SlideShare une entreprise Scribd logo
1  sur  32
Télécharger pour lire hors ligne
Law and Emerging
Technology
Cyber Crime
Mobile Phone Crimes
Suggested Readings
• 1. Vakul Sharma, Information Technology Law and
Practice, Universal Law Publishers, 2011 (3rd Edn.)
• 2. Dr Jyoti Rattan, Cyber Laws & Information
Technology (For LL.B.), Bharat Law House Pvt Ltd. 2019
(7th Edn.)
• 3. Mobile Cell Phones And Cyber Crimes In India: How
Safe Are We?, Available on:
http://docs.manupatra.in/newsline/articles/Upload/FB574C
6E-CE6A-4D1D-AAEC-69F2639640A2.pdf
• 4. Kinds of Mobile Crimes, Available at:
https://pavanduggalonmobilelaw.wordpress.com/kinds-of-
mobile-crimes/
Objectives of the Lecture
• The primary objective of this lecture is to
help students understand the meaning and
nature of mobile phone crimes and its
different types.
• Also, the students will be able to
comprehend the provisions of the IT Act,
2000 which deal with mobile phone crimes
in India.
Outcome of the Lecture
• The first and foremost outcome of the
lecture is that the class will be clear with the
concept of mobile phone crimes in India.
• Also, the class will understand the
regulatory framework that is present in
India to tackle this menace and also what
has been the impact of mobile phones on
the lives' of people.
Introduction
• Telecommunication was introduced in India long
back in the year 1882.
• There was a mushroom growth of
telecommunication after the advent of internet and
mobile technology in India.
• It was on August 15, 1995 when the first mobile
telephone service started on a noncommercial
basis in India.
• On the same day internet was also introduced in
this nation.
CONTD…
• After the liberation and privatization in this area
India didn’t look back; telecommunication
conquered life of citizens of India and in no time
India’s telecommunication network became the
second largest in the world.
• In May 2012 there were 929.37 million mobile
users in India.
• In this dot com era a person is looked with surprise
if he is not a mobile user.
CONTD…
• In today’s world mobile phone is the most important and useful
device.
• Every person is using at least one phone for their personal or
business purpose.
• The main cause of increase in use of mobile phones is
enhancement of technology taking place.
• Earlier, somethings which could be done on computer or laptops
could not be done on mobile phones, but now as the technology
has improved, every work that you can do on computer or laptop
can now easily be done on a mobile phone (also called
smartphones), whether it be a work like sending mails, online
payment, bank statement, fund transfers and what not, everything
can be done by using a smartphone.
Impact of Cell Phones on Human Life
• Communication technology has left no aspect of
human life untouched.
• Even our morning alarm clocks are been replaced by
the mobile cell phones.
• Technology is constantly bringing advancement in our
mobile cell phones.
• Mobile cell phones have now become new personal
laptops and desktops which are having capacity to
store as much data as our laptops and desktops are and
in additional they are providing flexibility and
portability.
CONTD…
• Internet enabled smart phones, tablets etc…are
performing the functions of our computer, but one vital
feature is missing and that is security.
• Rapid growth in the use of internet enabled mobile cell
phones allows us to use manage our banking transaction,
official and institutional transactions, rapid
communication through email or social networks, and
many more.
• Virtually we can perform the task of a computer on our
mobile; this means alike our computer our mobile phone
is also vulnerable to the risk of fraud, theft of financial
information and identity theft etc.
CONTD…
• According to the Section 2(1)(i) of the Information
Technology Act 2000, “computer” means any
electronic, magnetic, optical or other high-speed
data processing device or system which performs
logical, arithmetic and memory functions by
manipulations of electronic, magnetic or optical
impulses, and includes all input, output,
processing, storage, computer software or
communication facilities which are connected or
related to the computer in a computer system or
computer network.
CONTD…
• Thus, smartphones and tablets also falls within the
definition of computer as they are capable of
performing all the functions of computer whether it
be logical, memory functions or of processing,
storage or communication.
Cell Phones: An Open Door for Cyber
Criminals
• Recent reports have suggested that with the
advancement of the telecommunication technology
there is increase in cyber crime in the nation.
• The technological advancement provided
opportunities to the miscreants in the society, who
are using technology for their selfish gains.
• There are cases where hackers have breached in
Nokia’s Symbian, Apple’s iOS and Google’s
android operating system.
• Thus to be safe we must be vigilant.
CONTD…
• But it is really unfortunate that whenever a discussion about
cyber crime ignites, a particular class of the people escapes
the discussion saying that; they neither use computers nor
they use internet for communication and therefore cyber
crime is not a threat for them.
• People try to hide their ignorance about cyber crimes on the
ground that cannot become its victim, but they have
absolutely no idea that knowingly or unknowingly they can
be adversely affected by cyber crime.
• Every person using an internet, blue tooth or even an infra
red enabled cell phone can easily be fished in the web of
cyber criminals.
What is Mobile Phone Crimes?
• As the technology increases, crime also increases. We all
have heard of Cyber Crime and different ways by which
it is happening.
• Mobile phone crimes is a part of Cyber Crime and is
increasing day by day.
• Crimes which are done on mobiles phones are of
different ways.
• One can hack the whole mobile phone and can do
anything with it like access the phone book, go through
all the data and details whether it be of someone’s
personal details or of their work related.
CONTD…
• In this age of digitization, the modern applications
of all the banks and other digital modes of
payment by which one can access their bank
accounts and transfer funds using one’s phone
only is no doubt a new and easy way to access
things and do work, but on the other hand is
vulnerable to mobile phone crimes.
Common Cyber Crimes Associated
with Cell Phones
1. Bluebugging: As the name suggests this is the
attack on the mobile cell phone through Bluetooth.
Bluetooth is not a stranger term today. Almost every
mobile cell phone is embedded with Bluetooth
technology. We use Bluetooth for sharing photos,
audio or video files etc. Bluebugging allows the
hacker to take over complete control over your
mobile phone. The victim cannot even realize that
his mobile cell phone is attacked, because even if the
Bluetooth device is disabled or turned off the mobile
cell phone can be victim of this attack.
CONTD…
Bluebugging allows the hacker to read the
information in your mobile cell phone, he can access
calendar, address book etc., he can make calls and
even send messages. The hacker can even listen to
the conversation of your mobile phone. Every time
you receive a call on your infected mobile cell phone
the call is also forwarded to the hacker and he can
listen the conversation. In Bluesnarfing the hacker
can commit theft of all the data and information in
your mobile phone using his laptop.
CONTD…
2. Vishing: This is a tool for committing financial crime by
using mobile. Use of mobile making is increased on the
mobile phones. Mobile phones are now used for online
shopping and managing banking transactions. This has made
mobile cell phone an easy victim of Vishing. Motive of the
hacker is to get easy money. These attacks are similar to
phishing attacks. It includes identity theft like credit cards
numbers and other secret information. Scammer calls the
victim and by use of his voice tries to extract the confidential
information of the victim. Therefore every mobile user must
be vigilant towards these fooling calls. We should not be
carried away by the lucrative offers or scheme the scammer
offers us.
CONTD…
3. Malware: This is one of the biggest threats to
mobile cell phones. It is a program (software)
designed to perform malicious activities in the
device infected. Malware enters the mobile cell
phone of victim through SMS, file transfer,
downloading programs from internet etc. Malware
enters and functions in the victim are mobile without
his knowledge and perform several malicious
activities like usage of talk time, etc.
CONTD…
4. Smishing: In this e-age the term “SMS” do not need any
introduction. It signifies Short Message Service. It is a
common term for sharing messages on mobile phone. This
service is the one of the most used service on mobile phones.
Hence criminals are targeting it as a tool to satisfy their greed.
Smishing is a security attack in which the user is sent an SMS
posing as a lucrative service that indulges them into exposing
their personal information which is later misused. This is also
used for introducing a malware in the cell phone of the user.
These are alike Phishing and Vishing attacks in which
personal confidential information is gained and later misused.
In these attacks the criminal obtains the internet banking
passwords, credit card details, email ID and password etc.
CONTD…
5. Identity Theft: Mobile phone is used for the identity
theft and criminals commit the crimes such as
subscription fraud etc. using various communication
devices.
6. Mobile Pornography: The Internet is being highly
used by its abusers to reach and abuse children sexually,
worldwide. The internet is very fast becoming a
household commodity. As more homes have access to
internet, more children would be using the mobiles,
communications devices, internet and more are the
chances of falling victim to the aggression of pedophiles.
CONTD…
Mobile Pornography using mobile phone could be brought
specifically within the ambit of section 67B of the amended
Indian Information Technology Act 2000. The said act is a
crime, punishable with imprisonment of either description
for a term which may extend to 5 years and with fine which
may extend to 10 lakh rupees.
7. Mobile Phishing: This refers to the act of targeting
mobile phone users by phishing emails that appear to come
from mobile service providers.
This further includes the act of sending an e-mail to a user
falsely claiming to be an established legitimate enterprise in
an attempt to scam the user into surrendering private
information that will be used for identity theft.
Mobile Cell Phones and the
Information Technology Act, 2000
• As per definition of term “computers”, as provided by
Section 2(i) of the IT Act, mobile phones are
encompassed in the definition of a computer. Mobile
phones are been used for exchange of information.
• As per Section 2(r) of the IT Act, “electronic form”,
with reference to information, means any information
generated, sent, received or stored in media, magnetic,
optical, computer memory, micro film, computer
generated micro fiche or similar device…. . Thus any
information shared on the mobile phone though it may
be talks, text or entry of information they are
encompassed in the purview of the IT Act.
CONTD…
• Section 66A of The IT Act, provides for punishment
for sending offensive messages through
communication service etc.
• This provision of law is parallel provision to Sections
294, 504, 506, 507 and 509 of Indian Penal Code,
1860 only difference is that in this provisions of law
the criminal uses his cell phone or computer to
express the offensive feeling.
• The punishment prescribed under this section is
imprisonment for a term which may extend to three
years and with fine.
CONTD…
• This section is embedded with an explanation which
states that for the purpose of this section, terms
electronic mail and electronic mail message means a
message or information created or transmitted or
received on a computer, computer system, computer
resource or communication device including
attachments in text, image, audio, video and any other
electronic record, which may be transmitted with the
message.
• This explanation widens the scope of this section and
assures that the criminal cannot escape his liability.
CONTD…
• Newly added provision in the IT Act in the form of Section
67(A) provides for punishment for publishing or
transmitting of material containing sexually explicit act,
etc., in electronic form.
• This is most important for teenagers. The trends of sharing
pornography material on cell phones are on increase.
• The incident of indecent MMS is not unknown to anyone.
• This provision of law books those who publishes or
transmits or causes to be published or transmitted in the
electronic form any material which contains sexually
explicit act or conduct.
CONTD…
• This provision of law is analogous to provisions of
Sections 292 and 292A of the Indian Penal Code,
1860.
• It provides for a punishment on first conviction for
imprisonment of either description for a term
which may extend to five years and with fine
which may extend to ten lakh rupees.
• In the even to second or subsequent conviction for
imprisonment of either description for a term
which may extend to seven years and also with
fine which may extend to ten lakh rupees.
CONTD…
• This provision of law elaborates Section 67 which provides for
punishment for publishing or transmitting obscene material in
electronic form.
• Whoever publishes or transmits or causes to be published or
transmitted in the electronic form, any material which is
lascivious or appeals to the prurient interest or if its effect is such
as to tend to deprave and corrupt persons who are likely, having
regard to all relevant circumstances, to read, see or hear the
matter contained or embodied in it, shall be punished on first
conviction with imprisonment of either description for a term
which may extend to three years and with fine which may extend
to five lakh rupees and in the event of second or subsequent
conviction with imprisonment of either description for a term
which may extend to five years and also with fine which may
extend to ten lakh rupees.
Landmark Mobile Cyber Crime
Cases
• State of Tamil Nadu v. Suhas Katti
In this the accused posted obscene, defamatory and annoying
messages to the divorcee woman in the yahoo message group
created by a false email account. The accused forced her to
marry him. The woman filed a case of harassment through
internet.
• Cyber Stalking Case
This case is also known as Ritu Kohli case. In this the victim
was stalked by the accused named Munish Kathuria. Victim
received around fourty obsence calls on odd hours for
consecutive three days. Woman lodged an FIR to Delhi Police
and police traced the IP address of Kathuria and arrested him.
Conclusion
• A mobile phone is just like a match stick.
• A match stick can ignite a lamp and can also ablaze a house.
• Choice is of the person having it.
• Alike is with mobile technology you can use it to make you
life simpler, or for satisfying you selfish gain by misusing it.
• As we are careful while using match stick in home, and keep
it in safe place out of the reach of children. A mobile phone
also should be used with caution. Your ignorance can bring
you in trouble.
CONTD…
• People must be vigilant and educated towards the game of dirty
business played on mobile phones.
• A certain class of people is exploiting the technology.
• All the glitters is never gold must be remembered by mobile
users.
• People must be sensitive towards suspicious or malicious
information received on their mobile phones. They shall
forthwith report against it.
• This will ensure not only their security but security of others
too.
• Care also should be taken when we are shopping online; know
as much as you can about the site, its policies and procedures.
CONTD…
• Never share our personal information with stranger on
mobile phones.
• Also no secret information like passwords, PIN, credit
card details etc., must be stored on the mobile phone.
• Precaution is the only means to stay secured in this e-
world.
• In this e-world one must never forget the words of
Fransis Bacon that knowledge is power, because in the
world of computers, more you know about computers,
the more you will know that you don’t know!

Contenu connexe

Tendances

Law and Emerging Technology (LLB -405)
 Law and Emerging Technology (LLB -405) Law and Emerging Technology (LLB -405)
Law and Emerging Technology (LLB -405)cpjcollege
 
Overlap between copyright & trademark
Overlap between copyright & trademarkOverlap between copyright & trademark
Overlap between copyright & trademarkAltacit Global
 
O. XXXIX Temporary injunctions and interlocutory orders of CPC,1908
O. XXXIX Temporary injunctions and interlocutory orders of CPC,1908O. XXXIX Temporary injunctions and interlocutory orders of CPC,1908
O. XXXIX Temporary injunctions and interlocutory orders of CPC,1908AMITY UNIVERSITY RAJASTHAN
 
Church of god v kkr majestic colony
Church of god v kkr majestic colonyChurch of god v kkr majestic colony
Church of god v kkr majestic colonyVishy Vincent
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenitysneha164
 
Roots of Indian IT ACT 2000- UNCITRAL
Roots of Indian IT ACT 2000-  UNCITRALRoots of Indian IT ACT 2000-  UNCITRAL
Roots of Indian IT ACT 2000- UNCITRALRahul Gurnani
 
Intelectual property right and Passing Off
Intelectual property right and Passing OffIntelectual property right and Passing Off
Intelectual property right and Passing OffPARTH PATEL
 
Extenal aids to construction of Law
Extenal aids to construction of LawExtenal aids to construction of Law
Extenal aids to construction of LawTejas Shah
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxRahul Bharati
 
Medical technology and forensic science
Medical technology and forensic scienceMedical technology and forensic science
Medical technology and forensic scienceSrishtiBansal20
 
Concept of passing off sem vi
Concept of passing off   sem viConcept of passing off   sem vi
Concept of passing off sem viatuljaybhaye
 
Law of Crimes-I ( LLB -205)
 Law of Crimes-I  ( LLB -205)  Law of Crimes-I  ( LLB -205)
Law of Crimes-I ( LLB -205) cpjcollege
 
Admin law- rule of law
Admin law- rule of lawAdmin law- rule of law
Admin law- rule of lawKhyatiTongia
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in indiaAdv Prashant Mali
 
Scope & Objectives of IT Act 2000.pptx
Scope & Objectives of IT Act 2000.pptxScope & Objectives of IT Act 2000.pptx
Scope & Objectives of IT Act 2000.pptxPokemonOriginals
 

Tendances (20)

Law and Emerging Technology (LLB -405)
 Law and Emerging Technology (LLB -405) Law and Emerging Technology (LLB -405)
Law and Emerging Technology (LLB -405)
 
Overlap between copyright & trademark
Overlap between copyright & trademarkOverlap between copyright & trademark
Overlap between copyright & trademark
 
O. XXXIX Temporary injunctions and interlocutory orders of CPC,1908
O. XXXIX Temporary injunctions and interlocutory orders of CPC,1908O. XXXIX Temporary injunctions and interlocutory orders of CPC,1908
O. XXXIX Temporary injunctions and interlocutory orders of CPC,1908
 
Church of god v kkr majestic colony
Church of god v kkr majestic colonyChurch of god v kkr majestic colony
Church of god v kkr majestic colony
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenity
 
Roots of Indian IT ACT 2000- UNCITRAL
Roots of Indian IT ACT 2000-  UNCITRALRoots of Indian IT ACT 2000-  UNCITRAL
Roots of Indian IT ACT 2000- UNCITRAL
 
Intelectual property right and Passing Off
Intelectual property right and Passing OffIntelectual property right and Passing Off
Intelectual property right and Passing Off
 
Extenal aids to construction of Law
Extenal aids to construction of LawExtenal aids to construction of Law
Extenal aids to construction of Law
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
 
The advocates act, 1961
The advocates act, 1961The advocates act, 1961
The advocates act, 1961
 
Types of deviances
Types of deviancesTypes of deviances
Types of deviances
 
Interpretation of statute
Interpretation of statuteInterpretation of statute
Interpretation of statute
 
LLB LAW NOTES ON LAW OF HUMAN RIGHTS
LLB LAW NOTES ON LAW OF HUMAN RIGHTSLLB LAW NOTES ON LAW OF HUMAN RIGHTS
LLB LAW NOTES ON LAW OF HUMAN RIGHTS
 
Medical technology and forensic science
Medical technology and forensic scienceMedical technology and forensic science
Medical technology and forensic science
 
Concept of passing off sem vi
Concept of passing off   sem viConcept of passing off   sem vi
Concept of passing off sem vi
 
Interpretation of Penal Statutes
Interpretation of Penal StatutesInterpretation of Penal Statutes
Interpretation of Penal Statutes
 
Law of Crimes-I ( LLB -205)
 Law of Crimes-I  ( LLB -205)  Law of Crimes-I  ( LLB -205)
Law of Crimes-I ( LLB -205)
 
Admin law- rule of law
Admin law- rule of lawAdmin law- rule of law
Admin law- rule of law
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Scope & Objectives of IT Act 2000.pptx
Scope & Objectives of IT Act 2000.pptxScope & Objectives of IT Act 2000.pptx
Scope & Objectives of IT Act 2000.pptx
 

Similaire à Law Emerging Tech Cyber Crime Mobile Crimes

Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?acijjournal
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?FarjanaMitu3
 
Mobile computing application risks in Zimbabwe
Mobile computing application risks in ZimbabweMobile computing application risks in Zimbabwe
Mobile computing application risks in ZimbabweIOSR Journals
 
Security issues vs user awareness in mobile devices a survey
Security issues vs user awareness in mobile devices  a surveySecurity issues vs user awareness in mobile devices  a survey
Security issues vs user awareness in mobile devices a surveyIAEME Publication
 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)Priyatham Kanigarla
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineIRJET Journal
 
Mobile commerce full
Mobile commerce fullMobile commerce full
Mobile commerce fullSonu Rai
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone SecurityMalasta Hill
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?VISTA InfoSec
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESijfcstjournal
 
An introduction to digital crimes
An introduction to digital crimesAn introduction to digital crimes
An introduction to digital crimesijfcstjournal
 
A study of mobile banking in india
A study of mobile banking in indiaA study of mobile banking in india
A study of mobile banking in indiasilky712
 
DOI : 10.5121/ijist.2013.3201 1 CASHLESS SOCIETY: DRIVE’S AND CHALLENGES IN N...
DOI : 10.5121/ijist.2013.3201 1 CASHLESS SOCIETY: DRIVE’S AND CHALLENGES IN N...DOI : 10.5121/ijist.2013.3201 1 CASHLESS SOCIETY: DRIVE’S AND CHALLENGES IN N...
DOI : 10.5121/ijist.2013.3201 1 CASHLESS SOCIETY: DRIVE’S AND CHALLENGES IN N...ijistjournal
 
3213ijist01
3213ijist013213ijist01
3213ijist01jh1234jh
 

Similaire à Law Emerging Tech Cyber Crime Mobile Crimes (20)

Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
SF 9 FCS UNIT 2.pptx
SF 9 FCS UNIT 2.pptxSF 9 FCS UNIT 2.pptx
SF 9 FCS UNIT 2.pptx
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
Mobile computing application risks in Zimbabwe
Mobile computing application risks in ZimbabweMobile computing application risks in Zimbabwe
Mobile computing application risks in Zimbabwe
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Security issues vs user awareness in mobile devices a survey
Security issues vs user awareness in mobile devices  a surveySecurity issues vs user awareness in mobile devices  a survey
Security issues vs user awareness in mobile devices a survey
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social Decline
 
Mobile commerce full
Mobile commerce fullMobile commerce full
Mobile commerce full
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone Security
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?
 
Smartphones 2015
Smartphones 2015Smartphones 2015
Smartphones 2015
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
 
An introduction to digital crimes
An introduction to digital crimesAn introduction to digital crimes
An introduction to digital crimes
 
A study of mobile banking in india
A study of mobile banking in indiaA study of mobile banking in india
A study of mobile banking in india
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
DOI : 10.5121/ijist.2013.3201 1 CASHLESS SOCIETY: DRIVE’S AND CHALLENGES IN N...
DOI : 10.5121/ijist.2013.3201 1 CASHLESS SOCIETY: DRIVE’S AND CHALLENGES IN N...DOI : 10.5121/ijist.2013.3201 1 CASHLESS SOCIETY: DRIVE’S AND CHALLENGES IN N...
DOI : 10.5121/ijist.2013.3201 1 CASHLESS SOCIETY: DRIVE’S AND CHALLENGES IN N...
 
3213ijist01
3213ijist013213ijist01
3213ijist01
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 

Dernier

ENG7-Q4-MOD3. determine the worth of ideas mentioned in the text listened to
ENG7-Q4-MOD3. determine the worth of ideas mentioned in the text listened toENG7-Q4-MOD3. determine the worth of ideas mentioned in the text listened to
ENG7-Q4-MOD3. determine the worth of ideas mentioned in the text listened toirenelavilla52178
 
IOS PPT.pptx doctrine of stare decisiss
IOS PPT.pptx  doctrine of stare decisissIOS PPT.pptx  doctrine of stare decisiss
IOS PPT.pptx doctrine of stare decisissPothysVaran1
 
Ashutosh Yadav v. State of UP 22nd March, 2024 All HC.pdf
Ashutosh Yadav v. State of UP 22nd March, 2024 All HC.pdfAshutosh Yadav v. State of UP 22nd March, 2024 All HC.pdf
Ashutosh Yadav v. State of UP 22nd March, 2024 All HC.pdfVidit Agrawal
 
Power Point Obligations and contracts Article 1313-1327
Power Point Obligations and contracts Article 1313-1327Power Point Obligations and contracts Article 1313-1327
Power Point Obligations and contracts Article 1313-1327bariajenne
 
OMassmann - Investment into the grid and transmission system in Vietnam (2024...
OMassmann - Investment into the grid and transmission system in Vietnam (2024...OMassmann - Investment into the grid and transmission system in Vietnam (2024...
OMassmann - Investment into the grid and transmission system in Vietnam (2024...Dr. Oliver Massmann
 
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...Rich Bergeron
 
Smarp snapshot 200 -- Google Cloud Next '24
Smarp snapshot 200 -- Google Cloud Next '24Smarp snapshot 200 -- Google Cloud Next '24
Smarp snapshot 200 -- Google Cloud Next '24Jong Hyuk Choi
 
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...Rich Bergeron
 
Anti-Online Sexual Abuse or Exploitation of Children (OSAEC) and Anti-Child S...
Anti-Online Sexual Abuse or Exploitation of Children (OSAEC) and Anti-Child S...Anti-Online Sexual Abuse or Exploitation of Children (OSAEC) and Anti-Child S...
Anti-Online Sexual Abuse or Exploitation of Children (OSAEC) and Anti-Child S...Diamond959916
 
Town of Haverhill's Motion for Summary Judgment on DTC Counterclaims
Town of Haverhill's Motion for Summary Judgment on DTC CounterclaimsTown of Haverhill's Motion for Summary Judgment on DTC Counterclaims
Town of Haverhill's Motion for Summary Judgment on DTC CounterclaimsRich Bergeron
 
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment Case
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment CaseTown of Haverhill's Summary Judgment Motion for Declaratory Judgment Case
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment CaseRich Bergeron
 

Dernier (11)

ENG7-Q4-MOD3. determine the worth of ideas mentioned in the text listened to
ENG7-Q4-MOD3. determine the worth of ideas mentioned in the text listened toENG7-Q4-MOD3. determine the worth of ideas mentioned in the text listened to
ENG7-Q4-MOD3. determine the worth of ideas mentioned in the text listened to
 
IOS PPT.pptx doctrine of stare decisiss
IOS PPT.pptx  doctrine of stare decisissIOS PPT.pptx  doctrine of stare decisiss
IOS PPT.pptx doctrine of stare decisiss
 
Ashutosh Yadav v. State of UP 22nd March, 2024 All HC.pdf
Ashutosh Yadav v. State of UP 22nd March, 2024 All HC.pdfAshutosh Yadav v. State of UP 22nd March, 2024 All HC.pdf
Ashutosh Yadav v. State of UP 22nd March, 2024 All HC.pdf
 
Power Point Obligations and contracts Article 1313-1327
Power Point Obligations and contracts Article 1313-1327Power Point Obligations and contracts Article 1313-1327
Power Point Obligations and contracts Article 1313-1327
 
OMassmann - Investment into the grid and transmission system in Vietnam (2024...
OMassmann - Investment into the grid and transmission system in Vietnam (2024...OMassmann - Investment into the grid and transmission system in Vietnam (2024...
OMassmann - Investment into the grid and transmission system in Vietnam (2024...
 
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...
 
Smarp snapshot 200 -- Google Cloud Next '24
Smarp snapshot 200 -- Google Cloud Next '24Smarp snapshot 200 -- Google Cloud Next '24
Smarp snapshot 200 -- Google Cloud Next '24
 
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
 
Anti-Online Sexual Abuse or Exploitation of Children (OSAEC) and Anti-Child S...
Anti-Online Sexual Abuse or Exploitation of Children (OSAEC) and Anti-Child S...Anti-Online Sexual Abuse or Exploitation of Children (OSAEC) and Anti-Child S...
Anti-Online Sexual Abuse or Exploitation of Children (OSAEC) and Anti-Child S...
 
Town of Haverhill's Motion for Summary Judgment on DTC Counterclaims
Town of Haverhill's Motion for Summary Judgment on DTC CounterclaimsTown of Haverhill's Motion for Summary Judgment on DTC Counterclaims
Town of Haverhill's Motion for Summary Judgment on DTC Counterclaims
 
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment Case
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment CaseTown of Haverhill's Summary Judgment Motion for Declaratory Judgment Case
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment Case
 

Law Emerging Tech Cyber Crime Mobile Crimes

  • 1. Law and Emerging Technology Cyber Crime Mobile Phone Crimes
  • 2. Suggested Readings • 1. Vakul Sharma, Information Technology Law and Practice, Universal Law Publishers, 2011 (3rd Edn.) • 2. Dr Jyoti Rattan, Cyber Laws & Information Technology (For LL.B.), Bharat Law House Pvt Ltd. 2019 (7th Edn.) • 3. Mobile Cell Phones And Cyber Crimes In India: How Safe Are We?, Available on: http://docs.manupatra.in/newsline/articles/Upload/FB574C 6E-CE6A-4D1D-AAEC-69F2639640A2.pdf • 4. Kinds of Mobile Crimes, Available at: https://pavanduggalonmobilelaw.wordpress.com/kinds-of- mobile-crimes/
  • 3. Objectives of the Lecture • The primary objective of this lecture is to help students understand the meaning and nature of mobile phone crimes and its different types. • Also, the students will be able to comprehend the provisions of the IT Act, 2000 which deal with mobile phone crimes in India.
  • 4. Outcome of the Lecture • The first and foremost outcome of the lecture is that the class will be clear with the concept of mobile phone crimes in India. • Also, the class will understand the regulatory framework that is present in India to tackle this menace and also what has been the impact of mobile phones on the lives' of people.
  • 5. Introduction • Telecommunication was introduced in India long back in the year 1882. • There was a mushroom growth of telecommunication after the advent of internet and mobile technology in India. • It was on August 15, 1995 when the first mobile telephone service started on a noncommercial basis in India. • On the same day internet was also introduced in this nation.
  • 6. CONTD… • After the liberation and privatization in this area India didn’t look back; telecommunication conquered life of citizens of India and in no time India’s telecommunication network became the second largest in the world. • In May 2012 there were 929.37 million mobile users in India. • In this dot com era a person is looked with surprise if he is not a mobile user.
  • 7. CONTD… • In today’s world mobile phone is the most important and useful device. • Every person is using at least one phone for their personal or business purpose. • The main cause of increase in use of mobile phones is enhancement of technology taking place. • Earlier, somethings which could be done on computer or laptops could not be done on mobile phones, but now as the technology has improved, every work that you can do on computer or laptop can now easily be done on a mobile phone (also called smartphones), whether it be a work like sending mails, online payment, bank statement, fund transfers and what not, everything can be done by using a smartphone.
  • 8. Impact of Cell Phones on Human Life • Communication technology has left no aspect of human life untouched. • Even our morning alarm clocks are been replaced by the mobile cell phones. • Technology is constantly bringing advancement in our mobile cell phones. • Mobile cell phones have now become new personal laptops and desktops which are having capacity to store as much data as our laptops and desktops are and in additional they are providing flexibility and portability.
  • 9. CONTD… • Internet enabled smart phones, tablets etc…are performing the functions of our computer, but one vital feature is missing and that is security. • Rapid growth in the use of internet enabled mobile cell phones allows us to use manage our banking transaction, official and institutional transactions, rapid communication through email or social networks, and many more. • Virtually we can perform the task of a computer on our mobile; this means alike our computer our mobile phone is also vulnerable to the risk of fraud, theft of financial information and identity theft etc.
  • 10. CONTD… • According to the Section 2(1)(i) of the Information Technology Act 2000, “computer” means any electronic, magnetic, optical or other high-speed data processing device or system which performs logical, arithmetic and memory functions by manipulations of electronic, magnetic or optical impulses, and includes all input, output, processing, storage, computer software or communication facilities which are connected or related to the computer in a computer system or computer network.
  • 11. CONTD… • Thus, smartphones and tablets also falls within the definition of computer as they are capable of performing all the functions of computer whether it be logical, memory functions or of processing, storage or communication.
  • 12. Cell Phones: An Open Door for Cyber Criminals • Recent reports have suggested that with the advancement of the telecommunication technology there is increase in cyber crime in the nation. • The technological advancement provided opportunities to the miscreants in the society, who are using technology for their selfish gains. • There are cases where hackers have breached in Nokia’s Symbian, Apple’s iOS and Google’s android operating system. • Thus to be safe we must be vigilant.
  • 13. CONTD… • But it is really unfortunate that whenever a discussion about cyber crime ignites, a particular class of the people escapes the discussion saying that; they neither use computers nor they use internet for communication and therefore cyber crime is not a threat for them. • People try to hide their ignorance about cyber crimes on the ground that cannot become its victim, but they have absolutely no idea that knowingly or unknowingly they can be adversely affected by cyber crime. • Every person using an internet, blue tooth or even an infra red enabled cell phone can easily be fished in the web of cyber criminals.
  • 14. What is Mobile Phone Crimes? • As the technology increases, crime also increases. We all have heard of Cyber Crime and different ways by which it is happening. • Mobile phone crimes is a part of Cyber Crime and is increasing day by day. • Crimes which are done on mobiles phones are of different ways. • One can hack the whole mobile phone and can do anything with it like access the phone book, go through all the data and details whether it be of someone’s personal details or of their work related.
  • 15. CONTD… • In this age of digitization, the modern applications of all the banks and other digital modes of payment by which one can access their bank accounts and transfer funds using one’s phone only is no doubt a new and easy way to access things and do work, but on the other hand is vulnerable to mobile phone crimes.
  • 16. Common Cyber Crimes Associated with Cell Phones 1. Bluebugging: As the name suggests this is the attack on the mobile cell phone through Bluetooth. Bluetooth is not a stranger term today. Almost every mobile cell phone is embedded with Bluetooth technology. We use Bluetooth for sharing photos, audio or video files etc. Bluebugging allows the hacker to take over complete control over your mobile phone. The victim cannot even realize that his mobile cell phone is attacked, because even if the Bluetooth device is disabled or turned off the mobile cell phone can be victim of this attack.
  • 17. CONTD… Bluebugging allows the hacker to read the information in your mobile cell phone, he can access calendar, address book etc., he can make calls and even send messages. The hacker can even listen to the conversation of your mobile phone. Every time you receive a call on your infected mobile cell phone the call is also forwarded to the hacker and he can listen the conversation. In Bluesnarfing the hacker can commit theft of all the data and information in your mobile phone using his laptop.
  • 18. CONTD… 2. Vishing: This is a tool for committing financial crime by using mobile. Use of mobile making is increased on the mobile phones. Mobile phones are now used for online shopping and managing banking transactions. This has made mobile cell phone an easy victim of Vishing. Motive of the hacker is to get easy money. These attacks are similar to phishing attacks. It includes identity theft like credit cards numbers and other secret information. Scammer calls the victim and by use of his voice tries to extract the confidential information of the victim. Therefore every mobile user must be vigilant towards these fooling calls. We should not be carried away by the lucrative offers or scheme the scammer offers us.
  • 19. CONTD… 3. Malware: This is one of the biggest threats to mobile cell phones. It is a program (software) designed to perform malicious activities in the device infected. Malware enters the mobile cell phone of victim through SMS, file transfer, downloading programs from internet etc. Malware enters and functions in the victim are mobile without his knowledge and perform several malicious activities like usage of talk time, etc.
  • 20. CONTD… 4. Smishing: In this e-age the term “SMS” do not need any introduction. It signifies Short Message Service. It is a common term for sharing messages on mobile phone. This service is the one of the most used service on mobile phones. Hence criminals are targeting it as a tool to satisfy their greed. Smishing is a security attack in which the user is sent an SMS posing as a lucrative service that indulges them into exposing their personal information which is later misused. This is also used for introducing a malware in the cell phone of the user. These are alike Phishing and Vishing attacks in which personal confidential information is gained and later misused. In these attacks the criminal obtains the internet banking passwords, credit card details, email ID and password etc.
  • 21. CONTD… 5. Identity Theft: Mobile phone is used for the identity theft and criminals commit the crimes such as subscription fraud etc. using various communication devices. 6. Mobile Pornography: The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. The internet is very fast becoming a household commodity. As more homes have access to internet, more children would be using the mobiles, communications devices, internet and more are the chances of falling victim to the aggression of pedophiles.
  • 22. CONTD… Mobile Pornography using mobile phone could be brought specifically within the ambit of section 67B of the amended Indian Information Technology Act 2000. The said act is a crime, punishable with imprisonment of either description for a term which may extend to 5 years and with fine which may extend to 10 lakh rupees. 7. Mobile Phishing: This refers to the act of targeting mobile phone users by phishing emails that appear to come from mobile service providers. This further includes the act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.
  • 23. Mobile Cell Phones and the Information Technology Act, 2000 • As per definition of term “computers”, as provided by Section 2(i) of the IT Act, mobile phones are encompassed in the definition of a computer. Mobile phones are been used for exchange of information. • As per Section 2(r) of the IT Act, “electronic form”, with reference to information, means any information generated, sent, received or stored in media, magnetic, optical, computer memory, micro film, computer generated micro fiche or similar device…. . Thus any information shared on the mobile phone though it may be talks, text or entry of information they are encompassed in the purview of the IT Act.
  • 24. CONTD… • Section 66A of The IT Act, provides for punishment for sending offensive messages through communication service etc. • This provision of law is parallel provision to Sections 294, 504, 506, 507 and 509 of Indian Penal Code, 1860 only difference is that in this provisions of law the criminal uses his cell phone or computer to express the offensive feeling. • The punishment prescribed under this section is imprisonment for a term which may extend to three years and with fine.
  • 25. CONTD… • This section is embedded with an explanation which states that for the purpose of this section, terms electronic mail and electronic mail message means a message or information created or transmitted or received on a computer, computer system, computer resource or communication device including attachments in text, image, audio, video and any other electronic record, which may be transmitted with the message. • This explanation widens the scope of this section and assures that the criminal cannot escape his liability.
  • 26. CONTD… • Newly added provision in the IT Act in the form of Section 67(A) provides for punishment for publishing or transmitting of material containing sexually explicit act, etc., in electronic form. • This is most important for teenagers. The trends of sharing pornography material on cell phones are on increase. • The incident of indecent MMS is not unknown to anyone. • This provision of law books those who publishes or transmits or causes to be published or transmitted in the electronic form any material which contains sexually explicit act or conduct.
  • 27. CONTD… • This provision of law is analogous to provisions of Sections 292 and 292A of the Indian Penal Code, 1860. • It provides for a punishment on first conviction for imprisonment of either description for a term which may extend to five years and with fine which may extend to ten lakh rupees. • In the even to second or subsequent conviction for imprisonment of either description for a term which may extend to seven years and also with fine which may extend to ten lakh rupees.
  • 28. CONTD… • This provision of law elaborates Section 67 which provides for punishment for publishing or transmitting obscene material in electronic form. • Whoever publishes or transmits or causes to be published or transmitted in the electronic form, any material which is lascivious or appeals to the prurient interest or if its effect is such as to tend to deprave and corrupt persons who are likely, having regard to all relevant circumstances, to read, see or hear the matter contained or embodied in it, shall be punished on first conviction with imprisonment of either description for a term which may extend to three years and with fine which may extend to five lakh rupees and in the event of second or subsequent conviction with imprisonment of either description for a term which may extend to five years and also with fine which may extend to ten lakh rupees.
  • 29. Landmark Mobile Cyber Crime Cases • State of Tamil Nadu v. Suhas Katti In this the accused posted obscene, defamatory and annoying messages to the divorcee woman in the yahoo message group created by a false email account. The accused forced her to marry him. The woman filed a case of harassment through internet. • Cyber Stalking Case This case is also known as Ritu Kohli case. In this the victim was stalked by the accused named Munish Kathuria. Victim received around fourty obsence calls on odd hours for consecutive three days. Woman lodged an FIR to Delhi Police and police traced the IP address of Kathuria and arrested him.
  • 30. Conclusion • A mobile phone is just like a match stick. • A match stick can ignite a lamp and can also ablaze a house. • Choice is of the person having it. • Alike is with mobile technology you can use it to make you life simpler, or for satisfying you selfish gain by misusing it. • As we are careful while using match stick in home, and keep it in safe place out of the reach of children. A mobile phone also should be used with caution. Your ignorance can bring you in trouble.
  • 31. CONTD… • People must be vigilant and educated towards the game of dirty business played on mobile phones. • A certain class of people is exploiting the technology. • All the glitters is never gold must be remembered by mobile users. • People must be sensitive towards suspicious or malicious information received on their mobile phones. They shall forthwith report against it. • This will ensure not only their security but security of others too. • Care also should be taken when we are shopping online; know as much as you can about the site, its policies and procedures.
  • 32. CONTD… • Never share our personal information with stranger on mobile phones. • Also no secret information like passwords, PIN, credit card details etc., must be stored on the mobile phone. • Precaution is the only means to stay secured in this e- world. • In this e-world one must never forget the words of Fransis Bacon that knowledge is power, because in the world of computers, more you know about computers, the more you will know that you don’t know!