1.1 General: Chapter-I
1.1 General: Chapter-I
INTRODUCTION
1.1 General
“However nowadays Crime wave is measured in minutes and hours rather
than in months and years.1 The globe is being recreated in the image of a global
community thanks to the new electronic interdependence. 2 If you know the enemy
and know yourself you need not fear the results of a hundred battles. If you only
know yourself and not the enemy, every victory will be followed by a defeat. You
will lose every war if you don't know yourself or your opponent.”3
Crime is eternal; it has existed since the dawn of civilization and will
continue to exist indefinitely. Criminals will modify their tactics as long as
society improves its safeguards.4 Since man's fall, crime and criminality have
been associated with him. Crime is elusive, and it always tries to hide in the face
of progress. Depending on the nature and scope of the crime, many countries have
implemented different ways to combat it.5 Because the link of family was
significantly stronger than that of the community, the injured party and his
kindred may avenge the injustice through private vengeance and self-redress prior
to the 10th century, and resort to legal remedies was considered merely an
optional alternative to self-redress.6
At the time, the wrongdoer was required to compensate the victim, with the
amount of compensation determined by the severity of the wrongdoing and the
victim's social rank. In comparison to present times, the law did not compel the
regulation of social connections in the early days. During the 12th and 13th
centuries the Early English society included only those acts as crimes if committed
against the state or the religion not others. During the early societies, there was no
distinction between the law of crime and the law of torts, and these communities
1
D.S. Wall, Cyber Crime: The Transformation of Crime in the Information Age, 2007, p. 3.
2
Marshall Herbert MeLuhan, “The Promise of Global Networks”, Annual Review of Institute for
Information Studies, 1999, p. 6.
3
Sun Tzu and Col. John M. Fabry, Cybercrime, Cyber Terrorism and Network Warfare: The Next
Generation of Concerns for Users of Networked Information Systems, 1999, p. 161.
4
Anwar M.S. Masadeh, Combating Cyber Crimes- Legislative Approach- A Comparative Study,
p.6, available at: http://www.almeezan.qa/ReferenceFiles.aspx?id=54&type=doc&language=en
(visited on March 21, 2017).
5
Aghatise E. Joseph, “Cyber Crime Definition”, Cyber Crime Research Centre (Last modified on
June 28, 2006), available at: http://www.scribd.com/document/195552552/Cybercrime-Definition
(visited on Feb. 22. 2017).
6
Amita Verma, Cyber Crimes & Law, 2009, p. 34.
1
solely followed the law of wrongs. When an offence is committed in modern legal
systems, the law is applied immediately regardless of the wishes of the victimized
party, but in early cultures, the law was initiated only when both parties agreed to
submit to the judgments. During the 18th century, also known as the "miracle
reorientation" period in criminology, it was thought that only the wrongdoer could
confess criminal responsibility for his conduct, and that no one else, even external
agents, had any involvement. with it. At that time it was clear that the concept of
crime is interlinked with social policy of that time.
The scientist is well-versed in the approach for locating criminals who are
engaged in illicit activity and avoiding notice because the chance of being caught
is reduced.
Following this, there was an increased need for a fresh strategy to crime
and criminals in order to battle the new situations and criminals. In criminology, it
has been rightly said that a crime will happen where and only when the opportunity
avails itself. Before this we were known only about the traditional types of crimes
like murder, rape, theft, extortion, robbery, dacoity etc. But now with the
development and advancement of science and technology i.e. computers and
internet facilities, new types of crimes exist like hacking, cyber pornography etc.
The internet has transformed the entire planet into a global village. It has
established a virtual world with no boundaries, allowing people to improve both
personal and professional interactions beyond national boundaries. The rise of
globalisation has had a significant impact on the socioeconomic and cultural
aspects of society. Human civilization has benefited from cyberspace. Internet has
connected people around the globe.8 It is a powerful tool for development,
paradoxically it is a double edged sword providing opportunities for government
business industry etc. to develop and operate reaching the international landscape
at the same time equipping the greed motivated individuals with risk free
7
N.V. Paranjape, Criminology and Penology, 2007, p. 4.
8
Tanaya Saha and Akanchs Srivastava, “Indian Women at Risk in the Cyber Space: A Conceptual
Model of Reasons of victimization, International Journal of Cyber Criminology, vol. 8 No. 1,
Jan.- June, 2014, pp. 57-58, available at: http://www.cybercrimejournal.com/ sahasrivastavatalijcc
2014 vol8issue1.pdf (visited on March 6, 2017).
2
opportunities of committing crime.9
Today, the time is that the security of our nation, the viability of our
economy and the health of our citizen is relied on infrastructures for
communication, finance, energy distribution, and transportation which completely
depend on networked information systems. The challenge posed by crimes
initiated or committed through the online environment is not so much their
9
Mohammad Talib and Virginiah Sekgwathe, “E-Crime: An Analytical Study and Possible Ways
to Combat”, International Journal of Applied Information Systems, vol. 2, No. 2, May, 2012, p. 1,
available at: http://research.ijais.org/volume2/number2/ijais12-450261.pdf (visited on March 21,
2017).
10
Anirudh Rastogi, Cyber Law- Law of Information Technology and Internet, 2014, p. 2.
11
M. Dasgupta, Cyber Crime in India- A Comparative Study, 2009, p. 1.
12
Supra note 3.
3
identification as the nature of the environment in which they are committed.
Cyber criminals can operate from anywhere in the world, targeting large groups
of people or businesses across international borders, and the scale and volume of
the crimes, as well as the technical difficulty of identifying the perpetrators and
the need to work internationally to bring them to justice, all pose challenges.
In India, the legal framework for cyber world was found in the form E-
Commerce Act, 1998. After this, a need was felt of having the basic law which
covers all the areas of cyber world then in May, 2000 the Parliament of India
13
Donn B. Parker, “Automated Crime in Cyber Crime”, International Conference Course Book,
1997.
14
Farooq Ahmad, Cyber Law in India- Law on Internet, 2008, p. 367.
15
Veer Singh and B.B. Parsoon, “Cyber Crimes and the Need for National and International
Legal Control Regimes”, PULR, vol. 44, 2002, p. 39.
16
D. Latha, Jurisdiction Issues in Cybercrimes, Law Weekly Journal, vol.4, 2008, p. 85,
available at www.scconline.com, (visited on July 25, 2015).
17
Guillaume Lovet Fortinet, “Fighting Cybercrime: Technical, Juridical and Ethical Challenges”,
Virus Bulletin Conference, 2009.
4
passed the Information Technology Act, 2000 with the objective to combat cyber
crimes and to provide a legal framework for e-commerce transactions. In India this
was the very first cyber legislation which is specifically deals with cybercrimes. It
deals with the various types of offences which is done in the electronic form or
concerning with computers, computer systems, computer networks. This Act
amends many provisions of our existing laws i.e. Indian Penal Code, 1860; the
Indian Evidence Act, 1872; the Bankers Book Evidence Act, 1891 and the Reserve
Bank of India Act, 1934.
The United State of America enacted several Federal and State laws for the
protection of computer, computer system and computer network from various
forms of cyber crimes i.e. Computer Fraud and Abuse Act, 1986; Data Protection
Act, 1998; Patriot Act, 2001; Child Pornography Prevention Act, 1996 and the
Child Online Protection Act, 1998; Communication Decency Act, 1996; CAN-
SPAM Act, 2003; Anti-Cyber Squatting Consumer Protection Act in 1999 etc. but
still cyber crimes are happening day-by-day and United States is considered as the
birth place of these crimes.
The United Kingdom has also enacted several legislations for combating
the cyber crimes like Data Protection Act, 1984; Access to Personal Files Act
18
“Supreme Court of India: To Hear Eight IT Act Related Cases on 11 th April 2014- SFLC”,
available at: http://www.medianama.com/2014/03/223-supreme-court-of-india-to-hear-eight-it-
act-related-cases- on-11th-april-2014-sflc/ (visited on June 29, 2016).
19
Samiksha Godara, “Prevention and Control of Cyber Crimes in India: Problems, Issues and
Strategies”, A Thesis submitted to Maharishi Dayanand University, April 1, 2013, p. 2, available
at: http://shodhganga.inflibnet.ac.in/bitstream/10603/7829/12/12_chapter%203.pdf (visited on
May 20, 2016).
5
1987, Copyright (Computer Software) Amendment Act 1985, Interception of
Communications Act 1985, Local Government (Access to Information) Act 1985,
and Electronic Communication Act 2000. But the problem of cyber crime is not
resolved yet in spite of lots of legislation.
1. Dr. Amita Verma in her book “Cyber Crimes & Law”21 has discussed
every concept which is related to cyber crimes like cyber space, computer,
internet, information technology etc. She has comprehensively mentioned
the early concept of crime, its elements and now the status of crime which
is emerged as cyber crime, its nature, essential elements, scope,
20
Supra note 9.
21
Dr. Amita Verma, Cyber Crimes & Law (Central Law House Publications, Allahabad, 2009).
6
characteristics, different basis of classifications etc. because she mentioned
it in her book as the new species of crime. According to her cybercrime has
recently become a catchy term for a group of security issues in cyberspace.
She has also stated that cyber crime is the deadliest epidemic confronting
our planet in this millennium.
She has classified cyber crimes on different basis i.e. victims of cyber
crimes includes cyber pornography, cyber stalking, cyber harassment, cyber
defamation etc.; computer as a target or tool includes cyber fraud, theft, sabotage
of computer, cyber hacking etc.; based on cyber offenders, cyber crime done
against various groups like industry, institution, business, government entity,
trade, military and intelligence agency etc.; civil or criminal liability and also
based on role played by the computers. According to her hackers, phreaks,
information merchants and mercenaries, terrorists, extremists and deviants are the
cyber offenders.
She has also discussed the role of judiciary at national and international
level for combating the growth of these types of computer related crimes. She has
also elaborately explained the legislative approach towards the emerging national
and international control regimes and status of civil or criminal liability of these
crimes in the contemporary time period. She has mentioned the challenges faced
by criminal justice system due to the origin of this new species of crime in
modern time.
After stating all the relevant provisions of law, at the end she has made
some suggestions, if implemented effectively and in a coordinated manner, it
would go a long way to make this scientific wonder of all ages sustainable not
only for this generation but also for many more generations to come.23
22
Id, p. 8.
23
Id, p. 464.
7
Study”24 has made the comparative study of laws relating to various types
of cyber crime i.e. hacking, cyber fraud, cyber pornography and cyber
terrorism in India with the laws applicable in United States and United
Kingdom. He has also defined the concept of crime, cyber crime, its nature,
elements, characteristics and classifications etc. He has acknowledged in
the preface of his book that cyber crime is one of the emerging branches of
law which is becoming socially relevant at a rapid pace as it is the result of
boom in information technology whose impact is all pervasive and with far
reaching consequences in different fields.
While discussing about the nature and commenting on the scope of cyber
crimes, he has stated that “it is very essential to emphasise that the world is not run
by weapons anymore, or energy, or money. It is run by ones and zeros….little bits
of data….it is all electrons. There’s a war out here, a world war. It is not about
who has the most bullets. It is about who controls the information- what we see
and hear, how we work, what we think etc. It’s all about information”25
“I Know I will have to go, yet as long as I live, I shall stake my life to clear the
world’s refuse,I shall make this world habitable for this child, To the new-born this
is my firm promise.”27
3. Dr. Talat Fatima in her book “Cyber Crimes”28 has explained all the
concepts relating to cyber space and cyber crimes starting from the history
of telegraph to telephone to computers. She has also traced the concept of
crime from primitive to information society. In her study, she has discussed
the traditional and modern approach to crime and its elements. She has
stated cybercrimes as a deviance from traditional crimes. She has also
highlighted the evolution of criminal law, criminal justice system, cyber
crimes and taxonomy of cybercrimes. She has exhaustively discussed the
meaning, concept, nature, characteristics, scope, classifications and other
related concept of cyber crimes. According to her cyber crimes are the
crimes unknown to the legal world prior to the birth of the internet and
include not only acts which are employed to commit traditional crimes
using the net but also those crimes which are committed thoroughly and
exclusively using internet.29
She acknowledges in the preface of her book that the her work is inspired
by writers like Chris Reed, Ian Walden, Margaret J. Radian, Don Parker, Graham
26
Id, p. 226.
27
Ibid.
28
Dr. Talat Fatima, Cyber Crimes, (Eastern Book Company, Lucknow, 2011).
29
Id, p. 91.
30
Id, p. 78.
9
J.H. Smith, Y. Akdeniz, D.S. Wall etc. She has analysed the legal complexities
which arise due to presence of an array of foreign components on the entire cyber
crime scene. She has also analysed the vulnerabilities in the transient regime of
the cybercrimes as these elusive crimes present unprecedented challenges to the
legal world. She has also critically pointed out the jurisdictional issues and legal
liability in cyberspace. Her book covers the latest topics i.e. SMS Spoofing,
hacking by Trojan Horse, Logic Bomb, threat to privacy by Cookies, Web bug,
very-chip, WoZNet chip, spyware and adware etc.
After analysing systematically at the end she has suggested that crime
knows no frontiers. The criminal has no sense of patriotism, humanism or
jurisprudence. But the crime of the modern age being borderless, the accusatorial
laws have to take international character.31 She has mainly made suggestions in the
area of substantive criminal law and in the procedural law. She has also suggested
the preventive and enforcement strategies for dealing with these types of crimes.
4. Justice Yatindra Singh in his book “Cyber Laws”32 has mentioned the
meaning, concept, nature and importance of intellectual property rights i.e.
trademarks, copyrights, patents etc. on cyber space. According to him,
intellectual property rights refer to the property that is a creation of the
mind
i.e. inventions, literary and artistic works, symbols, names, images and designs
used in commerce.33
In his book, he has properly analysed the cyber laws in order to sort out the
legal issues by explaining the science behind the new emerging technology. He
has mentioned the concept of digital signature, electronic signature and all the
relevant provisions relating to it including with procedure of authentication and
recognition of it. He has also through light on the electronic governance with
relevant provisions given under the Information Technology Act, 2000 as amended
by Amendment Act, 2008. He analysed that the internet has brought
31
Id, p. 515.
32
Justice Yatindra Singh, Cyber Laws, (Universal Law Publishing Co. Pvt. Ltd., 2010).
33
Id, p. 45.
10
While discussing about the online infringement of intellectual property
rights, he has critically analysed the judgements of Napster Case.34 He has also
discussed the US Supreme Court’s decision in ‘Re Bilski Case’ because of the
ongoing debate regarding the law for patentability of the computer software.
Considering the fact that most of the software companies enter into the
‘Invention and Proprietary Information Agreement (IPIA)’ with their employees,
he has also added the new chapter in his book and explained it with all relevant
provisions.
He has critically analysed and pointed out the powers and functions of the
cyber Regulatory Appellate Tribunal, Controller of Certifying Authorities,
Adjudicating Officers and Police officers under the Information Technology Act.
34
A & M Records Inc. v. Napster Inc., (2000) 114 F Supp 2d 896 (N.D. Cal).
35
Vakul Sharma, Information Technology: Law and Practice, (Universal Law Publication, Co.,
Delhi, 2010).
36
Dr. Jyoti Rattan, Cyber Laws & Information Technology (Bharat Law House Pvt. Ltd., New
Delhi, 2014).
11
has also through light on the concept of netizens. She has discussed all the
concepts with examples which make her work more interesting and
comprehensible. In her book she has made a systematic study on the issue
of jurisdiction in cyber space at national and international level both for
civil and criminal cases.
37
Dr. Krishan Pal Malik, Computer Information Technology Law (Allahabad Law Agency,
Faridabad, 2010).
12
Act in 2000 and amendments in 2008 covering with the law relating to
electronic signature, e-governance etc.
He has pointed out that the discussion about the cyber crime has been
dominated by the media and the politicians who often act without knowing about
the nature of such crimes. He stressed on the introduction of new laws for the
satisfaction of corporate and State needs. In his work, he provides all the relevant
material and the scientific framework for the analysis of his research problem.
38
David S. Wall, Cybercrime: The Transformation of Crime in the Information Age (Polity
Press, Cambridge, U.K, 2007).
39
S.K. Verma and Raman Mittal, Legal Dimensions of Cyber Space (Indian Law Institute
Publication, 2004).
13
history and development, merits, limitations etc. They have made a
comprehensive study on cyberspace i.e. computer, internet and cyber
crimes. They have systematically discussed the legal dimensions of all the
terms relating to cyber space. They suggested that we don’t need only to be
computer literate but alsoneed to understand the huge number of issues that
makes us dependant on computers.
He has properly analysed all the relevant provisions of cyber laws in order
to sort out the legal issues by explaining the science behind the new emerging
technology. He has mentioned the concept of digital signature, electronic
signature and all the relevant provisions relating to it including with procedure of
authentication and recognition of it. He has also through light on the electronic
governance with relevant provisions given under the Information Technology
Act, 2000 as amended by Amendment Act, 2008. He has also mentioned all the
40
Id, p. 18.
41
Id, p. 2.
42
Rodney D. Ryder, Guide to Cyber Laws (Information Technology Act, 2000, E-Commerce,
Data Protection and the Internet), Wadhwa Publication, (2001)
14
cyber offences recognised and punishable under Information Technology Act, 2000
as amended by Amendment Act, 2008.
11. R.K. Chaubey in his book “An Introduction to Cyber Crime and
Cyber Law”43 has introduced the cyber crime including its meaning,
concept, nature, characteristics, various classifications etc. He has
discussed all the relevant provisions of cyber law dealing with cyber
crimes in cyber age. According to him, cyber crime is a latest type of crime
which affects the huge number of peoples in cyber age. He has pointed out
that it is increasing day-by-day as a greater challenge for law investigators,
law makers, law protectors and law researchers in the cyber age. He has
stressed on the concept of privacy and suggested for adopting the privacy
policies by websites at national and international level.
Computers and the internet can be used to amass huge amount of data
regarding people, profile it in various ways, modify it and deal with it in a manner
which could violate individual’s privacy.44
12. Dr. Farooq Ahmed in his book “Cyber Law in India”45 has explained
the concepts of computer, internet with its evolutionary history. He has
discussedall relevant concepts pertaining to cyber crimes. He has classified
the cyber crimes on the basis of nature and purposes of the offence and
broadly grouped into three categories depending upon the target of the
crime. It may be against person, property or Government.
While emphasizing the present scenario of cyber crimes, he has stated that
“amidst the surging excitement and interest, however, runs a deep thread of
ambivalence toward connecting to the Internet. The Internet’s evil twin is the
home of Bad Guys- hackers, crackers, snackers, stalkers, phone phreaks and other
creepy web crawlers. Business fear that the Infobahn could suddenly veer into the
43
R.K. Chaubey, An Introduction to Cyber Crime and Cyber Law, Kamal Law House Publication,
(2009)
44
Id, p. 108.
45
Dr. Farooq Ahmed, Cyber Law in India- Law on Internet (New Era Law Publications, Delhi,
2008)
15
highway to Hell.”46
The main concern of his work is to address and to point out that the scope
of the cyber crime is itself changing rapidly with the evolution of the information
technology and the scale at which it is used, or often misused. He has also
discussed the concept of intellectual property rights i.e. trademarks, copyrights,
patents and domain name dispute on cyber space.
14. Vivek Sood in his book “Cyber Law Simplified”48 has discussed about
all the legal issues relating to cyber crimes, electronic evidence, its
relevancy, investigation procedure for dealing cyber crimes etc. He has
made the harmonious analysis of key provisions of the Information
Technology Act, 2000. He has explained all the concepts in a simple way
which would provides us the clear understanding of all the areas like
business, commerce, tax, information technology and human resources etc.
46
Id, p. 366-367.
47
Anirudh Rastogi, Cyber Law- Law of Information Technology and Internet (LexisNexis, 2014).
48
Vivek Sood, Cyber Law Simplified, (Tata Mcgraw- Hill Publishing Company Limited, New
Delhi, 2008).
16
His book suggested solutions for various cyber legal problems. He has
given the suggestion for the application of various strategies to combat
cybercrimes and how to investigate these crimes. He also suggested for enhancing
the cooperation between the nation and the law enforcement agencies for bringing
the cyber criminals before law. His work successfully made an effort to facilitate
the legal planning, decision making and cyber legal compliance in the cyber
world. Moreover, he also stressed on the implementation of the extradition
treaties in the cyber age.
In his book he has made efforts to investigate and find out the relevant
legislation and judicial trends towards cyber crimes and cyber criminals. He has
also traced the origin of these types of crimes and its impact on the criminal
justice administration system. He has suggested that there is a need of international
cooperation between nations for curbing the cyber crimes.
16. Nandan Kamath in his book “Law relating to Computers, Internet and
E- Commerce: A Guide to Cyber Laws and the Information Technology
Act, 2000”50 has discussed about the legislative approach towards
computes, internet and e-commerce in cyber age with special reference to
Information Technology Act, 2000. According to him, the internet has
49
Dr. Vishwanath Paranjape, Legal Dimensions of Cyber Crimes and Preventive Laws with
Special Reference to India (Central Law Agency Publication, 2010).
50
Nandan Kamath, Law relating to Computers, Internet and E-Commerce: A Guide to Cyber
Laws and the Information Technology Act, 2000 (Universal Law Publishing Co., 2009).
17
emerged as a means with immense potential which poses new challenges in
the recent times. He said that it is not surprising if any one says that there
are have been many attempts to control this crime through the laws and
regulations.
17. Dr. Pawan Duggal in his book “Text Book on Cyber Law”51 has
comprehensively and simply discussed the emerging developments in
cyber law and its legal consequences and control mechanism for
understanding the phenomenon of cyber crime. This book covered not only
the emerging developments in cyber law but also the dark side of Internet
and World Wide Web with its consequences. He has covered all the
concepts relating to cyber crime. According to him, cyber law is a
phenomenon which is the most latest and complex in legal jurisprudence.
18. V.D. Dudeja in his book “Cyber Crime and the Law”52 has discussed
the new type of crime which has come into existence due to the use of
information technology, computer, internet and its advancement. He has
highlighted the various concepts relating to cyber crime and all the
relevant provisions of cyber laws. He has emphasized on the significance
of freedom of expression with reference to use of internet and suggested
that some reasonable restrictions can also be put on the use of computers
and internet in the interests of privacy and security purposes so that the law
can recognize the computer as a ‘weapon of offence’ as well as a ‘victim of
offence.’ He has suggested various measures for the prevention of these
51
Pawan Duggal, Text Book on Cyber Law (Universal Law Publishing Pvt. Ltd., 2013).
52
V.D. Dudeja, Cyber Crime and the Law (Commonwealth Publication, 2002).
18
types of crime which are increasing day-by-day in the cyber world.
They have provided various suggestion with the help of which anyone can
understand how to identify the inappropriate use of corporate information
technology, examine computer environments to identify and gather electronic
evidence of wrongdoing, secure corporate system from further misuse, identify
individual responsible for engaging in inappropriate acts taken with or without
corporate computing system and protect and secure electronic evidence from
intentional and accidental modification or destruction. They have suggested the
essential procedures for protecting the corporate assets.
53
Albert J. Marcellai and Robert S. Greenfield in their book, Cyber Forensics-A Field Manual for
Collecting, Examining and Processing Evidence of Computer Crimes (Aurebuch Publications,
London, 2002).
54
Peter Stephenson, Investigating Computer- Related Crime (CRC Press, New York, 2000).
19
the legal as well as technical information and computer forensics
techniques for preserving the computer security. He has discussed the
nature of cyber crime, its impact on 21st century, its investigation measures
and the difficulties encountered by public and private investigators. His
book also offered insights into collecting and preserving evidence,
interrogating witnesses and deals with issues in involving the
authorities. He has also reflects heightened focus on cyber stalking and
cyber crime scene assessment.
21. Chris Reed in his book “Internet Law Text and Materials”55 has
discussed the internet laws globally as compared to other available
materials on internet laws. His work is praised by many authors because he
uniquely examined the internet laws globally. In his book he fundamentally
analyzed those legal problems and principles which are common to all
countries. By analysed his book a researcher can easily understand the true
nature of a particular legal problem and to be able to apply adequate legal
rules to a problem.
23. Bary C. Collin in his book “The Future of Cyber Terrorism”57 has
discussed classifications of cyber crimes but mainly stressed on cyber
terrorism. In his book he has examined the concept, history, evolution and
modes of cyber terrorism. According to him, cyber terrorism is a crime
55
Chris Reed, Internet Law Text and Materials (Butterworths, London, 2000).
56
D. Thomas and B.D. Loader, Cyber-Crime Law Enforcement, Security and Surveillance in the
Information Age, (Routledge Publications, London, 2000).
57
Bary C. Collin, The Future of Cyber Terrorism (University of Illinois, Chicago, 1996).
20
against humanity. In his book he has also critically analysed the global
initiatives which are taken to prevent and control cyber terrorism.
iii) to discuss the various cyber offences punishable in India under the
Information Technology Act, 2000 and also to examine the role of
judiciary in the implementation of Information Technology Act, 2000 with
the purpose to check whether the existing legal framework has been able to
cure the problem of cyber crimes.
iv) to analyse the international legislative and judicial response towards the
cyber crimes specially deals with the United States of America and United
Kingdom.
58
James R. Richards, Transnational Criminal Organizations, Cyber Crime and Money
Laundering (CRC Press, New York, 1999).
21
laws for evolving a comprehensive protection against cyber crimes.
The purpose of this study is to see if there are any shortcomings or gaps
between the cyber laws of India and the United States of America (USA) and the
United Kingdom (UK), as well as a review of judicial trends in the interpretation
of current cyber laws. The necessary information for this study was gathered from
both primary and secondary legal sources. The researcher primarily relied on the
cyber legislations of the countries studied, namely India, the United States of
America, and the United Kingdom, as well as decided case laws of the courts in
India, the United States of America, and the United Kingdom, Law Commission
Reports, and all other information available on the official websites. The
researcher also used secondary materials such as law dictionaries, legal journals,
law reviews, periodicals and newspapers, and legal theories, as well as text books
on cyber law by prominent writers from these three nations, as noted above.
1.7 Hypothesis
Hypothesis means an idea, supposition or proposed explanation which is
made as a starting point of further investigation without any assumption of its
truth on the basis of limited evidences or reasoning power. In simple words it is a
tentative statement the validity of which is yet to be tested. It may be proven
correct or wrong because it is based on supposition which is provisionally
accepted in order to interpret certain events or phenomenon and to provide
guidance for further investigation. The hypothesis formed for the present study is
mentioned as under:
23
CHAPTER-II
MEANING, CONCEPT AND CLASSIFICATION
OF CYBER CRIMES
2.1 Introduction
“It is critical to emphasise here that the globe is no longer ruled by
weapons, oil, or money. It is controlled by ones and zeros.... little pieces of
data.... It's all about electrons. There is a world war going on out there. It isn't a
competition to see who has the most bullets. It's about who has power over what
we see and hear, how we work, and what we think. It's all about the data.” The
film follows the use of information technology to conduct theft on the
superhighway, with information serving as the commodity.59
Social networking services have grown in popularity since the turn of the
millennium. Many people have used these sites to express themselves, make new
acquaintances, and reconnect with old ones.60 Unfortunately, cyber criminals
have taken use of these sites to further their nefarious goals. People have started
to spend more and more time on such networks in recent years as they have
become increasingly reliant on them. The advancement of information technology
has an impact on people's lives all around the world in the current day. Every day,
new technologies and discoveries broaden the scientific reach while also posing
new problems for scientists for legal world. With the widespread growth of these
technology leads to commission of new types of crimes today on the cyber space
andalso has become matter of global concern in future.
59
M. Dasgupta, Cyber Crime in India- A Comparative Study, 2009, p.8.
60
David Decary Hetu and Carlo Morselli, “Gang Presence in Social Network Sites”, International
Journal of Cyber Criminology, vol. 5 No. 2, July- Dec., 2011, p. 876, available at: http://
www.cybercrimejournal.com/davidcarlo2011julyijcc.pdf (visited on Oct. 8, 2012).
61
Farooq Ahmad, Cyber Law in India- Law on Internet, 2008, p. 367.
24
These attacks do not target a physical body, but rather a person's or
company's virtual body.
The Internet has also evolved into a new medium for wrongdoing, such as
threatening, harassing, intimidating, and injuring others. A harmful divergence
exists between the social (norms, legislation) and environmental (computer
availability) limits of computer criminal activity, which is a direct effect of
technological 25lobalization.63 Despite the fact that computers and the internet
have such a large impact on people's daily lives, just a small percentage of
individuals understand what they are.64 There is a need for a systematic study that
thoroughly examines the fundamental ideas of crime, cyber crime, cyber space,
and cyber security.
Concept of Cyberspace
William Gibson coined the phrase "cyber space," which he later described
as "an evocative and basically meaningless" buzzword that could be used as a
cypher (a text transformed to disguise its meaning) for all of his cybernetic ideas.
62
Steven D. Hazelwood and Sarah Koon Magnin, “Cyber Stalking and Cyber Harassment
Legislation in the United States: A Qualitative Analysis”, International Journal of Cyber
Criminology, vol. 7 No. 2, July- Dec., 2013, p. 155, available at: http://www.cybercrimejournal.
com/haze lwoodkoonmagninijcc2013vol7issue2.pdf (visited on Dec. 19, 2014).
63
Kathryn Seigfried- Spellar, Individual Differences of Internet Child Pornography Users:
Peculiar Findings in a Community Based Study, International Journal of Cyber Criminology, vol.
7 No. 2, July- Dec., 2013, p. 141, available at: http://www.cybercrimejournal.com/seigfried
spellarijcc 2013vol7issue2.pdf (visited on Feb. 22. 2017).
64
S.C. Sharma, “Study of Techno- Legal Aspects of Cyber Crime and Cyber Law Legislations”,
Nyaya Deep, 2008, p. 86.
65
Jyoti Ratan, Cyber Laws & Information Technology, 2014, p. 48.
25
worldwide electronic community with real-time communication and no physical
boundaries.66
Crime is eternal; it has existed since the dawn of civilization and will
continue to exist indefinitely.
To better grasp the concept of crime, an attempt has been made to explain
it from the beginning to the present day.
The following are the explanations for these two time periods:
if committed against the state or the religion not others. There was no
recognition of distinction between the law of crime and torts during the early
societies and these societies only follow the law of wrongs. After entering into the
modern legal systems the law is administered at once irrespective of the wants of
the suffered party as soon as an offence is committed but in early societies the law
73
R.C. Nigam,” Law of Crimes in India”, Principles of Criminal Law, vol. 1, 1965, p. 3.
74
Anwar M. S. Masadeh, Combating Cyber Crimes –Legislative Approach– A Comparative Study,
p. 6, available at: http://www.almeezan.qa/ReferenceFiles.aspx?id=54&type=doc&language=en
(visited on March 21, 2017).
75
Aghatise E. Joseph, “Cyber Crime Definition”, Cyber Crime Research Centre (Last modified on
June 28, 2006), available at: http://www.scribd.com/document/195552552/Cybercrime-Definition
(visited on Feb. 22. 2017).
76
Amita Verma, Cyber Crimes & Law, 2009, p. 34.
27
was set into motion only when both the parties wants to submit themselves to the
judgement. During the period of 18th century also called as an era of miraculous
reorientation in criminology, it was believed that only the wrongdoer himself
could admit his criminal responsibility for his crime and no one including any
external agencies had anything to do with it. At that time it was clear that the
concept of crime is interlinked with social policy of thattime.
Crime was less common in ancient society, when many aspects of human
life such as agriculture, political institutions, health services, medical science, and
basic amenities of life were still in their infancy. When it did occur, it was simple
in nature and stemmed from baser human instincts such as lust, greed, vengeance,
jealousy, and sexual drive.77 Physical force, body muscles, and intimidating tools
were also claimed to have been used in the past to perpetrate crimes..
The law is always changing, adding new crimes to the catalogues while also
revising, adjusting, and eliminating previous ones. In the field of crime, there have
been remarkable changes.81 The evolving concept of crime depends on the progress of
human beings in society all over the world. Because a crime in one country may not
77
Talat Fatima, Cyber Crimes, 2011, p. 61.
78
N.V. Paranjape, Criminology and Penology, 2007, p. 4.
79
Supra note 15, p. 36.
80
Supra note 19, p. 62.
81
Supra note 18, p. 36.
28
be a crime in another, and a crime at one period may not be a crime at another, and
vice versa, the notion of crime takes on diverse meanings in different countries at
different times.
Instead of months and years, crime waves are now recorded in hours and
minutes.82
Its unabated growth can be attributed to all of the social and economic
reasons, but it also has additional reasons, such as its ability to provide reasonable
anonymity to criminals and the insignificance of geographical borders, making
jurisdiction completely impossible to define and giving criminals a fair chance to
avoid legal action, which encourages them to go further.. Therefore, concept of
cybercrime finds its explanation in all those in other crimes with additional
features of its vastness, anonymity and lack of legal control regimes.83
Nature of Crimes
Almost all communities, in general, have some rules, beliefs, habits, and
traditions that its members implicitly accept as beneficial to their well-being and
healthy development. Anti-social behaviour is defined as a violation of these
respected norms and customs.84 Human actions that are prohibited by criminal
law and for which the state imposes a penalty are to be treated as crimes. There
are several human conducts in our society some are prohibited by moral code
i.e. immoral, some are prohibited by civil law i.e., civil wrong and some are
prohibited by criminal law i.e., crimes and those which are not prohibited by any
of these are not wrong. Therefore, crime is criminal wrong. 85 The changing nature
of the crime can be understood by the following way:
82
D.S. Wall, Cyber Crime: The Transformation of Crime in the Information Age, 2007, p. 3.
83
Supra note 18, pp. 36-37.
84
N.V. Paranjape, Criminology and Penology, 2009, p. 5.
85
Supra note 1, p. 6.
29
prohibiting or commanding it. We cannot accept this description in its totality
because Constitutional Law, Administrative Law, and other public law infractions
are not crimes. Second, he changes his definition to imply that a crime is a
violation of the public right obligations owed to the entire community, as a
whole.86
92
Edwin. H. Sutherland., Principles of Criminology, 1965, p. 4.
93
Austin, Lecture on Jurisprudence, 1920, pp. 249-253.
94
Supra note 29.
95
Supra note 26, pp.6-7.
96
Supra note 4, p.162.
31
imposed.97
Criminal law was simple and limited at the time, and offences were
equally simple and limited. However, by the 13th century, major offences known
as crimes had been recognised, and bot and wit were considered insufficient to
punish the guilty. The initial division between crime and tort was made as a result
of this. Moral culpability was related to criminal responsibility. The realisation of
the mental element in culpability was the catalyst for this shift in legal thinking. 98
The following are the two necessary ingredients of crime:
J.C. Smith and B. Hogan considered actus reus as such result of human
conduct as the law seeks to prevent.102 Merely guilty intention is not enough to fix
the criminal liability but some act or omission on the part of doer is
necessary to complete offence.103 Actus reus in cyber crimes has become a
challenge as the entire act is committed in intangible surroundings. The
perpetrator may leave some footmarks in the machine itself though it becomes a
herculean task to prove it in the law courts as, it is required to be in physical form
or at least in such a form where it becomes admissible in evidence.104
105
C. Gringras, The Laws of Internet, 1997, p. 216.
106
Supra note 44.
107
Supra note 15, p. 6.
108
Supra note 44, p.55.
109
Supra note 4, p. 162.
110
Supra note 19, pp. 65-66.
33
damage or harm produced by someone acting without malice or acting in an
unforeseeable manner.
The mens rea in case of cyber crimes comprises two essential elements.
First, there must be ‘intent to secure access to any programme or data held in any
computer, computer system or computer network. Secondly, the person must
know at the time that he commits the actus reus that the access he intends to
secure is unauthorised.113 The nature of cyber crimes and the skills involved are
such that existing legal framework cannot do much to control and contain the
same. In fact, the cyberspace technology has undermined to a major extent the
traditional legal concepts like property and has impacted the rules of evidence like
burden of proof, locus standi andconcepts of ‘mens rea’.114
There are three main branches of criminal science that deal with this: first,
criminology is the main branch of criminal science that deals with the causes of
crime and also whether an atomic structure, social surrounding circumstances, or
genetic history are contributory factors in crime commission. Second, Penology is
a discipline of criminal science that works with ideas of punishment, such as
preventative, rehabilitative, deterrent, reformative, therapeutic, and corrective
115
Supra note 1, p.11.
116
Watkins, “Computer Crime: Separating the Myth from Reality”, C.A. Magazine, Jan. 1981.
117
Parker, “Computer Abuse Research Update”, Computer Law Journal, vol. 2, 1980, pp. 329-52.
35
theories, that will be appropriate in today's societal environment to lower crime
rates. Third, criminal law is the substantive part of criminal science that defines
crimes and provides punishments, such as the Indian Penal Code 1860 for the
performance of wrongful acts that are prohibited by law and contrary to public
policy. The following are the numerous conceptions of criminal behaviour in
cyberspace:
In the contemporary time period there are so many hi-tech society and
now-a-days it very common to see cyber criminal groups. In the year 1993, it was
rightly said by R. Blackburn that the behaviours of an individual is influenced by
peer pressures and peer attitudes. In the year 1989, the same was accepted by C.
Hollin in his work ‘Psychology and Crime: An Introduction to Criminological
Psychology’ in which he says that persons being associated with the criminals have
to be criminal and that they only have to express the favourable situation for
committing crime.
118
Edwin Sutherland, Principles of Criminology, 1947, pp. 82-85.
36
Hirschi proposed the Social Bonding Theory, which focuses on the factors that
prevent a person from engaging in criminal activity. It explains a person's
aversion to crime by looking at their levels of attachment, commitment, and
participation, as well as their beliefs. Unfortunately, because of the temptation of
rapid money for the culprits, cybercrime is becoming acceptable as a type of
profession rather than a crime in various parts of the world. 119 According to
Rational choice theory which is based on based on a simple cost-benefit analysis
that the people himself make the basic decisions whether they can commit a crime
or not to commit. This depends on their own will not any other things.
• There are various factors present on the cyberspace which provides the
119
Christine Conradt, “Online Auction Fraud and Criminological Theories: the Adrian Ghighina
Case”,
International Journal of Cyber Criminology, vol. 6, No. 1, Jan.- June, 2012, p. 917.
available at: http://www.cybercrimejournal.com/christine2012janijcc.pdf (visited on Feb. 22.
2017)
120
Olumide, Longe, et.al., “Towards a Real Time Response Model for Policing the Cyberspace”,
2010,
p. 2 available at: http://www.iimahd.ernet.in/egov/ifip/oct2010/olumide-longe.htm (visited on
Jan.24, 2013)
121
Jai Shankar Kumar, Crimes of the Internet, 2008, p. 283-284.
37
offenders the choice to commit cyber crime i.e. Identity Flexibility,
Dissociative Anonymity and lack of Deterrence etc.
• The conflict between Norms and Values of Physical Space with cyberspace
Structural-Functional Theories
The structural-functional theory's core discovery is that crime and
deviance are an unavoidable aspect of social order.
122
Supra note 62, p. 119.
123
Ibid.
38
perpetrate. This idea informs us about the motivations for engaging in cybercrime.
By the systematic study we can get an idea that why peoples are involving day-by-
day in the commission of cyber crime.
Pratt, Holtfreter, and Reising points out that while Routine Activity Theory
suggests that victims engaging indeviant 39ehavior are more likely to be victimized
victims of online auction fraud are typically involved in legitimate, lawful
39ehavior at the time of victimization. Because of this, simply engaging in
procuring items from online auction sites is a high-risk behavior compared to
individuals that do not buy items via online auctions. In essences, although it is not
unlawful, the behavior of buying items through online auctions is not the norm.124
Further, since the routine activities perspective was proposed after the introduction
of the lifestyle exposure theory and it encompasses not only the theoretical element
inherent in the lifestyle exposure theory but also two additional elements, routine
activities theory is thus perceived as an extension and more general expression of
the lifestyle exposure theory.125
124
Supra note 61, p. 915.
125
Fawn T. Ngo and Raymond Paternoster, “Cybercrime Victimization: An Examination of
Individual and Situational level Factors”, International Journal of Cyber Criminology, vol. 5, No.
1, Jan.- July, 2011, pp. 774-775, available at: http://www.cybercrimejournal.com/ngo2011ijcc.pdf
(visited on Feb. 22. 2017).
126
Supra note 64.
39
According to McQuade, technology-enable crime theory encompasses that:
Cyber crimes are nothing but crimes of the real world perpetuated in the
medium of computer and hence there is no difference in defining a crime in cyber
world and real world. Only the medium of crime is different.129 Cybercrime is
"international" or "transnational" – there are ‘no cyber-borders between
countries'.130 Computer crime, cyber crime, e-crime, hi-tech crime or electronic
crime generally refers to criminal activity where a computer or network is source,
tool, target or place of crime as well as traditional crime through the use of
computers like child pornography, Internet Fraud. In addition to cyber crime,
there is also ‘Computer supported crime’ which covers the use of computers by
criminals for communication and document or data storage.131
127
Norbert Weiner, “The Human Use of Human Beings: Cybernetics and Society” (1954)
referred by T.P.S. Rathore, “Cyber Terrorism and Information Technology Act, 2000”,
International Journal of Language Studies, vol.5, Aug. 2014, p. 1.
128
Supra note 7, p.215.
129
D. Latha, “Jurisdiction Issues in Cybercrimes”, Law Weekly Journal, vol.4, 2008, p. 86,
available at www.scconline.com (visited on July 25, 2015).
130
Guillaume Lovet Fortinet, “Fighting Cybercrime: Technical, Juridical and Ethical Challenges”,
Virus Bulletin Conference, 2009.
131
Supra note 71, p.85.
132
“Investigators Feel the Heat as Cyber Crimes on the Rise”, The Pioneer, February 22, 2010, p.
8.
40
omission committed on or through or with the use of or associated with the
internet, whether directly or indirectly, that is prohibited by any legislation and
for which monetary and/or bodily penalty is provided is defined as cybercrime.133
To put it another way, cyber crime refers to any offence or crime that
involves the use of a computer. According to some experts, cybercrime is simply
conventional crime perpetrated by high-tech computers. Others argue that
cybercrime is a new category of crime that necessitates a comprehensive new
legal framework to reflect the unique nature of modern technology and issues that
traditional crimes do not address. States have viewed cybercrime as both classic
crime perpetrated through new means and a crime with a distinct character that
necessitates a new legal structure.
133
Supra note 18, p.43.
134
EST no. 185
135
Australian Government, Australian Institute of Criminology, Attorney-General's Department,
2009, available at: http://www.aic.gov.au/crime_types/cybercrime/definitions.html (visited on
Feb. 22. 2017)
136
“Computer Crime Law and Legal Definition”, available at: https://definitions.uslegal.com
/c/computer-crime/, (visited on March 15, 2017).
137
Parthasarathi Pati, “Cyber Crimes”, available at: http://www.naavi.org/pati/pati_cybercrimes_
dec03.htm (visited on Feb. 13, 2017).
41
legal framework of the European Union, several measures planned in the Strategy
relating to the fight against 'cybercrime' (such as measures to strengthen
cooperation amongst law enforcement bodies) are not clearly linked to precise
and well-defined offences." 138
“Computer crime can entail acts that are classic in nature, such as theft,
fraud, forgery, and mischief, all of which are normally subject to criminal
sanctions everywhere,” according to the United Nations Manual on the Prevention
and Control of Computer-Related Crime. The computer has also spawned a slew
of new possible misuses or abuses, some of which may or should be illegal in
nature.144 As a result, a more accurate definition of cybercrime is the use of
computer technology to commit crime; engaging in conduct that jeopardises a
society's ability to maintain internal order. Traditional and rising cybercrime are
138
“Cyber Crimes”, available at: http://www.naavi.org/pati/pati_cybercrimes_ dec03.htm (visited
on Feb. 13, 2017).
139
Sameer Hinduja, “Computer crime Investigations in the United States: Leveraging Knowledge
from the Past to Address the Future”, International Journal of Cyber Criminology, Vol. 1, No. 1,
January, 2007, available at: http://cybercrimejournal.com/sameer.pdf (visited on Feb. 22. 2017).
140
Susan W. Brenner, “At Light Speed: Attribution and Response to Cybercrime/ Terrorism/
Warfare”, The Journal of Criminal Law & criminology, vol. 97, No. 2, 2007, p. 382, available at:
http://scholarlycommons.law.northwestern.edu/cgi/viewcontent.cgi?article=7260&context=jclc
(visited on Feb. 13, 2017)
141
Peter Stephenson, Investigating Computer – Related Crime, 2000, p. 3.
142
Supra note 19, p.89.
143
Pawan Duggal, Cyberlaw- The Indian Perspective, 2002, p. 256.
144
UN Manual on the Prevention and Control of Computer Related Crime, 1994, para 22,
available at:http://216.55.97.163/wp-
content/themes/bcb/bdf/int_regulations/un/CompCrims_UN_Guide
.pdf (visited on Feb. 22. 2017).
42
both covered by this concept. It also encompasses any use of computer
technology, not merely the use of networked computer technology.145
Prof. S.T. Viswanathan has explain the nature of cyber crimes as follows:
firstly, any illegal action in which a computer is a tool or object of the crime; in
other words, any crime, the means or purpose of which is to influence the function
of computer. Secondly, any incident associated with computer technology in
which a victim suffered or could have suffered loss and a perpetrator, by
intention, made or could have made a gain. Thirdly, computer abuse is considered
as any illegal, unethical or unauthorized behaviour relating to the automatic
processing and transmission of data.148 According to Loader B.D., a flexible
communications system designed to withstand attack by means of rerouting
message has also proved difficult for governments to control. Sources of illegal
activity often require advanced computer skills to be detected as a consequence of
their anonymous character. 149
145
Supra note 82, p. 386.
146
Supra note 74.
147
Supra note 8, p. 82.
148
S.T. Viswanathan, The Indian Cyber Laws: with Cyber Glossary, 2001, p. 81.
149
D. Thomas and B.D. Loader, Cyber Crime Law Enforcement, Security and Surveillance in the
Information Age, 2000, p. 3.
43
early as 1998. These computer criminals, which are anonymous in a virtual world,
will be the next significant wave of crime perpetrators.150 A computer is a subject
matter, it can be victim, it can be the facilitator and it can be the instrument of a
crime. 151
The nature of cybercrime and the legal challenges it raises are international
in scope. Efforts have been made to ensure the harmonisation of provision in
particular countries through international organisations such as the G-8 Group,
OAS (Organization of American States), APEC (Asia-Pacific Economic
Cooperation), and the Council of Europe. Ensuring that the dual criminality
requirement is met could lead to more effective global cybercrime prosecution.
An strategy like this is especially important when it comes to investigating and
prosecuting assaults on computer systems and networks' infrastructure.152 By
nature cyber crimes are different from other types of crimes which are discussed
as follows:
150
Supra note 18, p. 47.
151
Supra note 1, p. 9-10.
152
Stein Schjolberg and Amanda Hubbard, “Harmonizing National Legal Approaches on
Cybercrime”, International Telecommunication Union (ITU), Genewa, June 28- July 1, 2005,
available at: https:/
/www.itu.int/osg/spu/cybersecurity/docs/Background_Paper_Harmonizing_
National_and_Legal_Approaches_on_Cybercrime.pdf (visited on April 17, 2010).
153
S.K. Verma and Raman Mittal, Legal Dimensions of Cyberspace, 2004, p. 228.
154
Kyung-shick Choi, “An Empirical Assessment of an Integrated Theory of Computer Crime
Victimization”, International Journal of Cyber Criminology, vol. 21, No. 1, January-June, 2008,
p. 309, available at: http://www.cybercrimejournal.com/Choiijccjan2008.htm (visited on Feb. 22.
2017).
155
Soumyo D. Moitra, “Developing Policies for Cybercrime: Some Empirical Issues”, European
Journal of Crime, vol. 13, No. 3, 2005, p. 439.
44
knowledge about computer technology but in cyber crimes, the perpetrator uses
special knowledge of cyberspace.156 In general, special computer operating skills
are not required to commit cyber crime. For example, in cyber crime, a suspect
and a victim may communicate via Web based chat-rooms, Microsoft Network
Messenger (MSN), or e-mail. Once the criminal gains the potential victim’s trust,
the criminal is in the position to commit a crime against the victim. In this case,
even though the Internet probably assisted the suspect in communicating with the
victim, it does not mean thatthe technology or the Internet caused the crime.157
The evidence of the offences is the other distinction between these two
phrases. In classic crimes, criminals normally leave any evidence of the crime,
such as fingerprints or other tangible evidence, after or during the commission of
156
Steven Furnell, Cybercrime: Vandalizing the Information Society, 2002, p. 21.
157
E. Casey, Digital Evidence and Computer Crime, 2000, pp. 8-9.
158
Glenn Curtis, Ronald Dolan, et.al., “Cybercrime: An Annotated Bibliography of select Foreign-
Language Academic Literature”, 2009, pp. 3-4, available at: http://www.ncjrs.gov/pdffiles1/nij/
231832.pdf (visited on Feb.23, 2011)
159
Ibid.
160
“Cybercrime”, available at: http://www.webopedia.com/TERM/C/cyber_crime.html (visited
on Feb. 22, 2017).
45
the crime. However, cybercriminals commit their crimes over the internet, and
there are extremely few chances of leaving any tangible evidence. According to
forensic investigators, it is sometimes difficult to acquire evidence for the
conviction of cybercriminals because they alter their identities after committing
the crime or commit the crime using the false identities of others. But as compare
to traditional criminals it is very difficult to fake their gender, race, or age etc.
On the basis of the use of force, these two terms can be distinguished.
Many conventional crimes, such as rape, murder, and burglary, entail the use of
extreme force, resulting in physical injury to the victim. However, in contrast to
traditional crimes, cybercrime does not necessitate the use of force because the
thieves just use the identities of other people to steal confidential information.
161
Supra note 18, p. 48.
46
internet's global connectedness.162 Because of the nature of cybercrime, any cyber
criminal can commit a crime from anywhere on the planet. It is not necessary to
go to the victim's location in order to commit a crime against him.
This type of crime creates high impact. In the case of bank robberies, for
example, the quantum of losses is constrained by the weight, and volume of
currency that can be carried away by the burglars. The amount burgled does not
close down the bank operations permanently. The chances of robbery taking place
again in the same bank are remote since it is possible to take suitable precautionary
measures and revamp the security of the bank. The loss of goodwill isn't
significant either. On the other hand, the impact of computer crimes is significant,
and it is not a one-time event, but rather a long-term one. It has the potential to
stifle the victim's operations and, in the majority of cases, permanently disable
them. More than the monetary loss, it is the loss of client trust that will deliver the
knockout blow, especially for companies whose primary operation is dependent
on the internet, i.e., e-commerce. Customers may lose faith in the seller, and all of
the efforts done to earn that trust may be lost in the blink of an eye. 163 These are
also high-potential and simple-to-commit crimes.
Cyber crimes are also known for their low-risk, high-reward activities.
Cybercrime's most noticeable aspect is that it is relatively easy to commit,
difficult to detect, and even more difficult to prove. Cyber criminals with
rudimentary computer skills and experience can readily destroy valuable
databases, causing significant financial loss or damage to the victims of the
crime.164 As a result, this characteristic distinguishes this crime from others. This
characteristic of low risk, high reward initiatives may be evident in only a few
sorts of crimes.
Many times, the party or organisation that has been harmed by cybercrime
decides not to report it to the police for fear of negative publicity or losing public
faith. The victims' unwillingness and reluctance to come forward and submit a
police report against the cybercriminal exacerbates the scope of the problem of
cybercrime detection and control.
165
Supra note 103.
48
Category of Cyber Criminals
“Amidst the surging excitement and interest, however runs a deep thread
of ambivalence towards connecting to the internet. The internet’s evil twin is the
home of “Bad Guys”-hackers, crackers, snackers, stalkers, phone preaks and
other creepy web crawlers. Business fear that the Infobahn could suddenly veer
into the highway to Hell”166
Cybercriminals attempt to use computers in three ways: first, they use the
computer as a target for attacking other people's computers in order to carry out
malicious activities such as spreading viruses, data theft, identity theft, and so on;
second, they use the computer as a weapon for committing traditional crimes such
as spam, fraud, and illegal gambling.
The age profile of persons arrested in cyber crime cases under the IT Act,
2000 revealed that 62.5 percent of offenders were in the age group 18 years in
166
Michael Rustard and Lori E. Eisenschmidt, “The Commercial Law of Internet Security”, High
Technology Law Journal, vol.10, No.2, 1995, p. 215, available at: http://scholarship.law.
berkeley.edu/cgi/viewcontent.cgi?article=1129&context=btlj (visited on Feb. 22. 2017)
167
Farooq Ahmed, Cyber Law in India-Law on Internet, 2005, p. 31.
168
Cary Janssen, “Cyber Criminal”, available at: http://www.techopedia.com/definition/ 27435/
cybercriminal (visited on June 19, 2015).
169
Supra note 45, p. 42.
49
2015 and 52.7 percent in 2014, 3,188 out of 5,102 persons in 2015 and 2,238 out
of 4,246 persons in 2014 were under 30 years, and 30.08 percent of offenders
were in the age group 30 years in 2015 and 39.1 percent in 2014. A total of 3,502
people were charged in 2015, up to 1,931 in 2014. A total of 250 person during
2015 and 65 persons during 2014 were convicted and 358 persons during 2015
and 165 persons during 2014 were acquitted under cyber crime cases.170
The following are the category of cyber criminals on the basis of the object
because the cyber criminals constitute of various groups or category:
Discontented Employees
Employees who have been fired or 51ehavior51 by their employers for
their illegal conduct fall under this category. To avenge their dissatisfaction, these
individuals frequently resort to hacking their employers' computer systems in
order to inflict him financial loss or damage. Because of the widespread use of
computers and automation processes in modern times, it is simpler for unhappy
employees to cause more harm to their employers by hacking the computer,
which can knock the entire system down and so halt the employer's commercial
operations.175 This is due to the lack of trust by the employers on the employees,
poor communication between them and unlawful 51ehavior to each other is the
main factors responsible for the employees discontented. It will lead for increasing
negative relationship between them and encouraging for involvement in crimes.
173
Bombay Indian Express, July 10, 2001.
174
Taylor Armerding,“Cybercrime: Much more Organized”, (Last Modified on June 23, 2015),
available at: http://www.csoonline.com/article/2938529/cyber-attacks-espionage/cybercrime-
much-more- organized.html (visited on Nov. 28, 2016).
175
Supra note 45, p. 44.
51
52
The Typical Cybercriminal
Those who use computers and networks to conduct crimes fall into this
group of cyber criminals. There are almost always exceptions to the
characteristics of this category of people, but the majority of cybercriminals share
some characteristics. First, some of them have a measure of technical knowledge,
i.e. they use other people's malicious code. Second, some of them are
unconcerned about the law or rationalisations, and they wonder why certain laws
are in place. and lastly, some of the cyber criminals have the motive to commit
the crime for monetary gain, strong emotions, sexual impulses, political or
religious beliefs, or having the desire for fun and enjoyment.
176
R.K. Raghvan, “Salutations”, CBI Bulletin, vol.8, No. 2, Feb., 1999, p. 4.
177
Gabriel Weimann , “Internet Security of Germany’s Federal Police Office”, The Times of
India, Nov. 23, 2007.
178
U.N. Report on International Review of Criminal Policy and Prevention & Control of Computer
Crime, Oct., 2005.
53
expanding globally day-by-day and affected the huge amount of peoples at the
same time.
179
Supra note 45, p. 57.
180
B. Muthukumaran, “Cyber Crimes Scenario in India”, Criminal Investigation Department
Review, 2008, p. 17, available at: http://www.gcl.in/downloads/bm_cybercrime.pdf (visited on
April 10, 2016).
181
Harpreet Singh Dalla and Geeta, “Cyber Crime- A Threat to Persons, Property, Government
and Societies”, International Journal of Advanced Research in Computer Science and Software
Engineering, vol. 3, No. 5, 2013, p. 997, available at: http://www.ijarcsse.com/docs/papers/
Volume_3/5_May2013/V3I5-0374.pdf (visited on Dec. 10, 2013)
54
Cybercrimes against Individual
The term crimes against the individual refers to those criminal offences
which are committed against the will of an individual like bodily harm, threat of
bodily harm generally including assault, battery, and domestic violence,
harassment, kidnapping, and stalking etc. but in reference to cyber crime this
category can be in the form of cyber stalking, distributing pornography,
trafficking, cyber bulling, child soliciting and abuse. Such cybercrime affects the
individual’s personality and affect the psychology of younger generation in a
unlawful manner. These are as following:
iii. Cyber-stalking
v. E-mail Harassment
vi. Defamation
Cyber vandalism to steal databases from other firms with the help of a
corporate cyber spy to spread harm are examples of these types of cyber crimes.
A cyber thief can steal a person's bank details, misuse a credit card for online
purchases, use software to obtain access to an organization's website in order to
disrupt the organization's systems, and so on, much like in the real world.
These crimes are done with the intent of instilling fear among the
inhabitants of a specific country by disseminating false information. If effective,
this category has the potential to generate panic among civilians. Cyber criminals
hack company websites, government firms, and military websites, or distribute
propaganda under this category of cyber crime. The offenders could be hostile
foreign governments or terrorist groups. This includes:
i. Cyber terrorism
v. Cyber vandalism.
vi. Virus
vii Net-trespass
i. Cyber Pornography
56
v. Cyber Forgery
Credit card frauds, online fund transfers and stock transfers, Scams, and
theft are all examples of cyber crime in this area. The following are the
cybercrimes included in this category:
iii. Fraudulent use of Automated Teller Machine (ATM) cards and accounts
v. Telecommunications fraud
i) Internet Crime are those crimes which includes the group crimes that make the
criminal use of the internet infrastructure like hacking, spamming,
Espionage etc.
ii) Web based Crime are those crimes which includes crimes relating to
website, e-mail, internet chat i.e. cheating, pornography, insurance fraud,
extortion, e-mail bombing, gambling, forgery, spoofing, cyber squatting,
sale of pirated software, defamation, sale of stolen data, cyber stalking,
illegal access etc.
v. Identity Theft
The first cause for the growth of cybercrime is a large amount of data
storage capacity. The computer can store a large amount of data in a little amount
of space. In a CD-ROM, a little microprocessor computer chip can hold lakhs of
pages. Even if the power is switched off, the data contained in ROM is protected
and will not be lost. In a few of minutes, a cyber criminal can obtain a big amount
of confidential or official data from another person's computer. As a result,
cybercrime is on the rise.
182
H.L.A. Hart, The Concept of Law, 2012, p. 73.
59
that contributes to the growth of cybercrime. Because the human mind is flawed,
there is always the possibility of a lapse at any stage of processing. Cyber
criminals are continuously on the lookout for opportunities to exploit these flaws
and get access to a computer system. On the internet, these types of criminals are
known as hackers, and they try to exploit flaws in existing operating systems and
security equipment. egligence of Network user is the third reason which is
responsible for the emergence of cybercrimes because negligence is closely related
to human conduct. There is always a probability that there might be any
negligence on the part of network user while he is trying to protect the computer
system. This negligence leads to a chance for the cyber criminal to gain
unauthorized or illegal access or control over the computers and commits
crime. Evidence unavailability or loss is the fourth reason which is responsible for
the emergence of cybercrimes. Now the digital computer processing and network
technology has replaced the traditional methods for producing, storing,
transmitting and disseminating information or records. Due to the emerging nature
of cyber crimes the issue raises before the law enforcement and investigating
agencies is for procuring and preserving evidence against the cyber criminals. In
comparison to traditional crimes, gathering adequate evidence of a cyber crime to
find him guilty beyond a reasonable doubt is extremely difficult. Because of the
anonymity provided by the internet, cyber criminals are motivated to engage in
criminal conduct without leaving any proof, and even if evidence is left, it is
difficult to persuade the authorities to file a case against them.
Wider access to information is the fifth reason which is responsible for the
emergence of cybercrimes. Computer is defined as an electronic device which
performs function through complex technology rather than manual actions of
human beings. The wider access to information resources is the greatest advantage
of computer networking in the cyber age. More and more organizations are
resorting to networks for providing easily accessible information to their
60
employers, customers and parties with which they deal. In the present information
age this is the reason why networking and cyber activities are increasing day by
day. Due to the information dissemination through World Wide Web, new
resources have been created for faster and cost effective access to information
throughout the world. This facility leads to involve in crime commission on the
cyber space.
In the field of criminology, it has been argued that a crime will occur when
and only when the chance arises. Previously, we only knew about classic forms of
crimes such as murder, rape, theft, extortion, robbery, and dacoity. However, with
the advent of science and technology, such as computers and internet services,
new forms of crimes have emerged, such as hacking and cyber pornography.
Science, new technology, and the internet have created a new virtual heaven for
good and wicked people to enter and mingle with a wide variety of civilizations
and subcultures.
However, the internet will become a virtual hell for everyone in the future
if it falls into the wrong hands or is utilised or controlled by those with dirty
minds and malevolent motives. Because of the usefulness of information
technology and the internet, cyber criminals and terrorists have turned to
computers as a target or a tool for committing crimes.
183
“State Actor linked to major Cyber Intrusions in India, World: McAfee report says 72
organizations in 14 countries hacked into four years”, The Hindu, Aug. 4, 2011, p. 1.
61
CHAPTER-III
HISTORICAL DEVELOPMENT OF CYBER CRIMES
3.1 Introduction
“In online, the bounds of acceptable activity, or even ethical behaviour,
have yet to be properly established. There is also no agreement on what sorts of
data can and should be deemed network property, as well as what constitutes theft
or interference with this property.”184
The Internet was considered to be a unique medium with the highest speed
of dispersion in human history as early as the early 1990s. There are relatively
few people today whose lives are unaffected by Internet-era technology, both
positively and negatively. On the plus side, the capacity to instantly communicate
and distribute knowledge has brought unparalleled benefits to education, trade,
entertainment, and social contact. On the bad side, it has increased the opportunity
for crime to be committed. Information technology has allowed potential
criminals to commit large-scale crimes for essentially little money and with a
184
Marshall Herbert MeLuhan, “The Promise of Global Networks”, Annual Review of
Institute for Information Studies, 1999, pp. 164-165.
185
M.E. Kabay, A Brief History of Computer Crime, 2008, p. 3 available at:
http://www.mekabay. com/overviews/history.pdf (visited on March 9, 2017)
186
“History of Cyber Crime”, available at: http://www.bezaspeaks.com/cybercrime/history.htm
(visited on March 9, 2017).
62
considerably lower risk of being caught.
187
Shun Young Kevin Wang and Wilson Haung, “The Evolutional View of the Types of Identity
Thefts and Online Frauds in the Era of the Internet”, Internet Journal of Criminology (online),
2011, p. 2, available at: http://media.wix.com/ugd/b93dd4_83ceccb58ea64dcd8bd7 a6aa67f082
fe. pdf (visited on March 9, 2017).
188
Kathy Martinez Prather and Donna M. Vandiver, “Sexting among Teenagers in the United
States: A Retrospective analysis of Identifying Motivating Factors, Potential Targets and the Role
of a capable Guardian”, International Journal of Cyber Criminology, vol.8, No.1, January-June,
2014, p. 21, available at:
http://www.cybercrimejournal.com/pratherVandiverijcc2014vol8issue1.pdf (visited on March 9,
2017).
189
“Introduction and Evolution of Computer”, available at: http://fundamentalofcomputing.
blogspot.in/p/introduction-and-evolution-of-computer.html (visited on March 10, 2017).
190
Wayne Williams, “The Evolution of Computer from 1613 to 2013”, available at:
https://betanews.com/2014/09/05/the-evolution-of-the-computer-from-1613-to-2013/ (visited on
March 10, 2017).
191
Talat Fatima, Cyber Crimes, 2011, p. 5.
63
the USA grants him for this invention and in the year 1950, they delivered it to the
USA census bureau.
Before 1957 there was no scope to communicate with others through new
technology worldwide. In the year 1957 the then President of the United States of
America Dwight Eisenhower authorized the creation of the Advanced Research
Projects Agency (ARPA) following the Soviet Union’s first artificial earth-
orbiting satellite called sputnik. In the 1960s due to cold war the United States of
America concentrated on communication during war time more than others
concerned. Therefore, in the year 1962, Dr. J.C.R. Licklider was appointed to
administer new technology. He developed network system which is called ARPA
net. The US Defense Department and APRA-Net joined together in the year 1969
and introduced first node for communication as network installation at the
University California, Los Angeles. Other nodes were installed at Stanford research
Institute, University of Utah and UC Santa Barbara; first four computers with
internet with about 50 KBPS circuits and at that time UNIX were developed.192 In
1971, Ray Tomlinson sent the first electronic mail message and the University of
Wisconsin developed system or server for Internet in the year 1983.
In the year 1976 Steve Jobs and Steve Wozniak created the Apple I.193 In
the year1984; Domain Name Server (DNS) was introduced. Meanwhile, Willian
Gibon described online world and communication and coined the name of cyber
world as ‘cyberspace’ in his publication named “Neuromancer”.
The origins of the Internet lie in the military domain.194 In the year 1990
the internet was introduced ceasing ARPA Net and Tim Berners Lee writes the
first browser which was coined as World Wide Web. By the year 1995 the
internet split globally through World Wide Web with concepts of Local Area
Network (LAN), Network Neighborhood and Data over Cable Service Interface
Specific (DOCSIS). Wireless communication with Wireless Application Protocol
(WAP) and Wireless Markup Language (WML) were introduced in the 20th
century and developed in the year 2001. On April 2002 wireless network was
published on the Extreme Tech website.195 At that time mostly hackers were
motivated for using low cost, speedy and wireless communication device for
remote access connections along with mobile computer systems. With the same
192
M.Dasgupta, Cyber Crime in India- A Comparative Study, 2009, pp. 27-28.
193
Supra note 7.
194
Steven Furnell, Cybercrime: Vandalizing the Information Society, 2002, p. 3.
195
Supra note 9, p. 29.
64
time in the contemporary era of communication convergence and new multimedia
technology period Mobile Technology took their shape worldwide.
In the year 1820, the first cybercrime was documented. That's hardly
unexpected given that the abacus, which is regarded to be the earliest form of
computer, has been used in India, Japan, and China since 3500 B.C. The era of
196
United Nations Manual on the Prevention and Control of Computer Related Crime, 1994, p. 5,
available at: http://216.55.97.163/wp-
content/themes/bcb/bdf/int_regulations/un/CompCrims_UN_ Guide.pdf, (visited on March 15,
2017).
197
Frederick B. Cohen, Protection and Security on the Information Superhighway, 1995, p. 13.
65
contemporary computers, on the other hand, began with Charles Babbage's
analytical engine. The loom was invented by Joseph-Marie Jacquard, a French
textile producer, in 1820. This technology allowed a succession of steps in the
weaving of specific fabrics to be repeated. Employees at Jacquard were concerned
that their traditional jobs and livelihoods might be jeopardised as a result of this.
They carried out acts of sabotage in order to deter Jacquard from using it again. 198
This is known as the first recorded cyber crime in the history. Actually the physical
damages to computer systems and subversion of the long distance telephone
networks were involved in the early computer crimes.
The history of hacking can be traced from 1870’s use of brand new
telephone by teenager’s generally for telephone phreaking.199 It is considered that
with the evolution of computer technology, for the first time in history the computer
related problems are going to evolve with negative result in the form of computer
crime or cyber crime like cyber theft, unauthorized access to computer, systems
and device etc. After this there was the great need of a new technology which
would help in maintaining information stored in computer as well as their system
data base.
U.S. is the birthplace of the Internet and experienced the first computer
facilitated crime in the year 1969.200 After this in the time period of 1960s and
1970s, a litany of early physical attacks on computer systems was catalogued by
Thomas Whiteside. Those cyber criminals who were involved in telephone
phreakers became hackers in the 1960’s because they had an extra curiosity to
know about computer, computer system and its use for their own ends in the early
1960’s. They went on their work with the curiosity to learn the change of
computer code of the system. But in the early stage of this new technology these
crimes were committed by technology experts who directly attack into the
computer, computer system or computer network.
198
Harpreet Singh Dalla and Geeta, “Cyber Crime- A Threat to Persons, Property, Government
and societies”, International Journal of Advanced Research in Computer Science and Software
Engineering , vol.3, No. 5, May, 2013, p. 997, available at: http://www.ijarcsse.com/docs/
papers/Volume_3/5_May2013/V3I5-0374.pdf (visited on March 9, 2017).
199
Supra note 9, p. 29.
200
Supra note 8, p.454.
66
property. The overall cost of the damage was $2 million, and 97 persons were
detained.201
In the year 1970, the malicious association became evident with the
purpose of hacking and at that time the early computerized phone system were the
target. They were associated with the purpose to directly damage to computer
centres. Also at that time, Germen state of Hesse enacted the world 1st computer
specific law in the form of Data Protection Act, 1970 with new cyber technology.
With the passage of time technology also emerged with its misuse and then there
was the need of strict statutory laws for regulating the criminal activities in cyber
world.
By the year 1970, the cyber world and network was open to worldwide
users. And by that time another cyber crime evolved and became legal challenge
worldwide that is cyber pornography. The year of 1970 is the landmark for telephone
tampering by John Draper. He was an U.S. Air Force veteran and engineering
technician for national semi-conductor. He went by the alias of cap’n crunch. In
the year 1971 in Vietnam he found that the cap’n crunch cereal boxes whistle can
reproduce a tone of 2,600 megahertz; by blowing that whistle into a telephone
receiver, phreakers could make free calls at that time. By blowing a precise tone
the accused John Draper used to make long distance call for free of charge into a
telephone. That precise tone used to inform the telephone system to open a line or
connect with line.202 Most of the teenagers were encouraged by magazines and
also with the technical assistance programmes at that time because these consist
with the process of tampering the telephone phreaking.
201
M.E. Kabay, A Brief History of Computer Crime, 2008, p. 5 available at:
http://www.mekabay. com/overviews/history.pdf (visited on March 9, 2017).
202
Supra note 9, p. 31.
203
Supra note 18.
67
programmers and hackers were associated with computer centres and cyber cafés
in Russia at the time. They used to collaborate closely to create brand names such
as IBM, DEC, operating systems, and software packaging. Hackers began to use
programme code.204 The Russian Government employed those programmers for
security measures in the late 1960s and 1970s.
In the year 1978, the primary means of communication for the electronic
underground was appeared and became the first electronic bulletin board system
(BBS). In the year 1981, Ian Murphy, aka known as “captain Zap” broke into AT
& T’s computers and changed the billing clock with the purpose that people can
receive discounted rates during normal business hours and due to this incident he
becomes first felon convicted of a computer crime.
In the year 1981 the first virus exposed to world that came into being
before the experimental work which defines viruses of contemporary world. That
was founded on the Apple II operating system and spread on Appeal II floppy disk
which contains the operating system. In the year 1983 in November, the first
documented experimental virus was conceived to be presented at a weekly
seminar computer security, by the author and the name “virus” by Len Adleman.
In the year 1984 Fred Cohen defines computer virus as “a computer programme
that can affect other computer programmes by modifying them in such a way as
to include a possibly evolved copy of itself”. In the year 1986 Brain and Virdem,
two Pakistani’s, developed a method of infecting it with a virus they dubbed
“Brain” which could infect 360 kb floppy with “© Brain” for a volume
label.205They also widely sped this virus on MS-DOS P system. It is called that
this was the first file virus which was created in this year.
The United Kingdom has enacted several legislations like the Data
Protection Act, 1984; the Access to Personal Files Act 1987, the Copyright
(Computer Software) Amendment Act 1985, the Interception of Communications
Act 1985, the Local Government (Access to Information) Act 1985, the
Electronic Communication Act 2000. The Interception of Communication Act,
1985 which was passed by The Parliament of United Kingdom prohibits forgery,
criminal damage and intentional acts for intercepting a communication in the
course of its transaction by means of a public telecommunications system as
offence.
204
Supra note 9, p. 32.
205
Id, p. 42
68
In the year 1986, the systems administrator at the Lawrence Berkeley
National Laboratory, Clifford Stoll, noted certain irregularities in accounting data.
Inventing the first digital forensic techniques, he determined that an unauthorized
user was hacking into his computer network. Stoll used what is called a “honey
pot tactic”, which lures a hacker back into a network until enough data can be
collected to track the intrusion to its source. Stoll’s effort paid off with the
eventual arrest of Markus Hess and a number of others located in West Germany,
who were stealing and selling
military information, passwords and other data.206 In the same year the
oldest virus created by Pakistani Brain under unauthorized circumstances with the
purpose of infecting IBM computers. After that the government passed the
Computer Fraud and Abuse Act with the objective to make this a criminal offence
under cyber law. But there was the weakness of this law of not covering juveniles
under its purview.
After 1986, the Lawrence Berkeley lab intrusion was followed by Robert
Morris for the discovery of worm virus. In United States v. Robert Tappan
Morris208 case, Morris was pursuing Ph.D from the Cornell University in computer
science in the year 1988. The Cornell University has given him an account on the
computer to use it and after that he has discovered “worm” called as one form of
“virus” which may be used to demonstrate the inadequacies of security systems
and networks. Then, he released the worm through a computer at the Massachusetts
Institute of Technology (MIT) on 2nd November 1988 which caused damage and
infection very fast to other computers. He then discussed it with his friend at
Harvard and sent an anonymous message from Harvard over network, instructing
clogged, but it was too late because by that time military sites, medical research
206
“A Brief History of Cyber Crime”, available at: https://www.floridatechonline.com/blog/
information-technology/a-brief-history-of-cyber-crime/ (visited on March 10, 2017).
207
D. Thomas and B.D. Loader, Cyber Crimes, Law Enforcement, Security and Surveillance in the
Information Age, 1995, p. 59.
208
(1991) 928 F. 2d 504 [Cert. denied, 502 U.S. 917 (1991)].
69
sites, installations sites, Universities websites were infected. The court found him
guilty under title, 18 USC s. 1030(a)(5)(A) and was sentenced to 3 years of
probation, 400 hours of community service, a fine of $10,050 and the costs of his
supervision. This was affirmed by the circuit court in the year 1991 and held that
section 1030(a) (5) (A) does not require the Government to demonstrate that the
defendant intentionally prevented authorized use and thereby caused loss. There
was sufficient evidence for the jury to conclude that Morris acted “without
authorization” within the meaning of s. 1030(a) (5) (A) and s. 2(d) of the
Computer Fraud and Abuse Act 1986. That conviction was made appropriate by
the District Court.
The Electronic Frontier Foundation was formed in 1990. For the first time,
dark Avenger released polymorphic virus in the year of 1992 which was called as
first in the history. The United Kingdom has published working papers relating to
data protection, computer hacking, fraud and related crimes from 1990 to 1998.
The federal websites i.e. the US Department of Justice, US Air-force, and NASA
were broken and defaced by the hackers in the late 1990s. Meanwhile, in August
1990, United Kingdom passed the Computer Misuse Act but before this
enactment the Telecommunication Act, 1984 which prohibits the misuse of the
209
Supra note 9, pp. 38-39.
70
public telecommunications network was very significant in scope. United
Kingdom Parliament has revised this Act in 1994 and amended in the late 1996.
After revision and amendment the Act provides for prohibiting the unauthorized
access for committing espionage, unauthorized access to non-public government
computer, computer fraud, damage to computer, trafficking in passwords, threats
to damage a computer etc.
Therefore, after the above mentioned case, the House of Lord’s appointed
the Law Commission for their recommendations and suggestions to make law to
210
(1984) 1 WLR 962.
211
(1988) 2 WLR 984.
71
prevent and control hacking in the year 1988. They submitted their report in the
year 1989 with recommendation to enact specific law on Computer Misuse in the
United Kingdom.
After R. v. Gold212 case, the United Kingdom enacted the specific law on
Computer Misuse for the purpose of controlling and preventing the commission
of cyber terrorism on the recommendations and suggestions of Law Commission.
Because in this case, the defendant gained unauthorized access into the network in
order to highlight the deficiencies in its security system. They hacked Customer
Identification Numbers (CIN) and password. But the Appellate court quashed their
conviction and was confirmed by the House of Lords. The appellate court
observed that the act of accused by using dishonest trick to gain unauthorized
access to the British Telecom files did not come under this type of criminal
offence but they may be convicted for deceiving a computer; and deceiving a
machine which is not possible.
In the year 1995, people of India started using internet and internet surfing
not only confined to departments and corporate sectors rather people started to
use net to access information’s and communications.213 Then in the year 1985 the
Telegraph Act was passed in India. This Act was further amended with the
objective of adopting proper regulations in the cyberspace.
In United States of America v. Jake Barker and Arthur Gonda 214 the
defendant was charged for threatening and kidnapping with objectionable materials
in electronic mail messages through internet. In December, 1994 the messages
through electronic mail were exchanged between J. barker and co-accused A.
Gonda. But J. Barker was then in Michigan and A. Gonda was in some unknown
place with unknown identity. That’s why they exchanged that electronic mail
message through a computer in Ontario, Canada and this exchange began from
November 29, 1994 to January 25, 1995 with the intention of sexual needs and
violence against women and girls. He also posted this story with the real name of
that student on electronic bulletin board so that it could be available for the world
through World Wide Web. But FBI agent’s with affidavit made a complaint
against him and he was arrested on the basis of that complaint where FBI citied
the language used by the accused and posted in internet news group
“alt.sex.stories” and electronic mail to Gonda which are based on torture, rape,
212
(1988) 2 WLR 984; see also (1987) 3 WLR 803.
213
Supra note 9, p. 38.
214
(1995) 890 F.Supp, 1375 (E.D. Mich).
72
murder of woman citing same name of their classmate at the University of
Michigan. The District Court affirmed the order of his detention as passed by
the Judicial Magistrate on February 10, 1995 by recognizing him as a threat to the
community. But the court on his motion passed an order for his release on bond
and for psychological evaluation on March 8, 1995.
In December 1997, the US Attorney General Janet Reno said that criminals
no longer are restricted by national boundaries. If we are to keep up with cyber-
crimes, we mustwork together as never before. After meeting at Federal Bureau of
Investigation’s headquarters of the Justice Ministers of the G-8 countries, the
news released for collaboration of these major countries to215 (i) assign adequate
number of properly trained and equipped law enforcement personnel to
investigate high-tech crimes (ii) Improve ways to track attacks on computer
networks (iii) When extradition is not possible, prosecute criminals in the country
where they are found. (iv) preserve key evidence on computer networks. (v)
Review the legal codes in each nation to ensure that appropriate crimes for
computer wrongdoing are prescribed and to ensure that the language makes it easier
to develop new ways to detect and prevent computer crimes. (vii) Increase efforts
to use new communication technologies, such as video teleconferencing to obtain
testimony from witnesses in other nations. In October 1997, alleged transcript of
telephonic conversation about the Tata Tea case between Ratan Tata, Nusli Wadia
and Field Marshal Sam Manek Shaw are remarkable case of telephone trapping.216
The “yahoo!” internet search engine was attacked by hackers in the year
1997 with the threat that to release from prison Kevin Mitnick217 the so called
popular hacker, otherwise they will send a “logic bomb” in the personal computers
of yahoo users on December 25, 1997. On January, 1998 thousands of fake
information requests were received by the federal bureau labour statistics due to
cyber attack called “spamming” which was developed as new mode of attack by
hackers.
215
W. Boni and G.L.Kovacich, Net Spoinage the Global Threat to Information, 2000, p. 24.
216
The Times of India, Kolkata, Aug. 5, 2005, p. 11.
217
U.S. v. Mitnick, (1999) C.D. Cal.
218
(1997) 106 F.3d 1069 (1st Cir).
73
duties. For this task he had a valid password and was authorized to use it to
perform his duties. But side-by-side he also used it for some unauthorized search
of IRS files and knowingly disregarded IRS rules. Section 1030(a) (4) provides
that more than mere unauthorized use is required the ‘thing obtained’ may not
merely be the unauthorized use. It is the showing of some additional end to which
the unauthorized access is a means that is lacking in this case. The evidence did
not also show that his end was anything more than to satisfy his curiosity by
viewing information about friends, acquaintances and political rivals. No evidence
produced by the plaintiff suggests that he printed out, recorded, or used the
information he browsed. No rational jury could conclude beyond a reasonable doubt
that Czubinski intended to use or disclose that information, and merely viewing
information cannot be deemed the same as obtaining something of value for the
purposes of this statue. That’s why at the end the defendant’s conviction is
reversed.
In the year 1998, the hackers were threatening again by a holocaust that if
Kevin Mitnick was not released from prison they will break into United Nation’s
Children Fund’s website and they will also sell the military satellite system
software to terrorists.219 In the same year one hacker group releases a Trojan
horse program if it was once installed in a Windows 9x machine the program will
allow for unauthorized remote access.
The United States of America in the year 1998 opened 547 computer
intrusion cases, after one year in 1999 that number of cases had jumped to 1154. In
the year 1998 the number of intrusion cases closed was 399 and in the year 1999
the number of other cases closed was 912. The losses traced to denial of service.
(DOS) attacks were only $77,000 in the year 1998 and 1999 had risen to just
$116,250.220 In this year for the demand of release of Kevin Mitnick from prison
hackers break in a “holocaust” of the United Nation’s Children Fund Website and
also they claimed to break Pentagon network by committed cyber theft of stealing
software of a military satellite system and then threatened to sell it to terrorists.
219
Supra note 9, p. 38.
220
Statement for the Record of Louis J. Frech, Director FBI, on Cyber Crime, before Senate
Committee on Judiciary, (March 28, 2000).
74
that’s why his name was not published. In this regard the US Attorney Stern said
that “computer and telephone networks are at the heart of vital services provided
by the Government, private industry and critical infrastructure. They are not toys
for the entertainment of teenagers.” It can create a tremendous risk to the public by
221
hacking a computer or telephone network. So in this case it is necessary to
prosecute juvenile hackers in appropriate manner. Then the US Secret Service
(USSS), Bell Atlantic Telephone Company and postal Inspection Services
Massachusetts State Police started investigate this case.
In United States v. Thomas223 case the accused were convicted for posting
sexually explicit magazines on an electronic bulletin board. In this regard the
United States of America passed the Electronic Communications Privacy Act,
1999 for the protection of right to privacy. The significant Amendments have been
made for cryptography, security and freedom in cyberspace in the Constitution of
United States of America. Recently certain statute has also been enacted like the
Spy-were Control and Privacy Protection Act, 2000 (USC s. 3180IS) to protect
the disclosure of the collection of information through computer, computer
software and other related purposes.
In United States v. Hilton224 case, a federal grand jury charged Hilton for
criminal possession of computer disks containing three or more images of child
221
U.S. Department of Justice, (March 18,1998).
222
(1997) 111 F. 3d 1472 (10th Cir).
223
(1997) 4 F. 3d 701, 6th Circuit Court [ Cert. denied 117 S. Ct 74 (1996)].
224
(1999)167 F.3d 61 (1” GR.), [cert. denied, 120 S. Ct. 115].
75
pornography in violation of 18 U.S.C. $ 2252A (A)(5)(B). He challenged the state
without denying the charges. He contended to dismiss the charges on grounds that
the act was unconstitutional under the First Amendment. The U.S. district court
was also agreed with his contention regarding the vagueness of the definition of
child pornography but in this case the issue was raised whether the CPPA poses
substantial problems of over breadth and which would sufficient to justify
overturning the judgment of the lawmaking branches. It was held by the court that
the CPPA is not unconstitutionally overbroad and the judgment of the district court
is reversed.
In the year 1999 on September, the Dig Dirt Inc. files a complaint that an
employee of Steptoe & Johnson LLP of Washington, D.C. hacked into their
system by using password and internet account. Before that the computer hacker
tried to hack their system more than 750 times. The hackers also tried to post
critical message in various internet forums. In Amazon and Alibris case on
November 1999, an online bookseller and internet service provider was fined
$250,000 for intercepting electronic mail sent by amazon.com and other net book
retailer i.e., Alibris. The Hackers allegedly copied customer lists of that
company.225 Alibri was an internet service provider with name ‘valinet’ in the
Greenfield and Massachusetts with Interloc, Inc. who provided the electronic mail
service to the book dealers. He allegedly intercepted electronic mail messages of
amazon.com to Alibris bookseller between January to June 1998. The accused
copied thousands of electronic mail information illegally by that time and
unauthorizedly accessed confidential password and customer lists of amazon. com
which was also one of its competitors and internet service providers. But at the
end Alibris co-operated with the law enforcement agencies and was ready to pay
the fine as was charged. 226
In India, the first case was the Yahoo, Inc v. Akash Arora227 in which an
Indian Court delivered its judgment relating to domain names. In this the plaintiff
Yahoo Inc. filed a suit against the defendants for seeking permanent injunction by
restraining them and their partners, servants and agents from doing any business
on internet under the domain name ‘Yahooindia.com’ or any other domain name
which is identical with the plaintiff’s trademark ‘Yahoo!’ . During the pendency of
the suit, the plaintiff also moved an application seeking temporary injunction
225
Supra note 32.
226
United States Department of Justice, (Nov. 22, 1999).
227
(1999) 19 PTC 229 (Delhi).
76
against the defendants. In this case the Court granted an ad interim injunction
restraining the defendants from doing any business on the internet under the
trademark/domain name “Yahooindia.com” or any other trademark/domain name
which is identical with the plaintiff’s trademark “Yahoo!”.
The Information Technology Act (ITA) of 2000 was passed by the Indian
Parliament with the goal of combating cybercrime and providing a legal
framework for e-commerce transactions. This was India's first cyber legislation,
which dealt specifically with cybercrime. It covers a wide range of offences
committed in an electronic format or involving computers, computer systems, and
computer networks. Surprisingly, the terms "cyber crime" and "cyber offence" are
neither defined nor utilised in the Information Technology Act of 2000. This Act
amends many provisions of our existing laws i.e. Indian Penal Code, 1860; the
Indian Evidence Act, 1872; the Bankers Book Evidence Act, 1891 and the
Reserve Bank of India Act, 1934.
230
(2001) Bom H.C., W. P. No. 1611.
231
(1988) 2 Crimes 173 Ker.
232
(1969) 2 SCC 687.
233
(1997) 6 SCC 241.
234
“The Most High Profile Cases, India”, The Times of India, Kolkata, at 11 (Aug. 5, 2005).
78
Bharat Shah who was a film financier was found to talk with gangsters Dawood
Ibrahim and Chhota Shakeel and police recorded his conversations and after this
he was taken to trial on the basis of recordings from January to February 2001.
This incident was concerning with the movie Chori Chori Chupke Chupke’s
financed by Mr. Shah on behalf of Karachi bases gangster Shakeel and
investigated by using tapping system.
On 18th -19th May 2001 Claude R. Carpenter who was a former employee
of IRS working as systems administrator of hardware and software within the
IRS and unauthorizedly logged in one of the servers of his supervisor’s computer
profile with the intention to modify the profile and inserted several lines of
destructive computer code. 237 After this he intentionally inserted those destructive
codes to three other servers of IRS and then he tried to log out the system for the
purpose of removing the history files tried by him. But the investigative
personnel’s of the treasury inspector general for tax administration traced him. He
was pleaded guilty for intentionally causing damage to a protected computer or
sabotage to Internet Revenue Service (IRS). The U.S. District Judge punished him
with ten years imprisonment and a fine of $250,000.
In the year 2002 more than 400 websites with Arabian and English anti-
war appeals were attacked immediately after military operations in Iraq through
computer virus with e-message “Go USA!!!” for viewing the latest photos of
military events so that damage can be caused to several computers, computer
235
“The Most High Profile Cases, India”, The Times of India, Kolkata, Aug. 5, 2005, p. 11.
236
Supra note 9, p. 48.
237
United States Department of Justice, Press Release, 2001.
79
system and computer network.238 In the latter half of 2002, in the United Kingdom
the cyber hacking cases increased by 32% as compared to 2001 as shown by a
report released by Computer Security Institute and also the unauthorized
modification of data increased eventually because internet has became the prime
source of information in political and economic field around the world after
September 11, 2001 when terrorist attacks on World Trade Centre and Pentagon
in the United States of America.
In the phase of 2004 to 2005, data breaches happen on a daily basis with
having a negative impact on the attacked business. They can change the security
industry and influence legislation in some cases. At that time the cyber scammers
had proved their skills and for them it was the good time to move for causing
damage and gain money in real sense. By this time the cyber criminals become
professionally experts in doing cyber crimes and also for encouraging others for
their involvement. That’s why this time period is remembered as lure of money
and professionalism.
In 2004, Choice Point, a consumer data broker which has since been
purchased by LexisNexis, was widely criticized for how it handled its breach.
Although the company knew customer data was compromised by a 41-year-old
238
Mikhael Crutsaluk, “Fighting Cyber Crime”, Computer Crime Research Centre, 2003,
available at: http://www.crime-research.org/library/Gutsaluk.html (visited on March 10, 2017).
239
Supra note 9, pp. 49-50.
80
Nigerian citizen, it only informed 35,000 people about the breach- until scrutiny
from the media urged the company to reveal another 128,000 people had
information compromised. Because so many people were upset by the way the
company handled the incident, many believe it helped improve privacy practices
across many businesses, according to Radware. Choice point eventually settled the
data security breach charges, paid $1o million in civil penalties and $5 million for
consumer redress. But the settlement required choice point to implement new
procedures to ensure that it provides consumer reports only to legitimate
businesses for lawful purposes establish and maintain a comprehensive
information security program and to obtain audits by an independent third party
security professional every other year until 2026.240
Stealing physical credit cards and creating fake ones are part of the criminal
240
Samantha Murphy, “4 Turning Points in the History of Cyber Crime”, Oct. 15, 2012, p. 2,
available at: http://mashable.com/2012/10/15/corporate-security-attacks/#14cimujMDEq2 (visited
on March 10, 2017).
241
“A Good Decade for Cyber Crime”, McAfee Report, 2011, p. 5, available at: http:// cdn.
bizcommunity.com/f/1106/rp_good_decade_for_cybercrime.pdf (visited on March 10, 2017).
81
technique called “carding”. One of the significant successful investigations and
prosecutions of an international credit card fraud ring of the 2000 decade began
with the US Secret Service’s Operation Firewall in the late 2004. The investigators
discovered a network of over 4,000 members communicating through the Internet
and conspiring to use phishing, spamming, forged identity documents, creation of
fake plastic credit cards, and resale of gift cards bought with fake credit cards,
fencing of stolen goods via eBay and interstate or international funds transfers
using electronic money such as E- Gold and Web Money.242
In 2004, in India the landmark case which is considered to be the first case
of conviction under section 67 of Information Technology Act which makes this
section is of the historical importance is State of Tamil Nadu v. Suhas Katti244. In
this case, some defamatory, obscene and annoying messages were posted about
the victim on a yahoo messaging group which resulted in annoying phone calls to
her. She filed the FIR and the accused was found guilty under the investigation
and was convicted under section 469, 509 of Indian Penal Code and section 67 of
Information Technology Act.
In 2005, in India the first case which was registered under section 65 of
the Information Technology Act is Syed Asifuddin and Ors. v. State of Andhra
Pradesh and Anr.245 In this case the court held that the cell phones fulfilled the
definition of ‘computer’ under the Information Technology Act and the unique
Electronic Serial Numbers which are programmed into each handset like ESN,
SID (System Identification Code), MIN (Mobile Identification Number) are the
‘computer source code’ within the definition under the Information Technology Act
which is required to be kept and maintained by the law.
242
Supra note 18, p. 49.
243
Supra note 58.
244
(2004) Cr. Comp 4680, Egmore, available at: http://lawnn.com/tamil-nadu-vs-suhas-kutti/
(visited on April 5, 2017).
245
(2005) Cri LJ 4314.
82
In Avinash Bajaj v. State (NCT) of Delhi246 case, obscene material was put
up for sale by one person on the website Baazee.com and sold/transmission of
these clip to several people resided in different parts of country which took place
in a very short time period. The issue was raised whether it was a publication under
section 67 before the amendment or website had indirectly published the material.
The court held that the ultimate transmission of the obscene material wouldn’t have
been possible without the initial facilitation by the website and therefore, the
website had liable under the section.
246
(2005) 3 Comp LJ 364 Del, 116.
247
(2005), available at: https://www.scribd.com/doc/190389306/Case-studies-under-Indian-IT-
Act-200 (visited on April 10, 2017).
248
(2006) Cri LJ 3463 Raj 2411.
249
AIR 2006 Ker 279.
83
which was developed by the petitioner under a contract as a protected system. The
petitioner filed a writ petition challenging section 70 of the Information
Technology Act and the notification as being unconstitutional and inconsistent
with the copyright Act. It was held that a notification under section 70 of the
Information Technology Act is a declaration of copyright under section 17 (d) of
the Copyright Act, 1957.250 The court further held that only a computer resource
could be declared to be a protected system under the Information Technology Act
if that amounted to a government work under copyright Act.
During this phase, attackers were also looking for ways to manipulate
software features for their own purposes. For instance, a feature in Microsoft
Windows software called Auto run was designed to automatically launch
programs from external devices. By taking advantage of this feature, cyber crooks
could get Microsoft’s flagship operating system to automatically launch malicious
code. By exploiting both software vulnerabilities and features, cybercriminals
were discreetly gaining access to user’s systems while at the same time thumbing
their noses at software makers. Meanwhile Unique services such as Skype and
Twitter launched, offering computer users new ways to keep connected and share
information. Along with Facebook, Twitter would soon become an irresistible
platform for crooks to interact with users, and try to trick them out of money and
information.252 This phase was also known for the period when the iPhone came to
market with huge number of mobile applications and criminal opportunities.
In 2008, serial blasts in Ahmadabad, Delhi, Jaipur and Banglore are the live
examples of the cyber terrorism in India. In 2008 attack on Mumbai Taj Hotel
which is also known as 26/11 and the Varanasi blast in 2010 had the trails of
cyber terrorism. The main purpose of the cyber terrorist is to gather the restricted
information and to spread terror by cyber communications method for disruption
250
Anirudh Rastogi, Cyber Law- Law of Information Technology and Internet, 2014, pp. 118-119.
251
Supra note 57.
252
Supra note 58.
84
of national security, unity, integrity and peace etc.
This phase is known for social networking and engineering because the
social networking sites such as Facebook and Twitter started to take off in the
later part of the decade. Cyber criminals started to collect the personal information
of users with a growing amount of money at stake because users post everything
on the sites like from where they lived and worked to their current location. They
have also played the game by employing social engineering by finding out the
topics of Internet user’s interest and then post a message or images or videos by
mentioning or using that topic with a link to a website which was created with the
aims to steal credit card and other personal information for lure of money. By this
time the cyber criminals become more experts in doing cyber crimes through
connecting with social networking sites.
In 2010, Google for the 1st time publicly announced that it was hit with a
cyber attack called Operation Aurora; the search engine giant was hit along with
other major organizations such as Adobe Systems, Yahoo and Symantec and
launched advanced persistent threats (APTs) into the mainstream. APTs typically
refer to a group that persistently targets certain entities and cyber espionage and
253
“Supreme Court of India: To Hear Eight IT Act Related Cases on 11 th April 2014- SFLC”,
available at: http://www.medianama.com/2014/03/223-supreme-court-of-india-to-hear-eight-it-
act-related- cases-on-11th-april-2014-sflc/ (visited on June 29, 2016).
254
Samiksha Godara, “Prevention and Control of Cyber Crimes in India: Problems, Issues and
Strategies”, A Thesis submitted to Maharishi Dayanand University, April 1, 2013, p. 2, available
at: http://shodhganga.inflibnet.ac.in/bitstream/10603/7829/12/12_chapter%203.pdf (visited on
May 20, 2016).
85
intelligence to gather sensitive data.255
In Vinod Kaushik and Ors. v. Madhvika Joshi and Ors. 256 Case, the issue
was raised that whether the wife accessing husband’s and father-in-law’s email
account without their permission in order to acquire evidence in a Dowry
harassment case amounts to be liable under section 66C of Information
Technology Act for unauthorized access and dishonest use of password of any
person. The court held that the wife was liable under this section.
In India in the light of a series of arrests made under section 66A of the
Information Technology Act, 2000, Shreya Singhal v. Union of India257 is the case
where the writ petition was filed in public interest under Article 32 of the
Constitution of India for seeking to strike down Section 66A as unconstitutional
by arguing that section 66A is so wide, vague and incapable of being judged on
objective standards that it is susceptible to wanton abuse. It was further argued
that the terms ‘offensive’, ‘menacing’, ‘annoyance’, ‘danger’, ‘obstruction’ and
‘insult’ have not been defined in the Information Technology Act, General Clauses
Act or any other legislation. Citing the arrests made under section 66A, the
petitioner submits that the wide legislative language of the Section severely
disincentives citizens from exercising their Constitutionally protected right to free
speech for fear of frivolous prosecution (the ‘chilling effect’), which violates the
Freedom of Speech and Expression guaranteed under Article 19(1)(a) of the
Constitution. Furthermore, whether or not section 66A meets the test of
‘reasonableness’ laid down under Article 19(2), it is nonetheless violative of
Articles 14 (Right to Equality) and 21 of the Constitution.
255
Supra note 57.
256
(2010) Cr. Comp 2.
257
AIR 2015 SC 1523.
258
(2013) W.P. (Crl) No. 23.
259
(2013) W.P. (Crl) No. 21.
86
open to misinterpretation, and thus problematic. This imposes statutory limits on
the exercise of internet freedom which are well beyond the Constitutional
parameters of ‘reasonable restrictions’ enshrined in Article 19(2) and the
Intermediaries Guidelines Rules, Rule 3(2) lists the various types of information
that ought not to be carried on a computer system which violates Article 14 in
being arbitrary and overly broad.
260
“Twitter Hacked by Syrian Group”, New York Times, Aug. 28, 2013, available at: http://www.
thedailystar.net/news/new-york-times-twitter-hacked-by-syrian-group (visited on March 11, 2017)
261
National Crime Records Bureau, Ministry of Home Affairs, Cyber Crimes in India, 2013, p.
176, available at: http://ncrb.nic.in (visited on Sep. 22, 2015)
87
The Hon’ble Supreme Court declared section 66A as unconstitutional in its
entirety and against the freedom of speech and expression and struck it down in
Shreya Singhal and others v. Union of India262. This section had been misused by
police in various states to arrest the innocent person for posting critical comments
about social and political issues on networking sites. This section had led to the
arrest of many people’s for posting content deemed to be allegedly objectionable
on the internet.
There are a large number of cyber laws passed and amended in India as
well as in United States of America and United Kingdom. But instead of these
laws the cyber crimes are increasing day by day. For example, a total of 8, 045
cases were registered under Information Technology Act during the year 2015 as
compared to 7, 201 cases during the previous year 2014 and 4,356 cases during
2013, showing an increase of 11.7% in 2015 over 2014 and an increase of 65.3% in
2014 over 2013.263 As compare to India, in United States of America for the year
2015, Cost of Data Breach Study by IBM and the Pone mom Institute revealed that
the average total cost of a data breach increased from $ 3.52 million in 2014 t0 $
3.79 million. Another study said that cyber crime will become a $ 2.1 trillion
problem by 2019.264 The National Crime Agency (NCA) released a report on July
7, 2016 by highlighting the need for stronger law enforcement and business
partnership to fight cyber crime. According to the NCA cyber crime emerged as
the largest proportion of total crime in the United Kingdom with “cyber enabled
fraud” making up 36 % of all crime reported and computer misuse accounting for
17%.265 The Office of National Statistics (ONS) estimated that there were 2.46
million cyber incidents and 2.11 million victims of cyber crime in the United
Kingdom in 2015 and only 16, 349 cyber dependent and approximately 700, 000
cyber enabled incidents reported to Action Fraud over the same period.266
262
AIR 2015 SC 1523.
263
Supra note 78, pp. 163-164.
264
Limor Kissem, “2016 Cyber Crime Reloaded: Our Prediction for the Year Ahead”, (Last
Modified on Jan. 15, 2016), available at: https://securityintelligence.com/2016-cybercrime-
reloaded-our- predictions-for-the-year-ahead/ (visited on Dec. 2, 2016).
265
National Crime Agency (UK), Cyber Crime Assessment, 2016, available at:
www.nationalcrimeagency.gov.uk/publications/709-cyber-crime-assessment-2016/file (visited on
Feb. 14, 2017).
266
The Office of National Statistics(UK), Cyber Crime Assessment, 2015, pp. 5-6, available at:
www.nationalcrimeagency.gov.uk/publications/709-cyber-crime-assessment-2016/file (visited on
Feb. 14, 2017)
88
States to freeze assets of convicted cybercriminals and block their economic
activities within the United States.267 In 2016, it is estimated by the study of
Juniper Research that the costs of cyber crime could be as high as 2.1 trillion by
2019.268
Thus, the cyber crime is an evil having its origin in the growing
dependence on computer in modern life. There is a wide range of offences that
can be committed through communication technology.269 It is not going to stop
anytime soon and it seems like it will just continue to grow until new methods of
fighting it are introduced. Because it is found that at some point of time history
become current events.
Today, it is found that due the technology of the Internet era there are very
few people whose lives are not affected whether it is beneficially or harmfully.
There is also the positive side of this technology as well as negative. By the
positive side it is found that there is tremendous increase in the ability to share
and exchange information instantaneously which led to provide unprecedented
benefits in the areas of education, commerce, entertainment and social interaction
and on the negative side, it is felt that there is the increase in opportunities for the
commission of crimes because this latest technology has encouraged the potential
criminals to commit crimes through computer, computer system or computer
network with almost no monetary cost and with lesser risk of being caught.
267
“Cybercrime”, available at: https://en.wikipedia.org/wiki/Cybercrime (visited on March 11,
2017).
268
Ibid.
269
“History of Cyber Crime”, available at: http://www.bezaspeaks.com/cybercrime/history.htm
(visited on March 9, 2017).
89
CHAPTER - IV
CYBER CRIMES IN INDIA: LEGISLATIVE AND
JUDICIAL RESPONSE
4.1 Introduction
The internet has a global face. India, too, being a formidable part of the
globe, felt a seism shift in the technological set up when the Information
Technology waves surged ahead and necessitated the formation of the Information
Technology ministry in the country in the year 1999.270 Obviously the information
society offers vast scope and opportunities to human beings to identify
information, to evaluate information, and to exchange information for the benefits
of the citizens the world over. Information technology creates a new working
environment, work culture, commercial connections, and trading networks. It
enables information and knowledge-based work to be carried out from any
location.. It is virtually transforming and revolutionizing the world.271
270
Talat Fatima, Cyber Crimes, 2011, p. 78.
271
Abhijit Kumar Pandey, “Cyber Crimes in Cyber Age and its Response by Indian Judiciary”,
available at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1097695, visited on Jan. 14,
2015 (last modified on Feb. 26, 2008).
272
Christine Conradt, “Online Auction Fraud and Criminological Theories: the Adrian Ghighina
Case”,
International Journal of Cyber Criminology, vol. 6, No. 1, Jan.- June, 2012, p. 912
available at: http://www.cybercrimejournal.com/christine2012janijcc.pdf (visited on Feb. 22.
2017).
273
Atul Bamara, Gajendra Singh, et.al., “Cyber Attacks and Defense Strategies in india: An
Empirical Assessment of Banking Sector”, International Journal of Cyber Criminology, vol. 7 No.
2, Jan.- June, 2013, pp. 49-50 available at :
https://www.researchgate.net/publication/236682638_
Cyber_Attacks_and_Defense_Strategies_in_India_An_Empirical_Assessment_of_Banking_Secto
r (visited on March 6, 2017).
274
R.C. Mishra, Cyber Crime: Impact in The New Millennium, 2002, p. 53.
90
availability of the internet are critical operational considerations. Activities that
threaten these
attributes like spamming, spoofing etc. have grave impacts on its user
community.275 Lawyers and legal consultants' work is also included in the
improvements. Given the importance of this critical sector and its powerful role in
the judicial system, there has been a growing interest in regulating the legal
profession in what appears to be a genuine drive towards upgrading the
profession. 276
As cyber crime has spread across the globe at an exponential rate, many in
the criminal justice industry have lacked appropriate and up-to-date understanding
about the pedestrian realities of current cyber crime. The popular media has
portrayed cyber crime as a lone hacker breaking through seemingly impenetrable
security barriers to gain access to lucrative secret data. These kind of crimes are
uncommon, but cybercrime is all too widespread.277 The increasing relevance of
information technology may be shown in the fact that, for the first time in India, a
Delhi-based businessman has created a digital will of the confidential information
stored in his e-mail account. The concept of digital will is a foreign one that is
gaining traction in India as well. 278
The success of the nation's legislative, judicial, and executive powers is the
source of its strength. The judiciary's role is to promote justice and equity through
the effective implementation of laws and regulations, ensuring that everyone gets
their fair share.279 The Legislature and the judiciary is the important organs of any
country for its success in making the good international relations and attracting
investment and sufficient laws. A judicial system whi8ch is fair and modern is
needed for getting the confidence of the international community and for the
collective action on the part of several entities inorder to reach the desired end.
The society needs some degree of order and continuity for the purpose of
functioning in a good and orderly way because from the long time safety and
security is a question of protection against dangers from the physical world
275
Supra note 2.
276
Hassan Arab, “The Development of The Judiciary- Challenges and outlook”, available at:
http://www.tamimi.com/en/magazine/law-update/section-7/October-november-1/the-development-
of- the-judiciary-challenges-and-outlook.html (visited on Jan. 1, 2015).
277
Jose R. Agustina, “Exploring Internet Crimes and Criminal Behaviour”, Book Review of Cyber
Criminology, vol. 6 No. 2, July- Dec., 2012, p. 1044, available at: http://www.cybercrime
journal.com/Augustinabookreview2012julyijcc.pdf (visited on March 7, 2013)
278
“Ab E-mail Accounts Ki Bhi Hui Wasiyat”, Navbharat Times, April 5, 2010, p. 5.
91
because from the last century, the cyberspace arose alongside the old world.
With this traditional offline world the better legislative response is required. In
this present chapter an attempt is made to discuss the national laws which are
passed for combating the cyber offences in India. These are discussed as follows:
Indian Parliament has passed the first legislation in the Fifty-first year of the
Republic of India called as the Information Technology Act 279, 2000 which is
based on the resolution280 adopted by the General Assembly of United Nations
regarding the Model Law on Electronic Commerce on January 30, 1997 which is
earlier adopted by the United Nations Commission on International Trade Law
(UNCITRAL). This resolution recommends that all States must give favorable
consideration to this Model Law when the States are going to enact or revise their
laws with the view of uniformity of law as alternative to paper based methods of
communication and storage of information. India was also the signatory to this
Model Law and had to revise its national laws as per the said Model Law. As a
result, India created the Information Technology Act of 2000 to provide legal
recognition to transactions using electronic data interchange and other forms of
electronic communication, as well as to make the filing of paperwork with
government institutions easier. The Indian Penal Code, 1860, the Indian Evidence
Act, 1872, the Bankers Books Evidence Act, 1891, and the Reserve Bank of India
Act, 1934 are also amended by the Act. Some instruments, such as a negotiable
instrument, a power of attorney, a trust, a will, including any other testamentary
disposition, any contract for the sale or conveyance of immovable property, and
any contract for the sale or conveyance of personal property, are exempt from the
provisions of this Act.
279
Supra note 7.
280
It received the assent of the President on June 9, 2000 and notified in the Official Gazette on
October 17, 2000.
92
interest in such property and any such class of documents or transactions
as may be notified by the Central Government in the Official Gazette.281
Though since 2000 In India, the Information Technology Act was enacted
to combat cybercrime, but the problem is that it is still more on paper than in
practice since lawyers, police officers, prosecutors, and judges are unable to
comprehend its highly technical wording.282 Primarily, the IT Act, 2000 is meant
to be a legislation to promote e-commerce which is not very effective in dealing
with several other emerging cyber crimes like cyber harassment, defamation,
stalking etc. There was a need to amend the Information Technology Act, 2000 for
the purpose of making it more relevant in today’s context. For this purpose the
Information Technology (Amendment) Bill, 2006 was proposed which was
further amended by Information Technology (Amendment) Bill, 2008 and passed
in Lok Sabha on Dec. 22 and in Rajya Sabha on Dec. 23, 2008. Then the
Information Technology Act, 2000 is amended by Information Technology
(Amendment) Act283,2008.
281
Resolution No. A/RES/51/162, January 30, 1997.
282
Section 1(4) of Information Technology Act, 2000 (Act No. 21 of 2000).
283
Samiksha Godara, “Prevention and Control of Cyber Crimes in India: Problems, Issues and
Strategies”, A Thesis submitted to Maharishi Dayanand University, 2013, p. 2, available at:
http://shodhganga.inflibnet.ac.in/bitstream/10603/7829/12/12_chapter%203.pdf (visited on May
20, 2016).
93
specified in the First Schedule read with section 91.284 The extra territorial
jurisdiction of the Indian Penal Code, 1860 was also expanded to include all the
offences which targets computer resources in India and various sections which are
relating to a false document were also amended to include a false electronic
record.285 Through these amendments section 29 A which defines the words
“electronic record” has been inserted after section 29 which defines the word
“document” with the purpose to maintain the statutory balance.
The words "such public worker, charged with the preparation or translation
of any document, frames or translate that document" have been replaced in
section 167 by "such public servant, charged with the preparation or translation of
any document or electronic record.". The Act amends this section which deals with
the framing an incorrect document by a public servant with intent to cause injury,
by substituting the words “electronic record”. By this amendment now a public
servant may be charged for framing an incorrect electronic record with intent to
cause injury.
284
It was notified in the Official Gazette on Feb. 5, 2009.
285
Section 91 and First Schedule has been repealed by the Information Technology (Amendment)
Act, 2008
286
Sections 4, 192, 463, 464, 466, 468, 469, 471, 474, 476 and 477A of Indian Penal Code,
1860 (Act
No. 45 of 1860).
94
word “admission” is amended to include admission in electronic form. After
section 22, section 22A is inserted which provides the circumstances when an oral
admission as to contents of electronic records are relevant.
Section 34 highlights the areas when entries in the books of account are
relevant. This section is amended to include accounts books in electronic form.
Section 35 is amended to maintain the register of births, deaths or marriages, revenue
records etc. in electronic form. Section 39 is amended to take into consideration
the evidentiary value of a statement, which forms the part of an electronic record.
Section 131 is also amended to include production of electronic records which
another person, having possession, could refuse to produce. Some other important
sections are inserted by this Act which is related to opinion as to electronic
signature when relevant287, admissibility of electronic records288, proof290 and
verification of digital signatures291 and lastly, presumptions as to electronic
evidence292.
the computer programmes and to protect the copyright violation. The court
of Judicial Magistrate of First Class has jurisdiction over this offence, which is
bailable, cognizable, and triable. The Hon'ble court ruled in a case that cell
phones met the definition of a "computer" under the Information Technology Act,
and that the unique Electronic Serial Numbers (ESNs), SIDs (System
Identification Codes), and MINs (Mobile Identification Numbers) programmed
into each handset are "computer source code" under the Information Technology
96
Act.291 Fabrication of an electronic record or forgery by way of interpolations in a
CD produced as evidence in court is punishable under this section, it was
decided..292
291
Section 73 A of I E Act, 1872.
292
Sections 81 A, 85 A, 85 B, 85 C, 88 A, 90 A of I E Act,.
293
Section 93 and Third Schedule has been repealed by the Information Technology
(Amendment) Act,
294
Section 94 and Fourth Schedule has been repealed by the Information Technology
(Amendment) Act,
97
computer network; damages or causes the destruction of any computer, computer
system, or computer network, data, computer data base, or other programmes
residing in such computer, computer system, or computer network; disrupts or
causes the disruption of any computer, computer system, or computer network in
violation of the requirements of this Act, its rules, and regulations; Tampers with
or manipulates any computer, computer system, or computer network to charge
the services of one person to the account of another; destroys, deletes, or alters
any information residing in a computer resource or diminishes its value or utility
or affects it injuriously by any means; steals, conceals, destroys or alters or causes
any person to steal, conceal, destroy or alter any information residing in a
computer resource; steals, conceals, destroys or alters or causes any person for a
computer resource with an intention to cause damage.
In a case, where the accused gained the unauthorized access to the Joint
Academic Network and deleted, added files and changed the passwords to deny
access to the authorized users. It was revealed by the investigations that Kumar
was logging on to the BSNL broadband Internet connection as if he was the
authorized genuine user and made alteration in the computer database pertaining to
broadband Internet user accounts of subscribers. The Additional Chief
Metropolitan Magistrate, Egmore, Chennai sentenced him to undergo a rigorous
imprisonment for one year with a fine under section 420 of Indian Penal Code for
cheating and section 66 of Information Technology Act for computer related
offence through communication service, etc.295
295
Syed Asifuddin and Ors. v. State of Andhra Pradesh and Anr., (2005) Cri LJ 4314 AP.
98
alter any information; steals, conceals, destroys, or alters or causes anyone else to
steal, conceal;
c) any electronic mail or electronic mail message sent with the intent to
annoy, inconvenience, or deceive or mislead the addressee or receiver as to
the origin of the message296
The first clause of this section deals with the sending of information which
is ‘grossly offensive’ or having a ‘menacing character’ such as online stalking, online
defamation and text bullying, etc. But these two terms are not defined in the Act
itself. The clause (b) of this section deals with the sending of false messages with
repetition for causing inconvenience like online insult, online intimidation, net
extortion, hate mails etc. The clause (c) of this section deals with spam and
unsolicited mails such as e-mail spoofing and cyber phishing etc. Under this
section the message may be in any form so long as it involves a computer resource
or a communication device like e-mails, SMS’s blogs, tweets, images, and voice
over IP, Skype etc.
However, the Supreme Court ruled that section 66A was unconstitutional
in its entirety and violated the right to freedom of speech and expression, and it
was knocked down.
296
Bhim Sen Garg v. State of Rajasthan and Others, (2006) Cri LJ 3463 Raj 2411.
297
R.K . Chaubey, An Introduction to Cyber Crime and Cyber Law, 2009, p. 45.
99
devices is punishable under Section 66 B of the Information Technology Act of
2000, which was inserted by Amendment Act of 2008. According to this Act,
anyone who dishonestly receives or retains a stolen computer resource or
communication device, knowing or having reason to believe it is a stolen
computer resource or communication device, is punishable by imprisonment for
up to three years, a fine of up to one lakh rupees, or both.
Identity Theft
Identity Theft is punishable under Section 66 C of the Information
Technology Act of 2000, which was added by the Amendment Act of 2008.
According to this clause, anyone who uses another person's electronic signature,
password, or other unique identity features fraudulently or dishonestly faces a
three-year prison sentence and a fine of up to one lakh rupees.
This section deals with identity theft i.e. the dishonest or fraudulent use of
a unique identification feature of a person, which includes identifiers like an
electronic signature, a login password, a PIN, a photograph or a biometric
identifier. The terms ‘dishonest’ and ‘fraudulent’ have been explained previously
to mean an intention to cause economic loss or gain to a person, and the intention
to cause loss through deception respectively. This section does not differentiate
between a natural person and legal person like a company.298 This offence is
bailable, cognizable and triable by the court of Judicial Magistrate of First Class.
For example: if A has made a duplicate copy of ATM card of B and withdraws
rupees from his account, then A is liable under section 66C for theft of identity.
Identity theft or Identity fraud may be in the form of Financial Identity theft,
Criminal Identity theft, Commercial Identity theft and Identity Cloning. Financial
Identity theft consists of using stolen identity for financial fraud like extracted
298
H. Chander, Cyber Laws and IT Protection, 2012, p.76.
100
online banking details through phishing and used it to make purchases. Criminal
Identity theft consists of using of identity of other person for doing criminal
activities like using another person’s email for sending spam. Commercial Identity
theft includes the theft of identity of a company, business or other commercial
enterprises for taking benefit or committing crime. Identity Cloning includes the
cloning of identity of a person for creating further accounts or to take over all his
accounts.
In one case, the question was raised as to whether a wife accessing her
husband's and father-in-email law's accounts without their permission in order to
obtain evidence in a Dowry harassment case is liable under section 66C of the
Information Technology Act for unauthorised access and dishonest use of any
person's password. The wife was found to be accountable under this provision by
the court.303
Violation of privacy
Section 66 E is inserted by Information Technology (Amendment) Act,
2008 for providing punishment for violation of privacy. According to this section,
anyone who intentionally or knowingly captures, publishes, or transmits an image
of a person's private area without his or her consent, thereby infringing on that
person's privacy, shall be punished with either imprisonment for a term not
101
exceeding three years or a fine not exceeding two lakh rupees, or both. The court
of Judicial Magistrate of First Class has jurisdiction over this offence, which is
bailable, cognizable, and triable.
This section covers the three steps of a breach of a person's bodily privacy:
capture, publishing, and transmission. This section makes any of these stages
illegal if they are carried out without the victim's agreement. Capturing include to
capture an image by any means such as videotaping, filming or recording by
using any kind of technology like video recorders, cameras, CCTVs, webcam in a
PC or any other forms of electronic surveillance like spy cameras or any kind of
hidden cameras, smart phones etc. Publication includes the creation of copies both
in print i.e. magazines, books, newspapers and in an electronic form i.e. on the
websites or CDs. Transmission means to deliberate or intentional electronic
transfer of the image via emails, internet, messaging, Bluetooth etc. with the
purpose that it can be viewed instantly by other persons. The offence is complete
immediately on the sending of the mail. It is irrelevant that whether the person to
whom the mail is sent read the mail or not.
Now-a-days Sting operations are very common in many countries like USA
but these operations are not permitted in many countries like Sweden.299 It is
said unlike the U.S. and certain other countries where the sting operation is
recognized as a legal method of law enforcement, though in a limited manner, the
same is not the position in India.300 In court on its own motion v. State301 case, the
Division bench held that where a sting operation made by a private person or an
agency, which may result in violating bodily privacy of another person will fall
under section 66 E of the Act. Such person shall be liable under the Act.
A 24 year old cyber crime accused and his two aides who are wanted in
cyber crime cases, walked into the cyber crime police station, Mumbai, posing as
vigilance officers and tried to conduct a sting operation on the investigation officer
on Feb. 17, 2017. They wanted to blackmail the senior police inspector of the
cyber crime cell to not take any action against the accused. However, their spy pen
camera did them in. Subsequently, the police found that the three men had fake
Central Vigilance Commission (CVC) identity cards and fake letterheads with the
299
N. G. Arun Kumar v. Whiteley, (2005), available at:
https://www.scribd.com/doc/190389306/Case- studies-under-Indian-IT-Act-200 (visited on April
10, 2017).
300
Inserted vide Information Technology (Amendment) Act, 2008.
301
AIR 2015 SC 1523: (2005) 5 SCC.
102
names of CBI officers. The Spy camera has been seized.302 Then the police
charged him under section 34 (common intention), 170 (personating a public
servant), 174, 419(cheating by personation), 420 and 506 of IPC.
Cyber Terrorism
“Get ready …. Terrorists are preparing ….cyberspace based attacks….”303
Terrorism is a kind of threat or terror against common people or government which
is not predictable.304 Cyber terrorism is a new form of terrorism, which exploits
the system we have put in place. There is a continual drive to computerize every
process, in order to add remote access, accuracy features and ease of use.305
Generically, cyber terrorism consists of using computer technology to engage in
terrorist activity.306 This type of cyber crime can involve using the internet to
communicate with other terrorists, to transfer the money needed to fund a terrorist
act or any other related activity.
302
Anirudh Rastogi, Cyber Law- Law of Information Technology and Internet, 2014, p. 109.
303
Vinod Kaushik and Ors. v. Madhvika Joshi and Ors., (2010) Cr. Comp 2.
304
“Sting Operation”, Wikipedia, available at: https://en.wikipedia.org/wiki/Sting_operation
(visited on April 6, 2017).
305
The Hindu, New Delhi, June 24, 2016, available at:
http://www.thehindu.com/news/national/sting- operation-not-a-legal-method-of-law-enforcement-
supreme-court/article5944283.ece (visited on April 6, 2017).
306
(2013) WP (C) 162, Del.
307
The Times of India, Mumbai, Feb. 20, 2017, available at: http://timesofindia.indiatimes.
com/city/mumbai/cyber-crime-accused-2-aides-try-sting-op-on-cop/articleshow/57240684.cms
(visited on April 6, 2017).
308
John Arquila, “Waging War Through the Internet”, p. E1 (Last Modified on Jan. 15, 2006),
available at: http://www.sfgate.com/opinion/article/Waging-war-through-the-Internet-
America-is-far- 2506659.php (visited on March 6, 2017).
309
P. Kraber, “Urban Terrorism: Baseline Data and a Conceptual Framework”, Social Science
Quarterly, 1971, p. 52.
103
Cyber war and cyber terrorism do not find any mention in the Indian
Cyber law before. But now the Information Technology (Amendment) Act, 2008
made the provision for cyber terrorism under section 66F which provides
punishment for cyber terrorism. This offence is non-bailable, cognizable and
triable by the court of Sessions. The legislative provisions relating to cyber
terrorism is given as follows:
(1) Whoever;
(i) preventing or causing the denial of access to any person who has been
given permission to utilise a computer resource; or
(2) Anyone who acts or conspires to commit cyber terrorism faces a sentence
of imprisonment that might last a lifetime.
104
Clause 1(A) of this section deals with cyber terrorism that directly affects
or threatens to influence the public with the intent of jeopardising the nation's
unity, integrity, or security, and instilling fear in the people's minds. This section's
clause 1(B) deals with cyber terrorism that has a direct impact on the state as a
result of unlawful access to restricted information, data, or a computer database.
In a case, the issue was raised before the court that whether an offence of
defamation could reasonably covered under section 499 of I.P.C. or it requires
section 66 F of IT Act. The court has to make the distinction between two and it is
observed that section 499 of I.P.C. covered the offence of defamation with respect
to person and the term ‘person’ does not include a State whereas section 66F
covered the defamation of State.311
In India, the serial blasts in Ahmadabad, Delhi, Jaipur and Banglore are
the live examples of the cyber terrorism in 2008. The Mumbai Taj Hotel attack in
2008, popularly known as 26/11, and the Varanasi blast in 2010 both had cyber
terrorism tracks. 312 The fundamental goal of a cyber terrorist is to obtain sensitive
information and disseminate fear via cyber communications in order to jeopardise
national security, unity, integrity, and peace, among other things.
106
description for a term up to five years and a fine up to ten thousand dollars.
Section 67A and 67B are the only sections which are non-bailable as per
section 77B of the Act, whereas others are bailable. We also have section 69A of
Information Technology Act, 2000 where Central Government or its officer
appointed can issue directions to other Government Agencies and Intermediaries
to block such information for public access if it is necessary or expedient so to do
in the interest of sovereignty and integrity of India, defense of India, security or
the State, friendly relations with foreign state or for the sake of maintaining public
order or preventing incitement to the commission, or any cognizable offence
relating to above.
It is clear from the wording of this section that the Controller could only
give the directions to a Certifying Authority or any employee of such Authority,
but by the virtue of section 18 (1) his power may also be extendable to the
subscribers of a digital signature certificates because this section provides that
Controller has also the power to resolve any conflict of interests between
Certifying Authority and the Subscribers.
Syed Mohd. Uzair, “Cyber Crime and Cyber Terrorism in India, A thesis submitted to Aligardh
313
This section gives the right of privacy over any information which is
acquired in official capacity. The person shall be liable under this section when he
made the disclosure of information without consent or permission from the
authorized person. This offence is bailable and non-cognizable.
This section states that anyone who obtains access to any electronic record,
book, register, correspondence, information, document, or other material without
the consent of the person concerned, or discloses such electronic record, book,
register, correspondence, information, document, or other material to any other
person is subject to a penalty of up to five years in prison.
The Supreme Court defined the term ‘publication’ in the case of Bennett
314
Dorothy Denning, Activism, Hactivism and Cyber terrorism: The Internet as a tool for
Influencing Foreign Policy, 2001, p. 241.
110
Coleman & Co. v. Union of India315. The term ‘publication’ means dissemination
and circulation. The term includes dissemination, storage and transmission of
information or data in electronic form if we talk about in the context of digital
medium.
Offences by Companies
Section 85 of the Information Technology Act incorporates the concept of
corporate criminal liability, or the criminal liability imposed on a company for its
contravention of the Act or any rule, direction or order made there under. The
explanation to this section provides that a company is anybody corporate,
including a firm or association of individuals. The company may be corporate or
incorporated.
However, if such a person can show that the violations occurred without
his knowledge or that he took reasonable steps to prevent them, he will not be
held accountable under this section. Furthermore, if it is proven that such
contraventions under section 85 occurred with the consent or convenience of, or
are attributable to the negligence of, any director, manager, secretary, or other
officer of the company, such director, manager, secretary, or other officer must be
deemed guilty of the contraventions and must be prosecuted and punished.316
315
“White Collar Crimes with special Reference to Cyber Crimes”, Legal Services India,
available at: http://www.legalservicesindia.com/article/article/white-collar_crimes_cyber_crimes-
255-1.html (visited on May 2,, 2012).
316
Krishnan v. Krishnaveni, AIR 1997 SC 9876: 1997 AIR SCW 950: 1997 Cr LJ 1519.
317
Jyoti Rattan, Cyber Laws & Information Technology, 2014, p. 261.
318
B.N. Firos v. State of Kerala, AIR 2006 Ker 279.
111
was a prerequisite for the prosecution of those in charge of or responsible for the
company, as well as the director or managing director.
Jurisdiction over other cyber crimes, for instance under the Indian Penal
Code, 1860 has to be determined by the provisions of the Criminal Procedure
Code, 1973. The fundamental principle on jurisdiction is the same under the
319
“Electronic Signature Certificate” has been substituted for the “Digital Signature Certificate”
by IT (Amendment) Act, 2008.
320
AIR 1972 2 SCC 788.
321
Supra note 48, p. 289.
322
Sheoratan Agarwal v. State of Madhya Pradesh, (1985) SCR (1) 719.
323
AIR 2012 SC 2795.
112
Information Technology Act324 and the Criminal Procedure Code, 1973, though
stated differently. The basic legal principle of jurisdiction under the code of
Criminal Procedure, 1973 is that every offence shall ordinarily be inquired into the
tried by a court within whose local jurisdiction it was committed.325 Any court
under section 182 within whose jurisdiction such letters or messages were sent or
where they were received may enquire into or try any offence that includes
cheating if the deception is carried out through letters or telecommunication
messages.
Sections 177 to 188 of the Criminal Procedure Code, 1973 deals with
criminal jurisdiction. The jurisdiction of this code is based on the place of inquiry
where the offence or elements of the offence are committed, as well as the place
of trial. Section 177 this code provides that every offence shall ordinarily be
inquired into and tried by a court within whose jurisdiction it was committed. It is
necessary to mention here that this section does not purport to restrict territorial
jurisdiction. It operates as a general provision that sets out where the offence may
be tried ordinarily, without laying downexclusions to jurisdiction.
324
(2009) Crl. Appl. 1483.
325
Supra note 48, p. 345.
113
followed. 179. Where an act is an offence by the reason of its relation to any other act
or which would be an offence if the doer was capable of committing an offence
may be enquired into or tried by a court within whose jurisdiction either of the
acts done under section 180. Certain specified offences have been required by law
to be enquired into or tried in certain places under section 181. An offence of
criminal breach of trust or misappropriation may be tried by or enquired into by
the court within whose local jurisdiction the offence was committed or any part of
the property relating to offence was received or retained or required to be accounted
or returned bythe offender.326
Section 187 (1) provides that when a magistrate of the first class sees
reason to believe that any person within his local jurisdiction has committed
outside such jurisdiction whether within or outside India an offence which cannot,
under the provisions of sections 177 to 185 (both inclusive), or any other law for
the time being in force, be inquired into or tried within such jurisdiction but is
under some law for the time being in force triable in India, such magistrate may
inquire into the offence, as if it had been committed within such local jurisdiction
and compel such person in the manner hereinbefore provided to appear before
him, and send such person to the Magistrate having jurisdiction to inquire into or
try such offence, or, if such offence is not punishable with death or imprisonment
for life and such person is ready and willing to give bail to the satisfaction of the
Magistrate acting under this section, take a bond with or without sureties for his
appearance before Magistrate having such jurisdiction. Clause (2) of the said
section says that where there are more Magistrates than one having jurisdiction and
326
Amita Verma, Cyber Crimes and Law, 2009, p. 322.
327
(1996) 74 F. 3d 701.
114
the Magistrate acting under this section cannot satisfy himself as to the Magistrate
to or before whom such person should be sent or bound to appear, the case shall be
reported for orders of the High court.
Section 1(2) of the Information Technology Act, 2000 provides for the
jurisdiction of Indian courts in cyber crimes only. It does not talk about civil
jurisdiction.329 The said Act beings by saying, in clause (2) of section 1 that “it
shall extend to the whole of India and, save as otherwise provided in the Act, it
applies also to any offence or contravention hereunder committed outside India
by any person”. As a result, it is explicitly established that the court's cyber
jurisdiction would apply to cyber crimes committed both within and outside of the
country.
Section 75(2) of the said Act states that it shall apply to an offence or
328
Supra note 48, p. 349.
329
Sec. 1(2) and sec. 75 of IT Act, 2000.
115
contravention committed outside India by any person irrespective of his
nationality, if the act or conduct constituting the offence or contravention involves
a computer, computer system or computer network located in India. This section
provides for the extra- territorial jurisdiction of the Indian courts over the
offences or contraventions committed outside India. Under this section, the
jurisdiction of the Act extends to every person having any nationality, who
commits an offence on foreign territory by using a computer situated within India.
This section is restricted only to those offences or contraventions which are
provided therein but not to other offences punishable under other laws.
Section 4 of the Indian Penal Code, 1860 provides that the law is assuming
jurisdiction over violators of The Information Technology Act, 2000 outside the
territorial boundaries of India. This provision is explained perhaps by the unique
nature of cyberspace, which knows no boundaries. The Information Technology
Act, 2000 specifically provides that unless otherwise provided in the Act, it also
applies to any offence or contravention there under committed outside India by
any person irrespective of his nationality.333 It is however clarified that the Act
330
Sec. 177 of Cr.P.C., 1973.
331
Section 181 (4) of Cr. P.C.
332
Section 186 of Cr. P.C.
333
Supra note 48, p. 346.
116
shall apply to an offence or contravention committed outside India by any person
if the act or conduct constituting the offence or contravention, involves a
computer, computer system or computer network, located in India.334
In the event where it is uncertain in which of several areas the offence was
committed, again it may be inquired into or tried by a court having jurisdiction over
either of such areas of uncertainty.335Certain specified offences have been required
by law to be inquired into or tried in certain places.336 When two or more courts
take cognizance of the same offence and a question arises as to which of the
courts has jurisdiction to inquire into or trial that offence, the question shall be
decided by the High Court under whose jurisdiction both such courts operate.337
The issue of jurisdiction is not settled yet because India is still not a
signatory to the Cyber Crime Convention and the bilateral Extradition Treaties
which it has signed with around 35 countries so far do not mention ‘cyber crime’ as
extraditable offences.
334
D. Latha, “Jurisdiction Issues in Cyber Crimes”, The Weekly Law Journal, vol. 4, 2008, p. 88.
335
Sec. 1(2) and sec 75 of Information Technology Act, 2000.
336
Sec. 177 of Cr.P.C., 1973.
337
Sec. 178 of Cr.P.C., 1973.
338
Sec. 1(2) of IT Act, 2000.
339
Sec. 75 of IT Act, 2000.
340
Sec. 178(a) of Cr.P.C., 1973.
341
Sec. 180 of Cr.P.C., 1973.
117
Investigation Cells have been established in India to deal specifically with the
investigation of cybercrime.. The following are the provisions dealing with powers
of police for cybercrime’s investigation under the Information Technology Act,
2000.
Currently, Maharashtra is the first state in the country which will have a
cyber police station in each district simultaneously.342 Section 28 of the Act gives
the power to the Controller or any other officer authorized by him in this behalf for
the investigation of any contravention of the provision, rules or regulations made
under the Act. They shall also have the like powers which are conferred on the
Income Tax authorities under Chapter XIII of Income Tax Act, 1961 and under
Information Technology Act. Chapter XIII of Income Tax Act, 1961 gives the
power to Controller or any other officer authorized by him in this behalf for the
discovery and inspection of the documents and books of accounts during search
and also empowers to examine a person on oath for the purpose of collecting
evidence in any proceeding. Section 29 of the Act as amended vide Amendment
Act, 2008 empowers the Controller or any other person authorized by him to access
any computer system, an apparatus or data and to make search for any information
which is available in such computer system if he suspects that there is something
which is contrary to the provisions under the Act. Here, in this Act, the term
‘apparatus’ has not been defined clearly but it may include the output devices such
as scanners, external hard disk, pen drives or other storage devices.
342
Sec. 186 (a) of Cr.P.C., 1973.
118
enter any public place i.e. public conveyance, any hotel, any shop or any other
place intended for use by or accessible to the public and search and arrest any
person without warrant if who is suspected of having committed or being about to
commit or of committing any offence under this Act. This power has been given
to the police officers who are not below the rank of an Inspector or any other
officer authorized by Central Government in this behalf. This section limits the
powers of police officers and other officers to enter search and arrest any accused
from the public place only including any public conveyance, any hotel, any shop
or any other place intended for use by or accessible to the public.
Under 66A of IT Act, 2000, the police have also given excessive powers.
This section had been misused by police in various States to arrest the innocent
person for posting critical comments about social and political issues on
networking sites. This section had led to the arrest of many people’s for posting
content deemed to be allegedly objectionable on the internet. Due to this reason,
recently, the Hon’ble Supreme Court has declared section 66A as unconstitutional
in its entirety and against the freedom of speech and expression and struck it down
in Shreya Singhal and others v. Union of India343.
“The investigation under this Code, taken in several aspects and stages,
ending ultimately with the formation of an opinion by the police as to whether, on
the material covered and collected, a case is made out to place the accused before
the magistrate for trial, after submission of either a charge sheet or a final rep,”
according to the Supreme Court in Roopchand Lal v. State of Bihar 344 case. The
formation of the opinion that no case against the accused is made out, is a final
step in the investigation, and that final step is to be take only by the police and by
343
AIR 1950 SC 155: 1950 SCJ 406: 1950 SCR 573.
344
Vakul Sharma, Information Technology- Law and Practice, 2016, pp. 371-372.
119
no other authority.”345
On September 9, 2010, the imposter made a fake profile in the name of the
Hon’ble President Pratibha Devi Patil. A complaint was made from Additional
Controller, President Household, President Secretariat regarding the four fake
profiles created in the name of Hon’ble President on social networking website,
Facebook for misleading the general public. The FIR under section 469 of Indian
Penal code and section 66A of Information Technology Act, 2000 was registered
on the basis of said complaint at police station.346
Judicial Response
Cybercrime being of intangible nature, it does not require any physical
violence or the presence of accused at the scene of crime. Under these
circumstances, the traditional adversarial system of litigation would hardly meet
the ends of justice in cases relating to cybercrime. Commenting on the problem
faced by the judiciary and the enforcement agencies in dealing with computer
related crimes, the Supreme Court of India in State of Punjab and Others v. M/S
Amritsar Beverages Ltd. and Others347 observed that:
“Internet and other information technologies have brought with them the
issues which were not foreseen by law. It also did not foresee the difficulties which
may be faced by the officers who may not have any scientific expertise or not have
the sufficient insight to tackle with the new situations. Various new developments
leading to various kinds of crimes unforeseen by our Legislature came to
immediate focus. Although the Information Technology Act of 2000 was updated
to encompass numerous sorts of cybercrimes and punishments for them, it does
not address all of the issues that officers enforcing the Act face.”
Above all, the Indian Judiciary has played an important role in handling
cyber crimes in cyber age. Because India's Supreme Court has been the final
arbiter of laws for decades. The judicial and law enforcement agencies are fully
aware that the resources available to investigate and punish crimes and terrorist
activities perpetrated against or through computers or computer networks are
almost entirely national in scope at the moment.
345
Mr. Pramod Mahajan, Information Technology Minister(then), address in one day seminar on
“Cyber Law and Police” organized by CBI in Delhi on July 23, 2000.
346
Mr. R.K. Raghvan, CBI Chief (then), address in one day seminar on “Cyber Law and Police”
organized by CBI in Delhi on July 23, 2000.
347
The Tribune, Chandigarh, Nov. 4, 2016, p. 7.
120
The important function of the judiciary is to interpret the laws with the
purpose to find out the real intention of the legislature which is expressed in the
form of language used in the legislation. It is said on the basis that the court does
not legislate but only interprets the existing laws. The Honorable Supreme Court
held in Institute of Chartered Accountants of India v. Price Waterhouse348 case
that a statute is an edict of the legislature. The language used in a statute is
considered as determinative factor of legislative intent. The words and phrases
used are the symbols that stimulate mental references to referents. That’s why the
main purpose of interpreting the laws is to find out the real intention of the
legislature enacting it.
348
AIR 2015 SC 1523: (2005) 5 SCC.
349
AIR 1968 SC 117: (1967) 3 SCR 668: 1968 Cr LJ 97.
350
Vakul Sharma, Information Technology- Law and Practice, 2016, p. 278.
351
Case Studies under IT Act, 2000, available at: https://www.scribd.com/doc/190389306/Case-
studies- under-Indian-IT-Act-200 (visited on April 10, 2017).
352
AIR 2006 SC 2820 (Para II).
353
AIR 1998 SC 74: (1997) 6 SCC 312.
354
(2002) 7 SCC 736.
121
In Mohammed Ajmal Mohammad Amir Kasab v. State of Maharashtra355
case, the court appreciated the electronic evidence while delivering the judgment.
The court appreciated it whether in the form of CCTV footage, memory cards,
mobile devices, data storage devices, intercepted communications over VolP, IP
Addresses, etc.
v. State of Andhra Pradesh and Anr.356 is the first case which is related to
section 65 of the Information Technology Act. In this case, the court determined
that cell phones met the definition of "computer" under the Information
Technology Act, and that the unique Electronic Serial Numbers (ESNs), SIDs
(System Identification Codes), and MINs (Mobile Identification Numbers)
programmed into each handset are "computer source code" under the Information
Technology Act, which must be kept secret..
In Bhim Sen Garg v. State of Rajasthan and Others357 case, it was held that
fabrication of an electronic record or committing forgery by way of interpolations
inCD produced as evidence in a court attract punishment under this section.
359
(2008) 8 SCC 369.
360
(2012) 9 SCC 1: AIR 2012 SC 3565: 2012 AIR SCW 4942.
361
(2005) Cri LJ 4314.
123
The Additional District Court and Sessions Court was upheld a lower court’s verdict
in the first cyber case in State v. Ts. Balan and Aneesh Balan362 case in 2006 and
sentenced a Pentecostal priest and his son for morphed photographs and e-mailed
to victims from fake IDs with captions under section 67 of Information Technology
Act, 2000.
362
(2006) Cri LJ 3463 Raj 2411.
363
(2013) CRR 66 (O&M) 1.
364
(2005), available at: https://www.scribd.com/doc/190389306/Case-studies-under-Indian-IT-
Act-200 (visited on April 10, 2017).
365
(2013) CRR 66 (O&M) 1.
124
Additionally, in S. Khushboo v. Kanniammal366, the Supreme Court
observed that the proper course for Magistrates is required to use their statutory
powers to direct an investigation into the allegations before taking cognizance of
the offence alleged where the cases involving the fundamental right of Freedom
of Speech and Expression. Because in this the petitioner prays that Section 66A of
the Information Technology Act shall be struck down as unconstitutional and a
guideline must be issued by the Court that offences involving Freedom of Speech
and Expression be treated as non-cognizable offences.
366
(2015) Cr. Comp 489/2010, Hyderabad.
367
(2006) Additional District Court and Sessions Court, Kerala, for morphed photographs and e-
mailed to victims from fake IDs with captions.
368
AIR 2015 SC 1523: (2005) 5 SCC.
369
AIR 1982 SC 710.
125
under Section 66A. it is also contended that section 69A of the IT Act is violative
of Articles 14, 19 & 21 of the Constitution of India because it neither provides a
Redressal machinery after blocking of online information of an entity, nor any
provisions for unblocking them while the process of blocking is entirely secret,
and fails to meet constitutional safeguards of natural justice. Similarly, section 80
of Act is violative of Articles 14, 19 and 21 of the Indian Constitution because it
confers unlimited powers to police authorities to arrest without warrant any person
suspectedof committing a crime under this Act.
In Dilip Kumar Tulsidas v. Union of India370 case, the petitioner has also
sought directions against the respondents to carry out widespread awareness
campaigns relating to cyber crime sought to be punishable under Information
Technology Act and other penal law. In the prevalent system of cyber crime
investigation, there is a lack of procedural safeguards. There are also a number of
instances where the police and cooperating private entities have displayed great
negligence towards the innocent citizens and the investigative methods are not
suited to dealing with complex cyber crimes.
Identity Theft
The Indian judiciary is playing the important role in dealing with the cyber
crimes relating to identity theft. In Vinod Kaushik and Ors. V. Madhvika Joshi
370
AIR 2015 SC 1523: (2005) 5 SCC.
371
(2010) 4 SCALE 467.
372
(2013) W.P. Crl. No. 23.
126
and Ors.373 Case, the issue was raised that whether the wife accessing husband’s
and father-in- law’s email account without their permission in order to acquire
evidence in a Dowry harassment case amounts to be liable under section 66C of
Information Technology Act for unauthorized access and dishonest use of
password of any person. The court held that the wife was liable under this section.
Then India found its first successful cybercrime conviction in May, 2002
in Sony. Sambandh. Com. Case374 in which Asif Azim was found guilty for
cheating and it was found as a first offence in which the sentence was only for one-
year probation and a personal surety bond of Rs.20, 000. In this case Azim, who
had been working in I- Energizer, a call centre in Noida. He took the credit card
details of one of his clients, Barbara Campa and decided to do some shopping on
free basis by creating an e-mail address in Campa’s name. Then on May 8 he
placed an order on Sony India’s website by using Barbara Campa’s credit card
details. The products were delivered to Azim’s residence the very next week
because it was found a valid transaction by the Sony India’s credit card company,
Citibank and a mail was sent to Campa with the photographs of Azim receiving
the products. Around the end of June, Campa realized that anything had not been
bought and informed about this to the bank. On the basis of this information the
Citibank made the cross-checking and reported that the transaction was fraudulent
and hence, invalid. This matter was reported to the CBI and the team found that
the Internet Protocol address from where the messages came was not in the US but
in Noida. After this the source computer which was used by Azim was tracked
down and he confessed everything to CBI by saying that he had done it just for
the sake of getting something free of charges nothing else. The court convicted
him under sections 418, 419 and 420 of the Indian Penal Code.
Violation of Privacy
The Indian judiciary is playing the important role in dealing with the
373
(2013) W.P. Crl. No. 21.
374
(2013) W.P. Crl. No. 97.
375
(2013) W.P. Crl. No. 97.
127
cyber crimes relating to violation of privacy. In Court on its own Motion v.
State376 case, the Division bench held that where a sting operation made by a
private person or an agency, which may result in violating bodily privacy of
another person will fall under section 66 E of the Act. Such person shall be liable
under the Act.
On Feb. 17, 2017, a 24 year old cyber crime accused and his two aides
who are wanted in cyber crime cases, walked into the cyber crime police station,
Mumbai, posing as vigilance officers and tried to conduct a sting operation on the
investigation officer. They wanted to blackmail the senior police inspector of the
cyber crime cell to not take any action against the accused. However, their spy pen
camera did them in. Subsequently, the police found that the three men had fake
Central Vigilance Commission (CVC) identity cards and fake letterheads with the
names of CBI officers. The Spy camera has been seized.377 Then the police
charged him under section 34 (common intention), 170 (personating a public
servant), 174, 419(cheating by personation), 420 and 506 of IPC.
Cyber Terrorism
The Indian judiciary is playing the important role in dealing with the cyber
crimes relating to cyber terrorism. In Krishnan v. Krishnaveni378 case, the issue
was raised before the court that whether an offence of defamation could
reasonably covered under section 499 of I.P.C. or it requires section 66 F of IT Act.
The court has to make the distinction between two and it is observed that section
499 of I.P.C. covered the offence of defamation with respect to person and the
term ‘person’ does not include a State whereas section 66F covered the defamation
of State.
In 2008, serial blasts in Ahmadabad, Delhi, Jaipur and Banglore are the live
examples of the cyber terrorism in India. In 2008 attack on Mumbai Taj Hotel
which is also known as 26/11 and the Varanasi blast in 2010 had the trails of
cyber terrorism.379 The main purpose of the cyber terrorist is to gather the
restricted information and to spread terror by cyber communications method for
376
(2013) 10 SCC 1.
377
AIR 2015 SC 1523: (2005) 5 SCC.
378
(2010) Cr. Comp 2, available at:
https://it.maharashtra.gov.in/Site/Upload/ACT/Madhvika%20Vs%20Kaushik-
Rajesh%20Aggarwal.pdf (visited on April 6, 2017).
379
(2002), available at: http://www.legalserviceindia.com/lawforum/index.php?topic=2242.0
(visited on April 10, 2017).
128
disruption of national security, unity, integrity and peace etc.
Prior to the passage of the Information Technology Act of 2000, the Indian
judiciary played this function in dealing with this type of crime.. In Sukanto v.
State of West Bengal381 case which is relating to a magazine ‘Nara Nari’ as a
obscene publication, the under section 292 of IPC convicted the petitioner for
giving effect to public morality above art, literature. Indian court followed the
principle of obscenity in Ranjit D. Udeshi v. State of Maharastra382 case as given
by the U.S. court in Regina v. Hicklin383 case and the honourable court interpreted
the word “obscene” and stated that obscene may be defined as “offensive to
modesty or decency, lewd, filthy and repulsive”. The court also held in the case
that it constituted the reasonable restriction on the right of freedom of speech and
expression guaranteed under article 19, clause 2 of the Indian Constitution in the
interest of decency or morality. The honourable court in Samaresh Bose v. Amal
Mitra384 case held that depending on the standards of morals of contemporary
society, the concept of “Obscenity” would differ from country to country. In this
case the court also clear a difference between the term “vulgarity” and “obscenity”
by stating that a vulgar writing is not necessarily obscene.
380
“Kareena Kapoor and the Curious Case of Identity Theft”, NDTV News, (Oct. 1, 2016),
available at:http://www.ndtv.com/mumbai-news/unknown-person-files-income-tax-return-in-
kareena-kapoor- name-1468962 (visited on April 6, 2017).
381
(2013) WP (C) 162, Del.
382
The Times of India, Mumbai, Feb. 20, 2017, available at: http://timesofindia.indiatimes.com/
city/ mumbai/cyber-crime-accused-2-aides-try-sting-op-on-cop/articleshow/57240684.cms (visited
on April 6, 2017).
383
AIR 1997 SC 9876: 1997 AIR SCW 950: 1997 Cr LJ 1519.
384
Jyoti Rattan, Cyber Laws & Information Technology, 2014, p. 261.
385
Ibid.
129
of this petition, the Division Bench of the Bombay High Court passed an order to
appoint a committee for suggesting and recommending preventive measures for
protecting from pornographic and obscene material on the internet. Then on
January 30, 2002, several recommendations have been given by Bombay High
Court’s Special Committee through the public opinions on internet relating to
Protecting Minors from
As regards the Cyber pornography, most of the reported Indian Cases are
disposed of in the lower court at the magisterial level. However, the case of State of
Tamil Nadu v. Suhas Katti390 deserves a special mention in this context because
this case was disposed of within a record period of seven months from the date of
filing of the FIR by the expeditious investigation made by the Chennai Cyber
Crime Cell (CCC). This is a landmark case which is considered to be the first case
of conviction under section 67 of Information Technology Act in India which
makes this section is of the historical importance. In this case, some defamatory,
obscene and annoying messages were posted about the victim on a yahoo
messaging group which resulted in annoying phone calls to her. She filed the FIR
and the accused was found guilty under the investigation and was convicted under
386
AIR 1952 Cal 214.
387
AIR 1965 SC 881: (1965) 2 Cr LJ 8: (1965) 1 SCR 65 (SC).
388
(1868) 3 QB 360.
389
AIR 1986 SC 967: (1985) 4 SCC 289: 1986 Cr LJ 24.
390
(2001) Bom H.C., W.P. 1611.
130
section 469, 509 of IPC and section 67 of Information Technology Act.
391
In Avinash Bajaj v. State (NCT) of Delhi case which is popularly
known as Bazee.com case, obscene material was put up for sale by one person on
the website Baazee.com and sold/transmission of these clip to several people
resided in different parts of country which took place in a very short time period.
The issue was raised whether it was a publication under section 67 before the
amendment or website had indirectly published the material. The court held that
the ultimate transmission of the obscene material wouldn’t have been possible
without the initial facilitation by the website and therefore, the website had liable
under the section.
391
(1988) 2 Cr. 173 Ker.
392
(1969) 2 SCC 687.
393
(1997) 6 SCC 241.
394
(1999) 1 SCC 759.
395
(2004) Cr. Comp 4680, Egmore, available at: http://lawnn.com/tamil-nadu-vs-suhas-kutti/
131
article 21 of Indian Constitution is not an absolute right. If any dispute rose
between fundamental rights of two parties then that right would prevail which
advances public morality.
Offences by Companies
The Indian judiciary is playing the important role in dealing with the cyber
400
(2003) 4 SCC 493: AIR 2003 SC 3450: 2003 AIR SCW 1950.
401
(2005) 1 SCC 496: AIR 2005 SC 186: 2005 AIR SCW 6455.
402
(2010) 1 SCC (Cri.) 47.
403
AIR 2012 SC (Cri.) 184.
404
AIR 1972 2 SCC 788.
405
(1985) SCR (1) 719.
133
Certificates in certain particulars or for fraudulent purposes. Additionally, the IT
Act 2000 has amended the Indian Penal Code, 1860 but the amendments have
been made in such a manner so as to make the ambit of documents stipulated in
various criminal provisions to include therein, electronic records. As a result there
is also a number of cybercrimes which are also not covered under the Indian Penal
Code at all like cyber stalking, cyber harassment, cyber nuisance, etc.
India enacted the Information Technology Act on June, 2000 and became
part of a select group of countries to have put in place cyber laws. But the internet
is still a dirty place to hand out; beware those viruses and spam mails. Cyber
hooligans are growing in numbers and are very much at large and we are still
wary of using our credit card online. Despite the enactment of cyber laws, a lot
more needs to be done, both online and offline, as well as within the judiciary and
law enforcement agencies, experts feel. However, a number of right steps have
also been taken to make the Information Technology Act more relevant in
today’s context.409 The Information Technology Act, 2000 has been proved to be
a highly controversial piece of legislation. In its sixteen-odd years of operation,
406
AIR 2012 SC 2795.
407
(2009) Crl. Appl. 1483.
408
(1999) 19 PTC 229 Del.
409
AIR 2000 Bom 27.
134
the Act has managed to draw considerable criticism from the legal community
and the general public. It is alleged to contain a whole spectrum of flaws,
shortcomings and pitfalls ranging from being inefficient in tackling cyber crimes
to placing unfair curbs on the civil liberties of citizens.410
It is found that a number of these types of crimes are not registered under
the existing provisions of Indian Penal Code, 1860 which are ineffective and do not
cover the said cyber crimes. Some market players believe that this will provide an
encouragement to electronic fund transfers and also help in promoting electronic
commerce in the country. But the result is not similar as it is. The cyber crime
cells are doing training programmes for its forces and plans to organize special
courses for corporate to combat cyber crime and use the Information Technology
Act effectively.
The current position of Indian cyber cases are increasing day by day. A total
of 8, 045 cases were registered under Information Technology Act during the year
2015 as compared to 7, 201 cases during the previous year 2014 and 4,356 cases
during 2013, showing an increase of 11.7% in 2015 over 2014 and an increase of
65.3% in 2014 over 2013. 81.6% of the total 8,045 cases in 2015 and 77.0% (5,548
cases) of the total 7,201 cases under IT Act were related to computer related
offences (under section 66A, 66B, 66C, 66D and 66E of the IT Act) followed by
10.1% in 2015 and followed by 10.5% in under publication/ transmission of
obscene/sexually explicit content (under section 67A, 67B and 67C of the
410
(1999) 19 PTC 229 Del.
411
AIR 2000 Bom 27.
135
Information Technology Act). A total of 14, 121 cases during 2015 and 2,246
cases during 2014 under Information Technology Act were pending for
investigation from previous year. A total of 8,088 at the end of the year 2015 and
6,269 cases at the end of the year 2014 were remained pending for investigation. A
total of 2,396 during 2015 and 1,451cases during 2014 were charge sheeted. A
total of 2,316 remained pending for the trial at the end of the year during 2014.
Uttar Pradesh and Maharashtra has reported the maximum number of persons
arrested under such crimes during 2015 as well as in 2014.412
412
WIPO Case No. D2001-0167, available at: http://www.wipo.int/amc/en/domains/decisions/
html/2001/d2001-0167.html(visited on April 6, 2017).
413
(2002) 25 PTC 233 Del.
414
Vipin V. Nair, “Dark Deeds Remain in the Dark”, The Hindus Business, available at:
http://www.thehindubusinessline.com/ew/2003/09/10/stories/2003091000080100.htm (visited on
March 6, 2017).
136
137
CHAPTER - V
CYBER CRIMES IN UNITED STATES OF AMERICA:
LEGISLATIVE AND JUDICIAL RESPONSE
5.1 Introduction
Technological advancements in communication have facilitated
conversation between people who reside on opposite sides of the globe. One of
the most important inventions in the field of communication is the internet. The
internet has transformed the entire planet into a global village. It has given people
sufficient opportunity to improve both personal and professional interactions
across borders by creating a virtual world with no limits. 415 Because the rise of
globalization have been largely affected by the socio-economic and cultural facets
of life. For the human civilization the cyberspace is as a blessing. Around the
globe people has been connected by the internet.416
415
“Supreme Court of India: To Hear Eight IT Act Related Cases on 11th April 2014- SFLC”,
available at: http://www.medianama.com/2014/03/223-supreme-court-of-india-to-hear-eight-it-
act-related-cases- on-11th-april-2014-sflc/ (visited on June 29, 2016).
416
Samiksha Godara, “Prevention and Control of Cyber Crimes in India: Problems, Issues and
Strategies”, A Thesis submitted to Maharishi Dayanand University, 2013, p. 2, available at:
http://shodhganga.inflibnet.ac.in/bitstream/10603/7829/12/12_chapter%203.pdf (visited on May
20, 2016).
417
National Crime Records Bureau, Ministry of Home Affairs, Cyber Crimes in India, 2015, pp.
163-164, available at: http://ncrb.nic.in/StatPublications/CII/CII2015/FILES/Compendium-
15.11.16.pdf (visited on Nov. 11, 2016).
418
“Cyber Thieves are Caught, But conviction is Wobbly”, Hindustan Times, August 9, 2006, p.
18.
138
tendencies by the cyber users.419
As we know cyber crimes are of current origin and affect the whole world at
large, all regional organizations and State countries have called upon legislatures
to draft laws dealing with these crimes; as a result most of the countries started to
do so. In this chapter an attempt has been made to discuss the cyber legislations
and to find out the role of judiciary for combating these new types of crime
emerging in United States.
419
“Legal Framework Inadequate to Tackle Cyber Crime”, The Hindu, July 27, 2008.
420
Tanaya Saha and Akanchs Srivastava, “Indian Women at Risk in the Cyber Space: A
Conceptual Model of Reasons of victimization, International Journal of Cyber Criminology, vol.
8 No. 1, Jan.- June, 2014, pp. 57-58, available at: http://www.cybercrimejournal.
com/sahasrivastavatalijcc 2014vol8issue1.pdf (visited on Feb. 10. 2017).
421
M. Das Gupta, Cyber Crime in India- A Comparative Study, 2009, p. 129.
422
Talwant Singh, Cyber Law & Information Technology, p. 1,
available at: http://delhicourts.nic.in/ejournals/CYBER%20LAW.pdf (visited on Jan. 26, 2017).
139
as a network of four computers, the internet has come a long way.
Congress revised the Act in 1986, 1994, 1996, 2001, and 2002 to expand
security for computers and information in the private sector as damage to
corporations escalated as a result of clandestine attempts by individuals outside
the companies and unhappy employees within them. The Act's punishment
provisions were also strengthened, and civil remedies were added..431 In 2004, the
Fourth Plenary Session of the Organization of American States General Assembly
passed the resolution on “Adoption of a Comprehensive Inter-American Strategy
to Combat Threats to Cyber security: A Multidimensional and Multidisciplinary
Approach to Creating a Cyber Security Culture,” argues that an effective cyber
security strategy must acknowledge that the security of the Internet's network of
information systems necessitates collaboration between government and
industry.432
On the 9th of February 2009, the President of United State Barack Obama
has directed the National Security and Homeland Security Advisors to conduct a
review of the plan, programs, and activities underway throughout the
government dedicated to cyber security, including new regulations to combat
428
Davis McCown, “Federal Computer Crimes”, 1995, available at:
https://books.google.co.in/books? id=qZBXcX0ZgZwC&pg=PR5&1pg=
PR5&dg=Federal+Computer+Crimes+by+Davis+McCown&source=bl&ots=JDjoZ5CyyT&sig=J
Yg
XcWqLS13SsX4BnWo0eWlpZDk&hl=en&sa=X&ved=0ahUKEwjA0M26g4bSAhUGpI8KHccO
Be
4Q6AEILjAC#v=onepage&q=Federal%20Computer%20Crimes%20by%20Davis%20McCown&f
=fa lse (visited on Feb. 10, 2017).
429
Tonya L. Putnam and David D. Elliott, “International Responses to Cyber Crime”, University
of Petroleum and Energy Studies Review, Vol. 1, 1999, pp. 39-40, available at:
http://www.hoover.org/sites/default/files/uploads/documents/0817999825_35.pdf (visited on Feb.
13, 2017).
430
Catherine D. Marcum, Goerge E. Higgins, et.al., “Doing Time for Cyber Crime: An
Examination of the Correlates of Sentence Length in the United States”, International Journal of
Cyber Criminology, vol.5, No.2, July.- Dec, 2011, p. 827, available at: http://www.cybercrime
journal.com/marcumetal2011julyijcc.pdf (visited on Feb. 13, 2017).
431
Supra note 10, p. 40.
432
Supra note 11, p. 48.
141
cyber crime.433 The legislative provisions with respect to various cyber crimes in
United States of America are givenas follows:
Hacking
Hacking is a crime that involves breaking into computer systems and
getting unauthorised access to the data they contain.434 To put it another way,
hacking is equivalent to trespassing. Trespassing has traditionally been considered
a type of crime. Criminal trespass statutes are intended to protect the integrity and
privacy of real properties, such as land and buildings on land, by prohibiting
persons from entering areas where they do not have permission. Hacking is
comparable to trespassing on one's real properties because computers are a type of
property.435 In trespass, there is a strict restriction on the legal or real property
belonging to others but on the other hand in hacking, there is a strict restriction on
the use of computer or computer system or computer network without the
permission of authorized person.
The United State of America enacted several Federal and state laws for the
protection of computer, computer system and computer network from various
forms of cyber crimes i.e. hacking, cracking, cyber fraud, cyber theft etc. The
legislations which deal with ‘Hacking’ are discussed as under:
The Computer Fraud and Abuse Act (CFAA) of 1986 was enacted by
Congress as an amendment to existing computer fraud law (18 USC 1030), which
states that a person is guilty of an offence if he causes a computer to perform any
function with the intent to secure access to any programme or data held in any
computer, or the access he intends to secure is unauthorised; and he knows at the time
when he causes the computer to perform any function that the access he intends to
secure.436 Unauthorized access to a computer or network without a further offense
(e.g. system impairment, obtaining protected information) is per se illegal only
with respect to computers used exclusively by the Government of the United
States. Unauthorized access to all other computers, for instance, those used non
433
James M. Thomas, “The Computer Fraud and Abuse Act: A Powerful Weapon vs. Unfair
Competitors and Disgruntled Employees”, Employment Law Magazine, 2007, p. 10, available
at: http://www.williamskastner.com/uploadedFiles/ThomasIDQ200703.pdf (visited on
Feb. 13, 2017).
434
Ibid.
435
Available at: http://www.whitehouse.gov (visited on May 10, 2016).
436
Ritu Dhanoa, “Cyber- Crime Awareness”, International Journal in Multidisciplinary and
Academic Research, vol.2, No.2, 2014, p. 3, available at: http://ssijmar.in/vol2no2/vol2no2.24.pdf
(visited on Sep. 22, 2014).
142
exclusively by the federal government, including computers containing national
security records, and those containing financial and credit records require some
further act or damage to occur in order for criminal penalties to apply.437 This Act
has been further amended in 1989, 1994, and 1996 and in 2001 by the USA Patriot
Act, 2002 and in 2008 by the Identity Theft Enforcement and Restitution Act.
Further, in January 2015 Barack Obama also proposed for expanding the CFAA
for controlling the cyber crimes.
Then after the Data Protection Act, 1998 was enacted which also control
the use and storage of personal data or information relating to individuals If any
person has knowingly accessed a computer without authorization or exceeding
authorised access, and has obtained information that has been determined by the
United States Government pursuant to an Executive order or statute to require
protection from unauthorised disclosure for reasons of national defence or foreign
relations, or restricted data, as a result of such conduct, as a result of such
conduct, as a result of such conduct, as a result of such conduct, as a result of
such conduct, as a result of such conduct, as a result of such, delivered, or
transmitted the same to any person not entitled to receive it, or willfully retains the
same and fails to deliver it to the officer or employee of the United States entitled
to receive it shall be liable to punishment under Section 1030 (1) of this Act.
Section 1030 (2) of the Act provides that if a person who intentionally accesses a
computer without authorization or in excess of authorised access, obtaining
information from a financial institution's or a card issuer's financial record, as
defined in section 1602 (n) of title 15, or from a consumer reporting agency's file
on a consumer, as defined in the Fair Credit Reporting Act (15 U.S.C. 1681 et
seq. ); information from any department or agency of United States; or
information from any protected computer if the conduct involved an interstate or
foreign communication shall be liable to punishment under this Act.
437
Zhicheng Yang, “A Survey of Cyber crime”, available at:
http://www.cse.wustl.edu/~jain/cse571- 11/ftp/crime.pdf (visited on Jan.25, 2013).
143
This Act also provides that if a person who knowingly and with the intent
to defraud, accesses a protected computer without authorization, or exceeds
authorized access, and by means of such conduct furthers the intended fraud and
the thing obtained consists only the use of the computer and the value of such use
is not more than $ 5,000 in any one-years period shall be liable to punishment
under § 1030 (4) of this Act.
The Act also provides that if a person who knowingly and with intent to
defraud traffics (as defined in section 1029) in any password or similar
information through which a computer may be accessed without authorization, if
such trafficking affects interstate or foreign commerce; or Such computer is used
by or for the Government of the United States shall be liable to punishment under
Section 1030 (6) of the Act. The Act also provides that if a person who with intent
to extort from any person any money or other thing of value, transmits in
interstate or foreign commerce any communication containing any threat to cause
damage to a protected computer; shall be punished Whoever attempts to commit
an offense shall be liable to punishment under Section 1030 (7) of the Act.
After this in 2000, the Spyware Control and Privacy Protection Act is
passed in which there are also provision for preventing and controlling hacking in
144
the United States of America. This Act prohibits any deceptive activities relating
to Spyware in which unauthorized use of protected computer and causing other
crimes are prohibited under section 2(1). According to this section the internet
browser cannot be opened by the authorized user unless closing all the
programmes or turning off the computer or diverting the internet the internet
browser as a kind of Denial of Service (DOS) attack. Unauthorized modification of
computer settings, network and web page is also prohibited under section 2(2) of
the Act.
Cyber terrorism
Cyber terrorism is a new form of terrorism, which exploits the system we
have put in place. There is a continual drive to computerize every process, in order
to add remote access, accuracy features and ease of use.438 Generically, cyber
terrorism consists of using computer technology to engage in terrorist activity.439
This sort of cybercrime can include using the internet to connect with other
terrorists, transfer funds to fund a terrorist act, or engage in any other related
conduct.
Before Sep. 11, 2001, the United States of America passed the Computer
Fraud and Abuse Act, 1986 and due to some weaknesses it was amended twice in
the years 1994 and 1996. But after Sep. 11, 2001, an attack on World Trade Centre
and Pentagon, the United States of America passed the Patriot Act, 2001 and
recognized hacking as cyber terrorism. Section 814 of The Patriot Act is tilted as
‘Deterrence and Prevention of Cyber terrorism’ amends section 1030(a) (5) of title
18, United States Code. The amended section punishes any person who causes
unauthorized damage to a protected computer by either knowingly causing the
transmission of a program, information, code, or command, or intentionally and
unauthorizedly accessing a protected computer. This section applies only if the
accused's actions resulted in a loss of at least $5,000 to one or more people over a
one-year period, or the actual or potential modification or impairment of one or
more people's medical examination, diagnosis, treatment, or care, or physical
injury to anyone, or a threat to public health or safety, or damage to the
environment.
The Patriot Act, 2002 empowers the Attorney General under section 816 to
establish adequate regional computer forensic laboratories and provide support to
438
Section 1(1) of the Computer Fraud and Abuse Act, 1986.
439
Supra note 10.
145
existing computer forensic laboratories, in order that all such computer forensic
laboratories have the capability to provide forensic assessments of computer
evidence obtained or intercepted in the course of criminal activities (including
cyber terrorism), providing training and teaching to federal, state, and local law
enforcement officers and prosecutors in the areas of computer crime
investigations, forensic analyses, and prosecutions (including cyber terrorism),
assist Federal, State, and local law enforcement in enforcing Federal, State, and
local criminal laws relating to computer-related crime, facilitate and promote the
sharing of Federal law enforcement expertise and information about the
investigation, analysis, and prosecution of computer-related crime with State and
local law enforcement personnel and prosecutors, including use of multi
jurisdictional task forces, and carry out such other activities as the Attorney
General considers appropriate.
Cyber Pornography
Pornography on the internet can take many different forms. It may include
the hosting of a website containing these banned items, as well as the use of
computers to create these obscene materials and the downloading of obscene
materials via the Internet. These obscene matters can impair an adolescent's
mentality and tend to deprave or corrupt them.440 taint their minds This term can
also be defined as describing or depicting sexual acts for the purpose of eliciting
sexual excitement through the use of books, films, and pornographic websites, as
well as the use of the internet to download and transmit pornographic videos,
pictures, photos, and writings, among other things.
In United States of America, there are two child pornography laws i.e. The
Child Pornography Prevention Act, 1996 and the Child Online Protection Act,
1998. The former Act prohibits the use of computer technology to knowingly
produce child pornography, that is, depictions of sexually explicit conduct
involving or appearing to involve minors. The latter Act requires commercial site
operators who offer material deemed to harmful to minors to use bonafide
methods to establish the identity of visitors to their site.
The Communication Decency Act, 1996 has been passed to protect minors
from pornography. The CDA states that any person, who knowingly transports
obscene material for sale or distribution either in foreign or interstate commerce or
through the use of an interactive computer service, shall be liable to imprisonment
440
R.K. Tiwari, P.K Sastry, et.al., Computer Crime and Computer Forensics, 2002, p. 99.
146
upto five years for a first offence and up to ten years for each subsequent offence.
Child Pornography Prevention Act has been passed in 1996 which defines
the ‘Child pornography’ under Section 2256 as any visual depiction of a minor
engaging in sexually explicit conduct, including any photograph, film, video,
picture, or computer or computer-generated images or picture, whether made or
produced by electronic, mechanical, or other means, or sexually explicit conduct,
where the production of such visual depiction involves the use of a minor
engaging in sexually explicit conduct; such visual depiction is, or appears to be,
of a minor engaging in sexually explicit conduct that conveys the impression that
the material is or contains a visual depiction of a minor engaging in sexually
explicit conduct. After this the Child Online Protection Act, 1998 has been passed
which provides for opportunities for minors to access materials through the web,
physical and psychological protection of minors, restrict a minor’s access to
harmful materials, prohibiting the distribution of material harmful to minors,
protection of children from being exposed to harmful materials found on the
internet under sec. 231.
In 1998, the Protection of Children from Sexual Predators Act has been
passed with the ambit of expanding the liability to those persons who attempts to
use the internet for purposes of Child pornography. This Act specifically targets
commercial pornographers and makes it crime to knowingly make a
communication for commercial purposes harmful to minors (16 years old and
younger) or to use the internet for purposes of engaging in sexual activities with
minors.
Cyber Stalking
Stalking is a crime that causes the victim to feel fear, terror, intimidation,
stress, or anxiety.441 The use of the Internet or other technological means to stalk
someone is known as cyber stalking. The terms "online harassment" and "online
abuse" are often used interchangeably.442 Mostly cyber stalking involves
following a person’s movement across the internet by positing threatening
messages to the victim or by entering the chat-rooms frequented by the victim or
441
Susan W. Brenner, “At Light Speed: Attribution and Response to Cybercrime/ Terrorism/
Warfare”, Journal of Criminal Law and Criminology, vol. 97, No. 2, 2007, p. 386, available at:
http://scholarlycommons.law.northwestern.edu/cgi/viewcontent.cgi?article=7260&context=jclc
(visited on Feb. 13, 2017).
442
Parthasarathi Pati, “Cyber Crimes”, available at: http://www.naavi.org/pati/pati_ cybercrimes_
dec03.htm (visited on Feb. 13, 2017).
147
by constantly bombarding the victim with the e-mails etc.443 In general it may be
defined as the repeated acts of harassment targeting the victim such as following
the victim, making harassing phone calls, vandalizing victims property, leaving
written messages or objects using through computer, computer system or
computer network in the absence of universally accepted definition of cyber
stalking.
In United States of America almost every state has laws dealing with cyber
stalking. US federal Code 18 under section 2261 A (2) states that whoever with the
intent uses the mail, any interactive computer service, or any facility of interstate
of foreign commerce to engage in a course of conduct that causes substantial
emotional distress to that person or places that person in reasonable fear of the death
of, or serious bodily injury shall be liable under section 2261 B (b) for a
imprisonment which may extend upto life imprisonment if the death of the victim
results; for not more than 20 years if permanent disfigurement or life threatening
bodily injury to the victim results; for not more than 10 years, if serious bodily
injury to the victim results or if the offender uses a dangerous weapon during the
offense.
443
Steven D. Hazelwood, Sarah Koon Magnin, “Cyber Stalking and Cyber Harassment
Legislation in the United States: A Qualitative Analysis”, International Journal of Cyber
Criminology, vol.7, No. 2, July- Dec., 2013, p. 157, available at:
http://www.cybercrimejournal.com/hazelwood koonmagninijcc2013vol7issue2.pdf (visited on
Dec. 19, 2014).
444
B. Muthukumaran, “Cyber Crime Scenario in India”, Criminal Investigation Department
Review, Jan., 2008, p. 18, available at: http://www.gcl.in/downloads/bm_cybercrime.pdf (visited
on Feb. 13. 2017).
445
Supra note 17, p.4.
148
encountered numerous instances in which adult pedophiles have made contact with
minors through online chat rooms, established a relationship with the child, and
later made contact for the purpose of engaging sexual activities446. Because in the
United States of America the important reasons for cyber stalking are Sexual
attractions and motives.
446
“Cyber Stalking”, available at: http://en.wikipedia.org/wiki/cyberstalking (visited on April 12,
2016).
149
Cyber Defamation
Defamation can be understood as the intentional infringement of another
person’s right to his good name. It is the wrongful and intentional publication
of words or behavior concerning another person’s status, good name, or reputation
in society. It is not defamatory to make a critical statement that does not have a
tendency to cause damage, even if the statement turns out to be untrue. 447 Any
derogatory statement, which is designed to injure a person’s business or
reputation, constitutes cyber defamation. Defamation can be accomplished as libel
or slander. Cyber defamation occurs when defamation takes place with the help of
computers and/or the Internet.448 For example if A publishes a defamatory
statement on a website or to send an e-mails containing defamatory information
about B to all his friends.
The United States also has a unique law which governs the accountability
of the acts relates to online defamation. The Communications Decency Act
(CDA), 1996 is one of the most valuable tools for protecting freedom of expression
and innovation on the internet. After Stratton Oakmont Inc. v. Prodigy Services
Co.449 case, the Congress applied the standard publisher/ distributor test to find an
online bulletin board liable for the post by a third party and specially enacted
Communications Decency Act (CDA), 1996 for the purpose of reversing the
Prodigy findings and providing for private blocking screening of offensive
material.
Section 223 of Communications Decency Act (CDA), 1996 lays down that
any person who puts the information on the web which is obscene, lewd,
lascivious, filthy or indecent with intent to annoy, abuse, threaten or harass
another person will be punished either with imprisonment or with fine. Section
230 also provides for protection for private blocking and screening of offensive
material. The section says that no provider or user of an interactive computer
service shall be considered as the publisher or speaker of any information
provided by any other information content provider.
447
Christa Miller, “High-Tech Stalking”, Investigation Magazine, available at: http://www.
officer.com/article/10233633/high-tech-stalking (visited on Feb. 13, 2017).
448
R.C. Mishra, Cyber Crime: Impact in the New Millennium, 2002, p. 54.
449
Sallie Spilsbury, Media Law, 2000, p. 60.
450
Syed Mohd. Uzair, “Cyber Crime and Cyber Terrorism in India”, A thesis submitted to
Aligardh Muslim University, 2013, p. 50.
150
Drudge451, the court have demonstrated that although applying section 230 of the Act
is expressly uneasy for them and they are also bound to find providers who are
immune like AOL (Initialism of America Online) from defamatory postings. This
immunity applies even if the providers are notified of defamatory material and
neglect to remove it, because provider liability upon notice would likely cause a
burden of complaints on providers and on their right of freedom of speech and
expression.
The Hon’ble court ruled in Obsidian Finance Group, LIC v. Cox452 case
that liability for a defamatory blog post involving a matter of public concern
cannot be imposed without proof of fault and actual damages. Bloggers saying
libelous things about private citizens concerning public matters can only be sued if
they are negligent.
Phishing
Phishing occurs when consumers of financial institutions receive
unsolicited emails demanding their username, password, or other personal
information in order to access their account for whatever purpose. When
customers click on the links in the email to submit their information, they are
directed to a false clone of the actual institution's website, and they are unaware
that they have been duped. The fraudster now has access to the customer's online
453
bank account, as well as the funds in it. It's simply one of the many types of
internet-based fraud.
On January 26, 2004 the United States Federal Trade Commission filed the
first lawsuit against a suspected phisher. The defendant, a Californian teenager,
allegedly created a webpage designed to look like the America Online website,
and used it to steal credit card information.454 After this, Senator Patrick Leahy
introduced the Anti- Phishing Act in Congress on March, 2005 which would
punish and fined those cyber criminals who created the fake websites and sent
bogus e-mails with the purpose of defrauding consumers. But it did not pass.
In Jan. 2007, Jeffrey Brett Goodin of California was become the first
convicted cyber criminal by a jury under The CAN- SPAM Act, 2003 for
sending thousands of e-mails to America Online users which prompted
451
(1995) N.Y. Misc. Lexis 229.
452
(1997) 129 F. 3d 327 (4th Cir).
453
(1998) 992 F. Supp. 44 (D.D.C).
454
(2011) CV- 11- 57- HZ.
151
customers to submit personal credit card information. In United States of
America, The CAN- SPAM Act, 2003 is the direct response of the growing
number of complaint over spam e-mails and is also the first USA cyber law which
establishes national standards for sending of commercial e-mail. It controlled the
assault of non-solicited pornography and market. A person or a business engaging
in commercial emails can be fined upto $ 11000 for each and every violation of
the Act.
Cyber Fraud
The United States of America enacted the Computer Fraud and Abuse Act,
1996 for prohibiting and punishing computer and internet fraud which was further
amended in the year 1994, 1996 and also amended by the Patriot Act, 2001 and in
2008 by the Identity Theft Enforcement and Restitution Act. U.S Criminal Code’s
provisions are also applicable on the cyber fraud and the violators can be
prosecuted under title 18 i.e. no. 1028 prohibits social security cards fraud and
credit card frauds, no. 1029 prohibits identity fraud including telemarketing fraud,
no. 1341 prohibits mail fraud, no. 1343 prohibits wire fraud etc. The Federal
Statute title 18 U.S. Code s. 1030 also prohibits fraud and other related activities in
connections with computers.
Cyber Squatting
The act of registering, selling, or utilising a domain name with the goal of
benefitting on the goodwill of another's trademark is known as cyber squatting. It
refers to the practise of purchasing domain names that contain the names of
existing businesses with the intention of reselling the names to those firms for a
profit.455 United States passed the federal laws on cyber squatting which is
known as Anti-Cyber Squatting Consumer Protection Act in 1999. According to 15
U.S.A s. 1125(d), cyber squatting is registering, trafficking in, or using an internet
455
Mohit Goyal, “Ethics and Cyber Crime in India”, International Journal of Engineering and
Management Research, vol. 2, No. 1, Jan., 2012, available at: http://www.ijemr.net/Jan2
012/EthicsAndCyberCrimeInINDIA(1-3).pdf (visited on Feb. 13, 2017).
152
domain name with bad faith intent to profit from the goodwill of a trademark
belonging to someone else.
Title 18 section 1037 of United States Criminal Code provides that if any
person accesses a protected computer without authorization and intentionally
initiates the transmission of multiple commercial electronic mail messages from
or through such computer, uses a protected computer to relay or retransmit
multiple commercial electronic mail messages with the intent to deceive or
mislead recipients, or any internet access service, as to the origin of such
messages, materially falsifies information in a commercial electronic mail
message or two or more domain names and intentionally initiates the transmission
of multiple commercial electronic mail messages from any combination of such
accounts or domain names, falsely represents oneself to be the registrant or the
legitimate successor in the interest to the registrant of five or more internet
protocol addresses and intentionally initiates the transmission of multiple
commercial electronic mail messages from such addresses or conspires to do so
shall be liable to punishment under this code.
456
Jeordan Legon, “Phishing scams reel in your identity”, CNN News, Jan. 26, 2004,
available at:
http://edition.cnn.com/2003/TECH/internet/07/21/phishing.scam/index.html?iref=newssearch
(visited on Feb. 13, 2017).
153
who are brought before the court in some manner sanctioned by law as proper and
sufficient”.
In cyber jurisdiction, the Court must address the question of which law
maker has jurisdiction over actions taking place on the Internet. In the few cases
the Courts have adjudicated, they have applied long-arms statutes and personal
jurisdictional principles in making decision.460 The law of cyber jurisdiction
involves determination whether a particular activity in cyberspace is controlled by
the laws of the State or country where website is located, or by the laws of the
State where Internet Service Provider (ISP) is located, or by the laws of the State
where user is located or by all these law. The Internet can be seen as multi-
jurisdictional because of the ease which a user can access a Web site anywhere in
the world.461
457
“Cyber Squatting: What it is and what can be done about it”, available at:http://www.
nolo.com/legal- encyclopedia/cybersquatting-what-what-can-be-29778.html (visited on Jan. 26,
2017).
458
Anirudh Rastogi, Cyber Law-Law of Information Technology and Internet, 2014, p. 17.
459
Nandan Kamath, Law Relating to Computer Internet & E-Commerce: A Guide to Cyber Law &
IT Act, 2000 with Rules & Regulations, 2000, p. 20.
460
Suryajyoti Gupta, “Civil and Criminal Jurisdiction in the Internet”, Indian Bar Review, vol. 29,
2002, p. 45.
461
Yashraj Vakil, “Jurisdictional Challenges – Cyber Crime Prosecutions”, The Lawyers
Collective, February, 2005, p. 29.
462
“Judicial Response on Cyber Crime”, p. 276, available at: http://shodhganga.inflibnet.ac.in:
8080/jspui/bitstream/10603/70095/6/chapter%205.pdf (visited on June 7, 2016).
154
Cybercrimes have extraterritorial aspect.463 Cyberspace has no
geographical boundaries which lends a ‘transnational’ element to cybercrimes.
Traditional national and international law are not designed to adequately deal with
such a transnational nature of cybercrimes.464 The advent of Internet overturned
the century-old- established theories of jurisdiction which were deeply rooted in
the territorial and physical concept.465 Most of the traditional theories of
jurisdiction are over-inclusive in relation to the Internet because they allow for the
almost unlimited exercise of judicial jurisdiction.466
463
Id, p. 277.
464
Gray v. American Radiator & Standard Sanitary Corp., (1961) 22 III 2d 432.
465
Supra note 5, p. 339.
466
Supra note 39.
467
Supra note 5, p.21.
155
In Miller v. California468case, the defendants contended that the internet
provides broad-ranging connections among people in cyber space as a result of
that the obscenity tied to geographic locale. They also contended that there is a
need of more flexible definition because BBS operators could not select who
received their material.469 On this the court ruled that the defendants had a
preexisting method of screening potential members and they could protect
themselves from being subjected to liability in jurisdiction with less tolerant
standards by pre-screening their members. The court further ruled the defendants
were free to tailor their messages to the communities on a selective basis.
Accordingly, the court held that there was no need to develop a new definition of
community and the obscenity was to be judged by what the average person
applying the community standards.470
468
Adria Allen, Internet Jurisdiction Today, 22 J Int’1 L & Bus 69 (2001).
469
(1977) 326 US 310, 316: 66SCt154, 158:90 L Ed 2d 683.
470
(1973) 413 US 15:37 L.ED 2d 419.
471
(1987) 480 U.S. 102.
472
(1991) 928 F. 2d 504 [cert. denied, 502 U.S. 917].
156
could cause damage and infection at very fast to other computers. But the speed of
that worm was not known by the accused and then he discussed it with his friend
at Harvard. Then he sent an anonymous message from Harvard over network,
instructing clogged, but it was too late because by that time military sites, medical
research sites, installations sites, Universities websites were infected. The court
found him guilty under title, 18 USC s. 1030(a)(5)(A) and sentenced him 3 years of
probation, 400 hours of community service, a fine of $10,050 and the costs of his
supervision. That conviction of his was appropriated by the District Court.
The United States of America v. Jake Barker and Arthur Gonda 473 was a
case of criminal prosecution under tile 18 U.S.C.s. 875 c. The defendant was
charged with transmitting threats to injure, kidnap another and objectionable
materials in electronic mail messages through internet. In Dec. 1994 the e-mail
messages were exchanged between Jake barker and co-accused A. Gonda. J. Barker
was then in Michigan and A. Gonda was in some unknown place with unknown
identity. They exchanged electronic mail through a computer in Ontario, Canada.
They began this exchange on 29th November 1994 and ended on 25th January
1995. Sexual interest and violence against women and girls were their point of
view. J. Barker was arrested for language used by the accused and posted in
internet news group are based on torture, rape, murder of woman citing same
name of their classmate at the University of Michigan. Barker was arrested and the
Judicial Magistrate recognized him as a threat to the community and ordered to
detain him which was affirmed by the District Court. But on 8th March, 1995
court released accused on bond on his motion.
473
(1995) 890 F.Supp, 1375 (E.D. Mich).
474
(1996) 74 F.3d 701 (6th Cir).
157
prohibitions of the statute which addresses commercial dial-a-porn operations if
criminal at all. But the court rejected his contention and ruled that the statute must
be construed to affect the intent of Congress, which was to prevent the channels
of interstate commerce from being used to disseminate any obscene matter.
In Martiz, Inc. v. Cyber Gold, Inc.477, case the US District Court for the
Eastern District of Missouri had reached a similar conclusion in finding that it had
jurisdiction over a California defendant in a trademark infringement case, where
the defendant’s only contact with the state was through its California based
website, which was accessible in Missouri.
475
U.S.C. Constitution Amendment XIV.
476
(1996) 937 F. Supp. 295 (S.D.N.Y).
477
(1996) 96-CV01340 (E.D. Mo).
478
(1997) 95 Cir 4037 (S.D.Ca).
158
held the fact that defendant has web site used by Californians cannot establish
jurisdiction by itself.
479
Shaffer v. Heitner, (1997) 433 US 186: 53 L Ed 2d 683.
480
(1998) US Dist. Lexis 13154.
481
(1996) 65 USLW 2440.
482
Asahi Metal Industry Company v. Superior court, (1987) 480 U.S. 102.
483
Simatra v. National Enquirer, 854 F. 2d at 1119.
484
(1996) 939 F. Supp. 1032 (S.D.N.Y).
159
international civil case of trademark infringement. In this case the court sorts out
the issue of cyber jurisdiction at international level by relying on a previous
injunction in 1981 which is passed against the defendant to base its finding of
jurisdiction. The courts now required that the defendants must provide more than
mere accessibility to a Website in order to support personal jurisdiction in
cyberspace. In this case the court indicates on the basis of case laws that they are
inclined to expect the information provider to determine where the user is located
and to block access to their site if access would be illegal in the locale of user.
In U.S. v. Gorshkov486 case, it was found by the FBI that there has been a
series of breakdown into the computer systems of various businesses in the United
States. The court held in the case that the act of downloading information from a
computer in country by the FBI agents do not constitute a search or seizure since
the copying of the data on the Russian computers did not interfere with the
possessory interest of the defendant in the data.
485
(1997) 106 F. 3d 1069, [1st Circuit Court].
486
(2001) W1 1024026.
160
United States of America (U.S.A).
Under the U.S. federal system each of the fifty states of United States is
also permitted, within the constraint imposed by federal law, to pass additional
substantive criminal laws to regulate computer law at state level.488 The Youth
Internet Safety Survey (YISS), a nationally representative study of 10 to 17 year
old, has researched youth internet victimization and involvement for multiple
years.489 As damage to companies increased due to the clandestine efforts of
individuals outside the companies and disgruntled employees within, Congress
amended the Act in 1986, 1994, 1996, 2001 and 2002 to expand protections to
computers and information in the private sector. Congress also beefed up the
penalty provisions in the Act and added civil remedies.490 In USA, for the year
2015, Cost of Data Breach Study by IBM and the Ponemom Institute revealed that
the average total cost of a data breach increased from $ 3.52 million in 2014 t0 $
3.79 million. Another study said that cyber crime will become a $ 2.1 trillion
problem by 2019.491
Hacking
The United States of America judiciary has played an important role in
dealing with the unauthorized access. The US Department of Justice had
pronounced the punishments for hacking under 18 USC s. 1029 of the Computer
487
Supra note 11.
488
Supra note 10, p.40.
489
Supra note 11, p .48.
490
Supra note 14.
491
Limor Kissem, “2016 Cyber Crime Reloaded: Our Prediction for the Year Ahead”, (Last
Modified on Jan. 15, 2016), available at: https://securityintelligence.com/2016-cybercrime-
reloaded-our- predictions-for-the-year-ahead/ (visited on Dec. 2, 2016).
161
Fraud and Abuse Act, 1986. In United States v. Morris492 case, the Circuit Court
concluded that s. 1030 (a) (5)(A) of the said Act does not require the Government
to demonstrate that the defendant intentionally prevented authorized use and
thereby caused damages.
After this case, in Briggs v. State of Maryland493 case, the Court held that
the statute of the state of Maryland that criminalizes unauthorized access to
computers was intended to prohibit use of computers by those not authorized to
do so in the first place, and may not be used to criminalize the activities of
employees who use employers’ computer system beyond the scope of their
authority to do so.
492
(1991) 504 F 2d.
493
(1998) 348 MD 470.
494
(1997) 106 F.3d 1069 (1st Cir).
495
(1995) Commonwealth No. 60488.
162
the accused had authority to insert data in a Commonwealth computer for the
purpose of section 76C of the Crimes Act, 1914 when the computer would
physically accept his insertion of data, but the accused was not permitted by his
employer to insert the relevant data without specific permission given by the
employer prior to the insertion and but such permission was not given to him.
Section 76C of the Crimes Act, 1914 provides that if a person who intentionally
and without authority or lawful excuse destroys, erases or alters data is guilty of
an offence. In this case, the Court held that a person commits an offence under
this section if he lacks the authority to insert the particular information into a
computer, notwithstanding that he has general authority to insert other
information into such computer. The Court further held that an entry intentionally
made without lawful excuse and known to be false is made without lawful
authority.
In United States v. Ivanov496 case, the Computer Fraud and Abuse Act was
discussed regarding its extraterritorial applicability. In this case the accused was
charged for illegally accessing the computer systems of a web hosting service
under the Computer Fraud and Abuse Act. He contended that he was in Russia at
the time of commission of offence that’s why he cannot be prosecuted under the
above mentioned Act. But the court rejected his contention and held that he can
be prosecuted under the interstate and foreign commerce of the Act. The Act
applied not only within the boundaries of America but also beyond it.
In United States v. Harris497 case the accused was charged and convicted by
the court under Computer Fraud and Abuse Act for unauthorized access to her
employer’s computer system and obtained the Social Security Numbers of several
people in order to target them in a fraudulent credit card scheme.
496
(2001) 175 F Supp 2d 367 (D. Conn).
497
(2002) 302 F 3d 72 EDNY (2nd Cir Court).
498
United States Department of Justice, Dec. 2, 2015, available at: https://www.justice.gov/usao-
cdca/pr/operator-revenge-porn-website-sentenced-2-years-federal-prison-email-hacking-scheme
(visited on April 9, 2017).
163
United States Attorney of Department of Justice499 that three men of Florida, New
Jersey and Maryland were arrested and charged for Hacking, Spamming Scheme
and identity theft scheme that have targeted personal information of 60 million
people and generated more than $ 2 million in illegal profits.
Cyber Terrorism
The United States of America judiciary has also played an important role
for combating the cyber terrorism which is emerging in the recent times. In United
States v. Robert Tappan Morris500 case, Morris was pursuing Ph.D from the
Cornell University in computer science in the year 1988. The Cornell University
has given him an account on the computer to use it and after that he has
discovered “worm” called as one form of “virus” which may be used to
demonstrate the inadequacies of security systems and networks. Then, he released
the worm through a computer at the Massachusetts Institute of Technology (MIT)
on 2nd November 1988 which caused damage and infection very fast to other
computers. He then discussed it with his friend at Harvard and sent an anonymous
message from Harvard over network, instructing clogged, but it was too late
because by that time military sites, medical research sites, installations sites,
Universities websites were infected. The court found him guilty under title, 18
USC s. 1030(a) (5) (A) and was sentenced to 3 years of probation, 400 hours of
community service, a fine of $10,050 and the costs of his supervision. This was
affirmed by the circuit court in the year 1991 and held that section 1030(a) (5) (A)
does not require the Government to demonstrate that the defendant intentionally
prevented authorized use and thereby caused loss. There was sufficient evidence
for the jury to conclude that Morris acted “without authorization” within the
meaning of s. 1030(a) (5) (A) and s. 2(d) of the Computer Fraud and Abuse Act
1986. That conviction was made appropriate by the District Court.
499
United States Department of Justice, District Court of New Jersey, Dec.15, 2015,
available at: https://www.justice.gov/usao-nj/pr/three-men-arrested-hacking-and-spamming-
scheme-targeted- personal-information-60-million (visited on April 9, 2017).
500
(1991) 928 F. 2d 504 [Cert. denied, 502 U.S. 917 (1991)].
501
US Department of Justice (2003).
164
who were killed during Iraqi operation. He himself informed to FBI about his act
and then was charged for committing cyber crime.
In United States v. Robert Lyttle502 case, the defendant was pleaded guilty
in Federal Court for hacking into government computers and defacing government
websites violating Title 18 U.S.C. s. 1030. The defendant was admitted his crime
that he had unlawfully accessed computer system of various government agencies
for obtaining confidential files and data to deface websites hosted on computers.
The court held his conviction and sentenced him for cyber terrorism under the Act.
Cyber Pornography
The judiciary of United States of America has played an important role to
overcome with the cyber pornography. The test of obscenity was laid down firstly
in the case of Regina v. Hicklin504 as the tendency “to deprave and corrupt those
whose minds are open to such immoral influences and into whose hands a
publication of this sort may fall”. But later on this test of obscenity was slightly
changed in United States v. One Book Entitled “Ulysses”505 case by stating that the
criterion for obscenity was not the content of isolated obscene passages but rather
“publication taken as a whole has a libidinous effect”. Then after the Hon’ble U.S.
Supreme Court redefined the obscenity in Roth v. United States506 case by stating
that “whether, to the average person, applying community standards, the
dominant theme of the material taken as a whole appeals to prurient interests.”
502
US Department of Justice (2005).
503
US Department of Justice (2007).
504
(1868) 3 QB 360.
505
(1934) 72 NY 705.
506
(1957) 354 US 476.
507
(1997) 997 F. Supp. 246 (D. Conn).
165
speech protected under the First Amendment. The defendant contended that he had
contacted with the victim through the internet which was constitutionally
protected and could not be used as evidence against him. But the court rejected his
contention by holding that the statutes under which the charges were brought do
not impermissible limit speech and also they criminalize the use of means of
interstate commerce for the purpose of luring a minor into sexual activity.
In United States v. Hilton508 case, a federal grand jury charged Hilton for
criminal possession of computer disks containing three or more images of child
pornography in violation of 18 U.S.C. $ 2252A (A)(5)(B). He challenged the state
without denying the charges. He contended to dismiss the charges on grounds that
the act was unconstitutional under the First Amendment. The U.S. district court
was also agreed with his contention regarding the vagueness of the definition of
child pornography but in this case the issue was raised whether the CPPA poses
substantial problems of over breadth and which would sufficient to justify
overturning the judgment of the lawmaking branches. It was held by the court that
the Control and Privacy Protection Act (CPPA), 2000 is not unconstitutionally
overbroad and the judgment of the district court is reversed.
In United States v. Mathews509 case, the court held that under federal law
each transfer of child pornography image by email is a separate offence. The
defendant contended that the successive email transmissions were also the part of
a single online conversation. But the court rejected his contention. The Appellate
court affirmed this decision.
Cyber Stalking
511
(1999) 35 F. Supp. 852 (D. Utah).
512
(2002) 95 Ohio St 3d 254 : 767 NE 2d 242.
513
(2002) 28 Cal 4th 396: 48 P 3d 1148.
514
Supra note 79.
167
The stalker's ability to access the victim at any time and from any distance
undermines the victim's sense of security and might lead to the victim's persistent
worry. In July of 2013, New York prosecutors obtained an arrest warrant for
Jessica Parker, a New Zealand woman who had been online stalking a writer
called Melissa Anellin for five years. “You will have much to fear from me in the
future months,” one e-mail from 2009 stated. This isn't over until someone is
bleeding to death on the floor.” Despite the distance, the internet enabled Parker
to stalk, threaten, and terrorise on a regular basis, instilling fear and eroding a
sense of security.515
515
Steven D. Hazelwood and Sarah Koon Magnin, “Cyber Stalking and Cyber Harassment
Legislation in the United States: A Qualitative Analysis”, International Journal of Cyber
Criminology, Vol. 7 (2), July- December, 2013, p.157, available at:
http://www.cybercrimejournal.com/hazel woodkoonmagninijcc2013vol7issue2.pdf (visited on
Jan. 27, 2017).
516
R. v. Vose, (1999) VSCA 200.
517
United States Department of Justice, December 4, 2015, available at: https://www.justice.gov/
opa/pr/defendant-pleads-guilty-tallahassee-cyberstalking-case (visited on April 9, 2017).
518
Available at: https://www.justice.gov/opa/pr/former-us-state-department-employee-
pleads-guilty- extensive-computer-hacking-cyberstalking (visited on April 9, 2017).
168
victims in the United States.
Cyber Defamation
The judiciary of United States has played an important role in dealing with
the cyber defamation emerged in cyber space day-by-day. In Anderson vs. New
York Telephone co519 case, the Court held a defendant must have had a direct hand
in disseminating the material whether authored by another, or not in order to be
deemed to have published a libel. If Xerox Corporation had no notice then it could
not be held liable.
519
(1974) 35 NY 2d 746.
520
(1995) N.Y. Misc. LEXIS 229.
521
(1998) 992 F. Supp. 44.
522
(2002) Asker and Baerum Distt. Court, Norway.
523
(2000) N.Y. Court of Claims.
524
(1991) 504 F 2d.
525
(1986) 160 C 129.
526
(1990) 739 F Supp 414 (ND III).
527
(1997) 106 F.3d 1069.
528
(1999) 99-889M.
529
(2001) 255 F. 3d 728.
530
(1996) 947 F Supp. 1227 (NDIII).
531
(1997) US Dist. LEXIS 3338 (S.D.N.Y.).
532
(1997) US Dist. LEXIS 10314 (C.D. Cal).
533
(1998) 141 F 3d 1316.
169
desisting the use of the domain name by him. But the plaintiff rejected this offer
and then the defendant registered the other trademark ‘Panaflex’ as a domain
name and posted the word ‘hello’ on the website. After this the plaintiff brought a
suit for trademark infringement, trademark dilution and unfair competition against
the defendant. The District Court held the defendant liable for dilution and
enjoined him from using plaintiff’s marks or marks similar to them in connection
with any commercial activity.
In Marks & Spencer PLC v. One in A Million Ltd.534case, the Court observed
after finding the respondent to be guilty of Cyber squatting that any person who
deliberately registers a domain name on account of its similarity to the name,
brand name or trademark of an unconnected commercial organization, must
expect to find himself on the receiving end of an injunction to restrain the threat of
passing off, and the injunction will be in terms which will make the name
commercial useless to the dealer.
The United States judiciary is also playing an important role in dealing with
the email related crimes. In United States v. Kammersell535 case, the Court found
that federal interstate jurisdiction was proper where defendant sent a threatening
email via Initialism of America Online, an interstate service, even though the
message was sent from and received in the same state. The Court held that federal
laws prohibiting transmission in interstate commerce of communications
containing threats applied, because the e-mail was sent via a commercial online
service and routed outside the state before reaching its final destination within the
state. The 10th Circuit Court of Appeals affirmed this decision.
534
(1998) FSR 265.
535
(1999) 196 F.3d 1137 (Cri Utah).
536
(2001) 19304-7-III (Wash. Ct. App)
170
transmitted by telephone, telegraph, radio, or other device….” The court held that
email by its nature must be recorded, and an email user impliedly consents to the
copying by the act of using email. Accordingly, the court affirmed the lower court’s
decision to admit the email messages.
There are a large number of cyber laws passed and amended in United
States of America. But instead of these laws the cyber crimes are increasing day
by day. For example, in United States of America for the year 2015, Cost of Data
Breach Study by IBM and the Ponemom Institute revealed that the average total
cost of a data breach increased from $ 3.52 million in 2014 t0 $ 3.79 million.
Another study said that cyber crime will become a $ 2.1 trillion problem by
2019.538
537
“Cyber Thieves are Caught, But conviction is Wobbly”, Hindustan Times, at 18 (August 9,
2006)
538
Supra note 72.
171
able to track down these perpetrators and bring them to justice.” 539
539
Donald Brackman’s remarks on the 2009 Annual Report on Cyber crime released by the
Federal Bureau of Investigation (FBI) on March 13, 2010.
172
CHAPTER - VI
CYBER CRIMES IN UNITED KINGDOM:
LEGISLATIVE AND JUDICIAL RESPONSE
6.1 Introduction
Digital technology is encompassing in all walks of life, all over the world
and has brought the real meaning of globalization.540 This cyber system is means
for two sided
i.e. at the one side it provides opportunities to communicate and the other
side some cyber criminals use it for the purpose of exploiting others with the
medium of the Internet and other network communications which are international
in scope.
People can visit the entire world, speak with anyone they want, see anyone
they want, even thousands of miles away, have online discussions with each
other, sell and purchase things, access banking facilities, create information, and
exchange information online with a single click of a keyboard and mouse.541 This
is another problem in cyber space of not having the specific location.
540
Ajeet Singh Poonia, “Cyber Crimes: Challenges and its Classification”, International Journal
of Emerging Trend & Technology in Computer Science, vol. 3, No. 6, Nov. –Dec. 2014, p. 119,
available at: http://www.ijettcs.org/Volume3Issue6/IJETTCS-2014-12-08-96.pdf (visited on
March 8, 2015).
541
M. Dasgupta, Cyber Crime in India- A Comparative Study, 2009, p. 1.
542
Prafulla Kumar Nayak, “Cyber Attacks More Terrifying Than Terrorists- A Critical Analysis”,
Indian Bar Review, Vol. XL, No.2, 2013.
173
this war as cyber war or net war.543 At present, the internet has become a way to
engage in cyber war like Taiwan against China, Israel against Palestine, India
against Pakistan, China against the United States of America etc.
The ever-soaring cyber crime graph and the money loss connected thereto,
the unending innovations and the formidable challenges did not spare even the
most advanced nations. The technological strokes were felt even in United
Kingdom and accordingly, it started responding to it.545 Because for every
country’s success legislature and judiciary are important organs for making the
sufficient laws, its enforcement by punishing wrongdoer, maintaining good
international relations and to attract investment. A country needs some degree of
order, laws and continuity and its better and timely enforcement for functioning in
a good and systematic way. Safety and security laws have long been merely a
question of protection against dangers from the physical world. This new cyber
world is increasingly intertwined with the traditional offline world and therefore
safety laws and its enforcement in cyberspace have become a pre-requisite for a
well-functioning country. In this chapter an attempt has been made to discuss the
cyber legislations and to find out the role of judiciary for combating these new
types of crime emerging in United Kingdom.
543
Supra note 2, p. 221.
544
Sun Tzu and Col. John M. Fabry, Cybercrime, Cyber Terrorism and Network Warfare: The
Next Generation of Concerns for Users of Networked Information Systems, 1999, p. 161.
545
Talat Fatima, Cyber Crimes, 2011, p. 78.
174
responding to the online infractions. The first phase implies a situation when
traditional laws per se were applied to criminal activities online and in a number of
cases like R.v. Preddy546 and R. v. Gold547, it was difficult for the courts to apply
the real life provisions to automated situations. This led to the second phase when
the need for computer crime specific legislation was hard-pressed.548 And lastly,
the Computer Misuse Act, 1990 has been passed on the basis of the Law
Commission Report on ‘Computer Misuse’ published in October, 1989 and
certain other recommendations.
The General Assembly of the United Nations by resolution dated January 30,
1997 has adopted the Model Law on Electronic Commerce regarding electronic
mail, data interchange, internet etc. to adopt uniform, international, adequate and
effective law.549 The United Nations Model law UNCITRAL provides that there
must be equal legal treatments for users of electronic communication and paper
based manual communication. There are number of offences which have been
emerged in the cyber space like cyber defamation, cyber pornography, child
password sniffing, spoofing, email bombing, spamming, phishing,
telecommunications fraud, Internet pedophilia, computer network break-ins,
industrial espionage, software piracy, the availability of illicit or unlicensed
products and services etc. and also there are various emerging cyber offences
now-a-days like cyber terrorism, cyber hacking, cyber laundering , credit card
fraud etc.
United Nations alerted states about the importance of putting special laws to
deal with cyber crime. Many Resolutions on combating the criminal misuse of
information technologies were adopted by the General Assembly, the 13th of May
546
(1996) 3 All ER 481.
547
(1987) 3 WLR 803: (1988) 2 All ER 186. In this case, the Court of Appeals, helplessly
applied the Forgery and Counterfeiting Act, 1981 to unauthorised access to password codes of
various mailboxes.
548
Supra note 6.
549
B.B. Nanda and R.K. Tewari, “Cyber Crime- A Challenge to Forensic Science”, The Indian
Journal, 2000, pp. 102-103.
550
Steven Furnell, Cybercrime: Vandalizing the Information Society, 2004, p. 27.
175
2005 resolutionincluded:551
Unauthorized Access
In the United Kingdom, Professor L. Lloyd says553, “the stereotypical
depiction of a cyber hacker tends to be that of a male teenager in a greasy T-shirt
and torn jeans who spend hours slumped over a terminal, eyes gazing fixedly at
the green glow of the VDU monitor. Nowhere is safe, no one can keep him out,
no one knows of the scale of the threat, the silent deadly menace stalks the
551
S. Schjolberg and A.M. Hubbard, “Harmonizing National Legal Approaches in Cybercrime”,
International telecommunication Union, WSIS Thematic Meeting on Cyber Security, Geneva,
June 28-July 1, 2005.
552
World Summit on the Information Society, Tunis, Nov. 18, 2005, available at: http://www.itu.
int/net/wsis/docs2/tunis/off/6rev1.html (visited on Feb. 14, 2017).
553
L.J. Lloyd, Information Technology Law, 2000, p. 27.
176
networks as seen in R v. Gold.”554
After this the United Kingdom Audit Commission has recommended some
preventive measures with the British standard for information security
management on the basis of prevention is better than cure. In this reports it was
identified that there are certain security polices which must be followed urgently
including firstly, cyber security which is adequate with business strategy,
secondly, clear statement of the importance of cyber security, thirdly, clear
statement of the adequate and proper law regarding Information Technology
security, fourthly, clear statement of the responsibilities of staff to protect
investment in new Technology and computer data, fifthly, clear statement of the
steps taken by the management to encourage to adopt and maintain high security
standards as well as to enforce it in reality by the management, sixthly, statement
of the steps taken to reduce computer misuse i.e. secure password systems etc. and
lastly, Internal control mechanisms.
In United Kingdom, before the Computer Misuse Act (CMA), 1990, there were
laws like the Theft Act and the Telecommunications Act, 1984 which prohibits
misuse of the public telecommunications. The Interception of Communication
Act, 1985 prohibits forgery and other criminal activities in the course of
transmission by the public telecommunication systems. The Data Protection Act,
1084 was also passed to protect computer data and database from any violations or
damage. But in 1988, the Law commission submitted its report in which
suggestions and recommendations has been made for enacting a specific law on
computer misuse. On these recommendations the Computer Misuse Act (CMA),
1990 has been passed.
554
(1988) AC 1060.
177
in Computer Misuse Act relating to hacking by the part 2 of Serious Crime Act,
2015 which provides that if any unauthorized act results in serious damage to
human welfare or national security, than the person shall be liable upto the
maximum punishment of life imprisonment and if any unauthorized act results in
serious damage to economy or the environment than the maximum sentence is 14
years.
Cyber Terrorism
Generically, cyber terrorism consists of using computer technology to
engage in terrorist activity.555 This type of cyber crime can involve using the
internet to communicate with other terrorists, to transfer the money needed to fund
a terrorist act or any other related activity. Cyber terrorism may be defined to be
the premeditated use of disruptive activities, or the threat thereof, in cyber space,
with the intention to further social, ideological religious, political or similar
objectives, or to intimidate any person in furtherance of such objectives. 556
555
Susan W. Brenner, “At Light Speed: Attribution and Response to Cybercrime/ Terrorism/
Warfare”, Journal of Criminal Law and Criminology, vol. 97, No. 2, 2007, p. 386, available
at: http://scholarlycommons.law.northwestern.edu/cgi/viewcontent.cgi?article=7260&context=jclc
(visited on Feb. 13, 2017).
556
Parthasarathi Pati, “Cyber Crimes”, available at: http://www.naavi.org/pati/pati_
cybercrimes_ dec03.htm (visited on Feb. 13, 2017).
557
Syed Mohd. Uzair, “Cyber Crime and Cyber Terrorism in India, A thesis submitted to Aligardh
Muslim University, 2013, p. 68, available at: http://shodhganga.inflibnet.ac.in/ bitstream/
10603/63591/9/09_chapter%202.pdf (visited on Feb. 13. 2017).
558
Dorothy Denning, Activism, Hactivism and Cyber terrorism: The Internet as a tool for
Influencing Foreign Policy, 2001, p. 241.
559
Supra note 2, p. 204.
178
the rise of threats and attacks through superhighway using information technology
to the Government, Government agencies, Departments and people.
Before the Terrorism Act, 2000 United Kingdom enacted the Data
Protection Act, 1984 and in the year 1990 to prevent and control cyber terrorism
and other crimes the Computer Misuse act was passed after R. v. Gold case.560
After this the Terrorism Act, 2000 is passed which defines the term “Terrorism”
which includes the use or threat of action that is designed seriously to interfere
with or seriously to disrupt an electronic system designed; to influence the
government or to intimidate the public or a section of the public, and made for the
purpose of advancing a political, religious or ideological cause”.
Cyber Pornography
Pornography includes hosting the website containing this prohibited
material, use of computers for producing these obscene materials and
downloading through the internet the obscene material. These obscene matters
may cause harm to the minds of adolescent and tend to corrupt their minds.562 In
simple terms, cyber pornography means to describe or to show sexual acts in
order to cause sexual excitement through e-books, e-films, images, videos etc. by
using internet on cyberspace.
560
(1988) 1 AC 1060.
561
Clive Walker, “Cyber Terrorism: Legal Principle and Law in the United Kingdom”, Penn State
Law Review, vol. 110, No. 3, July 7, 2006, p. 630.
562
Ritu Dhanoa, “Cyber- Crime Awareness”, International Journal in Multidisciplinary and
Academic Research, vol.2, No.2, 2014, p. 4, available at: http://ssijmar.in/vol2no2/vol2no2.24.pdf
(visited on Sep. 22, 2014).
563
Chris Reed, Computer Law, 2003, p. 300.
179
1988 which makes it an offence for a person who have any indecent photograph
of a child in his possession under section 160.
564
“Cyber Pornography”, available at: http://www.lawyersclubindia.com/articles/Cyber-
Pornography- 6396.asp (visited on April 12, 2016).
565
Section 1(2) of Obscene Publications Act, 1964.
180
Cyber Stalking
Cyber stalking is use of the Internet or other electronic means to stalk
someone. This term is used interchangeably with online harassment and online
abuse.566 Mostly cyber stalking involves following a person’s movement across the
internet by positing threatening messages to the victim or by entering the chat-
rooms frequented by the victim or by constantly bombarding the victim with the
e-mails etc.567 Stalking is defined as persistent acts of harassment directed at a
victim, such as following the victim, making harassing phone calls, killing the
victim's petitioner, vandalising the victim's property, and leaving written
messages or objects. Following stalking, major aggressive acts such as bodily
injury to the victim may occur. Everything is contingent on the stalker's
actions.568
In United Kingdom, there are various laws which deal with stalking and
cyber stalking. The Protection of Freedoms Act, 2012 has been passed which
created two new offences of stalking by inserting sections 2A and 4A into the
Protection from Harassment Act (PHA), 1997. Section 2A creates a specific
offence of stalking and a person guilty of it shall be liable for a imprisonment not
exceeding 51 weeks or with fine not exceeding level 5 of standard scale or both.
Section 4 A creates the offence of stalking involving a fear of violence or serious
alarm or distress and a person guilty of it shall be liable for a imprisonment not
exceeding 5 years or with fine or both on indictment or a imprisonment not
exceeding twelve month or fine not exceeding statutory maximum or both on
summary conviction. Under this Act, stalking element is defined as those acts
which include monitoring a person online, contacting a person, loitering in a
public or private place, interfering with property or spying.
Cyber Defamation
566
B. Muthukumaran, “Cyber Crime Scenario in India”, Criminal Investigation Department
Review, Jan., 2008, p. 18, available at: http://www.gcl.in/downloads/bm_cybercrime.pdf (visited
on Feb. 13. 2017).
567
Supra note 23.
568
Supra note 18, p.49.
181
Any derogatory statement, which is designed to injure a person’s business
or reputation, constitutes cyber defamation. Defamation can be accomplished as
libel or slander. Cyber defamation occurs when defamation takes place with the
help of computers and/or the Internet. E.g. someone publishes defamatory matter
about someone on a website or send e-mails containing defamatory information to
all that person’s friends.569 It is the wrongful and intentional publication of words
or behavior concerning another person’s status, good name, or reputation in
society. It is not defamatory to make a critical statement that does not have a
tendency to cause damage, even if the statement turns out to be untrue.570
In United Kingdom, before the passing of Defamation Act, 1996, the Malicious
Communication Act, 1988 regulates the electronic communications with serious
consequences through controlling technology if it is abused or used to intimidate,
threaten or harass other people. It also deals with online abuse but now this Act
considered as outdated and needs to be reformed. In United Kingdom, the
Defamation Act, 1996 was passed with an intention to clarify the defence of
innocent dissemination for internet service providers. Section 1 (1) and 1(3) of the
Defamation Act, 1996 states that whoever is not the editor, publisher or author of
the material may have a defence to a defamation action. The provider in the UK
must show that it had no reason to suspect that it was publishing defamatory
material after taking all reasonable care. The liability against overseas publishers
is still exists.
The Defamation Act, 2013 enhancing the scope existing defence for website
operator, public interest and privileged publications. This Act governs the
processes which the website operator must follow when informed about alleged
defamatory comments on their site to avoid of becoming liable for that material
themselves. Under this Act, a statement can be said to be defamatory if its
publication caused or is likely to cause serious harms to individuals or business
reputation. Under the current legal measures, any person who threaten and offend
others on social media shall be liable to a maximum sentence of prison of six
month and a fine of 5,000 pounds or both.
Phishing
The term ‘Phishing’ may be defined as the receipt of unsolicited emails by
customers of financial institutions, requesting them to enter their username,
569
Id, p. 50.
570
Sallie Spilsbury, Media Law, 2000, p. 60.
182
password or other personal information to access their account for some reason.571
In this category of cybercrimes the fraudster are remained conscious to
unauthorized access to the customer’s online bank account for the purpose of
transferring the funds contained in that account in their own accounts. The
customers are directed to aware about the original institutions website when they
want to click on the given links in the email for entering their information for any
transaction.
In United Kingdom, a new Anti Fraud Act has been passed in 2006 for
England, Wales and Northern Ireland which is known as The Fraud Act, 2006. It
came into effect on Jan. 15, 2007. This Act banned the using of phishing kits for
sending and creating bogus e-mails by millions. Before this, there was no proper
law which deals with phishing. This Act punishes fraud by false representation,
fraud by failing to disclose information and fraud by abusing position. It provides
that a person found guilty of fraud was liable to fine or imprisonment upto twelve
months on summary conviction or fine or imprisonment upto ten years on
summary indictment.
The United Kingdom saw a significant rise in phishing attacks during 2015
as cybercriminals increasingly targeted consumers with online scams. Overall, the
number of reported phishing scams reported from November, 2014 to October,
2015 is 95,556 according to figures from Action Fraud, a 21 percent increase over
the same period of the previous year.572
Cyber Fraud
While discussing cyber fraud in the United Kingdom we must refer to
David Bainbridge. He said “as far as the criminal is concerned, the creation of an
account in his own name, followed by instructions via a computer terminal to the
main computer to transfer large sums into that account is much more attractive
than walking into a bank with a shotgun.573 Under the English Law, section 15 of
the Theft Act, 1968 required that deception is the essential element whether
relating to fact or law, whether it is made by words or conduct for liability under
the Act.
571
Mohit Goyal, “Ethics and Cyber Crime in India”, International Journal of Engineering and
Management Research, vol. 2, No. 1, Jan., 2012, available at: http://www.ijemr. net/Jan
2012/Ethics And Cyber Crime In INDIA (1-3).pdf (visited on Feb. 13, 2017).
572
Michael Moore, “Phishing Scams Cost UK Consumers £ 174m in 2015”, Tech Week Europe,
Jan. 18, 2016, available at: http://www.techweekeurope.co.uk/security/cyberwar/uk-phishing-
attacks-rise- 2015-183964#VH5VOCzvS4mFyS1H.99 (visited on Sep. 19, 2016).
573
David Bainbridge, Introduction to Computer Law, 2000, p. 291.
183
In United Kingdom, section 15 of the Theft Act, 1968 could not be
successfully applied to internet fraud. Therefore, in R. v. Preddy574 case, the issue
was raised regarding the application of the traditional legal terminology on the
intangible transactions or situations. In this case the need arose for the first time to
abandon the element of ‘deception’ which is the essential ingredients of traditional
fraud. After this case, the Council of Europe Convention on Cybercrime
formulated an offence of fraud without the element of deception under article 8
under heading ‘Computer related Fraud’.
After this, United Kingdom has taken active initiatives to adopt criminal
law to curb computer misuses. The Scottish Law Commission published a
memorandum in the year 1986 and a report in the year 1987 on computer misuse.
Subsequently, in 1988- 89, the United Kingdom Law Commission published their
report through their working paper.575 And lastly, Computer Misuse Act was
passed in June, 1990 by following their recommendations which came into force
on 1st April, 1990.
In the United Kingdom the Audit Commission has conducted four triennial
surveys of computer related fraud based on a definition referring to ‘any
fraudulent behavior connected with the computerization by which someone
intends to gain financial advantage’.576 The computer Misuse Act, 1990 provides
that a person is guilty of an offence if he intentionally causes a computer to
perform any function to secure access to any computer; he intends to secure
unauthorized access; and he knowingly causes the computer to perform the
function for these two above mentioned purposes.577 With related to this, section
17 also provides that the access is considered as unauthorized only if a person is
not entitled to control access of the kind in question to the programme or data and
secondly, he does not have consent to access by him of the kind in question to the
programme or data from any person who is so entitled.
Cyber-Squatting
In some countries there are specific cyber squatting laws like the Anti Cyber
squatting Consumer Protection Act in United States of America. In the United
Kingdom, there are not specially domain names laws but the Courts have extended
574
(1996) 3 All ER 481.
575
Supra note 2, p. 110.
576
Amita Verma, Cyber Crimes & Law, 2009, p. 202.
577
Section 1 of Computer Misuse Act, 1990.
184
the existing trademark law to the cases of cyber-squatting in Harrods plc v. UK
Network Services Ltd578., in which the court accepted the principle that the law
relating to trademarks and passing off can be applied to domain names. It means
that if any person who deliberately registers a domain name on account of its
similarity to the name, brand name, or trade mark of an unconnected commercial
organization must expect to find himself at the receiving end of an injunction to
restrain the threat of passing off, and the injunction will be in terms which will
make the name commercially useless to the dealer. It is further added that the use
of a trademark in the course of a business of a professional dealer for the purpose
of making domain names more valuable and extracting money from the trade
mark owner is a use in the course of trade.
In the late 1989, the Trojan virus was distributed via floppy disk by a
computer calling itself ‘PC Cyborg’. The said Trojan encrypted the contents of the
victim’s hard disk after 90 re-boots, leaving just a README file containing a bill
and a Post Office Box address in Panama to which the payment was to be sent.580
The Trojan was later on extradited to United Kingdom to stand trial on charges of
blackmail and damaging computer systems by its the alleged author Dr. Joseph
Popp.
578
(1997) 4 EIPR D106.
579
Supra note 6, p. 346.
580
David Emm, “Cybercrime and the Law: A Review of UK Computer Crime Legislation” (Last
Modified on May 29, 2009), available at: http://securlist.com/analysis/publications/
36253/cybercrime-and-the- law-a-review-of-uk-computer-crime-legislation/ (visited on Feb. 14,
2017).
185
Act, 1990.581 Section 4 and 5 of the said Act provides that so long as the cyber
offence is significantly linked to the United Kingdom, it is not necessary to be
committed within the territory of United Kingdom. The Computer Misuse Act,
1990 may be applied to establish that the offence is significantly linked to it even if
the act committed is not a crime in the place of commission but it is a crime in
United Kingdom. The Council of Europe Cybercrime Convention under Article 22
provides that the contracting parties to the treaty are obliged to follow the certain
rules for the purpose of establishing jurisdiction over the criminal offence and the
Unite Kingdom, being the member of the above mentioned convention is also
obliged to follow and abide by these rules which are inserted in the said
convention.
The Computer Misuse Act, 1990 is the relevant law that establishes
jurisdiction on the United Kingdom for the violation of cybercrime. The crimes
covered by the law are various acts of computer misuse which are defined under
sections 1 to 3 which includes unauthorized access with intent to commit or
facilitate of further offence and unauthorized modification of computer material. This
Act was further amended by the Police and Justice Act, 2006 which enhances the
punishment under the Act for committing the cybercrime.
581
Adel Azzam Saqf Al Hait, “Jurisdiction in Cybercrimes: A Comparative Study”, Journal of
Law, Policy and Globalization, vol. 22, 2014, p. 80, available at:
http://www.iiste.org/Journals/index. php/JLPG/article/viewFile/11050/11351 (visited on Nov. 30,
2016).
582
(2010) C 385 W, available at: https://www.publications.parliament.uk/pa/cm201011/
cmhansrd/ cm100615/ text/100615w0011.htm#10061561001632 (visited on April 10, 2017).
186
Extradition treaty was signed between United Kingdom and United States. Then
Gary was extradited on the basis of the said treaty and charged and arrested in the
Virginia and New Jersey. But Gary challenged the extradition and contended that
the location of cyber crime and computer was in United Kingdom. In this case it
was held by the Crown Prosecution Service that United Kingdom had jurisdiction
only when the offence was significantly linked to United Kingdom.
Unauthorized Access
The judiciary has played an important role in dealing with the cyber crimes
of hacking. In R. v. Gold585 case, two alleged computer hackers who were
583
(1988) 1 AC 1063.
584
National Crime Agency (UK), Cyber Crime Assessment, 2016, available at: www.national
crimeagency.gov.uk/publications/709-cyber-crime-assessment-2016/file, (visited on Feb. 14,
2017).
585
The Office of National Statistics(UK), Cyber Crime Assessment, 2016, available at:
187
journalists by profession gained access into the British Telecom Prestel Gold
computer network without permission and modified the data. One of the accused
also accessed the personal files of the Duke Edinburgh on his personal computer
and left there a message “Good Afternoon Hrh Duke of Edinburgh”. They
contended that they had gained access into the network for the purpose of
highlighting the deficiencies in its security system. But the court rejected their
contention and charged them under section 1 of the Forgery and Counterfeiting Act,
1981, for making the false instrument with the intention to use it for the purpose of
inducing others. Under section 8(1) of the said Act though the instrument is
recorded or stored on disc, tape, soundtrack or other device but it can be treated as
false instruments. The crown court held them guilty and imposed $ 750 and $ 600
fine respectively. Appeal court quashed their conviction and later on, this was
confirmed by the House of Lords. The House of Lords confirmed this sensible
judgment and declared hacking as not only an illegal act but also a crime which
needs to prevent immediately.
Therefore, after the above mentioned case, the House of Lord’s appointed
the Law Commission for their recommendations and suggestions to make law to
prevent and control hacking in the year 1988. They submitted their report in the
year 1989 with recommendation to enact specific law on Computer Misuse in the
United Kingdom.
In the another case R. v. Crop586587, the court held that the Computer
Misuse Act, 1990 will be applicable only when one computer is used to access
another computer. In DPP v. Bignell588 case, the issue was raised before the court
that whether a person will be guilty of the unauthorized access where he is
authorized to access computer data but exceeds his authorization for unauthorized
purposes. Here in the present case, two police officers used the computer and took
information from a police database and used this information for their private
purposes. The Divisional Court of Queen’s Bench Division held that their conduct
did not constitute unauthorized access because they were very much authorized to
control access to the material in question.
589
(1991) 93 Cri App R 25.
189
Cyber Terrorism
In United Kingdom, the National Security Council recently says on Cyber
Terrorism “comprise acts of international terrorism, hostile computer attacks on
United Kingdom cyberspace, a major accident or natural hazard such as a flu
pandemic, or an international military crisis between states drawing in the United
Kingdom and its allies.590
After R. v. Gold591 case, the United Kingdom enacted the specific law on
Computer Misuse for the purpose of controlling and preventing the commission
of cyber terrorism on the recommendations and suggestions of Law Commission.
In this case, the defendant gained unauthori1zed access into the network in order
to highlight the deficiencies in its security system. They hacked Customer
Identification Numbers (CIN) and password. But the Appellate court quashed
their conviction and was confirmed by the House of Lords. The appellate court
observed that the act of accused by using dishonest trick to gain unauthorized
access to the British Telecom files did not come under this type of criminal
offence but they may be convicted for deceiving a computer; and deceiving a
machine which is not possible.
In April 2005, one Algerian named Kamel Boungass had allegedly links
with Al- Quida was convicted for poison attack against the United Kingdom.592
But in modern time period apart from these methods the modern terrorists are
trying to access to computer, computer system, computer network of government
unauthorizedly by violating the provisions of the computer Misuse Act, 1990 and
the Data Protection Act, 1984.
Cyber Pornography
The judiciary has played an important role in dealing with the cyber
pornography cases. Though the United Kingdom does not have any written
Constitution, their freedom of speech and expressions is recognized through
several laws but subject to some reasonable restrictions. In R. v. Curl593 case,
obscenity was treated as common law offence in the year of 1727.
590
“Cyber Attacks and Terrorism Head threats facing UK” BBC News, (October 18, 2010),
available at:
www.bbc.com/news/uk-11562969 (visited on Dec. 2, 2016)
591
(1988) 1 AC 1060; see also (1987) 3 WLR 803
592
Supra note 2, p. 206
593
(1727) 2 S 788 KB.
190
R. v. Fellows594 case was the first of cyber pornography in the United
Kingdom. In this case, an employee of the Birmingham University compiled a
database of pornographic images of children without the consent or knowledge of
the University. The database was stored and maintained on a computer with
internet connection. The Court held him liable for cyber pornography with
reference to section 1 and 7(4) of the Protection of Children Act, 1978; the
Obscene Publications Act, 1959 and the Criminal Justice and Public Order Act,
1994.
594
(1997) 2 All ER 548 (CA).
595
(1868) 3 LR QB 360.
596
Supra note 24.
597
(1994) LGR 474.
598
(1998) Bristol Crown Court.
191
In R. v. Bowden599 case, the court held that downloading and printing
images from the internet fell within the concept of ‘making’ and held liable under
the Act. Similar issue came up before the court in R v. Westgarth and Jayson600
case. In this case the prosecution was able to prove that the defendant was aware
of the caching function within his browser software and the court held that the
mere act of voluntarily downloading an indecent image from a webpage on to
computer screen is an act of ‘making.’
Cyber Stalking
The UK judiciary is playing an important role in dealing with cyber
stalking and harassment cases. The Hon’ble court have ruled in R v. Patel601 and
Lau v. DPP602 cases that it is not just the number of incidents which make up a
course of conduct but whether those incidents could be said to be so connected in
type and context as to justify the conclusion that they could amount to a course of
conduct. The incident could be accepted by the court if it amounting to a course of
conduct as laid down by the court in Pratt v. DPP603 case.
Cyber Defamation
The judiciary is playing an important role in dealing with the cyber
defamation cases. In Cubby, Inc. v. CompuServe, Inc.606 case, the issue was raised
that whether the service provider exerted enough control over or had knowledge of
or reason to know, the contents of allegedly defamatory statements posted on one
of its bulletin boards. In this case the court held that the service provider was
liable defamatory statements posted on its bulletin boards, notwithstanding the
599
(2000) 1 Cri App R 438, 444.
600
(2002) EWCA Cri 683.
601
(2005) 1 Cr. App. 27.
602
(2000) Cr. L.R. 580.
603
(2001) EWHC 483.
604
(2010) EWCA 123.
605
(2008) EWHC 148.
606
(1991) 776 F. Supp. 135 (S.D.N.Y).
192
fact that the control it exerted over content was intended to improve its service and
keep them free from objectionable material.
In Sydney Blumenthal v. Matt Drudge Online Inc.608 case, it was held by the
court that the near instantaneous possibilities for the dissemination of information
by millions of different information providers around the world to those with
access to computers and thus to the internet have created the opportunities for
exchange of information inthe cyberspace.
607
(1995) N.Y. Misc. LEXIS 229, 1995 WL 323710 N.Y. Sup Ct. (May 24, 1995).
608
(1998) 992 F. Supp. 44 (D.D.C).
609
(2000) WL 491456: (2000) Court of Appeal (Cr).
610
(2001) QB 201.
193
In another case, Jameed (Yousef) v. Dow Jones & Co. Inc.611, the foreign
claimant issued defamation proceedings in England against the publisher of a
United States newspaper in respect of an article posted on an internet website in the
United States of America, which was available to subscribers in England. The
claimant alleged that the article, together with a list of names in an internet
In Bunt v. Tilley and Others614 case, the claimant filed a suit for libel
against the defendants for posting the defamatory statements on websites. But the
defendants pleaded for the dismissal of the claims on the summary basis. In this
case, the issue was raised before the court that whether an internet service provider
could be liable in respect of the material which was simply communicated via the
services they provided. In this case the court held that an internet service provider
could not be deemed to be a publisher at common law because they performed no
more than a passive role in facilitating postings on the internet.
Cyber Fraud
611
(2005) QB 946.
612
“Cyber Defamation- The Law, Practice and Future”, pp.17-18, available at: http://www.
scribd. com/document/29692790/Cyber-Defamation-The-Law-Practice-and-Future (visited on
Feb. 13, 2017).
613
(2005) EWCA Cri. 52.
614
(2006) 3 All ER 336.
194
The judiciary has played an important role for combating with the cyber
fraud cases. In R v. Thompson615 case, the accused, a computer programmer
employed by a bank in Kuwait made two plans to defraud the bank by devising a
programme which instructed the computer to transfer sums from these accounts
to his newly opened
In R. v. Gold617 case, one of the accused accessed the files of the Duke
Edinburgh’s personal computer and left there a message. They were charged under
section 1 of the Forgery and Counterfeiting Act, 1981, because they made the false
instrument with intention to use it to induce others to accept it as genuine one.
Under section 8(1) of the said Act though the instrument is recorded or stored on
disc, tape, soundtrack or other device but it can be treated as false instruments. In
this case, the crown court held the accused him liable for his act and imposed a
fine of $ 750 and $ 600 respectively. But the Appellate court quashed their
conviction order and later on this order was confirmed by the House of Lords. The
House of Lords declared that hacking is not only an illegal act but also a crime
which needs to be controlled immediately.
615
(1984) 1 WLR 962.
616
(1994) 4 All ER 1.
617
(1988) 2 WLR 984.
618
(1996) 3 All ER 481.
195
regarding the application of the traditional legal terminology on the intangible
transactions or situations. In this case the need arose for the first time to abandon
the element of ‘deception’ which is the essential ingredients of traditional fraud.
After this case, the Council of Europe Convention on Cybercrime formulated an
offence of fraud without the element of deception under article 8 under heading
‘Computer related Fraud’.
Cyber-Squatting
In the United Kingdom, the Courts have played an important role in
extending the existing trademark law to the cases of cyber-squatting. The first
case of cyber- squatting in United Kingdom was that of Harrods plc v. UK
Network Services Ltd619., in which the court accepted the principle that the law
relating to trademarks and passing off can be applied to domain names. In
Intermatic Incorporated v. Dennis Toeppen620 case, the Court held that the
defendant’s desire to resell the domain name is sufficient to meet the commercial
use requirement of the Lanham Act. The Court in regard to dilution further held
that the dilution of Intermatic’s mark is likely to occur because the domain name
appears on the web page and is included on every page that is printed from the web
page.
The Court stated that anyone who registers a domain name on the basis of
its similarity to the name, brand name, or trade mark of an unrelated commercial
organisation should expect to be served with an injunction to prevent the threat of
passing off, and that the injunction will be written in such a way that the name
will be rendered commercially useless to the dealer. The court further stated that
using a trademark in the course of a professional dealer's business to increase the
value of domain names and collect money from the trademark owner is a use in
the course of trade. This was held in Marks & Spencer v. One in A Million Ltd.621
case. In this case the Hon’ble High Court in London observed after finding the
respondent to be guilty of Cyber squatting that any person who deliberately
registers a domain name on account of its similarity to the name, brand name or
trademark of an unconnected commercial organization, must expect to find
himself on the receiving end of an injunction to restrain the threat of passing off,
and the injunction will be in terms which will make the name commercial useless to
619
(1997) 4 EIPR D 106.
620
(1996) 947 F Supp. 1227.
621
(1998) FSR 265.
196
the dealer and held that registration of domain names for the purpose of resale to
owners of the trademarks is an action preparatory to trademark infringement.
In every day a new technique is being developed for doing the cyber
crime through using the internet facilities and many a times we are not having the
proper investigating methods or techniques to understand and to tackle that newly
cyber act which is called as cyber crime. United Kingdom has enacted several
laws for combating cyber crimes; despite this many complicated legal issues are
still unresolved and still these laws are only a gap-filler and there are so many
legal issues which have no mentioned yet. And also there are thousands of cases
taking place in the countries but only the few cases are lodged as a complaint.
Because many of the victims due to the threat and fear of getting abused in the
society does not move any complaint against the cyber criminals, some of the
cyber victims accept this incident as nightmare or bad destiny or as wished by God
and moving on the life by forgot all the incidents. But due to this the cyber
criminals are more encouraged to get involved in such type of cyber criminal
activities.
The cyber laws are passed and amended in United Kingdom from time to
time but instead of these laws the cyber crimes are increasing day by day. The
National Crime Agency (NCA) released a report on July 7, 2016 by highlighting
the need for stronger law enforcement and business partnership to fight cyber crime.
According to the NCA cyber crime emerged as the largest proportion of total
crime in the U.K. with “cyber enabled fraud” making up 36 % of all crime reported
and computer misuse accounting for 17%.622 The Office of National Statistics
(ONS) estimated that there were 2.46 million cyber incidents and 2.11 million
victims of cyber crime in the UK in 2015 and only 16, 349 cyber dependent and
approximately 700, 000 cyber enabled incidents reported to Action Fraud over the
same period.623
622
Available at: www.nationalcrimeagency.gov.uk/publications/709-cyber-crime-assessment-
2016/file, (visited on Feb. 14, 2017).
623
Ibid.
197
198
CHAPTER - VII
COMPARATIVE ANALYSIS STUDY OF CYBER
CRIMES BETWEEN US, UK AND INDIA
7.1 Introduction
Cyber world is the combination of computers and other communication
convergence.624 The internet has transformed the entire planet into a global
village. It has established a virtual world with no boundaries, allowing people to
improve both personal and professional interactions beyond national boundaries.
The rise of globalisation has had a significant impact on socioeconomic and
cultural aspects of life. Human civilisation has benefited much from
cyberspace.625 The Internet's main purpose is to link individuals all over the world
who have a desire to learn more about the indispensible human nature that led to
the creation of the cyber world.
624
M. Dasgupta, Cyber Crime in India- A Comparative Study, 2009, p. 1.
625
Tanaya Saha and Akanchs Srivastava, “Indian Women at Risk in the Cyber Space: A
Conceptual Model of Reasons of victimization, International Journal of Cyber Criminology, vol.
8 No. 1, Jan.- June, 2014, pp. 57-58 available at: http://www.cybercrimejournal.com/
sahasrivasta vatalijcc2014vol8issue1.pdf (visited on March 6, 2017).
626
Justice T. Ch. Surya Rao, “Cyber Laws- Challenges for the 21st Century,” Andhra Law Times,
2004, p. 20.
627
Atul Bamara, Gajendra Singh, et.al., “Cyber Attacks and Defense Strategies in india: An
Empirical Assessment of Banking Sector”, International Journal of Cyber Criminology, vol. 7 No.
2, Jan.- June, 2013, p. 49-50, available at : https://www.researchgate.net/publication/236682638_
Cyber_Attacks_and_Defense_Strategies_in_India_An_Empirical_Assessment_of_Banking_Sector
(visited on March 6, 2017).
199
consistently
For a long time, safety and security have been viewed solely as a means of
avoiding bodily harm. Alongside the old world, ‘cyberspace' evolved in the late
twentieth century. Because this new world is becoming increasingly entwined
with the traditional offline one, internet safety has become a must for a well-
functioning society. A secure cyberspace is one in which no crime is perpetrated
630
(and from which no crime is committed). There are various issues which need
to be sort out in Cyber law for a comprehensive and systematic comparative
study.
628
R.C. Mishra, Cyber Crime: Impact in The New Millennium, 2002, p. 53.
629
Justice T. Ch. Surya Rao, “Cyber Laws- Challenges for the 21st Century,” Andhra Law Times,
2004, p. 24.
630
Rutger Leukfeldt, Sander Veenstra, et.al., “High Volume Cyber Crime and the Organization of
the Police: The Results of Two empirical Studies in the Netherlands”, International Journal of
Cyber Criminology, vol. 7 No. 1, Jan.- June, 2013, p. 1, available at:
http://www.cybercrimejournal.com/
Leukfeldtetal2013janijcc.pdf (visited on Oct. 19, 2014).
631
Jose R. Agustina, “Exploring Internet Crimes and Criminal Behaviour”, Book Review of Cyber
Criminology, vol. 6 No. 2, July- Dec., 2012, p. 1044, available at:
http://www.cybercrimejournal.
com/Augustinabookreview2012julyijcc.pdf (visited on March 7, 2013).
200
Study has shown that the United States of America and the United
Kingdom are the two traditional giants who are giving a tough defiance to the
silicon onslaught. The US bags the highest number of cyber specific legislation
followed by the United Kingdom which apart from having cyber laws, has at the
same time applied traditional laws to the knotty areas, though Judges in United
Kingdom were reluctant to apply the traditional laws to new computer situations
and pressed the need to have a technology specific legislation.632 That’s why these
two countries legal systems have been chosen as the parameters of comparison in
almost studies.
Cyber crimes are of current origin and affect the whole world at large, all
regional organizations and State countries have called upon legislatures to draft
laws dealing with these crimes; as a result most of the countries started to do so.
In this chapter an attempt has been made to compare the Indian current status of
cyber legislation with the legislation of United States and United Kingdom for
exploring the deficiencies and inadequacies of Indian cyber laws. A comparative
study is mentioned as under:
632
Talat Fatima, Cyber Crimes, 2011, p. 453.
633
United Nations Manual on the Prevention and Control of Computer Related Crime, 1994, p. 5,
available at: http://216.55.97.163/wp-content/themes/bcb/bdf/int_regulations/un/CompCrims_
UN_Guide.pdf, (visited on March 15, 2017).
201
investigation, or prosecution.634
While in India the cyber crimes are given under Chapter XI of the
Information Technology Act, 2000 under the heading of ‘Offences’ which deals
with the various types of offences which is done in the electronic form or
concerning with computers, computer systems, computer networks. Hereunder are
mentioned those cyber crimes which are punishable under the Information
Technology Act, 2000 under separate sections. These are as follows:
634
“Computer Crime Law and Legal Definition”, available at: https://definitions.uslegal. com/c/
computer-crime/, (visited on March 15, 2017).
635
Supra note 9. p. 454.
202
xxvii. Breach of confidentiality and privacy
the petitioner filed an appeal against such order which was dismissed by the
appellate court and upheld the trial court judgment.
636
Supra note 1, p. 52.
637
Amita Verma, Cyber Crimes & Law, 2009, p. 67.
638
(2013) CRR 66 (O&M) 1.
203
In State of A.P v. Prabhakar Sampath639 case, the complainant M/S SIS
Infotech Pvt. Ltd., Hyderabad, carrying the business of research station, filed a
complaint by stating that somebody successfully hacked their server and
downloaded their e-reports through some free public sites. After investigation
made by the police, the accused was found guilty and charged under section 66 of
IT Act for hacking content server of complainant’s company.
The Computer Fraud and Abuse Act of 1986 in the United States of
America deals with the crime of "hacking," which is per se criminal only with
respect to systems used exclusively by the US government. All other computers,
such as those utilised by the federal government but not solely, including those
carrying national security records and those containing financial and credit
records, require some additional act or damage before criminal penalties can be
imposed.640 Other statutes, such as the Data Protection Act of 1998, have been
enacted to regulate the use and storage of personal data or information relating to
individuals under sections 1030 and 1031.641
In United States v. Harris642 case, the accused was charged and convicted
by the court under Computer Fraud and Abuse Act for unauthorized access to her
employer’s computer system and obtained the Social Security Numbers of several
people in order to target them in a fraudulent credit card scheme.
another man to hack into e-mail accounts to steal nude photos that were
later posted on his website.
639
(2015) Cr. Comp 489/2010, Hyderabad.
640
Tonya L. Putnam and David D. Elliott, “International Responses to Cyber Crime”, University
of Petroleum and Energy Studies Review 1, 1999, pp. 39-40, available at: http://www.
hoover.org/sites/default/files/uploads/documents/0817999825_35.pdf (visited on March 6, 2017)
641
Supra note 1, p. 74.
642
(2002) 302 F 3d 72 EDNY (2nd Cir Court).
643
United States Department of Justice, Dec. 2, 2015, available at: https://www.justice.gov/usao-
cdca/pr/operator-revenge-porn-website-sentenced-2-years-federal-prison-email-hacking-scheme
(visited on April 9, 2017).
644
United States Department of Justice, District Court of New Jersey, Dec.15, 2015,
available at: https://www.justice.gov/usao-nj/pr/three-men-arrested-hacking-and-spamming-
204
Jersey and Maryland were arrested and charged for Hacking, Spamming Scheme
and identity theft scheme that have targeted personal information of 60 million
people and generated more than $ 2 million in illegal profits.
But in United Kingdom the term ‘Hacking’ is not used but it covered
under ‘unauthorised access.’ Computer Misuse Act (CMA), 1990 has been passed
in United Kingdom which introduces three new criminal offences under sections 1
to 3; firstly, unauthorized access to computer material means to use a computer
without permission is a punishable offence. Secondly, it is to be called more
malicious hacking or cracking if unauthorized access to computer material is done
with intent to commit or facilitate commission of further crimes. Thirdly,
unauthorized modification of computer material is also a punishable offence. After
this, certain amendments has been made in CMA relating to hacking by the part 2
of Serious Crime Act, 2015 which provides that if any unauthorized act results in
serious damage to human welfare or national security, than the person shall be
liable upto the maximum punishment of life imprisonment and if any unauthorized
act results in serious damage to economy or the environment than the maximum
sentence is 14 years.
In DPP v. Bignell645 case, the issue was raised before the court that
whether a person will be guilty of the unauthorized access where he is authorized
to access computer data but exceeds his authorization for unauthorized purposes.
Here in the present case, two police officers used the computer and took
information from a police database and used this information for their private
purposes. The Divisional Court of Queen’s Bench Division held that their conduct
did not constitute unauthorized access because they were very much authorized to
control access to the material in question.
Now the Indian law is close to United States of America and United
Kingdom in this respect. Under United States law mens rea is not recognised but it
is recognised both under United Kingdom and India. Criminal liability is imputed
under United Kingdom and Indian laws but not in United States of America. In
India it is imputed only if it done with dishonest or fraudulent intention to cause
wrongful gain or wrongful loss.
Cyber Terrorism
In India, there was no specific section under the originally IT Act, 2000
under which sending of threatening emails, which may cause harassment, anxiety
nuisance and terror or which may seek to promote instability, have been made a
penal offence. But now the Information Technology (Amendment) Act 2008 for
the first time made provision for cyber terrorism and defines it under section 66F
with the imprisonment of life which is considered as the highest punishment under
this Act. Clause 1(A) of section 66 F deals with cyber terrorism that directly
affects or threatens to affects the people with the purpose to threaten the unity and
integrity or security of the nation and to fill the terror into the mind of the
peoples. Clause 1(B) of this section deals with cyber terrorism that directly affects
the State by unauthorized access to restricted information, data or computer
database. Section 124 A of Indian Penal Code can also be applied because the
damage is caused to national property and as integrity of the nation is also
jeopardised.
647
Jyoti Rattan, Cyber Laws & Information Technology, 2014, p. 261.
648
Ibid.
206
On December, 2014, Mehndi Masroor Biswas649, a prominent supporter of the
Islamic State, on Twitter was charged under section 66 F of Information
Technology Act, 2000 for cyber terrorism and under the Unlawful Activities
(Prevention) Act, 1967 for advocating terrorism, facilitating recruitment for terrorist
and for supporting a terrorist organisation and under Indian Penal Code for waging
war against India and sedition. A special terrorism court in Bangalore has ruled
that the police have sufficient evidence for prosecuting him as reported by the
Indian Express.
In the United States of America, the Computer Fraud and Abuse Act, 1986
has been passed which was further amended in 1994 and 1996. But after Sep. 11,
2001, an attack on World Trade Centre and Pentagon, the United States of
America passed the Patriot Act, 2001 and recognised hacking as cyber terrorism
and for the first time defines the term “cyber terrorism”. It provides that if any
person who causes unauthorized damage to a protected computer by either
knowingly causing the transmission of a program, information, code, or
command, or intentionally and unauthorizedly accessing a protected computer
shall be liable to punishment.
649
“In a first, Pro-Islamic State Twitter Activist to Face Cyber Terrorism Charges”, (Last
Modified on May 13, 2016), available at: http://www.firstpost.com/india/in-a-first-pro-islamic-
state-twitter- activist-to-face-cyber-terrorism-charges-2779982.html (visited on April 10,
2017).
650
US Department of Justice (2007).
651
Central Bureau of Investigation, United States, available at:
http://c.ymcdn.com/sites/
www.issa.org/resource/resmgr/2015_April_CISO_Forum/Cyber_Espionage_and_Cyberter.pdf
207
As compare to India and United States of America, the United Kingdom
has enacted the Data Protection Act, 1984 before the Terrorism Act, 2000 and in
the year 1990 to prevent and control cyber terrorism which defines the term
“Terrorism” as including the use or threat of action that is designed seriously to
interfere with or seriously to disrupt an electronic system designed; to influence
the government or to intimidate the public or a section of the public, and made for
the purpose of advancing a political, religious or ideological cause. Serious Crime
Act, 2015 provides that if any unauthorized act results in serious damage to human
welfare or national security, than the person shall be liable upto the maximum
punishment of life imprisonment.
In April 2005, one Algerian named Kamel Boungass had allegedly links
with Al- Quida was convicted for poison attack against the United Kingdom.652
But in modern time period apart from these methods the modern terrorists are
trying to access to computer, computer system, computer network of government
unauthorizedly by violating the provisions of the computer Misuse Act, 1990 and
the Data Protection Act, 1984.
Cyber Pornography
In India, section 292 to 294 of IPC contained the Indian law of obscenity.
However, the IT Act, 2000 was deficient in dealing with obscenity before
amendment by IT Amendment Act, 2008. It has reformed the Indian law of
obscenity to a greater extent.
Now, the Information Technology Act, 2000 after amendment states that
storing or private viewing of pornography is legal as it does not specifically
restrict it. On the other hand transmitting or publishing the pornographic material
is illegal. There are some sections of Information Technology Act, 2000 which
prohibit cyber pornography with certain exceptions to Section 67 & 67A. The
combined effect of sections 66 E, 67, 67A and 67 B is to differentiates between
cyber pornography, child pornography and mainstream pornography and to bring the
online pornography within the legal regime. For offence under section 67 the
person shall be punished on first conviction with imprisonment which may extend
to three years and with fine which may extend to five lakh rupees and in the event
of a second or subsequent conviction with imprisonment which may extend to five
years and with fine which may extend toten lakh rupees.
As regards the Cyber pornography, most of the reported Indian Cases are
disposed of in the lower court at the magisterial level. However, the case of State of
Tamil Nadu v. Suhas Katti653 deserves a special mention in this context because
this case was disposed of within a record period of seven months from the date of
filing of the FIR by the expeditious investigation made by the Chennai Cyber
Crime Cell (CCC). This is a landmark case which is considered to be the first case
of conviction under section 67 of Information Technology Act in India which
makes this section is of the historical importance. In this case, some defamatory,
obscene and annoying messages were posted about the victim on a yahoo
messaging group which resulted in annoying phone calls to her. She filed the FIR
and the accused was found guilty under the investigation and was convicted under
section 469, 509 of IPC and section 67 of Information Technology Act.
In United States of America, there are two child pornography laws i.e. The
Child Pornography Prevention Act, 1996 and the Child Online Protection Act,
1998. The former Act prohibits the use of computer technology to knowingly
produce child pornography, that is, depictions of sexually explicit conduct
involving or appearing to involve minors. The latter Act requires commercial site
653
(2004) Cr. Comp 4680, Egmore, available at: http://lawnn.com/tamil-nadu-vs-suhas-kutti/
(visited on April 5, 2017).
654
2010 [SCR. A/1832/2009] Guj.
209
operators who offer material deemed to harmful to minors to use bonafide
methods to establish the identity of visitors to their site. The Communication
Decency Act, 1996 has been passed to protect minors from pornography. The
CDA states that any person, who knowingly transports obscene material for sale
or distribution either in foreign or interstate commerce or through the use of an
interactive computer service, shall be liable to imprisonment upto five years for a
first offence and up to ten years for eachsubsequent offence.
655
(2002) 95 Ohio St 3d 254 : 767 NE 2d 242.
656
Available at: https://www.justice.gov/usao-cdca/pr/operator-revenge-porn-website-sentenced-
2-years- federal-prison-email-hacking-scheme (visited on April 9, 2017).
657
Chris Reed, Computer Law, at 300 (2003).
658
“Cyber Pornography”, available at: http://www.lawyersclubindia.com/articles/Cyber-
Pornography- 6396.asp (visited on April 12, 2016).
210
person’s life; acts which result in or are likely to result in serious injury to a
person’s anus, breasts or genitals; bestiality; or necrophilia. This Act also excludes
classified films etc. from its purview and also provides for defences and the
penalties for the commission of such offences.
After this there are other Act’s which deals with obscenity including the
Obscene Publications Act, 1959 and 1964, Telecommunications Act, 1984 and
Criminal Justice Act, 1988. Criminal Justice Act, 1988 has been passed which
explains under section 160 as amended by section 84(4) of the Criminal Justice and
Public Order Act (CJPOA), 1994 that it is an offence for a person to have an
indecent photograph or pseudo-photograph of a child in his possession. This
offence is now a serious arrest able offence with a maximum imprisonment term
not exceeding six months.
659
(2000) 1 Cri App R 438, 444.
660
(2002) EWCA Cri 683.
661
“Hunter Moore gets 2.5 Years for Revenge Porn Hacking” , available at: https://www.
cmagazineuk.com/hunter-moore-gets-25-years-for-revenge-porn-hacking/article/535569/ (visited
on April 10, 2017).
211
between mainstream pornography and child pornography while in India no such
difference exists under section 292 of IPC though the IT Act after amendment in
2008 has regarded obscenity as an offence but separately defined child pornography
with punishment under section 67B. In United States of America possession of
obscene material is not an offence but publishing or transmission of obscene
material is an offence while in United Kingdom and India, mere possession of
obscene material is not an offence. In United States of America, child accessibility
to porn sites is prohibited while in India browsing and downloading child porn
images are punishable offence.
Cyber Stalking
The legislation on cyber stalking are varies from country to country. Prior
to February 2013, there were no legislation in India that specifically regulated
cyber stalking; it was covered under sections 66A, 72, and 72 A of the
Information Technology Act, 2000. By enacting the Criminal Law (Amendment)
Act, 2013, the Indian parliament amended the Indian Penal Code, 1860, to make
internet stalking a criminal offence. Cyber stalking is not directly recognized cyber
crimes in India under Section 66 A by the Information Technology (Amendment)
Act 2008 and under section 72, 72A. Section 66 A provides punishment for
sending offensive messages through communication service etc and section 72
provides for breach of confidentiality and privacy.
662
AIR 2015 SC 1523.
212
Violence Against Women Act of 2000, for example, included internet stalking in
the federal interstate stalking legislation. Despite the lack of federal laws to
particularly address cyber stalking, the majority of legislative action is still done
at the state level. Only a few states have stalking and harassment laws that make it
illegal to send threatening or unwanted electronic communications. 663 The first
anti-stalking law was enacted in California in 1990, and while all fifty states soon
passed ant-stalking laws, by 2009 only 14 of them had laws specifically addressing
“high-tech stalking.664
In United States of America almost every state has laws dealing with cyber
stalking. US federal Code 18 under section 2261 A (2) states that whoever with the
intent uses the mail, any interactive computer service, or any facility of interstate
of foreign commerce to engage in a course of conduct that causes substantial
emotional distress to that person or places that person in reasonable fear of the death
of, or serious bodily injury shall be liable under section 2261 B (b) for a
imprisonment which may extend upto life imprisonment if the death of the victim
results; for not more than 20 years if permanent disfigurement or life threatening
bodily injury to the victim results; for not more than 10 years, if serious bodily
injury to the victim results or if the offender uses a dangerous weapon during the
offense.
663
“Cyber Stalking”, available at: http://en.wikipedia.org/wiki/cyberstalking (visited on April 12,
2016).
664
Christa Miller, “High-Tech Stalking, Law Enforcement Technology”, available at:
http://www. officer.com/article/10233633/high-tech-stalking (visited on March 6, 2017).
665
(March, 2012), SC New Jersey, available at: https://en.wikipedia.org/wiki/New_Jersey_v._
Dharun_Ravi (visited on April 10, 2017).
666
Available at: https://www.justice.gov/opa/pr/former-us-state-department-employee-pleads-
guilty- extensive-computer-hacking-cyberstalking (visited on April 9, 2017).
213
victims in the United States.
In United Kingdom, there are various laws which deal with stalking and
cyber stalking. The Protection of Freedoms Act, 2012 has been passed which
created two new offences of stalking by inserting sections 2A and 4A into the
Protection from Harassment Act (PHA), 1997. Section 2A creates a specific
offence of stalking and a person guilty of it shall be liable for a imprisonment not
exceeding 51 weeks or with fine not exceeding level 5 of standard scale or both.
Section 4 A creates the offence of stalking involving a fear of violence or serious
alarm or distress and a person guilty of it shall be liable for a imprisonment not
exceeding 5 years or with fine or both on indictment or a imprisonment not
exceeding twelve month or fine not exceeding statutory maximum or both on
summary conviction. Under this Act, stalking element is defined as those acts
which include monitoring a person online, contacting a person, loitering in a
public or private place, interfering with property or spying. The Malicious
Communication Act, 1988 makes it illegal to send or deliver letters or other articles
for the purpose of causing distress or anxiety by electronic communication. There
are other Act’s which deals with stalking including the Offences against the
Persons Act, 1861, Criminal Justice and Public Order Act, 1994, Wireless
TelegraphyAct, 2006.
Cyber defamation
In India, the term ‘cyber defamation’ is not specially used and defined
under section 66A of the IT Act, 2000 but it makes punishable the act of sending
grossly offensive material for causing insult, annoyance or criminal intimidation.
Section 499 of the Indian Penal Code criminalises cyber defamation, which was
expanded by the IT Act of 2000 to include "speech" and "documents" in
667
(2010) EWCA 123.
668
(2008) EWHC 148.
669
(2001) EWHC 483.
214
electronic form. Section 499 of the Criminal Code defines defamation as the
publication of an imputation about a person with the aim to injure or having
grounds to believe that such imputation would impair that person's reputation.
The defamatory item has been published, that is, it has been communicated to
someone other than the person to whom it is directed. In India, an e-mail that
makes defamatory statements about the person to whom it is addressed is not
considered defamatory if it is not conveyed to a third party. Statements on mailing
lists and the World Wide Web world are defamatory as they would be available to
persons other than the person to whom they refer.
The Hon’ble court ruled in Obsidian Finance Group, LIC v. Cox671 case
670
“Court Summons Kejriwal, Azad in DDCA Defamation Case”, Sportz Wiki, Jan. 30, 2017,
available at: http://sportzwiki.com/cricket/court-summons-kejriwal-azad-ddca-defamation-case/
(visited on April 10, 2017).
671
(2011) CV- 11- 57- HZ.
215
that liability for a defamatory blog post involving a matter of public concern
cannot be imposed without proof of fault and actual damages. Bloggers saying
libellous things about private citizens concerning public matters can only be sued
if they are negligent. In Firth v. State of New York case672, the plaintiff claimed that
publication of an alleged libel on the internet was continuous publication, which
would extend the statute of limitations. The court held that the statue would run
from the date of material was first posted not from the continuity. And the decision
was also affirmed by the New YorkAppellate Division Court.
In Bunt v. Tilley and Others673 case, the claimant filed a suit for libel
against the defendants for posting the defamatory statements on websites. But the
defendants pleaded for the dismissal of the claims on the summary basis. In this
case, the issue was raised before the court that whether an internet service provider
could be liable in respect of the material which was simply communicated via the
services they provided. In this case the court held that an internet service provider
could not be deemed to be a publisher at common law because they performed no
672
(2000) N.Y. Court of Claims.
673
(2006) 3 All ER 336.
216
more than a passive role in facilitating postings on the internet.
Phishing
In India, the term ‘Phishing’ is not used anywhere in this section as given
under IT Act, 2000 before or after amended by the amendment Act, 2008. But
now it is a punishable offence under section 66, 66A, 66C, 66 D of IT Act, 2000
and under Indian Penal Code. Section 66 A of Information Technology Act
provides punishment
In United Kingdom, a new Anti Fraud Act has been passed in 2006 for
England, Wales and Northern Ireland which is known as The Fraud Act, 2006. It
came into effect on Jan. 15, 2007. This Act banned the using of phishing kits for
sending and creating bogus e-mails by millions. Before this, there was no proper
law which deals with phishing. This Act punishes fraud by false representation,
674
Jeordan Legon, “Phishing scams reel in your identity”, CNN News, (Jan. 26, 2004), available
at: http://edition.cnn.com/2003/TECH/internet/07/21/phishing.scam/index.html?iref=newssearch
(visited on March 6, 2017).
217
fraud by failing to disclose information and fraud by abusing position. It
provides that a person found guilty of fraud was liable to fine or imprisonment
upto twelve months on summary conviction or fine or imprisonment upto ten
years on summary indictment.
Cyber Fraud
In India, the term ‘Fraud’ is neither defined in the Indian Penal Code, 1860
nor in the IT Act. Section 66 D is inserted by the Amendment Act, 2008 for
providing punishment for cheating by personation by using computer resource
which is also used for cyber fraud but not directly. According to this section if
any person who by means of any communication device or computer resource
cheats by personation, shall be punished with imprisonment of either description
for a term which may extend to three years and shall also be liable to fine which
may extend to one lakh rupees.675 This offence is bailable, cognizable and triable
by the court of Judicial Magistrate of First Class.
The Computer Fraud and Abuse Act of 1996 was enacted in the United
States of America to ban and punish computer and internet fraud. It was updated
in the years 1994 and 1996, as well as by the Patriot Act of 2001 and the Identity
Theft Enforcement and Restitution Act of 2008. The provisions of the United
States Criminal Code apply to cyber fraud, and violators can be prosecuted under
title 18, for example, no. 1028 prohibits social security card and credit card
frauds, no. 1029 prohibits identity fraud, including telemarketing fraud, no. 1341
prohibits mail fraud, no. 1343 prohibits wire fraud, and so on. Fraud is likewise
prohibited under Title 18 U.S. Code s. 1030.
In India, jurisdiction under the IT Act is prescribed under sections 1 (2) and
75, which are to be read along with the relevant provisions under the IPC. Section
1(2) of the IT Act, 2000 provides for the jurisdiction of Indian courts in cyber
crimes only. It does not talk about civil jurisdiction.679 IT Act is silent on the
point of the State of Jammu Kashmir, which means that the IT Act extends over the
State of Jammu Kashmir. This section provides the extra-territorial jurisdiction
over offence or contraventions committed outside India.
678
Supra note 24, p. 346.
679
D. Latha, Jurisdiction Issues in Cyber Crimes”, The Weekly Law Journal, vol. 4, 2008, p. 88.
220
Technology Act, 2000 specifically provides that unless otherwise provided in the
Act, the Act also applies to any offence or contravention there under committed
outside India by any person irrespective of his nationality.680 It is however
clarified under Section 75 that the Act shall apply to an offence or contravention
committed outside India by any person if the act or conduct constituting the
offence or contravention, involves a computer, computer system or computer
network, located in India. It is also clear that section 75 of the IT Act is restricted
only to those offences or contraventions provided therein and not to other offences
under other laws such as the Indian Penal Code, 1860 etc.
680
Section 1(2) of IT Act, 2000.
681
Supra note 9, p. 457.
682
Shaffer v. Heitner, (1997) 433 US 186: 53 L Ed 2d 683.
683
Supra note 9, p. 346
221
applied for the purpose of prosecution.684
The Computer Misuse Act, 1990 is the relevant law that establishes
jurisdiction on the United Kingdom for the violation of cybercrime. The crimes
covered by the law are various acts of computer misuse which are defined under
sections 1 to 3 which includes unauthorized access with intent to commit or
facilitate of further offence and unauthorized modification of computer material. This
Act was further amended by the Police and Justice Act, 2006 which enhances the
punishment under the Act for committing the cybercrime.
684
Adel Azzam Saqf Al Hait, “Jurisdiction in Cybercrimes: A Comparative Study”, Journal of
Law, Policy and Globalization, vol. 22, at 80 (2014), available at: http://www.iiste.org/Journals/
index.php/JLPG/article/viewFile/11050/11351 (visited on Nov. 30, 2016)
685
(1999) 19 PTC 210 Del.
686
AIR 2000 Bom 27.
687
(1997) 6 SCC 241.
688
(2004) Cr. Comp 4680, Egmore, available at: http://lawnn.com/tamil-nadu-vs-suhas-kutti/
(visited on April 5, 2017).
222
Union of India689 is the case in the light of a series of arrests made under section
66A of the Information Technology Act, 2000, this writ petition was filed in
public interest under Article 32 of the Constitution of India, Seeking to strike
down Section 66A as unconstitutional. Additionally, in S Khushboo v.
Kanniammal690 and Common Cause v. Union of India691, Supreme Court has said
that in cases involving Freedom of Speech and Expression, the proper course for
Magistrates is to use their statutory powers to direct an investigation into the
allegations before taking cognizance of the offence alleged.
689
AIR 2015 SC 1523: (2005) 5 SCC.
690
(2010) 4 SCALE 467.
691
(2013) W.P. Crl. No. 21.
692
Catherine D. Marcum, Goerge E. Higgins, et.al., “Doing Time for Cyber Crime: An
Examination of the Correlates of Sentence Length in the United States”, International Journal of
Cyber Criminology, vol.5, No.2, July.- Dec, 2011, p. 827, available at:
http://www.cybercrimejournal. com/marcumetal2011julyijcc.pdf (visited on April 30, 2015).
693
(1991) 504 F 2d.
694
(2001) 255 F. 3d 728 (9th Cir).
695
(2001) 175 F Supp 2d 367 (D. Conn).
223
it. In People v. Cochran696 case, the accused allegedly posted pornographic
material on several Internet newsgroup sites by indicating also that he was
intending to trade in the material. The Hon’ble Supreme Court of California found
him guilty and convicted for posting pornographic material for commercial
purpose.
In State v. Maxwell697 case, the defendant was charged for act of bringing
child pornography into the State where both the defendant and the victim were the
residents of the State of Ohio while the service provider’s servers were located in
Virginia. According to the Ohio statute knowledge on the part of the defendant
was required, although the defendant was seemed to be ignorant of the fact the
disputed transmission crossed the State lines yet. The Hon’ble Supreme Court of
Ohio upheld the conviction by applying the strict liability standard concerning
transmission. In United States v. William Sutcliffe698 case, the defendant was
sentenced for making interstate threats to cause injury, killing and posting
thousands of social security numbers on websites. The United States District
Judge imposed restrictions that after his release he cannot access computer and
must not communicate with victims and witnesses.
696
(2002) 28 Cal 4th 396: 48 P 3d 1148.
697
(2002) 95 Ohio St 3d 254 : 767 NE 2d 242.
698
US Department of Justice (2007).
699
(1988) 1 AC 1063.
700
(1988) 1 AC 1060: (1987) 3 WLR 803.
701
R. v. Crop, (1992) 3 WLR 432.
702
(1997) 2 All ER 548 (CA).
703
(2000) 1 Cri App R 438, 444.
224
R v. Westgarth and Jayson704 case. In the United Kingdom, the Courts have gone
far in extending the existing trademark law tothe cases of cyber-squatting.
The Hon’ble court has ruled in R v. Patel705 case that it is not just the
number of incidents which make up a course of conduct but whether those
incidents could be said to be so connected in type and context as to justify the
conclusion that they could amount to a course of conduct. The incident could be
accepted by the court if it amounting to a course of conduct as laid down by the
court in Pratt v. DPP706 case. In R v. Curtis707 case, the Hon’ble Court held that it
is necessary to prove that the conduct is unacceptable to a degree which would
sustain criminal liability, and also it must be oppressive in nature. The court earlier
held in the case of C v. CPS708 that it is important to note that matters to
constitute the course of conduct amounting to harassment must be properly
particularized in the information laid or in the indictment.
In India, the basic law for the cyberspace transactions has emerged in the
form of the Information Technology Act, 2000 which was further amended in the
year 2008. The Information Technology Act amends some of the provisions of our
existing laws i.e. Indian Penal Code, 1860; the Indian Evidence Act, 1872; the
Bankers Book Evidence Act, 1891 and the Reserve Bank of India Act, 1934. 709
But the problem is still as it was though since 2000 the Information Technology
Act is working in India for combating cyber crimes. The reality is that the
working of this statute is more on papers than on execution because the police
officers, lawyers, prosecutors and Judges feel handicapped in understanding its
highly technical terminology.
704
(2002) EWCA Cri 683.
705
(2005) 1 Cr. App. 27.
706
(2001) EWHC 483.
707
(2010) EWCA 123.
708
(2008) EWHC 148.
709
Samiksha Godara, “Prevention and Control of Cyber Crimes in India: Problems, Issues and
Strategies”, A Thesis submitted to Maharishi Dayanand University, April 1, 2013, p. 2, available
at: http://shodhganga.inflibnet.ac.in/bitstream/10603/7829/12/12_chapter%203.pdf (visited on
May 20, 2016).
225
2000 has undergone with some amendments one of them is the recognition of
electronic documents as evidence in a court of law. Some market players believe
that this will provide an encouragement to electronic fund transfers and also help
in promoting electronic commerce in the country. But the result is not similar as it
is. The cyber crime cells are doing training programmes for its forces and plans to
organize special courses for corporate to combat cyber crime and use the
Information Technology Act effectively.
In the United States of America, the Computer Fraud and Misuse Act,
1986 as amended twice in 1994 and 1996 and the Patriot Act, 2001 are very
significant to prevent and control cyber fraud. In the United Kingdom the
Computer Misuse Act, 1990 and the Data Protection Act, 1984 provides world
standard for data protection, security system and to prevent and control cyber
fraud. In India, there is a need to follow the same standard.711 The computer
related fraud or cyber fraud has become one of the most pervasive form of white
collar crime in United State, Canada, United Kingdom., Europe, Australia,
Singapore, India etc. The losses due to misuse of computer or cyber or
information technology or digitised technology have resulted in to billions of
dollars. With the development of global communications networks, computer
fraud as with other forms of computer related crime in increasingly adopting global
710
“Cyber ragging Ki Line Kategi”, Navbharat Times, July 10, 2008, p. 7.
711
Supra note 1, p. 131.
226
dimension.712
The United Kingdom Cyber Laws, however, is criticized for not including
the definition of computer but the Law Commission of United Kingdom found
general support for the view that to attempt such a definition would be so
complex in an endeavour to be all embracing, that they are likely to produce
extensive argument. However, the Indian law on the subject gives the definition
of “computer” in its general clauses definition in section 2(l) of the IT Act,
2000.713 All these three countries i.e. United States of America, United Kingdom
and India does not define the term “cybercrimes” yet.
It can also be said that there is no uniformity around the world in treating
the cyber defamation cases. The major commonwealth countries are following the
different practice relating to cyber defamation cases. In United States of America,
a cyber defamation case is very difficult to prove because of the rigid nature of
first amendment in Constitution law. In United Kingdom, the defendant publisher
has to establish his innocence whereas in India, the specific cyber defamation law
is yet to develop because under IT Act, 2008 a hope in this regard to tackle the
defamatory activities.
712
Supra note 14, p. 202.
713
Syed Mohd Uzair, “Cyber crime and cyber terrorism in India”, A Thesis submitted to Aligarh
Muslim University, 2013, pp. 126-127, available at: http://shodhganga.inflibnet.ac .in/bitstream/
10603/63591/9/09_chapter%202.pdf (visited on Feb. 13. 2017).
714
Loknath Behera, “Investigating External Network Attacks”, The Indian Police Journal, Jan.-
March, 2004, p. 27.
227
hacking are almost synonymous worldwide whether in Russia, United States of
America, United Kingdom, Canada, Australia, and India or anywhere in the
globe.715 There is a need to clarify again the jurisdiction point in the cyberspace.
There are a large number of cyber laws passed and amended in India as
well as in United States of America and United Kingdom. But instead of these
laws the cyber crimes are increasing day by day. For example, a total of 8, 045
cases were registered under Information Technology Act during the year 2015 as
compared to 7, 201 cases during the previous year 2014 and 4,356 cases during
2013, showing an increase of 11.7% in 2015 over 2014 and an increase of 65.3% in
2014 over 2013.716 As compare to India, in USA for the year 2015, Cost of Data
Breach Study by IBM and the Pone mom Institute revealed that the average total
cost of a data breach increased from $ 3.52 million in 2014 t0 $ 3.79 million.
Another study said that cyber crime will become a $ 2.1 trillion problem
by 2019.717 The National Crime Agency (NCA) released a report on July 7, 2016
by highlighting the need for stronger law enforcement and business partnership to
fight cyber crime. According to the NCA cyber crime emerged as the largest
proportion of total crime in the U.K. with “cyber enabled fraud” making up 36 %
of all crime reported and computer misuse accounting for 17%.718 The Office of
National Statistics (ONS) estimated that there were 2.46 million cyber incidents
and 2.11 million victims of cyber crime in the UK in 2015 and only 16, 349 cyber
dependent and approximately 700, 000 cyber enabled incidents reported to Action
Fraud over the same period.719
715
Supra note 1, p. 97.
716
National Crime Records Bureau, Ministry of Home Affairs, cyber Crimes in India, 2015, pp.
163-164
, available at: http://ncrb.nic.in/StatPublications/CII/CII2015/FILES/Compendium-15.11.16.pdf
(visited on Nov. 11, 2016) .
717
Limor Kissem, “2016 Cyber Crime Reloaded: Our Prediction for the Year Ahead”, (Last
Modified on Jan. 15, 2016), available at: https://securityintelligence.com/2016-cybercrime-
reloaded-our-
predictions-for-the-year-ahead/ (visited on Dec. 2, 2016).
718
National Crime Agency (UK), Cyber Crime Assessment, 2016, available at: www.national
crimeagency.gov.uk/publications/709-cyber-crime-assessment-2016/file (visited on Nov. 11,
2016).
719
The Office of National Statistics(UK), Cyber Crime Assessment, at 5-6 (2015), available at:
www.nationalcrimeagency.gov.uk/publications/709-cyber-crime-assessment-2016/file (visited on
Nov. 11, 2016).
228
CHAPTER - VIII
CONCLUSION AND SUGGESTIONS
“Crimes have always depended on the force, vigour and movement of public
opinion from time to time and country to country and even in the same country
from decade to decade.”720
During the 12th and 13th centuries the Early English society included only
those acts as crimes if committed against the state or the religion not others.
During the early societies, there was no distinction between the law of crimes and
torts, and these communities merely followed the law of wrongs. When an
offence is committed in modern legal systems, the law is applied immediately
regardless of the wishes of the victimised party, but in early cultures, the law was
initiated only when both parties agreed to submit to the judgement. During the
18th century, also known as the "miracle reorientation" period in criminology, it
was thought that only the wrongdoer could confess criminal responsibility for his
conduct, and that no one else, even external agents, had any involvement. At that
time it was clear that the concept of crime is interlinked with social policy of that
time.
The new medium which has suddenly confronted humanity does not
distinguish between good and evil, between national and international, between
just and unjust, but it only provides a platform for the activities which take place
in human society. Law as the regulator of human behaviour has made an entry into
720
R.C. Nigam, Law of Crimes in India- Principles of Criminal Law, vol. 1 (1965), p. 3.
721
Donn B. Parker, “Automated Crime in Cyber Crime”, International Conference Course Book,
1997.
722
Farooq Ahmad, Cyber Law In India- Law on Internet, 2008, p. 367.
229
the cyberspace and is trying to cope with its manifold challenges.723 Due to the
rapid advancements in the functionality of information technologies cyber crimes
offending are becoming technically complex and legally intricate which leads to
disparity between systems of law globally with the first responders, investigating
authorities, forensic interrogators, prosecuting agencies, and administrators of
criminal justice. Because presently the situation is becoming alarming and the
cyber crime is talk of the town in every field of the society or system. This is because
every day a new technique is being developed in the cyberspace for doing the cyber
crime and many times we are not having the proper investigating methods or
techniques to tackle that newly cyber crime. It becomes critically important to
explore factors impending investigation and prosecution of cyber crime with the
purpose of raising awareness and exposing these barriers to justice.
8.1. Conclusion
Cyberspace has developed since the 1990’s and the impact on societies has
been so fast and enormous, that codes of ethics and the common sense of justice
and penal laws have not kept pace.724 It can be said that cybercrime has had a
short but highly eventful history. There are different views regarding the actual
status of existence of this new variety of crime actually. Some says that when the
computer came with the invention of the first abacus since people used calculating
machines for wrong purposes, hence it can be said that cybercrime per se has been
around ever. Actually, the history of cybercrime began with hackers attempting to
break into computer networks solely for the excitement of gaining access to high-
security networks or obtaining sensitive or secured information or any secret for
personal gain or revenge. In the field of criminology, it has been argued that a
crime will occur when and only when the chance arises. Previously, we only
knew about classic forms of crimes such as murder, rape, theft, extortion, robbery,
and dacoity. But now with the development and advancement of science and
technology i.e. computers and internet facilities, new types of crimes exist like
hacking, cyber pornography, cyber defamation etc.
723
Justice T. Ch. Surya Rao, “Cyber Laws- Challenges for the 21st Century”, Andhra Law Times,
2004, p. 24.
724
Stein Schjolberg and Amanda Hubbard, “Harmonizing National Legal Approaches on
Cybercrime”, International Telecommunication Union (ITU), Genewa, (June 28- July 1, 2005),
available at:
http://www.itu.in/osg/spu/cybersecurity/docs/Background_Paper_Harmonizing_National_and_Leg
al_ Approaches_on_Cybercrime.pdf (visited on April 17, 2016).
725
Parthasarathi Pati, “Cyber Crimes”, available at: http://www.naavi.org/pati/pati_ cybercrimes_
230
defining a crime in the cyber world and the actual world since cyber crimes are
just real-world crimes perpetrated through the means of a computer. Only the
crime media is different.726 These are "international" or "transnational" there are
‘no cyber-borders between countries'.727 The term computer crime, cyber crime,
e-crime, hi-tech crime or internet crime are synonym to each other and generally
means criminal activity on the cyber space where a computer or network is used as
a source, target and tool to commit crime. In the United States and the United
Kingdom, there is no legal definition. Surprisingly, the word "cyber crime" or
"cyber offence" is not defined in India, nor is it mentioned in the Information
Technology Act of 2000. Even after being amended by the Information
Technology (Amendment) Act, 2008, the Indian Penal Code, 1860, does not
utilise the phrase "cyber crime" at any time..
Cyber crimes are silent in nature and can be committed in the privacy of
one’s home without any need to physically present in front of the victim without
any eye witnesses. At the time of commission of such offences there are no signs
of physical violence or no cry of pain etc. because a cyber criminal silently
commits the crime without any sound or without any afraid of being caught red
handed. These crimes can be committed with a single click on the mouse and
without the knowledge of the victim of such crime. In most of cases of this type of
crimes the victim will not even realise what has happened to him and who have
done it against him and when it was done. It is very hard to identify a cyber
criminal because of lack of effective measures to identify them both at national and
international level.
728
AIR 2015 SC 1523.
233
Pentagon, and the December 16, 2005 e-mail threat to attack the Indian
Parliament and US consulate, Aftab Ansari’s attack on American Information
Centre, Kolkata from Dubai, Dawood Ibrahim’s terrorist activities all are the
examples of cyber terrorism also called as cyber war or net war.
In India, there are very less litigation because the corporate sector has been
shy of reporting cyber crimes fearing adverse publicity which results into less
judicial pronouncements. Most of the cases are not registered due to the lack of
knowledge and awareness of peoples. This led to encourage the cyber criminals to
get involved in such types of crimes. These crimes are emerged due to the lack of
multi-threat security systems, technology based programmes or camps and non-
adoption of foolproof computer procedures in organizations both at national and
international level.
234
investigating officers, prosecutors, judges and advocates both at national and
international level.
Justice A.K. Ganguly said that crime in cyber space was intruding into the
privacy of the common man, which was a violation of human rights. He has rightly
said, “This is a very serious threat, as it puts privacy at stake. Most of such crimes
are not reported. Information technology is ruling the world today. It has brought
about substantial erosion in the traditional forms of governance. The judiciary
has little role to play…the area of crime detection lies in the hands of the police
and enforcement agencies.” 729
The US and UK are the two traditional vast countries which are giving a
tough defiance to the silicon onslaught. The US has passed the highest number of
cyber specific legislation which is followed by the UK having apart from cyber
laws, applied the traditional laws to the knotty areas at the same time. But it is
found that the Judges in UK were unwilling to apply these traditional laws to
current cases and make a sound for the need of having specific technology
legislation. The judicial and law enforcement agencies well understand that the
means available to investigate and prosecute crimes and terrorist acts committed
against, or through the medium of computers or computer networks are at present
almost wholly international in scope. That’s why these two countries legal systems
have been chosen as the parameters of comparison in almost studies.
Though both the countries have lots of legislation for dealing with these
crimes but in some situations these are found insufficient which will be a great
challenge for international judicial system on cybercrime in near future. Presently,
many efforts are going on to develop the common agenda of harmonizing the
atmosphere between nations for combating cyber crimes by the international
treaties, conventions or commissions i.e. UNCITRAL Model Law etc. Many
complicated legal issues are still unresolved despite having several laws for
combating cyber crimes in both countries. The legal positions relating to electronic
transactions and civil liability in cyberspace is still confused or not clear by the
reason of not having any adequate laws on globally. This is due to the lack of co-
ordination between three main components namely; law enforcement,
adjudication and correction leads to an insufficient utilization of resources and
retards the process of justice and also these are frequently operate in a disorganized
manner with little knowledge of what the other segments are doing
729
Justice A.K. Ganguly, “Legal framework inadequate to tackle cyber crime”, The Hindu, 2008.
235
Cybercrimes as well as the legal issues both are global. So many efforts
have been taken to ensure the harmonization of provision in the individual
countries by the international organizations, such as the G-8 Group, OAS
(Organization of American States), APEC (Asia-Pacific Economic Cooperation)
and the Council of Europe but such an approach is found vital in the matters of
investigation and prosecution of attacks against the infrastructure of computer
systems and networks. Due to this nature of cyber crimes, any cyber criminal
commits a crime from any place globally. There is no need to go the victim place
for committing crime against him. There is lack of the universal legal framework
which should be adopted globally, backed by specialised and fully equipped law
enforcement mechanisms and appropriate awareness among masses.
236
11.7% in 2015 over 2014 and an increase of 65.3% in 2014 over 2013.730 As
compare to India, in USA for the year 2015, Cost of Data Breach Study by IBM
and the Pone mom Institute revealed that the average total cost of a data breach
increased from $ 3.52 million in 2014 t0 $ 3.79 million. Another study said that
cyber crime will become a $ 2.1 trillion problem by 2019. 731 The National Crime
Agency (NCA) released a report on July 7, 2016 by highlighting the need for
stronger law enforcement and business partnership to fight cyber crime.
According to the NCA cyber crime emerged as the largest proportion of total crime
in the U.K. with “cyber enabled fraud” making up 36 % of all crime reported
and computer misuse accounting for 17%.732The Office of National Statistics
(ONS) estimated that there were 2.46 million cyber incidents and 2.11 million
victims of cyber crime in the UK in 2015 and only 16, 349 cyber dependent and
approximately 700, 000 cyber enabled incidents reported to Action Fraud over the
same period.733
730
National Crime Records Bureau, Ministry of Home Affairs, cyber Crimes in India, 2015, pp.
163-164, available at: http://ncrb.nic.in/StatPublications/CII/CII2015/FILES/Compendium-
15.11.16.pdf (visited on Nov. 11, 2016).
731
Limor Kissem, “2016 Cyber Crime Reloaded: Our Prediction for the Year Ahead”, (Last
Modified on Jan. 15, 2016), available at: https://securityintelligence.com/2016-cybercrime-
reloaded-our-
predictions-for-the-year-ahead/ (visited on Dec. 2, 2016).
732
National Crime Agency (UK), Cyber Crime Assessment, 2016, available at:
www.nationalcrimea gency.gov.uk/publications/709-cyber-crime-assessment-2016/file (visited on
Nov. 11, 2016).
733
The Office of National Statistics(UK), Cyber Crime Assessment, 2015, pp. 5-6, available at:
www.nationalcrimeagency.gov.uk/publications/709-cyber-crime-assessment-2016/file (visited on
Nov. 11, 2016).
237
one is tested positive and also hypothesis two is tested positive .
8.2 Suggestions
In this era of liberalisation and globalisation, cybercrime must be
recognised as a serious new phenomenon with global political, social, and
economic implications. Existing organised criminals can employ sophisticated
tactics to communicate between groups and inside a group to support and expand
networks for illicit arms trafficking, money laundering, drug trafficking,
pornography, and other cyber crimes thanks to the internet's global
connectedness.734 The way to overcome these crimes can broadly be classified
into three categories like Cyber Laws, Education and Policy making. All the above
ways to handle cyber crimes either are having very significant work. This lack of
work requires to improve the existing work or to set new paradigms for
controlling the cyber attacks.
734
M. Dasgupta, Cyber Crime in India- A Comparative Study, 2009, p. 8.
238
illustration or examples are given for such offences under the Act. There is a need
to give a definite definition of the term cyber crime and other classified crime,
need to add illustrations with the cyber offences for proper understanding, need to
enhance punishments for cyber offences keeping in mind the International and
jurisdictional aspects in the era of Global Communication Convergence and
Mobile Technology. The nature of almost all the offences punishable under the
Act is bailable which makes it as a matter of right to get release immediately on
bail. The punishment is also very less for dealing with such crimes except the
punishment for cyber terrorism which is the highest punishment under this Act.
There is a need to take a number of right steps for the purpose of making the
Information Technology Act more relevant and comprehensive in today’s context.
The Information Technology Act does not have any specific provision for
defining and punishing cyber spamming. In the contemporary time period
spamming is the most threatening act of cyber world. Therefore, there is a need to
adopt the Anti-Spam law for the protection of children. In USA, the CAN- SPAM
Act, 2003 is the direct response of the growing number of complaint over spam e-
mails and is also the first USA cyber law which establishes national standards for
sending of commercial e- mail.
United States passed the federal laws on cyber squatting which is known
as Anti- Cyber Squatting Consumer Protection Act in 1999. In India, the
Information
Technology Act does not have any specific provision for defining and
punishing cyber squatting and these cases are decided under Trade Mark Act,
1999. Therefore, there is a need to adopt the Anti-Squatting law.
There is a great need of further clarification in two areas of cyber law are
the proper and comprehensive definition of cyber crime and proper law on
jurisdiction both at national and international level. Like in India there are only a
limited number of cases on cyber law and also no main statutory schemes on the
books. The Policy makers and the judiciary who are dealing with cyber crime are
usually confined to refer the scare existing laws and cases.
240
international level between countries.
Even USA and UK has signed this Convention735 which covers a number
of offences as extraditable including firstly, offences against the confidentiality,
integrity and availability of computer data and systems such as illegal access,
illegal interception, data interference, system interference and misuse of devices;
secondly, computer related offences such as computer related r fraud and forgery;
thirdly, content related offences such as child pornography; fourthly, offences
related to infringements of copyrights and related rights, attempt and aiding or
abetting. However, there is need to update or ratify the convention because all
types of cyber crimes are not covered under this. There is also need to update the
list of extradition crimes under Extradition Act, 1962 by including certain other
recent growing cyber crimes which are quite popular with cyber criminals and
which affects the economic and social fabric of a country. International Cyber
Law Treaty is also required.
735
Convention on Cybercrime, ETS 185, available at: http://www.europarl.europa.eu/meetdocs/
2014_ 2019/documents/libe/dv/7_conv_budapest_/7_conv_budapest_en.pdf (visited on April 8,
2017).
241
Need to Frame and Update Mutual Legal Assistance Treaty (MLAT)
India has signed Mutual Legal Assistance Treaty (MLAT) for cooperation
on criminal matters with a number of other countries and presently a signatory to
UN Convention against Transnational Organized Crime. Although India has
signed this MLATs and convention for cooperation and legal assistance on
criminal matters, a cyber crime may not be covered by it in those arrangements
which require dual criminality to be satisfied and there are no time limits for
execution of requests. Proper investigation and prosecution of cyber crimes
requires quick action but it is felt that such treaty may not provide effective
procedure or cooperation framework in dealing with cyber crime matters. There
is need to make efforts for framing MLATs which could expressly deal with
international cooperation on cyber crime matters and also efforts should be made
to update the existing MLATs with effective provisions so that it will bring
harmonization in substantive and procedural laws which govern cooperation from
other countries on legal assistance in cyber crime matters.
242
Need to Adopt and Enforce the Recommendation Made by the United
Nation General Assembly
United States of America has passed several laws on Cyber Crimes but the
cyber crimes are increasing day-by-day. United States is considered as the
birthplace of cyber crimes. There is a need to amend the laws by removing defects
and need of proper enforcement of cyber laws in the country. The United States is
being criticized for not including the definition of computer crime. There is not
any specific comprehensive law in United States of America which covers all the
cyber crimes in it. There are so many legislations on cyber crimes but being
criticized on any points by the internet activists. Like, the CAN-SPAM Act, 2003 of
United States is not found adequate to comprehensively tackle with spamming
cases. This was criticized by internet activists who work to stop spam. They stated
that this Act is appeared to give federal approval to spam practices and seems to
fail to tell the marketers about the spam. There is need to amend the law. There is
also no uniformity around the world in treating the cyber defamation cases. The
major commonwealth countries are following the different practice relating to cyber
defamation cases. In United States of America, a cyber defamation case is very
difficult to prove because of the rigid nature of first amendment in Constitution
law. The Computer Fraud and Abuse Act, 1996 has been criticized for allowing
243
companies to forbid legitimate activities such as research or remove protection
found elsewhere in Law. There is a need to amend all these laws by removing
defects and to consolidate a comprehensive law on cyber crime cases.
The e-Courts project736 is based on the National Policy and Action Plan for
Implementation of information and communication technology in the Indian
judiciary in 2005 submitted by e-committee of Supreme Court of India with the
736
Ministry of Law & Justice, Government of India, E-Courts Mission Mode Project, Dec. 10,
2015,
available at: http://pib.nic.in/newsite/PrintRelease.aspx?relid=132954 (visited on April 8, 2017).
244
vision to transform the Indian judiciary by information and communication
technology enablement of courts and to make justice delivery system more
affordable and cost effective and to provide designated services to litigants,
lawyers, and the judiciary by universal computerization of districts/subordinate
courts, to facilitate e-filing, e- Payment and use of mobile applications. This
Mission Mode project is one of the national e-governance projects being
implemented in High courts and districts/subordinate courts of the country. The
government approved the computerization of 14,249 district and subordinate
courts under this project by March 2014.
United Kingdom and United States of America have also provides this
facility of e- filing. United Kingdom provides this facility of e-filing in Chancery
Division Court since October, 2014 and in Admiralty and Commercial Court
since June, 2015. Maryland737, the US State also provides the facility of e-courts
and upto June, 2017 this facility will extend to Southern Districts and Circuit
Court of Maryland.
The Information Technology Act, 2000 does not contain any specific
provisions for the offence of internet time theft. It has not made any amendments
in the Indian Telegraph Act, 1885 or Sections 378 and 379 of the Indian
Telegraph Act, 1885 that define the offence and provides punishment for theft.
The Indian Telegraph Act was enacted in 1885 with the purpose to give power to
the Government and to any company or person licensed under section 4 of the
Indian Telegraph Act, 1876 and specially empowered in this behalf, to place
telegraph lines under or over property belonging whether to private persons or to
public bodies. IT Act, 2000 amends only the Indian Penal Code, 1860, Indian
737
Maryland Courts, available at: http://mdcourts.gov/mdec/ (visited on April 8, 2017).
738
The Hindu, October 18, 2014 (Last modified on May 24, 2016), available at: http://www.
thehindu.com/todays-paper/tp-national/tp-karnataka/high-court-to-establish-two-
ecourts/article6513535.ece (visited on April 8, 2017).
245
Evidence Act, 1872, The Bankers Book of Evidence Act, 1891, and the
Reserve Bank of India Act, 1934 but not Indian Telegraph Act. So there is a
need to amend the Indian Telegraph Act with the purpose to make it more relevant
in today’s context.
Need to Amend the Penal Laws with Clarity and Specificity without
Relying on Vague Interpretations
Cyberspace which is developed since the 1990’s and having the fast and
negative impact on societies. For the purpose of establishing ethical standards in
cyberspace there is a need to enact the penal laws with as much clarity and
specificity as possible without relying on vague interpretations in the existing
legislation and the perpetrators must be convicted for their explicit acts. This must
be done on both national and international level.
There are thousands of cases taking place in the countries but only the few
cases are lodged as a complaint. Because many of the victims due to the threat
and fear of getting abused in the society does not move any complaint against the
cyber criminals, some of the cyber victims accept this incident as nightmare or bad
destiny or as wished by God and moving on the life by forgot all the incidents.
But due to this the cyber criminals are more encouraged to get involved in such
type of cyber criminal activities.
246
There is a great need to encourage litigation both at national and
international level because the corporate sector has been shy of reporting cyber
crimes fearing adverse publicity which results into less judicial pronouncements.
Conviction reinforces the confidence of the people which enhances the capability
of the law enforcement agencies to combat cybercrime and in the Indian judicial
system’s resilience in dealing with new challenges in the cyber age. Public due to
unawareness that a cyber crime has been committed against them, are not able to
approach the police about the commission of cyber crimes. There is a need to take
effective steps for encouraging the public as well as the corporate sector to come
forward for combating with these types of crimes with the assistance of
government.
There is need to see cyber crime and cyber security as an ever present
challenge by the major businesses which requires continuous investment and
monitoring at management and crucially board level. Major businesses firstly
need to ensure that adequate cyber security is in place in the context of increasing
technically complex attacks. Then after, there is need to increase cyber resilience in
particular the ability to detect, contain and remediate breaches and other cyber
incidents by the businesses. It is critically found that businesses are not interested
to implement and maintain the latest technical and high demanded practices, but
also they did not actively test how well they are prepared for combating cyber
criminal attacks because this testing will encompass both their resistance to threats
and their ability to mitigate the loss or fear caused by cyber attacks.
Cyber crime is ever growing threat of complex nature. Neither the law
enforcement agencies nor the businesses will be able to alone mitigate and control
this challenge. There is need of partnership approach between law enforcement
agencies and businesses to control cyber threats and to identify and disrupting the
cyber criminals. Such partnership would be build on existing intelligence sharing
initiatives, including sector based information sharing forums and the
Governments Cyber Security Information Sharing Partnership but would go further
in encouraging and enabling the reporting of cyber crimes as suggested by National
Crime agency (NCA).
247
Need to Develop the Common Agenda of Harmonizing the
Atmosphere between Nations
The common network is being used by the entire globe at national as well
as international level with the warranties of having existence of international co-
operation. With the purpose to maintain it there is a need for every nation to
develop a common infrastructure for dealing with cyber crimes which is
harmonizing with the legal system of other nations. Presently, many efforts are
going on to develop the common agenda of harmonizing the atmosphere between
nations for combating cyber crimes by the international treaties, conventions or
commissions i.e. UNCITRAL Model Law etc.
It is rightly said that prevention is always better than cure. Public should
take certaineffective precautions for protecting themselves from such crimes while
operating the internet Government as well as public awareness is highly required
for combating this recent growing cyber crime both at national and international level
because public and government both is the pillar of a nation. Government will
work out on the basis of what the public required or demanded. If any cyber crime
is committed against them then immediately report to police about this. If the
public is aware about their rights and duties then the government will work
properly. For this technology based programmes, education, camps and other
effective means should be adopted by the government for awaking the public at
large to protect themselves from these types of crimes.
It is also found that the cyber crimes are causing monetary and non-monetary
losses to the government sector as well as private sector entities, departments,
institutions etc. at national and international level. There is a need to tackle this
problem at both levels with the co-operation of both private and public sector and
also a need to develop the investigation capabilities. Because in India there are
very few institutions that are providing Cyber Crimes Investigation Training, so
there is a need to establish more such institutions and from time to time such type
of camps should be organized. Technical training of the police, cyber authorities,
investigating officers, prosecutors, judges and advocates is highly demanded from
time to time. Indian police force is not qualified in the complex field of computers,
computer networks. It is also suggested that due to the very dynamic nature of
248
information technology there is a need to inculcate the culture of continuous and
learning education among the law enforcement authorities because the today’s
knowledge becomes obsolete in a very short time.
There must be uniform guidelines for the internet service providers and
cyber café both at national and international level which expressly mentioned
their liability and accountability such as there must be the provision for
prohibiting them from use of user’s numbers of their clients and for keeping the
secrecy of their personal information which is provided on the basis of utmost
good faith. These guidelines must be updated from time to time according to
change in circumstances.
Now-a-days Sting operations are very common in many countries like USA
but these operations are not permitted in many countries like Sweden.739 It is said
unlike the U.S. and certain other countries where the sting operation is recognized
as a legal method of law enforcement, though in a limited manner, the same is not
739
“Sting Operation”, Wikipedia, available at: https://en.wikipedia.org/wiki/Sting_operation
(visited on April 6, 2017).
249
the position in India.740 In court on its own motion v. State741 case, the Division
bench held that where a sting operation made by a private person or an agency,
which may result in violating bodily privacy of another person will fall under
section 66 E of the Act. Such person shall be liable under the Act. There is a need
to legally adopt this method in certain cases where required in public interest and
national security.
It has been rightly said, “If information technology was going to be the
integral part of life, it would be imperative to ensure that its abuses were curbed
and punished. Information technology’s legitimate and beneficial uses should be
promoted and encouraged in public interest. He said creating an institution
awareness of cyber threats, responsibilities and solutions were essential to
curbing cyber crimes. He also said that the law should necessarily respond to
social changes if it were to fulfil its function as a paramount instrument of social
order.” 742
740
The Hindu, New Delhi, June 24, 2016, available at:
http://www.thehindu.com/news/national/sting- operation-not-a-legal-method-of-law-enforcement-
supreme-court/article5944283.ece (visited on April 6, 2017).
741
(2013) WP (C) 162, Del.
742
Legal framework inadequate to tackle cyber crime” The Hindu, July 27, 2008.
743
Talat Fatima, Cyber Crimes, 2011, p. 77, see also Donald Brackman’s remarks on the 2009
Annual Report on Cyber crime released by the FBI on March 13, 2010.
250
BIBLIOGRAPHY
• National Crimes Records Bureau, Ministry of Home Affairs, cyber
crimes in India.
• Dr. Jyoti Rattan, Cyber Laws & Information Technology (Bharat Laws
House Pvt Ltd , New Delhi,2014)
• S.k Verma and Raman Mittal , Legl Dimension of Cyber Space ((India
Law Institute Publications,2004)
252
Investigation Department Review,2008
253