Lawyers with over 38 years of standing and thousands of rightly resolved matters. START CONSULTING:
The Indian Government upholds cybersecurity through Information Technology Act, 2000. The Act prevents, controls and punishes cyber misconducts. Cybercrimes are basically unlawful acts performed by using or targeting a computer technology and therefore come under the ambit of Cyber Law. With the emergence of e-banking, e-commerce, and e-governance, such crimes are on an upsurge. In the wake of this, it was rather a necessity to encompass the world of technology with a specific law. Today, every unlawful activity such as fraud, harassing, defaming, spoofing, stalking, pornography, gambling etc. come under the ambit of cybercrime. Our expert cyber law advocates in Dehradun adopt a tactical approach while dealing in cybercrime cases.
B&B Associates LLP is the only law firm in Dehradun which has an active collaboration with private cyber forensics. This collaboration effectively helps our cyber lawyers in matters of evidence determination. Besides, our forensic partners are renowned for having worked on some of the most crucial cybercrime cases, as well as other cases of national significance.
The law firm takes up matters of cybercrimes against person, personal property, government, against the society at large, and against international subjects.
Hacking is a remote intrusion caused by accessing a computer system without the permission of its owner. Hackers is the term denoted to people who conduct hacking. Hackers, generally, are computer programmers with an advanced understanding of computers, and a melafide intent of using their knowledge. Hackers, sometimes, even have the capability of remaining highly disguised and thoroughly untraceable. Hackers can also have a developed skill set in a particular program or language. Hackers may have varied motives behind their attack. The most common emerge out of the three common human yearnings of greed, fame, and power. While some hackers hack for the fun of it, some do it to demonstrate their expertise and earn reward in the hacking underworld (yes it exists). A hacking attempt by a hacker who only wishes to demonstrate his superiority or domain expertise by casting his trick, may not even cause any actual damage to his subject, nevertheless, it is counted as an illegal act of breach and is a punishable offense.Besides, hackers pose a serious threat of damage to the intellectual property of the subject by modifying software and programs. On an extreme end, hacking can cause damage to property and lives by taking control of hardware devices and carrying out destruction and terrorist activities (as seen in sci-fi movies).
a. Crackers:
Negative tendencies such as lust and voyeuristic intent can also play as motivator behind hacking, besides, some hackers hack for the purpose of causing annoyance and satisfying their whim by being destructive. Such hackers are generally referred to as “Crackers”.
b. Black Hats
The “Black Hats” hack systems and programs purely out of an intellectual curiosity. These black hat hackers are hired by an IT companies to find errors/ lapse/ flaw/ vulnerability in programs and security systems and develop methods of making them more secure. When hired for an ethical purpose, these “black hat” hackers are referred to as “White Hat” hackers.
c. White hats:
You saw it coming didn’t you? Ironically, these hackers legally hack to prevent the abuse of a computer system ‘by an unauthorized/ wrong person’. Their work essentially is to find the vulnerability and breach into a computer program/ systems. However, the purpose of a white hat hacker does not always remain altruistic. At times, white hat hackers turn back to being back hat hackers for garnering further fame or to land even better paying jobs with top IT companies. While at other times, the white hats turn black to quench a fetish of being termed as “security experts”.
“Grey Hat” hacking:
Interestingly, as always, here too is a zone between the black and the white called the “Grey Hat” hacking. For example, hacking done for a client under an assignment of which the scope is ambiguous. Or, any hacking done with an intent of causing a benefit.
A few computer geniuses who once use to be hackers:
We do not promote hacking or idealize it. As cyber lawyers, however, we cannot rule out the chances of hacking committed by an impersonator. It is our job to make a distinction between various sorts of hacking, and ensure that an innocent person or an accused is not wrongfully tried. Besides, we ensure that the due process of law is adopted.
a. SQL Injections: A breach in an unprotected SQL Database. Hackers track down the vulnerabilities in a website’s software program and inject SQL hacking code in web-entry fields such as username and password fields. The SQL hack is an additional command which manipulates the contents of the database to enable a successful login. By this method, a hacker can take control of the backend as well as user accounts and cause serious harm by stealing and misusing valuable propriety, business, and financial information.
b. FTP Password theft: Another way of tampering with the websites, this method plays on the vulnerability of webmasters who store confidential login information on poorly protected computers. The hacker pulls FTP login details and relays it to a remote computer to log into a website to pose threat and cause damage.
c. Cross-Site Scripting: Formerly known as CSS but to avoid confusing with “Cascading Style Sheets”, Cross-Site Scripting was renamed as XSS. In absence of a firewall, it becomes easy for hackers to circumvent a security system. Hacker injects a malicious program or script onto a webpage and when a user visits the page, the script automatically gets downloaded and executed on the user’s system. To achieve this end, a hacker may use any script such as HTML, VBScript, Java, Flash, ActiveX etc.
Apart from the above-mentioned cybercrimes, our qualified and experienced cybercrime lawyers in Dehradun have an expertise in dealing matters of cyber extortion, cyberbullying, child pornography, revenge-porn, libel, and defamation, cyber fraud etc.
Golden Rules
**We deject un-ethical and immoral practices, and reserve our rights of extending legal services only to a select clientele which exhibits civility, faith in law, sound moral footing, and good conscience. Our legal counsels defend the ones who have falsely been implicated, and prosecute for those who have actually been victimized – in either case, our counsels reserve their right of exercising discretion in accepting or rejecting a brief/ lawsuit.