IMPORTANT CASE-LAWS ON CYBER LAW WITH THEIR ANSWERS Illustration 1 If you physically take the mobile phone of your friend in your hand without his permission also amounts to "securing its access" i.e. hacking. ANSWER: SEC-43 & 66 Illustration 2 Guessing of a sequence on mobile phone to unlock the phone or guessing and keying in passwords on computers or ATM Pin Numbers amounts to Hacking. ANSWER: SEC-66 & 43 Illustration 3 A Student who was hailing from Jamnagar and had completed his Bachelor of Computer Application course (BCA). He allegedly got into the website of Gujarat Technological University (GTU) and changed its data to get admission in a post-graduation course. This student had allegedly broken into the GTU website for getting admission in Master of Computer Application (MCA). This act of the said student is called an act of hacking. ANSWER: SEC-43 & 66 Illustration 4 On Aug 16, 2010 the liquor baron and Rajya Sabha member, Mr. Vijay Mallya's parliamentary website had been hacked by the Pakistan cyber army. The Pakistan cyber army not only hacked the website but also Swapnil Patni Classes Page 1 threatened to make "Indian cyberspace into hell". This act constitutes hacking into a web server. ANSWER: SEC-43,66,75,66F Illustration 5 Manali was a 13 year old from Mumbai who struck up an online friendship on the popular social networking site facebook with person she believed was a new boy in her hometown. In actuality, the "friend" was a group of individuals, including adults, who were intent on humiliating the poor girl because of a friendship with another child that had gone away. Manali was very upset when she found out the truth, then later committed suicide once the friendship had terminated. ANSWER: SEC-66A Illustration 6 In a place near Mumbai, A fake facebook profile with her picture, address and phone number was created of a widowed lady who stays in a chawl and in the status they wrote "I get fantasized when someone rapes me". She got all nasty phone calls and people handed on her door mid-night shouting we want to rape you open the door. ANSWER: SEC-67 Illustration 7 The biggest case of identity theft ever seen, took place in August of 2009. Eleven people, including a US secrete service informant, had been charged in connection with the hacking of nine major retailers and the theft and sale of more than 41 million credit and debit card numbers. This data breach is believed to be the largest hacking and identity theft case. Swapnil Patni Classes Page 2 ANSWER: SEC-66C,43 & 66(65 IS SOURCE CODE) Illustration 8 UTV Motion Pictures felt prey to identity theft. The company learnt that the perpetrators not only created a fake company profile on a popular social networking site, but also organized auditions to cast aspiring actors in a film under the said banner. Reportedly, the scam set-up took quite a sum of money from the actors to land roles in the film. A same type of case was also handled by me for Balaji Telefilms. ANSWER: SEC-66D Illustration 9 Ms. Riya visits her cousin Ms. Ruchi's house, Riya finds the desktop computer switched on, when Riya surfs into the hard disk, she likes certain Pdf files, Riya fraudulently copies certain files to her pen drive without Ruchi's permission. ANSWER: SEC-66 & 43 Illustration 10 Mr. Sunil Verma works with an MNC, from last 4 years, he has just got a lucrative job with the competitor company, and he was on a notice period for one month. On his last day with the current employer Vunil attaches all data files with regards to clients and certain software source code to his personal Gmail id. ANSWER: SEC-43,66,72A( If contract is signed) Illustration 11 Swapnil Patni Classes Page 3 Downloading.mp3 songs from free websites by not paying amounts to data theft on the copyright owner of the song. ANSWER: SEC-66 & 43 Illustration 12 In 1998, a 12-year-old boy successfully hacked into the controls for the huge Roosevelt Dam on the Salt River in Arizona, USA. He might have released floodwaters that would have inundated Mesa and Tempe, endangering at least 1 million people. This act was likely to cause death or injuries to persons. ANSWER: SEC-66F Illustration 13 In 1997, 35 computer specialists used hacking tools freely available on 1,900 web sites to shut down large segments of the US power grid. They also silenced the command and control system of the Pacific Command in Honolulu. This specialist thus committed the crime of cyber terrorism by causing or likely to cause injury to the interest of the sovereignty and integrity of country. ANSWER: SEC-66F Illustration 14 Mr. Shankaran a vendor of Nuclear Corporation brings his pen drive to nuclear corporation office premises and connects his pen drive to a computer for copying a file. He does not scan his pen drive with an Antivirus. The virus and worm present on his pen drive infects the computer. The virus causes to delete critical data and worm stops internet access. Swapnil Patni Classes Page 4 ANSWER: SEC-66 & 43 Illustration 15 A customer of ICICI Bank named Mr. Umashankar Siva Subramaniam lost Rs. 6.46 lakhs through Phising. Mr. Umashankar Siva Subramaniam, who claimed he received an email in September 2007 from ICICI, asking him to reply with his internet banking username and password or else his account would become non-existent. After the reply to this mail he witnessed a transfer of Rs. 6.46 lakh from his account to that of a company which withdrew Rs. 4.6 lakh from an ICICI branch in Mumbai and retained the balance in its account. ANSWER: SEC-66D, 66A Illustration 16 Mr. Sunil Reddy an government employee receives an Microsoft lottery email claiming that he has won prize of $100,00,000. When Mr. Sunil Reddy responds to the email, he is asked to send $750 for getting the cheque couriered. When the money is payed by Mr. Sunil, a photocopy of cheque with $100,00,000 as denomination with the name of Mr. Sunil Reddy is sent to him, Mr. Sunil is now asked for $2500 for banking clearance so that original cheque can be sent. This kind of email fraud is also called as Nigerian 419 Scam. ANSWER: SEC-66D, 66A Illustration 17 A branch of the Global Trust Bank experienced a run on the bank. Numerous customers decided to withdraw all their money and close their Swapnil Patni Classes Page 5 accounts. It was revealed that someone had sent out spoofed emails to many of the bank's customers stating that the bank was in very had shape financially and could close operations at any time. ANSWER: SEC-66D, 66A Illustration 18 An engineering student was using the auction website called www.bazee.com website to sell a video depicting two school students having sexual intercourse. Bazee.com was held liable for distributing porn and hence the CEO was arrested. The CEO was held for abating pornography by Delhi police. ANSWER: SEC-67B Illustration 20 In Mumbai a Swiss couple would gather slum children and then would force them to appear for obscene photographs. They would then upload these photographs to websites specially designed for pedophile. ANSWER: SEC-67B Illustration 21 A series of distributed denial of service attacks in February 2000 crippled many popular websites including yahoo.com, amazon.com and cnn.com. In distributed denial of service attacks, the attacker uses zombie's i.e. computer's which are unknowingly used by the attacker to simultaneously attacker the target. These zombies's innocently became the crime abettors. ANSWER: SEC-43 & 66 Swapnil Patni Classes Page 6