NEW THREATS TO CYBER CRIME


Anubhuti Agarwal
The author of this blog is a Law Student, School of law, Jagran Lakecity University, Bhopal

Cybercrime or computer-oriented crime is a computer- and Internet-related crime. You can use the computer for crime or target. Cybercrime can be defined as deliberately or indirectly damaging a victim's reputation by using a modern telecommunications network such as the Internet (including chat rooms, email networks) to inflict criminal motives on individuals or groups of individuals with criminal motives. There is. Bulletin boards and groups) and mobile phones (Bluetooth / SMS / MMS), which may result in physical or mental injury or loss. "
Current and modern cybercrime:
Today, cybercrime activity is getting worse. As computer systems become faster and more complex, we see cybercriminals
It's getting more complicated and harder to capture. Today we have a botnet, a network of personal computers infected with malware that allows criminals to control millions of infected computer systems around the world. These botnets enable criminals to overload organizational networks and hide their origins.
• We are seeing ongoing ransomware attacks across the economy
• People are always looking for identity theft and financial fraud
Continued news coverage of the latest POS attacks on major retailers and hotel organizations
Threat
• piece
• Defamation
• Internet porn
• Tracking
This crime is the most common cybercrime case that is difficult to stop in this cyber age. This is because most women don't know the law and where to look and other women are afraid of this male domination and social thinking and judgment.

FORM OF CYBER CRIME
Among the various cyber crimes against individuals and society as a whole, the target crimes are as follows.
1. Cyber stalking- In cyber stalking, the stalker accesses the victim's personal information, such as the victim's name, family background, phone number, and daily life, and posts it on a website related to the victim's dating.
2. Bullying by E-mail-One form may include e-mail harassment, such as extortion, threats, harassment, sending love letters anonymously, or regularly sending embarrassing e-mails to your mailbox, criminal law, or criminal proceedings. There is. The law then selects some of the IT laws that deal with cybercrime protection.
3. Cyber ​​Bullying- Cyber ​​bullying is a complete and repetitive harm caused by threats or threats to use your computer, mobile phone or other electronic devices. India is second only to China and Singapore for cyberbullying.
A new era of cyberbullying threatens Harini (name change) to be a 12 year old girl. She did not know that when she posted her profile picture on social networking sites, she faced a serious physical threat. When she finally told her about it, they threatened to abuse her personal information and photos if people living nearby bothered her and told someone. After visiting the cybercrime police station, they managed to get rid of the threat somehow. However, Harini's parents are still not sure how to overcome their fears and regain self-esteem [Indian Express 2012].
4. Network Morphing- Morphing is the editing of original photos by unauthorized users. When an unauthorized user downloads a victim's photo using a fake identity and then uploads or reloads it after editing, it is called anamorphic. Female images have been observed by fake users downloading from a website and then editing / uploading / uploading from another website. This violates IT Act 2000. Violators can be booked in accordance with IPC or Crime Invasion under IPC or Section 441, Section 290 (Public Purpose), Section 292A (Print or Publish), Serious Obscene, Obscene or Intentional Robbery. Article 501 (Defamation)
5. E-mail Spoofing-Fraudulent e-mail is a message that distorts the origin [humanity]. E-mail spoofing is a popular method of online fraud.
6. Internet defamation-Internet misconduct, including defamation and defamation, is another common crime against women on the Internet. This is a problem for both men and women, but women are more vulnerable. This can happen when someone posts a defamation question on a website or, with the help of a computer and / or the Internet, sends an email with defamation information to all their friends.
7. Identity Theft-At this victim, criminals have stolen personal information for financial or fake identity fraud.
8. Cyber Trespass- In the event of a network intrusion, an attacker can gain unauthorized access to a computer or network, but is not abused. For example, a young hacker hacks the network to prove to a colleague or consider it a challenge. This intruder likes to read someone else's email, but does not use the information it finds. However, cyber intrusion is a crime in most countries. Cybercrime damage to society.
9. Online Prostitution-Including online prostitution through various advertisements on the website.
10. Internet Temptation: Internet temptation can be regarded as the smallest crime, starting with the perpetrators that allow victims to listen to obscene songs, messages, and can lead to online sexual defamation and Twitter. Again, this can be seen as the opposite of an IT bill, but Section 72 deals with privacy and privacy violations.
11. Internet pornography – pornography or “pornography” material is “corrupt and perishable person” and regulates such material. Cyber ​​pornography is used to create, display, distribute, import, or post pornography or pornography, especially materials depicting sexually active women and children. Indian Criminal and Information Technology Law interprets the Internet as "obscene" as "an act that causes sexual immorality or conspiracy, or its effect tends to deteriorate and decay." Porn movies are a major threat to female Internet users. Online pornography and sacrifice for this type of woman is widespread. Today, about 50% of websites display porn content on the Internet. You can make porn materials faster and cheaper on new media like hard disks, floppy disks and CD-ROMs. The new technology is not an extension of existing forms such as text, photos and images. In addition to still photos and images, full motion video clips and full movies are also provided.
12. Phishing-Phishing is an attempt to obtain sensitive information (such as a username and password) and an attempt to obtain personal information.
13. Troll-troll spreads conflict on the Internet and criminals quarrel or upset victims by posting inflammatory or state exclusion messages to online communities (newsgroups, forums, chat rooms or blogs, etc.). The purpose is to lead the victim to an emotionally disturbing reaction). Trolls are professional abusers, creating fake IDs on social media and using them to create a cold war atmosphere in cyberspace that cannot be easily traced.
14. Internet obscenity – The Internet provided a convenient means to promote crime, such as obscenity or pornography. Cyber ​​obscenity is a transaction of sexual expression material in cyberspace. The Supreme Court defines obscenity as being "offensively humble or polite, sensual, dirty and aggressive."

Cybercrime under Indian Criminal Code
• Send a threat message via email 503. In the case of criminal threats, the offender is punished for imprisonment, imprisonment for less than two years, or fines, or both.
• Sending a message of defamation—Section 499. Punishment is a simple detention that can be punished by two years or a fine or both.
• Email deception Section 463 Two years imprisonment, fine or both.
• Sales of obscene books, serious, insulting, or intentional extortion 292 and 292A- Sinners' printing or publication will be punished by imprisonment for less than two years or a fine of 1,000 rupees. The maximum fines for the second conviction are five years in prison and five thousand rupees.
• Selling pornographic items to adolescents-Article 293-Violations of this section can be up to seven years in prison and fines up to $ 7,000.
• Write or write obscene songs or other works. Article 294 has imprisonment and the maximum sentence can be extended to three months, at the same time a fine or a section 509 year or fine that violates a woman's humility or both.

Case law
The first cybercrime in the RituKoli case has been reported in India. Delhi Police Crime Bureau officials arrested 30-year-old software engineer Manish Kathuria through online chat to harass women. Ritu Coli used her name to have an illegal chat on the "MIRC" website. He used obscene and offensive language and distributed home phone numbers to invite people to speak on the phone. As a result, Ritu continued to receive obscene calls all over the place and people swore. Shocked, she called the Delhi police and reported the case. The police quickly traced the offender and prosecuted Ritu Coli by prosecuting criminal charges under section 67 of the IT law and section 509 of the IPC.
Air Force Bal Bharati School Case – A student at Air Force Bal Bharati School in Delhi was mocked by all classmates for having acne scars on their faces. To revenge, he scanned photos of some girls in class, then the teacher corrected the photos with nude photos, put them on a website and uploaded them to a free web hosting service. No action was taken until the father of one girl on the website complained and complained to the police.
Jawaharlal Nehru University's MMS Scandal-Famous and Famous Lab Shock-Erotic MMS videos from Jawaharlal Nehru University were produced on campus and spread out of the university. According to some media reports, two accused students initially tried to intimidate the girls in the video, but when it failed, the shooter even posted the video on his cell phone, the Internet, and even sold it on CD in the blue film market.

Conclusion
The online world or the internet has become a very important part of our lives. Nothing can be done without it. But we humans make it a monster like a Frankenstein monster. If we do not stop, it will destroy the future. Whether it is a man or a woman, this is not a human problem. We lose it every day. Due to lack of funds, it is not possible to produce porn videos from others and sell them on porn sites. Revenge does not mean slandering the family by cutting the nude photos edited by the daughter. Society is for humanity, values ​​and perspectives. If any value or opinion conflicts with any part of society, you need to fix it. Since our constitution itself gives us equal rights to the law, society is equal to everyone, so money, social status, or the power of others is irrelevant. The Ministry of Information Technology is researching new laws, and the Ministry of Interior is taking action against members of law enforcement agencies. Members of our society must fight this crime and make children and teenagers younger. This is possible and one day no woman wants to be a victim of cybercrime.

Comments