You are on page 1of 38

‘CYBER CRIME’

A seminar report submitted in partial fulfilment of

the requirements for the award of the degree of

BACHELOR OF TECHNOLOGY
In
COMPUTER SCIENCE ENGINEERING
By

NAME: -KSHIROD MAHALA


REGD. NO: - 2001320057

Under the supervision of


Asst. Prof. Mohammad Shahil Khan
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING

ARYAN INSTITUTE OF ENGINEERING AND TECHNOLOGY


ARYABIHAR, BHUBANESWAR
PIN-752050

[1]
CERTIFICATE

This to certify that the seminar on CYBER CRIME is a Bonafide work carried out by
KSHIROD MAHALA in partial fulfilment of the requirements for the award of Degree of
Bachelor of Technology in Computer Science Engineering from the Aryan Institute of
Engineering and Technology Arya Vihar, Bhubaneswar during the academic year 2023-
24. It is certified that the seminar report satisfies the academic requirement in respect of
seminar work described for the Bachelor of Engineering degree.

Seminar Guide Seminar Co-Ordinator Head of


department

(Asst. Prof. Shahil Khan) (Asst. Prof. Prakash Kumar Dehury) (Prof. Aparna
Rajesh)

[2]
ACKNOWLEDGEMENT

My sincere thanks to Prof. Aparna Rajesh, Head of Department Computer Science


Engineering for his wholehearted support in complementation of the seminar.

I am highly indebted to my seminar co-ordinator and my seminar guide Asst. Prof.


Mohammad Shahil Khan for guiding and giving timely advice and suggestion in the
successful completion of the seminar.

Last but not least, I would like to thank The Teaching & Non-Teaching Staff of Computer
Science Engineering Department, I would like to thank one and all who have helped me
during the course of this seminar.

NAME: -Kshirod mahala


REGD NO: -2001320057

[3]
ABSTRACT OF CYBER-CRIME

Cyber” refers to imaginary space, which is created when the electronic devices.
communicate, like network of computers. Cyber-crime refers to anything done in the cyberspace with a
criminal intent. These could be either the criminal activities in the conventional sense or
could be activities, newly evolved with the growth of the new medium. Cyber-crime includes
acts such as hacking, uploading obscene content on the Internet, sending obscene e-mails and
hacking into a person's e-banking account to withdraw money. Computer crime, or cybercrime, refers
to any crime that involves a computer and a network, where the computers played an instrumental
part in the commission of a crime. Cyber Crime has nowhere been defined in any statute
/Act passed or enacted by the Indian Parliament. The concept of cyber crime is notradically
different from the concept of conventional crime. Both include conduct whether act or omission, which
cause breach of rules of law and counterbalanced by the sanction of the state .particularly
those surrounding hacking, copyright infringement through warez, child pornography
and child grooming.

The term „cybercrime‟ is a misnomer. This term has nowhere been defined in any
statute /Act passed or enacted by the Indian Parliament. The concept of cybercrime is not
radically different from the concept of conventional crime. Both include conduct whether act or omission,
which cause breach of rules of law and counterbalanced by the sanction of the state

[4]
CONTENT

1. INTRODUCTION…………………………………………………………6

2. TYPES OF CYBER CRIMES……………………………………………10

3. IMPACT OF CYBER CRIME…………………………………………...12

4. CHALLENGES IN CYBER CRIMES……………………………………15

5. SOLUTIONS……………………………………………………………….17

6. CURRENT TRENDS………………………………………………………20

7. CYBER CRIMES AND FRAUDS IN INDIA…………………………….23

8. FUTURE OF CYBER CRIME……………………………………………26

9. CONCLUSION…………………………………………………………….35

10. REFERENCES…………………………………………………………….36

[5]
1. INTRODUCTION TO CYBER CRIME:

1.1 Introduction

Cybercrime or a computer-oriented crime is a crime that includes a computer and a


network. The computer may have been used in the execution of a crime or it may be the
target. Cybercrime is the use of a computer as a weapon for committing crimes such as
committing fraud, identity theft, or breaching privacy. Cybercrime, especially through the
Internet, has grown in importance as the computer has become central to every field like
commerce, entertainment, and government. Cybercrime may endanger a person or a
nation’s security and financial health. Cybercrime encloses a wide range of activities, but
these can generally be divided into two categories:

1. Crimes that aim at computer networks or devices. These types of crimes involve
different threats (like virus, bugs etc.) and denial-of-service (DoS) attacks.
2. Crimes that use computer networks to commit other criminal activities. These types
of crimes include cyber stalking, financial fraud or identity theft.

Classification of Cyber Crime:


1. Cyber Terrorism –
Cyber terrorism is the use of the computer and internet to perform violent acts
that result in loss of life. This may include different type of activities either by
software or hardware for threatening life of citizens.
In general, Cyber terrorism can be defined as an act of terrorism committed
using cyberspace or computer resources.

[6]
2. Cyber Extortion –
Cyber extortion occurs when a website, e-mail server or computer system is
subjected to or threatened with repeated denial of service or other attacks by
malicious hackers. These hackers demand huge money in return for assurance to
stop the attacks and to offer protection.

3. Cyber Warfare –
Cyber warfare is the use or targeting in a battle space or warfare context of
computers, online control systems and networks. It involves both offensive and
defensive operations concerning to the threat of cyber-attacks, espionage and
sabotage.

4. Internet Fraud –
Internet fraud is a type of fraud or deceit which makes use of the Internet and
could include hiding of information or providing incorrect information for the
purpose of deceiving victims for money or property. Internet fraud is not
considered a single, distinctive crime but covers a range of illegal and illicit
actions that are committed in cyberspace.

5. Cyber Stalking –
This is a kind of online harassment wherein the victim is subjected to a barrage
of online messages and emails. In this case, these stalkers know their victims
and instead of offline stalking, they use the Internet to stalk. However, if they
notice that cyber stalking is not having the desired effect, they begin offline
stalking along with cyber stalking to make the victims’ lives more miserable.

As technology advances, so does the sophistication of cyber threats, posing a significant


challenge for individuals and organizations. In this digital age, it has become imperative to
understand the various forms of cybercrime that lurk in the shadows of the virtual realm and
arm ourselves with the knowledge to protect our data, privacy, and online presence. Whether

[7]
you're a seasoned internet user or just getting started, join us to explore the depths of
cybercrime and empower yourself with the tools needed to navigate safely through the
interconnected world. Get ready to fortify your digital defenses and stay one step ahead of
potential threats.

In this insightful blog, we will learn what is cybercrime, look at some cybercrime examples,
and learn about the prevention of cybercrime. Let's begin the quest to secure our cyber
landscape together

Cybercrime remains a constantly evolving and complex challenge. Prevention of cybercrime


requires a combination of cybersecurity measures, user awareness, cybercrime information,
and responsible digital practices to safeguard personal and sensitive data from falling into the
wrong hands.

In the context of cybersecurity, cybercrime refers to any illegal or criminal activity that is
committed using computer networks, systems, or digital devices as a medium. It is essential
to cybersecurity because understanding cybercrime helps professionals develop strategies and
technologies to protect against such criminal activities.
In the world of cybersecurity, experts work to prevent, detect, and respond to cybercrime by
implementing various security measures, developing robust cybersecurity protocols,
conducting regular security assessments, and staying updated on emerging threats and attack
techniques. The fight against cybercrime is an ongoing challenge, as cybercriminals
continually adapt their tactics to exploit vulnerabilities and target individuals, organizations,
and governments.

The relationship between cybercrime and security is a constant battle between malicious
actors seeking to exploit vulnerabilities and cybersecurity professionals striving to safeguard

[8]
against these threats. As cybercriminals develop new attack techniques, security experts must
continually adapt and innovate to counter those threats effectively.
Moreover, with the power of Data Science, experts can also prevent cyber crimes, and it is
safe to say that in the future, AI and ML will play a crucial role in cybercrime prevention.

Cybercrime Examples:

 Phishing: Attempting to deceive individuals into sharing sensitive information such


as passwords, credit card details, or personal data by posing as a trustworthy entity.
 Malware Attacks: Distributing malicious software like viruses, worms, ransomware,
or spyware to infect and gain unauthorized access to computer systems.
 Hacking: Unauthorized entry into computer systems or networks to access, modify,
or steal information.
 Identity Theft: Stealing personal information to assume another person's identity for
fraudulent purposes.
 Distributed Denial of Service (DDoS) Attacks: Overloading a website or online
service with excessive traffic to disrupt its normal functioning and make it unavailable
to users.
 Cyberstalking and Cyberbullying: Harassment or threatening behavior directed at
individuals using digital communication channels.
 Data Breaches: Unauthorized access and exposure of sensitive information from
databases, resulting in potential misuse.
 Online Scams: Deceptive schemes, such as fake online marketplaces or investment
opportunities, to defraud victims of their money.
 Social Engineering: Manipulating individuals through psychological tactics to
divulge confidential information or perform specific actions

[9]
2. TYPES OF CYBER CRIMES

 Targeting computers-
This type of cybercrimes includes every possible way that can lead to harm to
computer devices for example malware or denial of service attacks.

 Using computers-
This type includes the usage of computers to do all the classifications of computer
crimes.

2.1 Classifications of Cybercrimes

Cybercrimes in general can be classified into four categories:


1. Individual Cyber Crimes:
This type is targeting individuals. It includes phishing, spoofing, spam, cyberstalking, and
more.
2. Organisation Cyber Crimes:
The main target here is organizations. Usually, this type of crime is done by teams of
criminals including malware attacks and denial of service attacks.
3. Property Cybercrimes:
This type targets property like credit cards or even intellectual property rights.
4. Society Cybercrimes:
This is the most dangerous form of cybercrime as it includes cyber-terrorism.

[10]
2.2 Cybercriminals?

A cybercriminal is a person who uses his skills in technology to do malicious acts and illegal
activities known as cybercrimes. They can be individuals or teams.

Cybercriminals are widely available in what is called the “Dark Web” where they mostly
provide their illegal services or products.

Not every hacker is a cybercriminal because hacking itself is not considered a crime as it can
be used to reveal vulnerabilities to report and batch them which is called a “white hat
hacker”.

However, hacking is considered a cybercrime when it has a malicious purpose of conducting


any harmful activities and we call this one “black hat hacker” or a cyber-criminal.

It is not necessary for cybercriminals to have any hacking skills as not all cyber crimes
include hacking.

Cybercriminals can be individuals who are trading in illegal online content or scammers or
even drug dealers. So here are some examples of cybercriminals:
- Black hat hackers
- Cyberstalks
- Cyber terrorists
- Scammers

[11]
3. IMPACT OF CYBER CRIMES

Crime as a bad social factor Because a crime-free culture is an illusion, crime is a pervasive
phenomenon and an inseparable element in social life, the question "Why is there so much
crime uproar?" is irritating. Crime, as one of the characteristic features of any society,
whether civilized or undeveloped, and one of the basic impulses of human behavior, is
nothing new. It is omnivilized, ubiquitous, and there is nothing new about crime. However,
social anxiety about high crime should be considered not because of its origin, but because of
the potential disorders it causes society. In addition, several people are specifically victims of
violence. Anything meaningful can be lost to the survivor. Security, harmony, money and
possessions can be essential virtues because they can satisfy several desires. Impact of
cybercrime on social and environmental policies Crime is a complex and relative
phenomenon conceptually and is subject to relative sociopolitical and economic shifts in
contemporary social systems. As a result, no systematic understanding of all forms of "crime"
is available in a given period and cannot be applied to a single definition in any culture. It is
influenced by the variations of related phenomena and the value framework generated by
these shifts with their dynamics. A definite increase in corruption-based crimes, where there
is little social moralizing and the commission of crime is undermined by less social shame, is
taken for granted in today's situation where money is more important than ideals. However,
economic crime is at its peak. This directly shows that crime is interdependent on other social
phenomena, economic processes and political machines. Demographics are also one of the
main variables that influence the impact of crime. A strong correlation was found between
the increase in the incidence of crime and the population of the region. Other variables that
determine crime include the situation in a particular locality, the degree of urbanization,
demographic displacement from surrounding countries, housing, economic differences,
[technological literacy in the field of cybercrime], etc. 2 At about the same time, economic
crimes are also affected by the social donation system. Because every crime prevention
scheme has something to do with the political system prescribing norms, making laws,
creating protective measures, the political process and mechanism affects crime in a
particular community. This clearly shows that the concept of crime is related to socio-
economic and political conditions. The impact of cybercrime on young people Cyberbullying

[12]
is the biggest fear in the minds of young people today. It has been widespread in the last five
years, mostly from the age of under 18, and cyberbullying is the most sensitive and feared
inspection. This is becoming a disturbing pattern in our culture. Young women have the
worst fear of cybercrime, according to the results check. Cyberbullying is the fear of being
attacked, negativity or derogatory photos or comments of another person. This is primarily
achieved through the key online technology mentioned above. You can chat, text, etc.

Where websites like Facebook, Orkut, Twitter consumer is most affected. My research shows
that an individual who is routinely hated will reach a ceiling of depression, embarrassment,
and threats. This research makes it possible to analyze whether Bulled will be stressed to the
point of self-harm, whether he is online. The Impact of Cybercrime on the Private Sector I
could use the terms invasive, silent, and risky if I had three characteristics to characterize
cybercrime. The very silence of this type of crime is a great challenge in the fight against
danger. In fact, very often businesses forget that they have suffered a fraud or attack until
long after the incident. The effects are disarming, as it is often difficult to find a case again,
just as the time gap between the crime and its discovery offers advantages to those who
commit crimes that are sometimes insurmountable and make prosecution impossible. But the
truth is that many businesses have actually been victims of cybercrime over the years, but are
unaware of the cancer that is destroying them from within. It is not so. But that's true. The
Ponemon Institute's second annual Cost of Cybercrime Survey, released by the Ponemon
Institute, shows that while a greater understanding of the cyber threat has significant financial
implications for businesses and government entities, the study focuses on a representative
sample of 50 larger organizations. The research is published in the Ponemon Institute. The
study reveals that the average annual cost of cybercrime to 50 organizations is $5.9 million
per year, ranging from $1.5 million per business to $36.5 million per year. Compared to the
first report in the previous year, gross costs are higher.

3.1 The Impact of Cybercrime on Youth

The newest way of communication is the cybernetic. Online social networking blogs, instant
messaging, and email provide consumers with an easy and fast way to communicate with

[13]
others around the world. Teenagers spend hours online every day, especially on computers or
electronic devices. Familyrescource.com reports that 48% of teenagers agree that the Internet
strengthens their friendships. Thanks to the popularity of social networking platforms, young
people can keep in touch with real friends online. Some young people say that cyber
interactions allow them to feel confident that they are their true selves.The way to partner
with other teens is open near and far with online networking platforms. Writing when
teenagers are mostly online has no structured cyber communication writing skills. On the
contrary, young people often write digitally in jargon, abbreviations, or slang. The National
Commission on Writing reports that 85% of teens use social media to communicate, but 60%
do not see the form of communication as "writing." Teens should consider the difference
between formal and informal writing and understand whether it is appropriate (in school).

3.2 Cyberbullying

Online contact among young people has a negative impact on cyberbullying. Victims of
cyberbullying also face social media rumors and misinformation online. Bullying images of
their victims may seem indecent or shameful. Another aspect of cyberbullying is the use of
rude text messages as harassment. The National Crime Prevention Council reports that more
than half of American youth have experienced online bullying. Young people have taken
their own lives due to online bullying in some serious situations.

3.3 Sexual Harassment

For teenagers who use forms of cyber communication, sexual harassment is an increasing
concern. This can happen on social media platforms or chat rooms. Sexual application occurs
whenever an adult or friend attempts to have sex online. A teen may be asked to share
personal information, watch porn, or talk about sex online. About 70 percent of teenagers
online are female. Young people should be careful about posting provocative pictures and
talking to strangers in online chat rooms.

[14]
4. CHALLENGES IN CYBER CRIME

There is now a sophisticated and self-sufficient digital underground economy in which data is
the illicit commodity. Stolen personal and financial data – used, for example, to gain access to
existing bank accounts and credit cards, or to fraudulently establish new lines of credit – has a
monetary value. This drives a range of criminal activities, including phishing (the act of
attempting to acquire information such as usernames, passwords, and credit card details and
sometimes, indirectly, money, by masquerading as a trustworthy entity in an electronic
communication),
pharming (the fraudulent practice of directing Internet users to a bogus Web site that mimics the
appearance of a legitimate one), malware distribution and the hacking of
corporate databases, and is supported by a fully fledged infrastructure of malicious code writers,
specialist web hosts and individuals able to lease networks of many thousands of compromised
computers to carry out automated attacks.

In the last decade advances in communications technologies and the "information" of society
have converged as never before in human history. This has given rise to the industrialization
of a type of crime where the commodity, personal information, moves far too quickly for
conventional law enforcement methods to keep pace. The unprecedented scale of the problem
threatens the ability of the authorities to respond with millions of viruses and other types of
malicious code are in global circulation, and again innumerable computers are compromised
per day. At the same time, the authorities have more data on criminal activity at their disposal
than ever before, and now have an opportunity to harness this information in ways which
make intelligence development and investigation more streamlined and cost effective. Cyber
crime rates continue to increase in line with Internet adoption: mobile Internet access and the
continuing deployment of broadband Internet infrastructure throughout the world therefore
introduces new levels of vulnerability; with potential victims online for longer periods of
time and capable of transmitting much more data than before; and the increasing trend for
outsourcing data management to third parties presents imminent risks to information security
and data protection.

[15]
Cyber-crime is a truly global criminal phenomenon which blurs the traditional distinction
between threats to internal (criminality and terrorist activity) and external (i.e. military)
security and does not respond to single jurisdiction approaches to policing. The liability of
networks to exploitation for a number of different ends, and the ease with which individuals
may move from one type of illegal activity to another suggests that territorialism in all its
forms (both of nations and regions, and specific authorities within nations) hinders efforts to
successfully combat the misuse of communications technology. At present, national
authorities are overcoming jurisdictional restrictions by coordinating regionally or with
agencies with similar levels of capability/capacity to better understand and respond to
Internet-facilitated crime.

Another most alarming problem in the present-day cyber world is the promotion and easy
availability of pornography especially Child pornography which refers to images or films
(also known as child abuse images) and, in some cases, writings depicting sexually explicit
activities involving a child. Abuse of the child occurs during the sexual acts which are
recorded in the production of child pornography.

[16]
5. SOLUTION

Active targeting of underground fora to disrupt the circulation of powerful and easy to use
cyber criminal tools, such as malware kits and botnets.  Disrupt the infrastructure of
malicious code writers and specialist web hosts through the active identification of developer
groups and a joint action of law enforcement, governments and the Information &
Communication Technology industry to dismantle so-called “bullet proof” hosting
companies.  Active targeting of the proceeds of cyber crime in collaboration with the
financial sector. For e.g. money mule (is a person who transfers money acquired illegally
(e.g., stolen) in person, through a courier service, or electronically, on behalf of others). 
Continue to develop insight into the behavior of the contemporary cyber criminal by means
of intelligence analysis, criminological research and profiling techniques, and based on the
combined law enforcement, IT security industry and academic sources, in order to deploy
existing resources more effectively.

More must be done to harness the intelligence of network and information security
stakeholders, not only to provide a more accurate and comprehensive assessment of cyber
criminality, but also to ensure that responses are effective and timely. Active partnerships are
to be made with ISPs, Internet security organizations and online financial services are keys.
 Collaboration, particularly with the private sector, to proactively identify features of future
communications technologies liable to criminal exploitation, and to design vulnerabilities out
of technologies and environments which are in development.

More centralized coordination at regional and interregional levels, to streamline the fight
against cyber crime.  Global Cyber Law should be implemented.  The establishment of
virtual taskforces to target Internet facilitated organized crime. These should be responsive to
the evolving criminal environment – e.g. more permanent groups for information sharing,
more ad hoc arrangements for specific operations such as dismantling botnets. In all cases the
authorities need to have the flexibility to include a variety of stakeholders (law enforcement,
military, and private sector, and academia, user groups) in order to achieve the desired
outcome. One of the virtual task force can be World Cyber Cop

[17]
The World Council for Law Firms and Justice promotes the evaluation and harmonization of
the legal systems throughout the world. There are many small and many great steps on the
road to fulfilling this vision. This consideration of ideas on the establishment of an
International Court for Cyber Crime is intended as the start of an international initiative to
mark an important milestone on the long road. The establishment of an International Cyber
Criminal Court (comprising of highest level of Judicial Authority and Technical Authority)
for the prosecution of Internet crimes could wholly or partially reduce the criminals’ lead.
The realization of this vision requires expertise, commitment and courage – including the
courage to ignore borders and to think consistently towards the future. There should be a
World Tribunal which should control all the Country Courts which in turn should have many
Regional Tribunals.

Place the computer in a centrally located area in your home - not in a child's bedroom. This
prevents "secret" communications or access and also allows all members of the family to use
it. Talk to your children about the Internet. Explain that it is an excellent source of
information, but some sites are inappropriate and they are expected to stay away from these
sites. Establish time frames for Internet access. This will encourage your children to obtain
information in a timely manner and discourage aimless wandering. Keep an open line of
communication with your children. Discuss their Internet experiences and guide them to sites
that are age-appropriate. Consider using software that can block or filter Internet sites or
certain words that may indicate inappropriate sites.  In a chat room never give out any
personal information including: name, address, city, state, school attended, telephone number,
family names or other personal family information. Never respond to someone who wants to
meet in person or send photographs. Instruct your children to exit the chat room and notify
you immediately if this happens. Most importantly, if your child visits a particular chat room,
spend at least five or ten minutes monitoring the conversation to see if it is appropriate.
Consider purchasing computer software products that can help you monitor and control your
child's access to the Internet. Monitor your children's Internet activity by checking all of the
sites visited.

[18]
5.1 HOW TO AVOID CYBER CRIMES

 Know How To Recognize Phishing. Your bank won't send you an email telling you that
your account has been compromised and asking you to provide sensitive account and
personal information like password, PIN etc. it already has. These are obviously phishing
attempts.

 Recognize that your Smart-phone is really a pocket-size computer and is prone to the same
types of attacks directed at your laptop and desktop. Take steps to protect it, such as keeping
your operating system current and creating a strong password.

 Keep your personal information to yourself. For instance, don't put your entire birth date,
including the year, on Facebook. Think about the security questions normally posed by your
bank and other secure locations: "first school you attended," "name of favorite pet" and the
like.

 Know the pitfalls of public Wi-Fi. CreditCards.com says, "Avoid public wireless Internet
connections unless you have beefed-up security protection."

 Beware of public computers, too. For instance, Kiplinger says, "Don't access your accounts
or personal information on public hotel computers, which could have software that logs
keystrokes and records your passwords and account numbers.

 Use credit cards, rather than debit cards, when making purchases online. In case of fraud,
you'll get much better protection from liability with a credit card.

 Purchase only from reputable websites (and look for "https" in the Web address). "It is
really easy to create a fake online store or to create a store that sells stuff, but its real purpose
is to collect credit card information," former identity thief Dan DeFelippi told
CreditCards.com.

 Check your accounts and your credit reports regularly. Some experts recommend that you
check bank account and credit card activity every day. You can pull a free credit report every
four months from AnnualCreditReport.com to verify that fraudulent accounts have not been
created in your name.

 Avoid suspicious E-mails. Don't click on links in suspicious emails, even those that appear
to be from friends. Emailed viruses and malware are the most prevalent cyber threat of

[19]
identity theft. Just think of how many emails you've gotten in the last year that appeared to be
from friends whose email accounts were hijacked.

[20]
6. CURRENT TREND

As per the cyber crime data maintained by the National Crime Records Bureau (NCRB),
a total of 217, 288, 420 and 966 Cyber Crime cases were registered under the Information
Technology Act, 2000 during 2007, 2008, 2009 and 2010 respectively. Also, a total of
328, 176, 276 and 356 cases were registered under Cyber Crime related Sections of
Indian Penal Code (IPC) during 2007, 2008, 2009 and 2010 respectively. A total of 154,
178, 288 and 799 persons were arrested under Information Technology Act 2000 during
2007-2010. A total number of 429, 195, 263 and 294 persons were arrested under
Cyber Crime related Sections of Indian Penal Code (IPC) during 2007-2010. As per
2011 NCRB figures, there were 1,791 cases registered under the IT GALAXY
INTERNATIONAL INTERDISCIPLINARY RESEARCH JOURNAL (GIIRJ) ISSN
(E): 2347-6915 Vol. 9, Issue 5, May (2021) 366 Act during the year 2011 as compared
to 966 cases during the previous year (2010) thereby reporting an increase of 85.4%
in 2011 over 2010. Of this, 19.5% cases (349 out of 1,791 cases) were reported from
Andhra Pradesh followed by Maharashtra (306), Kerala (227), Karnataka (151) and
Rajasthan (122). And 46.1% (826 cases) of the total 1,791 cases registered under IT Act,
2000 were related to loss/damage to computer resource/utility reported under hacking
with computer systems. According to NCRB, the police have recorded less than 5,000
—only 4,829 cases and made fewer arrests (3,187) between 2007 and 2011, under
both the Information Technology (IT) Act as well as the Indian Penal Code (IPC). And
convictions remain in single digits, according to lawyers. Only 487 persons were arrested
for committing such offences during the year 8 2011. There were 496 cases of obscene
publications/transmission in electronic form during the year 2011 wherein 443 persons
were arrested. Out of total 157 cases relating to hacking under Sec. 66(2), most of the
cases (23 cases) were reported from Karnataka followed by Kerala (22 ) and Andhra
Pradesh (20 cases). And 20.4% of the 1184 persons arrested in cases relating to IT Act,
2000 were from Andhra Pradesh (242) followed by Maharashtra (226). The age-wise
profile of persons arrested in cyber crime cases under the IT Act, 2000 showed that
58.6% of the offenders were in the age group 18–30 years (695 out of 1184) and 31.7%
of the offenders were in the age group 30-45 years (376 out of 1184). Madhya
Pradesh (10), Maharashtra (4), Kerala (3) and Delhi (2) reported offenders whose age
was below 18 years. Meanwhile, a total of 422 cases were registered under the Indian
Penal Code or IPC Sections during the year 2011 as compared to 356 such cases during

[21]
2010 thereby reporting an increase of 18.5%. Maharashtra reported maximum number of
such cases (87 out of 422 cases i.e. 20.6%) followed by Chhattisgarh 18.0% (76 cases)
and Delhi 11.6% (49 Cases). Majority of the crimes out of total 422 cases registered
under IPC fall under 2 categories--forgery (259) and Criminal Breach of Trust or fraud
(118). Although such offences fall under the traditional IPC crimes, these cases had the
cyber overtones wherein computer, Internet or its enabled services were present in the
crime and hence they were categorised as Cyber Crimes under IPC. Crime head-wise and
age-wise profile of the offenders arrested under Cyber Crimes (IPC) for the year 2011
reveals that offenders involved in 9 forgery cases were more in the age-group of 18-30
(46.5%) (129 out of 277). 50.4% of the persons arrested under Criminal Breach of
Trust/Cyber Fraud offences were in the age group 30-45 years (65 out of 129).
Meanwhile 9 out of 88 mega cities did not report any case of cyber crime i.e., neither
under the IT Act nor under IPC Sections during the year 2011. And 53 mega cities
have reported 858 cases under IT Act and 200 cases under various sections of IPC. There
was an increase of 147.3% (from 347 cases in 2009 to 858 cases in 2011) in cases under
IT Act as compared to previous year (2010), and an increase of 33.3% (from 150 cases in
2010 to 200 cases in 2011) of cases registered under various sections of IPC. Bangalore
(117), Vishakhapatnam (107), Pune (83), Jaipur (76),Hyderabad (67) and Delhi (City)
(50) have reported high incidence of cases (500 out of 858 cases) registered under IT Act,
accounting for more than half of the cases (58.3%) reported under the IT Act. Delhi
City has reported the highest incidence (49 out of 200) of cases reported under IPC
sections accounting for 24.5% followed by Mumbai (25 or 12.5%). A total of 44,546
cases were registered under Cyber Crimes, showing a huge increase of 63.5% in
registration over 2018 (27,248 cases). Crime rate under this category increased from 2.0
in 2018 to 3.3 in 2019. During 2019, 60.4% of cyber-crime cases registered were for the
motive of fraud (26,891 out of 44,546 cases) followed by sexual exploitation with
5.1% (2,266 cases) and causing disrepute with 4.2% (1,874 cases).

6.1 RECENT TREND


The pandemic of COVID-19 and the imposed lockdown, has led to more people to be
confined at home with many more hours to spend online each day and increasingly relying on
the Internet to access services, they normally obtain offline. The dangers of cyber-crime have
been there for many years, but the increase in the percentage of the population connected to
the Internet and the time spent online, combined with the sense of confinement and the

[22]
anxiety and fear generated from the lockdown, have provided more opportunities for
cybercriminals to take advantage of the situation and make more money or create disruption.
It is important to note that some more vulnerable segments of the population, such as
children need to spend more time online for services such as schooling. This seismic
change in how we live our lives and use the Internet has prompted a proliferation of e-crimes.
Common cybercrime techniques, such as phishing, have seen a spike. Phishing is the
fraudulent practice of inducing individuals to reveal personal information, such as
passwords and credit card numbers through fake websites or emails. The Kaspersky
Security Network (KSN) report showed that its products detected and blocked 52,820,874
local cyber threats in India between January to March this year. The data also shows
that India now ranks 27th globally in the number of web-threats detected by the company in
Q1 2020 as compared to when it ranked on the 32nd position globally in Q4 2019."There has
been a significant increase in the number of attacks in 2020 Q1 that may continue to
rise further in Q2 as well, especially in the current scenario where we notice an
increase in cybercriminal activities, especially in the Asia Pacific region," said Saurabh
Sharma, Senior Security Researcher, GReAT Asia Pacific at Kaspersky. The number of
local threats in Q1 2020 in India (52,820,874) shows how frequently users are attacked by
malware spread via removable USB drives, CDs and DVDs, and other "offline" methods.
Protection against such attacks not only requires an antivirus solution capable of
treating infected objects but also a firewall, anti-rootkit functionality and control over
removable devices. According to the firm, the number of local threats detected in Q4 2019
was 40,700,057. Lt. Gen. Rajesh Pant, India’s National Cyber Security Coordinator (NCSC),
told the Economic Times that cyber criminals had launched thousands of “fraud portals”
related to the coronavirus. These sites have lured thousands of Indians eager to contribute to
the fight against coronavirus into making donations. Many of these phony sites are quite
sophisticated, virtually indistinguishable from their genuine counterparts. India also ranks
11th worldwide in the number of attacks caused by servers that were hosted in the country,
which accounts of 2,299,682 incidents in Q1 2020 as compared to 854,782 incidents detected
in Q4 2019, said the report. According to National Commission for Women (NCW) data,
54 cybercrime complaints were received online in April in comparison to 37 complaints
received online and by post -- in March, and 21 complaints in February. The panel is taking
complaints online due to the lockdown. Cyber experts, however, said the numbers are just the
'tip of the iceberg'." total of 412 genuine complaints of cyber abuse from March 25 till April

[23]
7. CYBER CRIME AND FRAUDS IN INDIA
Posted On: 13 DEC 2022 3:38PM by PIB Delhi
With enhanced use of cyber space, number of cyber crimes including frauds is also increasing. The
National Crime Records Bureau (NCRB) compiles and publishes the statistical data on crimes in its
publication “Crime in India”. The latest published report is for the year 2021. As per the data
published by the NCRB, detail of State/UT wise cases registered under cyber crimes (involving
communication devices as medium/target) during the period from 2017 to 2021 is given below.
State/UT-wise Cases Registered(CR), Cases Chargesheeted(CCS), Cases Convicted(CON),
Cases Discharged (CDIS), Cases Acquitted (CAQ), Persons Arrested(PAR), Persons
Chargesheeted(PCS), Persons Convicted(PCV),Persons Discharged (PDIS) and Persons
Acquitted (PAQ) under Total Cyber Crimes during 2017-2018

SL State/UT 2017

CR CCS CON CDIS CAQ PAR PCS PCV

1 Andhra Pradesh 931 198 4 0 70 388 269 5

2 Arunachal Pradesh 1 0 0 0 0 0 0 0

3 Assam 1120 179 0 0 1 1261 726 0

4 Bihar 433 251 2 0 19 884 265 3

5 Chhattisgarh 171 78 9 4 8 128 127 9

6 Goa 13 4 0 1 0 1 6 0

7 Gujarat 458 190 0 0 2 472 437 0

8 Haryana 504 130 11 0 77 211 197 12

9 Himachal Pradesh 56 15 2 0 14 34 17 2

10 Jharkhand 720 115 3 2 4 368 155 3

11 Karnataka 3174 130 0 0 39 294 163 0

12 Kerala 320 144 8 0 43 240 159 9

13 Madhya Pradesh 490 349 7 2 7 544 548 9

[24]
14 Maharashtra 3604 720 11 0 48 1716 1196 10

15 Manipur 74 0 0 0 0 25 0 0

16 Meghalaya 39 1 0 0 1 8 1 0

17 Mizoram 10 7 2 0 1 10 7 2

18 Nagaland 0 0 0 0 0 0 0 0

19 Odisha 824 143 1 0 4 200 200 1

20 Punjab 176 60 2 2 21 223 111 2

21 Rajasthan 1304 184 5 7 11 374 357 5

22 Sikkim 1 0 0 0 0 0 0 0

23 Tamil Nadu 228 70 0 0 9 208 99 0

24 Telangana 1209 266 1 0 64 808 428 1

25 Tripura 7 1 0 0 1 3 1 0

26 Uttar Pradesh 4971 1700 79 2 42 2726 2576 83

27 Uttarakhand 124 47 1 0 1 55 58 2

28 West Bengal 568 133 1 0 3 266 99 1

TOTAL STATE(S) 21530 5115 149 20 490 11447 8202 159

29 A&N Islands 3 2 0 0 1 1 2 0

30 Chandigarh 32 13 1 0 5 30 20 1

31 D&N Haveli and Daman & 1 1 0 0 0 1 1 0


Diu+

32 Delhi 162 38 2 2 0 105 69 2

33 Jammu & Kashmir* 63 11 0 0 4 17 12 0

[25]
34 Ladakh - - - - - - - -

35 Lakshadweep 0 0 0 0 0 0 0 0

36 Puducherry 5 0 0 0 0 0 0 0

TOTAL UT(S) 266 65 3 2 10 154 104 3

TOTAL (ALL INDIA) 21796 5180 152 22 500 11601 8306 162

Source: Crime in India. Note: '+' Combined data of erstwhile D&N Haveli UT and Daman &
Diu UT during 2017,2018;

[26]
8. FUTURE OF CYBER CRIMES

One of the more alarming phenomena is the rate of increase in cybercrime. "Last year was the
first year that cybercrime revenue was greater than revenue from illegal narcotics sales, and I
think it's more than $105 billion," says Valerie McNiven, an American financial advisor. She
said that more "In such fast cyber crime is on the move that the police can't catch it. It is
certain that the problem can only get worse in the coming years as professionals have noticed
the windfalls if used correctly. There has been a lot of discussion lately about organized
crime and cybercrime mergers. Such a connection foreshadows an unpleasant smell in the
foreseeable future. With several criminal gangs from Eastern Europe, Russia and Asia, with
little legislation and enforcement, there is little hope that conventional means can contain and
neutralize the danger. Phil Williams, visiting researcher at CERT, summarized the problem
succinctly. "The Internet offers all the criminal networks and targets and can be used with
very little risk for significant profits. It's hard to ask for more for organized crime." As a
result, an increase in advanced phishing attacks and other means of two-way identity fraud
can be anticipated. For example, call centers can be used to alert consumers in advance of a
problem and then follow up with emails that request personal information. In several third-
party data centers, the addition of personal data can prove useful targets for infiltration. It's
not hard to imagine criminals using data mining technology to find the most vulgar customers
or to tailor phishing emails to real individuals based on their health, financial or personal
background. Theft can now be identified in more automated ways. For example, a botnet can
be used to find personal information such as credit card information and social security
numbers, not just for denial of service and spam attacks. Botnet administrators may accept
compensation for their "database" requests. It begins to ask where all the technological know-
how to carry out cybercrime can come from for the sophisticated criminals who run the
money laundering and organization of these systems. Unfortunately, there is an increasing
number of smart all-university blackhats, often working in countries where legal work is
scarce and the risk of getting caught is small. However, being a hacker willing to do a lot of
damage to networks and carry out cybercrime is more worrying than ever. The Internet has
provided a knowledge base where anyone can learn the basics of subverting computer
systems, and several videos available that explain to the near-layman how to perform a buffer
overflow or man-in-the-middle attack. It is interesting because those who do not take the
initiative to study and discover new achievements are not the main challenge. This
community is likely to remain a small, very smart network of researchers and conservation

[27]
organizations that focus exclusively on software issues. This requires a certain amount of
investigation, expertise, and persistence that most are unable to expend, even if one is
inspired to understand how exploits work. The real threat comes from the sheer ease with
which someone can run a program like "MetaSploit," a system that allows new modules to be
downloaded and run instantly. Apart from how humans operate, the perpetrator simply has
little to do with machines. In fact, almost all attacks are diligently worked on by a small
number of individuals and eventually released into the public domain, allowing virtually
anyone to perform an attack. Botnets are no longer hand-crafted applications by a single party
that has truly understood their fundamental principles, but instead open-source community
projects that ensure distributed computing like BotNET, Eggheads, and CSharpBot, all
available from Source Forge, can be controlled as easily as possible. . The barrier to entry
into the sector is so minimal that almost anyone will experiment and enter cybercriminals.
Since the learning curve is too short, there should be a quick discussion about how to prevent
and deal with offenders in a way that is no longer tied to outdated approaches. For example,
once someone enters a house, they must prepare not only for the right time, but also to
beware of picking locks, escaping the protective framework, and the abyss of crossing moral
thresholds. In contrast, the ease of cybercrime appears inversely proportional to its
profitability, and moreover, these patterns show signs of acceleration.

Looking at the technology of today can guide predictions for the future. Technology that is in
the earliest stages of popularity is at its safest point — the ideal time for organizations to
build out predictive threat analysis.

For example, most of us remember how malware attacks used to be focused on Windows
machines, leaving Apple users feeling superior because they were “safe” from cyberattacks.
Then, Apple became more mainstream, and their operating systems (OSs) are no longer
immune from attacks. It was the same with mobile apps and now with the internet of things
(IoT). As AI becomes more mainstream, it will be both attacked and weaponized.

Where will we see cybercrime go? According to Nicole Eagan, CEO of Darktrace, we can
expect to see a digital war of algorithms.

[28]
“Autonomous cyber-attacks may have a defined target — intellectual property — or persist
opportunistically for monetary gain or mischief,” Eagan noted in a Forbes article. “As they
sustain their presence, they will grow stronger in their insider knowledge as they build up
control over data and entire networks.” And it will be nearly impossible to stop.

But AI isn’t the only threat on the horizon. As the world becomes more connected and
everything is turned into a smart device, expect cybercriminals to spread malware from one
device to another as they “talk” to each other. Through the IoT, threat actors will be able to
gain credentials that will allow them to access and control all of the devices in one
organization or household.

Cryptojacking made a lot of headlines in the past year, but cryptocurrency still isn’t
mainstream enough for people to pay attention. Will that shift over the next few years? It is
likely that cryptocurrencies will become more mainstream, which is why you should be
thinking about how to protect from cryptojacking now.

“Cybersecurity losses are a cost of doing business in the digital age,” Tim Erlin, vice
president of product management and strategy with Tripwire, told SC Magazine.

But that doesn’t have to be the case if you look at the future and use some predictive analysis
to see what is coming. It may require thinking outside the box and using new approaches to
anticipate future cybercrime.

“Anticipatory compliance — showing that an organization is studying and responding to


potential threats — should be embraced by organizations, not necessarily from the
compliance lens, but from the security and privacy lens,” said Tom Garrubba, senior director
and CISO at Shared Assessments, in an email statement.

There is a tendency for organizations to be reactionary; maybe it is easier to put out fires after
they’ve begun. But that is also a never-ending project. You may not know exactly what’s

[29]
coming, but looking at the past and understanding what’s happening in the present makes
predicting threats a whole lot easier.

If you can anticipate what the future will bring, you can better prepare your organization for
the worst. It may just keep you from contributing to 2024’s $5 trillion in data breach fines or
from being a victim of cybercrime much sooner.

8.1 Future of Cybersecurity: Cloud Computing

If there’s one aspect of IT that has experienced the most growth in the last 10 years, it’s
undoubtedly the use of cloud. In 2031, cloud can only keep blazing forward. Or can it?
Depends on who you ask.

According to Hunt, cloud makes it faster, cheaper and easier than ever to put services online
and collect huge amounts of data.

“But, faster and easier and cheaper than ever means it’s easier to leave it all exposed,” he
said. “We are seeing a lot of them go wrong now. I don’t see any of those factors reducing
over the next decade. Mostly because there’s just such a high demand for them. Of course,
we want cheap, ubiquitous cloud services; of course, we want to connect our washing
machines to the internet, and that’s not going to change.”

Cohen Wood, however, predicts that the future of cloud computing might be short: the cloud
might evaporate in 2031.

“I don’t think things will be in the cloud in 10 years; I think things will be back to on-prem,”
she said. “There will be more peer-to-peer closed networks. People will figure out how to use
blockchain.”

[30]
She envisions a peer-to-peer system. In it, each network carries different types of traffic for
different types of communication. This is not unlike what the intelligence community uses.

“You’ll have an unsecure network, a secure network and then you’ll have a very secure
network,” she added.

However, Cohen Wood said cloud won’t ever go away. “Things will swing [towards on-
prem] for a while, but eventually it will swing back to cloud because that’s how it works.
History has proven that time and time again.”

8.2The State of Passwords

Ahh, the password. We’ve been discussing its demise for decades. Yet today, we’re amassing
them at unprecedented rates.

According to Grimes, the same attacks that allow threat actors to steal our passwords will still
be the same in 10 years. So, it follows that the password we know and love (or hate) will be
alive and well, too.

“There are 10 root causes of all hacking and malware exploitation, including social
engineering, unpatched software, misconfiguration and eavesdropping,” he said. “The
methods used 34 years ago (when I started in the industry) are the same methods used today.
They haven’t invented a new way of hacking. So, I believe that passwords will be around at
least another 10 years, or two decades, or forever. I’m going to go against the conventional
wisdom.”

8.3 Did Past Predictions Come True?

Grimes wrote his first article about the password’s demise thirty years ago, and while he still
revisits that theory with restrained optimism, he acknowledges that passwords are just so
useful. After all, that first article’s future of cybersecurity has become the present.

“Not only do we not have less passwords, we have more than ever,” he said. “It’s because
there are some benefits of passwords. They’re cheap, they’re easy to use and easy to change.
[31]
If you were to tell me that in two decades they will still be in use, it won’t be surprising at
all.”

Hunt agrees that passwords are here to stay, but hopes that they will evolve. “I suspect that
we will have more passwords in 10 years than we do now, but I also suspect that we will have
more means of authenticating without them,” he said. “A good example of where we’re
seeing that industry shift is when I look at my iPhone, I log on with my face; I don’t need to
use a password. But I still have a password, and I have a PIN as a fallback position. I like the
direction we’re starting to go with more clever ways of doing authentication.”

Over the next 10 years, Hunt predicts we’ll see more biometrics and leverage additional
authentication methods involving devices we already have in our pockets.

“Passwords get a bit of a bad rap,” he said. “But what passwords do extraordinarily well is
usability. Everybody knows how to use a password.”

8.4 The Role of AI in the Future of Cybersecurity

How prominent the password and the cloud will be in 2031 might be up for debate, but the
key role that AI will play in cybersecurity is something we can bank on.

All three experts told me that the use of AI will be even more critical than we think.

“I believe that if AI is not adopted, we’re in trouble,” said Cohen Wood, who has been
developing her own AI algorithm for the health care industry. “I also believe that in health
care, for example, there’s a chance that it may even be illegal or a form of malpractice at
some point in the future not to be using AI in your health care practice.”

For Grimes, AI will be the catalyst in determining whether the industry can keep up with the
threat actor community. “You’re going to end up having these good threat hunting bots going
against bad bots that are changing on the fly depending on the conditions,” he said. “I think
you’ll have computer security algorithms where people sit around and create better
algorithms for their particular bots. It’s eventually going to be bot versus bot. You’ll still
require human intervention because humans are always needed and are at least half the
solution.”

[32]
8.5 Data Breaches and the Threat Landscape

Much like AI, data breaches are expected to be more prevalent in 2031 than they are in 2021
— which is both unfortunate and scary. As more data and devices appear online, the risk of a
breach only grows.

For years, Hunt has been saying that there are numerous aligning factors that contribute to
worsening data breaches that will continue as the future of cybersecurity approaches. “We
simply have a lot more data, we’ve collected a lot more data because we’ve got more online
assets and digital systems,” he said. “We’ve also got more people online; look at these
emerging markets like India, for example. There’s still a massive amount of growth that’s
going to happen there in terms of people coming online and then providing their data into
digital systems.”

And that’s just people. When you add the Internet of Things into the equation, attackers have
more data out there to breach. “We’re collecting a lot of data from devices that were never
digitized before,” Hunt said. “Now we have all of this data digitized.”

8.6 Large-Scale and Supply Chain Breaches

When it comes to the type of threats we can expect, I asked the experts if we should worry
about infrastructure attacks and other large-scale breaches.

According to Grimes, he expects more supply chain attacks and even more nation-state
attacks. “All the horror stories that we were long worried about kind of came true,” he said.
“Nation-states are more likely to go after infrastructure as our infrastructures are becoming
more digital.”

However, he predicts that the same attack types will happen, caused by the same mistakes
made today and in the past as people bring more systems online and make them more
accessible.

[33]
He suggested that the only way to prevent more infrastructure attacks is to pass a Geneva
Convention-style digital act amongst nations prohibiting them from attacking infrastructure.

8.7 The Cybersecurity Skills Gap

Finally, we need to talk about the overwhelming number of unfilled cybersecurity positions.
After all, if we can’t solve this critical piece of the cybersecurity puzzle, how can we keep
up?

With such lucrative salaries in the field, you’d assume it would decrease the cybersecurity
skills gap.

“Let me say I’m a little bit disappointed,” said Grimes. “Money has been good for a while.
Within a few years, you can be making six figures, and some can make that much right out of
school. The sky’s the limit. You can make your own software, you can make your own threat
hunting bot. It’s frustrating we’ve still got this issue in 2021.”

8.8 Women in Cybersecurity

But what frustrates Grimes, even more, is how to solve the issue of getting more women
interested in the field.

“It may be shocking to a lot of people, but the percentage of women in the IT security field
today is lower than the percentage twenty years ago,” he said. “I applaud the people that
figure out how to correct it because we need the female perspective. I raised three girls;
they’re scary smart. Long-term planners often say that women play chess, and every guy I
know plays checkers at best.”

Of course, a career is about much more than money. But the job security in this industry is
equally solid. After all, today’s recruits are the people building the future of cybersecurity.

“There’s so much demand for it,” said Hunt. “But clearly, we’re leaving a lot to be desired in
terms of how good a job we’re actually doing in securing our things … Now seems like a
better time than ever to be involved in this industry.”

[34]
“I want to think positively or I wouldn’t be doing what I’m doing,” added Wood. “I have to
believe that we can succeed in this. But I do know that the only way that we’re going to be
able to do that is collaboratively.”

The future of cybersecurity depends on it.

[35]
9. CONCLUSION

Data plays an integral role in the commission of many cybercrimes and vulnerabilities to
cybercrime. Even though data provides users of it (individuals, private companies,
organizations, and governments) with innumerable opportunities, these benefits can be (and
have been) exploited by some for criminal purposes. Specifically, data collection, storage,
analysis, and sharing both enables many cybercrimes and the vast collection, storage, use,
and distribution of data without users' informed consent and choice and necessary legal and
security protections. What is more, data aggregation, analysis, and transfer occur at scales
that governments and organizations are unprepared for, creating a slew of cybersecurity risks.
Privacy, data protection, and security of systems, networks, and data are interdependent. In
view of that, to protect against cybercrime, security measures are needed that are designed to
protect data and user's privacy.

Cyberspace offers immense benefits and opportunities as well as considerable threats and
hazards. It is routinely exploited by a variety of adversaries, aggressors, and predators: hostile
states; political extremists and terrorists; businesses practising commercial espionage and
theft; individuals and criminal organizations undertaking financial fraud and trafficking in
people, armaments, and narcotics; and individual so-called ‘nuisance’ hackers. The efficient
and effective response to these threats and hazards is what cybersecurity is all about. The idea
that cybersecurity could also have a larger, more comprehensive, and progressive goal might
seem to some to be fanciful: an unrealistic and other-worldly response to the very real
possibility of encountering substantial harm in and from cyberspace.

Thus it is clear that the Computer crime describes a very broad category of offenses. Some of
them are the same as non-computer offenses, such as larceny or fraud, except that a computer
or the Internet is used in the commission of the crime. Others, like hacking, are uniquely
related to computers. The government must make sure the safety of the state digital network
& systems which store important public information and must take concrete steps during this
regard.

[36]
10.REFERENCES

Publications

Article 19. (2015). Tanzania: Cybercrime Act 2015 .

Baisley, Elizabeth. (2014). Genocide and Constructions of Hutu and Tutsi in Radio
Propaganda. Race & Class, Vol. 55(3), 38-59.

Baynes, Chris. (2018). United Nations blames Facebook for spreading hatred of Rohingya
Muslims in Myanmar. The Independent, March 15, 2018.

Bhavnani, Ravi. (2006). Ethnic Norms and Interethnic Violence: Accounting for Mass
Participation in the Rwandan Genocide. Journal of Peace Research, Vol. 43(6), 651-659.

Boas, Gideon, James L. Bischoff, Natalie L. Reid, and B. Don Taylor III. (2011).
International Criminal Procedure, Volume 3. Cambridge University Press.

Brenner, Susan W. and Bert-Jaap Koops. (2004). Approaches to cybercrime jurisdiction.


Journal of High Technology Law, Vol.4(1), 1-46.

Dubber, Markus. (2011). The American Law Institute's Model Penal Code and European
Criminal Law. In André Klip (Ed.), Substantive Criminal Law of the European Union.
Maklu.

Fletcher, George P. (2000) Rethinking Criminal Law (2nd ed.). Oxford University Press.

Freedom House (2017). Freedom of the Net 2017: India Profile .

Gourevitch, Philip. (1998). We Want To Inform You that Tomorrow We Will Be Killed with
Our Families: Stories from Rwanda. Farrar, Straus and Giroux.

LaFave, Wayne R., Jerold H. Israel, Nancy J. King, and Orin S. Kerr. (2015). Criminal
Procedure, 4th edition. Thomson Reuters.

Maras, Marie-Helen. (2014). Computer Forensics: Cybercriminals, Laws and Evidence,


Second edition. Jones and Bartlett.

Maras, Marie-Helen. (2016). Cybercriminology. Oxford University Press.

Maras, Marie-Helen. Cyberlaw and Cyberliberties. Oxford University Press, forthcoming,


2020.

[37]
Miles, Tom. (2018). U.N. investigators cite Facebook role in Myanmar crisis. Reuters, March
12, 2018.

Odhiambo, Sharon Anyango. (2017). Internet shutdowns during elections. Africa Up Close,
Wilson Center.

Ohlin, Jens David. (2013). Targeting and the Concept of Intent. Michigan Journal of
International Law, Vol. 35, 79-130.

Rahman, Rizal. (2012). Legal jurisdiction over malware-related crimes: From theories of
jurisdiction to solid practical application. Computer Law & Security Review 28 (2012) 403-
415.

Sandle, Tim. (2016). UN thinks Internet access is a human right. Business Insider, 22 July
2016.

Simons, Kenneth, W. (2003). Should the Model Penal Code's Mens Rea Provisions Be
Amended? Ohio State Journal of Criminal Law, Vol. 1, 179-205.

United Nations International Residual Mechanism for Criminal Tribunals. (2003). Three
Media Leaders convicted for Genocide .

UNODC. (2013). Draft Comprehensive Study on Cybercrime .

UNODC. SHERLOC: Cybercrime Repository.

Voorhoof, Dirk. (2017). European Court of Human Rights: Fouad Belkacem v. Belgium .
IRIS 2017-9:1/1.

Wall, David S. (2007). Cybercrime: The Transformation of Crime in the Information Age.
Polity Press (2nd edition, forthcoming 2020)

[38]

You might also like