Email crimes, Cyber Fraud, And IT Laws.

cyberwarehack
6 min readJul 11, 2021

Hey, guys, I was recently selected as a summer intern at #GPCSSI2021 Thank you Rakshit Tandon sir for this greate opportunity.

Which was an initiative of the Gurugram Police and mentored by Rakshit Tandon who is a Cyber Security Expert and Consultant.

So there were some cases of email crimes and frauds shared by Rakshit sir taking place all over India and I will be sharing some of them with you and how you can prevent these kinds of fraus and scams from taking place.

  1. Lottery Scams

In this type of fraud an individual is sent an email saying “about winning a hefty sum of money in a lottery”. And then the individual checks the email and gets fooled by the attacker and starts believing that he/she has won a lottery.

Then the winner is asked to pay the so-called “processing fees” and this individual ends up paying these fees and the fraud has been taken place. And the lottery is never been given to that individual.

Preventions for these Lottery frauds

Never open emails from untrusted sources.

Money comes from hard work.

Don't open any of the lottery links or messages sent.

If hit by a fraud report as soon as possible to your nearest cyber cell department.

2. Blackmailing

In these cases, the individual has been done a video call by an unknown person or account (if on Instagram or Facebook)and as soon as the call is been picked up by the victim and adult content is been playing on the other side.

And then the attacker starts screen recording and then the blackmailing starts and the attacker demand an amount of money and when you pay the amount for the first month the attacker stops for some time and then calls on a monthly basis and start asking for money.

Preventions for these Blackmailing

Don't pick up any video call from an unknown person.

If you picked up then please cover your cammers with your finger.

If you get blackmailing the please tell your, family members, and report cybercrime to your nearest cyber cell department.

These were the most common frauds done by attackers on people.

cybercrime portal for Indians.

You can also report a cybercrime at https://cybercrime.gov.in a website started by the Indian government, and you can report any crime on this portal such as frauds, account takeover, blackmailing.

And a special section is made for women and child crimes and also for anonymous reporting and you can also enroll yourself as a volunteer in these programs and help the government to solve the cyber problems.

There is another website called http://www.cybercelldelhi.in/ where you can get the latest information about the latest frauds and scams taking place all over India and how to prevent these types of scams.

You can also keep these things in mind while surfing the internet.

Never ever share your personal details through chats and phone calls.

And turn on 2-factor auth on all your accounts and keep a strong password.

Never pick up a video call from an unknown person.

Never backup your data on google cloud as it does not has any security and anyone can access that data.

Now that we have discussed some of the common frauds let's see what will be sections applicable for those attackers.

While I was an intern at #GPCSSI2021 there was a session arranged on IT Laws by Mr.Pavan Duggal.

He is an Indian advocate specialized in the field of cyberlaw and e-commerce law. He is also a member of the NOMCOM Committee on Multilingual Internet Names Consortium. Pavan’s was for some time a recognized face as an English newsreader with the Indian state-run television network Doordarshan.

The following IT laws were discussed by Mr. Pavan Duggal.

Note Thes are the official statements taken from these sources and belongs to the website owner “https://indiankanoon.org/doc

Section 66 B:- Whoever dishonestly received or retains any stolen computer resource or communication device knowing or having reason to believe the same to be stolen computer resource or communication device, shall be punished with imprisonment of either description for a term which may extend to three years or with fine which may extend to rupees one lakh or with both.

Section 66 C:- Whoever, fraudulently or dishonestly make use of the electronic signature, password, or any other unique identification feature of any other person shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine with may extend to rupees one lakh.

Section 66 D:- Whoever, by means of any communication device or computer resource cheats by personation, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to one lakh rupees.

Section 66 E:- Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person, shall be punished with imprisonment which may extend to three years or with fine not exceeding two lakh rupees

Section 66 F:-(1) Whoever, —

(A) with intent to threaten the unity, integrity, security, or sovereignty of India or to strike terror in the people or any section of the people by —

(i) denying or cause the denial of access to any person authorized to access computer resources; or

(ii) attempting to penetrate or access a computer resource without authorization or exceeding authorized access; or

(iii) introducing or causing to introduce any computer contaminant, and by means of such conduct causes or is likely to cause death or injuries to persons or damage to or destruction of property or disrupts or knowing that it is likely to cause damage or disruption of supplies or services essential to the life of the community or adversely affect the critical information infrastructure specified under section 70;

(B) knowingly or intentionally penetrates or accesses a computer resource without authorization or exceeding authorized access, and by means of such conduct obtains access to information, data or computer database that is restricted for reasons of the security of the State or foreign relations; or any restricted information, data or computer database, with reasons to believe that such information, data or computer database so obtained may be used to cause or likely to cause injury to the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States, public order, decency or morality, or in relation to contempt of court, defamation or incitement to an offense, or to the advantage of any foreign nation, group of individuals or otherwise, commits the offense of cyber terrorism.

(2) Whoever commits or conspires to commit cyber terrorism shall be punishable with imprisonment which may extend to imprisonment for life.

copyright of images belongs to the respective copyright holders.

--

--