Cyber Crime Presentattion
Cyber Crime Presentattion
ACKNOWLEDGEMENT
I have put my sincere efforts in this project. However, it would not have been possible
without the kind of support and help of many individuals. I would like to extend my sincere
thanks to all of them.
I am highly indebted to Dr. Amita Verma for their guidance and constant supervision as well
as for providing necessary information regarding the project, also for your support in
completing this project.
I would also like to express my gratitude towards my parents, my friends and my classmates
for their kind co-operation and encouragement which helped me in completion of this project.
My thanks and appreciations to all the department library staff for their constant cooperation.
KAMYA CHANDOK.
3
TABLE OF CONTENTS
⮚ HISTORY 06
⮚ MEANING 07
⮚ RELEVANT ;EGISLATIONS 14
⮚ CONCLUSION 19
⮚ BIBLIOGRAPHY 20
4
INTRODUCTION
People, for their normal business need to communicate to one another, find information
globally and to do trading, e-commerce and buy & sell goods & services. Today the Internet,
have proved to be an unavoidable tool. Thus no wonder that the Internet is considered to be
one of the most useful tools. Earlier the basic three needs were defined as Food, Clothing and
Shelter but now internet adds to the list. Today we live in a modernized society that is
dependent on computers and the internet like the human body is dependent on its brain and
heart for ordinary daily function. The Internet is constantly developing, becoming a greater
power each day and it has affected our world in various negative and positive ways. The
internet serves as an important data base worldwide. It is the greatest source of information,
news, entertainment, education and even local and global interactions such as sales
transactions are performed through the internet making life so much easier and hustle free.
Internet access is no longer a luxury but is now a necessity. The Internet is also a great
resource, gateway to Information, for starting your own business which can be done online.
The Internet provides fast and inexpensive data transfer. It makes business sense to put the
Internet on practical use simply by a mouse click and to tryout and also earn an income or
just make life easier & more comfortable.
However, it is a fact that with all the advantages of the Internet a user can get, there are also
some disadvantages that come with it. Many business houses, now-a-days do their financial
dealings are made over the Internet. Shares are traded online. It can be easily estimated even
without any proof that thousands of crores or even more of Indian Rupees are being
exchanged online every day. These financial activities done by not so computer savvy on net
has given birth to a new breed of greed and generation of criminals. With the growth of e-
commerce, and with the tremendous money it involves, it is not surprising that comes with a
significant increase in the variety of fraudulent Web activities. Activities like Phishing,
5
attacks like Pharming and other online scams involving the stealing of consumers’ digital
personal identities such as password and pin are on the rise.
Fraud is not a new phenomenon because it has always been around since human history. Its
definition and outcomes on victims have not changed. With the use of the Internet for
commercial purpose, the method of perpetration of fraudulent activities has evolved to
include online capabilities. Internet fraud is the use of Internet services or software with
Internet access to defraud victims or to otherwise take advantage of them. Internet crime
schemes steal millions of dollars each year from victims and continue to plague the Internet
through various methods.
The Internet has opened up a door for the development of a new criminal sector of fraud.
The scary aspect of this type of new fraud is that perpetrators can now use the anonymous
advantage of the Internet to cause harm. Since the Internet works on real time, a prospective
victim can be harmed much more easily and quickly. It is even possible for the criminal to
harm the same victim again and again because the fraudulent electronic transactions can be
repeatedly processed within a short period of time. Therefore, conventional wisdom requires
that a consumer be always cautious and knows what to watch out for when buying online.
In some instances, a picture of the product is sent in place of the actual product. Other times,
products are outright never sent after the bill is charged to credit card accounts. Victims are
left to deal with credit card companies for chargebacks.
In a nutshell, online fraud is any type of fraud scheme that uses one or more components of
the Internet to perpetuate a crime. Such means may include chat rooms, message boards, or
Websites. It is broadly defined as online fraud when an Internet component is used:
1 Koong, Kai and Liu, Lai and Wei, June ‘An Examination of Internet Fraud Occurrences’’ (2012)
6
3. to transmit the proceeds of fraud to financial institutions or to others connected with the
scheme
HISTORY
Internet fraud began appearing in 1994 with the start of e-commerce. The first trend to be
seen was the use of “Famous Names” to commit the fraud. Using this method, the person
committing the fraud would use stolen credit cards with the popular celebrity of the time’s
name. This highly unsophisticated plan was only successful because the internet was new and
the possibility of fraud had not been considered. Eventually internet merchants implemented
rules to confirm the card user name. Following the “Famous Names” strategies were more
technical attacks in which hackers created card-generator applications that came with real
credit card numbers. Merchants had no way to see cross-merchant activity until the credit
card associations reported it. After 1996 fraudulent users went on the internet to test the status
of stolen credit cards.
By 1998, the internet was filled with e-commerce sites. Fraudsters began to set up “dummy”
merchant sites where they could harvest their own credit cards through their own site. Before
the charge-backs rolled in, they would shut the doors of the website and leave the country.
Soon a trend started of the mass theft of identities from the internet through information
provided online under the Freedom of Information Act. One of the counter-methods
merchants developed was the use of consumer accounts. The merchant would set up a
consumer account the first time the consumer made a purchase. Following the creation of the
new account, the merchant would perform a series of third-party checks to validate the
information provided by the consumer. As auction sites like eBay and uBid gained
popularity, new fraud methods arrived specifically targeting this new merchant community. 2
Auction fraud first appeared as the third highest category of online scam in 1997. Since
1998, it has consistently taken the number one place on the annual listings. Like auction
frauds, the sale of general merchandise first appeared in 1997 as the second highest type of
online scam. It has held on to this ranking ever since. Like auction frauds, the sale of general
merchandise first appeared in 1997 as the second highest type of online scam. In sequential
order based on the average ranking over the five years, the other four categories
that have made the top 10 listing are(a) sales of Internet services, (b) sales of computer
equipment or software, (c) work-at-home, and(d) advance fee loan
MEANING
From computer viruses to Web site hacking and financial fraud, Internet crime became a
larger concern than ever in the 1990s and early 2000s. In one sense, this situation was less a
measure of growing pains than of the increasing importance of the Internet in daily life. More
users surfing the Web, greater business reliance upon e-mail, and the tremendous upsurge in
electronic commerce have raised financial stakes. A single virus outbreak in 1999 was
blamed for more than $80 million in damage, while Web site hacking in early 2000
purportedly cost hundreds of millions more. Adding new wrinkles were complaints about
rampant fraud on popular online auction sites.3
According to a U.S. Justice Department Web site devoted to the topic, Internet fraud refers to
any type of scheme in which one or more Internet elements are employed in order to put forth
"fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to
transmit the proceeds of fraud to financial institutions or to others connected with the
scheme."
Internet fraud means trying to trick or scam someone else using the Internet. This usually
means that the person who is being tricked loses money to the people scamming them.
Internet fraud can take place on computer programs such as chat rooms, e-mail, message
boards, or Web sites. Advertisements that pop up on the internet have a big risk of being
scams.
Internet fraud refers to fraud that is committed with the help of the internet. Online services
are used to conduct fraudulent solicitations, fraudulent transactions, and to transmit the
proceeds of fraud to financial institutions. Internet fraud can be committed in web sites, chat
rooms, e-mail, and message boards. Any application fraud that is committed with the help of
3 https://www.encyclopedia.com/science-and-technology/computers-and-electrical-engineering/computers-and-
computing/internet-fraud, visited on 23/03/2020at 4.00 p.m.
8
internet will come within the purview of internet fraud. Advertisements that pop up on the
internet pose a risk of losing money in the form of scams4.
With the help of online services, a perpetrator of fraud can commit debit card fraud without
even having the possession of a debit card. Here, by using an internet facility and a debit
card, a perpetrator of fraud can make purchases until the entire account of the debit card
holder is drained out.
The development of digital technologies and the World Wide Web engendered the securities
fraud on the Internet. The fraud on internet has become a serious issue with the advent of
technology. Some areas of the usage of the World web have an especially high potential of
implementation of fraudulent practices.
The term ecommerce fraud, also known as purchase fraud. It occurs when a fraudster
approaches a merchant and proposes a business transaction using fraudulent means such as a
stolen or fake credit card to pay for it. This leaves the merchant without payment for the sale
that was just made. Fraud has always been around in one form or another, so the concept
itself isn’t that new. It used to be limited to the physical stealing of a credit card. And
although this still happens, online fraud is far more popular now. With the rise of new
technologies, payment methods, and data processing systems, online store owners are
unwillingly opening their doors to new forms of fraud every day.6
6 https://www.printful.com/blog/the-basics-of-ecommerce-fraud-what-is-it-and-how-to-manage-it/, visited on
23/03/2020 at 5:00 p.m.
10
Cybercriminals always opt for an easy way to make big money. They target rich people or
rich organizations like banks, casinos and financial firms where a huge amount of money
flows daily and hack sensitive information. Catching such criminals is difficult. Hence, that
increases the number of cyber-crimes across the globe. Computers are vulnerable, so laws are
required to protect and safeguard them against cybercriminals. We could list the following
reasons for the vulnerability of computers:
▪ Easy to access –
The problem behind safeguarding a computer system from unauthorized access is that there
are many possibilities of breach due to the complex technology. Hackers can steal access
codes, retina images, advanced voice recorders etc. that can fool biometric systems easily and
bypass firewalls can be utilized to get past many security systems7.
▪ Capacity to store data in comparatively small space –
The computer has the unique characteristic of storing data in a very small space. This makes
it a lot easier for the people to steal data from any other storage and use it for own profit.
▪ Complex –
The computers run on operating systems and these operating systems are programmed of
millions of codes. The human mind is imperfect, so they can do mistakes at any stage. The
cybercriminals take advantage of these gaps.
▪ Negligence –
Negligence is one of the characteristics of human conduct. So, there may be a possibility that
protecting the computer system we may make any negligence which provides a cyber-
criminal the access and control over the computer system.
▪ Loss of evidence –
The data related to the crime can be easily destroyed. So, Loss of evidence has become a very
common & obvious problem which paralyzes the system behind the investigation of cyber-
crime.
Cyber thieves can use the internet as a tool to rip off unsuspecting victims. Internet scams
come in many forms, including emails that attempt to trick you into handing out financial
information, pop-ups loaded with malware, and social media messages crafted to spark fake
romantic relationships. Cybercriminals may contact potential victims through personal or
work email accounts, social networking sites, dating apps, or other methods in attempts to
obtain financial or other valuable personal information. Many successful internet scams have
similar endings: Victims either lose their own money or fail to receive funds the fraudster
promised.
❖ EMAIL PHISHING
While cyber fraud takes many forms, it’s often done through email since that’s a ubiquitous
and cheap method of attack. As a result, one of the most common scamming examples is the
general phishing email. In this scam, you receive a message claiming to come from a
legitimate entity, such as your bank, email provider, or online retailer. The email lets you
know that the company has made some changes and needs you to confirm your information
to make sure everything is up-to-date. If you follow the link in these fishing emails, you’ll be
brought to a fraud site. While it might look like the real page, entering your credentials here
will send them right to scammers. For instance, you might be directed to a website that looks
legitimate, but was set up only to capture your information. The fraudulent emails are usually
written in an urgent tone. Often, they contain red flags such as misspellings, poor grammar,
making urgent demands with threats of financial consequences, and logos that don’t quite
look right.
One of the most concerning internet fraud cases in recent years is the onslaught of tech
support scams. In this scheme, someone calls you and pretends to be from Microsoft or a
computer security company. They convince you that your computer is infected with some
kind of malware and coax you into letting them remotely control your machine. From there,
they might cause actual damage to your system by stealing your data or installing ransom
ware. They’ll then try to sell you a worthless “security suite” or demand payment for their
“services,” getting upset if you refuse. This scam is easy to fall for if you get caught up in the
caller’s lies. But by being aware of it, you can know what you should do about tech support
scams in case you’re ever contacted with one.
This is one of the oldest internet fraud examples in the book. Someone from a country (often
Nigeria, but not always) contacts you via email in broken English. They explain that a rich
person they know has died and the money has nowhere to go; if you can help them get the
funds out of the country, they’ll give you some as a reward. If you follow along, they’ll
continually ask you for money to cover various “expenses” associated with the fund
movement, until you realize they’ve been stealing from you all along. Due to their notoriety,
these types of emails usually go straight to the spam folder.
Attackers have many ways to steal from you on social media, including taking your money.
One popular method is abusing your trust with your social media friends. For example, if
someone on your Facebook friend list has their account hacked; the attacker might contact
you through a Facebook Messenger. In many cases, they’ll send a video link with a
sensational message like “OMG, is it you in this video?” that tempts you to click on it. If you
do click, you’ll go to a dangerous site programmed to infect your computer with malware.
Other times, the scam is more personal. The hijacked account might send you a message
saying that they’re in trouble with the law, or need money to cover a hospital bill after a bad
accident. If you take this at face value, you’ll end up sending a thief—not your friend—
money.
In another type of scam, the cybercriminal may threaten to embarrass or injure you or a
family member unless a ransom is paid. The scammer may have gathered details about your
life from social media profiles, which could make the claim seem more legitimate or urgent.
pop-up message for fake antivirus software, a link to a news article, or an email that looks
like it’s from your bank.
Clicking on the message or the embedded link triggers the installation of malware, which can
be designed to scan your device for personal and banking information, log your keystrokes,
lock you out of your device, access your webcam, or even destroy your files in the process.
Ransomware is a related form of malware that’s delivered through phishing emails. Once the
malware is installed on a device, the victim’s files are encrypted, and the cybercriminal
demands a ransom payment, typically in a virtual currency such as bitcoin.The criminal
promises to release the victim’s files once the money is received, but often that doesn’t
happen.
❖ ECONOMIC SCAM:
Cybercriminals will lure you into believing you can make money easy and fast on the
internet. They’ll promise you non-existent jobs, including plans and methods of getting rich
quickly. It is a quite simple and effective approach, because it addresses a basic need for
money, especially when someone is in a difficult financial situation. Using various job types,
such as work-at-home scams, the victim is lured into giving away personal information and
financial data with the promise of a well-paid job that will bring lots of money in a very short
period of time.
❖ TRAVEL SCAM:
These scams are commonly used during hot summer months or before the short winter
vacations, for Christmas or New Year’s Day.
Here’s how it happens: you receive an email containing an amazing offer for an exceptional
and hard to refuse destination that expires in a short period of time which you can’t miss. If it
sounds too good to be true, it might look like a travel scam, so don’t fall for it. The problem
is that some of these offers actually hide some necessary costs until you pay for the initial
offer. Others just take your money without sending you anywhere.
People can be easily scammed by “too good to be true” bank offers that might guarantee large
amounts of money and have already been pre-approved by the bank. Credit card fraud can be
authorised, where the genuine customer themselves processes a payment to another account
which is controlled by a criminal, or unauthorised, where the account holder does not provide
authorisation for the payment to proceed and the transaction is carried out by a third party.
People can be easily scammed by “too good to be true” bank offers that might guarantee large
amounts of money and have already been pre-approved by the bank. When a credit card is
lost or stolen, it may be used for illegal purchases until the holder notifies the issuing bank
and the bank puts a block on the account. Most banks have free 24-hour telephone numbers
to encourage prompt reporting9. Still, it is possible for a thief to make unauthorized purchases
on a card before the card is cancelled.
RELEVANT LEGISLATIONS:
● Section 43 of the IT Act, 2000 provides that if any person accesses a computer,
computer system or computer network without the permission of the owner, or
downloads, copies, extracts any data, computer data base or information from such
computer, computer system or computer network including information or data held or
stored in any removable storage medium; or causes disruption of any system; inter alia,
they will be liable to pay compensation to the affected person. The offence of hacking is
covered under the said act.
● Section 66 of the act provides that if any person dishonestly or fraudulently commits an
act mentioned in section 43 of the act, it will be punishable for an imprisonment of up to
three years or fine up to fine lakh rupees, or with both.
● Denies or causes the denial of access to any person authorised to access any
computer, computer system or computer network by any means is punishable
under section 43(f) of the act, with an imprisonment of up to three years or fine up
to five lakh rupees, or both.
● Additionally, the crime of cyber terrorism under section 66F specifies that
whoever has an intent to threaten the unity, integrity , security or sovereignty of
India , or to strike terror among people, denies or causes denial of access to any
person authorized or access computer resource, will be punished with
imprisonment which may extend to imprisonment which may extend up to life.
❖ PHISHING :
● Section 66 C of the IT Act, 2000 could be used to prosecute a person for phishing
attacks. It provides that Whoever, fraudulently or dishonestly make use of the
electronic signature, password or any other unique identification feature of any
other person, shall be punished with imprisonment of either description for a term
which may extend to three years and shall also be liable to fine with may extend to
rupees one lakh.
● Additionally, 66 D of the IT Act, 2000 provides that whoever, by means for any
communication device or computer resource cheats by personating, shall be
punished with imprisonment of either description for a term which may extend to
three years and shall also be liable to fine which may extend to one lakh rupees.
● Section 43 of IT Act, 2000 provides that if any person introduces any computer
contaminant or computer virus to a computer resources without the permission of
the owner will be liable to pay damages by ay of compensation to the person so
affected, and may also be punished with imprisonment for a term of up to three
years or a fine which may be up to five lakh rupees, or both.
● Section 72A of the IT Act, 2000 provides that any person including an
intermediary who, while providing services under the terms of lawful
contract, has secured access to any material containing personal information
about another person, with the intent to cause or knowing that he is likely to
cause wrongful loss or wrongful gain discloses, without the consent of the
person concerned, or in breach of a lawful contract, such material to any
other person, shall be punished with imprisonment for a term which may
extend to three years, or with fine which may extend to five lakh rupees, or
with both10.
● Section 409 of IPC, provides punishment for imprisonment for life, or with
imprisonment of either description for a term which may extend to ten years,
and shall also be liable to fine for criminal breach of trust by a public
servant or agent. Section 420 of IPC provides punishment for cheating states
that the person shall be punished with imprisonment of either description for
a term which may extend to seven years, and shall also be liable to fine.
Section 379 of IPC provides punishment for theft stating whoever commits
theft shall be punished with imprisonment of either description for a term
which may extend to three years, or with fine, or with both. All these
sections can e invoked in case of electronic theft.
10 Dr. Jyoti Rattan, Cyber laws & Information Technology,P.311, Bharat Law House Pvt. Ltd., New Delhi,
sixth edition, 2017
17
❖ ATM System Hacked in Kolkata: In July 2018 fraudsters hacked into Canara bank
ATM servers and wiped off almost 20 lakh rupees from different bank accounts. The
number of victims was over 50 and it was believed that they were holding the account
details of more than 300 ATM users across India. The hackers used skimming devices on
ATMs to steal the information of debit cardholders and made a minimum transaction
of INR 10,000 and the maximum of INR 40,000 per account. On 5 August 2018, two men
were arrested in New Delhi who was working with an international gang that uses
skimming activities to extract the details of the bank account.
❖ UIDAI Aadhaar Software Hacked: 2018 started with a massive data breach of personal
records of 1.1 Billion Indian Aadhaar cardholders. UIDAI revealed that around 210
Indian Government websites had leaked Aadhaar details of people online. Data leaked
included Aadhaar, PAN and mobile numbers, bank account numbers, IFSC codes and
mostly every personal information of all individual cardholders. If it wasn’t enough
shocking, anonymous sellers were selling Aadhaar information of any person for Rs.500
over Whatsapp. Also, one could get any person’s Aadhaar car printout by paying an extra
amount of Rs.300.
❖ Nasscom vs. Ajay Sood & Others13, in this case Delhi High Court declared ‘phishing’ on
the internet to be an illegal act, entailing an injunction and recovery of damage. The
plaintiff in this case was the National Association of Software and Service Companies
(Nasscom), India’s premier software association. The defendants were operating a
placement agency involved in head-hunting and recruitment. In order to obtain personal
data, which they could use for purposes of headhunting, the defendants composed and
sent e-mails to third parties in the name of Nasscom. The high court recognised the
trademark rights of the plaintiff and passed an ex-parte and interim injunction restraining
the defendants from using the trade name or any other name deceptively similar to
Nasscom. The court further restrained the defendants from holding themselves out as
being associates or a part of Nasscom. The court appointed a commission to conduct a
search at the defendants’ premises. Two hard disks of the computers from which the
fraudulent e-mails were sent by the defendants to various parties were taken into custody
by the local commissioner appointed by the court. The offending e-mails were then
downloaded from the hard disks and presented as evidence in court. During the progress
of the case, it became clear that the defendants in whose names the offending e-mails
were sent were fictitious identities created by an employee on defendants’ instructions, to
avoid recognition and legal action. On discovery of this fraudulent act, the fictitious
names were deleted from the array of parties as defendants in the case. Subsequently, the
defendants admitted their illegal acts and the parties settled the matter through the
recording of a compromise in the suit proceedings paying a sum of Rs1.6 million to the
plaintiff as damages for violation of the plaintiff’s trademark rights. The court also
ordered the hard disks seized from the defendants’ premises to be handed over to the
plaintiff who would be the owner of the hard disks.
CONCLUSION:
The dangers of the Internet usage are great due to the variety of ways, in which the
information placed online can be manipulated. These data is subject to security frauds that
have several types of information misuse. The manipulation of data in electronic commerce
is another important area of the Internet-related fraud. All these areas of online fraud demand
new preventive measures, such as legislative reforms, effective data coding and fraud
prevention strategies.
Various measures can be taken, to prevent frauds over internet like keeping your personal
information secure; do not give out any information regarding your savings, checking, credit,
or other financial accounts. Guarding the Social Security number especially carefully. This is
the single most important item sought by many types of fraudsters. They can use it to wreak
financial havoc that will be very difficult and time-consuming for you to repair. Don’t give
this number out unless it is absolutely necessary; e.g., needed for application for major credit
or a mortgage but not for sales of merchandise or services. Deal only with legitimate,
reputable companies and individuals. Take time to thoroughly investigate the other party
involved in your transaction. Use a search engine to find out what’s already known about a
business or individual. Don’t be fooled by fancy websites, which can disappear quickly. Buy
direct. Purchase name brand items only from the companies who make them or have
appropriate licenses to sell them. Low-priced new name brand products may actually be
counterfeits. Obtain and verify addresses and phone numbers. Verify email addresses and be
wary of those that could have been obtained without providing traceable information such as
a credit card number. Learn how online auctions work before you bid or sell. Clearly
understand the details of an online sale or purchase. Make sure you are familiar with how and
where payment is to be made, when delivery of the item is to be expected, all the additional
costs involved in a transaction, return and refund policies. Don’t buy anything promoted in a
spam email.
If you are a victim of the fraud file the cyber crime complaint with all the necessary
particulars, to the Head of the Cyber Crime Cell of the city where you are filing the cyber
crime complaint. In case you are a victim of online harassment, a legal counsel can be
approached to assist you with reporting it to the police station. If you do not have access to
any of the cyber cells in India, you can file a First Information Report (FIR) at the local
police station. In case your complaint is not accepted there, you can approach
the Commissioner or the city’s Judicial Magistrate.
BIBLIOGRAPHY
❖ STATUTES REFFERRED :
⮚ Indian Penal code, 1860
⮚ Information Technology Act, 2010
❖ BOOKS REFFERED :
⮚ Dr. Jyoti Rattan, Cyber laws & Information Technology, Bharat Law House Pvt. Ltd.,
New Delhi, sixth edition, 2017
WEBLIOGRAPHY:
⮚ https://definitions.uslegal.com/i/internet-fraud/
⮚ https://en.wikipedia.org/wiki/Internet_fraud_prevention
⮚ https://iclg.com/practice-areas/cybersecurity-laws-and-regulations/india
⮚ https://krazytech.com/technical-papers/cyber-crime
21
⮚ https://us.norton.com/internetsecurity-online-scams-internet-scams.html
⮚ https://www.encyclopedia.com/science-and-technology/computers-and-electrical
engineering/computers-and-computing/internet-fraud
⮚ https://www.makeuseof.com/tag/top-5-internet-fraud-scams-time/
⮚ https://www.printful.com/blog/the-basics-of-ecommerce-fraud-what-is-it-and-how-to-
manage-it/
⮚ https://www.testbytes.net/blog/cyber-attacks-on-india/