logs and CCTV surveillance in cybercafés.
It stressed the need for digital literacy and cybersecurity measures to prevent such incidents.
Legal Aspects:
Who owns the AI-generated content? Can AI hold copyright, or is it attributed to the creator or
the user?
If AI causes harm (e.g., an autonomous car accident), who is responsible—the developer, user,
or manufacturer?
AI relies on massive datasets, often including personal data, raising concerns about GDPR
(EU) and CCPA (California) compliance.
AI in Criminal Justice:
Predictive policing and AI-based sentencing can perpetuate bias, leading to unfair judgments.
Ethical Aspects:
Bias in AI:
AI replacing human jobs raises concerns about employment and decision-making ethics.
Case Study: Google’s Dragonfly Project
Google’s Dragonfly Project aimed to develop a censored search engine for China.
It sparked ethical concerns about human rights violations and the role of corporations in
censorship.
Legal Aspects:
IoT devices collect vast data and are vulnerable to hacking (e.g., home assistants, smart cars).
Data Ownership:
Regulatory Compliance:
IoT must comply with GDPR (privacy laws) and HIPAA (healthcare security).
Ethical Aspects:
IoT devices, like smart assistants, constantly monitor users, raising privacy concerns.
Data Utilization:
IoT-generated data should not be misused for targeted ads or tracking without consent.
Hackers remotely took control of a Jeep Cherokee using vulnerabilities in its IoT systems.
It highlighted security risks in connected devices and the legal responsibilities of
manufacturers.
3. Blockchain Technology
Legal Aspects:
Cryptocurrency Regulation:
Cryptos like Bitcoin pose challenges for tax laws, money laundering, and financial fraud.
Smart Contracts:
Ethical Aspects:
Environmental Impact:
Cryptocurrency mining consumes high energy, impacting the environment.
In 2014, 850,000 Bitcoins ($450 million) were stolen from Mt. Gox.
This case highlighted the security vulnerabilities of cryptocurrency exchanges.
Legal Aspects:
Illicit Activities:
The Darknet facilitates drug trafficking, arms sales, and stolen data markets.
Anonymity on the Darknet protects activists in oppressive regimes, but also shields
criminals.
Ethical Aspects:
Responsibility of Platforms:
Legal Aspects:
Content Moderation:
Social media platforms struggle with hate speech, fake news, and cyberbullying.
Data Privacy:
User data misuse (e.g., Cambridge Analytica) can violate privacy laws.
Strictest privacy law, enforcing data protection, informed consent, and right to deletion.
United States:
No single federal law; instead, laws like HIPAA (healthcare data) and CCPA (California
privacy law).
China:
Strict cybersecurity laws with heavy state surveillance and content regulation.
Conclusion
The rapid development of new technologies presents both opportunities and risks. Governments,
corporations, and users must work together to create a balanced legal and ethical framework that
promotes
PRIVACY LAWS ACCROSS DIFFERENT CONTRIES STUDY FROM PPT ITSELF , ITS AT LAST