1. Information Age and Cyber Crime 1
Cyber Space 1
Historical Roots of the Internet 6
Relationship between Computers Crime and Law 10
Information Age: The Third Wave 12
The Economy: Knowledge-based 16
From Information Super-highway to the Information Society 19
2. The Nature and Concept of Crime 23
Mental Elements of Crime 24
Brief Historical Perspective of Criminal Law 24
Classification of Crimes 27
Criminal Responsibility 28
Theories of Aetiology of Crime 29
Theories and Objectives of Punishment 32
The Organized Crime 35
The "White-Collar" Crime 36
Terrorism 37
Cyber Crime 38
3. Cyber Crime 41
Definition of "Computer Crime" 43
Computer Crime Categories: How Techno-Criminals Operate 46
Types of Computer Crimes 46
Another System of Classification of Computer Crime 50
Crime on Web 55
Special Problems Related with Computer-related Crime 59
Perspective on Legal Issues 62
Indian Scenario 63
4. Cyber Jurisdiction 68
Definition of Cyber Jurisdiction 68
The Model for Jurisdictional Analysis 69
Cyber Jurisdiction 72
The Indian Context of Cyber Jurisdiction 86
5. Cyber Crime and Criminal Codification in India 89
Ⅰ. Offences by or Relating to Public Servants 89
Ⅱ. Offences against the Public Tranquility 92
Ⅲ. Offences Relating to the Army, Navy and Air Force 95
Ⅳ. Offences against the State 96
Ⅴ. Offences Relating to Elections 98
Ⅵ. Contempt of Lawful Authority of Public Servant 101
Ⅶ. False Evidence and Offences against Public Justice 108
Ⅷ. Offences Relating to Coin and Government Stamps 120
Ⅸ. Offences Relating to Weights and Measures 120
Ⅹ. Offences Affecting the Public Health, Safety,Convenience, Decency and Morals 121
Ⅺ. Of Offences Relating to Religion 125
Ⅻ. Of Offences Affecting the Human Body 126
ⅩⅢ. Offences against Property 128
ⅩⅠⅤ. Offences Relating to Documents and to Property Marks 132
ⅩⅤ. Of the Criminal Breach of Contracts of Service 140
ⅩⅤⅠ. Of Defamation 140
ⅩⅤⅡ. Of Criminal Intimidation, Insult and Annoyance 145
ⅩⅤⅢ. Of Attempts to Commit Offences 148
6. Protection of Intellectual Property—Ⅰ(Patents, Trademarks and Databases) 155
Patents 157
Indian Patent Law 160
Trade Marks 168
Databases 189
7. Protection of Intellectual Property—Ⅱ (Copyrights) 219
Copyrights 220
8. Digital Signature 238
Working of Digital Signature Technology 244
9. Issues of Encryptation and Cryptography 252
Transition to Electronic Transactions 252
Security of Information Systems and Cryptography 255
Cryptography in India 260
Electronic Payments 263
Special Issues for Consideration with Cryptography Policy 266
International Co-operation 274
Government Activities Related to Cryptography Policy 275
Other Issues 280
10. Privacy Issues in the Information Age 282
Privacy and Surveillance 284
Privacy: Meaning 286
Legal Perspective and Framework 295
11. Kind and Pattern of Intrusions' Motive 317
Methods of Attack 321
Topology of Intruders 322
Global Differences 326
Future Issues 335
12. Communication Network as Surveillance Tool 340
The Web 340
Intelligence 342
Tool 342
Espionage 343
The Interlude 345
Data and Information Processing 347
The Operations 348
The Tradecraft 349
The Armament 351
Other Forms of Conflict/War 356
Agitation, Subversion, and Rioting 357
Propaganda, Psyops, Disinformation, DiversionaryDiplomacy 357
Economic Intelligence and Attacks 359
Web or Net Crimes 359
Information Warfare 360
Guerrilla Warfare and Terrorism 362
13. Hackers Psychology and Laws Related to Hacking 364
Genesis of the term Hacker 366
Theories of Delinquency (Hacker Behaviour) 368
New Taxonomy 371
Psychological Profiles 373
14. Identity and Information Theft 378
Identity Theft Case Files 384
Avoid Being an Easy Target 386
15. Cyber Fraud and Electronic Misuse 397
Definition of Computer Fraud or Cyber Fraud 398
Characteristics Cyber Fraud Offence 399
How Victims are Deceived? 401
How the Victims of Cyber Fraud are Deceived? 402
The Legal Issues 404
Fraud-related Offenses 404
16. Pornography and Obscenity on Web 416
Historical Roots 419
United Kingdom 419
United State of America 422
India 429
Internet and Pornography 433
17. Computer Viruses 459
Earliest History of Viral Programs 459
Early Viral Related Programs 461
Kinds of Viruses Programs 478
Working of Viruses 482
Mechanism of Infection of Virus 483
File Infectors 484
Disk Infectors 484
Methods of Distribution of Viruses 489
18. Cyberstalking 493
Malice 493
19. Protection of Cyber Crimes 500
Encryption in Crime and Terrorism 502
Law Enforcement Options 510
Other Technologies for Hiding Evidence 517
Concealing Crimes through Anonymity 520
Index 528