Introduction
Understanding the systematic classification of cyber crimes is essential for investigators. This knowledge helps in proper case registration, application of relevant legal sections, and building a strong case for prosecution. In this part, we explore the three major categories of cyber crimes with real-world examples and legal references.
By completing this part, you will be able to classify cyber crimes into appropriate categories, identify relevant legal sections, and understand the investigation implications for each category.
Crimes Against Individuals
Offenses targeting personal safety, dignity, and privacy of individuals
These crimes directly affect individuals, violating their personal rights, privacy, dignity, or causing psychological or financial harm. They often exploit trust and personal information.
🔒 Identity Theft
Stealing and misusing personal information like Aadhaar, PAN, or banking credentials to impersonate victims.
😠 Cyber Stalking
Repeated online harassment, following, or monitoring of an individual causing fear or distress.
😡 Cyber Bullying
Harassment, intimidation, or humiliation through digital platforms, especially targeting minors.
📷 Morphing/Fake Images
Editing photographs (often making them obscene) and sharing without consent.
🚫 Online Defamation
Publishing false statements online that damage a person's reputation.
🔒 Sextortion
Blackmail using intimate images or videos, threatening to publish unless demands are met.
🎮 Online Grooming
Building trust with minors online for sexual exploitation or trafficking.
💬 Doxing
Publishing private information about an individual without consent to harass or intimidate.
A organized gang operating from Rajasthan would create fake female profiles on dating apps. After gaining trust, they would initiate video calls and secretly record victims in compromising situations. The recordings were then used to extort money, with threats to share videos with family and employers.
Investigation Key: Analysis of payment trails, app data requests, and CDR analysis helped identify the gang operating across multiple states.
Crimes Against Property
Offenses targeting digital assets, financial resources, and intellectual property
These crimes target financial assets, computer systems, data, and intellectual property. They often involve sophisticated technical methods and can cause significant economic damage.
💻 Hacking
Unauthorized access to computer systems, networks, or accounts.
💰 Online Financial Fraud
Deceptive practices to steal money - phishing, vishing, UPI fraud, card cloning.
🔒 Ransomware
Malware encrypting data and demanding payment for decryption keys.
💾 Data Theft
Unauthorized copying or stealing of confidential data from systems.
© Intellectual Property Theft
Piracy, software theft, trademark infringement, and trade secret theft.
💥 DDoS Attacks
Overwhelming systems with traffic to deny service to legitimate users.
✉ Email Spoofing
Sending emails with forged sender addresses, often for BEC fraud.
💳 Credit Card Fraud
Unauthorized use of credit/debit card information for fraudulent transactions.
A manufacturing company received an email appearing to be from their regular supplier, requesting payment to a new bank account. The email matched the supplier's format exactly, with only a single character difference in the domain. Rs. 2.5 crore was transferred before the fraud was discovered.
Investigation Key: Email header analysis revealed the true origin. Bank account analysis and money trail tracking helped identify the beneficiaries.
Crimes Against Government/State
Offenses targeting national security, government infrastructure, and public order
These are the most serious cyber crimes, targeting government systems, critical infrastructure, national security, and public order. They often involve sophisticated actors including nation-states and terrorist organizations.
🎯 Cyber Terrorism
Using technology to cause fear, disruption, or damage for ideological goals.
🔎 Cyber Espionage
Unauthorized access to classified government or defense information.
⚡ Infrastructure Attacks
Targeting power grids, water systems, transportation, or financial systems.
🌐 Website Defacement
Unauthorized modification of government websites for propaganda.
📰 Disinformation Campaigns
Spreading false information to destabilize government or incite violence.
💻 Government Data Breach
Unauthorized access to sensitive government databases and citizen data.
NCIIPC (National Critical Information Infrastructure Protection Centre) designates and protects critical information infrastructure. Attacks on designated CII attract enhanced penalties under Section 66F of the IT Act.
In 2020, a sophisticated malware attack targeted multiple Indian power distribution companies. The malware was designed to remain dormant and could potentially disrupt power supply. Investigation traced the attack to state-sponsored actors.
Investigation Key: Malware analysis, network forensics, and international cooperation were crucial in attributing and mitigating the threat.
Cross-Category Considerations
Many cyber crimes span multiple categories. Understanding this helps in comprehensive investigation and proper legal framing.
| Crime Type | Individual Impact | Property Impact | State Impact |
|---|---|---|---|
| Ransomware on Hospital | Patient safety risk | Data and financial loss | Critical infrastructure threat |
| Banking Trojan | Account compromise | Financial theft | Economic stability |
| Social Media Fake News | Reputation damage | Business losses | Public order threat |
| Data Breach | Privacy violation | IP/trade secret theft | National security (if govt data) |
Key Legal Sections Quick Reference
IT Act 2000 (Key Sections)
- Section 43: Penalty for damage to computer systems
- Section 65: Tampering with computer source documents
- Section 66: Computer related offenses (hacking)
- Section 66C: Identity theft
- Section 66D: Cheating by personation using computer
- Section 66E: Violation of privacy
- Section 66F: Cyber terrorism
- Section 67: Publishing obscene material
- Section 67A: Publishing sexually explicit material
- Section 67B: Child pornography
Section 66A was struck down by the Supreme Court in 2015 (Shreya Singhal v. Union of India) as unconstitutional. Cases previously filed under 66A may now be addressed under BNS provisions or other applicable sections.
- Cyber crimes are categorized into crimes against individuals, property, and government/state
- Crimes against individuals include identity theft, stalking, morphing, sextortion, and defamation
- Property crimes include hacking, financial fraud, ransomware, data theft, and DDoS attacks
- Crimes against the state include cyber terrorism, espionage, and infrastructure attacks
- Many crimes span multiple categories, requiring comprehensive investigation approach
- Proper classification is essential for applying correct legal sections and investigation procedures
- The IT Act 2000 (amended) and new BNS/BNSS/BSA 2023 provide the legal framework