Crime Branch Advisory
The Nigerian Scam
Frequently Used Cyber Crimes
These are event dependent programs.
This implies that these programs are created to do something only
when a certain event (known as a trigger event) occurs. E.g. even
some viruses may be termed logic bombs because they lie dormant
all through the year and become active only on a particular date
(like the Chernobyl virus).
A Trojan as this program is aptly
called, is an unauthorized program which functions from inside what
seems to be an authorized program, thereby concealing what it is
There are many simple ways of installing
a Trojan in someone's computer. To cite and example, two friends
Rahul and Mukesh (names changed), had a heated argument over one
girl, Radha (name changed) whom they both liked. When the girl,
asked to choose, chose Mukesh over Rahul, Rahul decided to get even.
On the 14th of February, he sent Mukesh a spoofed e-card, which
appeared to have come from Radha's mail account. The e-card actually
contained a Trojan. As soon as Mukesh opened the card, the Trojan
was installed on his computer. Rahul now had complete control over
Mukesh's computer and proceeded to harass him thoroughly.
Internet time thefts
This connotes the usage by an unauthorized
person of the Internet hours paid for by another person. In a case
reported before the enactment of the Information Technology Act,
2000 Colonel Bajwa, a resident of New Delhi, asked a nearby net
café owner to come and set up his Internet connection. For
this purpose, the net café owner needed to know his username
and password. After having set up the connection he went away with
knowing the present username and password. He then sold this information
to another net café. One week later Colonel Bajwa found that
his Internet hours were almost over. Out of the 100 hours that he
had bought, 94 hours had been used up within the span of that week.
Surprised, he reported the incident to the Delhi police. The police
could not believe that time could be stolen. They were not aware
of the concept of time-theft at all. Colonel Bajwa's report was
rejected. He decided to approach The Times of India, New Delhi.
They, in turn carried a report about the inadequacy of the New Delhi
Police in handling cyber crimes. The Commissioner of Police, Delhi
then took the case into his own hands and the police under his directions
raided and arrested the net café owner under the charge of
theft as defined by the Indian Penal Code. The net café owner
spent several weeks locked up in Tihar jail before being granted
This occurs when someone forcefully
takes control of a website (by cracking the password and later changing
it). The actual owner of the website does not have any more control
over what appears on that website In a recent incident reported
in the USA the owner of a hobby website for children received an
e-mail informing her that a group of hackers had gained control
over her website. They demanded a ransom of 1 million dollars from
her. The owner, a schoolteacher, did not take the threat seriously.
She felt that it was just a scare tactic and ignored the e-mail.
It was three days later that she came to know, following many telephone
calls from all over the country, that the hackers had web jacked
her website. Subsequently, they had altered a portion of the website
which was entitled 'How to have fun with goldfish'. In all the places
where it had been mentioned, they had replaced the word 'goldfish'
with the word 'piranhas'. Piranhas are tiny but extremely dangerous
flesh-eating fish. Many children had visited the popular website
and had believed what the contents of the website suggested. These
unfortunate children followed the instructions, tried to play with
piranhas, which they bought from pet shops, and were very seriously
Theft of computer system
This type of offence involves the
theft of a computer, some part(s) of a computer or a peripheral
attached to the computer.
Physically damaging a computer
This crime is committed by physically
damaging a computer or its peripherals.