11 Chapter-6
11 Chapter-6
minutes. Information and ideas will go where they are wanted and stay
where they are well treated. It will flee from manipulation or onerous
long"1.
crime world". The growth of cyber crime in India, as all over the world, is
on the rise and to curb its scope and complexity is the pertinent need
1
Walter B Wriston : The Twilight of Sovereignty : How the Information Technology Revolution is
Transforming Our World (2003) p.31.
286
The case studies indicate that all walks of life are getting exposed
to cyber crime. Several people have come forward and reported such
crimes, which have met with an assuring and prompt response from the
law enforcement authorities from the different cities of the country. The
practice of any craft builds expertise and excellence over a period of time,
happening and the cyber sleuths are learning new tools and honing them
with initiative and experience. The aim of instituting the annual India
in the modern society. But human experience has shown that every
throughout the world. Internet is one such gray area, which has given rise
system has crossed the territorial borders thus creating a distinct field for
287
Cybercrimes have emanated from development of computer
network. Internet in the present millennium has become all pervasive and
one owns yet people of all the nationalities use it. The term 'cybercrime'
that the computers despite being high technology devices are extremely
that 'cybercrime' has been defined as "an unlawful act wherein the
cybercrimes which are being committed by offenders all over the world
2
Supra Chapter 1.
288
lack of adequate knowledge about the computer operating systems. This
is the main reason why this relatively new variety of crime is posing a
challenge to the legal regime. The problem has been further aggrevated
came into force on October 17, 2000. The Act categorically defines
privacy etc. It is not that prior to this legislation there was no law to deal
with these offences. The Indian Penal Code, 1860 already contained
provisions to prevent and control cybercrimes but they were not found to
obvious reason being that no one knew about the computer or internet3 at
extended its tentacles cutting across the national frontiers whereas the law
is still struggling to define and redefine the boundaries for the control of
3 The computer technology has mainly developed and expanded throughout the world only
during the last quarter of 20th Century
289
cybercrimes. Following a similar course, the cyber law particularly, the
territorial limits.
far away from the place of offence, may it be in the same country or some
states for restructuring their cyber laws to meet the new challenges. The
Convention not only dealt with the changes and improvements in the
substantive part of criminal law but also referred to the procedural aspect
4
Effective From June, 2001
290
the European Convention has chosen ten specific cybercrimes5 and urged
as crime under the criminal law of other countries, which really poses a
all the countries of the world. The crux of the matter is that universally
accepted standard cybercrime preventive laws should not vary from place
countries have updated their cyber law to counter the cyberspace crime
effectively, while many of them have not even initiated steps to frame
laws for policing against these crimes. This divergent approach of world
handling the internet crime and at the same time provides ample scope for
the cyber criminals to escape detection and punishment. All the nations
should therefore, realise the need and urgency for generating awareness
291
epidemic spread over the world in the new millennium which has to be
The countries which have updated their cyber law to suit the needs
Japan amended its Penal Code to include many criminal acts which
w.e.f 5th February, 2009. The amending Act has inserted as many as 15
new cyberspace offences which are punishable under the I.T. Act. That
apart, many of the provisions of the Indian Penal Code have been
6
The Information Technology Act, 2000 which came into force w.e.f. October 17, 2000.
292
An overall global view of cyber law indicates that many countries
nations around the world and their mutual co-operation in fighting against
cyber criminality.
Broadly speaking, the law enforcement agencies all over the world
are confronted with four major problems while dealing with cybercrimes
293
communication which is a complicated task. Therefore, the cyber
identity.
The legal challenge emerges from the fact that cyber criminality is
There are hardly twenty countries in the world which have enacted
which is equally applicable to all the countries. The cyber laws should
294
and preserve sufficient evidence against the person accused of
against the Sri Lankan embassies was perhaps the closest thing to cyber
threats and risk. I do not believe we have even begun to thing of the
295
global strategy and policy for combating this type of terrorism is need
now.
case and territorial jurisdiction over the location or place where the crime
cyber dispute or crime, the problem often arises as to the law of which
SUGGESTIONS
296
cybercrime with stern hands. Even a short delay in investigation may
allow cyber criminals enough time to delete or erase the important data to
evade detection, which may cause huge loss to the internet user or the
victim. That apart, the peculiar nature of cybercrimes is such that the
offender and the victim(s) do not come face to face, which facilitates the
for this reason that a multi-pronged approach and concerted efforts of all
menace. This calls for participative role of all those who perceive that the
whole. It also calls for self protection initiatives by the people who are
awareness about the nature and gravity of these crimes and the dangers
297
warning people against the possible dangers and evil effects of
cybercrimes on victim(s) as also the nation and the safety measures which
the criminals. Some other suggestions to prevent and reduce the incidence
world. Perhaps, it is the area which has been most benefited by the advent
trade and commerce has at the same time opened new vistas for the
houses now believe that there is a huge and profitable market for
298
computer in commercial field, most of the money transactions are being
carried out with the help of computer network making it possible for the
January 25, 2000, has provided that trading of securities on internet will
Technology Act which provides legal validity and prevent security frauds
299
resources and they should also be made accountable for any lapse in
computer security.
The use of encryption technology may also help to protect data and
300
3. Intrusion Management:
safeguarded.
with the conclusion that victim's computer system has been damaged due
technology.
301
4. False e-mail identity registration be treated as an offence :
mail service providers refuse to provide two ID's to the same person. This
e-mail identity with a fictitious IP address and misuse the same for
perpetration of a cybercrime. This lacunae in the Act has been taken care
(Amendment) Act, 2008 (10 of 2009), which provides that any false
302
Providers (ISP) can play a crucial role in eliminating online crimes by
can lay down the conditions through a written agreement binding the
users to refrain from indulging in illegal activities. Besides, they may also
the parties. The law relating to search, seizure and arrest as applicable to
303
The tele-communicatioin department should also review its policy
where computer is popularly used as a means for carrying out routine life
304
8. Development of cyber forensics and Biometric Techniques:
it in the form of evidence of cybercrime before the court of law, the cyber
evidence that is distributed across the large computer network. The main
object of cyber forensics is to discover the evidence and access the intent
and identity of the cyber criminal as also to determine the impact of crime
on the victim(s).
cybercrime.
305
reaching the criminal and establishing his guilt on the basis of evidence
footprints, retinal scans, body odor etc. can provide important clues to
create awareness among the computer users abut the possible dangers
victim and his ignorance about the information security and safeguards,
the damages caused by these crimes. Generally, the internet users remain
unaware of the fact that while they are online, they may fall a victim to
306
cybercrime or may themselves unknowingly involve in an activity which
constitutes an offence though did they did not intend to commit it. This is
Some computer experts have suggested that there is dire need to set
Investigation and the Reserve Bank of India, which should collect, collate
and disseminate all data relating to computer crimes among the users. The
centre should also lay down a model standard procedure to ensure safe
computing.
Law and criminal justice delivery system have not kept pace with
preceding years, which has provided ample scope for the abuse of
307
are no longer valid for protecting the unauthorised manipulation of
should be stringent and even exemplary so that they may desist from
308
uncertainty regarding crimes committed in cyberspace has made
global cyber law with the co-operation of all the countries of the world.
enforcement agencies all over the world are facing. Cyber criminals may
8
As suggested by G-8 contries in the Paris Convention on cyber crimes held in France in May, 2000.
309
11. Global Code of Digital Law for resolving IPR related
Disputes :
revolution during the closing years of twentieth century has opened scope
all over the world. This is all the more necessary in view of the expanding
alleged that the domestic laws controlling computer security are mostly
310
adequate protection to citizens, institutions, organisations, government
of cyber crime.
Perhaps, the greatest threat posed by computer system and internet is that
to evolve consensus among the member countries about the need for
10
Terrorist attack on U.S. World Trade Center (WTC) on 11 September, 2001 and on Indian
Parliament on 13 December, 2001; Taj and Oberai Hotel, Mumbai on 26 November, 2008 etc. are the
glaring examples of blatant misuse of computer technology for heinous cybercrimes.
11
South Asian Association for Regional Co-oporation.
311
advance cyber technology from the developed countries adopting a
and has jurisdiction all over India. It has the power to investigate the
2000 and is also empowered to probe into other hi-tech crimes. There are
Kolkata.
Cell of CBI, there has been a growing demand for setting up Cyber Crime
direction, the State of Karnataka was the first to set up the country's first
Cyber Crime Police Station on August 30, 2001, which has jurisdiction
all over the State. Subsequently, Cyber Police Cells were also set up in
the metropolitan cities for handling cybercrimes. These cells are manned
312
experts as and when required for the investigation of cyber crimes. But
most States have no special police cyber cells and the cybercrimes are
should be mandatory for each State to set up atleast one Special Cyber
or data in private systems, computer equipments, disk etc. with the prior
July, 2007 for the creation of e-judiciary and e-governance grid covering
313
work-load of the courts and ensure speedy disposal of cases as also
etc. at the district level, which has reduced the security risk of the
314
difficult to detect cybercrime. That apart, many victims of computer
litigation which may drag on for years. The trading community and
scanty and whatever cases are reported, they are mostly either dropped
and more cases coming before the courts for adjudication, it would be
Journal' for the benefit of the members of the Bar Bench, police and
enforcement agencies and all others who are concerned with the
315
18. I.T. (Amendment) Act, 2008-A step in the right direction :
prevention and control of these crimes. In the Indian setting, there is need
extending the reach of law to almost all the online criminal activities and
still suffers from certain lacunae as it does not provide adequate security
although the Securities Exchange Board of India (SEBI) has notified that
316
data theft by call center employees. The amendment Act has provided a
and time when the disputed electronic document was made and signed
used to create digital time stamps (DTS). The system has been
successfully working in the United States for the last so many years.
317
implemented in cases where the culprit (mostly the hacker) happens to be
in a country with which India has no extradition treaty. This problem may
international law.
21st century, internet has influenced every facet of human life and no one
can even think of life without the use of computers. Therefore, in the
should be preserved for the progress and prosperity of the society rather
exercise due diligence and caution while pasting information in their web
page. The ease with which the data and information flows through the
internet across the world may sometimes be exploited by the criminals for
level.
---------------
318