Part 3 of 6

Cyber Crime Categories

🕑 60-90 minutes 📝 Legal Classifications 📋 Module 1

Introduction

Understanding the systematic classification of cyber crimes is essential for investigators. This knowledge helps in proper case registration, application of relevant legal sections, and building a strong case for prosecution. In this part, we explore the three major categories of cyber crimes with real-world examples and legal references.

📚 Learning Objectives

By completing this part, you will be able to classify cyber crimes into appropriate categories, identify relevant legal sections, and understand the investigation implications for each category.

Category 1: Crimes Against Individuals
👤

Crimes Against Individuals

Offenses targeting personal safety, dignity, and privacy of individuals

These crimes directly affect individuals, violating their personal rights, privacy, dignity, or causing psychological or financial harm. They often exploit trust and personal information.

🔒 Identity Theft

Stealing and misusing personal information like Aadhaar, PAN, or banking credentials to impersonate victims.

IT Act Sec 66C | BNS Sec 318
😠 Cyber Stalking

Repeated online harassment, following, or monitoring of an individual causing fear or distress.

IT Act Sec 66A* | BNS Sec 78, 351
😡 Cyber Bullying

Harassment, intimidation, or humiliation through digital platforms, especially targeting minors.

IT Act Sec 67 | BNS Sec 351, 352
📷 Morphing/Fake Images

Editing photographs (often making them obscene) and sharing without consent.

IT Act Sec 66E, 67A | BNS Sec 79
🚫 Online Defamation

Publishing false statements online that damage a person's reputation.

BNS Sec 356 | IT Act Sec 66A*
🔒 Sextortion

Blackmail using intimate images or videos, threatening to publish unless demands are met.

IT Act Sec 66E, 67A | BNS Sec 308, 351
🎮 Online Grooming

Building trust with minors online for sexual exploitation or trafficking.

IT Act Sec 67B | POCSO Act
💬 Doxing

Publishing private information about an individual without consent to harass or intimidate.

IT Act Sec 66E | BNS Sec 351, 352
🔎 Case Example: Sextortion Racket

A organized gang operating from Rajasthan would create fake female profiles on dating apps. After gaining trust, they would initiate video calls and secretly record victims in compromising situations. The recordings were then used to extort money, with threats to share videos with family and employers.

Investigation Key: Analysis of payment trails, app data requests, and CDR analysis helped identify the gang operating across multiple states.

Category 2: Crimes Against Property
💰

Crimes Against Property

Offenses targeting digital assets, financial resources, and intellectual property

These crimes target financial assets, computer systems, data, and intellectual property. They often involve sophisticated technical methods and can cause significant economic damage.

💻 Hacking

Unauthorized access to computer systems, networks, or accounts.

IT Act Sec 43, 66 | BNS Sec 329
💰 Online Financial Fraud

Deceptive practices to steal money - phishing, vishing, UPI fraud, card cloning.

IT Act Sec 66C, 66D | BNS Sec 318, 319
🔒 Ransomware

Malware encrypting data and demanding payment for decryption keys.

IT Act Sec 43, 66 | BNS Sec 308
💾 Data Theft

Unauthorized copying or stealing of confidential data from systems.

IT Act Sec 43(b), 65 | BNS Sec 329
© Intellectual Property Theft

Piracy, software theft, trademark infringement, and trade secret theft.

Copyright Act | IT Act Sec 43
💥 DDoS Attacks

Overwhelming systems with traffic to deny service to legitimate users.

IT Act Sec 43(e), 66
✉ Email Spoofing

Sending emails with forged sender addresses, often for BEC fraud.

IT Act Sec 66C, 66D | BNS Sec 336
💳 Credit Card Fraud

Unauthorized use of credit/debit card information for fraudulent transactions.

IT Act Sec 66C, 66D | BNS Sec 318
🔎 Case Example: Business Email Compromise (BEC)

A manufacturing company received an email appearing to be from their regular supplier, requesting payment to a new bank account. The email matched the supplier's format exactly, with only a single character difference in the domain. Rs. 2.5 crore was transferred before the fraud was discovered.

Investigation Key: Email header analysis revealed the true origin. Bank account analysis and money trail tracking helped identify the beneficiaries.

Category 3: Crimes Against Government/State
🎯

Crimes Against Government/State

Offenses targeting national security, government infrastructure, and public order

These are the most serious cyber crimes, targeting government systems, critical infrastructure, national security, and public order. They often involve sophisticated actors including nation-states and terrorist organizations.

🎯 Cyber Terrorism

Using technology to cause fear, disruption, or damage for ideological goals.

IT Act Sec 66F | UAPA | BNS Sec 113
🔎 Cyber Espionage

Unauthorized access to classified government or defense information.

IT Act Sec 66, 66F | Official Secrets Act
⚡ Infrastructure Attacks

Targeting power grids, water systems, transportation, or financial systems.

IT Act Sec 66F | NCIIPC Guidelines
🌐 Website Defacement

Unauthorized modification of government websites for propaganda.

IT Act Sec 43, 66 | BNS Sec 329
📰 Disinformation Campaigns

Spreading false information to destabilize government or incite violence.

IT Act Sec 66A* | BNS Sec 353
💻 Government Data Breach

Unauthorized access to sensitive government databases and citizen data.

IT Act Sec 43, 66 | DPDPA 2023
Critical Infrastructure Protection

NCIIPC (National Critical Information Infrastructure Protection Centre) designates and protects critical information infrastructure. Attacks on designated CII attract enhanced penalties under Section 66F of the IT Act.

🔎 Case Example: Power Grid Attack Attempt

In 2020, a sophisticated malware attack targeted multiple Indian power distribution companies. The malware was designed to remain dormant and could potentially disrupt power supply. Investigation traced the attack to state-sponsored actors.

Investigation Key: Malware analysis, network forensics, and international cooperation were crucial in attributing and mitigating the threat.

Cross-Category Crimes

Cross-Category Considerations

Many cyber crimes span multiple categories. Understanding this helps in comprehensive investigation and proper legal framing.

Crime Type Individual Impact Property Impact State Impact
Ransomware on Hospital Patient safety risk Data and financial loss Critical infrastructure threat
Banking Trojan Account compromise Financial theft Economic stability
Social Media Fake News Reputation damage Business losses Public order threat
Data Breach Privacy violation IP/trade secret theft National security (if govt data)
Legal Framework Quick Reference

IT Act 2000 (Key Sections)

  • Section 43: Penalty for damage to computer systems
  • Section 65: Tampering with computer source documents
  • Section 66: Computer related offenses (hacking)
  • Section 66C: Identity theft
  • Section 66D: Cheating by personation using computer
  • Section 66E: Violation of privacy
  • Section 66F: Cyber terrorism
  • Section 67: Publishing obscene material
  • Section 67A: Publishing sexually explicit material
  • Section 67B: Child pornography
💡 Note on Section 66A

Section 66A was struck down by the Supreme Court in 2015 (Shreya Singhal v. Union of India) as unconstitutional. Cases previously filed under 66A may now be addressed under BNS provisions or other applicable sections.

📚 Key Takeaways
  • Cyber crimes are categorized into crimes against individuals, property, and government/state
  • Crimes against individuals include identity theft, stalking, morphing, sextortion, and defamation
  • Property crimes include hacking, financial fraud, ransomware, data theft, and DDoS attacks
  • Crimes against the state include cyber terrorism, espionage, and infrastructure attacks
  • Many crimes span multiple categories, requiring comprehensive investigation approach
  • Proper classification is essential for applying correct legal sections and investigation procedures
  • The IT Act 2000 (amended) and new BNS/BNSS/BSA 2023 provide the legal framework