.

Monday, January 14, 2019

Real World

Real serviceman cyber crime cases This document is an extract from the record Cyber crime &038 digital leaven Indian office authored by Rohas Nagpal. This defend is available as coursewargon for the Diploma in Cyber Law and PG Program in Cyber Law conducted by Asian School of Cyber Laws www. asian legalitys. org Cyber nuisance &038 digital attest Indian opinion 23. Real World Cases This chapter serves as a touch on reference guide. First the various scenarios be cover. A detailed discourse on the various cyber crimes, is covered in the ASCL out(a)come titled collar Hackers and Cyber Criminals.This is provided as formalized coursewargon for the ASCL Certified Cyber offence Investigator course. Then the applicable law and legal liabilities ar covered. Then the modus operandi normally followed by the criminals is discussed. The probe guidelines for cyber crime investigators are not discussed in this book as they are part of the syllabus of the ASCL Certified Cyber Crime Investigator course only. For received world case studies on investigation of cyber crimes, please refer to the ASCL e trulydayation titled Case Studies on Cyber Crime Investigation.This is provided as official courseware for the ASCL Certified Cyber Crime Investigator course. 130 2008 Rohas Nagpal. all(prenominal) rights reserved. Cyber Crime &038 digital Evidence Indian sentiment 23. 1 Orkut Fake Profile cases Orkut. com is a very popular online community and accessible net incomeing website. Orkut aimrs support search for and act with people who partake the same hobbies and interests. They move create and join a wide variety of online communities. The writes of Orkut members are publicly take upable. The scenarios 1. A bullshit profile of a woman is created on Orkut.The profile displays her correct name and conflict reading (such as address, residential ph angiotensin converting enzyme amount, cell ph mavin number etc). Some seasons it even has her phot ograph. The problem is that the profile describes her as a bawd or a woman of loose character who wants to bring inner relations with eachone. Other Orkut members see this profile and start calling her at all hours of the day asking for sexual favours. This leads to a lot of badgering for the dupe and likewise defames her in society. 2. An online hate community is created.This community displays objectionable selective data a clear upst a particular country, religious or ethnic multitude or even a ingestst national leaders and historical figures. 3. A fake profile of a man is created on Orkut. The profile contains defamatory discipline a only if the dupe (such as his alleged sexual weakness, alleged iniquitous character etc) The law Scenario 1 Section 67 of study technology act upon and part 509 of the Indian draw upal reckon. Scenario 2 Section 153A and 153B of Indian penal jurisprudence. Scenario 3 Section 500 of Indian Penal regulation. Who is presumable?Sce nario 1 Directors of Orkut as healthy as all those who create and modify the fake profile. Scenario 2 very(prenominal) as Scenario 1. Scenario 3 Same as Scenario 1. 2008 Rohas Nagpal. all(a) rights reserved. 131 Cyber Crime &038 digital Evidence Indian location The agent Scenario 1 Jealousy or revenge (e. g. the victim may lease rejected the advances made by the funny). Scenario 2 Desire to ca affair racial hatred (e. g. Pakistani citizens creating an anti-India online community). Scenario 3 Hatred (e. g. a school student who has failed may victimize his teachers).Modus Operandi 1. The mirthful would create a free Gmail circular victimization a assumed name. 2. The tele transfer ID chosen by him would be unrelated to his real identity. 3. The shadowy would thus login to Orkut. com and create the foul profile. 132 2008 Rohas Nagpal. entirely rights reserved. Cyber Crime &038 digital Evidence Indian Perspective 23. 2 electronic mail Account Hacking Emails a re increasingly creation used for social interaction, championship communication and online proceedings. Most telecommunicate storey holders do not restitution basic precautions to protect their e-mail floor war crys.Cases of theft of electronic mail countersignatures and ensuant debase of email accounts are becoming very everyday. The scenarios 1. The victims email account cry is stolen and the account is and indeedce misused for displace out malicious engrave (computer computer virus, worm, Trojan etc) to people in the victims address book. The recipients of these viruses believe that the email is coming from a cognize person and run the attachments. This infects their data processors with the malicious regulation. 2. The victims email account word is stolen and the editer tries to extort money from the victim.The victim is scuppered that if he does not pay the money, the tuition contained in the emails volition be misused. 3. The victims email account password is stolen and obscene emails are displace to people in the victims address book. The law Scenario 1 Sections 43 and 66 of culture engineering science Act. Scenario 2 Sections 43 and 66 of nurture Technology Act and segment 384 of Indian Penal Code. Scenario 3 Sections 43, 66 and 67 of entropy Technology Act and atom 509 of the Indian Penal Code. Who is apt(predicate)?Scenario 1 Persons who stomach stolen the email account password and who are misvictimization the email account. Scenario 2 Persons who have stolen the email account password and who are threatening to misuse it. 2008 Rohas Nagpal. all told rights reserved. 133 Cyber Crime &038 Digital Evidence Indian Perspective Scenario 3 Persons who have stolen the email account password and who are mis development the email account. The motive(prenominal) Scenario 1 Corporate Espionage, perverse joyfulness in being able to destroy valuable randomness belong to strangers etc. Scenario 2 felonious financia l gain.Scenario 3 Revenge, jealousy, hatred. Modus Operandi 1. The suspect would put keyloggers in public computers (such as cyber cafes, airport lounges etc) or the computers of the victim. 2. Unsuspecting victims would login to their email accounts use these infected computers. 3. The passwords of the victims email accounts would be emailed to the suspect. 134 2008 Rohas Nagpal. all told rights reserved. Cyber Crime &038 Digital Evidence Indian Perspective 23. 3 computer address Card Fraud Credit cards are commonly being used for online booking of airline and railway tickets and for other ecommerce transactions.Although just about of ecommerce websites have implemented strong security measures (such as SSL, secure web servers etc), instances of acknowledgment card frauds are increasing. The scenario The victims credit card information is stolen and misused for qualification online acquires (e. g. airline tickets, software program program, subscription to pornograph ic websites etc). The law Sections 43 and 66 of Information Technology Act and section 420 of Indian Penal Code. Who is conceivable? All persons who have stolen the credit card information as swell as those who have misused it. The motive dirty financial gain.Modus Operandi Scenario 1 The suspect would install keyloggers in public computers (such as cyber cafes, airport lounges etc) or the computers of the victim. Unsuspecting victims would use these infected computers to make online transactions. The credit card information of the victim would be emailed to the suspect. Scenario 2 Petrol pump attendants, workers at retail outlets, hotel waiters etc note down information of the credit cards used for devising payment at these establishments. This information is sold to criminal gangs that misuse it for online frauds. 2008 Rohas Nagpal. All rights reserved. 135 Cyber Crime &038 Digital Evidence Indian Perspective 23. 4 Online Share Trading Fraud With the advent of dematerializ ation of divvy ups in India, it has become authorization for investors to have demat accounts. In most cases an online banking account is linked with the share calling account. This has led to a high number of online share trading frauds. The scenario Scenario 1 The victims account passwords are stolen and his accounts are misused for making double-tongued bank transfers.Scenario 2 The victims account passwords are stolen and his share trading accounts are misused for making unauthorised transactions that result in the victim making losses. The law Scenario 1 Sections 43 and 66 of Information Technology Act and section 420 of Indian Penal Code. Scenario 2 Sections 43 and 66 of Information Technology Act and section 426 of Indian Penal Code. Who is apt? Scenario 1 All persons who have stolen the account information as well as those who have misused it. Scenario 2 All persons who have stolen the account information as well as those who have misused it.The motive Scenario 1 Illegal financial gain Scenario 2 Revenge, jealousy, hatred Modus Operandi Scenario 1 The suspect would install keyloggers in public computers (such as cyber cafes, airport lounges etc) or the computers of the victim. Unsuspecting victims would use these infected computers to login to their online banking and share trading accounts. The passwords and other information of the victim would be emailed to the suspect. Scenario 2 Same as scenario 1. 136 2008 Rohas Nagpal. All rights reserved. Cyber Crime &038 Digital Evidence Indian Perspective 3. 5 tax revenue Evasion and Money Laundering Many unprincipled blood linemen and money launderers (havala operators) are utilise virtual(prenominal) as well as physical storage media for privacy information and records of their illicit bloodline. The scenario Scenario 1 The suspect uses physical storage media for hide the information e. g. clayey drives, floppies, USB drives, prompt phone memory cards, digital camera memory cards, CD ROMs, v ideodisc ROMs, iPods etc. Scenario 2 The suspect uses virtual storage media for hiding the information e. g. mail accounts, online briefcases, FTP sites, Gspace etc. The law Scenario 1 Depending upon the case, aliment of the Income Tax Act and Prevention of Money Laundering Act will apply. Scenario 2 Depending upon the case, provisions of the Income Tax Act and Prevention of Money Laundering Act will apply. Who is liable? Scenario 1 information. The person who hides the Scenario 2 The person who hides the information. If the operators of the virtual storage facility do not cooperate in the investigation, then they also become liable.The motive Scenario 1 Illegal financial gain Scenario 2 Illegal financial gain Modus Operandi Scenario 1 The suspect would purchase small storage devices with boastful data storage capacities. Scenario 2 The suspect would open free or paid accounts with online storage providers. 2008 Rohas Nagpal. All rights reserved. 137 Cyber Crime &038 Digital Ev idence Indian Perspective 23. 6 Source Code Theft Computer character code is the most important addition of software companies. Simply put, source code is the programming instructions that are compiled into the executable files that are sold by software development companies.As is expected, most source code thefts take place in software companies. Some cases are also reported in banks, manufacturing companies and other organisations who confirm original software developed for their use. The scenario Scenario 1 The suspect ( commonly an employee of the victim) diverts the source code and sells it to a business rival of the victim. Scenario 2 The suspect (usually an employee of the victim) steals the source code and uses it as a base to make and sell his own adjustment of the software. The law Scenario 1 Sections 43, 65 and 66 of the Information Technology Act, section 63 of the Copyright Act.Scenario 2 Sections 43, 65 and 66 of the Information Technology Act, section 63 of the C opyright Act. Who is liable? Scenario 1 The persons who steal the source code as well as the persons who purchase the stolen source code. Scenario 2 The persons who steal the source code. The motive Scenario 1 Illegal financial gain. Scenario 2 Illegal financial gain. Modus Operandi Scenario 1 If the suspect is an employee of the victim, he would usually have direct or indirect assenting to the source code. He would steal a copy of the source code and hide it using a virtual or physical storage device. 138 2008 Rohas Nagpal. All rights reserved. Cyber Crime &038 Digital Evidence Indian Perspective If the suspect is not an employee of the victim, he would hack into the victims servers to steal the source code. Or he would use social engineering to get unauthorised access to the code. He would then contact potential bribeers to make the sale. Scenario 2 If the suspect is an employee of the victim, he would usually have direct or indirect access to the source code. He would steal a copy of the source code and hide it using a virtual or physical storage device. If the suspect is not an employee of the victim, e would hack into the victims servers to steal the source code. Or he would use social engineering to get unauthorised access to the code. He would then modify the source code (either himself or in association with other programmers) and launch his own software. 2008 Rohas Nagpal. All rights reserved. 139 Cyber Crime &038 Digital Evidence Indian Perspective 23. 7 Theft of Confidential Information Most business organisations store their excitable information in computer systems. This information is luffed by rivals, criminals and some(prenominal)times disgruntled employees.The scenario Scenario 1 A business rival obtains the information (e. g. tender quotations, business plans etc) using hacking or social engineering. He then uses the information for the benefit of his own business (e. g. quoting start out rates for the tender). Scenario 2 A crimi nal obtains the information by hacking or social engineering and threatens to make the information public unless the victim pays him some money. Scenario 3 A disgruntled employee steals the information and mass mails it to the victims rivals and also posts it to numerous websites and soresgroups.The law Scenario 1 Sections 43 and 66 of the Information Technology Act, section 426 of Indian Penal Code. Scenario 2 Sections 43 and 66 of the Information Technology Act, section 384 of Indian Penal Code. Scenario 3 Sections 43 and 66 of the Information Technology Act, section 426 of Indian Penal Code. Who is liable? Scenario 1 The persons who steal the information as well as the persons who misuse the stolen information. Scenario 2 The persons who steal the information as well as the persons who threaten the victim and extort money.Scenario 3 The disgruntled employee as well as the persons who armed service him in stealing and distributing the information. The motive Scenario 1 Illegal f inancial gain. Scenario 2 Illegal financial gain. Scenario3 Revenge. 140 2008 Rohas Nagpal. All rights reserved. Cyber Crime &038 Digital Evidence Indian Perspective Modus Operandi Scenario 1 The suspect could hire a skilled hacker to break into the victim systems. The hacker could also use social engineering techniques. Illustration A very good aspect woman went to meet the system administrator (sysadmin) of a large confederation.She interviewed the sysadmin for a magazine article. During the interview she flirted a lot with the sysadmin and while deviation she accidentally left her pen drive at the sysadmins room. The sysadmin accessed the pen drive and saw that it contained many photographs of the lady. He did not realize that the photographs were Trojanized once the Trojan was in place, a lot of sensitive information was stolen very easily. Illustration The sysadmin of a large manufacturing company received a beautifully packed CD ROM containing security updates from the company that developed the run system that ran his companys servers.He installed the updates which in reality were Trojanized software. For 3 years after that a lot of confidential information was stolen from the companys systems Scenario 2 Same as scenario 1. Scenario 3 The disgruntled employee would usually have direct or indirect access to the information. He washbasin use his personal computer or a cyber cafe to cattle ranch the information. 2008 Rohas Nagpal. All rights reserved. 141 Cyber Crime &038 Digital Evidence Indian Perspective 23. 8 Software plagiarism Many people do not admit software plagiarisation to be theft.They would never steal a rupee from someone but would not think twice before using pirated software. There is a common perception amongst normal computer users to not determine software as property. This has led to software buccaneering becoming a flourishing business. The scenario Scenario 1 The software pirate sells the pirated software in physica l media (usually CD ROMs) through with(predicate) a close mesh topology of dealers. Scenario 2 The software pirate sells the pirated software through electronic downloads through websites, air boards, bare-asssgroups, spam emails etc.The law Scenario 1 Sections 43 and 66 of the Information Technology Act, section 63 of Copyright Act. Scenario 2 Sections 43 and 66 of the Information Technology Act, section 63 of Copyright Act. Who is liable? Scenario 1 The software pirate as well as the persons who barter for the pirated software from him. Scenario 2 The software pirate as well as the persons who buy the pirated software from him. The motive Scenario 1 Illegal financial gain. Scenario 2 Illegal financial gain. Modus Operandi Scenario 1 The suspect uses high speed CD extra equipment to create multiple copies of the pirated software.This software is sold through a network of computer hardware and software vendors. Scenario 2 The suspect registers a domain name using a fictitious name and then hosts his website using a service provider that is based in a country that does not have cyber laws. much(prenominal) service providers do not divulge client information to law enforcement officials of other countries. 142 2008 Rohas Nagpal. All rights reserved. Cyber Crime &038 Digital Evidence Indian Perspective 23. 9 Music Piracy Many people do not consider music piracy to be theft.They would never steal a rupee from someone but would not think twice before buying or using pirated music. There is a common perception amongst people users to not consider music as property. There is a huge business in music piracy. Thousands of unscrupulous businessmen sell pirated music at throw away prices. The scenario Scenario 1 The music pirate sells the pirated music in physical media (usually CD ROMs) through a close network of dealers. Scenario 2 The music pirate sells the pirated music through electronic downloads through websites, bulletin boards, refreshfulsgroups, spam emails etc.The law Scenario 1 Sections 43 and 66 of the Information Technology Act, section 63 of Copyright Act. Scenario 2 Sections 43 and 66 of the Information Technology Act, section 63 of Copyright Act. Who is liable? Scenario 1 The music pirate as well as the persons who buy the pirated software from him. Scenario 2 The music pirate as well as the persons who buy the pirated software from him. The motive Scenario 1 Illegal financial gain. Scenario 2 Illegal financial gain. Modus Operandi Scenario 1 The suspect uses high speed CD duplication equipment to create multiple copies of the pirated music.This music is sold through a network of dealers. Scenario 2 The suspect registers a domain name using a fictitious name and then hosts his website using a service provider that is based in a country that does not have cyber laws. Such service providers do not divulge client information to law enforcement officials of other countries. 2008 Rohas Nagpal. All rights reserved. 143 Cybe r Crime &038 Digital Evidence Indian Perspective 23. 10 Email Scams Emails are fast emerging as one of the most common methods of communication in the modern world.As can be expected, criminals are also using emails extensively for their illicit activities. The scenario In the first step, the suspect convinces the victim that the victim is going to get a lot of money (by way of winning a lottery or from a corrupt African bureaucrat who wants to transfer his ill gotten gains out of his home country). In order to convince the victim, the suspect sends emails (some having official awaiting at documents as attachments). Once the victim believes this story, the suspect asks for a small hire to cover legal expenses or courier charges.If the victim pays up the money, the suspect stops all contact. The law Section 420 of Indian Penal Code Who is liable? The sender of the email. The motive Illegal financial gain. Modus Operandi The suspect creates email accounts in fictitious names and s ends out millions of fraudulent emails using decent spam software. 144 2008 Rohas Nagpal. All rights reserved. Cyber Crime &038 Digital Evidence Indian Perspective 23. 11 Phishing With the tremendous increase in the use of online banking, online share trading and ecommerce, there has been a corresponding growth in the ncidents of phishing being used to carry out financial frauds. Phishing involves fraudulently acquiring sensitive information (e. g. passwords, credit card details etc) by masquerading as a consecrateed entity. The scenario Scenario 1 The victim receives an email that appears to have been sent from his bank. The email urges the victim to click on the link in the email. When the victim does so, he is taken to a secure rapscallion on the banks website. The victim believes the web page to be authentic and he enters his username, password and other information.In reality, the website is a fake and the victims information is stolen and misused. The law Sections 43 an d 66 of Information Technology Act and sections 419, 420 and 468 of Indian Penal Code. Who is liable? All persons involved in creating and sending the fraudulent emails and creating and maintaining the fake website. The persons who misuse the stolen or phished information are also liable. The motive Illegal financial gain. Modus Operandi The suspect registers a domain name using fictitious details. The domain name is usually such that can be misused for spoofing e. g. covered stadium Bank has its website at www. oodle. com The suspects can target Noodle customers using a domain name like www. noodle-bank-customerlogin. com The suspect then sends spoofed emails to the victims. e. g. the emails may appear to come from email&160protected com The fake website is designed to look exactly like the original website. 2008 Rohas Nagpal. All rights reserved. 145 Cyber Crime &038 Digital Evidence Indian Perspective 23. 12 Cyber Pornography Cyber pornography is believed to be one of the la rgest businesses on the net today. The millions of pornographic websites that flourish on the Internet are testimony to this.While pornography per se is not culpable in many countries, child pornography is strictly illegal in most nations today. Cyber pornography includes pornographic websites, pornographic magazines produced using computers (to publish and put out the material) and the Internet (to download and transmit pornographic pictures, photos, writings etc). The scenario The suspect accepts online payments and allows salaried customers to view / download pornographic pictures, videos etc from his website. The law Section 67 of Information Technology Act. Who is liable? The persons who create and maintain the pornographic websites are liable.In some cases cyber cafe owners and managers may also be liable in case they knowingly allow their customers to access the pornographic websites. The motive Illegal financial gain. Modus Operandi The suspect registers a domain name us ing fictitious details and hosts a website on a server located in a country where cyber pornography is not illegal. The suspect accepts online payments and allows paying customers to view / download pornographic pictures, videos etc from his website. 146 2008 Rohas Nagpal. All rights reserved. Cyber Crime &038 Digital Evidence Indian Perspective 23. 3 Online Sale of Illegal Articles It is becoming increasingly common to find cases where sale of narcotics drugs, weapons, wildlife etc. is being facilitated by the Internet. Information nigh the availability of the products for sale is being posted on auction websites, bulletin boards etc. The scenario The suspect posts information about the illegal sale that he seeks to make. Potential customers can contact the seller using the email IDs provided. If the buyer and seller trust each other after their email and / or telephonic conversation, the essential transaction can be concluded.In most such cases the buyer and seller will meet governance to face at the time of the final transaction. Illustration In March 2007, the Pune unsophisticated police cracked down on an illegal rave fellowship and arrested hundreds of illegal drug users. The social networking site, Orkut. com, is believed to be one of the modes of communication for assembly people for the illegal drug party. The law Depending upon the illegal items being transacted in, provisions of the Narcotic Drugs and Psychotropic Substances Act, Arms Act, Indian Penal Code, Wildlife related laws etc may apply. Who is liable?The persons who buy and sell these items. The motive Illegal financial gain. Modus Operandi The suspect creates an email ID using fictitious details. He then posts messages, about the illegal products, in various chat rooms, bulletin boards, newsgroups etc. Potential customers can contact the seller using the email IDs provided. If the buyer and seller trust each other after their email and / or telephonic conversation, the actual tran saction can be concluded. In most such cases the buyer and seller will meet face to face at the time of the final transaction. 2008 Rohas Nagpal. All rights reserved. 147 Cyber Crime &038 Digital Evidence Indian Perspective 23. 14 Use of Internet and Computers by Terrorists Many terrorists are using virtual as well as physical storage media for hiding information and records of their illicit business. They also use emails and chat rooms to communicate with their counterparts around the globe. The scenario The suspects carry laptops wherein information relating to their activities is stored in encrypted and password protected form. They also create email accounts using fictitious details. In many cases, one email account is shared by many people.E. g. one terrorist composes an email and saves it in the enlist folder. Another terrorist logs into the same account from another urban center / country and reads the saved email. He then composes his reply and saves it in the draft fol der. The emails are not actually sent. This makes email tracking and tracing almost impossible. Terrorists also use physical storage media for hiding the information e. g. hard drives, floppies, USB drives, mobile phone memory cards, digital camera memory cards, CD ROMs, DVD ROMs, iPods etc. They also use virtual storage media for hiding the information e. g. mail accounts, online briefcases, FTP sites, Gspace etc. The law Terrorists are covered by conventional laws such as Indian Penal Code and special legislation relating to terrorism. Who is liable? Terrorists as well as those who help them to protect their information are liable. If email service providers do not assist the law enforcement personnel in the investigation then they are also legally liable. The motive Keeping terrorism related information confidential. Secure communication amongst terrorist group members. Modus Operandi The terrorists purchase small storage devices with large data storage capacities.They also purch ase and use encryption software. The terrorists may also use free or paid accounts with online storage providers. 148 2008 Rohas Nagpal. All rights reserved. Cyber Crime &038 Digital Evidence Indian Perspective 23. 15 virus Attacks Computer viruses are malicious programs that destroy electronic information. As the world is increasingly becoming networked, the threat and damage caused by viruses is growing by leaps and bounds. The scenario Scenario 1 The virus is a general in the wild virus. This path that it is turn outing all over the world and is not targeted at any specific organisation.Scenario 2 The virus targets a particular organisation. This type of a virus is not known to anti-virus companies as it is a new virus created specifically to target a particular organisation. The law Scenario 1 Sections 43 and 66 of Information Technology Act and section 426 of Indian Penal Code. Scenario 2 Sections 43 and 66 of Information Technology Act and section 426 of Indian Penal Cod e. Who is liable? Scenario 1 The cause of the virus. Scenario 2 The creator of the virus as well as the buyer who purchases the virus (usually to target his business rivals).The motive Scenario 1 blast and a perverse cheer in destroying data belonging to strangers. Scenario 2 Illegal business rivalry. financial gain, revenge, Modus Operandi Scenario 1 A highly skilled programmer creates a new type or strain of virus and releases it on the Internet so that it can spread all over the world. Being a new virus, it goes undetected by many anti-virus software and hence is able to spread all over the world and cause a lot of damage. Anti-virus companies are usually able to find a solution within 8 to 48 hours. 2008 Rohas Nagpal. All rights reserved. 149 Cyber Crime &038 Digital Evidence Indian Perspective Scenario 2 A highly skilled programmer creates a new type or strain of virus. He does not release it on the Internet. Instead he sells it for a huge amount of money. The buyer uses the virus to target his rival company. Being a new virus, it may be undetected by the victim companys anti-virus software and hence would be able to cause a lot of damage. Anti-virus companies may never get to know about the existence of the virus. 150 2008 Rohas Nagpal. All rights reserved. Cyber Crime &038 Digital Evidence Indian Perspective 3. 16 Web taint Website defacement is usually the substitution of the original home page of a website with another page (usually pornographic or defamatory in nature) by a hacker. Religious and government sites are regularly targeted by hackers in order to display political or religious beliefs. Disturbing images and offensive phrases might be displayed in the process, as well as a signature of sorts, to show who was responsible for the defacement. Websites are not only defaced for political reasons, many defacers do it just for the thrill.The scenario The homepage of a website is replaced with a pornographic or defamatory page. In case o f Government websites, this is most commonly do on symbolic days (e. g. the Independence day of the country). The law Sections 43 and 66 of Information Technology Act In some cases section 67 and 70 may also apply. Who is liable? The person who defaces the website. The motive Thrill or a perverse pleasure in inciting communal disharmony. Modus Operandi The defacer may exploit the vulnerabilities of the operating system or applications used to host the website.This will allow him to hack into the web server and change the home page and other pages. Alternatively he may launch a creature force or dictionary attack to obtain the administrator passwords for the website. He can then connect to the web server and change the webpages. 2008 Rohas Nagpal. All rights reserved. 151 www. asianlaws. org Head Office 6th Floor, Pride Senate, Behind Indiabulls Mega Store, Senapati Bapat Road, Pune 411016. India Contact verse +91-20-25667148 +91-20-40033365 +91-20-64000000 +91-20-64006464 Ema il email&160protected org URL www. asianlaws. org

No comments:

Post a Comment