Information Technology and Cyber Lawyers in Dehradun

Home » Dehradun » Information Technology and Cyber Lawyers in Dehradun

  • Cyber Law Advocates in Dehradun

    The Indian Government upholds cybersecurity through Information Technology Act, 2000. The Act prevents, controls and punishes cyber misconducts. Cybercrimes are basically unlawful acts performed by using or targeting a computer technology and therefore come under the ambit of Cyber Law. With the emergence of e-banking, e-commerce, and e-governance, such crimes are on an upsurge. In the wake of this, it was rather a necessity to encompass the world of technology with a specific law. Today, every unlawful activity such as fraud, harassing, defaming, spoofing, stalking, pornography, gambling etc. come under the ambit of cybercrime. Our expert cyber law advocates in Dehradun adopt a tactical approach while dealing in cybercrime cases.

    Collaboration Of Cyber Lawyers + Cyber Forensics:

    B&B Associates LLP is the only law firm in Dehradun which has an active collaboration with private cyber forensics. This collaboration effectively helps our cyber lawyers in matters of evidence determination. Besides, our forensic partners are renowned for having worked on some of the most crucial cybercrime cases, as well as other cases of national significance.

    Nature Of Cybercrime Matters Taken Up By Our Cyber Lawyers:

    The law firm takes up matters of cybercrimes against person, personal property, government, against the society at large, and against international subjects.

    Contact Our Criminal Lawyers in Dehradun

    Firm’s Cyber Law Advocates in Dehradun offer expert consulting and representation in various cyber crimes such as:

    • 1. Hacking

      Hacking is a remote intrusion caused by accessing a computer system without the permission of its owner. Hackers is the term denoted to people who conduct hacking. Hackers, generally, are computer programmers with an advanced understanding of computers, and a melafide intent of using their knowledge. Hackers, sometimes, even have the capability of remaining highly disguised and thoroughly untraceable. Hackers can also have a developed skill set in a particular program or language. Hackers may have varied motives behind their attack. The most common emerge out of the three common human yearnings of greed, fame, and power. While some hackers hack for the fun of it, some do it to demonstrate their expertise and earn reward in the hacking underworld (yes it exists). A hacking attempt by a hacker who only wishes to demonstrate his superiority or domain expertise by casting his trick, may not even cause any actual damage to his subject, nevertheless, it is counted as an illegal act of breach and is a punishable offense.

      Besides, hackers pose a serious threat of damage to the intellectual property of the subject by modifying software and programs. On an extreme end, hacking can cause damage to property and lives by taking control of hardware devices and carrying out destruction and terrorist activities (as seen in sci-fi movies).

      Types of Hackers:

      a. Crackers:

      Negative tendencies such as lust and voyeuristic intent can also play as motivator behind hacking, besides, some hackers hack for the purpose of causing annoyance and satisfying their whim by being destructive. Such hackers are generally referred to as “Crackers”.

      b. Black Hats

      The “Black Hats” hack systems and programs purely out of an intellectual curiosity. These black hat hackers are hired by an IT companies to find errors/ lapse/ flaw/ vulnerability in programs and security systems and develop methods of making them more secure. When hired for an ethical purpose, these “black hat” hackers are referred to as “White Hat” hackers.

      c. White hats:

      You saw it coming didn’t you? Ironically, these hackers legally hack to prevent the abuse of a computer system ‘by an unauthorized/ wrong person’. Their work essentially is to find the vulnerability and breach into a computer program/ systems. However, the purpose of a white hat hacker does not always remain altruistic. At times, white hat hackers turn back to being back hat hackers for garnering further fame or to land even better paying jobs with top IT companies. While at other times, the white hats turn black to quench a fetish of being termed as “security experts”.

      “Grey Hat” hacking:

      Interestingly, as always, here too is a zone between the black and the white called the “Grey Hat” hacking. For example, hacking done for a client under an assignment of which the scope is ambiguous. Or, any hacking done with an intent of causing a benefit.

      A few computer geniuses who once use to be hackers:

      • The creators of UNIX operating system – Dennis Ritchie & Ken Thompson.
      • Developer of Napster – T. Shawn Fanning.
      • Founder of Facebook – Mark Zuckerberg.

      We do not promote hacking or idealize it. As cyber lawyers, however, we cannot rule out the chances of hacking committed by an impersonator. It is our job to make a distinction between various sorts of hacking, and ensure that an innocent person or an accused is not wrongfully tried. Besides, we ensure that the due process of law is adopted.

      Type of Hacking:

      a. SQL Injections: A breach in an unprotected SQL Database. Hackers track down the vulnerabilities in a website’s software program and inject SQL hacking code in web-entry fields such as username and password fields. The SQL hack is an additional command which manipulates the contents of the database to enable a successful login. By this method, a hacker can take control of the backend as well as user accounts and cause serious harm by stealing and misusing valuable propriety, business, and financial information.

      b. FTP Password theft: Another way of tampering with the websites, this method plays on the vulnerability of webmasters who store confidential login information on poorly protected computers. The hacker pulls FTP login details and relays it to a remote computer to log into a website to pose threat and cause damage.

      c. Cross-Site Scripting: Formerly known as CSS but to avoid confusing with “Cascading Style Sheets”, Cross-Site Scripting was renamed as XSS. In absence of a firewall, it becomes easy for hackers to circumvent a security system. Hacker injects a malicious program or script onto a webpage and when a user visits the page, the script automatically gets downloaded and executed on the user’s system. To achieve this end, a hacker may use any script such as HTML, VBScript, Java, Flash, ActiveX etc.

    • 2. Virus dissemination

      A virus is a computer program which remains disguised by keeping attached to a file or system. It is programmed to disrupt computer operation and conduct undesired operations. It can be programme to circulate to other computers on a network and to adversely affect targeted data by modifying or deleting it. Popular forms of virus:
      a. Worm: Unlike viruses, worms don’t need a host. Their tendency is to replicate to cover up all the available system memory.

      b. Trojan horse: Borrowed from Homer’s Odyssey, the name has been rightly attributed to a kind of malware (malicious + software) which masquerades a regular file such as an email attachment from a believable source, and does not disseminate itself. A Trojan-horse can get downloaded along a program while surfing internet and accessing various games, sites, applications etc. Like other viruses, Trojan Horse can cause theft of information and damage in numerous ways.

    • 3. Logic bombs

      Also called “slag code”, a logic bomb is a malicious code inserted in a software and it behaves similar to virus. Stealthily inserted in a program, it is supposed to remain dormant until a specific command or a particular time/ event triggers it. A user may have no clue as to when it will get triggered and what it will do. Logic bombs are usually deployed by disgruntled employees and is more of an insider job.
    • 4. Denial-of-Service attack

      An explicit denial of service to its intended users, a DoS attack is achieved by flooding a computer with series of requests to consume all bandwidth, overload and slow down or crash the server.
    • 5. Phishing

      A scheme of extracting confidential information such as financial details, username, password etc. Depending on the targeted audience, different schemes are plotted. At times a believable picture is shown to the end user, while at other times, a too-good-to-be-true deal can be plotted to exploit the vulnerability of a greedy user. As there is no end to how people can be fooled, new techniques of phishing evolve on daily basis. A common way of large scale phishing is bulk circulation of misleading information/ deals. This is mostly achieved through email and whatsapp medium.
    • 6. Email bombing and spamming

      The abuser sends meaningless emails in huge volume to crash the victim’s mail servers. Because mail bombing can be detected by spam filters, therefore, it is carried out using botnets, hacked computers and DDoS attack. The attackers use multiple source addresses and programmed bots to create unique messages which can bypass spam filters.Spamming is a form of email bombing in which unsolicited emails are indiscriminately sent to a large number of users. Spamming emails often attempt phishing or direct users to websites which host malware or contain infected files.
    • 7. Web jacking

      Like hijacking, the hacker takes an illegal control on a website and owner is left at the mercy of the attacker. There can be varied reasons behind web-jacking – asking for ransom, eliminating competition, eliminating evidence, creating nuisance, causing harassment or defamation, taking revenge, or for sadistic pleasure.
    • 8. Cyber Stalking

      A new form of cybercrime which deals with being virtually followed over the internet by a stalker who harvests information and poses threat, intimidation, and invasion in one’s online privacy. An aggravated form of Cyber stalking is accompanied by physical stalking. Women and children are a major victim group being stalked by predators and pedophiles. Novice users who are not aware of internet safety are at maximum risk. The abusers use various mediums to threaten, harass, or slander the victim, such as personal messaging, sending an email, making a publically visible online post etc.
      Computer Stalking:
      Stalkers with advanced computer skills gain unauthorized access of victim’s computer stealthily, and spy on their victim.
    • 9. Data diddling

      Basically, it is an unauthorized alteration of a computer data. In order to avoid getting tracked, the attackers often restore the data to the original form. Data diddling can be done by a programmer, or anyone involved in the process of creating/modifying/ handling that data, or even through a malware. Examples of data diddling include wrongfully editing financial entries and forging documents.
    • 10. Credit Card Fraud and Identity Theft (impersonation)

      Abusers steal the identity of a user to access and exploit resources in their name such as credit cards, bank accounts, subscriptions etc. Misuse of a pre-approved credit card is the simplest form of Identity Theft. Aggravated form includes credit card cloning and forging online financial accounts.
    • 11. Salami slicing attack

      Also referred to as a “salami fraud”, the cyber-criminals usurp only a negligible and non-noticeable amount of money per user. However, by targeting a huge user-group, they end up looting big. A classic salami slicing attack is pulled by a technique called ‘collect-the-roundoff’, wherein, calculations are rounded to the nearest number and the perpetrators debit the excess amount to a separate account, thereby, reflecting no loss to the system. Till the time the systems managers become aware of the malicious activity, the perpetrators end up embezzling a huge amount of money.
    • 12. Software Piracy

      Be it knowingly or unknowingly, at some point of time, most people have contributed to cyber piracy and cut the profits of the resource developers by illegal usage of the intellectual property or by its circulation in their circle. Such unauthorized usage bereft developers of the entitled profits and hamper sustainable application development. Software piracy adversely affects the global economy by obstructing economic circulation and reinvestment in further research, development and marketing.
      Common forms of software piracy:
      Software Cloning, using unlicensed software or single-licensed software on multiple systems, using a cracked version of a software or using a key generator to validate a copy. Torrent download and circulation.

    Apart from the above-mentioned cybercrimes, our qualified and experienced cybercrime lawyers in Dehradun have an expertise in dealing matters of cyber extortion, cyberbullying, child pornography, revenge-porn, libel, and defamation, cyber fraud etc.

    Submit a Comment

    Your email address will not be published. Required fields are marked *

  • ‘Revenge Porn’ In India

    ‘Revenge Porn’ In India

    Overview: Technology has affected every sphere of our lives, and personal relationships aren’t untouched from it. With the increasing numb

    PIL Cases of India which changed the Legal System

    PIL Cases of India which changed the Legal System

    Introduction Public Interest Litigation, as the name suggests, means litigation for the protection of the public interest. This kind of laws



    Hacking is one of the types of cyber crimes in India. Cyber crimes basically are the unlawful acts that involve the use of a computer either

    Article on E-commerce Laws in India

    Article on E-commerce Laws in India

    Overview The E-commerce sector in present days is witnessing an unprecedented rise, wherein the online buyers are no more limited to the you

    Cyber and E-Commerce Crimes

    Cyber and E-Commerce Crimes

    Cybercrime is a broad term which is used to define a criminal activity in which computers or computer networks are either a tool or a target

  • No Record Found
  • Various complaints filed against the makers of web series ‘Paatal Lok’ alleging maligning, demeaning and derogating few communities

    Various complaints filed against the makers of web series ‘Paatal Lok’ alleging maligning, demeaning and derogating few communities

    ‘Paatal Lok’, a web series streaming on Amazon Prime Video, has been generating a lot of buzz online, with various complaints being registered aga

    Plea in Supreme Court to Ban Zoom Application, Citing Privacy Breach

    Plea in Supreme Court to Ban Zoom Application, Citing Privacy Breach

    A PIL has been filed in the Supreme Court seeking a ban on usage of the software application ‘Zoom’ by the Indian public, raising security and pri

    ‘Bois Locker Room’ Admin arrested by cyber crime cell of the Delhi Police

    ‘Bois Locker Room’ Admin arrested by cyber crime cell of the Delhi Police

    On Wednesday, the Cyber Crime cell of Delhi police arrested the admin of Bois Locker Room, the Instagram private chat group, where schoolboys planned

    Suo-motu action against ‘Bois Locker Room’ – Delhi Commission for Women

    Suo-motu action against ‘Bois Locker Room’ – Delhi Commission for Women

    The Delhi Commission for Women on Monday took suo-moto cognizance of a group called ‘Bois Locker Room’, an Instagram chat group where objectionabl

    ‘Sneeze in Open, Spread the Virus’; Infosys employee detained in Bengaluru for a Facebook post

    ‘Sneeze in Open, Spread the Virus’; Infosys employee detained in Bengaluru for a Facebook post

    On 27 March, an Infosys employee in Bengaluru has been arrested by the City Crime Branch for a shocking social media post, urging people to ‘go out

    Mobile application to track home-quarantined persons

    Mobile application to track home-quarantined persons

    In an attempt to ensure home quarantine orders are strictly followed, preventing the spread of pandemic disease, the Gujarat government on Friday laun

    Mobile internet and broadband services restored in parts of Jammu and Kashmir

    Mobile internet and broadband services restored in parts of Jammu and Kashmir

    On 14 January, the Jammu and Kashmir government declared the restoration of 2G mobile connectivity in five districts of the Jammu region. Further, bro

    High Court Denies Social Media Linking with Aadhaar, Pan / Voter ID

    High Court Denies Social Media Linking with Aadhaar, Pan / Voter ID

    According to the source, the Delhi High Court on Monday denied linking of Social media accounts with Aadhaar, Pan/ Voter ID stating “it would lead t