Cyber crime is the latest and perhaps the most complicated problem in the cyber world. The term "Cyber Crime" has nowhere been defined in any statute or Act passed or enacted by the Indian Parliament. Any criminal activity that uses a computer either as an instrumentality, target or a meaner for perpetuating further crimes comes within the ambit of cyber crime. It is rapidly evolving from simple e- mail mischief where offenders send obscene e-mail, to more serious offenses like theft of information, e-mail bombing to crashing servers etc.More and more countries around the world legislates laws to combat cybercafés, ordinary entities bear the crux of the anvil of the government exerting more and more influence and finding ways to create control and coordination, and cyber security.

The types of cyber crimes include: pornography, cyber fraud, defamation, cyber stalking, PR theft, money laundering, phasing, e-mail bombing, cybercafé, and illegal. Pornography is the explicit portrayal of sexual subject matter for the purpose of sexual gratification.Pornography may use a variety of media, including books, magazines, postcards, photos, sculpture, drawing, painting, animation, sound recording, film, video, and video games. The term applies to the depiction of the act rather than the act itself, and so does not include live exhibitions like sex shows and striates. A pornographic model poses for still photographs.

A pornographic actor or porn star performs in pornographic films. If dramatic skills are not involved, a performer in porn films may be also be called a model. The use of Internet services or software with Internet access to defraud victims or to otherwise take advantage of them, for example by stealing personal information, which can even lead to identity theft. A very common form of Internet fraud is the distribution of rogue security software.

Internet services can be used to present fraudulent solicitations to prospective victims, to conduct fraudulent transact actions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. Internet fraud can occur in chat rooms, email, message boards, or on websites. DEFAMATION Defamation?also called calumny, vilification, or translucent?is the communication of a false statement that harms the reputation of an individual, business, product, group, government, religion, or nation. Most jurisdictions allow legal action to deter various kinds of defamation and retaliate against groundless criticism. Under common law, to constitute defamation, a claim must generally be false and have been made to someone other than the person defamed.

Some common law Jurisdictions also distinguish between spoken defamation, called slander, and defamation in other media such as printed words or images, called libel. Cabinetmaking is different from spatial or offline stalking in that it occurs through the use of electronic communications technology such as the internet. However, it sometimes leads to it, or is accompanied by it. Both are criminal offenses.

Cabinetmaking shares important characteristics with offline stalking; many stalkers - online or off - are motivated by a desire to control their victims. Cybercafé refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare. One of the fastest growing areas of business-related criminal activity is the theft of cutting-edge technology by a worker from the employing business. Typically, the dishonest employee will sell the stolen technological knowledge to a competing firm. Criminal activity in this area can be extremely damaging to any business.

One reason is that most businesses invest considerable sums of money in research and development to improve or create new technology. The theft and resale of this information to competitors could easily cost a business many thousands of dollars in lost profits.Another is that the business's competitors can stay competitive for only a fraction of the price and thus reap even larger profits. In response to this serious issue, businesses have tightened security and have asked law enforcement to vigorously prosecute anyone involved with this type of criminal behavior. Money laundering is the process of concealing the source of large amounts of money that have been gained through illegitimate meaner. Money evidently gained through crime is "dirty" money, and money that has been "laundered" to appear as if it came from a legitimate source is "clean" money.

Money can be laundered by many methods, which vary in complexity and sophistication. * PHASING Phasing is the act of attempting to acquire information such as surnames,passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, banks, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phasing emails may contain links to websites that are infected with mallard.Phasing is typically carried out by email spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phasing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies.

Attempts to deal with the growing number of reported phasing incidents include legislation, user training, public awareness, and technical security measures. E-MAIL BOMBING Email bombing is a form of net abuse consisting of sending huge volumes of email to an address in an attempt to overflow the mailbox or overwhelm the server where the email address is hosted in a denial-of-service attack. As can easily be seen, the law deals not only with the most delicate rights of freedom f expression, freedom of communication, and the privacy of communication but also with the equally sacred right of the people "to be secure in their persons, houses, papers and effects" against government intrusion. These rights suffered during the period of martial rule.

Their suppression or impairment is usually the target of governments that have dark intentions. When criticized, the facile answer given to critics by those with dark intentions is that these rights are not absolute. That defense is already being repeated by Palace mouthpieces. It is therefore a good time to look into the disturbing aspects of the law. We might begin by taking at least a preliminary look at some of the provisions which are now under attack.

Cyber Crime in the Act is neither comprehensive nor exhaustive. The Information Technology Act has not dealt with cyber nuisance, cyber stalking, and cyber defamation and so on.Cases of spam, hacking, stalking and e-mail fraud are rampant although cyber crimes cells have been set-up in major cities. The problem is that most cases remain unreported due to lack of awareness. Capacity of human mind is unfathomable.

It is not possible to eliminate cyber crime from the cyber space. However, it is quite possible to check them. The home user segment is the largest recipient of cyber attacks as they are less likely to have established security measures in place and therefore it is necessary that people should be made aware of their rights and duties.Users must try and save any electronic information trail on their computers, use of anti-virus software, firewalls, use of intrusion detection system etc. And further making the application of the laws more stringent to check crime.

In the Philippines, proponents of Cybercafé Law has extended its scope to include cyber defamation, unsolicited commercial communications, and cyber threats. Filipinos are the top users of social media websites like Backbone. We have shifted from being the text capital of the world to being the social-media capital of the world.It was only a matter of time when this shift also influenced how we govern ourselves.

Filipinos quickly express their grievances against the government on Backbone newsfeed, instead of physically taking it to the parliaments of the streets. Government leaders and officers were quickly dumbfounded by the instant publicity for their inactions and mistakes. They found themselves in a situation where their power meant thing. The Internet has shifted control to the Filipinos on Backbone and Twitter.