You are on page 1of 5

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/327436826

Cyber Crime through Mobile Phone in India and Preventive Methods

Article · March 2015

CITATIONS READS
0 12,096

2 authors, including:

Avneet Kaur
Goswami Ganesh Dutta Sanatan Dharam College (GGDSD)
23 PUBLICATIONS   158 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

prenatal diagnosis View project

All content following this page was uploaded by Avneet Kaur on 05 September 2018.

The user has requested enhancement of the downloaded file.


International Journal of Research and Review
www.gkpublication.in ISSN: 2349-9788

Review Article

Cyber Crime through Mobile Phone in India and Preventive Methods


Avneet Kaur Bajaj1, Chander Jyoti2
1
Department of Biotechnology, 2Department of Bioinformatics,
GGDSD College, Sector 32 B, Chandigarh, India.

Corresponding author: Avneet Kaur Bajaj

Received: 25/02/2015 Revised: 11/03/2015 Accepted: 16/03/2015

ABSTRACT

Technology has made human life easier. Though there are many benefits of the technology but we are
also facing a serious threat of cyber crime. One of the examples of technology is mobile phone. Cell
phone advancement in terms of various applications like networking mobile, computing wireless network
is one of the major achievements of the technology. India is second largest user of mobile phone after
China and according to telephone regulatory of India on 31st March 2014, there are around 933 billion
mobile users in India but 50 percent of mobile users in India do not use mobile security solution resulting
in increase mobile cyber threat. Various types of the cyber crime through mobile and their preventive
methods have been discussed in this article.

Keywords: Cyber crime, Prevention of cyber crime, Vishing, Smishing.

INTRODUCTION cloning, cyber stalking, vishing, smishing


Cyber crime is a criminal activity and trojan attack.
through computer and internet. The first Bluebugging: Bluebugging is attack on the
recorded cyber crime took place in the year mobile cell phone through Bluetooth. Every
1820. Communication technology has mobile phone has embedded Bluetooth
touched each and every aspect of human which allows the hacker to take over
life. [‎1] Different types of mobile are complete access of user mobile feature like
introduced in market with better and listing the call, forwarding the call, sending
advanced technology. But due to the misuse the text message. The victim is ignorant of
of same technology, cyber crime is the attack even if the bluetooth device is
increasing heuristically which is affecting disabled or turned off. [‎2]
our society at large extent. Mobile phones Vishing: Vishing originate from two words
provide users mobile access to email, the voice and phishing. User banking account
internet, GPS navigation, and many other information is gained by criminal through
applications. However, Mobile phone voice email and voice over internet protocol.
security is not at pace with computer Vishing attack is common nowadays due to
security. There are various cyber threats due increased mobile banking and online
to mobile like blue bugging, SIM card transactions by mobile user. Main motive of

International Journal of Research & Review (www.gkpublication.in) 110


Vol.2; Issue: 3; March 2015
the hacker is to get money by access of user On the basis of action performed it is being
bank account. [‎3] classified as:
Smishing: Smishing is type of phishing Backdoor: Gained access to infected
which uses short messaging services or text computer, can delete, display and able to
messages on the mobile phones. SMS launch any unwanted program
service is the one of the most used service Trojan-Banker: It has the ability to disable
on mobile phone and an easy tool for hacker online banking security and steals password,
to full fill their greed. Smishing is a security username and account information.
attack in which the user is sent a very Trojan-Spy: Like a spy, it tracks all the
lucrative SMS that compels the user to activities being performed on infected
expose their personal information like computer taking screen shots and sending it
internet banking passwords, credit card to the hackers.
detail etc. Recently these SMS also include Trojan-SMS: This Trojan can send
false online dating subscriptions and job premium SMS from an android mobile
offers. [‎4] phone user and leave account balance to
Cyber stalking: Cyber stalking is use of the zero.
Internet or other electronic means to stalk
someone. This term is used interchangeably MOBILE CYBER CRIME CASE
with online harassment and online abuse. It REPORTS
involves following the victim online, 1. State of Tamil Nadu Vs Suhas Katti. This
making harassing call, leaving written case is related to posting of obscene,
messages and tracking the various activity. defamatory and annoying message to
There are ways of cyber stalking like E-mail divorcee woman in the yahoo message
stalking, Internet Stalking and Computer group by the accused through a false email
Stalking. [‎5] account. The accused start pressurizing her
SMS spoofing: One of the major problem to marry her and on her reluctance to marry
with SMS based banking are SMS Spoofing him, the accused took up the harassment
which is an attack where malicious user through the Internet. Eventually marriage
sends out SMS message which appears to be ended in divorce and conviction of the
sent by original sender. End-to-end accused. The court relied upon the expert
encryption of the SMS message is not witnesses and other evidences (cyber café
available. SMS spoofing is when the identity owner statement) produced before it. This is
of the sender is taken over by a hacker. SMS considered as the first case in Tamil Nadu,
messages are sent for free by the hacker in which the offender was convicted under
whilst the victim is charged for sending this section 67 of Information Technology Act
fraudulent traffic. [‎6] 2000 in India. [‎8]
Trojan horse: "Trojan horse" name 2. Cyber Stalking Case: Ritu Kohali case
originate in the past from Greek mythology was the first case in India dealing with cyber
indicating a large horse built for gaining stalking. Victim was stalked by Munish
entrance into Troy city during Trojan War. Kutharia. As a result she received around
But now-a-days it is synonym for non- forty obscene telephone calls at odd hours
replicating malicious programs that perform for consecutive three days. She lodged a
actions of deleting, blocking, modifying and complained to Delhi Police and police traced
copying data that have not been authorised IP address and Kutharia was arrested. Delhi
by‎ the‎ user.‎ It‎ can‎ be‎ used‎ to‎ steal‎ other’s‎ police registered the case under section of
information by network attacker. [‎7] 509 of Indian Penal Code. [‎9]
International Journal of Research & Review (www.gkpublication.in) 111
Vol.2; Issue: 3; March 2015
Preventive Measurements: No matter
3. SMS Spoofing Case: There are several cyber threat is increasing; the remedy lies in
cases of people losing money through SMS our hand. Small steps in this regard will help
spoofing. One such case is of 52 year old to protect cyber crime which is as follows.
graduate women of Mylapur that she has Awareness: People should be aware
won a cash prize in Indian currency. She had regarding different threat of cyber mobile
to deposit token money to get the prize. She threat through TV, internet, magazine etc.
[‎14]
didn’t‎ get any amount but lost Rs. 57 lakh.
[‎10]
Another case is of 400 million SMS scan Strong Antivirus Software: Mobile devices
in Mumbai in which two bother in Mumbai should always be updated with strong
took the help of SMS technology and antivirus which prevent from viruses,
messages on random number and asked the malware, Trojan horses and unwanted
people to earn ten thousand per month. It software. [‎15]
was advertised that each interested people Be Careful while using social site: Posting
need to deposit five hundred. [‎11] photograph to various social networking site
people should be careful as one can save
Law Against Mobile Cyber Threat In those picture and can post those picture for
India wrong deeds.
Today use of internet through mobile Strong Password: One should choose
is very common but criminal activities strong password using special character,
through mobile are also increasing day by upper and lower case.
day. To stop such type of activity strict law Hiding Personal Information: People
should be implemented. Cyber law is usually received many mail and messages to
constantly being evolved as new challenges give their account number so that sender can
are surfacing every day. [‎12] Earlier cyber send money of cash prize to their account.
stalking is not covered under section of 509. Never respond to such type of messages and
Ritu Kohli case was an alarm to mail. Avoid frequent use of online shopping
Government to make the law against cyber and banking.
mobile threat. Cyber law has introduced to
various sectors to deal with mobile threaten. REFERENCES
1. Section 66A deals with sending offensive 1. Hemraj Saini, Yerra Shankar Rao,
messages through communication services. T.C.Panda,‎ “Cyber-Crimes and their
Imprisonment of three year jail is given as Impacts:‎ A‎ Review”,‎ vol.‎ 2,‎ March-
punishment under this attack. April 2012, pp.202-209.
2. Nikhil‎ A.‎ Gupta,‎ “Mobile‎ Cell‎ Phones‎
2. Section 67 deals with publishing or and Cyber Crimes in India How Safe are
transmitting obscene material in electronic we?”‎ vol.‎ 4,‎ February‎ 2014,‎ pp.‎ 427-
form. Corrupt person is punished for five 429.
year jail and fine of ten lakh rupee is 3. Ezer Osei Yeboah-Boateng, Priscilla
imposed. Mateko‎Amanor,‎“Phishing,‎Smishing‎&‎
This section has historical importance as Vishing: An Assessment of Threats
landmark judgment was given in famous against‎ Mobile‎ Devices”,‎ vol.‎ 5,‎ April‎
case‎ of‎ “State‎ of‎ Tamil‎ Nadu‎ vs‎ Sushas‎ 2014, pp.297-307.
Katti”‎on‎5‎November‎2004‎under this act. 4. Nilay Mistry, H. P. Sanghvi, Dr. M. S.
3. Section 67A deals with publishing or Dahiya.‎ Dr.‎ J.‎ M.‎ Vyas,‎ “Preventive‎
transmitting material containing sexually Actions to Emerging Threat in Smart
explicit act in electronic form. [‎13]
International Journal of Research & Review (www.gkpublication.in) 112
Vol.2; Issue: 3; March 2015
Devices‎Security”,‎vol.‎1,‎May‎2013,‎pp.‎ 10. K.N.‎Basha,‎“Seminar‎and‎Workshop‎on‎
20-26. Detection of Cyber Crime and
5. Anju‎Thapa‎and‎Dr.‎Raj‎Kumar,‎“Cyber‎ Investigation,”unpublished.
Stalking: Crime and Challenge at the 11. “Audit‎ of‎ Fraud,‎ Fraud‎ Detcetion‎
Cyberspace”,‎ vol.‎ 2,‎ 2011,‎ pp.‎ 2229- Technique& Forensic Audit, Case Study
6166. on Cyber Crimes. Indian Audit &
6. Manoj‎V,‎Bramhe,‎“SMS Based Secure Accounts‎Departments”,‎unpublished.
Mobile‎Banking”,‎vol.‎3,‎2011,‎pp.‎472- 12. Taraq‎ Hussain‎ Sheakh,‎ “Cyber‎ Law:‎‎‎‎
479. Provisions and Anticipation”,‎ vol‎ 53,‎
7. Daniel‎Petri‎“An Introduction to Trojan Sep, 2012, pp. 10-12.
Horse‎VIRUS”,‎unpublished. 13. www.cyberlawsindia.net
8. Dr.‎ A.‎ Prasanna,‎ “Cyber‎ Crime:‎ Law‎ 14. Vinay‎ Kumar‎ D.,‎ “Cyber‎ Crime‎
and‎Practice,”unpublished. Prevention‎and‎Role‎of‎Libraries”,‎vol‎3,‎
9. Ashwani‎Tanwar,‎“Legal‎Perspective‎of‎ pp 222-224.
Cyber‎ Crimes‎ in‎ India,”‎ vol.‎ 3,‎ Feb‎ 15. Vineet‎Kandpal‎and‎R.‎K.‎Singh,‎“Latest‎
2012, pp. 35-36. Face of Cybercrime and Its Prevention
in‎India,”‎vol‎2,‎2013,‎pp.‎150-156.

How to cite this article: Bajaj AK, Jyoti C. Cyber crime through mobile phone in India and preventive
methods. Int J Res Rev. 2015; 2(3):110-113.

**************

International Journal of Research & Review (www.gkpublication.in) 113


Vol.2; Issue: 3; March 2015

View publication stats

You might also like