Professional Documents
Culture Documents
WHAT IS CYBERCRIME?
The internet in India is growing rapidly. It has given rise to new
opportunities in every field we can think of be it entertainment,
business, sports or education. There are two sides to a coin. Internet also
has its own disadvantages. One of the major disadvantages is
Cybercrime illegal activitiy committed on the internet. The internet,
along with its advantages, has also exposed us to security risks that come
with connecting to a large network. Computers today are being misused
for illegal activities like e-mail espionage, credit card fraud, spams,
software piracy and so on, which invade our privacy and offend our
senses. Criminal activities in the cyberspace are on the rise. Here we
publish an article by Nandini Ramprasad in series for the benefit of our
netizens.
"The modern thief can steal more with a computer than with a gun.
Tomorrow's terrorist may be able to do more damage with a keyboard
than with a bomb".
National Research Council, "Computers at Risk", 1991.
What is this Cyber crime? We read about it in newspapers very often.
Let's look at the dictionary definition of Cybercrime: "It is a criminal
activity committed on the internet. This is a broad term that describes
everything from electronic cracking to denial of service attacks that
cause electronic commerce sites to lose money".
Mr. Pavan Duggal, who is the President of cyberlaws.net and consultant,
in a report has clearly defined the various categories and types of
cybercrimes.
Cybercrimes can be basically divided into 3 major categories:
1. Cybercrimes against persons.
2. Cybercrimes against property.
3. Cybercrimes against government.
2
the invaluable and extremely touchy area of his or her own privacy
which the medium of internet grants to the citizen.
The second category of Cyber-crimes is that of Cybercrimes against all
forms of property. These crimes include computer vandalism
(destruction of others' property), transmission of harmful programmes.
A Mumbai-based upstart engineering company lost a say and much
money in the business when the rival company, an industry major, stole
the technical database from their computers with the help of a corporate
cyberspy.
The third category of Cyber-crimes relate to Cybercrimes against
Government. Cyberterrorism is one distinct kind of crime in this
category. The growth of internet has shown that the medium of
Cyberspace is being used by individuals and groups to threaten the
international governments as also to terrorise the citizens of a country.
This crime manifests itself into terrorism when an individual "cracks"
into a government or military maintained website.
In a report of expressindia. com, it was said that internet was becoming a
boon for the terrorist organisations. According to Mr. A.K. Gupta,
Deputy Director (Co-ordination), CBI, terrorist outfits are increasingly
using internet to communicate and move funds. "Lashker-e-Toiba is
collecting contributions online from its sympathisers all over the world.
During the investigation of the Red Fort shootout in Dec. 2000, the
accused Ashfaq Ahmed of this terrorist group revealed that the militants
are making extensive use of the internet to communicate with the
operatives and the sympathisers and also using the medium for intrabank transfer of funds".
Cracking is amongst the gravest Cyber-crimes known till date. It is a
dreadful feeling to know that a stranger has broken into your computer
systems without your knowledge and consent and has tampered with
precious confidential data and information.
Coupled with this the actuality is that no computer system in the world is
cracking proof. It is unanimously agreed that any and every system in
the world can be cracked. The recent denial of service attacks seen over
the popular commercial sites like E-bay, Yahoo, Amazon and others are a
new category of Cyber-crimes which are slowly emerging as being
extremely dangerous.
Unauthorised access
Using one's own programming abilities as also various progra-mmes
with malicious intent to gain unauthorised access to a computer or
network are very serious crimes. Similarly, the creation and
dissemination of harmful computer programmes which do irreparable
damage to computer systems is another kind of Cybercrime. Software
piracy is also another distinct kind of Cybercrime which is perpetuated
by many people online who distribute illegal and unauthorised pirated
copies
of
software.
Professionals who involve in these cybercrimes are called crackers and it
is found that many of such professionals are still in their teens. A report
written near the start of the Information Age warned that America's
computers were at risk from crackers. It said that computers that "control
(our) power delivery, communications, aviation and financial services
(and) store vital information, from medical re-cords to business plans, to
criminal records", were vulnerable from many sources, including
deliberate attack.
"Script-kiddies"
Crackers do more than just spoiling websites. Novices, who are called
"script-kiddies" in their circles, gain "root" access to a computer system,
giving them the same power over a system as an administrator such as
the power to modify features. They cause damage by planting viruses.
The Parliament of India passed its first Cyberlaw, the Information
Technology Act in 2000. It not only provides the legal infrastructure for
5
E-commerce in India but also at the same time, gives draconian powers
to the Police to enter and search, without any warrant, any public place
for the purpose of nabbing cybercriminals and preventing cybercrime.
Also, the Indian Cyberlaw talks of the arrest of any person who is about
to commit a cybercrime.
The Act defines five cyber-crimes damage to computer source code,
hacking, publishing electronic information whi-ch is lascivious or
prurient, br-each of confidentiality and pu-blishing false digital signatures. The Act also specifies that cybercrimes can only be investigated by
an official holding no less a rank than that of Dy. Superintendent of
Police (Dy.SP).
The Act simply says "Notwi-thstanding anything contained in any other
law for the time being in force, any Police Officer not below the rank of
Dy.SP may enter, search and arrest any person without search warrant in
any public place who he thinks is committing or about to commit a
cybercrime".
It is common that many systems operators do not share information
when they are victimis-ed by crackers. They don't contact law
enforcement officers when their computer systems are invaded,
preferring instead to fix the damage and take action to keep crackers
from gaining access again with as little public attention as possible.
According to Sundari Nanda, SP, CBI, "most of the times the victims do
not complain, may be because they are aware of the extent of the crime
committed against them, or as in the case of business houses, they don't
want to confess their system is not secure".
As the research shows, computer crime poses a real threat. Those who
believe otherwise simply have not been awakened by the massive losses
and setbacks experienced by companies worldwide. Money and
intellectual property have been stolen, corporate operations impeded,
and jobs lost as a result of computer crime.
realize that they are committing crimes until it is too late. Even more
distressing and difficult to combat is the fact that some in the media
portray the computer criminal as a modern day Robin Hood. Nothing
could be further from the truth.
So what are cyber crimes? Can the law enforcement authorities find
criminals online? How can you create context for your children to
understand what cyber crimes are? The following information (and areas
throughout the site) will help familiarize you with unethical and illegal
online behavior. Additionally, to learn more about cyber crime, visit the
Department of Justice Computer Crime & Intellectual Property Section's
website at www.cybercrime.gov. The Computer Emergency Response
Team (CERT) at www.cert.org and the National Infrastructure
Protection Center at the FBI at www.infragard.net provides regularly
updated information and descriptions of cyber crimes.
10
11
12
Technical Aspects
Technological advancements have created new possibilities for criminal
activity, in particular the criminal misuse of information technologies
such as
a. Unauthorized access & Hacking:Access means gaining entry into, instructing or communicating with the
logical, arithmetical, or memory function resources of a computer,
computer system or computer network.
13
b. Trojan Attack:The program that act like something useful but do the things that are
quiet damping. The programs of this kind are called as Trojans.
The name Trojan Horse is popular.
Trojans come in two parts, a Client part and a Server part. When the
victim (unknowingly) runs the server on its machine, the attacker will
then use the Client to connect to the Server and start using the trojan.
TCP/IP protocol is the usual protocol type used for communications, but
some functions of the trojans use the UDP protocol as well.
c. Virus and Worm attack:A program that has capability to infect other programs and make copies
of itself and spread into other programs is called virus.
Programs that multiply like viruses but spread from computer to
computer are called as worms.
d. E-mail & IRC related crimes:1. Email spoofing
14
Email spoofing refers to email that appears to have been originated from
one source when it was actually sent from another source. Please Read
2. Email Spamming
Email "spamming" refers to sending email to thousands and thousands
of users - similar to a chain letter.
3 Sending malicious codes through email
E-mails are used to send viruses, Trojans etc through emails as an
attachment or by sending a link of website which on visiting downloads
malicious code.
4. Email bombing
E-mail "bombing" is characterized by abusers repeatedly sending an
identical email message to a particular address.
5. Sending threatening emails
6. Defamatory emails
7. Email frauds
8. IRC related
Three main ways to attack IRC are: "verbal8218;?#8220; attacks,
clone attacks, and flood attacks.
e. Denial of Service attacks:Flooding a computer resource with more requests than it can handle.
This causes the resource to crash thereby denying access of service to
authorized users.
15
Effects of Pornography
Research has shown that pornography and its messages are involved in
shaping attitudes and encouraging behavior that can harm individual
users and their families.
Pornography is often viewed in secret, which creates deception within
marriages that can lead to divorce in some cases.
In addition, pornography promotes the allure of adultery, prostitution and
unreal expectations that can result in dangerous promiscuous behavior.
Some of the common, but false messages sent by sexualized culture.
16
17
j. Banking/Credit card Related crimes:In the corporate world, Internet hackers are continually looking for
opportunities to compromise a companys security in order to gain
access to confidential banking and financial information.
Use of stolen card information or fake credit/debit cards are common.
Bank employee can grab money using programs to deduce small amount
of money from all customer accounts and adding it to own account also
called as salami.
18
k. E-commerce/ Investment Frauds:Sales and Investment frauds. An offering that uses false or fraudulent
claims to solicit investments or loans, or that provides for the purchase,
use, or trade of forged or counterfeit securities.
Merchandise or services that were purchased or contracted by
individuals online are never delivered.
The fraud attributable to the misrepresentation of a product advertised
for sale through an Internet auction site or the non-delivery of products
purchased through an Internet auction site.
Investors are enticed to invest in this fraudulent scheme by the promises
of abnormally high profits.
l. Sale of illegal articles:This would include trade of narcotics, weapons and wildlife etc., by
posting information on websites, auction websites, and bulletin boards or
simply by using email communication.
Research shows that number of people employed in this criminal area.
Daily peoples receiving so many emails with offer of banned or illegal
products for sale.
m. Online gambling:There are millions of websites hosted on servers abroad, that offer online
gambling. In fact, it is believed that many of these websites are actually
fronts for money laundering.
p. Pedophiles:Also there are persons who intentionally prey upon children. Specially
with a teen they will let the teen know that fully understand the feelings
towards adult and in particular teen parents.
They earns teens trust and gradually seduce them into sexual or indecent
acts.
Pedophiles lure the children by distributing pornographic material, then
they try to meet them for sex or to take their nude photographs including
their engagement in sexual positions.
q. Identity Theft :Identity theft is the fastest growing crime in countries like America.
Identity theft occurs when someone appropriates another's personal
information without their knowledge to commit theft or fraud.
Identity theft is a vehicle for perpetrating other types of fraud schemes.
20
r. Data diddling:Data diddling involves changing data prior or during input into a
computer.
In other words, information is changed from the way it should be entered
by a person typing in the data, a virus that changes data, the programmer
of the database or application, or anyone else involved in the process of
having information stored in a computer file.
It also include automatic changing the financial information for some
time before processing and then restoring original information.
s. Theft of Internet Hours:Unauthorized use of Internet hours paid for by another person.
By gaining access to an organisation's telephone switchboard (PBX)
individuals or criminal organizations can obtain access to dial-in/dial-out
circuits and then make their own calls or sell call time to third parties.
Additional forms of service theft include capturing 'calling card' details
and on-selling calls charged to the calling card account, and
counterfeiting or illicit reprogramming of stored value telephone cards.
t. Theft of computer system (Hardware):This type of offence involves the theft of a computer, some part(s) of a
computer or a peripheral attached to the computer.
u. Physically damaging a computer system:Physically damaging a computer or its peripheralseither by shock, fire or
excess electric supply etc.
21
Confidentiality
It means non disclosure of information to unauthorized or unwanted
persons.
In addition to Personal information some other type of information
which useful for business and leakage of such information to other
persons may cause damage to business or person, such information
should be protected.
Generally for protecting secrecy of such information, parties while
sharing information forms an agreement about he procedure of handling
of information and to not to disclose such information to third parties or
use it in such a way that it will be disclosed to third parties.
Many times party or their employees leak such valuable information for
monitory gains and causes breach of contract of confidentiality.
Special techniques such as Social Engineering are commonly used to
obtain confidential information.
22
INTERNET LAW
Other Constitutional Concerns Raised By Intellectual Property
Cybercrimes
Legislation aimed at fighting intellectual property cybercrimes (IP
cybercrimes) has become quite extensive, which is legally justifiable
considering the significance of these threats. However, this legislation
also raises numerous constitutional and civil liberties concerns in the
United States and other democratic governments.
As indicated in the summary entitled Another Fine Line: Civil Liberties
and the Digital Millennium Copyright Act, the implementation of the
Digital Millennium Copyright Act (DMCA) was necessary to prevent
copyright infringement, and for the development of e-commerce.
However, despite its positive effects, civil liberties organizations have
widely criticized it. Similarly, other legislations aimed at fighting
cybercrimes have raised significant constitutional issues. For instance,
the Uniting and Strengthening America by Providing Appropriate Tools
Required to Intercept and Obstruct Terrorism Act of 2001 (PATRIOT
Act), which was enacted six weeks after the September 11, 2001 events,
raises important online privacy concerns. According to civil liberties
organizations, many other measures and legislations, such as the
monitoring of the use of the Internet by companies and the international
Cybercrime Convention, which were designed as powerful tools against
cybercrime, also represent a threat to constitutional rights. These
legislations have generated much controversy, regarding the importance
of individual freedom versus security, or the importance of surveillance
needs versus the preservation of civil liberties.
What are Some of the Main Concerns of Civil Liberties Organizations?
One of these concerns is that legislation against cybercrime, which
includes many provisions aimed at fighting cyberterrorism, is turning the
United States into a full-fledged surveillance society. According to civil
liberties organizations such as the American Civil Liberties Union
(ACLU,) this risk is increased by the tremendous explosion in
surveillance-enabling technologies, combined with the ongoing
weakening in legal restraints that protect privacy. The PATRIOT Act is
one of the legislations actively opposed by civil liberties organizations.
23
25
26
29
Information Technology Act, 2000 deals with the cyber crime problems.
It has some positive as well as negative aspects.
30
31
32
33
CLASSIFICATION
CRIMES:
OF
CYBER
The Information Technology Act deals with the following cyber crimes
along with others:
o Tampering with computer source documents
o Hacking
o Publishing of information, which is obscene in electronic form
o Child Pornography
o Accessing protected system
o Breach of confidentiality and privacy
Cyber crimes other than those mentioned under the IT Act
o Cyber Stalking
o Cyber squatting
o Data Diddling
o Cyber Defamation
o Trojan Attack
o Forgery
o Financial crimes
o Internet time theft
o Virus/worm attack
o E-mail spoofing
o Email bombing
o Salami attack
o Web Jacking
Cyber crime and cyber terrorism are both crimes of the cyber world. The
difference between the two however is with regard to the motive and the
intention of the perpetrator.
While a cyber crime can be described simply as an unlawful act wherein
the computer is either a tool or a target or both, cyber terrorism deserves
a more detailed definition. One can define cyber terrorism as a
premeditated use of disruptive activities or the threat thereof, in cyber
space, with the intention to further social, ideological, religious, political
or similar objectives, or to intimidate any person in furtherance of such
objectives.
34
CYBER CRIMINALS
Any person who commits an illegal act with a
guilty intention or commits a crime is called an
offender or a criminal. In this context, any
person who commits a Cyber Crime is known as
a Cyber Criminal. The Cyber Criminals may be
children and adolescents aged b/w 6-18 years,
they may be organized hackers, may be
professional hackers or crackers, discontented
employees, cheaters or even psychic persons.
35
b. Organized hacktivists
Hacktivists are hackers with a particular (mostly political) motive. In
other cases this reason can be social activism, religious activism, etc.
The attacks on approximately 200 prominent Indian websites by a group
of hackers known as Pakistani Cyber Warriors are a good example of
political hacktivists at work.
c. Disgruntled employees
One can hardly believe how spiteful displeased employees can become.
Till now they had the option of going on strike against their bosses.
Now, with the increase independence on computers and the automation
of processes, it is easier for disgruntled employees to do more harm to
their employers by committing computer related crimes, which can bring
entire systems down.
CRIMINAL LAW
PRINCIPLES
GENERAL
criminal. In this context, laws tend to use the phrase, "age of criminal
responsibility"
in
two
different
ways:
1. As a definition of the process for dealing with alleged offenders, the
range of ages specifies the exemption of a child from the adult system of
prosecution and punishment. Most states develop special juvenile justice
systems in parallel to the adult criminal justice system. Children are
diverted into this system when they have committed what would have
been an offense in an adult.
2. As the physical capacity of a child to commit a crime. Hence, children
are deemed incapable of committing some sexual or other acts requiring
abilities of a more mature quality.
The age of majority is the threshold of adulthood as it is conceptualized
in law. It is the chronological moment when children legally assume
majority control over their persons and their actions and decisions,
thereby terminating the legal control and legal responsibilities of their
parents
over
and
for
them.
But in the cyber world it is not possible to follow these traditional
principles of criminal law to fix liability. Statistics reveal that in the
cyber world, most of the offenders are those who are under the age of
majority. Therefore, some other mechanism has to be evolved to deal
with cyber criminals.
TODAYS
TOMORROWS
ANALYSTS
HACKERS
SECURITY
Frank William Abagnale, Jr. is a former check con artist, forger and
imposter who, for five years in the 1960s, passed bad checks worth more
than $2.5 million in 26 countries. During this time, he used eight aliases
even more to cash bad checks. Currently he runs Abagnale and
Associates, a financial fraud consultancy company. His life story
provided the inspiration for the feature film Catch Me if You Can.
38
An Indian teenage hacking expert who has helped global think-tanks and
police officials combat computer attackers and digital swindlers is
spurning job offers to pursue a degree at the prestigious Stanford
University. Ankit Fadia, 18 has crisscrossed India, giving lectures to
police departments, software companies, educational institutions and
government agencies on how to fight "cyber criminals" and deal with
computer viruses.
Fadia, developed his computer skills after spending long hours on the
Internet, breaking into Web sites as an "ethical hacker" and then
informing companies about their sites' vulnerability. Also, he wants to
start his own computer security firm.
Also, Not all hackers are bad. There are certain hackers whose job is to
intrude into a software system by evading or disabling security measures
and checks how vulnerable the system is to the bad hackers. Ethical
computer hacking has come of age in order to stop or pre-empt intruders
from messing around with a computer programme. Financial
transactions are the mainstay of banking operations. Banks and other
such institutions need to be extra careful of the bad hackers. Ethical
hackers do what a hacker does but only to identify the loopholes in
software programmes.
CYBER ETHICS
Ethics and morality in different circumstances connotes varied and
complex meanings. Each and everything which is opposed to public
policy, against public welfare and which may disturb public tranquility
may
be
termed
to
be
immoral
and
unethical.
In the past terms such as imperialism, colonialism, apartheid, which
were burning issues have given way to cyber crime, hacking, 'cyberethics' etc. Today in the present era there is a need to evolve a 'cyberjurisprudence' based on which 'cyber-ethics' can be evaluated and
criticized. Further there is a dire need for evolving a code of Ethics on
the Cyber-Space and discipline.
39
41
computer and crime against nations in the form of cyber war. It is against
such crimes that a cyber lawyers services are invariably required .
A statistics-check reveals that in India, some 142 cases of cyber crimes
were registered under IT Act, 2000 during 2006 and a total of 311 cases
were registered under IPC sections in 2006 (as per the report of National
Crime Records Bureau). But these figures are merely the tip of the
iceberg as typically people hesitate to get a formal complaint registered.
Moreover, India has seen only two cyber crime convictions in the last 12
years.
Even though in its nascent stages, cyber law has tremendous scope and
prospects in India. With almost 42 million Internet users in India,
companies taking to digital storage and dissemination of data, increasing
popularity of e-banking, e-commerce, e-ticketing and even egovernance, there will undoubtedly be a need for good cyber lawyers in
the future.
To become a cyber lawyer, all you need is to be a qualified lawyer, and
earn a diploma in cyber law. Although there are no UGC-approved
institutes providing courses in cyber law, there are private institutes like
Asian School of Cyber Law, Mumbai, Indian Law Institute, Delhi,
NALSAR, Hyderabad, and Indian Institute of Information Technology
(IIIT) Allahabad, offering cyber law courses.
Although you dont need to be an IT specialist, a bit of technological
bent of mind and a knack for the cyber world will only add a cherry to
the cake.
As a cyber lawyer has to inevitably deal with criminal law, intellectual
property law, commercial and civil law in his cyber law cases, it is best
to have an in-depth knowledge of these laws apart from cyber laws to
give his practice a real edge.
Though the IT Act 2000 seems adequate enough, yet, keeping pace with
the changes in a forever-in-flux field like information technology may
prove to be an onerous task. The laws do need to catch up to give more
teeth to cyber lawyers. Also, you need to be forever updated about the
changes.
43
Some experts also feel that we need to concentrate more upon training
the law enforcement agents and police departments.
All cyber crimes transcend territorial boundaries. Hidden behind the veil
of anonymity, a cyber criminal could do his work sitting right next to
you, without you even realizing it. The task of a cyber lawyer is not only
to suggest a legal cure but also to his/her prepare clients to prevent such
things from happening.
THE
INDIAN
CYBER
LAW
REQUIRES
COMPLIANCE
BY
COMPANIES / CORPORATIONS
DOING BUSINESS IN INDIA
The Indian Information Technology Act was passed in 2000 ("IT Act").
However most of the companies are still unaware of the strict provisions
of the law. The increasing use of Information and Communication
Technology has given rise to serious compliance concerns, which if
ignored may attract various civil and criminal sanctions.
44
45
46
SECONDARY
LEGISLATION
UNDER INDIAN CYBERLAW
The great Indian elections are over and with the coming of the new
government, here comes the hope of stability. Things appear to be
progressing very fast on the legislative drafting of secondary legislation
on the Indian cyberlaw. As we know, the Indian Information Technology
Act, 2000 was amended by the Information Technology Amendment
Act,2008, which was notified on 5-2-2009.
47
Under the new amended provisions, Powers have been given to the
appropriate Governments to make rules and regulations to give effect to
the amended provisions.
Some draft rules under some sections have been put up for comments on
the Minsitry of Information Technology website. More rules are
expected very soon.
While the concept of secondary legislation is indeed laudable, it goes
without saying that at no point of time, can the secondary legislation
overreach the principal legislation. Some draft rules put up for public
comment run the danger of being struck down by a court of law, if
enacted, as they are not in line with the principles enshrined in the
Constitution of India.
Another major important aspect that needs to be kept in mind, while
drafting rules under Section 43A and 79 of the amended IT Act,2000 is
that the said rules are likely to impact a huge number of relevant
stakeholders.
None of these stakeholders would want to be governed by rules, to
which they themselves, have not been previously consulted.
For example, the statutory definition of an intermediary is so vast that
it incorporates within its ambit numerous businesses, verticals and
industries. Having one set of rules , governing diverse industries, is not
likely to do justice to the cause of the basic principles, that the Indian
Information Technology Act, 2000, as amended, has enshrined.
It would just be prudent to draft separate set of rules, governing separate
sets of industries, which would qualify as an intermediary. This is so as,
for example, the requirements of the business of online banking, would
be completely different from the business on webhosting or network
service providing.
Similarly, given the huge ambit of the scope and reach of Section 43A,
there is a need for a realization to be dawned that one set of rules, would
not fit all. Having one set for rules, without keeping in mind the
customized requirements of the relevant stakeholders, is likely to
negatively impact the growth of the relevant businesses, apart from not
fulfilling the intentions of the legislature.
48
1
49
of the term it does invade our privacy and offend our senses. Criminal
activities in the cyberspace are on the rise3[3]the modern thief can steal
more with a computer than with a gun. Tomorrows terrorist may be able
to do more damage with a keyboard than with a bomb. 4[4]To further
aggravate the problem, criminals realizing the effectiveness of
computers and the internet to successfully perpetrate conventional
crimes, are increasingly resorting to using them as tools for committing
such crimes.
Even though rise of literacy in India could bring down conventional
crimes but the vulnerability of computers and the Internet could make
crimes over the medium more rampant.5[5]
Cyber crime has made a significant impact on the criminal justice system
prevalent throughout the world. Criminals, realizing the effectiveness of
computers and the Internet to successfully perpetrate conventional
crimes, are resorting to using them as tools for committing such crimes;
its effects are felt more as nations constantly endeavor to provide quicker
and more efficient services to its citizens through the use of cyber space.
Instances around the world are coming to light where computers and
other electronic tools have been used as tools to facilitate commission of
conventional crimes.
The widespread growth of cyber crime has affected nations from all
across the globe. Incidents of cyber crime have caused extensive loss to
3
4
5
51
6
52
(3)
Complexity
of
Computer systems
enables
55
56
PRE-REQUISITES
FOR
10
57
58
(3) A Sound Judicial System:Cyber savvy judges are the need of the day. Judiciary plays a vital
role in shaping the enactment according to the order of the day.
Mr T.K.Vishwanathan, member secretary, Law Commission, has
highlighted the requirements for introducing e-courts in India. In his
article published in The Hindu he has stated if there is one area of
Governance where IT can make a huge difference to Indian public is in
the Judicial System.11[12]
11
59
12
60
61
63
64
Some of the persons who have assisted others in the commission of the
crime even though they may not be directly involved as beneficiaries
would be held liable under Section 43 of ITA-2000
A CRITICAL ANALYSIS
WHATS WRONG WITH OUR CYBER LAWS
Even though quite some time has passed since parliament passed the IT
Act, yet Indias first cyber law is still hard to implement, Cyber crime
cells in India are understaffed. Most police personnel are not familiar
with computers, so tremendous effort is required for training and
orienting them on various aspects of detection, investigation and
prosecution of cyber crimes.
Only a very few of our judges and prosecutors have adequate IT
knowledge.
There exists no provision for the police to take expert help in conducting
investigations.
to make matters worst cyber crimes in India are covered under civil
procedures, which take a longer time to deliver justice. Law must be
amended to enable it to be covered under a criminal procedure that
would make the act deliver results faster.
To make matters worse abuse of chat rooms, cyber stalking,
misappropriation and misuse of credit card numbers are just a few of the
65
many other loopholes which are still not addressed by IT Act 13[16].
When the act was announced way back in 2000, market watchers across
the world called it revolutionary. However in true sense of the term the
act has remained static while the rest of the world has changed.14[17]
13
14
66
67
69
Balan had worked with the pastor until he fell out with him and was
shown the door by the latter.
Balan joined the Sharon Pentecostal Church later.
The prosecution said the duo had morphed photographs of Abraham, his
son, Valsan Abraham, and daughter, Starla Luke, and e-mailed them
from fake mail IDs with captions.
The morphed pictures were put on the web and the accused, who edited
a local magazine called The Defender, wrote about these photos in his
publication.
Valsan received the pictures on the Internet and asked his father to file a
complaint to the police. A police party raided the house of Balan and his
son at Perumbavoor and collected evidences.
The magistrates verdict came after a four-year trial, for which the court
had to procure a computer with Internet connection and accessories.
The police had to secure the services of a computer analyst too to piece
together the evidences. Twenty-nine witnesses, including the internet
service provider and Bharat Sanchar Nigam Ltd., had to depose before
the court.
70
Fast track court judge R Radha, who convicted all the four in Feb 2008 ,
also imposed a fine of Rs 1.27 lakh on Prakash, the main accused in the
case, and Rs 2,500 each on his three associates - Saravanan, Vijayan and
Asir Gunasingh.
The Judge while awarding life term to Prakash observed that considering
the gravity of the offences committed by the main accused, maximum
punishment under the Immoral Trafficking Act (life imprisonment)
should be given to him and no leniency should be shown.
The Judge sentenced Prakash under the Immoral Trafficking Act, IPC,
Arms Act and Indecent Representation of Women (Prevention) Act
among others.
72
73
79. Network service providers not to be liable in certain cases: For the
removal of doubts, it is hereby declared that no person providing any
service as a network service provider shall be liable under this Act, rules
or regulations made thereunder for any third party information or data
made available by him if he proves that the offence or contravention was
committed without his knowledge or that he had exercised all due
diligence to prevent the commission of such offence or contravention.
Explanation. For the purposes of this section,
(a) "network service provider" means an intermediary;
(b) "third party information" means any information dealt with by a
network service provider in his capacity as an intermediary."
The said provision exempts network service providers from liability
under the Act, rules or regulations made thereunder for any third party
information or data made available by him. It did not exempt a network
service provider from liability muchless criminal liability for the
offences under other laws or more particularly under the Indian Penal
Code. Further, the above provision exempts network service provider
from liability, only on proof that the offence or contravention was
committed without his knowledge or that he had exercised all due
diligence to prevent the commission of such offence or contravention.
Proof in that regard can be let in by way of leading evidence by the
accused. Therefore, the said question is a question of fact which this
Court may not go into in this petition filed under Section 482 Cr.P.C.
4) Chapter XII of the Act including Section 79 was amended by the
Information Technology (Amendment) Act, 2008 (10 of 2009) dated
05.02.2009 with effect from 27.10.2009 by way of substituting the
following in the place of original chapter:
"CHAPTER XII INTERMEDIARIES NOT TO BE LIABLE IN
CERTAIN CASES
79. Exemption from liability of intermediary in certain cases:
(1) Notwithstanding anything contained in any law for the time being in
force but subject to the provisions of sub-sections (2) and (3), an
intermediary shall not be liable for any third party information, data, or
communciation link made available or hosted by him.
(2) The provisions of sub-section (1) shall apply if- (a) the functions of
the intermediary is limited to providing access to a communication
system over which information made available by third parties is
transmitted or temporarily stored or hosted; or
74
75
76
CONCLUSION:
The new legislation which can cover all the aspects of the Cyber Crimes
should be passed so the grey areas of the law can be removed. The recent
blasts in Ahmedabad, Bangalore and Delhi reflects the threat to the
mankind by the cyber space activities against this I personally believes
that only the technology and its wide expansion can give strong fight to
the problems. The softwares are easily available for download should be
restricted by the Government by appropriate actions. New amendment
should be including to the IT Act, 2000 to make it efficient and active
against the crimes. The training and public awareness programs should
be organized in the Companies as well as in common sectors. The
number of the cyber cops in India should be increased. The jurisdiction
problem is there in the implementation part which should be removed
because the cyber criminals does not have any jurisdiction limit then
why do the laws have, after all they laws are there, to punish the criminal
but present scenario gives them the chance to escape.
The Information Technology Act 2000 was passed when the country was
facing the problem of growing cyber crimes. Since the Internet is the
medium for huge information and a large base of communications
around the world, it is necessary to take certain precautions while
operating it. Therefore, in order to prevent cyber crime it is important to
educate everyone and practice safe computing.
Following Frank William Abagnale & Robert Morris, many other
hackers are intending to make use of their skills for better purposes. This
trend continues even now where companies as their security analysts
hire the brilliant hackers. Also, there is a dire need for evolving a code of
Ethics on the Cyber-Space and discipline. In the cyberspace, following
traditional principles of criminal law to fix liability is not possible. Since
most of the cyber criminals are those who are under the age of majority,
77
some other legal framework has to be evolved to deal with them. Since
cyber world has no boundaries, it is a Herculean task to frame laws to
cover each and every aspect. But, however a balance has to be
maintained and laws be evolved so as to keep a check on cyber crimes.
REFERENCES
1. www.gahtan.com/cyberlaw - Cyber Law Encyclopedia
2. Cyber Law and Information Technology by Talwant Singh Addl. Distt.
& Sessions Judge, Delhi
3. Cyber Crimes & Real World Society By Lalitha Sridhar
5. World Information Technology And Services Alliance (Witsa)
Statement On The Council Of Europe Draft Convention On CyberCrime
78
LINK: BIBLIOGRAPHY
Link: http://www.cybercitizenship.org/crime/crime.html
Link:http://www.cyberlaws.net/cyberindia/india.htm
http://www.cyberlawsindia.n
http://www.legalserviceindia.com/article/l323-Cyber-Crimes-&Cyber-Law.html
http://www.legalserviceindia.com/article/l262-Cyber-Crimes-andGeneral-Principles.html
www.cyberlawsindia.net/cyber-india.html
http://www.divorcelawyerindia.com/updates/tag/cyber-law-remedies
http://pavanduggal.net/Blog/?p=8
79