NEW THREATS TO CYBER CRIME
Anubhuti Agarwal
The author of this blog is a Law Student, School of law, Jagran Lakecity University, Bhopal
Cybercrime
or computer-oriented crime is a computer- and Internet-related crime. You can
use the computer for crime or target. Cybercrime can be defined as deliberately
or indirectly damaging a victim's reputation by using a modern
telecommunications network such as the Internet (including chat rooms, email
networks) to inflict criminal motives on individuals or groups of individuals
with criminal motives. There is. Bulletin boards and groups) and mobile phones
(Bluetooth / SMS / MMS), which may result in physical or mental injury or loss.
"
Current
and modern cybercrime:
Today,
cybercrime activity is getting worse. As computer systems become faster and
more complex, we see cybercriminals
It's
getting more complicated and harder to capture. Today we have a botnet, a
network of personal computers infected with malware that allows criminals to
control millions of infected computer systems around the world. These botnets
enable criminals to overload organizational networks and hide their origins.
•
We are seeing ongoing ransomware attacks across the economy
•
People are always looking for identity theft and financial fraud
Continued
news coverage of the latest POS attacks on major retailers and hotel
organizations
Threat
•
piece
•
Defamation
•
Internet porn
•
Tracking
This
crime is the most common cybercrime case that is difficult to stop in this
cyber age. This is because most women don't know the law and where to look and
other women are afraid of this male domination and social thinking and
judgment.
FORM
OF CYBER CRIME
Among
the various cyber crimes against individuals and society as a whole, the target
crimes are as follows.
1.
Cyber stalking- In cyber stalking, the stalker
accesses the victim's personal information, such as the victim's name, family
background, phone number, and daily life, and posts it on a website related to
the victim's dating.
2.
Bullying by E-mail-One form may include
e-mail harassment, such as extortion, threats, harassment, sending love letters
anonymously, or regularly sending embarrassing e-mails to your mailbox,
criminal law, or criminal proceedings. There is. The law then selects some of
the IT laws that deal with cybercrime protection.
3.
Cyber Bullying- Cyber bullying is a complete
and repetitive harm caused by threats or threats to use your computer, mobile
phone or other electronic devices. India is second only to China and Singapore
for cyberbullying.
A
new era of cyberbullying threatens Harini (name change) to be a 12 year old
girl. She did not know that when she posted her profile picture on social
networking sites, she faced a serious physical threat. When she finally told
her about it, they threatened to abuse her personal information and photos if
people living nearby bothered her and told someone. After visiting the
cybercrime police station, they managed to get rid of the threat somehow.
However, Harini's parents are still not sure how to overcome their fears and
regain self-esteem [Indian Express 2012].
4.
Network Morphing- Morphing is the editing of
original photos by unauthorized users. When an unauthorized user downloads a
victim's photo using a fake identity and then uploads or reloads it after
editing, it is called anamorphic. Female images have been observed by fake
users downloading from a website and then editing / uploading / uploading from
another website. This violates IT Act 2000. Violators can be booked in
accordance with IPC or Crime Invasion under IPC or Section 441, Section 290
(Public Purpose), Section 292A (Print or Publish), Serious Obscene, Obscene or
Intentional Robbery. Article 501 (Defamation)
5.
E-mail Spoofing-Fraudulent e-mail is a message
that distorts the origin [humanity]. E-mail spoofing is a popular method of
online fraud.
6.
Internet defamation-Internet misconduct,
including defamation and defamation, is another common crime against women on
the Internet. This is a problem for both men and women, but women are more
vulnerable. This can happen when someone posts a defamation question on a
website or, with the help of a computer and / or the Internet, sends an email
with defamation information to all their friends.
7.
Identity Theft-At this victim, criminals have
stolen personal information for financial or fake identity fraud.
8.
Cyber Trespass- In the event of a network
intrusion, an attacker can gain unauthorized access to a computer or network,
but is not abused. For example, a young hacker hacks the network to prove to a
colleague or consider it a challenge. This intruder likes to read someone
else's email, but does not use the information it finds. However, cyber
intrusion is a crime in most countries. Cybercrime damage to society.
9.
Online Prostitution-Including online
prostitution through various advertisements on the website.
10.
Internet Temptation: Internet temptation
can be regarded as the smallest crime, starting with the perpetrators that
allow victims to listen to obscene songs, messages, and can lead to online
sexual defamation and Twitter. Again, this can be seen as the opposite of an IT
bill, but Section 72 deals with privacy and privacy violations.
11.
Internet pornography – pornography or
“pornography” material is “corrupt and perishable person” and regulates such
material. Cyber pornography is used to create, display, distribute, import,
or post pornography or pornography, especially materials depicting sexually
active women and children. Indian Criminal and Information Technology Law
interprets the Internet as "obscene" as "an act that causes
sexual immorality or conspiracy, or its effect tends to deteriorate and
decay." Porn movies are a major threat to female Internet users. Online
pornography and sacrifice for this type of woman is widespread. Today, about
50% of websites display porn content on the Internet. You can make porn
materials faster and cheaper on new media like hard disks, floppy disks and
CD-ROMs. The new technology is not an extension of existing forms such as text,
photos and images. In addition to still photos and images, full motion video
clips and full movies are also provided.
12.
Phishing-Phishing is an attempt to
obtain sensitive information (such as a username and password) and an attempt
to obtain personal information.
13.
Troll-troll spreads conflict on the Internet
and criminals quarrel or upset victims by posting inflammatory or state
exclusion messages to online communities (newsgroups, forums, chat rooms or
blogs, etc.). The purpose is to lead the victim to an emotionally disturbing
reaction). Trolls are professional abusers, creating fake IDs on social media
and using them to create a cold war atmosphere in cyberspace that cannot be
easily traced.
14.
Internet obscenity – The Internet
provided a convenient means to promote crime, such as obscenity or pornography.
Cyber obscenity is a transaction of sexual expression material in cyberspace.
The Supreme Court defines obscenity as being "offensively humble or polite,
sensual, dirty and aggressive."
Cybercrime
under Indian Criminal Code
•
Send a threat message via email 503. In the case of criminal threats, the
offender is punished for imprisonment, imprisonment for less than two years, or
fines, or both.
•
Sending a message of defamation—Section 499. Punishment is a simple detention
that can be punished by two years or a fine or both.
•
Email deception Section 463 Two years imprisonment, fine or both.
•
Sales of obscene books, serious, insulting, or intentional extortion 292 and
292A- Sinners' printing or publication will be punished by imprisonment for
less than two years or a fine of 1,000 rupees. The maximum fines for the second
conviction are five years in prison and five thousand rupees.
•
Selling pornographic items to adolescents-Article 293-Violations of this
section can be up to seven years in prison and fines up to $ 7,000.
•
Write or write obscene songs or other works. Article 294 has imprisonment and
the maximum sentence can be extended to three months, at the same time a fine
or a section 509 year or fine that violates a woman's humility or both.
Case
law
The
first cybercrime in the RituKoli case has been reported in India. Delhi Police
Crime Bureau officials arrested 30-year-old software engineer Manish Kathuria
through online chat to harass women. Ritu Coli used her name to have an illegal
chat on the "MIRC" website. He used obscene and offensive language
and distributed home phone numbers to invite people to speak on the phone. As a
result, Ritu continued to receive obscene calls all over the place and people
swore. Shocked, she called the Delhi police and reported the case. The police
quickly traced the offender and prosecuted Ritu Coli by prosecuting criminal
charges under section 67 of the IT law and section 509 of the IPC.
Air
Force Bal Bharati School Case – A student at Air Force Bal Bharati School in
Delhi was mocked by all classmates for having acne scars on their faces. To
revenge, he scanned photos of some girls in class, then the teacher corrected the
photos with nude photos, put them on a website and uploaded them to a free web
hosting service. No action was taken until the father of one girl on the
website complained and complained to the police.
Jawaharlal
Nehru University's MMS Scandal-Famous and Famous Lab Shock-Erotic MMS videos
from Jawaharlal Nehru University were produced on campus and spread out of the
university. According to some media reports, two accused students initially
tried to intimidate the girls in the video, but when it failed, the shooter
even posted the video on his cell phone, the Internet, and even sold it on CD
in the blue film market.
Conclusion
The
online world or the internet has become a very important part of our lives.
Nothing can be done without it. But we humans make it a monster like a
Frankenstein monster. If we do not stop, it will destroy the future. Whether it
is a man or a woman, this is not a human problem. We lose it every day. Due to
lack of funds, it is not possible to produce porn videos from others and sell
them on porn sites. Revenge does not mean slandering the family by cutting the
nude photos edited by the daughter. Society is for humanity, values and
perspectives. If any value or opinion conflicts with any part of society, you
need to fix it. Since our constitution itself gives us equal rights to the law,
society is equal to everyone, so money, social status, or the power of others
is irrelevant. The Ministry of Information Technology is researching new laws,
and the Ministry of Interior is taking action against members of law
enforcement agencies. Members of our society must fight this crime and make
children and teenagers younger. This is possible and one day no woman wants to
be a victim of cybercrime.
Comments
Post a Comment