Topics in This Unit

  1. 4.1 — Computer, Cybercrime & Legal Landscape Worldwide
  2. 4.2 — Criminal Motives, Attacker Profiles & Attack Types
  3. 4.3 — Cyber Threats: Cyber Warfare
  4. 4.4 — Comprehensive Cyber Security Policy
  5. 4.5 — Cybercrimes Targeting Computers & Mobiles
  6. 4.6 — Online Scams and Frauds
  7. 4.7 — Cybercrime and Punishments (IT Act 2000)
  8. 4.8 — Cyber Laws & Ethics: AI/ML, IoT, Blockchain, Darknet, Social Media
  9. 4.9 — Case Studies: Online Scams, Frauds & Punishments
Topic 4.1

Computer, Cybercrime & Legal Landscape Around the World

Cybercrime is any criminal activity that involves a computer, network, or digital device — either as the tool used to commit the crime, the target of the crime, or both. The legal landscape around cybercrime is complex because crime committed online crosses geographical borders instantly, while laws remain jurisdiction-specific.
📌 Last Night Tip
Know the two categories: Computer as a Tool (fraud, phishing, cyberstalking) vs Computer as a Target (hacking, DoS, ransomware). India's primary law is the IT Act 2000 (amended 2008). GDPR governs the EU; CFAA governs the USA.

Definition: Computer vs Cybercrime

TermDefinitionExample
Computer CrimeCrime that requires a computer but may not need the internetStealing data from an offline server using a USB drive
CybercrimeCrime committed using the internet or network infrastructurePhishing attack via email; ransomware spread over network
Computer as TargetThe attacker wants to damage, disable, or infiltrate the computer itselfDDoS attack, hacking a server, planting malware
Computer as ToolThe computer is used to carry out a traditional crimeOnline fraud, cyberstalking, child exploitation material
Computer as WitnessComputer logs and data serve as evidence of a crimeEmail logs proving insider trading; CCTV footage

Global Legal Landscape — Key Laws by Jurisdiction

Country / RegionKey Cybercrime LawYearKey Provisions
🇮🇳 India Information Technology Act (IT Act 2000) + Amendment 2008 2000 / 2008 Hacking (Sec 66), cyber terrorism (Sec 66F), pornography (Sec 67), identity theft (Sec 66C), phishing (Sec 66D), data breach liability (Sec 43A)
🇺🇸 USA Computer Fraud and Abuse Act (CFAA) 1986 / updated Criminalises unauthorised access to protected computers; espionage; identity fraud; denial of service attacks
🇬🇧 UK Computer Misuse Act (CMA) 1990 / updated 2015 Unauthorised access, unauthorised modification of data, DoS attacks; up to 10 years imprisonment
🇪🇺 European Union EU Directive on Attacks Against Information Systems + GDPR 2013 / 2018 Harmonised cybercrime law across EU member states; mandatory minimum sentences; GDPR adds data protection penalties
🌐 International Budapest Convention on Cybercrime 2001 First international treaty on cybercrime; signed by 65+ countries; harmonises definitions and enables cross-border cooperation

Challenges in Cyber Law Enforcement

Fig 4.1 — Why Cybercrime is Hard to Prosecute: Key Challenges
CYBER LAW ENFORCEMENT CHALLENGES Jurisdiction Problems Crime crosses borders; laws are national Attacker Anonymity VPN, Tor, fake IDs obscure identity Speed of Attack Attacks occur in milliseconds globally Digital Evidence Issues Admissibility, tampering, chain of custody Law Lag Behind Tech Laws struggle to keep pace with innovations Resource Shortage Few trained cyber-forensic police officers

India's IT Act 2000 — Overview

The Information Technology Act 2000 is India's primary legislation governing cybercrime, digital signatures, e-commerce, and electronic records. It was significantly amended in 2008 to address emerging threats. Key bodies created under it:

References
  • IT Act 2000 (as amended 2008): https://www.meity.gov.in/content/information-technology-act
  • Budapest Convention on Cybercrime: https://www.coe.int/en/web/cybercrime/the-budapest-convention
  • CFAA (USA): https://www.justice.gov/criminal-ccips/computer-fraud-and-abuse-act
  • Gordon & Ford — "On the Definition and Classification of Cybercrime", Journal of Computer Virology, 2006

Topic 4.2

Criminal Motives of Attackers and Types of Attacks

Understanding why attackers attack is as important as understanding how they attack. Motive determines the type of target, the method chosen, and the level of sophistication. Defenders who understand motive can better anticipate threats.

Attacker Profiles — Who Attacks and Why

💰

Financial Criminals

Motivated purely by money. Target banks, payment systems, e-commerce, and individuals. They sell stolen data on dark web markets or extort victims via ransomware.

Motive: Financial Gain · Target: Banks, Users, Retail
🎭

Hacktivists

Politically or ideologically motivated hackers. They deface websites, leak documents, or launch DDoS attacks to promote a cause or protest against an organisation or government.

Eg: Anonymous group, India–Pakistan cyber skirmishes
🏴

Nation-State Actors

Government-sponsored hackers conducting espionage, sabotage of critical infrastructure, or election interference. The most sophisticated and well-funded attackers.

Eg: Stuxnet (USA/Israel vs Iran), SolarWinds (Russia)
🎓

Script Kiddies

Low-skill attackers who use ready-made hacking tools without understanding them. Motivated by curiosity, fame, or thrill. Can still cause significant damage.

Motive: Recognition, Curiosity · Low Technical Skill
🕵️

Insider Threats

Disgruntled employees, contractors, or partners with inside access. May be motivated by revenge, financial need (bribed by competitors), or ideological disagreement.

Eg: Edward Snowden, disgruntled bank employee
🔬

Cyber Terrorists

Attack critical national infrastructure (power grids, water treatment, hospitals) to create fear, casualties, and economic disruption. A subset of nation-state or extremist groups.

IT Act Sec 66F: Up to life imprisonment

Classification of Attacks by Method

Attack CategoryMethodExampleTarget
Passive AttacksObserve/intercept data without modifying it; victim unawareNetwork eavesdropping, traffic analysis, packet sniffingConfidentiality
Active AttacksModify, destroy, or disrupt data or systemsData modification, DoS, session hijacking, replay attackIntegrity / Availability
Insider AttacksExploitation of trusted internal accessData exfiltration by employee, sabotage of IT systemsAll three — CIA
Distribution AttacksTamper with software/hardware before delivery to victimsPre-installed malware on devices, poisoned software updatesSupply Chain

Detailed Attack Types and Techniques

1. Malware Attacks

2. Social Engineering Attacks

Example — CEO Fraud (BEC) in India
In Business Email Compromise (BEC), attackers impersonate a CEO by spoofing their email address. The CFO receives an "urgent" email from the apparent CEO asking for an immediate wire transfer of ₹50 lakhs to a vendor. This social engineering attack costs Indian businesses crores annually and is classified under IT Act Section 66D (cheating by impersonation).
References
  • Hadnagy, C. — Social Engineering: The Science of Human Hacking, 2nd Ed., Wiley, 2018
  • CERT-IN Annual Report 2023 — Attacker Profile Analysis
  • FBI Internet Crime Complaint Center (IC3) Annual Report: https://www.ic3.gov/AnnualReport

Topic 4.3

Cyber Threats: Cyber Warfare

Cyber Warfare refers to the use of digital attacks by nation-states or their proxies against the critical infrastructure, military systems, economy, or civil society of another nation. Unlike traditional warfare, cyber warfare is invisible, attributable only with difficulty, and can cause catastrophic damage without a single physical weapon.

Dimensions of Cyber Warfare

⚔️

Offensive Ops

Attacking enemy military systems, communications, power grids, and financial infrastructure to paralyse the adversary before or during kinetic conflict.

🛡️

Defensive Ops

Protecting national critical infrastructure from foreign cyber attacks. Includes real-time threat detection, patch management, and national cyber exercises.

🕵️

Cyber Espionage

Infiltrating foreign government and military networks to steal classified information — defence blueprints, diplomatic communications, economic plans.

📢

Influence Operations

Coordinated disinformation campaigns on social media, fake news, and propaganda to destabilise the target nation's political system and public trust.

💥

Critical Infra Attacks

Targeting power grids, water treatment plants, nuclear facilities, and financial systems to create mass disruption and civilian panic.

Major Cyber Warfare Incidents in History

IncidentYearAttacker (Suspected)TargetImpact
Estonia DDoS Attacks2007Russia (suspected)Estonian government, banks, mediaEntire national internet infrastructure paralysed for weeks; first major nation-state cyber attack
Stuxnet2010USA & IsraelIran's Natanz nuclear centrifugesPhysically destroyed 20% of Iran's uranium enrichment capacity — first cyber weapon causing physical damage
Ukraine Power Grid2015–16Russia (Sandworm APT)Ukrainian electricity distribution230,000 civilians lost power in winter; first confirmed power grid attack via cyber weapons
SolarWinds / Sunburst2020Russia (SVR)US Federal agencies, 18,000 organisationsSupply chain attack; infiltrated Treasury, Pentagon, DHS; 9 months undetected
India–Pakistan Cyber SkirmishesOngoingBoth sides — hacktivists & state proxiesGovernment websites, defence portals, banksWebsite defacements, DDoS; significant escalation during military tensions

India's Cyber Warfare Defence Architecture

Fig 4.2 — India's Cyber Defence Architecture
National Security Council PMO — Policy & Strategy NCCC National Cyber Coord. Centre CERT-IN Incident Response & Alerts NCIIPC Critical Infra Protection Defence Cyber Agency Military offensive/defensive ops State CERT / Police State-level cybercrime units Private Sector SOCs Industry threat intelligence sharing India's layered cyber defence: Policy → Coordination → Sectoral → Operational
⚠️ Key Distinction — Cyber Warfare vs Cybercrime
Cybercrime is committed by individuals or criminal groups for personal gain. Cyber Warfare is conducted by or on behalf of nation-states for strategic, political, or military objectives. The legal frameworks differ entirely — cybercrime is prosecuted under domestic criminal law; cyber warfare falls under international humanitarian law, the laws of armed conflict, and national security law.
References
  • Tallinn Manual 2.0 — International Law Applicable to Cyber Operations (NATO CCDCOE)
  • Rid, T. — Cyber War Will Not Take Place, Oxford University Press, 2013
  • NCIIPC: https://nciipc.gov.in
  • Defence Cyber Agency, Ministry of Defence (India): https://mod.gov.in

Topic 4.4

Comprehensive Cyber Security Policy

A Comprehensive Cyber Security Policy is an organisation-wide framework of rules, responsibilities, processes, and controls that governs how information and systems are protected. It is not a single document — it is a hierarchy of policies that addresses every level: strategic, operational, technical, and legal.

The Four Pillars of a Comprehensive Policy

01

Prevention

  • Access control policies (RBAC, least privilege)
  • Password policy — complexity, rotation
  • Patch management schedule
  • Network segmentation rules
  • Encryption mandates for data at rest & in transit
  • Third-party vendor security requirements
02

Detection

  • SIEM implementation & alert thresholds
  • IDS/IPS deployment policy
  • Log retention requirements (minimum 1 year)
  • Vulnerability scanning schedule (monthly)
  • Penetration testing frequency (annual)
  • User behaviour analytics (UBA)
03

Response

  • Incident Response Plan (IRP) — documented
  • Incident classification matrix
  • CERT-IN notification procedure (within 6 hours)
  • Crisis communication plan
  • Digital forensics & evidence preservation
  • Law enforcement engagement protocol
04

Recovery

  • Disaster Recovery Plan with defined RTO/RPO
  • Business Continuity Plan (BCP)
  • Backup policy — frequency, offsite, air-gap
  • Post-incident review process
  • Insurance and financial recovery planning
  • Stakeholder communication after breach

India's National Cyber Security Policy (NCSP) 2013

India's National Cyber Security Policy 2013 was the first comprehensive government-level framework for protecting India's cyberspace. While a revised policy is in development, NCSP 2013 remains the foundational document. Key objectives:

Policy Development Life Cycle

1 Identify Identify assets, threats, legal obligations, and stakeholders
2 Develop Draft policy documents across all domains (technical, HR, legal)
3 Approve Review by legal, IT, and leadership teams; Board approval
4 Implement Deploy controls; train staff; communicate policy organisation-wide
5 Monitor Continuously assess effectiveness; audit compliance; SIEM monitoring
6 Review Annual review cycle; update for new threats, regulations, & technology
📌 Exam Tip — Policy vs Law
A Policy is an internal organisational rule — set by management. A Law is a government-enacted regulation — enforceable by state. An organisation's password policy is internal; the IT Act's prohibition on hacking is law. Both can coexist and reinforce each other.
References
  • National Cyber Security Policy 2013, MEITY: https://www.meity.gov.in/cyber-security-division
  • NIST Cybersecurity Framework 2.0: https://www.nist.gov/cyberframework
  • ISO/IEC 27001:2022 — Information Security Management Systems

Topic 4.5

Cybercrimes Targeting Computer Systems and Mobiles

Cybercrimes targeting computers and mobile devices treat the device itself as the primary victim. The attacker's goal is to gain unauthorised access, disrupt service, steal data from, or plant malicious code on the target system. Mobile devices have become a primary attack surface due to their ubiquity and often weaker security posture.

Crimes Targeting Computer Systems

1. Hacking / Unauthorised Access

Gaining access to a computer system without permission. Can range from passive information gathering to full system takeover. Classified under IT Act Section 66.

2. Denial of Service (DoS) / Distributed DoS (DDoS)

Flooding a server or network with so much traffic that it cannot serve legitimate users. DDoS uses a botnet — thousands of compromised computers acting in concert. Classified under IT Act Section 66F (if used for terrorism) or Section 43 (damage to computer).

3. Ransomware

Encrypts victim's data and demands ransom for the decryption key. Targets both organisations (hospitals, banks, government) and individuals. Modern ransomware groups also exfiltrate data before encrypting and threaten to publish it ("double extortion").

4. Data Theft / Data Breach

Unauthorised copying, transfer, or publication of confidential data from an organisation's systems. IT Act Section 66B (dishonestly receiving stolen computer resources) and Section 43A (compensation for negligent data breach).

5. Logic Bomb

Malicious code planted in a legitimate program that lies dormant until a specific condition is met (a date, a command, an event) — then activates and causes damage. Commonly planted by disgruntled employees.

Crimes Targeting Mobile Devices

📱

SIM Swapping

Attacker convinces telecom provider to transfer victim's phone number to attacker's SIM. Then receives all OTPs and 2FA codes — enabling bank account takeover. India has seen thousands of such cases.

IT Act Sec 66C (Identity Theft) + 66D (Impersonation)
🎣

Smishing

SMS-based phishing. Fake messages claiming to be from SBI, IRCTC, Amazon, or courier services with malicious links that steal credentials or install malware when clicked.

IT Act Sec 66D (Cheating by Impersonation)
📡

Stalkerware / Spyware

Hidden apps installed on a victim's phone (often by an intimate partner) to track location, read messages, listen to calls, and take covert photos. A tool of domestic abuse.

IT Act Sec 66E (Privacy Violation) + IPC Sec 354D
🛒

Malicious Apps

Fake apps mimicking legitimate ones (banking apps, games, loan apps) that steal credentials, contacts, photos, and financial data. Distributed via third-party stores or phishing links.

IT Act Sec 66 (Hacking) + Sec 43 (Data Theft)
📶

Evil Twin Wi-Fi Attacks

Attacker creates a fake Wi-Fi hotspot with the same name as a legitimate one (airport, café). All traffic from victims connecting to it passes through the attacker's device — a mobile MitM attack.

IT Act Sec 66 + Sec 43
💸

UPI / Mobile Payment Fraud

Attackers use social engineering combined with UPI features (collect requests, screen sharing) to trick victims into authorising payments. Unique to India's digital payment landscape.

IT Act Sec 66C, 66D + IPC Sec 420 (Cheating)
🇮🇳 India Alert — Jamtara / Cyber Crime Hotspots
Jamtara district, Jharkhand became notorious as India's "phishing capital." Organised gangs operated elaborate call centres conducting SIM swapping, vishing (fake bank calls), and OTP fraud — targeting victims across India. The MHA's Cyber Crime Portal (cybercrime.gov.in) received over 15.56 lakh complaints between 2019–2023, with financial fraud being the dominant category. The Cyber Crime cells in major states now use geofencing and IMEI tracking to locate such gangs.
References
  • National Cyber Crime Reporting Portal: https://cybercrime.gov.in
  • CERT-IN Mobile Security Advisory: https://www.cert-in.org.in
  • MHA Annual Cybercrime Statistics Report 2023
  • Jamtara — Sabka Number Ayega (Netflix documentary) — for real-world context

Topic 4.6

Online Scams and Frauds

Online scams and frauds use digital communication channels to deceive victims into parting with money, personal information, or access to their accounts. Unlike technical attacks, most online scams exploit human psychology — trust, fear, greed, urgency, and social pressure — rather than software vulnerabilities.

Major Categories of Online Scams

Financial Fraud

Banking & UPI Fraud

Victims are contacted by fake "bank officers" or "RBI representatives" and manipulated into sharing OTPs, card details, or UPI PINs. In "collect request" scams, victims receive a UPI collect request and are tricked into entering their PIN to "receive" money, but actually send it.

🇮🇳 India: ₹1,750 crore lost to UPI fraud in 2023 alone (RBI data)
Employment Fraud

Fake Job Offers

Victims receive emails or WhatsApp messages offering high-paying jobs requiring upfront "registration fees," "security deposits," or "visa fees." After payment, the job offer vanishes. Often impersonates major companies like Infosys, TCS, or MNCs.

🇮🇳 India: 63% of job-seekers report receiving suspicious offers annually
Romance / Sextortion

Romance Scams & Sextortion

Attackers build fake romantic relationships online, eventually requesting money for emergencies. Sextortion involves collecting intimate images/videos and threatening to publish them unless a ransom is paid. Increasingly targeting teenagers.

🇮🇳 IT Act Sec 67 (obscene material) + Sec 66E + IPC 384 (Extortion)
Investment Fraud

Fake Cryptocurrency / Stock Tips

Victims are added to WhatsApp/Telegram "investment groups" by fake stockbrokers or crypto gurus. Initial small "gains" are shown; when victims invest large sums, the platform disappears. Called "Pig Butchering" scam internationally.

🇮🇳 India: ₹3,200 crore lost to online investment fraud (MHA, 2023)
Tech Support

Fake Tech Support Scams

Victims receive pop-up alerts claiming their computer is "infected" or their "Windows license has expired." Calling the displayed number connects them to fake "Microsoft/Apple support" who remotely access the device and charge for fake fixes or steal financial data.

🇮🇳 IT Act Sec 66 (unauthorized access) + 66D (impersonation)
Lottery / Prize

Lottery & Prize Fraud

"You have won ₹25 lakhs in the KBC lottery!" Victims pay processing fees, taxes, and courier charges to claim prizes that don't exist. Emails and SMS use official-looking logos of KBC, Amazon, or government schemes to appear credible.

🇮🇳 IT Act Sec 66D + IPC 420 (Cheating) + Prize Chits & Money Circulation Act
Government Impersonation

Fake CBI / ED / Police Threats

Victims receive video calls from fake police, CBI, or ED officers claiming the victim's Aadhaar is linked to money laundering. Victims are threatened with arrest and pressured to transfer large sums to "verify" their innocence — a new, highly sophisticated Indian scam type.

🇮🇳 Called "Digital Arrest" scam; PM Modi warned nation in Oct 2024 Mann Ki Baat
E-Commerce

Online Shopping Frauds

Fake shopping websites or fake social media sellers offer products at steep discounts. After payment, goods are never delivered or counterfeit items arrive. Also includes "Cash on Delivery" fraud where sellers cancel orders and substitute cheap alternatives.

🇮🇳 Regulated under Consumer Protection (E-Commerce) Rules 2020 + IT Act

Red Flags — How to Identify an Online Scam

Red FlagWhat It Means
Urgency / Time Pressure"Act within 24 hours or lose the offer" — designed to prevent rational thinking
Upfront Payment RequiredLegitimate jobs, prizes, and loans never require upfront fees
Too Good to Be TrueReturns of 50%/month, jobs paying ₹5 lakhs/month for no skills — unrealistic offers
Requests for OTP / PINNo legitimate bank, government body, or company will ever ask for your OTP or ATM PIN
Unsolicited ContactYou did not enter any lottery; you cannot win a prize you didn't enter
Requests to Install Remote Access AppsAnyDesk, TeamViewer requests from "bank officers" — they will steal your financial data
References
  • National Cyber Crime Reporting Portal: https://cybercrime.gov.in
  • RBI — Beware of Phishing/Fraudulent Calls advisory: https://www.rbi.org.in
  • MHA I4C — Indian Cyber Crime Coordination Centre: https://www.mha.gov.in/en/cybercrime
  • Federal Trade Commission (USA) — Consumer Information on Scams: https://consumer.ftc.gov/scams

Topic 4.7

Cybercrime and Punishments

India's primary cybercrime punishment framework is the Information Technology Act 2000 (as amended in 2008). Certain cybercrimes are also prosecuted under the Indian Penal Code (IPC) — now the Bharatiya Nyaya Sanhita (BNS) 2023. Punishments range from compensation and fines to life imprisonment, depending on the nature and severity of the offence.

IT Act 2000 — Key Sections and Punishments

Section Offence Imprisonment Fine Type
Sec 43 Unauthorised access, damage to computer / data Compensation up to ₹1 crore (civil) Civil
Sec 43A Negligent data breach by body corporate Compensation (adjudicating officer decides) Civil
Sec 66 Computer-related offences (hacking) Up to 3 years Up to ₹5 lakh Both
Sec 66B Receiving stolen computer resource / data dishonestly Up to 3 years Up to ₹1 lakh Both
Sec 66C Identity theft (using another person's digital signature / password / ID) Up to 3 years Up to ₹1 lakh Both
Sec 66D Cheating by impersonation using computer resource Up to 3 years Up to ₹1 lakh Both
Sec 66E Violation of privacy (capturing, publishing private images without consent) Up to 3 years Up to ₹2 lakh Both
Sec 66F Cyber terrorism (attacking critical national infrastructure, causing death/damage) Life Imprisonment As court determines Life
Sec 67 Publishing obscene material in electronic form First conviction: up to 3 years; subsequent: up to 5 years First: ₹5 lakh; subsequent: ₹10 lakh Criminal
Sec 67A Publishing sexually explicit content electronically Up to 5 years Up to ₹10 lakh Criminal
Sec 67B Child sexual abuse material (CSAM) online First: up to 5 years; subsequent: up to 7 years Up to ₹10 lakh Most Severe
Sec 69 Failure to assist Government in decryption of information Up to 7 years Criminal
Sec 72 Breach of confidentiality and privacy by service providers Up to 2 years Up to ₹1 lakh Both

IPC / BNS Sections Applicable to Cyber Cases

IPC Section (BNS Equivalent)Offence in Cyber ContextMax Punishment
IPC 420 (BNS 318)Cheating and dishonestly inducing delivery of property — online fraud7 years + fine
IPC 384 (BNS 308)Extortion — ransomware, sextortion3 years + fine
IPC 499–500 (BNS 356)Defamation — fake social media posts, morphed images2 years + fine
IPC 354D (BNS 78)Cyberstalking — persistent online following, monitoring3 years (repeat: 5 years)
IPC 153A (BNS 196)Promoting enmity between groups — hate speech online3 years + fine
POCSO Act Sec 13–15Child sexual exploitation material (CSAM), online grooming5–7 years (first offence)
⚠️ Critical Point — Cognisable vs Non-Cognisable Offences
Under the IT Act, many offences (Sec 66, 66C, 66D, 66E, 66F, 67) are cognisable — meaning police can arrest without a warrant. This gives law enforcement stronger powers to act quickly in cybercrime cases. Non-cognisable offences require a magistrate's permission before arrest.
References
  • IT Act 2000 (Full Text): https://www.meity.gov.in/content/information-technology-act
  • Bharatiya Nyaya Sanhita 2023 (BNS): https://legislative.gov.in
  • POCSO Act 2012: https://wcd.nic.in/acts/protection-children-sexual-offences-act-2012
  • Vakul Sharma — Information Technology Law and Practice, Universal Law Publishing

Topic 4.8

Cyber Laws & Legal and Ethical Aspects of New Technologies

Emerging technologies — Artificial Intelligence, Internet of Things, Blockchain, the Darknet, and Social Media — create entirely new legal and ethical challenges that existing cyber laws were not designed to address. Each technology raises unique questions around accountability, privacy, jurisdiction, and harm prevention.
🤖
Artificial Intelligence & Machine Learning
Legal & Ethical Challenges
  • Deepfakes: AI-generated fake videos of real people used for political manipulation, non-consensual pornography, or financial fraud. No specific Indian deepfake law yet — prosecuted under IT Act Sec 66E, 67A
  • Algorithmic Bias: AI systems trained on biased data produce discriminatory outcomes (in hiring, lending, policing). Ethical obligation to audit AI systems
  • AI in Cybercrime: AI used to generate phishing emails, voice clones (vishing), and automated vulnerability scans — lowering the skill barrier for attackers
  • Accountability Gap: When AI makes a harmful decision autonomously — who is liable? The developer? The deploying organisation? The user?
  • Data Privacy: AI models trained on personal data without consent violates DPDPA 2023 and GDPR
India's AI Policy: National Strategy for AI (NITI Aayog, 2018). EU AI Act 2024 — first comprehensive AI regulation globally.
🌐
Internet of Things (IoT)
Legal & Ethical Challenges
  • Massive Attack Surface: Billions of poorly secured IoT devices (smart TVs, cameras, routers) create entry points for attackers. Mirai botnet (2016) weaponised 600,000 IoT devices for a DDoS attack
  • Lack of Security Standards: IoT manufacturers prioritise cost over security — no mandatory patch mechanisms, default passwords, no encryption
  • Privacy in Smart Homes: Smart speakers, cameras, and appliances collect continuous data about residents' behaviour — who owns this data?
  • Medical IoT (IoMT): Hacking a pacemaker or insulin pump can directly endanger life — safety and liability framework unclear
  • Critical Infrastructure IoT: SCADA systems, smart grids — compromise can cause city-wide disruption
India: NCIIPC guidelines for IoT in critical sectors. USA: IoT Cybersecurity Improvement Act 2020. EU: Cyber Resilience Act 2024 (mandatory security for IoT products).
⛓️
Blockchain & Cryptocurrency
Legal & Ethical Challenges
  • Money Laundering: Cryptocurrency's pseudonymity facilitates laundering of criminal proceeds — used by ransomware groups, drug markets, and human traffickers
  • Smart Contract Vulnerabilities: Code bugs in smart contracts have led to hundreds of millions in stolen cryptocurrency (e.g., The DAO hack — $60M stolen, 2016)
  • Jurisdictional Ambiguity: Decentralised blockchains have no physical location — which country's law applies?
  • Regulatory Uncertainty in India: India's stance on crypto has shifted repeatedly — taxed at 30% (2022) but not fully legalised; VDA framework under development
  • NFT Fraud: Fake NFT marketplaces, wash trading, and intellectual property theft via unauthorised NFT minting
India: Virtual Digital Assets taxed under IT Act Section 115BBH (Finance Act 2022). PMLA (Prevention of Money Laundering Act) now applies to crypto exchanges.
🕶️
Darknet
Legal & Ethical Challenges
  • What is the Darknet: Part of the internet accessible only via special software (Tor browser); not indexed by search engines. Provides anonymity — used for both legitimate privacy needs and criminal activity
  • Illegal Markets: Dark web marketplaces sell drugs, weapons, stolen data, CSAM, and ransomware-as-a-service. Silk Road (2013) was first major dark web takedown by FBI
  • Indian Data on Dark Web: CERT-IN has found Indian citizen Aadhaar data, bank credentials, and healthcare records for sale on dark web forums
  • Legal Status in India: Accessing the Tor network is not illegal in India. But using it to commit crimes (purchase drugs, CSAM) is prosecuted under IT Act, NDPS Act, and POCSO
  • Law Enforcement Challenges: De-anonymising Tor users requires sophisticated techniques and international cooperation (Europol, FBI)
India: No specific darknet law; applicable laws include IT Act Sec 67B (CSAM), NDPS Act, and Arms Act for related offences.
📲
Social Media — Legal & Ethical Dimensions
Regulation, Accountability & Misinformation
  • IT (Intermediary Guidelines & Digital Media Ethics Code) Rules 2021: Social media platforms with 5 million+ users in India classified as "Significant Social Media Intermediaries" (SSMIs) — must appoint Chief Compliance Officer, Grievance Officer, and Nodal Officer in India; must trace originator of messages (controversial for WhatsApp)
  • Hate Speech and Fake News: IPC Sec 153A (promoting enmity) and Sec 505 (statements causing public mischief) apply to social media content. Platforms must remove flagged content within 36 hours
  • Right to be Forgotten: Under DPDPA 2023, users can request removal of personal data from social media platforms (Data Principal's right to erasure)
  • Cyberbullying and Cyberstalking: Persistent harassment, trolling, and threatening behaviour on social media prosecutable under IT Act Sec 66A (struck down in 2015 — Shreya Singhal case), now under BNS Sec 78
  • Deepfake Misuse on Social Media: AI-generated morphed images/videos of public figures spread viral misinformation — election interference, reputational damage, non-consensual intimate imagery
  • Data Mining by Platforms: Cambridge Analytica scandal — Facebook's data was used to target political advertising without user consent — a landmark privacy violation case
IT (Intermediary Guidelines) Rules 2021: MeitY notification — platforms must comply or lose "safe harbour" immunity from prosecution for user-generated content.
Fig 4.3 — Emerging Technology Legal Framework Map (India)
IT Act 2000 Core Legal Framework 🤖 AI / ML NITI Aayog NSAI + EU AI Act (influence) 🌐 IoT NCIIPC Guidelines + Cyber Resilience Act ⛓️ Blockchain Finance Act 2022 VDA PMLA (crypto exchanges) 📲 Social Media IT Rules 2021 (SSMIs) DPDPA 2023 🕶️ Darknet — IT Act + NDPS + POCSO
References
  • NITI Aayog — National Strategy for Artificial Intelligence: https://niti.gov.in/national-strategy-artificial-intelligence
  • IT (Intermediary Guidelines and Digital Media Ethics Code) Rules 2021: https://www.meity.gov.in
  • EU AI Act 2024: https://artificialintelligenceact.eu
  • Finance Act 2022 — Virtual Digital Assets (Section 115BBH): https://incometaxindia.gov.in
  • Shreya Singhal vs Union of India (2015) — Supreme Court struck down IT Act Sec 66A

Topic 4.9

Case Studies — Online Scams, Frauds & Cybercrime Punishments

📌 Exam Strategy — Case Studies
Case study questions ask you to: (a) identify what type of cybercrime occurred, (b) state the applicable IT Act section, (c) state the punishment, and (d) suggest prevention measures. Practice applying sections 66, 66C, 66D, 66E, 66F, 67, and 67B to scenarios.

Case Study 1 — Pune Citibank Phishing Case (2007) — India's First Major Phishing Conviction

India · 2007 · Banking Fraud · Landmark Conviction
What Happened

Accused Ashish Arora created a fake website that exactly replicated Citibank India's netbanking portal. He sent bulk emails to Citibank customers claiming their account had been suspended and directing them to the fake site. When victims entered their login credentials, Arora captured them and transferred money to mule accounts.

Technical Method
  • Domain spoofing — fake URL resembling the bank's genuine domain
  • HTML cloning of the bank's login page
  • Email harvesting of customer email addresses
  • Use of money mule accounts to layer and withdraw stolen funds
Victims and Loss

Approximately 350 Citibank customers were defrauded of over ₹1.5 crore before the scheme was detected. The cyber crime cell of Mumbai Police traced the accused through his IP address logs.

Legal Outcome
  • Charged under IT Act Section 66 (computer-related offences), Section 66D (cheating by impersonation using computer resource)
  • Also charged under IPC Section 420 (cheating)
  • Convicted and sentenced — this case established that Indian courts would take phishing seriously
Lesson & Prevention Banks must implement DMARC/SPF email authentication to prevent domain spoofing. Users must verify URLs carefully (https + correct domain). Banks must enable 2FA for all online transactions. This case was a turning point in Indian cybercrime prosecution.

Case Study 2 — "Digital Arrest" Scam — Retired Government Officer Loses ₹1 Crore (2024)

India · 2024 · Social Engineering · Ongoing National Crisis
What Happened

A retired IAS officer from Bengaluru, aged 68, received a video call from someone claiming to be a senior CBI officer. The fraudster alleged that the victim's Aadhaar number was linked to a money laundering case and that he was under "digital arrest" — meaning he must remain on the video call 24/7 until the matter was resolved. The victim was kept on the call for 13 days and was instructed to transfer money to "safe RBI accounts" to "verify his innocence."

Psychological Manipulation Techniques
  • Fake video calls from individuals wearing police uniforms in realistic-looking "offices"
  • Use of TRAI/CBI/RBI letterheads and fake warrant documents to create authority
  • Isolation — victim told to speak to no one and stay on video call continuously
  • Fear of arrest, social humiliation, and family involvement
  • Urgency — "transfer within 2 hours or we issue non-bailable warrant"
Financial Loss

The victim transferred ₹1.02 crore across multiple transactions before his family noticed and contacted police. The money had already been layered through multiple accounts and partially converted to cryptocurrency by the time FIR was filed.

Legal Action
  • FIR registered under IT Act Sections 66C, 66D and IPC Sections 419, 420, 384
  • CERT-IN and I4C (Indian Cyber Crime Coordination Centre) were notified
  • PM Modi specifically warned citizens about "Digital Arrest" scams in his October 2024 Mann Ki Baat
Key Lesson — No such thing as "Digital Arrest" Indian law does not provide for "digital arrest." No government agency — not CBI, ED, RBI, TRAI, or police — will ever demand money over a video call or ask you to remain on a call for hours. Any such contact is a scam. Disconnect immediately and report at cybercrime.gov.in or call 1930.

Case Study 3 — WannaCry Ransomware — India's Exposure (2017)

Global + India · 2017 · Ransomware · Critical Infrastructure Risk
What Happened

On May 12, 2017, the WannaCry ransomware infected over 230,000 systems in 150 countries within 24 hours. It exploited the EternalBlue vulnerability in Windows SMB protocol — a zero-day originally developed by the NSA and leaked by the Shadow Brokers hacker group. Once on a machine, WannaCry spread automatically across networks without any user action.

India-Specific Impact
  • CERT-IN issued an emergency advisory at 3 AM on May 13, 2017
  • Several Indian government systems, state electricity boards, and private companies were affected
  • Andhra Pradesh police department's CCTNS (Crime and Criminal Tracking Network) was partially affected
  • Multiple Indian banks reported infections but contained damage quickly through network isolation
What Saved Many Indian Systems
  • Many Indian organisations still used Windows XP (unsupported) — but Microsoft released an emergency patch even for it due to the global scale
  • Quick network isolation by IT teams prevented lateral spread in several organisations
  • The "kill switch" discovered by Marcus Hutchins (a British researcher) helped halt global spread within hours
Legal and Policy Response
  • CERT-IN mandate: all government systems must report incidents within 6 hours
  • MeitY issued patching directives for all government departments
  • North Korea's Lazarus Group was officially attributed by USA, UK, and Australia
Indian Law Applicability Under IT Act Section 43 and 66F, spreading ransomware that damages computer systems constitutes criminal damage (Sec 43) and potentially cyber terrorism (Sec 66F) if it affects critical infrastructure. Attackers, if arrested in India, face imprisonment up to life. Organisations that failed to patch known vulnerabilities also face civil liability under Section 43A for inadequate security practices.

Case Study 4 — Jamtara SIM Swap Gang Conviction (2021)

India · 2021 · SIM Swapping + Vishing · Criminal Conviction
Background

The Jamtara cyber fraud network operated across multiple districts of Jharkhand, West Bengal, and Rajasthan. Gang members — many school dropouts — were trained by local "tutors" in vishing and SIM swap techniques. They operated in coordinated call centres, impersonating bank representatives to defraud victims across all Indian states.

Modus Operandi
  • Purchased victim's basic personal data (name, bank, phone number) from corrupt insiders or through social media OSINT
  • Called victims posing as bank KYC officers, convincing them to share their full card number, CVV, and OTP
  • SIM swapping: Submitted fake documents to telecom stores to transfer victim's phone number to a new SIM — capturing all OTPs
  • Transferred funds immediately to multiple mule accounts; withdrew cash from ATMs in different cities within hours
Investigation and Outcome
  • Operation by Jharkhand Police, Bihar Police, and CBI in a coordinated crackdown in 2020–21
  • Over 150 accused arrested across multiple states in a single operation
  • Convicted under IT Act Sections 66C, 66D and IPC 419, 420; sentences of 2–3 years imprisonment with fines
  • Assets seized including phones, SIM cards, and cash from victims
Systemic Lesson — Telecom Loophole The ease of SIM swapping exposed a critical vulnerability in India's KYC process at retail telecom outlets. Post-conviction, TRAI mandated stricter re-verification for SIM replacement, and UIDAI Aadhaar-based biometric verification for SIM issuance became mandatory. Telecom companies now alert customers via alternative means before completing SIM swaps.

Case Study 5 — Shreya Singhal vs Union of India (2015) — Landmark Cyber Law Judgment

India · 2015 · Constitutional Law · Supreme Court · Positive Precedent
Background

After the death of politician Bal Thackeray in 2012, Shaheen Dhada posted a Facebook status questioning the Mumbai bandh. Her friend Renu Srinivasan "liked" the post. Both were arrested by Palghar Police under IT Act Section 66A — which criminalised "grossly offensive or menacing" online messages. The arrests caused nationwide outrage, and Shreya Singhal filed a Public Interest Litigation (PIL) in the Supreme Court.

What Section 66A Said

IT Act Section 66A allowed arrest for sending any message that was "grossly offensive," "menacing," or caused "annoyance or inconvenience" electronically — with no clear definition of these terms, giving police unchecked power to arrest for protected speech.

Supreme Court Ruling (2015)
  • The Supreme Court unanimously struck down Section 66A as unconstitutional — violating Article 19(1)(a) (Freedom of Speech and Expression)
  • Held that the law was vague, overbroad, and chilling on free speech
  • Distinguished between "discussion/advocacy" (protected) and "incitement" (not protected)
  • Landmark judgment establishing digital speech as protected speech in India
Legacy and Lesson This case proved that cyber laws must balance security with constitutional rights. Poorly drafted cybercrime laws can be used to silence dissent and suppress free speech. Post-Shreya Singhal, Indian cybercrime legislation is more carefully scrutinised. Even today, police in some states try to misuse other IPC sections to arrest for social media posts — the legal precedent of this case remains critical protection.
Fig 4.4 — Case Study Overview: Financial Loss vs Legal Outcome Severity

Summary — Lessons Across Case Studies

CaseCrime TypeKey IT Act SectionCore Lesson
Pune Citibank (2007)Phishing / Identity theftSec 66, 66DEmail authentication + URL verification prevents phishing
Digital Arrest Scam (2024)Social engineering / extortionSec 66C, 66DNo law enforcement body ever conducts "digital arrests" — awareness is the only defence
WannaCry India (2017)Ransomware / Critical infrastructureSec 43, 66FTimely patching and network segmentation prevent catastrophic ransomware spread
Jamtara SIM Swap (2021)SIM swapping / Banking fraudSec 66C, 66DTelecom KYC must be hardened; OTP alone is insufficient authentication
Shreya Singhal (2015)Constitutional / LegalSec 66A (struck down)Cyber law must not infringe fundamental rights; judicial review protects free speech
Unit 4 — Final Takeaway

Cybercrime is not a distant, technical problem — it is a daily reality for Indian citizens, businesses, and government. Understanding the legal framework (IT Act 2000, BNS), recognising attack types, and knowing one's rights under emerging privacy laws are the cornerstones of cyber citizenship. Technology will keep evolving — AI, IoT, blockchain, and the darknet will keep creating new legal challenges. The only lasting defence is an informed, vigilant, and legally empowered population.

Official References
  • IT Act 2000 & 2008 Amendment — MEITY: https://www.meity.gov.in/content/information-technology-act
  • Cybercrime.gov.in (National Reporting Portal): https://cybercrime.gov.in
  • Helpline 1930 — National Cybercrime Helpline (MHA)
  • Shreya Singhal vs UOI [2015] 5 SCC 1 — Supreme Court of India
  • MHA I4C Annual Cybercrime Report 2023: https://www.mha.gov.in
  • Budapest Convention on Cybercrime, Council of Europe
  • Vakul Sharma — Information Technology Law and Practice, 5th Ed., Universal Law Publishing
  • Pavan Duggal — Cyber Law: The Indian Perspective, Saakshar Law Publications