Book (Soft Copy)
Book (Soft Copy)
EDITORS
Prof. (Dr.) Aditya Tomer
Dr. Harshita Singh
Ms. Garima Wadhwa
STUDENT CO-EDITORS
Aayushi Singh
B.A. LL.B(H), Amity University, Noida, India
Nishita Mahajan
B.A. LL.B(H), Amity University, Noida, India
This book covers each sphere that touches upon the topic of Cyberspace in
detail. It has been extensively researched and the content has been put forth in
a well-structured and informative format to ensure the data does not
overwhelm the reader, but subtly educates them. I remember my own
dilemmas regarding the issue and how I informed myself about the latest
trends related to Cyber Law to keep up with the changing times and policies.
I'd like to commend the editorial staff for addressing this matter, which is the
most intervening and common factor of our lives and yet it has not received as
much attention. I sincerely hope this book strikes a chord with the audience
and effectively expresses the message it encompasses. I also think that this
edited book will serve as a resource for professors, researchers and students to
understand the significance of the “Emerging Trends and Challenges in
Cyberspace” and it’s interpretation by the world, as a boon or a curse.
Yours
Saleh Alobeidli
Executive Chairman
CA SENGINE
ACKNOWLEDGEMENT
First of all, we would like to thank the Almighty God with whose
help everything becomes possible.
We owe our sincere thanks and profound gratitude to all the
contributors of the book for their invaluable guidance and encouraging
attitude in completing this manuscript. They gave all encouragement and
help as a guide. A special thanks to the student Co- Editors without whose
support this book would not have been possible.
This book looks into the interactions between domestic counter-
cyber terrorism legislation development, while emphasizing on
international talks of cyber terrorism and policy developments. The debate
over cyber security in relation to information security and the associated
issue of information operations and disinformation are of particular note in
this, in addition to, focusing on finding legal solutions to the menace of
cyber terrorism. Hence we are obliged to the Ministry of Electronics and
Information Technology, Government of India, Indian Computer
Emergency Response Team (CERT-in) and Ministry of Law & Justice,
Government of India etc for providing data, reports and surveys vis-a-vis
associated factors causing cyber crime problems in India.
We are also indebted to the staff members of the Library of Indian
Law Institute (Delhi), Library of University of Delhi, Library of Jawaharlal
Nehru University (Delhi), Library of Amity University, Noida (U.P),
Library of Guru Govind Singh Indraprastha University, (Delhi), Library of
Ch. Charan Singh University, Meerut and Department of Law, Meerut
College, Meerut for their generous help.
Our heartfelt thanks to our better halves, who always supported us,
taken full interest in our topic from the starting point of this book and co-
operated us till the end. A sweet thanks to our parents and elders for their
blessing and good wishes.
We are thankful to the learned teachers, scholars, friends and
relatives who have assisted us in completing this book. This work would
not have been possible without their valuable support and assistance. We
are grateful to various legal luminaries whose scholarly and celebrated
works have been helpful in completing the book.
Last but not the least we would like to thank all persons directly or
indirectly related to the book.
- Editors
PREFACE
- Editors
CONTENTS
CHAPTER 1
INTRODUCTION
1Assistant Proffesor & Program Coordinator, Instititute of Legal Studies & Research,
GLA University, Mathura , (India)
2B.A. LL.B (H), 4th Year, Amity Law School, Amity University, Noida, (India)
1
CYBER LAW: EMERGING TRENDS AND CHALLENGES
3 “India: Cyber Crimes Under the IPC And IT Act - An Uneasy Co-Existence”,
available at https://www.mondaq.com/india/it-and-internet/891738/cyber-crimes-unde
r-the-ipc-and-it-act---an-uneasy-co-existence. (Visited on March 7, 2023)
4Cyber Attacks- Promoting Data Protection, available at https://www.dsci.in/content/c
yber-attacks#:~:text=Cyber%20attacks%20are%20defined%20as,to%20the%20pene
tration%20of%20adversary. (Visited on January 16, 2023).
2
CYBER LAW: EMERGING TRENDS AND CHALLENGES
5Andy Greenberg, “Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's
Most Dangerous Hackers”, Publisher- Doubleday (May 7, 2019).
6 India’s largest bank SBI leaked account data on millions of customers, available at
3
CYBER LAW: EMERGING TRENDS AND CHALLENGES
7Fred Kaplan- “Dark Territory: The Secret History of Cyber War”, Simon & Schuster,
ISBN 9781476763255 (ISBN10: 1476763259), March 1, 2016.
8 Air India's Data Breach - data security is more crucial than ever, available at
https://www.cryptomathic.com/news-events/blog/air-indias-massive-data-breach-
compliance-to-major-rule. (Visited on February 3, 2023).
9 Nicole Perlroth- “This Is How They Tell Me the World Ends: The Cyberweapons
Arms Race”,
Bloomsbury Publishing, ISBN 9781635576054 (ISBN10: 1635576059), February 9,
2021.
4
CYBER LAW: EMERGING TRENDS AND CHALLENGES
5
CYBER LAW: EMERGING TRENDS AND CHALLENGES
45 - Penalty for acting in violation of any rules of the Act for which
the punishment has not been separately provided; In this case, a
compensation amount equalling or under Rs 25,000 is to be paid to
the victim by the violator
6
CYBER LAW: EMERGING TRENDS AND CHALLENGES
7
CYBER LAW: EMERGING TRENDS AND CHALLENGES
available at https://www.britannica.com/topic/United-States-Department-of-Homeland-
Security. (Visited on March 13, 2023).
8
CYBER LAW: EMERGING TRENDS AND CHALLENGES
9
CYBER LAW: EMERGING TRENDS AND CHALLENGES
13 Brian Krebs- “Spam Nation: The Inside Story of Organized Cybercrime — from
10
CYBER LAW: EMERGING TRENDS AND CHALLENGES
A. Clarke and Robert K Knake, “The Fifth Domain: Defending Our Country,
14Richard
Our Companies, and Ourselves in the Age of Cyber Threats”, Penguin Press, ISBN
9780525561965 (ISBN10: 052556196X, July 16, 2019.
11
CYBER LAW: EMERGING TRENDS AND CHALLENGES
also pushes for full transparency in the event of a data breach or any
other event. Many other laws throughout the world, including those
in Turkey, Mauritius, Chile, Japan, Brazil, South Korea, South
Africa, Argentina, and Kenya, used the regulation as a model.
Following Brexit, the United Kingdom nonetheless made the
decision to keep the statute in place as of October 6, 2022, even
though it was no longer a member of the European Union.
To prevent third parties from breaching data protection, the
GDPR mandates that private enterprises in the UK use stringent
security measures. They promote the building and upkeep of
infrastructure that is more cyber-secure. Furthermore, it establishes
explicit cybersecurity guidelines for all businesses that offer crucial
services, including those in the health, transportation, and internet
industries.
South Korea
Moving down the list of countries that can be deemed to be
role models for other legislations with how they tackle cyber
security threats we have South Korea. Being a country that faces
threats unceasingly from not just foreign forces but from its
neighbour North Korea as well, South Korea (hereinafter referred to
as RoK “Republic of Korea”) was forced to arm itself with the
latest, most progressive forms of security, some of which we shall
examine now:
Korea's cybersecurity initiative truly took off in the 1980s,
when the RoK government first began to aggressively push the
digitalization of business, government, and society. By the
implementation of e-government services, the administration also
placed a priority on boosting national competitiveness and e-civil
service. Yet, up until the early 2000s, the majority of this effort was
concentrated on document security and physical security, with the
intention of offering a shield of information protection or
information security. The National Intelligence Service (NIS) of
Korea and the Ministry of Science and ICT (MSIT), respectively,
set these targets for improving cybersecurity in the public and
commercial sectors. Nevertheless, instead of creating a proactive,
comprehensive, multi-national cybersecurity strategy or policy,
12
CYBER LAW: EMERGING TRENDS AND CHALLENGES
13
CYBER LAW: EMERGING TRENDS AND CHALLENGES
CONCLUSION
In conclusion, even if it is believed that India's cyber legal
framework satisfies the demands of the time, it has a number of
drawbacks. The cybersecurity regulations of various industry
bodies, in particular, need to be revised to keep up with the rapid
advancements in technology. New policy frameworks are being
developed by the Indian government in order to protect the
aforementioned advances. The provisions of this new policy
framework are thought to be robust enough to withstand the
challenges posed by these new tendencies. Having said that, for
these measures to be effective, the relevant authorities must carry
them out meticulously and without indulging in any corruption.
India is one of the most likely targets for hackers, as history has
shown. Regarding other nations' cyber laws, the United States of
America, although having a range of policies and legal frameworks
to ensure cybersecurity, struggles with proper execution. The policy
frameworks for several areas, such the health sector, the insurance
industry, and private businesses, are consistently deficient in all of
these countries. Therefore, we must consider measures to ensure
that the carefully constructed policies are rigorously enforced in all
situations, including India, or else the policies will be irrelevant.
14
CYBER LAW: EMERGING TRENDS AND CHALLENGES
CHAPTER 2
“The Internet has become a crucial platform in our lifeline, with the
help of the internet one can navigate, start their own businesses,
etc., take classes, and do everything with a touch away with the use
of appliances like Phones, Tablets, Laptops, Screen readers, etc.”.
INTRODUCTION
15
CYBER LAW: EMERGING TRENDS AND CHALLENGES
16
CYBER LAW: EMERGING TRENDS AND CHALLENGES
5JustinSeitz- “Black Hat Python: Python Programming for Hackers and Pentesters”,
No Starch Press, ISBN 9781593275907 (ISBN10: 1593275900) December 21, 2014.
17
CYBER LAW: EMERGING TRENDS AND CHALLENGES
was even found that, all the data which was stored by them, server
withheld details of their outpatient and inpatient online medical
services including smart lab, billing, report generation, the
appointment system, were disrupted, leading to disruption in the
lives of the medical staff and the patients.
Similarly, in February 2016, the central bank of Bangladesh
was targeted leading to a lot of issues in SWIFT. It estimated that 35
fraudulent/ spam information was issued by hackers via the SWIFT
network leading to the illegal transfer of 1 billion dollars from the
Federal Reserve Bank of New York account belonging to
Bangladesh Bank. Due to the weaknesses in the security of the
Bangladesh central bank, including the possible involvement of
some of its employees, perpetrators attempted to steal US$951
million from the Bangladesh Bank's account with the Federal
Reserve Bank of New York.
Another incident was faced by BFSI, according to the recent
report it said /estimated that India's Banking and Financial services
are frequently facing cyber hacking and are easily targeted by
hackers online. The research also said that India faced 283 incidents
in the half-yearly 2022, and 469 in the year 2021, this is as per
CNBC’s report. Any cyber attack on any bank, financial institution
directly impacts the economy of the country badly and hampers the
growth of GDP too .
On 6 April 2022, Cash Mama (a loan app of Indian origin)
reported a breaking of information, in which a customer’s data was
exposed, that included personal as well as banking details. If we go
around 1.5 months back, a similar incident was faced by a Russian
Stock exchange called “Moscow Stock Exchange and Sberbank”
on the 28 February where their websites went offline due to cyber
attacks. It’s claimed that it was done by the IT people of Ukrainian
government, this was a type of Ddos attack, Ddos means Denial of
Service attack, it’s a type of cyber attack in which a felon makes a
network unavailable to the users and thereby connectivity of host of
servers connected . In the year 2021, 25 percent attacks that affected
the financial industry were caused by Ddos. In 2020, Imperva a
software company saw a 30 percent increase in Ddos activities. In
2016, Canara Bank (Indian Bank) faced a similar issue of vandalism
wherein their website got blocked and online payments couldn’t
happen.
18
CYBER LAW: EMERGING TRENDS AND CHALLENGES
19
CYBER LAW: EMERGING TRENDS AND CHALLENGES
20
CYBER LAW: EMERGING TRENDS AND CHALLENGES
7 Max Tegmark and Rob Shapiro, “Life 3.0: Being Human in the Age of Artificial
2023).
21
CYBER LAW: EMERGING TRENDS AND CHALLENGES
thereby saving a lot of time and manpower. 5g means till now the
fastest means of communication and technology, having a device
that is capable of 5g will allow banking institutions to access wider
customers throughout the world. 5g can help us provide services of
getting loans online instantly, solving complex problems related to
banking, and even buying and purchasing of shares, so if we do not
want to waste our time on going to banks physically, then why not
we implement 5g technology and save a lot of time, as there is
saying “Time is precious “, so to save time, we can implement this
!.
For our financial sector, we need the implementation of
stricter rules and regulations, stricter rules and regulations will help
to make sure that things run smoothly, efficiently, and in a secure
manner, for this law plays an important role. Since we are living in
the 21st century, we can have as many people hired to control the
law in order of a particular state/district or country, even despite
having a lot of manpower employed, crime rates are so high, in this
kind of a situation, 5g plays a crucial role. Implementation of
CCTVs plays a significant role, let's say a crime has occurred
somewhere and that person has fled away, it would be difficult for a
person to catch him/her, whereas if CCTVs are installed, we can
trace the footprints of that person and also helping us gathering
relevant evidence. 5g helps to process things faster, meaning that
CCTVs will be able to produce clearer images, this helps to increase
and improve the task of the police. 5g will provide a lot of storage,
thereby storing more files and reducing paperwork also it helps to
increase communication between citizens and the government and
provides rapid response in the case of an emergency. Let us explain
with an example over here, Vprotect is a company which has
recently started with security services, what we mean by security
services is that they provide the customer with CCTV surveillance,
motion detector sensors, fire alarms, door magnetic sensors, etc, all
of these appliances are connected to the internet and are controlled
by an application available online, also same features of monitoring
that a customer gets, the same does the company gets, meaning that
they are 24/7 scanning your house from the external boundaries to
make sure that any unwanted activities don't happen, if any intruder
enters your property, they get a notification at their headquarters and
help is sent in no time. This shows that technology plays a crucial
role in the implementation of law in order and in reducing criminal
22
CYBER LAW: EMERGING TRENDS AND CHALLENGES
23
CYBER LAW: EMERGING TRENDS AND CHALLENGES
24
CYBER LAW: EMERGING TRENDS AND CHALLENGES
25
CYBER LAW: EMERGING TRENDS AND CHALLENGES
CONCLUSION
The financial sector plays a crucial role in the economy, it’s the
backbone of the economy. Be it exports, imports, manufacturing,
banking, etc all come under this. If we have to make our economy
strong, then we have to pay special emphasis on the financial sector
and its pillars. Since banking institutions are the targets by cyber
hackers, it's necessary to ensure that we take proper precautions to
make sure that we aren't victims of cybercriminal activities. Keeping
our data confidential is one of the best ways by which we can reduce
such activities, secondly never open any links by someone whom you
don't know as that is one of the means of phishing that hackers use. It's
always advisable whenever doing online transactions, to make sure that
no one is next to you, this can help in preventing the other person from
getting information and bank details. Educating and spreading
awareness is another important factor, if we educate people on cyber
safety and precautions that need to be taken whenever a person is doing
online transactions or posting anything on social media, in this way, we
can help in reducing the victims of cyberbullying. The goal of
companies should be eliminating cyber hacking and cyberbullying and
making a safer environment for online transactions.
Old software is more vulnerable to attacks, therefore its
necessary to ensure that software is updated, and passwords are
changed so that chances of hacking get reduced, it's advisable to use
strong passwords and try to put passwords that the owner can
remember. It's necessary to ensure that the financial sector hires
financial advisors who can help and guide businesses. Special
emphasis should be done on the training and skill development of
employees so that they can handle any complex problem or
situation.
We need to make sure that the financial sector provides us
with a safe environment for banking activities, therefore it's
necessary that banking institutions should be able to solve and meet
the requirements of the consumer and is able to keep the owner's
assets safe and secure. The law in this plays a major role also, we
need to have proper IT acts which are modern and help to establish
a further secure internet environment, certain acts need to be
amended. World will not be limited to 5g connectivity, we will
26
CYBER LAW: EMERGING TRENDS AND CHALLENGES
further have 6gs coming out in the coming years, which will be the
successor to 5g, and would be faster as compared to 5g , therefore
systems should be made in such a way, that they have strong
encryption and can't get easily targeted by hackers. People should be
encouraged to use stronger firewalls and VPNs to further enhance
security, firewalls help in monitoring and scanning the network
traffic, whereas a VPN (Virtual Private Network) helps to hide the
person's actual IP address thereby making it difficult for third-party
people to access the websites, etc.
Lastly, nowadays, our mobile phones store all our accounting
details, credit card, debit card, IFSC codes, etc. It's necessary to
ensure we block all the cards and banking activities if our appliance
is stolen, or lost as soon as possible. Online banking activities
should be resumed only after all the passwords have been changed
and complete verification has been done. Contacting the bank
should be the first thing, this will help you to prevent any losses
caused by fraudulent activities, scammers, or hackers. In recent
times, technology has provided us with a platform that no one could
ever imagine, in the 18th or 19th century. Technology helped us in
the pandemic especially in the education field by having online
classes through various apps like Google meet, classrooms,
Microsoft Teams, etc, it provided teachers with the features of
making online proctored tests, giving them the option of
whiteboards and live one-to-one interactions. Not only in the
pandemic, but it provides us with classes and solves doubts anytime
and anywhere, it's like an open library. In the health field, it enabled
patients to interact with doctors about their problems through video
conferencing through apps like Practo, etc . In the banking and
financial sector, it helps us to deposit, and withdraw money online
through systems like ATMS, instant transfers, etc and solve our
problems with the help of AI bots. With such advancements in
technology, those days are not far when we won't have to visit banks
physically to open up bank accounts etc. Our systems provide us
with various security options like face IDs, fingerprint, patterns,
passcodes, etc to secure our data thereby making it difficult to open
up devices. We nowadays have applications that can even design
our houses and build 3d layouts thereby saving time for the
architects, you name it and technology provides you with so many
choices.
27
CYBER LAW: EMERGING TRENDS AND CHALLENGES
28
CYBER LAW: EMERGING TRENDS AND CHALLENGES
CHAPTER 3
INTRODUCTION
C
yberterrorism, a worldwide concern, is one of India's most
underrated problems. After the United States and China,
India has the most internet users. We refer to the users as
"Netizens." As a result of their over-dependence on the internet,
which exacerbates their weaknesses and transforms their
aggressions into feelings of retaliation, they end up becoming
criminals, cyber warriors, and state enemies. Most Indians are
unconcerned with the prospect of falling prey to the virtual world.
The globe now has a vast array of chances for developing its
financial infrastructures, thanks to information technology. Every
second sees an increase in cybercrimes. Generally speaking, the
only system affected by cyberterrorism is the national security
system. Yet, it also had an impact on their brain and the psychology
of the minds of people nationwide. It has damaged crucial command
and control systems, and nuclear facilities, and caused widespread
disaster. In light of cyber warfare, this chapter explores the two
deterrent options accessible to nation-states as well as their three
fundamental needs (capacity, communication, and credibility). It
investigates whether attribution and asymmetry, the two most
difficult features of cyber assaults, would make cyber attack
deterrence impossible.
1Director, Manipal Law School, Manipal Academy of Higher Education, Manipal, (India)
2B.A. LL.B (H), 4th Year, Amity Law School, Amity University, Noida, (India)
29
CYBER LAW: EMERGING TRENDS AND CHALLENGES
30
CYBER LAW: EMERGING TRENDS AND CHALLENGES
31
CYBER LAW: EMERGING TRENDS AND CHALLENGES
32
CYBER LAW: EMERGING TRENDS AND CHALLENGES
6Ibid
33
CYBER LAW: EMERGING TRENDS AND CHALLENGES
7West J Emerg Med, The San Bernardino, California, Terror Attack: Two Emergency
Departments’ Response, available at:https://www.ncbi.nlm.nih.gov/pmc/articles/P
MC4729411/ (Visited on: March 23, 2023).
34
CYBER LAW: EMERGING TRENDS AND CHALLENGES
8Ankit Fadia, Mahir Nayfeh, and John Noble, Follow the leaders: How governments
can combat intensifying cybersecurity risks, September 16, 2020, available at:
https://www.mckinsey.com/industries/public-and-social-sector/our-insights/follow-the-
leaders-how-governments-can-combat-intensifying-cybersecurity-risks (Visited on:
March 21, 2023)
9Global Cybersecurity Index, International Telecommunication Union, itu.int
10Ibid
35
CYBER LAW: EMERGING TRENDS AND CHALLENGES
36
CYBER LAW: EMERGING TRENDS AND CHALLENGES
12ENISA, European Union Agency for Cyber Security, available at: https://www.eni
sa.europa.eu/topics/cybersecurity-policy/nis-directive-new (Visited on: March 22,
2023).
37
CYBER LAW: EMERGING TRENDS AND CHALLENGES
38
CYBER LAW: EMERGING TRENDS AND CHALLENGES
14Global cybersecurity workforce shortage to reach 1.8 million as threats loom larger
and stakes risehigher, (ISC)², June 7, 2017 available at:https://www.isc2.org/ (Last
Visited on: March 23, 2023).
39
CYBER LAW: EMERGING TRENDS AND CHALLENGES
40
CYBER LAW: EMERGING TRENDS AND CHALLENGES
17Ibid
18Cyber terrorism: The Fifth Domain, available at:http://www.indiabloom.com
(Visited on March 13, 2023)
41
CYBER LAW: EMERGING TRENDS AND CHALLENGES
19Supra (8)
20 Sangeeta Jha, The National Cyber Security Policy, 2013, available at:
https://www.geeksforgeeks.org/the-national-cyber-security-policy-2013/ (Visited on:
March 21, 2023).
42
CYBER LAW: EMERGING TRENDS AND CHALLENGES
43
CYBER LAW: EMERGING TRENDS AND CHALLENGES
22Ibid
23Supra (20)
44
CYBER LAW: EMERGING TRENDS AND CHALLENGES
45
CYBER LAW: EMERGING TRENDS AND CHALLENGES
CONCLUSION
The Internet is new, and new things tend to seem more
terrifying than they are. Many early evaluations of cyber threats and
cyber security seem to have been built around "The Sky is Falling."
The sky is not falling, and it would seem that using cyberwarfare to
oust or intimidate a government is useless. Examples given in this
study demonstrate that nations are more powerful than what early
theories of cyberterrorism claimed. Redundancy, typical rates of
failure and response, the extent to which essential services are
accessible via public networks, and the amount of security in place
for each target facility would all need to be thoroughly
investigated.24
We might infer from the foregoing analysis that we cannot
completely rule out the possibility of future cyberterrorism-related acts.
Instead of addressing the actual and virtual realities' remedial needs, we
should take preventative action. Today's digital India has to be prepared
for cyberattacks as the country moves towards a fully digitalized
economy. This needed to be ready for cyberattacks and have a timely
response. When it comes to defending against online threats and
assaults, India should be more forceful. For the security of their
information infrastructures and data secrets, private firms have reported
incidences of ransom demand. Even though netizens are digitally
savvy, controlling the function of software developers and IT product
firms is another part of preventative measure. We should make sure
that firms that release such vulnerable software are held accountable
and legally responsible. More serious sanctions should be applied when
software tools are misused, necessitating control of the creation and
distribution of such tools. Similar regulatory rules should apply to
comparable manufacturing or handling practices when producing
firearms or ammunition.25 A recent story entitled "Govt to strike strong
on top militants, cyber terrorism" was published in the Daily Excelsior,
a prominent news source in Kashmir, on June 25, 2019. The Indian
government will soon introduce a legislation, which will mark a
significant advancement in the fight against terrorism and the
46
CYBER LAW: EMERGING TRENDS AND CHALLENGES
26Union Cabinet moves to strengthen anti-terrorism law, India News - Times of India
https:// timesofindia.indiatimes.com (Visited on 05 July, 2019)
27Govt to act tough on top militants, cyber terrorism, available at:https://www.dailyexc
47
CYBER LAW: EMERGING TRENDS AND CHALLENGES
CHAPTER 4
48
CYBER LAW: EMERGING TRENDS AND CHALLENGES
INTRODUCTION
3Collin, B. C. (1997, March). The future of cyberterrorism: Where the physical and
virtual worlds converge. In Remarks to the 11 th Annual International Symposium on
Criminal Justice Issues.
49
CYBER LAW: EMERGING TRENDS AND CHALLENGES
they pose a serious threat to society. Cyber threats are a fluid shift in
the danger landscape that has the potential to upset global economic
and social stability. Due to their obscurity, cyber risks are
challenging to identify and analyse. As the Internet evolved into an
unstoppable, open architecture, the multinational, internationally
linked nature of cyberspace led to an increase in cyberthreats.
4Dr.Farooq Ahmad, Cyber Law in India, New Era Law Publications, Edition 4th, 2011
5 R.Rajan, ‘Cyber Terrorism’, in R. Rajan (ed.), Cyber Terrorism and Military
Preparedness: An International Perspective, India: Sumit Publication, 2016, p. 7
50
CYBER LAW: EMERGING TRENDS AND CHALLENGES
175-186
51
CYBER LAW: EMERGING TRENDS AND CHALLENGES
52
CYBER LAW: EMERGING TRENDS AND CHALLENGES
10Ibid.
53
CYBER LAW: EMERGING TRENDS AND CHALLENGES
11Ibid.
12The Information and Technology Act, 2000
54
CYBER LAW: EMERGING TRENDS AND CHALLENGES
55
CYBER LAW: EMERGING TRENDS AND CHALLENGES
15Ibid.
56
CYBER LAW: EMERGING TRENDS AND CHALLENGES
16Section 84: Punishment for abetment of offences, Info. Technology Law, available at:
https://www.itlaw.in/section-84b-punishment-for-abetment-of-offences/ (Visited on:
March 23, 2023).
17Ibid
18Ibid
19Ibid
20Ibid
21Ibid
57
CYBER LAW: EMERGING TRENDS AND CHALLENGES
GLOBAL PERSPECTIVE
Continuous globalization has made it easier than ever for
psychological militant groups operating outside of their own
country to communicate information, interact with other groups,
collect location data, and obtain armaments from within country or
somewhere.23 Associations, particularly Islamic extreme groups, are
currently leading psychological warfare protests, mostly in countries
and regions where the political situation is unstable and the
administration is weak. However, it is believed that the objectives of
exercises and the skills vary from association to association.
Some of such organisations engage in illegality, such as
unlawful trades and kidnappings, in an effort to verify assets.
Osama Bin Laden, the leader of Al-Qaeda, who was hiding in
Pakistan and is widely thought to have planned the 9/11 attacks in
22All these legislative Acts derive validity and authentication from the IT Act, 2000.
These are established within
the meaning of different sections of the IT Act, 2000.
23R. Nagpal, “Cyber Terrorism in the Context of Globalization,” in II World Congress
58
CYBER LAW: EMERGING TRENDS AND CHALLENGES
59
CYBER LAW: EMERGING TRENDS AND CHALLENGES
week. "We are the Internet Black Tigers, and we're sending
these messages to sabotage your communications", it said in
the mails. Knowledge experts identified it as the first known
attack by terrorists against a nation's computer system.
• While fighting for control of Kosovo in 1999, hacktivists
opposing NATO bombings attacked NATO PCs with
disavowal-of-administration attacks. Additionally, according
to reports, organisations, public associations, and academic
foundations received infection-laden e-raais from a variety of
Eastern European countries that were highly politicised.
Additionally common were web mutilations
• The Electronic Disturbance Theater (EDT) has been
organizing online protests against various locations in support
of the Mexican Zapatistas since December 1997. Many
protesters aim their programmes toward an objective website
at a predetermined time using software that floods the target
quickly with repeated download requests. Basic entitlements
groups have also used EDT's product against organizations
that are allege to abuse animals. When hacktivists Electro
Hipsters convened in Seattle in late 1999, they organized
online protests against the WTO.25
One of the most exceedingly terrible episodes of digital
terrorists at work was when wafers in Romania unlawfully accessed
the PCs controlling the existence emotionally supportive networks
at an Antarctic examination station, imperiling the 58 researchers
included. All the more as of late, in May 2007 Estonia was exposed
to a mass digital assault by programmers inside the Russian League
which some proof proposes was facilitated by the Russian
government, however Russian authorities prevent any information
from getting leaked. This assault was obviously because of the
expulsion of a Russian ship from downtown Estonia.26
25Ibid.
26Ibid
60
CYBER LAW: EMERGING TRENDS AND CHALLENGES
27Lerner JS, Gonzalez RM, Small DA et al. . Effects of fear and anger on perceived
risks of terrorism a national field experiment. Psychol Sci 2003;14:144–50.
28 Terrorism, the Internet, and Propaganda: A Deadly Combination Ariel Victoria
61
CYBER LAW: EMERGING TRENDS AND CHALLENGES
India and the United Kingdom Shared under Creative Commons Attribution 4.0
International license.
62
CYBER LAW: EMERGING TRENDS AND CHALLENGES
Australia
Following the 9/11 terrorist attacks, Australia enacted a set of
five restrictions known as the anti-terror statute.31 The definition of
terrorism was incorporated into the Security Legislation
Amendment (Terrorism) Act of 2002. Section 5.3 of the Australian
Criminal Code is somewhat applicable. The Criminal Code defines
terrorism in Section 100.1. Compared to the UK terror statute,
Australian law sets higher standards for what constitutes terrorism.
In this way, cyberattacks that are only intended to affect the
government are not considered cyberterrorism in Australia.
According to Australian law, a person must intend to intimidate an
administration in order for their actions to qualify as cyberterrorism.
The cyber attack should therefore be forceful or intimidating. When
cyberattacks occur, the Australian Terrorism Act is applicable.
63
CYBER LAW: EMERGING TRENDS AND CHALLENGES
Canada
According to The Canadian Criminal Code, Section 83.01
terrorism is defined as any act or omission committed inside or
outside of Canada with the intent of threatening the government or a
group of people, causing harm, death, endangering a person's life,
etc.32 Like Australian law, Canadian law consolidates the exclusion
of political protest. However, it establishes extremely strict
standards for a cyberterrorist act because it states that such attacks
must 'push' a government to behave or stop acting in a particular
way. Attacks against both national and international organisations
are included in the definition of terrorism under Canadian law. In
contrast to "international government associations," this establishes
a larger functional zone. The Canadian law includes assault as well.
64
CYBER LAW: EMERGING TRENDS AND CHALLENGES
65
CYBER LAW: EMERGING TRENDS AND CHALLENGES
then, at that point, the nation went after could utilize the legitimate
instruments of the other country to punish the culprit(s) or even
remove the assigned culprit(s). States should likewise fit their
domestic terror laws with one another. It would give normal systems
to arraignment and examination of cyber terrorism and help in the
worldwide battle against cyber terrorism. This would prompt a
compelling, effective and straightforward component for
examination and data sharing connected with cyber terrorism.
Notwithstanding participation in examinations, it would likewise
empower sped up collaboration between policing of various nations
for different purposes, similar to limit building projects and
preparing of authorities.
Beneficially, states should speed up worldwide avoidance
against cyber terrorism through more adjusted collaboration in
knowledge sharing, network safety administration, participation in
building online protection readiness and strength, through common
settlements and different instruments. Each state should designate
worldwide helpful network safety system as fundamentally
important region in their international strategy. Endeavors should
likewise be made to develop a generally restricting and for all
intents and purposes implementable worldwide instrument on cyber
terrorism to universally stop the demonstrations of cyber terrorism.
To safeguard its essential that the internet, in India should reinforce
global participation among different states and do whatever it may
take to internationalize its homegrown regulations on cyber
terrorism.
CONCLUSION
The challenges brought on by technological growth cannot be
kept at a safe distance; change is inevitable. At the moment,
criminals have changed their tactics and begun depending on the
public, the law, and therefore the implementation.
In order to combat it, specialists, quasi-organizations, and
associations will find a manageable pace. Another requirement is
that the legitimate, and in this way the authorization, must adopt a
culture of ongoing digital training and learning. A secure web
security system might be maintained by specialists due to data
dynamics.
The Information Technology Act of 2000 was passed with the
intention of providing legal recognition for transactions governed by
66
CYBER LAW: EMERGING TRENDS AND CHALLENGES
67
CYBER LAW: EMERGING TRENDS AND CHALLENGES
CHAPTER 5
INTRODUCTION
1Associate Professor, College of Law & amp; Legal Studies, Teerthankara Mahaveer
University, Moradabad, (INDIA)
2B.A. LL.B (H), 4th Year, Amity Law School, Amity University, Noida, (India)
68
CYBER LAW: EMERGING TRENDS AND CHALLENGES
3The mosaic effect: the revelation risks of combining humanitarian and social
protection data, available at
https://blogs.icrc.org/law-and-policy/2021/02/09/mosaic-effect-revelation-ris
ks/(Visited on January 4, 2023)
69
CYBER LAW: EMERGING TRENDS AND CHALLENGES
70
CYBER LAW: EMERGING TRENDS AND CHALLENGES
71
CYBER LAW: EMERGING TRENDS AND CHALLENGES
72
CYBER LAW: EMERGING TRENDS AND CHALLENGES
8 TheGlobal Risks Report 2023 18th Edition, World Economic Forum https://ww
w3.weforum.org/docs/WEF_Global_Risks_Report_2023.pdf
73
CYBER LAW: EMERGING TRENDS AND CHALLENGES
74
CYBER LAW: EMERGING TRENDS AND CHALLENGES
10 Robbins, Sam and Chia-Shuo Tang, “How Asia’s Digital Governance Beacon
Balances Data Privacy and the ‘Public Good’”, The Diplomat, 20 October 2022.
11 Fayans, Iliya, et al., “Cyber security threats in the microbial genomics era:
implications for public health”, Eurosurvellance, vol. 25, no. 6, 2020; Vinatzer, Boris
A., et al., “Cyberbiosecurity Challenges of Pathogen Genome Databases”, Frontiers in
Bioengineering and Biotechnology, vol. 7, 15 May 2019; Arshad, S., et al., “Analysis
of security and privacy challenges for DNA-genomics applications and databases”,
Journal of Biomedical Informatics, July 2021.
75
CYBER LAW: EMERGING TRENDS AND CHALLENGES
12Details about Indian cybercrime coordination centre (i4c) scheme, The Ministry of
Home Affairs, https://shorturl.at/jmBH2( Visited on March 10, 2023)
13Hoster, Ben, Swati Khurana and Rachel Juay, “Still Buffering: Time for a Smart City
76
CYBER LAW: EMERGING TRENDS AND CHALLENGES
CONCLUSION
The looming risk of a polycrisis due to the entrenched nature
of technology in almost every aspect of work poses an imminent
threat that may cause unimaginable destruction to the public
ventures which lead to disruption in a democracy, in turn making it
even more necessary for the government to initiate cyber security
measures. The interconnection between the adverse outcome of
frontier technologies and the digital power concentration fuels
widespread cybercrime and cyber insecurity pinned in the loops of
misinformation and disinformation, advance the role of technology
as a weapon of mass destruction, triggering massive notions such as
state conflicts and erosion of social cohesion. This also highlights
that not only governments but multilateral institutions hold the
14 Statistic
of the week: Just 26% of non-partisan respondents in India trust news,
Reuters Institute, University of Oxford https://shorturl.at/erBEU ( Visited on March 5,
2023)
77
CYBER LAW: EMERGING TRENDS AND CHALLENGES
78
CYBER LAW: EMERGING TRENDS AND CHALLENGES
for a range of risks, both known and unknown, short-term and long-
term.
The historically harsh penalties for data loss are also
influencing how the cost-benefit analysis of investing in cybersecurity
measures is done. Organizations will need to take data usage and
collecting ethics into account to reduce reputational risks beyond
regulatory compliance. The voluntary destruction of personal data
may also become more important because of greater cyberattacks and
stricter data rules, with possible environmental benefits from reducing
the need for data storage. To avoid further consequences,
governments will also need to build emergency response skills to
address data breaches and privacy violations. We need an optimistic
outlook but also fortify our digital landscape for the upcoming
possibilities which are dangerous to supply chains, we need policies
but essentially programs promoting safe use of digital mediums.
The future battlefields will be beyond our understanding if we
don’t act now. The least we can do is to be prepared for the shocks
of tomorrow.
79
CYBER LAW: EMERGING TRENDS AND CHALLENGES
CHAPTER 6
80
CYBER LAW: EMERGING TRENDS AND CHALLENGES
INTRODUCTION
C
yberterrorism is an elusive concept. Its definitions covers all
the activities conducted on or through the internet that are
preparatory to or supportive of terrorism, such as
recruitment, communication, and finance. The threat of a violent
terrorist attack is what governments are most concerned about, but
as "pure" cyber terrorism is not yet defined the governments have
mostly focused on blocking the planning of terrorists and radicalised
individuals online. In counterterrorism efforts, there is a lot of
political and legal exceptionalism due to the "low probability, high
impact" character of terrorism, especially post the 9-11 attacks and
the ensuing "war on terror."
Cybersecurity issues have become more prominent in the
current day as the internet and networking gadgets are used more
frequently. It is, therefore, necessary that the countries create a
legislative framework to prevent such activities. Coercive,
normative, and mimetic factors of institutional theory offer a
suitable basis for creating such a cyber-security legislation.
Although countries have formulated necessary laws, they
nevertheless need to make sure that corporations are adhering to
these legal instruments.
This chapter looks into the interactions between domestic
counter-cyber terrorism legislation development, while emphasising
on international talks of cyber terrorism, and policy developments.
The debate over "cyber security" vs "information security" and the
associated issue of information operations and disinformation are of
particular note in this. The research focuses on finding legal
solutions to the menace of cyber terrorism.
81
CYBER LAW: EMERGING TRENDS AND CHALLENGES
Propaganda
Terrorists propagate their ideas through the internet, among
other things. Propaganda frequently appears in multimedia
communications that provide theoretical and practical direction, and
support for terrorist activities. These include virtual communications,
publications, presentations, audio and video content, and video games
created by terrorist groups or their sympathisers. However, it's
frequently a matter of opinion as to what qualifies as terrorist
propaganda as opposed to genuine support of a position. One
recurring topic in propaganda connected to terrorism is the
encouragement of violence. 4 The targeted audience who consume
these materials is highly impacted. Additionally, the ability to
distribute content directly over the Internet provides an alternative to
conventional modes of communication, like news outlets, which have
their set methods of independently evaluating the veracity of the
information provided and overly provocative content would surely be
deleted. The online propaganda also includes materials like video
clippings of the attacks or online games created by terrorist groups
that depict real life attacks on screen and ask the players to take the
lead as virtual terrorists. The fundamental threat presented by their
propaganda, encompasses, the motives behind its dissipation which is
82
CYBER LAW: EMERGING TRENDS AND CHALLENGES
(a) Recruitment
The Internet is imperative in building connections with the
backing of people who swiftly fall prey to propaganda which is
specifically targeted towards them, in addition to publishing
extreme writing and videos. Terrorist organisations disseminate
propaganda channels which are password-protected and restricted
online chat room, as a covert recruitment strategy. 6 The Internet's
worldwide reach exposes terrorist groups to a large pool of potential
members. Cyber forums with restricted access give recruits a
platform to get introduced to terrorist groups, support them, and
participate in direct acts to achieve their terrorist goals.7 Terrorists
target society's most vulnerable and disenfranchised populations
through their propaganda as they are more likely to fall prey to their
nefarious ideology. The recruiting methods target an individual’s
sense of being discriminated, or shamed. 8 Propaganda may be
altered according to demographical requirements like age or gender
as well as social or economic status.
The online space is an effective means to recruit minors as
children are one of the largest groups who spend ample time
browsing the net. Cartoons, video games and more such content are
5 Weimann Gabriel, Terror on the Internet: The New Arena, the New Challenges,
United States Institute of Peace Press, Washington, D.C; pp. 37-38, (2006)
6 Gerwehr Scott and Daly Sarah, “Al-Qaida: terrorist selection and recruitment”, in
Jewkes Yvonne and Yar Majid et.al.(eds.), Handbook of Internet Crime 194-213
(2010)
8 European Commission, Expert Group on Violent Radicalisation, “Radicalisation
83
CYBER LAW: EMERGING TRENDS AND CHALLENGES
(b) Incitement
While the use of propaganda is not banned, many Member
States consider it to be violating the law when the terrorists inspire
acts of terrorism through such content. The internet offers an
abundance of options, ranging from downloading, editing, and
advertising anything that might be seen as illegal and spreading
terrorism. It is to be noted, that some non-governmental and human
rights organisations have expressed cynicism regarding the idea of
"glorification" of terrorist’s activities on the internet. The
restrictions of such content is possible due to the exception defined
against right to free expression, as outlined in articles 15 and 19 of
the International Covenant on Civil and Political Rights.10
According to article 19, paragraph 3 of the International
Covenant on Civil and Political Rights 11 , there are legal
justifications for restricting the right to free expression, including
preventing and discouraging instigation to commit terrorist acts for
preserving law and order and national security. However, any
provision negating this right, are both important and appropriate in
light of the danger that exists and given the fundamental nature of
the right to free speech. Other essential rights related to freedom of
expression include freedom of thought, conscience, religion, belief,
and opinion.12
9Weimann Gabriel; 5 March 2008 Yale Global Online; “Online terrorists prey on the
vulnerable”, available at:http://yaleglobal.yale.edu/content/online-terrorists-prey-
vulnerable (Visited on Feb 6, 2023).
10 General Assembly resolution 2200 A (XXI), annex. 10, Also See the following
reports of the Special Rapporteur on the promotion and protection of human rights and
fundamental freedoms while countering terrorism: A/65/258 (para. 46) and A/61/267
(para. 7); see also the report of the Special Rapporteur on the promotion and protection
of the rights to freedom of opinion and expression, addendum on the tenth-anniversary
joint declaration: ten key challenges to freedom of expression in the next decade
(A/HRC/14/23/ Add.2).
11Supra (2), art. 19, para. 3
12Office of the United Nations High Commissioner for Human Rights, “Human rights,
terrorism and counterterrorism”, Fact Sheet No. 32 Chap. III, sect. H (Geneva, 2008).
84
CYBER LAW: EMERGING TRENDS AND CHALLENGES
(c) Radicalization
The word "radicalization" largely defines the method of
indoctrination that precedes the recruitment stage. Propaganda lays
the foundation of the radicalization process, whether it is
disseminated through offline or online mediums. Depending on
specific circumstances and connections, propaganda and other
persuasive techniques may be used at lengths with varying degrees
of success.
Financing
The Internet is used by terrorist groups and their sympathisers
to fund their activities. To depict how terrorists utilise the Internet to
generate funds and gather resources can be defined in 4 broad
categories which are: direct solicitation, e-commerce, UPI systems,
and through charity. Direct solicitation is the exercise of asking
supporters to donate using websites, chat rooms, bulk mailings etc..
there are online sites where books, recordings on audio and video of
the sympathiser are available. It is quite simple to transfer money
online between parties thanks to e-payment options made available
through various service providers.
Online payment options may also be used to commit financial
frauds like identity theft, credit card theft, wire fraud, stock fraud,
intellectual property crimes, and auction fraud. The case study from
the United Kingdom (The Younis Tsouli Case) represents how
black money is used to fund terrorism. Credit card theft proceeds
were laundered in several ways, including online payment through
e-gold transactions accounts that traversed many nations before
reaching its destination. The laundered money was used by Tsouli to
register 180 websites that uploaded videos of Al-Qaida and was also
used to buy supplies for terrorist acts in several nations. In total
1,400 credit cards were used to get about £1.6 million in illegal cash
to support terrorism.13
Donations to groups that claim to be for charitable purposes,
were all bogus transactions. Some terrorist groups have been known
to set up shell companies that seem to be working for charity, but
the money raised was used to fund terrorist activities. While
ostensibly supporting humanitarian causes, some groups utilise
funds to assist terrorism. Terrorists may also be members in charity
85
CYBER LAW: EMERGING TRENDS AND CHALLENGES
Training
The Internet provides the most feasible, training environment
for terrorists, according to terrorist groups. A wide range of media
outlets offer space for the propagation of instructions in the form of
online manuals, audio and video clips, data etc. These online
resources also offer comprehensive instructions on wide ranging
subjects, like how to join terrorist groups, manufacture explosives,
usage of firearms, or other weapons or hazardous materials, as well
as the method of planning and carrying out terrorist attacks. These
instructions are available in simple multimedia formats and in
multiple languages. The platforms serve as a digital boot camp. For
instance, Inspire is a website supposedly run by Al-Qaida in the
Arabian Peninsula, with the main aim of making Muslims practice
jihad at home. The autumn 2010 issue detailed hands-on training
materials on how to modify a four-wheeled vehicle to assault
members and how a lone attacker may carry out a strike by firing a
rifle from an elevated position. To improve the possibility of killing
a government official, the newspaper even suggested a specific city
as the target of such an attack.15
Online learning materials teach counterintelligence and
hacking operations as well as ways to improve the security of illegal
online activity and communications by utilising the available
procedures. Internet platforms' interactive features foster a sense of
community among people from various racial and ethnic origins and
promote the development of networks for the sharing of tactical and
educational information.
Planning
Many law enforcement professionals have stated that the
Internet played a crucial role in practically every terrorist act that
was prosecuted. At times, to maintain coordination in a terrorist
operation distance communication between several people is
14Conway Maura, “Terrorist ‘use’ of the Internet and fighting back”, Information &
86
CYBER LAW: EMERGING TRENDS AND CHALLENGES
Execution
While deploying the Internet to terrorize general population,
components from the categories mentioned above may be used. To
cause worry, dread, or terror in a community for instance, explicit
threats of violence, especially those involving the use of firearms,
may be spread online. Even if the threats are not carried out, it may
be illegal to make them in several of the member states.
For instance, the coordination of those involved in the attacks
on September 11, 2001 in the United States made great use of the
Internet.17
Online/Cyber Attacks
The malicious use of cyberspace to carry out an assault is
known as a "cyber attack." These assaults can range from acts like
hacking, sophisticated persistent threat techniques, computer
viruses, malware, or other unauthorised or malicious methods to
interfere with the normal working of target systems, such as servers
or computer systems. In Israel in January 2012, many major
websites, including those of the Stock Exchange of Tel Aviv and the
national airline, were targeted in a cyber attack that resulted in the
unlawful publication of thousands of Israeli citizens' credit card and
bank account information. 18 Although the issue of online terror
16Judgement of 4 May 2012, Case No. 0926639036 of the Tribunal de Grande Instance
de Paris (14th Chamber/2), Paris available at: https://dras.in/use-of-the-internet-by-isis/
(Visited on Feb 4, 2023).
17 The use of the Internet for terrorist purposes; UNODC, (2012), available at:
https://www.unodc.org/documents/frontpage/Use_of_Internet_for_Terrorist_Purposes.
pdf (Visited on Jan 20, 2023).
18Kershner Isabel, New York Times; “Cyberattack exposes 20,000 Israeli credit card
numbers and details about users”, “2 Israeli web sites crippled as cyberwar escalates”,
(January 20212)
available at: https://www.nytimes.com/2012/01/07/world/middleeast/cyberattack-expo
ses-20000-israeli-credit-card-numbers.htmlhttps://www.nytimes.com/2012/01/17/worl
d/middleeast/cyber-attacks-temporarily-cripple-2-israeli-web-sites.html (Visited on Jan
28, 2023)
87
CYBER LAW: EMERGING TRENDS AND CHALLENGES
88
CYBER LAW: EMERGING TRENDS AND CHALLENGES
Policy
States need domestic policies and legislations to respond to
threats posed by terrorists acting online effectively through criminal
justice. Such laws and regulations will generally concentrate on
20“United States State Department fights al-Qaeda in cyberspace”, Al Jazeera; (25 May
2012) available at: http://blogs.aljazeera.com/americas;us-state-department-fights-al-
qaeda-cyberspace (Visited on Feb 4th , 2023)
"The U.S. uses Yemeni websites to counter al-Qaeda propaganda"; The Washington
Post, May 2012, available at: www.washingtonpost.com/world/national-security/us-
hacks-web-sites-of-al-qaeda-affiliate-in-yemen/2012/05/23/gJQAGnOxlU_story.html
(Visited on Feb 4 , 2023)
21 See International Covenant on Civil and Political Rights, art. 17. available
at:https://www.ohchr.org/sites/default/files/Documents/ProfessionalInterest/ccpr.pdf
(Visited on Feb 8, 2023)
22“Human rights, terrorism and counter-terrorism”, chap. III, sect. J.
89
CYBER LAW: EMERGING TRENDS AND CHALLENGES
23Supra (16)
24 David Westley, “Saudi tightens grip on Internet use”, Arabian Business January
(2008)
90
CYBER LAW: EMERGING TRENDS AND CHALLENGES
Legislation
As was previously stated, States aren't obligated by any
international accords against terrorism to enact laws that specifically
forbid terrorists from using the Internet. As a result, many States
will likely rely on other legislations under their legislations,
including unclear offences like conspiracy, solicitation, and criminal
association, in addition to provisions covering unlawful
activities outlined in international agreements, even though it is
highly likely that the majority of cases of terrorism will involve
some type of Internet use on the part of the perpetrators.
91
CYBER LAW: EMERGING TRENDS AND CHALLENGES
number of people who possessed items like hard drives, DVDs, and
instructions on how to assemble or use arsenal like mortars, suicide
vests, and napalm.
(b) Incitement
The crime of supporting terrorism is addressed in Security
Council resolution 1624 from 2005. The Council urged all the
member States to adopt that resolution, among other things, in order
to maintain their legal obligations under international legislations to
forbid and stop the encouragement of terrorist actions.
Younes Tsouli, Waseem Mughal, and Tariq al-Daour pleaded
guilty to charges, under the Terrorism Act 2000 for inciting killing
of innocents, to further their terrorist agendas by creating and
maintaining numerous websites and chat rooms that published
materials and encouraged acts of mass murder, majority of which
where in Iraq. This case is known as R V. Tsouli and others.27
92
CYBER LAW: EMERGING TRENDS AND CHALLENGES
ONLINE RADICALISATION
The 2030 Sustainable Development Agenda may be supported
and all human rights, including access to information, right to free
speech, and privacy, can be advanced thanks to the Internet. These
rights may also be violated as a result of some Internet usage
patterns and their implications. Therefore, UNESCO works to raise
awareness among all parties involved, to encourage discussion and
identify solutions to limit negative effects, and to increase the
widest possible diffusion of advantages and possibilities. To offer a
worldwide mapping of studies on the supposed roles played by
social media in radicalization processes throughout all parts of the
world, the study Youth and Violent Extremism on Social Media was
commissioned as part of this endeavour.
Our ability to understand the phenomenon of radicalization
and, more importantly, to give the information required to explain
such activities and prevent them has been hampered by international
acts of terrorism. In order to facilitate the flow of knowledge on this
topic, research has developed into a useful tool for understanding
radicalization, sharing intelligence, and taking practical actions. One
such area of knowledge creation is looking into how the Internet,
and social media in particular, contribute to violent radicalization
processes and terrorism.
Terrorist organisations are now widely dispersed online and
make use of cyberspace for a variety of purposes, including
recruiting members online and disseminating deadly material. In
this study, studies on the processes of digital radicalization, the
possible impact of social media on the radicalization of youth and
the emergence of violent extremism, and the function of
countervailing narratives are reviewed.
93
CYBER LAW: EMERGING TRENDS AND CHALLENGES
CONCLUSION
While policymakers and media have taken a much broader
view of the issue than academics, they have expressed concern that
the term "cyber terrorism" may draw attention away from other
ways that terrorists use the internet. The emphasis on "pure"
cyberterrorism as well as terrorists' access to the internet is
frequently underlined in the new regulations and legislation in
general. Preemption in counter-cyber terrorism policy is driven by
94
CYBER LAW: EMERGING TRENDS AND CHALLENGES
95
CYBER LAW: EMERGING TRENDS AND CHALLENGES
CHAPTER 7
INTRODUCTION
96
CYBER LAW: EMERGING TRENDS AND CHALLENGES
97
CYBER LAW: EMERGING TRENDS AND CHALLENGES
Although, the fact that the term got into prevalent culture
through science fiction & craftsmanship, now it’s utilized through
innovation tacticians, security experts, administrations, military,
commerce leaders and businesspersons, embodies a global system
of co-dependent information technology set-ups, communications
networks, and computer administering systems. It is used to
describe an area of the worldwide tech environment broadly
identified as what others see as cyberspace 5 as merely a fictional
environment in which communications take place over computer-
based networks.
World has become well-known with the internet within the
time of the 1990s while the utilisation of the Web, networking, and
advanced communications were all expanding noticeably; the term
Cyber-Space managed to correspond to numerous innovative ideas
and events that were emergent. As a collective exercise, people can
connect, trade thoughts, share data, give social ratification, run
commerce, play games, get into political talk, and so on, by using
this worldwide network. Surrounded by individuals in cyber-space6,
it is believed that there is a general decree of rules and principles
communally favourable for everyone to obey, known as cybernetics.
Several consider that “the right to privacy” to be a paramount to the
practical norms of cyber ethics. Such ethical duty goes together,
when operating online in a worldwide organize, particularly when
the suppositions relate to online social encounters. As provided by
Chip Morningstar and F. Randall Farmer, the internet is exemplified
by the societal intuitive included in place of the technical executions
or implementations. From their point of view, computer media in
cyberspace7 are extensions of communication channels between real
individuals. A fundamental feature of cyber space is to provide an
environment composed of many contributors who can interact and
influence each other. They infer this concept from their insight that
people look for luxuriousness, complexity, and depth in virtual
universes.
98
CYBER LAW: EMERGING TRENDS AND CHALLENGES
99
CYBER LAW: EMERGING TRENDS AND CHALLENGES
10Boot, William, “"Sony Hackers Guardians of Peace Troll FBI”, December 20, 2014
11 TheNew York Times., “"U.S. Links North Korea to Sony Hacking"”, Retrieved
December 17, 2014.
12Gross, Grant, November 2003.
“Cyber-terrorist attacks will be more sophisticated than previous worms, experts say.”
Computer World.
100
CYBER LAW: EMERGING TRENDS AND CHALLENGES
2015. Cyber terrorists too target air traffic control centres and water
systems in the US, UK, and other countries.
Future Threats
As technology develop into more amalgamated society,
newfound exposures & security threats have been revealed in these
complex networks we have deployed. Once intruders achieve access
to these networks, they can threaten entire communities and
economies. Since we do not know the future, it is important to
establish a system that can respond to changes in the surroundings.
Most apparent cyber-terrorism threat13 in the adjacent future
concerns remote working conditions during the time of the COVID-
13Burton, Dunn (2003). Black ice: The invisible threat of cyber terrorism.
Osborne/McGraw-Hill, USA ISBN 978-0-07-222787-1.
101
CYBER LAW: EMERGING TRENDS AND CHALLENGES
102
CYBER LAW: EMERGING TRENDS AND CHALLENGES
In India
To respond to the cyber fear mongers, moreover, known as
"white-collar jihadis", Indian patrol have enrolled people (private
citizens) as volunteers, patrolled the web and report the questioned
C-terrorists to the administration. These people are contemplated
into 3 classifications: first is "Illegal Content Flaggers", then "Cyber
Mindfulness Promoters” & "Cyber Specialists". In the month of
August 2021, patrol halted 5 alleged white-collar jihadis15, outlining
an attack list of journalists, police, social protesters, the political
classes, and lawyers to start apprehension among groups. The white-
collar jihadis 16 are contemplated as 'the dreadfully worsened
14David E. Sanger and Eric Schmitt U.S. Cyber weapons, Against Iran & North Korea,
a Disappointment, Against ISIS, June 12, 2017.
15John Kane and April Wall, Identifying the Links Between White-Collar Crime and
April 2023).
103
CYBER LAW: EMERGING TRENDS AND CHALLENGES
17 Cyberculture, the key Concepts, edited by David Bell, Brian D. Loader, Nicholas
104
CYBER LAW: EMERGING TRENDS AND CHALLENGES
18Coralik, Andrew M. (2006). Cyber terrorism: Political and Economic Impact. Idea
Group, USA ISBN 978-1-59904-022-6.
19Wyman, Gabriel (2006). Terrorism on the Internet: New stage, new challenge. United
105
CYBER LAW: EMERGING TRENDS AND CHALLENGES
106
CYBER LAW: EMERGING TRENDS AND CHALLENGES
107
CYBER LAW: EMERGING TRENDS AND CHALLENGES
fact that there's still no element on the internet, there's nothing you
can operate, it now has a weird form of matter. Today, it makes
sense to discuss about cyberspace as a position in its own right.
"Space" in the virtual aspect of “space” has many things in
common when including the terms of speculative and numerical
implications than with physical space. It lacks the duality of +ve and
-ve volume (while in the actual form of space, like an area, say a
room has a usable spatial volume limited by the positive volume of
the walls, surfers do not curtain & discover the unidentified
fragment of the Web as a leeway of the space containing them), but
the three-dimensional importance can be accredited to the
connection between dissimilar sheets (like books or even
computers) because the un-turned sheets (pages) are someplace "out
there". Thus, the notion of cyberspace does not refer to the content
accessible to the Internet user, but to the capability to surf on
different web pages, with various feedback twists between the user
and the remaining system forming the possibility of continually
encountering something indefinite or unforeseen.
Video22 games are differed from the communication centred
on texts and in the sense that the screen images are characters that
actually take up space, and animations show the motion of the
characters. Pictures are pre-operated into shape, and the high-quality
magnitude is there which portrays the space. A recreation
implements our “online world metaphor” through attractive extra
gamers within side the recreation, after which metaphorically
correspond to them to display like avatar. Games work now no
longer must forestall on the avatar-participant level, however
cutting-edge applications aiming for extra immersive gambling
spaces (i.e., Laser tag) take the shape of supplemented fact in
preference to our online world, absolutely immersive digital realities
last impractical.
Although the extra radical effects of the worldwide
conversation community expected through a few of our online
world protagonists didn't materialize and the phrase misplaced a
number of its originality or novelty appeals, it stays cutting-edge as
of 2006. Some digital groups overtly talk over with the idea of our
online world, for instance, Linden Lab calls their clienteles
"Residents" of Second Life, whilst all those groups, maybe sited "in
108
CYBER LAW: EMERGING TRENDS AND CHALLENGES
University.
109
CYBER LAW: EMERGING TRENDS AND CHALLENGES
CHAPTER 8
1HOD, School of Legal Studies, Babu Banarsi Das University, Lucknow, (India)
2B.A.LL.B (H), 3rd Year, Instititute of Legal Studies & Research, GLA University,
Mathura, (India)
110
CYBER LAW: EMERGING TRENDS AND CHALLENGES
INTRODUCTION
111
CYBER LAW: EMERGING TRENDS AND CHALLENGES
4S.B.Verma, S.K .Gupta, and M.K. Sharma (edited), E-Banking and Development of
Banks, Deep & Deep Publication Pvt, Ltd.,2007 preface.
112
CYBER LAW: EMERGING TRENDS AND CHALLENGES
113
CYBER LAW: EMERGING TRENDS AND CHALLENGES
9T.K. Velayudham, “Developing in Indian Banking: Past, Present and Future”, Bank
Quest, Vol. 73, No. 4, Oct.-Dec., 2002, p. 90.
10Definition According to Indian Banking Companies Act, 1949.
11Niti Soni and Vandana Gautam, Banking Theory and Practice, Sharma Publications,
States 929 F Supp. 824 (1996) in Yen Fen Lim, Cyber Space Law: Commentaries and
Material, Oxford University Press, 2007, New Delhi, p. 4.
114
CYBER LAW: EMERGING TRENDS AND CHALLENGES
THREATS TO E- BANKING
The introduction of new technology or the development of new
technology can be used for both the constructive as well as
destructive purpose. The history of computer crime is as old as the
computer itself. Certain individuals use PCs for destructive,
shameless, or criminal purposes, regardless of the way that most of
individuals use them for helpful, moral, and lawful purposes. On the
off chance that an extortion is done with the help of a "PC
Wrongdoing" is a potential name for it. PC wrongdoings are grouped
into three general classes: (a) Information Related Violations; (b)
Programming Related Wrongdoings; and (c) Actual Wrongdoings.
115
CYBER LAW: EMERGING TRENDS AND CHALLENGES
14Advocate Pavan Duggal, Cyber Lawyer Pavan Duggal Calls For Legal Awareness
Among India's Youth, BW Business World,available at: https://www.businessworld.i
n/article/Cyber-Lawyer-Pavan-Duggal-Calls-For-Legal-Awareness-Among-India-s-
Youth/27-01-2022-418836/ (Visited on 1 February, 2012)
15Andreini, D., & Bettinelli, C. (2017). Business Model Definition and Boundaries. In
116
CYBER LAW: EMERGING TRENDS AND CHALLENGES
SECURITY ISSUES
Monetary wrongdoings perpetrated in the e-banking area with
the guide of the Web are developing day to day. Prior to carrying
out E-Banking, perhaps of the most urgent test that should be settled
is security. There is an extensive danger of unapproved
access/misfortune or harm of information by programmers,
misfortune and harm of Information by infection and unapproved
access inside the organization or network16. The danger of safety is
its most extreme pinnacle when an association made a web-based
installment. Secrecy, Trustworthiness, Genuineness, Reputability
and Security are central issues for the assurance of privileges of
customers17.
Phishing
Phishing is a sort of online fraud whereby unsuspecting
individuals are persuaded to reveal sensitive data, such as their user
names and passwords, which is then unlawfully utilised by
spammers. Sending emails posing as someone else is the main
Phishing tactic. Banks or other financial firms that engage with
consumers and already have personal data of the consumer, and the
consumer will be required to click to confirm the information a
private URL supplied in this phony email. This URL takes customer
to a phony site which will be like the certifiable site, and the data
given by shopper in the structures gave in the phony site, will be
accumulated and utilized for committing extortion in their
records/Visa or pull-out reserves unapproved from their records.18
According to IT act, sec 66 defines the punishment for
phishing “The discipline incorporates either detainment for a term
that can surpass as long as three years or a fine that can surpass up
to five lakh rupees, or both, contingent upon the seriousness of the
crime.”19
The costliest phishing attacks to the date till now are-
16 V.P.Shetty, “Electronic Banking”, in S.B. Verma, S.K. Gupta and M.K. Sharma
(edited), p. 24.
17S.Ganesh, p. 31.
18S.C.Gupta, “Internet Banking-Changing Vistas of Delivery Chanel”, in S.B. Verma,
117
CYBER LAW: EMERGING TRENDS AND CHALLENGES
2. Crelan Bank
Business email split the difference (BEC) trick cost Crelan
Bank, a Belgian monetary foundation, about $75.8 million. In this
sort of assault, the phisher accesses the record of a senior chief at an
organization and trains the leader's staff to move assets to the
aggressor's record. During an inner assessment, the Crelan Bank
phishing attack was detected, and in light of the fact that the
organization had an adequate number of interior stores, enduring the
loss was capable.
3. FACC
A BEC misrepresentation cost FACC, an Austrian maker of
aviation parts, a sizable amount of cash. The company unveiled the
occurrence in 2016 and said that a phisher mimicking the Chief had
told a bookkeeping staff part to move $61 million to an aggressor-
controlled ledger.
This present circumstance was extraordinary in that the
organization chose to eliminate its Chief and CFO and seek after
lawful activity against them. Since the two chiefs neglected to
appropriately execute interior controls and safety efforts that might
have halted the assault, the firm sued them for $11 million in
punitive fees. This claim filled in as a genuine illustration of the
individual peril that heads of a business show to not working out "a
reasonable level of effort" regarding network safety.
118
CYBER LAW: EMERGING TRENDS AND CHALLENGES
5. Ubiquity Organizations
A BEC assault against a Minnesotan drug organization in
2014 expense the attackers nearly $39 million. The phisher sent
messages to the association's records payable organizer while acting
like the President of Upsher-Smith Research facilities, teaching her
with lead explicit wire moves and to comply to the mandates of a
"legal counsellor" working with the aggressors.
The organization had the option to drop one of the nine wire
moves sent in light of the fact that the assault was distinguished in
it. Subsequently, the organization's costs dropped from $50 million
to $39 million. Despite the fact that there were a few neglected "red
lights," the organization decided to sue its bank for approving the
installments.
Pharming
Another form of online fraud called pharming involves
diverting as many people as possible away from the trustworthy
online banking websites they intended to visit and onto harmful
ones. In this fraud the criminal generates a malicious code on
computer server which automatically directs the users on to a
fraudulent website without the knowledge of the customer or user.
The sham or phony destinations, to which casualties are diverted
without their insight or assent, will probably look equivalent to a
real site. Be that as it may, when clients enter their login name and
secret phrase, the data is caught by crooks.20
Phishing messages imagining that they are implying from
Brazil's biggest telecom organization which were shipped off the
119
CYBER LAW: EMERGING TRENDS AND CHALLENGES
120
CYBER LAW: EMERGING TRENDS AND CHALLENGES
Identity Theft
A developing cybercrime issue is Fraud, in which a
lawbreaker (Character cheat) acts like another person. The hoodlum
takes government backed retirement numbers and Visa numbers,
normally got from Web, to commit extortion (for example to
purchase items or consume administrations) that the casualty might
be expected to pay for. For this sort of deceitful the individual is
entitled for the discipline which is detainment which may degree to
three years and will likewise be at risk for fine which may degree
for one lakh rupees. For the situation Bari Nessel Takes data from
Representatives24-
Subsequent to going after a position in 1997, Bari Nessel
utilized the data she was given to take Linda Foley's character,
gathering a lot of MasterCard obligation and constraining Foley to
go through pointless tasks in the not-too-distant future while
applying for MasterCard and credits. Foley's robbery shows that it is
so essential to keep your government managed retirement number
secure. Assuming there's one thing to gain from these cases, it's that
it truly is absurd to expect to be too cautious with regards to
safeguarding your personality. Fraud can destroy your life, so
avoiding potential risk with information security is basic to keeping
up with your wellbeing.
24Datasheild crop. The worst identity theft cases ever. Gabriel Jimenez’s Identity Gets
Stolen case
121
CYBER LAW: EMERGING TRENDS AND CHALLENGES
Hacking
Programmer is the term frequently used to depict an external
individual who enters a PC framework. Hacking implies the
adjustment or obliteration of any data which is available in the PC
framework or PC assets, that is annihilation or modification of
unmistakable or/and immaterial resources of the PC assets. There
are two sorts of programmers. White-Cap Programmers perform
moral hacking, doing test on their clients' frameworks so track down
the flimsy spots, so they can be fixed. Dark Cap Programmers
additionally alluded to as wafers, are the crooks. A Wafer is a
malevolent programmer, who might address a difficult issue for an
organization25.
Section 66 of Information technology act 2000 deals with the
offence of hacking, in simple words, hacking is the access to
someone another’s system without the express or implied
permission of the owner of that system. If any person, intended to
cause damage or misuse the data knowing that this will cause a
great loss or damage to the public or person then that person will be
liable for hacking and would be punished under sec 66 of IT act 200
which states that, “punishment for hacking is imprisonment for
three years or fine which may extend up to 2 lakhs rupees or
both.26”
In the case The American Businesses Hacks27 (2005 – 2012),
American Businesses Hack.-
It's a little difficult to comprehend this one. There are
numerous actors and moving parts in it. It has been referred to as the
biggest hacking operation ever found in the United States.
A Russian cyber organisation began targeting different
companies, chains, and systems in 2005, including 7-Eleven and JC
Penney. They were able to obtain 800,000 bank account login
credentials and 160 million credit and debit card numbers over the
course of seven or eight years. They are thought to have caused
losses of at least $300 million worldwide, either directly or
indirectly. Some of the information was sold (credit card numbers
on underground forums sold for $10–50 per), while other
25Efraim Turban, et.al, Electronic Commerce, Prentice Hall, Upper Saddle River, NJ,
2006, p. 118.
26Defined under IT act 2000
27Indus face case studies, another case was- The Iceman Hacks (2006)
122
CYBER LAW: EMERGING TRENDS AND CHALLENGES
Trap Door
Trap Door or Secret entryway is a strategy that considers
breaking into programmes code, making it conceivable to embed
extra directions.28 Trap door is also known as back door because it
is a method of bypassing normal authentication. They are quite
difficult to detect and also to find them the programmers or the
developers have to go through the components of the computer.
Salami Slicing
A programmes intended to redirect limited quantity of cash
from various bigger exchanges, so the amount taken isn't promptly
obvious. Electronic monetary systems make it possible to again and
again divert little proportions of money, normally due to changing,
to a beneficiary's record. This overall idea is utilized in famous
programmed reserve funds applications. It has likewise been
supposed to be behind deceitful plans, by which bank exchanges
determined to the closest penny leave unaccounted for parts of a
penny, for fraudsters to redirect into different sums29. Sneaks around
in 2001 excused the reality of such misappropriation plans as a
legend30.
Head prosecutors in Los Angeles accused four men of
misrepresentation in October 1998 for supposedly setting CPUs in
service stations that swindled clients by blowing up the amount
siphoned or pumped 31 . In 2008, a man was captured for falsely
making 58,000 records which he used to gather cash through check
stores from online business firms, a couple of pennies all at once32.
In Bison, New York, a passage box serviceman took more
than US $200,000 in quarters from the nearby travel organization
28 See:P. Weill and M.R. Vitale, Place to Space: Migrating to e-Business Models,
Harvard Business School Press, Boston, 2001.
29 Kabay, M E (24 July 2002). "Salami fraud". Network World.Archived from the
123
CYBER LAW: EMERGING TRENDS AND CHALLENGES
Cookies
When a person accesses a website, a little text file called a
cookie is downloaded to their computer. They include data that the
website server transmitted to the user's browser. A web user may
occasionally examine cookies in the source code of a web page's
header if they so choose. However, the majority of the time, the user
is not seen the information that has been gathered; instead, their
computer and browser record, track, and store it. The user's web
browser will communicate the previously saved data to the website
if they visit it again. By recording the users' movements on certain
computers, cookies can inform a website that a visitor's computer is
the same one that was there previously. The cookies itself may not
contain personally identifying information, but the websites may
know the identity of the user whose browser sends the cookie.34 By
altering or controlling the treat, the assailant can get to the client
information put away in the treat. Treat harming assaults are
perilous on the grounds that they empower aggressors to utilize the
information put away inside treats to acquire unapproved
admittance to clients' records or to take their personalities.
33"Convicted parking meter thief amassed $210,000 in stolen cash all of it in quarters".
National Post.Postmedia Network Inc. Associated Press. August 17, 2013. Retrieved
27 August 2019
34Lee Fen Yem, Cyber Space Law, Oxford University Press, New Delhi, 2007, p. 128
124
CYBER LAW: EMERGING TRENDS AND CHALLENGES
typically locate a page that is open to XSS injection. They can force
the page to send them all visitors' session cookies by adding a
malicious script to the page. They can access all of these users' info
in this way.
Attackers can continue to be logged into their victims'
accounts without the victims noticing it since the stolen cookie
allows the attacker to impersonate its true owner. In addition, no
password is required for attackers to access victim accounts.
Because of this, XSS is a very popular and powerful tool for cookie
poisoning attacks.
125
CYBER LAW: EMERGING TRENDS AND CHALLENGES
37Ibid
38Ibid
126
CYBER LAW: EMERGING TRENDS AND CHALLENGES
Spoofing
Fake e-mail address or web page are designed to trick users to
provide information or send money. Its main purpose is to confuse the
consumers in similar or fake website. In online protection, 'mocking' is
when fraudsters claim to be some other person or thing to win an
individual's trust. The inspiration is normally to get sufficiently close to
frameworks, take information, take cash, or spread malware.
Under Reality in Guest ID Act, FCC rules restrict anybody
from sending misdirecting or off base guest ID data with the goal to
swindle, inflict any kind of damage or wrongly get anything of
significant worth. Anybody who is wrongfully ridiculing can have
to deal with damages of up to $10,000 for every infringement. This
sort of stunt happens when someone needs to cover or hide away the
region from where they're sending or referencing data, so they
replace the source Web show (IP) address with a fake one39.
There is different sort of snooping-Mocking can take many
structures, for example, satirize messages, IP caricaturing, DNS
Ridiculing, GPS parodying, site parodying, and spoofed calls40. It
can better be understandable with the help of illustration Ridiculing
methods shift in light of the kind of assault.
For instance, in email ridiculing, the enemy can hack an
unstable mail waiter to conceal their actual character. In a MitM
assault, an enemy can make a Wi-Fi passageway to catch any web
movement and assemble individual data41.
39Jean Folger, What Is Spoofing? How Scam Works and How To Protect Yourself,
127
CYBER LAW: EMERGING TRENDS AND CHALLENGES
42 Systematic
literature review paper by Iftikhar Ahmad1,*, Shahid Iqbal2,, Shahzad
Jamil3 and Muhammad Kamran
43 IBM, 2009. IBM X-Force Trend and Risk Report [Online] available at:
128
CYBER LAW: EMERGING TRENDS AND CHALLENGES
44Jun,M. &Cai, S., 2001. The key determinants of Internet Banking service quality: a
content analysis. International Journal of Bank Marketing.19(7), pp.276-291.
45Leow, H.B., 1999. New Distribution Channels in banking Services. Banker’s Journal
129
CYBER LAW: EMERGING TRENDS AND CHALLENGES
Since the finished-up TAN should be used for this trade and the not
entirely settled with the aid of the bank card, this technique is
evaluated as being particularly secure. Basically, the section of the
exchange information utilizing the keypad on the examine is now
and again considered unusual and integrates the chance of wrong
passages.46
Another instrument that seemed available to help client
endorsement is the electronic Individual (eID) card. Such e-ID cards
have again been presented in a lot of European nations. In
unambiguous nations, the issuance for these e-ID cards is
coordinated by gatherings, or by grouped public affiliation (PPP)
among banks and state-run associations, as giving bodies. Such are
Sweden, Estonia, or Luxembourg. There is, in unambiguous nations,
a genuine premium of the money related locale to work with public
specialists as close as conceivable in regards to the questions of
client certification and electronic engravings. Biometry isn't as of
now utilized and ought not be a gigantic strategy for confirming
clients soon in Europe because of variables like shortage of
adequacy bother of heading, and cost ampleness or adequacy.47
The figure 04 highlights the action that the specialist has stressed
for the purpose of further developing web-based assault anticipations.
Out of the absolute chosen investigations, 27.27 percent of scientists
underlined that a wide range of safety efforts, for example, framework
security, server security, security control, IP security, data security,
versatility of safety frameworks, security evaluation, and dynamic
security skin can forestall computerized assaults. Additionally, 20%
investigations give smidgens of proof that instruction, mindfulness, and
staff preparing can essentially defend the client from online
assailants/extortion. Different investigations (12.73 percent) stressed on
strong ID and validation framework, gadget recognizable proof, IP
address ID, and utilization of biometrics for the purpose of further
developing internet-based extortion anticipations. Scientists
demonstrated that a distinguishing proof framework, for example,
46Mohr, E., 2009. Security is decisive. Beitrag für IT Banken & Versicherungen, 5 Oct,
available athttp://www.gemalto.com/financial/ebanking/security/ (Visited on:
February 17, 2023)
47 Rombel, A., 2005. Next step for Internet Banking, available at:
http://www.gfmag.com/archives/87-87-february-2003/2176-features--next-step-
forinternet-banking.html#axzz0IhUm79xl (Visited on: February 17, 2023)
130
CYBER LAW: EMERGING TRENDS AND CHALLENGES
48 Systematic
literature review paper by Iftikhar Ahmad1,*, Shahid Iqbal2,, Shahzad
Jamil3 and Muhammad Kamran
131
CYBER LAW: EMERGING TRENDS AND CHALLENGES
49Zimmerman, J. M., & Baur, S. (2016). Understanding how consumer risks in digital
social payments can erode their financial inclusion potential.
50 Sohail, M. & Shanmugham, B., 2003. E-banking and Customers’ preferences in
132
CYBER LAW: EMERGING TRENDS AND CHALLENGES
133
CYBER LAW: EMERGING TRENDS AND CHALLENGES
CONCLUSION
“Mankind faces huge challenges as the 21st Century unfolds.
It is essential that our leading thinkers commit time, energy and
resources how to finding solutions to these risks and problems
which could threaten the future of humanity itself.53”
James Martin
Although there are several advantages to using electronic
banking for both existing clients and prospective. Business
opportunities exist for banks, and typical banking risks—particularly
security risks—are exacerbated issues. Additionally, we cannot
disregard the fact that Competitive Intelligence programmes' main
objective to combine different information sources in order to boost
the industry's competitiveness financial institution while undermining
the advantage of its competitors. This knowledge is frequently
obtained using legal, ethical, and covert methods involving financial
espionage. The review applied SLR procedure to aggregate basic
information spread in different articles. Immediately, 1404 articles
were taken out from six specific enlightening assortments and were
52Mohr, E., 2009, Matilla, S. et. al., 2003.Security is decisive, Beitrag für IT Banken &
Versicherungen, 5 Oct. Available at http://www.gemalto.com/financial/ebanking/secu
rity/ (Visited on: February 17, 2023)
53Pranab Kumar Bhattacharya, “Legal Framework of Electronic Commerce: A Study
with Special Reference to Information Technology Act 2000”, The Indian Journal of
Commerce, No. 4, Vol. 54, October December, 2001
134
CYBER LAW: EMERGING TRENDS AND CHALLENGES
135
CYBER LAW: EMERGING TRENDS AND CHALLENGES
CHAPTER 9
INTRODUCTION
136
CYBER LAW: EMERGING TRENDS AND CHALLENGES
137
CYBER LAW: EMERGING TRENDS AND CHALLENGES
4J. M. Alghazo, Z. Kazmi and G. Latif, "Cyber security analysis of internet banking in
emerging countries: User and bank perspectives," 2017 4th IEEE International
Conference on Engineering Technologies and Applied Sciences (ICETAS),
Salmabad, Bahrain, 2017.
5 Reserve Bank of India, “Cyber Security Framework in Banks”, available at
138
CYBER LAW: EMERGING TRENDS AND CHALLENGES
6Subodh Kesharwani, Madhulika P. Sarkar, & Shelly Oberoi. (2019). Growing Threat
of Cyber Crime in Indian Banking Sector. CYBERNOMICS, 1(4), 19-22.
7Klynveld Peat Marwick Goerdeler, “Indian Banking Sector - Cyber Security Survey
2019-20” (2019-20).
139
CYBER LAW: EMERGING TRENDS AND CHALLENGES
8Rashmi V. Deshmukh and Kailas K. Devadkar, “Understanding DDoS Attack & its
Effect in Cloud Environment” 49 Procedia Computer Science 202-210 (2015).
140
CYBER LAW: EMERGING TRENDS AND CHALLENGES
141
CYBER LAW: EMERGING TRENDS AND CHALLENGES
142
CYBER LAW: EMERGING TRENDS AND CHALLENGES
143
CYBER LAW: EMERGING TRENDS AND CHALLENGES
144
CYBER LAW: EMERGING TRENDS AND CHALLENGES
145
CYBER LAW: EMERGING TRENDS AND CHALLENGES
146
CYBER LAW: EMERGING TRENDS AND CHALLENGES
147
CYBER LAW: EMERGING TRENDS AND CHALLENGES
at https://www.cioandleader.com/article/2018/02/23/now-data-breach-punjab-national-
bank. (Visited on January 23, 2023).
18M. L. Reddy and V. Bhargavi,” Cybersecurity attacks in banking sector” Emerging
148
CYBER LAW: EMERGING TRENDS AND CHALLENGES
CONCLUSION
Cyber security is of paramount importance in India's banking
sector, given the sensitive financial data that banks handle on a daily
basis. The country's large population and growing economy make it
an attractive target for cybercriminals. Banks in India have
implemented a range of cybersecurity measures to protect their
systems and customers from cyber threats, but cybercriminals
continue to evolve their tactics, making it essential for banks and
individuals to remain vigilant.
Cybersecurity threats continue to pose significant challenges
to the banking sector in India and across the world. Banks and
financial institutions face a growing number of cyber-attacks that
are becoming more sophisticated and targeted. The consequences of
a successful cyber-attack can be severe, including financial losses,
reputational damage, and regulatory penalties. Therefore, it is
crucial for banks to implement robust cybersecurity measures to
19 Bamrara, Dr. Atul and Singh, Gajendra and Bhatt, Mamta,” Cyber Attacks and
149
CYBER LAW: EMERGING TRENDS AND CHALLENGES
20Ahmad Ali, “Cyber Security Policing: Analysing National Cyber Security Policies of
India and Pakistan” 40 (2022).
150
CYBER LAW: EMERGING TRENDS AND CHALLENGES
151
CYBER LAW: EMERGING TRENDS AND CHALLENGES
CHAPTER 10
“Internet has made the inflow and outflow of data and various
information between different networks easily and rapidly. The
transmission of the information at faraway locations has caused a
major concern from the security perspective. This issue is increasing
day by day from the past few years. Security concern is related to the
criminal activities which are being performed by few people for their
economic benefits. Criminal Activities like fake economic scams,
unallowed access to other networks, etc. are some of the major
cybercrimes. These crimes are also taking place through many social
media platforms like, WhatsApp, Instagram, Facebook, etc. and also
through various online shopping sites. Therefore, to stop or to prevent
these types of criminal activities and to punish these criminals, “Cyber
Laws and Policies” are being introduced by different nations to protect
their secret information and data. These Laws and Policies deals with
the cyberspace and other legal issues like data privacy and security
issues. Therefore, the comparative study of Cyber Laws and Policies of
India and USA may be done, keeping in mind the above perspective.
This chapter is divided into three sections in order to provide a brief
overview of Cyber Laws and Policies of India & USA and their
comparative study”.
Mathura, (India)
152
CYBER LAW: EMERGING TRENDS AND CHALLENGES
INTRODUCTION
CYBERLAWS IN INDIA
Cyber Laws hold significant importance in a country like
India where internet usage is widespread, as they regulate the use of
cyberspace and protect the use of information, software, electronic
commerce, and financial transactions. These laws are strict and help
to improve connectivity while addressing security risks.
Furthermore, Indian Cyber Laws have played a crucial role in
promoting the adoption of e-commerce and e-governance, thus
advancing the goals of the Digital India initiative with broader reach
and greater efficiency.
As we study about the Cyber Laws, there is a question which
we have to answer that ‘Why there is a need for Cyber Crimes?’
Just like other countries have some certain laws on Cyber Crimes,
India is also required and concerned about such crimes. As in the
recent population data index India is now the most populated
country in the world by defeating China so as the population grows
faster, there is a rapid growth in the cybercrimes due to the
technological change in the world. It is required for the security
concerns issues of private data and information to solve it. In recent
153
CYBER LAW: EMERGING TRENDS AND CHALLENGES
154
CYBER LAW: EMERGING TRENDS AND CHALLENGES
This act was amended in the year 2008 because it didn’t cover
all the grounds of cybercrimes committed, amendments were done
in Rajya Sabha on 23rd December, 2008. Some major sections were
incorporated in this act. The Section 66 (A), Section 67 (B) and
Section 69 were incorporated through amendment in 2008.3
There are some important provisions of IT (Amendment) Act,
2008 which tackle about the cybercrimes ‘punishments’. Section 43
of the law outlines the penalty and compensation for damages
caused to computers, computer systems, and similar resources. It
states that anyone who gains access to a computer, computer
system, or computer network, or any related resources without
authorization from the owner or person in charge, and downloads,
copies, or extracts any data or information, including those stored in
removable storage media, or introduces a computer virus or
contaminant, or manipulates a computer network to charge services
to another person's account, shall be held accountable for paying
compensation to the affected person for any resulting damages.
Second important section is Section 65 of the act deals with
tampering with computer source documents, which is defined as
willfully altering, destroying, or concealing a computer source code
used for a computer programme, computer system, or computer
network. Those found guilty of this offence may face imprisonment
for up to three years and a fine of up to ₹2 lakhs. Section 66 of the
act covers hacking into a computer system. It states that any
individual who commits one of the acts outlined in section 43 with
dishonest or fraudulent intent can face imprisonment for upto three
3Section 43 of the Information Technology Act, The Centre for Internet and Society,
available at:https://cis-india.org/internet-governance/resources/section-43-it-act.txt
(Visited on: March 12, 2023)
155
CYBER LAW: EMERGING TRENDS AND CHALLENGES
156
CYBER LAW: EMERGING TRENDS AND CHALLENGES
12, 2023)
157
CYBER LAW: EMERGING TRENDS AND CHALLENGES
158
CYBER LAW: EMERGING TRENDS AND CHALLENGES
159
CYBER LAW: EMERGING TRENDS AND CHALLENGES
160
CYBER LAW: EMERGING TRENDS AND CHALLENGES
161
CYBER LAW: EMERGING TRENDS AND CHALLENGES
162
CYBER LAW: EMERGING TRENDS AND CHALLENGES
Act. Govt. also made IT Rules, 2011 which defines some important
terms.
15 Cole B., What is Computer Fraud and Abuse Act, 2012, available at:
https://www.techtarget.com/searchsecurity/definition/Computer-Fraud-and-Abuse-Act-
CFAA/ (Visited on: March 13, 2023)
163
CYBER LAW: EMERGING TRENDS AND CHALLENGES
164
CYBER LAW: EMERGING TRENDS AND CHALLENGES
165
CYBER LAW: EMERGING TRENDS AND CHALLENGES
19Crim.No.1:11-CR-10260;D.Mass.2012
No.2:13-CR-00082;E.D.Cal.2013
166
CYBER LAW: EMERGING TRENDS AND CHALLENGES
Covered Entities
The following types of individuals and organizations are
considered as covered entities:
• Healthcare Providers: The requirement to comply with
electronic data communication standards applies to healthcare
providers of any size who participate in certain transactions,
such as claims and benefit eligibility inquiries, involving
patient information.
• Health Plans: This category encompasses various entities
such as health, dental, vision, and prescription drug insurers,
health maintenance organizations (HMOs), Medicare,
Medicaid, Medicare+Choice, Medicare supplement insurers,
and others.
• Healthcare Clearinghouses: Healthcare clearing houses act
as intermediaries between different entities, converting non-
standard health information to a standard format or the other
way around. When providing processing services as business
associates for health care providers or health plans, they
usually handle individually identifiable health information.
• Business Associates: A business associate is a person or
organization that discloses or uses individually identifiable
health information to perform tasks, activities, or services for
a covered entity, but is not an employee of that entity.
167
CYBER LAW: EMERGING TRENDS AND CHALLENGES
168
CYBER LAW: EMERGING TRENDS AND CHALLENGES
169
CYBER LAW: EMERGING TRENDS AND CHALLENGES
170
CYBER LAW: EMERGING TRENDS AND CHALLENGES
21 Jain J., Chaudhary R., Understanding The Concept of Cyber Crimes in India vis-a-
vis Cyber Laws of USA,International Journal of Research and Analytical Reviews, Vol.
VI, Issue II, Atman Publishing Academy,Gujarat,India, May2019,pp.430
171
CYBER LAW: EMERGING TRENDS AND CHALLENGES
172
CYBER LAW: EMERGING TRENDS AND CHALLENGES
CONCLUSION
There are hundreds of incidents occurring in the nations, but
only a small number of cases are reported as complaints. Some
cybervictims regard this experience as their nightmare, badluck, or a
desire from God and go on with their lives by forgetting all the
incidences since many victims, out of fear of being mistreated in
society and the danger of doing so, do not file any complaints
against the cybercriminals. However, as a result of this,
cybercriminals are more motivated to engage in these kinds of
illegal operations. It is necessary to encourage more people to file
complaints in order to fight cybercrime on a national and worldwide
scale.
After analyzing the comparative study of the laws of both
countries, it is evident that despite the USA enacting various laws to
combat cybercrime, there remain several intricate legal matters that
require resolution. Similarly, India's Information Technology Act of
2000 is a comprehensive law for preventing cybercrime, but it still
lacks adequate provisions for addressing certain legal challenges.
The absence of sufficient international legislation has resulted in
ambiguous or unclear legal issues regarding electronic transactions
and civil liability in cyberspace. It is therefore imperative for the
adoption of robust cyber regulations at a global level.24
23Ibid,pp.434
24Ibid pp 436-437
173
CYBER LAW: EMERGING TRENDS AND CHALLENGES
CHAPTER 11
INTRODUCTION
C
ybercrime can be defined as those species that fall under the
category of traditional crime and in which the computer
serves as either an object or a motivation for unlawful
behavior.3
174
CYBER LAW: EMERGING TRENDS AND CHALLENGES
175
CYBER LAW: EMERGING TRENDS AND CHALLENGES
INGREDIENTS OF CYBERCRIME
Since nation governments around the world have yet to have a
complete dimension that can meet the wide range of interpretations and
which acts can be designated as terrorism, the components that make
up cyber terror are being described differently from expert to expert.
Some define cyberterrorism as any act that can be associated with other
operations that are often classified as terrorism by governments or
other countries that uses the internet to help the advancement of such
activities on the other hand, according to another component,
cyberterrorism refers to any activity that uses the internet to help the
advancement of work that is commonly defined as terrorism by the
government or other nation-states. The two sets of specialists could not
agree on a common definition, but they generally agreed that it
involves the criminal destruction of digital property in order to put
pressure on the government to uphold a certain group's Religious,
176
CYBER LAW: EMERGING TRENDS AND CHALLENGES
177
CYBER LAW: EMERGING TRENDS AND CHALLENGES
178
CYBER LAW: EMERGING TRENDS AND CHALLENGES
8 High-risk data fiduciaries to be regulated more granularly under Data Bill, The
Economics Times, available at https://ciso.economictimes.indiatimes.com. (Visited on
January 6, 2023)
9The Business Today, available at https://www.businesstoday.in. (Visited on February
18, 2023)
179
CYBER LAW: EMERGING TRENDS AND CHALLENGES
180
CYBER LAW: EMERGING TRENDS AND CHALLENGES
pp. 228.
181
CYBER LAW: EMERGING TRENDS AND CHALLENGES
13Section 66A has been struck down by Supreme Court's Order dated 24th March, 2015
in the Shreya Singhal vs. Union of India, AIR 2015 SC. 1523.
182
CYBER LAW: EMERGING TRENDS AND CHALLENGES
14Kamath and Nandan., Cyber Law and Information Security. LexisNexis, 2017.
15Sood and Vivek., Cyber Law Simplified., Universal Law Publishing Co. Pvt. Ltd.,
2019
16Seth and Karnika., Cyber Law: The Indian Perspective. Universal Law Publishing
183
CYBER LAW: EMERGING TRENDS AND CHALLENGES
18 Gupta, Rohit. (n.d.). An Overview of Cyber Laws vs. Cyber Crimes: In Indian
Perspective - Privacy - India. Www.Mondaq.Com. Or https://www.mondaq.com/india
/privacy-protection/257328/an-overview-of-cyber-laws-vscyber-crimes-in-indian-
perspective (Visited on January 5, 2023)
19Cyber Laws in India. (n.d.). Retrieved August 18, 2020, from https://www.latestlaws.
184
CYBER LAW: EMERGING TRENDS AND CHALLENGES
21Ibid. pp.66
22Ibid. pp.66B
23Ibid. pp.66C
24Ibid. pp.66D.
25The Indian Penal Code, 1860, § 464, No. 45, Acts of Parliament, 1860 (India)
26Ibid. pp.465
27Ibid. pp.468
185
CYBER LAW: EMERGING TRENDS AND CHALLENGES
28Ibid. pp.469
29Ibid. pp.471
186
CYBER LAW: EMERGING TRENDS AND CHALLENGES
187
CYBER LAW: EMERGING TRENDS AND CHALLENGES
panel with the same authority as a civil court, and every deciding
official has a similar authority as a civil court.31 In order to make
online buying less difficult and to enforce severe penalties for
disobedience, it also aims to lessen fraud and forgeries.32 The first
case to be determined in India was the ICICI Bank fraud case. In
that instance, the applicant alleged that the bank's lack of security
had caused him to lose cash from the account he was using; the
applicant was granted the funds that were lost by a court order.
E-commerce
Over the past few years, the Indian e-commerce industry has
experienced remarkable growth. India is seeing a significant
economic transition from neighbourhood markets to online
marketplaces. The IT legislation gives all e-commerce activities a
legal foundation that safeguards both buyers and sellers. It also
emphasizes the need to secure customer privacy data and electronic
records while validating and enforcing digital signatures.
E-governance
IT Act 2000 deals with electronic regulation issues
in Chapter III, process and legal recognition of electronic data.
Electronic data explain the storage and maintenance process and
passed verification process the procedures regarding electronic
signatures and the management instructions for physical
authentications of a contract concluded electronically are specified
in the following section.
Digital Signatures
Digital signature refers to the acceptance of electronic data by
the user through electronic means or a transaction in accordance
with Section 3 which takes into account situations in which it is
possible to employ additional digital signatures to authenticate
electronic data twice. To ensure the integrity of the communication
included in the electronic file, the electronic data is first transformed
31 Gupta, Rohit. (n.d.). An Overview of Cyber Laws vs. Cyber Crimes: In Indian
Perspective - Privacy - India. Www.Mondaq.Com.https://www.mondaq.com/india/pr
ivacy-protection/257328/an-overview-of-cyber-laws-vscyber-crimes-in-indian-persp
ective (Visited on January 4, 2023)
32Raj, Aijaj& Rahman, Wazida., E-commerce Laws and Regulations in India: Issues
188
CYBER LAW: EMERGING TRENDS AND CHALLENGES
33OVERVIEW OF CYBER LAWS IN INDIA Index. (n.d.). Retrieved August 18, 2020,
from https://taxguru.in/wp-content/uploads/2012/10/cyber-laws-overview.pdf. (Visited
on January 2, 2023)
34Dugal, P. (2001, September). Cyberlaw In India: The Information Technology Act
https://www.livemint.com/Politics/DQ8gg6eCNeZwHJxt84rhMN/Govt-releases-
National-Cyber-SecurityPolicy-2013.html (Visited on February 8, 2023)
189
CYBER LAW: EMERGING TRENDS AND CHALLENGES
RUSSIAN FEDERATION
Fighting cybercrime in Russia is the responsibility of
Department "K" of the Ministry of Internal Affairs of the Russian
Federation (Russian: Minister Delhi or MVD). The MVD published
its most current report in late 2012, which contained statistical
information on high-tech crimes. (Expanding in the first half of
2012). The findings show that during that time, 5696 cybercrimes
were found in Russia, an 11% rise from the corresponding period in
2011. The significant Russian cyber security firm Group-IB offers
two causes for the country's continued and dramatic increase in
cybercrime. First, Russia's legal system is ineffective at stopping
cybercrime, and the punishment is incredibly lenient: sentences for
computer-related offences are either short or delayed. Second,
several hacking groups strive to cooperate in order to boost revenue
and support their illegal actions.
190
CYBER LAW: EMERGING TRENDS AND CHALLENGES
191
CYBER LAW: EMERGING TRENDS AND CHALLENGES
40 On the issue of criminal responsibility for the creation, use and distribution of
“botnets”, available at https://cyberleninka.ru/article/n/on-the-issue-of-criminal-
responsibility-for-the-creation-use-and-distribution-of-botnets (Visited on December
11, 2023)
41Ligh M.H., Adair S., Hartstein B., and Richard M., "Malware Analyst's Cookbook
and DVD: Tools and Techniques for Fighting Malicious Code", MECS Press,
IJCNISVol.7, No.7, Jun. 2015
192
CYBER LAW: EMERGING TRENDS AND CHALLENGES
one's own computers, which contained their hacking tools. The FBI
employed a technique that the Russians were not aware of to obtain
the password and user name of the hackers. Ivanov and the defendant
were immediately detained after the incident. Using their user name
and password, the FBI followed by downloading data from the
defendant or Ivanov's Russian home computers, which they used as
proof against both of them without a warrant. Gorshkov filed a
request to suppress the evidence after they were found guilty,
claiming that both Russian law and the Fourth Amendment of the
Constitution were being violated. The FBI insisted that approval from
Russian authorities is not required because downloading from an
electronic source is not seen as a search. The court rejected Gorshkov
and Ivanov's petition, noting that the Fourth Amendment's protections
should only be invoked whenever a search and seizure fell under its
ambit. However, the act of copying the material from the Russian
gadgets did not infringe upon the defendant's own passion for the
data, and the act of the law enforcement officers accessing
information from a gadget located in another nation did not constitute
a search or seizure.
Federal Law No. 149-FZ, the Information Law, was passed in
2006 and has subsequently undergone numerous revisions. The law
creates the regulatory framework for information technology use
and data protection in Russia. It governs a wide range of topics,
including as accountability for legal violations, encryption,
electronic papers and signatures, and data protection. On the website
of the Russian government, the complete text of the law is available
in Russian. It governs a wide range of topics, including as
accountability for legal violations, encryption, electronic papers and
signatures, and data protection. Federal Law No. 152-FZ, the
Personal Data Law, was passed in 2006 and has since undergone
numerous revisions. The collection, storage, use, and transfer of
personal data are all subject to legal restrictions. It establishes
individuals' rights with regard to their personal data and requires
data controllers and processors to safeguard personal data from
unauthorized access, disclosure, or destruction. On the website of
the Russian government, the complete text of the law is available in
Russian. The Cybersecurity Law (Federal Law No. 187-FZ), one of
Russia's most significant cybersecurity laws, was adopted in 2019.
The law creates the legal framework for safeguarding the security of
Russia's important information infrastructure and requires operators
193
CYBER LAW: EMERGING TRENDS AND CHALLENGES
Doctrine." In "The Russian Military Today and Tomorrow: Essays in Memory of Mary
FitzGerald," edited by Stephen J. Blank, 165-182. Strategic Studies Institute, 2010.
194
CYBER LAW: EMERGING TRENDS AND CHALLENGES
CONCLUSION
It's interesting to note that in some countries legislation, the
terms "cybercrime” and "computer crime" are frequently specified
and implied. The national strategic plans, which frequently act as
guides for government agencies and, on certain occasions, the
private sector, use comparable language and more specific terms for
"cyber-attack" as an offense distinct from and more dangerous than
a cyber-crime. Governments are especially worried about
cybercrimes like money laundering, pornography involving
children, and unauthorized utilization of computer data, according
to legal records. Each of the nations this report looked at has
imposed penalties for these infractions. In order to combat
cybercrime, all of the nations included in this research are currently
building new units or organizations as well as revising existing
legislation. The examined policies, strategic acts, and agreements
reveal a startling correlation between the two, allowing us to
distinguish between cyber-attacks and cyber-crimes. As a result, the
strategic focus of the cyber security approach has shifted from
simply identifying and combating local cybercrimes to more
involved efforts like defending the nation's infrastructure against
cyberattacks from both abroad and within the country.
46Hill and Fiona., "Putin's Cyberwar." Foreign Affairs 93, no. 3 (2014), pp. 78-89.
47Likhomanov, Pavel, and Shumilova O., "Cyber Law in Russia." Springer, 2017.
195
CYBER LAW: EMERGING TRENDS AND CHALLENGES
CHAPTER 12
INTRODUCTION
A
n increase in cybersecurity risks has been seen in India as a
direct result of the country's increased reliance on electronic
devices and the internet since the recent emergence of the
COVID-19 epidemic. The rapid spread of COVID-19 has highlighted
the many shortcomings of our increasingly Internet-dependent
culture. Increases in phishing, Trojan horses, malware assaults, and
invasions of privacy highlight the need for India to clarify its cyber
security legislation and provide victims with clearer access to legal
recourse. Since February 2020, cyberattacks in India have acquired
significant traction, with the proportion of cyberattacks increasing to
500% in 2020 alone, and this trend is only projected to accelerate
shortly.
The purpose of this chapter is to examine the present cyber
law, cyber security, and victim remedies in India. The essay also
discusses the consequences of forthcoming cyber legislation in India
for topics like cyber security and cyber assaults. This study seeks to
ascertain whether the present body of law, together with pending
legislation, is enough to handle future privacy and cybersecurity
196
CYBER LAW: EMERGING TRENDS AND CHALLENGES
CYBER CRIMES
"Cyber crimes" are not specified in any laws or statutes in
India. The term "cyber" is frequently used in relation to computers,
data innovation, etc. Crimes committed using electronic means
(such as computers, data innovations, the internet, and virtual
reality) are appropriately termed "cyber-crimes"3. Since the world
has come to rely more and more on the internet for basic necessities,
cybercrime has also developed at a rapid rate in recent years.
Cybercrimes have evolved to the point that they occur almost daily
today. Even the most secure government websites are routinely
breached, much less the social media accounts of average people.
Eight out of ten people, according to the research, fall for
cybercriminals' traps of various kinds4.
Information held by the government was included in over a
thousand of the most serious data breaches. Aadhaar, India's one-of-
a-kind system of citizen-recognized evidence, was affected by one
of these security vulnerabilities. In the early months of 2018,
hackers broke into the Aadhaar system, exposing the personal
information of over a billion People. The victims of cyberbullying
and other forms of cyber misuse suffer additional harm beyond the
financial losses caused by cybercrime. More than 4,000 women and
children in India were victims of cyberbullying and 4,444
cybercrime incidents including sexual badgering were reported in
2018. Although a large percentage of Indians acknowledged that
both clients and social media platforms were liable for damaging
conduct on social media, growing awareness of the problem of
cyberbullying may be driving this high number of incidents. In
2018, the government moved to establish a nationwide cybercrime
reporting system, allowing individuals to register concerns over the
internet.
3 Cyber Crimes Under The IPC And IT Act - An Uneasy Co-Existence - Media,
Telecoms, IT, and Entertainment – India, available athttps://www.mondaq.com/india/it
-and-internet/13430/cyberlaw-in-india-the-information-technology-act-2000--some-per
spectives. ( Visited on March 6, 2023)
4 Varsha, An Analysis on Cyber Crime in India, available at www.le
galserviceindia.com/legal/article-797-an-analysis-on-cyber-crime-in-india.html.
(Visited on February 2, 2023)
197
CYBER LAW: EMERGING TRENDS AND CHALLENGES
5 Kumar S and Uday Kumar, “Present scenario of cybercrime in INDIA and its
preventions”,May 12, 2012.
6 Overview of Cyber Laws in India, available athttps://taxguru.in/wp-
content/uploads/2012/10/cyber-laws-overview.pdf. (Visited on February 15, 2023).
198
CYBER LAW: EMERGING TRENDS AND CHALLENGES
manupatra.in/newsline/articles/Upload/455C1055-C2B6-4839-82AC-
5AB08CBA7489.pdf. (Visited on February 7, 2023)
199
CYBER LAW: EMERGING TRENDS AND CHALLENGES
200
CYBER LAW: EMERGING TRENDS AND CHALLENGES
201
CYBER LAW: EMERGING TRENDS AND CHALLENGES
The following are the cyberattack remedies covered under the IPC:
Sending threatening emails over the Internet Section 503 of the
IPC
202
CYBER LAW: EMERGING TRENDS AND CHALLENGES
203
CYBER LAW: EMERGING TRENDS AND CHALLENGES
204
CYBER LAW: EMERGING TRENDS AND CHALLENGES
205
CYBER LAW: EMERGING TRENDS AND CHALLENGES
206
CYBER LAW: EMERGING TRENDS AND CHALLENGES
207
CYBER LAW: EMERGING TRENDS AND CHALLENGES
208
CYBER LAW: EMERGING TRENDS AND CHALLENGES
209
CYBER LAW: EMERGING TRENDS AND CHALLENGES
210
CYBER LAW: EMERGING TRENDS AND CHALLENGES
211
CYBER LAW: EMERGING TRENDS AND CHALLENGES
18HardeepSingh, “A Glance At The United States Cyber Security Laws”, Centre for
Academic Legal Research | Journal of Applicable law & Jurisprudence, Volume 1 |
Issue 1.
212
CYBER LAW: EMERGING TRENDS AND CHALLENGES
United Kingdom
There is no overarching legislation in the UK managing IT or
cyber security, and instead, based on laws like the Security Services
Act of 1989 and the Civil Emergency Act of 2004, several
government entities are subject to various legal obligations. It offers
a great deal of leeway for the creation of novel cyber shielding
techniques. The year 2009 saw the Office of Cyber Security's
establishment. By 2010 it has expanded its remit to include
Information Assurance (OCSIA). Collaborate with businesses to
establish shared norms and information sharing. When it comes to
enforcing national cybersecurity standards, the National Cyber
Security Center (NCSC) has all the power. Advising and
coordinating government and private sector cybersecurity activities.
NCSC was established in 2016, and its responsibilities encompass
those of the communications-electronics security group, CERT-UK,
and GCHQ, the National Security Agency of the UK's intelligence
division. The National Infrastructure Protection Center and Network
and Information Security Regulations 2018 oversee the cyber
evaluation center and other essential infrastructure security
responsibilities (NIS). 20 The Privacy and Electronic
Communications (EC Directive) Regulations of 2003, the
the United Kingdom Shared under Creative Commons Attribution 4.0 International
license.
213
CYBER LAW: EMERGING TRENDS AND CHALLENGES
Australia
The Cybercrime Act is a comprehensive law that addresses
computer and online crime. The sending of commercial electronic
communications, including emails, has been subject to regulation
under various laws, such as the Spam Act. Limit the sending of
spam and other unwanted electronic communications, with a few
caveats. The Australian Communications and Media Authority is in
charge of enforcing this legislation. The Preventive Privacy and
Security Structure and the Privacy and Information Security
Handbook are only two of the rules and regulations the Australian
government has in place to safeguard public privacy. Recently, the
Australian government published its strategy for enhancing
cybersecurity by 2020. Its goals include reducing cybercrime and
raising awareness of the issue, as well as providing cyber assistance
to individuals and small companies. Although similar to the United
States in terms of basic cyber regulation, Australia lacks specific
legislation in several sectors, including health, personal, and
commercial insurance.
214
CYBER LAW: EMERGING TRENDS AND CHALLENGES
preexisting good ties with the Soviet Union. There are five key areas of
collaboration between India and Russia: politics, military, civil energy,
counter-terrorism cooperation, and space exploration. The sixth
dimension, which focuses on economics, has been trending in recent
years. The largest project in this field, the Integrated Long-Term
Cooperation Program (ILTP) between India and Russia, comprises
ongoing research and technological partners. Organizing the ILTP are
the Indian Academy of Sciences, the Indian Ministry of Science and
Technology, the Indian Ministry of Science and Education, and the
Indian Ministry of Industry and Commerce. The SARAS Duet aircraft,
semiconductor goods, supercomputers, poly vaccines, laser-based
technology, seismography, highly pure supplies, applications, and its
IT & Ayurveda are among the priority areas for partnership under the
ILTP. In August 2007, a memorandum of understanding was signed in
Moscow by the Ministry of Science and Technology and The Russian
Fund for Basic Research.
215
CYBER LAW: EMERGING TRENDS AND CHALLENGES
PCs. The Russians had no idea that the FBI had gotten the hacker's
stoner ID and word via some kind of style. Gorshkov and Ivanov
were immediately detained after the incident. In addition, the FBI
illegally downloaded information from the Russian homes of
Gorshkov and Ivanov using the stoner ID and password. Gorshkov
filed a motion to suppress the evidence after they were convicted,
claiming that their rights had been violated in breach of both
Russian law and the Fourth Amendment. The FBI argued that since
downloading from an online source did not qualify as a hunt, it was
not necessary to obtain permission from the Russian government.
The Fourth Amendment's prohibition on unwarranted searches and
seizures served as the court's justification for rejecting Gorshkov
and Ivanov's petition in response. However, because the defendant
had a possessory interest in the data, the FBI agent's actions to copy
it from the Russian computers did not amount to a search or seizure.
Data protection has been a contentious issue since at least 2014. As
sequestration approached, the administration took a more
protectionist stance. The Personal Information Law (The Database
Local Law) was changed by the Russian parliament in a manner
reminiscent of Indian law, limiting data collectors to exclusively
access Russian databases. The Data Localization Law was
implemented on September 1, 2015, despite widespread opposition
from businesses and the press. Russia has updated its Data
Localisation Law as well as its Information and Information
Technology Federal Laws and its Information Protection Federal
Law. Businesses that offer video, audio, or text-based
communication services must now register with the government,
retain call records for not more than six months, and give the
government decryption keys if translated discussions are retained.
Russian data privacy laws have recently faced certain difficulties.
On May 5, 2014, Russian lawmakers passed Federal Law Number,
97-FZ, which made major changes to additional legislation,
including Federal Law Number, 149-FZ, enacted on July 27, 2000.
In recent years, major revisions have been made to the Information
Law, which went into effect on July 1, 2018. The amendments,
known as the Yarovaya Law, were written by Irina Yarovaya and
had a significant impact on Russian telecommunications and
internet regulation. Particularly, mobile device drivers were
mandated to spend a lot of money storing all call recordings and
textbook dispatch content for six months, and internet service
216
CYBER LAW: EMERGING TRENDS AND CHALLENGES
217
CYBER LAW: EMERGING TRENDS AND CHALLENGES
218
CYBER LAW: EMERGING TRENDS AND CHALLENGES
219
CYBER LAW: EMERGING TRENDS AND CHALLENGES
CONCLUSION
Cybercrime has existed since the dawn of the computer, the
miraculous device that revolutionized human life. These days, we
can't imagine living without our computers. They have been put to
many different uses, ranging from leisure to serious research.
Because of the widespread use and usage of computers, new forms
of technology have emerged. It's hardly an exaggeration to argue
that PCs are what started the IT revolution. That's why secrecy is so
important. India can adapt to modern demands thanks to its cyber
legal framework, however, this structure might need some
improvement. In particular, it is important to improve the supporting
controller's cybersecurity architecture so that it can keep up with the
rapidly developing field of technology. The government of India is
constructing new political institutions to accommodate these shifts
because it recognizes the need of doing so. The flaws in this new
policy framework are tolerated as long as these persistent
development challenges persist. Nevertheless, the objectives show
that India is a potential target for cybercriminals, therefore the
success of these initiatives relies on the agencies' ability to
implement them in a responsible and untainted manner. Although
the USA has several programmes and regulatory organizations in
place to defend cybersecurity, it still lacks essential offenders as
compared to other countries.
In addition, the healthcare, insurance, and business sectors in
each of these nations are underdeveloped. And it's important that
India, like every other country, be quite strict about carrying out
well-specified plans. Under Section 72 of the Information
Technology Act, 2000 in India, fines are imposed for the
220
CYBER LAW: EMERGING TRENDS AND CHALLENGES
221
CYBER LAW: EMERGING TRENDS AND CHALLENGES
CHAPTER 13
INTRODUCTION
223
CYBER LAW: EMERGING TRENDS AND CHALLENGES
le/3541148/the-biggest-data-breaches-in-india.html(visitedon24thFebruary2023)
224
CYBER LAW: EMERGING TRENDS AND CHALLENGES
7 Report of the Joint Committee on the Personal Data Protection Bill, 2019,
(December2021)
225
CYBER LAW: EMERGING TRENDS AND CHALLENGES
226
CYBER LAW: EMERGING TRENDS AND CHALLENGES
227
CYBER LAW: EMERGING TRENDS AND CHALLENGES
11The Draft Digital Personal Data Protection Bill, 2022, Ministry of Electronics and
Information Technology, November 18, 2022.
12Personal Data Protection act 2012,Singapore Statutes Online, 2012
228
CYBER LAW: EMERGING TRENDS AND CHALLENGES
229
CYBER LAW: EMERGING TRENDS AND CHALLENGES
13The Draft Digital Personal Data Protection Bill, 2022, Ministry of Electronics and
Information Technology, November 18, 2022, Clause4(1)
14The Draft Digital Personal Data Protection Bill, 2022, Ministry of Electronics and
230
CYBER LAW: EMERGING TRENDS AND CHALLENGES
231
CYBER LAW: EMERGING TRENDS AND CHALLENGES
232
CYBER LAW: EMERGING TRENDS AND CHALLENGES
options.
• Permitting data transfers: means that India is represented on
a global stage, supporting businesses in managing their
production and supply chains and boosting international
cooperation.
• A brief introduction to "Deemed Consent": The bill's novel
idea of processing solely with the data owner's consent is
essential and innovative, keeping in mind the citizens' basic
rights and privacy.
18GDPR: What Do You Need To Know -AGP& Co, A.G. Paphitis & Co: Cyprus
Lawyers, Cyprus Law Firm, agplaw.com (Last visited on 25thFebruary 2023)
233
CYBER LAW: EMERGING TRENDS AND CHALLENGES
2. Majority age
The age of majority differs significantly between the two acts
in important ways. Children are defined as those under the age of 16
under the GDPR. On the other hand, the 2022 Bill classifies those
who have not yet turned 18 as minors.
234
CYBER LAW: EMERGING TRENDS AND CHALLENGES
c. Consent Managers
Both GDPR and Bill recognizes the consent of individuals as
one of the bases for processing data, but has introduced the novel
concept of‘consent managers.
Consent, which are required to register themselves with the
Data Protection Board, are the data fiduciaries who, on behalf of the
data principals, collect and manage consent provided by them.
Consent managers enable the data principals to give, manage,
withdraw, and review their consent through an accessible,
transparent, and interoperable platform.
235
CYBER LAW: EMERGING TRENDS AND CHALLENGES
g. Penalties
One of the most significant aspects of the Bill is the extremely
severe penalties for non compliance. For instance, in the event of
specific non-compliances, such as those pertaining to the processing
of special categories of personal data, up to € 20 million, or in the
case of an undertaking, up to 4% of the total worldwide annual
revenue of the preceding financial year, whichever is larger. The
GDPR's financial penalties are based on the greater of a dollar
amount cap or a specific proportion of the violating entity's global
revenue. The Bill does not attach financial penalties to precise
percentages of global turnovers; instead, it solely specifies capped
financial penalties. The Bill allows for monetary fines of up to INR
250 crores (about € 29 million), and for serious infractions, fines of
up to INR 500 crores (about € 58 million). Furthermore, unlike the
GDPR, the Bill does not mandate the payment of compensation to
data principals.
236
CYBER LAW: EMERGING TRENDS AND CHALLENGES
20The Draft Digital Personal Data Protection Bill, 2022 , Ministry of Electronics and
Information Technology, November 18,Section 2 (13)
21General Data Protection regulation, 2018, Section.25
237
CYBER LAW: EMERGING TRENDS AND CHALLENGES
238
CYBER LAW: EMERGING TRENDS AND CHALLENGES
of India:
The Bill mandates the establishment of the Data Protection
Board of India, but later rules published by the federal
government would determine the specific membership,
conditions of appointment, and means of removal of its
members. This approach calls into doubt the Board's
independence because these key decisions are left to the
government's discretion. However, other laws in the country,
such as those that control the Telecom Regulatory Authority
of India 25 and the Competition Commission of India,
explicitly mention the specifics of member makeup,
appointment lengths, and firing. These clear guidelines are
meant to protect these regulatory agencies' independence and
guarantee openness. The Data Protection Board's
independence and efficiency as an independent regulatory
body may be questioned because the Bill makes no express
provisions for the Data Protection Board's make-up and
conditions of appointment for both the Indian Competition
Commission 26 and the Telecom Regulatory Authority of
India.
7) Whether the consent is needed where government agencies
provide commercial services?
It is reasonable to question the legality of the Bill's clause
allowing government health agencies and particular
companies like SBI, BSNL, and state discoms to handle data
without individual person authorization. On the one hand,
there may be circumstances where data processing by
government health departments is required for public health
objectives, such as handling health crises or disease
surveillance. Like this, some government organizations, such
as SBI, BSNL, and state discoms, may need access to
personal data in order to provide crucial services to the
general public. The preservation of people's private rights
must be balanced with the legitimate objectives of these
organizations, nevertheless. In order to guarantee that data
processing by these organizations is necessary, reasonable,
239
CYBER LAW: EMERGING TRENDS AND CHALLENGES
CONCLUSION
The 2022 Bill represents a positive step towards data
protection, although its adoption is currently on hold. It strives to
balance various interests such as national security, public order, ease
of doing business, international diplomacy, technology
advancements, and data volumes. The Bill gives optimism for
safeguarding data principals' interests while acknowledging the
difficulties encountered by enterprises. Although there has been a
lot of curiosity, its ultimate shape is yet unknown. Aspects including
geographical and subject-matter application, definitions, extent, and
redressal procedures have been discussed.
However, certain concerns exist. The Bill provides a broader
scope for definitions related to data compared to the GDPR. The
open-ended exception granted to the government, particularly
highlighted during the launch of the Arogya Setu app for tracking
COVID-19 cases, raises concerns about the government's
responsibility in protecting personal information. The Bill may need
to address these shortcomings, as the government is given
considerable freedom to modify definitions and their scope. This
situation raises privacy concerns, especially considering the
government's access to sensitive personal data like fingerprints and
Aadhar card details.
During the formative stages of legislation, the Central
government requires flexibility for navigation. If reservations and
amendments can be seamlessly operationalized in their respective
contexts, the Bill has the potential to become a trailblazer among
global digital personal data protection laws.
240
CYBER LAW: EMERGING TRENDS AND CHALLENGES
CHAPTER 14
INTRODUCTION
Mathura, (India)
241
CYBER LAW: EMERGING TRENDS AND CHALLENGES
3Soshte R.A., A Study of Data Protection and Implications for E-Commerce, Vol. 2
242
CYBER LAW: EMERGING TRENDS AND CHALLENGES
APPLICATION OF E-COMMERCE
The widespread availability of the web has greatly boosted the
acceptance of online shopping. Shoppers can use their own devices
to browse the selection and make purchases from any given store.
The customer's browser and the server hosting the e-commerce site
will communicate back and forth as the order is being placed. The
deal manager, a centrally controlled computer, will receive the order
data. Then, it will be transmitted to the systems of financial
institutions, companies, stock inventories, and retailers making use
of payment processing applications like PayPal. The order manager
will receive a copy of the document. This is done to make sure the
item the consumer wants is in stock and the funds are available in
their account.
When a sale is finalised, the store's web server will be notified
by the transaction manager. After a successful transaction, the
customer will see a confirmation screen. Next, the order manager
will notify the appropriate departments (fulfilment or warehouse)
that the order is ready to be processed and shipped to the customer.
It is now possible to provide a customer with access to a service as
well as physical or digital goods. Internet-based marketplaces like
Amazon which enable sellers to sign up for an account, software as
a service (SAAS) tools that enable customers to "rent" web store
infrastructure, and open-source programmes that organisations run
internally with the help of engineers are some of the technologies
that host e-commerce operations.
243
CYBER LAW: EMERGING TRENDS AND CHALLENGES
TYPES OF E-COMMERCE
Business to Business (B2B)
244
CYBER LAW: EMERGING TRENDS AND CHALLENGES
245
CYBER LAW: EMERGING TRENDS AND CHALLENGES
TRANSFORMATION IN E-COMMERCE
Electronic commerce was born out of a protocol for
exchanging commercial documents like purchase orders and
invoices electronically between businesses. This practice of placing
orders for supplies mostly through telex dates back to the Berlin
blockade and airlift of 1948–1949. Throughout the succeeding
decades, other sectors refined that framework, culminating in 1975's
publication of the first universal standard. The resulting electronic
data exchange (EDI) standard is adaptable enough to support the
majority of straightforward electronic business operations. 7 The
earliest EC applications were developed as a result of innovations
from the early 1970s such electronic funds transfer (EFT), which
enabled money to be transferred digitally from one organization to
another. However, only major firms, financial institutions, and a few
other bold businesses used these applications. Then, everyday
papers could be transferred electronically thanks to the development
of electronic data interchange (EDI), which broadened the usage of
electronic transfers beyond financial transactions. Financial
institutions, as well as other types of manufacturers, retailers, and
service providers, were added to the list of collaborating
corporations by EDI. Interor ganizational system (IOS) applications
were the name of these systems and their strategic importance to
organization is well acknowledged. The next wave of new EC
applications included anything from stock trading to reservations for
travel. The U.S. government launched the Internet as an experiment
in 1969, and the majority of its early users were government
organization, academic researchers, and scientists. The term
"electronic commerce" was first used in the early 1990s, when the
Internet started to be used for business purposes and users flocked to
use the World Wide Web. Applications for EC grew quickly. There
246
CYBER LAW: EMERGING TRENDS AND CHALLENGES
247
CYBER LAW: EMERGING TRENDS AND CHALLENGES
9Chawla N., Kumar B., E-Commerce and Consumer Protection in India; The emerging
Trend, Journal of Business Ethics, United Kingdom, 2021.
248
CYBER LAW: EMERGING TRENDS AND CHALLENGES
has been in operation since 2002, and its members come from
consumer protection agencies in 64 countries (with India joining in
2019) with an additional 6 agencies serving as observers
(COMESA, EU, GPEN, FIAGC, OECD and UNCTAD). Its focus is
on consumer protection rather than financial services or product
safety regulation, and it works to disseminate information about
customer protection trends and exchange successful approaches to
enforcement agencies. Jointly led by the Federal Trade Commission
(FTC) and the International Center for Projects in Electronic
Commerce (ICPEN), the econsumer.gov programme addresses
cross-border cybercrime. Econsumer.gov is an international
organisation comprised of customer protection authorities from 41
different nations deals with following online frauds:
• Online shopping/internet services/computer equipment
• Credit and debit
• Telemarketing & spam
• Employement & money making
• Imposters scam: family, friend, government, business or
romance
• Lottery or sweepstake or prize scams
• Travel & holidays
• Telephones/Phone devices & Mobile services
• Another thing.10
Identity and financial data are prime targets for
cybercriminals. Scammers frequently target those who purchase,
sell, and trade goods and services online, which creates problems
for the industry as a whole. According to econsumer.gov data on
international online fraud complaints (Table 1), overseas frauds are
on the rise. By June 30th of this year, there were a total of 33,968
international allegations of fraud, totaling a reported loss of
US$91.95 million, down from 40,432 cases, totaling a loss of
US$151.3 million, and 14,797 grievances, totaling a loss of
US$40.83 million, five years earlier. Online shoppers frequently
experience problems such as fraud, incorrect product descriptions,
shipping delays, and refund requests. Based on the location of both
consumers and businesses, Figure 1 reveals that the United States
has the highest number of reported cases of online fraud. India
10Ibid
249
CYBER LAW: EMERGING TRENDS AND CHALLENGES
The claimed lost amount is larger than 60%, making the trend
a huge global issue. This essay examines consumer protection in e-
business in the context of India, inspired by the worldwide
landscape and viewpoints on it. This is due to the fact that India has
become a global leader in instances of online consumer fraud,
raising awareness of electronic governance systems that may have
an impact on the ease of doing business in the nation. In an effort to
prevent fraud and safeguard customers making online purchases, the
Act of 2019 and the E-Commerce Rule of 2020 have replaced the
Consumer Protection Act of 1986.
250
CYBER LAW: EMERGING TRENDS AND CHALLENGES
GROWTH OF E-COMMERCE
Despite the widespread belief that the advent of the internet in
1991 was responsible for the explosion of e-commerce, the concept
actually originated during the Berlin Blockade (24 June 1948-12
May 1949), when goods were ordered and airlifted via telex. Since
then, technological advances, the increased internet accessibility,
and widespread customer and business acceptance have all helped e-
commerce flourish and grow. The Boston Computer Exchange,
which launched its first e-commerce platform in 1982, handled the
first online transaction.11 Internet adoption is directly related to the
growth potential of e-commerce. E-commerce has mostly expanded
as a result of the rise in mobile device and smartphone usage around
the world. People are more adaptable and passive when purchasing
and selling online thanks to mobile devices. 12 The historically
sluggish B2B industry is under pressure due to the expansion of the
millennial generation's digitally savvy workforce, the widespread
use of mobile devices, and ongoing e-commerce technology
optimisation.13 The ideal storm fueling the expansion of business-to-
consumer enterprises is set to hit the roughly $1 billion B2B e-
commerce sector. Since then, however, e-commerce has
revolutionized the retail industry around the world. Due to reasons
like the increasing spending power of customers throughout the
world, the constantly growing number of social media users, and the
constantly improving quality of infrastructure and technology, the
future of e-commerce appears more competitive than it has in the
past.
Buying online continues to be highly valued by consumers as
evidenced by the e-commerce expansion trend since 2015. With
more and more consumers taking advantage of buy-online-return-
local initiatives, internet merchants will increase their footprint.
There has been a global increase in e-commerce of 15% between
2014 and 2020, and this is expected to increase to 25% between
2020 and 2025. An even deeper dive into the e-commerce market
indicates that by 2020, over 60% of the population will have access
11Azamat N., Rashad Y., Shahriar M., Behrang S., & Menon M., The evolution and
development of E-commerce market and E-cash, SSRN Electronic Journal, 2011.
12Harrisson B., Jean P., & Dahl B., 10 E-COMMERCE TRENDS FOR 2018 Project:
251
CYBER LAW: EMERGING TRENDS AND CHALLENGES
to the internet, and that roughly 42% of the population now has a
smartphone. Thirdly, those between the ages of 25 and 34 make up
31% of the user population, followed by 24% of those between the
ages of 35 and 44, and then 22% of those between the ages of 18
and 24. Because of the extensive infrastructure and networking in
the Asia-Pacific area, it accounts for more than 70 percent of
worldwide e-commerce.14
At US$740 billion, China is by far the largest contributor, but
the US contributes more than US $560 billion. Consumers in all
regions are looking beyond their boundaries, as seen by the
prevalence of cross-border internet purchases (Fig. 2). By July of
2020, 90% of shoppers will have visited an online store, 74% will
have made a purchase, and 52% will have done so through a mobile
device.
A lot of money may be made from the surge in online
shopping happening in Asia and the Pacific. The region dominates
the global business-to-consumer online market (UNCTAD, 2017).
By 2015, e-commerce accounted for 4.5 percent of the regional
GDP. To compete on a global scale, even small and medium-sized
businesses need access to worldwide markets, and e-commerce
provides that access. It has increased inclusivity across
demographic, economic, geographical, cultural, and linguistic lines
while also boosting economic efficiency in developing economies
and least developed countries. It's a positive step toward bridging
the gap between rural and urban areas.
14Supranoteat 6
252
CYBER LAW: EMERGING TRENDS AND CHALLENGES
CYBER CRIME
The debate over whether cybercrimes need for new legislation
or whether the existing legal system is flexible enough to deal with
this new type of criminality effectively has started. According to
one school of thought, the only difference between cyber crimes and
regular crimes like trespassing, theft, and conspiracy is that a
computer has been employed as a tool or media for the conduct of
the crime.15 The opposing school of thinking places more emphasis
on the fact that emerging technologies bring with them unique
problems that are not addressed by existing criminal legislation.
These include the nature and breadth of cybercrime, the motivations
of those who commit it, the difficulty of identifying the perpetrator,
and the jurisdiction and enforcement issues that arise because of
these factors. It argues that existing laws are inadequate and that
new, sweeping legislation is required to address cybercrime.
Countries that are serious about stopping cybercrime typically use a
two-pronged approach, viewing cybercrime as both a new form of
15Watkins, Computer Crime: Separating the Myth from Reality, C.A. Magazine, Jan
1981.
253
CYBER LAW: EMERGING TRENDS AND CHALLENGES
16Lewis P.H., Losses from Computer Breaches are on the rise, a study finds, New York
Times, November 20, 1993
17David Teather Pirates Sink Music Firms, Hindustan Times, April 21, 2001.
254
CYBER LAW: EMERGING TRENDS AND CHALLENGES
computer crime? Both the Indian penal code and the Information
Technology Act fail to provide a definition. Recent changes to
India's penal code have made it illegal to commit certain acts
without specifically naming them as cybercrimes. However, there
has been a lot of trouble elsewhere trying to define computer crime
because people don't agree on how broad or narrow the definition
should be. To further confuse, the terms "cyber crimes" and
"computer misuse" are frequently interchanged when referring to a
wide range of illegal behaviours computer related, yet there is no
universally accepted definition for either term. Cracking accessing
computers, corrupting data, distributing passwords and other
hacking tools, making and selling illegal copies of software, and
transmitting pornographic materials over the internet are all
examples of such activities. The term computer “ is invariably used
with computer misuse”, “IT crime” or “cyber crime”. This is the
reason why the current trend is to incorporate computer-related
crime in place of the phrase "computer crime".18
255
CYBER LAW: EMERGING TRENDS AND CHALLENGES
21Mathur, S. K., Indian Information Technology Industry: Past, Present and Future A
Tool for National Development, Journal of Theoretical and Applied Information
Technology, 2006, http://perso.univrennes1.fr/eric.darmon/floss/papers/MATHUR.
22Dubey A., Cyber Law and Terrorism, Souvenir, National Conference on Cyber Laws
256
CYBER LAW: EMERGING TRENDS AND CHALLENGES
Internet Crime
The group of offences that misuse online infrastructure is
included in the category of internet crimes. Which are:
1. Hacking.
a. Information theft
b. Password theft.
c. Credit card data theft.
2. The beginning of harmful programming.
257
CYBER LAW: EMERGING TRENDS AND CHALLENGES
3. Espionage.
4. Spamming.
23 Ahmad F., Cyber Law in India (Law on Internet), New Era Law Publication,
Faridabad, 2011, pp 307-309.
258
CYBER LAW: EMERGING TRENDS AND CHALLENGES
24Ibid pp 309-310
259
CYBER LAW: EMERGING TRENDS AND CHALLENGES
UNAUTHORIZED ACCESS
An individual can be sued for up to one lakh crore in penalties
if they use or gain access to a personal computer, computer
programme, or network node without the owner's or the individual
in charge's consent.
Computer refers to any high-speed information processing
gadget or system that uses electronic, magnetised, or optical
impulses to manipulate data. It also includes all input, output,
processing, storage, computer software, and communication
facilities that are linked to the computer as part of a computing
260
CYBER LAW: EMERGING TRENDS AND CHALLENGES
261
CYBER LAW: EMERGING TRENDS AND CHALLENGES
Identity Theft
The crime currently is the theft of any part of a person's
identity that is closely linked to that individual. Use of another
person's electronic signature, password, or other kind of unique
identity to impersonate that person is also included. However, it is
essential that the person who is accused of using an electronic
signature, a username and password or unique identity feature did so
262
CYBER LAW: EMERGING TRENDS AND CHALLENGES
Violation of Privacy
The amendment act of 2008 created the crime of privacy
breach. Whoever violates another person's privacy by purposefully
or knowingly taking, publishing, or transmitting a picture of a
private area of that person—either with or without that person's
consent—shall be punished with up to three years in prison, a fine
of no more than 2 lakh rupees, or both.30
This section holds anyone person accountable for invading
privacy if he conducts any of the acts listed in that provision
willingly or knowingly, implying that the mental aspect is critical in
assessing the accused's responsibility. The conduct of this offence
necessitates a specific mental condition.
Under this rule, a person is accountable if he just obtains an
image of the victim's private location without advertising or
transferring it. He will also be held accountable under the IT act,
regardless of the device he used to capture or transmit the image.
In order to clarify the expression used in the provision, a
thorough explanation is supplied alongside it. The verb "transmit"
refers to sending a visual image electrically with the intention that it
be viewed by the intended recipient or recipients. 31 "Capture" refers
to the act of taking a picture, videotaping something, or making any
other kind of recording of an image.32 The term "private area" refers
to the female breast, buttocks, or public area that is not covered by
clothing. 33 "Publisher" refers to a person who makes anything
available to the public by reproducing it in printed or electronic
form. 34
263
CYBER LAW: EMERGING TRENDS AND CHALLENGES
Internet Fraud
Although the term "internet fraud" is very broad, the IT Act
does not contain a specific definition of it. This phrase may also
refer to other offences that are specifically mentioned in the IT Act.
The types of online scams vary, making it difficult to maintain a
classification system for them. 36 Fraud involving credit cards has
reached hazardous levels all around the globe. Unsent and
undervalued services, damaged, faulty, misleading or undelivered
commodities, auction sales, pyramid schemes, and fraudulent
marketing of goods are the ten most widespread frauds recorded in
the United States, with fraud involving credit cards being the most
frequent.
In F.T.C v Crang Lee Hare, 37 the defendant engaged in
dishonest business practises. He set up a fake online auction for the
selling of never-delivered computer items. The defendant admitted
to wire fraud and was given a sentence of three years of probation,
six months of home detention, and a $22,000 fine. Additionally, he
was permanently prohibited from engaging in online business.
264
CYBER LAW: EMERGING TRENDS AND CHALLENGES
CONCLUSION
By the end of this year, India is expected to surpass the US as
the second-largest Internet market in the world with 500 million
users online, helped by a rapid increase in Internet usage on mobile
devices.39 In the current context, information technology is rapidly
increasing, as are cyber crimes. We are completely lopsided since,
with the speed of technology, our rules are ineffective, thus we
require such a law that will fight cybercrime while also protecting
consumers' privacy rights.
The current issue is that privacy abuse persists on a large and
persistent scale despite the presence of the statutory framework and
the efforts of national and international data protection agencies and
organisations since the current laws wouldn't be capable to enforce
them effectively.40 We can cite other explanations, such as how the
internet has expanded purchasing parity in recent years. Many
consumers do not want to bear more burdens because, nowadays, if
a consumer purchases products from the internet, the goods will be
delivered to his door the next day, saving the consumer time and
energy. On the one hand, this method has brought additional
benefits, but on the other hand, without the consumers' awareness,
their information is transferred and misused by different companies
or inside the companies.
Personal information is in danger. In recent years, the
majority of governments around the world have come to understand
that the issue of privacy violations affects every nation, not just one.
It decides that international acceptance of privacy violation shall be
265
CYBER LAW: EMERGING TRENDS AND CHALLENGES
266
CYBER LAW: EMERGING TRENDS AND CHALLENGES
CHAPTER 15
INTRODUCTION
267
CYBER LAW: EMERGING TRENDS AND CHALLENGES
than there are now, and the majority were exposed to infections.
While in doubt, viruses were distributed through Internet
connections when they were made available. As social media
became more popular in the early 2000s, cybercrime became
rampant. The increase in individuals throwing all the information
they could into a profile folder tends to lead to an increase in
personal information and the emergence of ID fraud. Thieves have
used this information to set up bank accounts, acquire credit cards,
and get involved in other forms of financial fraud The formation of
an annual multinational criminal organisation of about $500 billion
dollars is the new trend. The criminals operate within gangs, using
well-honed strategies, and targeting everyone as well as everything
has an internet existence.3
Technology is booming and fresh, making cybercrime more
difficult to detect in the past few years, 689 million people across 21
countries have encountered cyberattack in their day to day lives. It
has spread to the point that many individuals are equally worried
about online and offline hazards. The majority of individuals think
that being safe online has been harder over the previous five years
than it has in the "real world." Indians are quickly overtaking other
countries as the top users of several mobile apps and websites. It is
reportedly more difficult to maintain security, according to several
security service companies. Therefore, it is very advantageous for
cybercriminals to attack online using fake apps that are posted to the
Android Market.
As banking becomes a progressively usage of portable
gadgets is essential., hackers had already started incorporating
greater sophistication features in their own internet banking
malware. "By remaining unrecognized, they obtain much more than
just credit card information and bypass security mechanisms," says
Nilesh Jain, Trend Micro's vice president for Southeast Asia and
India. One of the most famous cases of cybercrime in the virtual
world is the "Blue Whale Challenges Game", invented by 21-year-
old Russian Phillip Bedecking and started to be played by young
people in the virtual world, which took approx. 130 lives worldwide
between 2015 and 2016. Location monitoring is required by 46% of
the top Android applications and 25% of the top iOS apps,
3Grove, G. D., Goodman, S. E., & Lukasik, S. J. Cyber-attacks and. Survival, Vol. 42,
Issue 3, 2000, pp.89-103.
268
CYBER LAW: EMERGING TRENDS AND CHALLENGES
4 Marvin, C. (1988). When old technologies were new: Thinking about electric
communication in the late nineteenth century, 1988, Vol.4, Issue 1, pp.88-97
5 Chaubey R.K., Cyber Crime and Cyber Law, Kolkata: Kamal Law House, 2008,
pp712 to 714.
6The Information and Technology Act, 2000.
269
CYBER LAW: EMERGING TRENDS AND CHALLENGES
270
CYBER LAW: EMERGING TRENDS AND CHALLENGES
B. Cyber Terrorism
Terrorist groups have made it apparent that they would carry
out significant assaults if they can, and they are enthused about the
concept of cyberterrorism and cyberwarfare. Although many
terrorist groups lack the resources to plan significant hackers-
terrorist attacks, they have made efforts to develop the technical
know-how necessary to carry out devastating attacks.8
D. Online Bullying
Online harrying has become a serious threat to many people's
safety and wellbeing as a result of the Internet's widespread use in
daily life. Threatening emails, verbal or physical violence, or
disclosing information online, these are all examples of online
harassment. Online harassment can also take place when someone
sends threatening messages via a phone or computer, sometimes
under an assumed identity.
sensible path forward)", IEEE Potentials, vol. 36, no. 6, pp 28-31, 2017
271
CYBER LAW: EMERGING TRENDS AND CHALLENGES
E. Targeting a computer
A criminal behaviour involving networks, computers, and
other networked devices is called cybercrime. To do this, computers
are infected containing computer viruses, which then propagate to
servers, networks, and more computer systems inside a network.
When computing is the principal goal of an illegal act, it usually
refers to a network or computer. Computers are considered targets
of DDoS assaults and viruses.
G. Cyber Staking
Someone who is a target is stalked or tormented online; this is
referred to as cyberstalking. It might be seen as a development from
online bullying as well as stalking in person. However, it typically
manifests as persistent, deliberate, and systematic texting, emailing,
postings on social media, and other kinds of communication.
Sometimes interactions that at first glance seem innocent
develop into obtrusive or terrifying cyberstalking. Although some
people find the initial stages of cyberstalking amusing and harmless,
it loses its amusement value when interactions continue despite the
target's indications of annoyance and requests that they stop.9
Cyberstalks employ a range of strategies and methods to
degrade, harass, dominate, as well as intimidate their victims. Many
272
CYBER LAW: EMERGING TRENDS AND CHALLENGES
YEARS CRIMES
1962 The current era of cybercrime began when Allen
Scherr launched a cyber-attack against the MIT
computer networks, stealing login and credential
from their database mostly using punch cards.
10Paul,
P. K., & Aithal, P. S., “Cyber Crime : Challenges, Issues, Recommendation and
Suggestion in Indian Context”, International Journal of Advanced Trends in
Engineering and Technology (IJATET), Vol 3, Issue 1,2018, pp.59–62, ISSN : 2456 -
4664
273
CYBER LAW: EMERGING TRENDS AND CHALLENGES
YEARS CRIMES
1971 The first ever computer virus was generated by Bob
Thomas, the founder of BBN Technologies for
research reasons. The Creeper Virus, a self-
replicating code that foresaw the potential for viruses
to cause serious harm to computer networks, was
found on the ARPANET in 1971.
1981 After successfully breaking into AT&T's internal
systems and causing havoc by altering the clocks on
their computers, Ian Murphy turned the first person
to be found guilty of a cybercrime.
1988 altering the clocks on AT&T's computers by
breaking into their internal systems and wreaking
mayhem.
11Survive and Thrive: A Stochastic Game for DDoS Attacks in Bitcoin Mining Pools,
available at 10.1109/TNET.2020.2973410. (Visited on November 5, 2022).
274
CYBER LAW: EMERGING TRENDS AND CHALLENGES
12A.J. Burns, M.E. Johnson, D.D. Caputo, “Spear phishing in a barrel: Insights from a
targeted phishing campaign”, Research Gate, Journal of Organizational Computing
and Electronic Commerce 29(1):24-39.
275
CYBER LAW: EMERGING TRENDS AND CHALLENGES
14Ibid
276
CYBER LAW: EMERGING TRENDS AND CHALLENGES
evolved as a result of the ongoing need for data security, with the
primary objective of identifying vulnerabilities before they are
maliciously exploited.
The diversification and heightened complexity of
cyberthreatss, as well as how they are used in When it comes to
defending against attacks, organisations are put in a difficult
position.
277
CYBER LAW: EMERGING TRENDS AND CHALLENGES
storage, and code repositories, which was even more extensive than
the breach at Rockstar
Cybercrime is a lucrative business. This world of hackers,
malware, and brokers is now a trillion-dollar industry, the world's
number one threat, and shows no signs of slowing down.
More avenues for threat actors to exploit have opened up as a
result of the digital revolution, the global shift to a hybrid work
model, and the rapid adoption of the cloud. And their attack
methods are evolving, with new innovations keeping them one step
ahead of a cybersecurity industry determined to stop them.15
A ransomware attack is launched every 11 seconds in this day
and age. It's a battle. And it's being fought all over the world, 24
hours a day, seven days a week. But it's difficult to fight someone
you can't see, hear, or understand.
15 O.E. Omolara, A.I. Oludare, S.E. Abdulahi, Developing a modified hybrid caesar
cipher and vigenere cipher for secure data communication , Comp. Eng. Intelligent
Syst., Vol5, Issue 5, 2014 , pp. 34-46, ISSN 2222-2863.
16Supranote at 12
278
CYBER LAW: EMERGING TRENDS AND CHALLENGES
279
CYBER LAW: EMERGING TRENDS AND CHALLENGES
4. Hacking N 80 80 10 20 10
% (40) (40) (5) (10) (5)
• Intentional N 60 80 40 10 10
5. damage % (30) (40) (20) (5) (5)
280
CYBER LAW: EMERGING TRENDS AND CHALLENGES
17 Alalwan J. A., “Fear of cybercrime and the compliance with information security
policies: A theoretical study”, ACM International Conference Proceeding Series,
2008, pp.85–87.
281
CYBER LAW: EMERGING TRENDS AND CHALLENGES
282
CYBER LAW: EMERGING TRENDS AND CHALLENGES
283
CYBER LAW: EMERGING TRENDS AND CHALLENGES
284
CYBER LAW: EMERGING TRENDS AND CHALLENGES
lessen the chance that hackers may utilise useless software to steal
or destroy your data, remove it.
Putting in a Firewall
Placing your network behind a firewall is one of the finest
ways to defend yourself from a cyberattack. Before they even begin,
a firewall system can help stop brute force attacks on your network
or systems. have a chance to cause any harm.
285
CYBER LAW: EMERGING TRENDS AND CHALLENGES
CONCLUSION
Cybercrime is a criminal offence. It is harmful to the larger
community. Many parties objected and criticised cybercriminals'
conduct. The advent of cybercrime has prompted the introduction
and modification of legislation to anticipate and counteract these
behaviours. The legislation is incapable of appropriately regulating
internet users. The legislation only applies to cybercriminals and not
to internet users. Users that wished to experiment with a system or
social media were the origins of cybercrime. They eventually
became specialists in the industry and were interested in
cybercrime. To tackle cybercrime, the government can work with
other agencies. The statistics indicate that cybercrime will not cease
and will continue to rise in tandem with the increase in irresponsible
parties.
Cybercriminals are extending their reach over the network,
incurring consumers and millions of dollars to organisations.
Anyone who uses ought to exercise extreme caution when visiting
the web and follow all security instructions. With more advanced
tactics and tools, the future of cybercrime is bleak. Organizations
should employ every available safeguard against cybercriminals and
hackers. Everyone must endeavour to defend oneself against
cybercrime by using anti-virus software, firewalls, biometrics,
updated software versions, and so on. Countries and international
286
CYBER LAW: EMERGING TRENDS AND CHALLENGES
287
CYBER LAW: EMERGING TRENDS AND CHALLENGES
CHAPTER 16
288
CYBER LAW: EMERGING TRENDS AND CHALLENGES
INTRODUCTION
3 Bajema K.L. , “Persons evaluated for 2019 novel coronavirus— United States, ,”
Morb. Mortal. Wkly. Rep., 69(6), 2020, pp. 166-170, January 2020.
289
CYBER LAW: EMERGING TRENDS AND CHALLENGES
290
CYBER LAW: EMERGING TRENDS AND CHALLENGES
BACKGROUND
Even in ordinary circumstances, internet crimes such as scams
provide more rewards with minimal threat right away to the
attackers. More of them are unemployed, they devote a greater
amount of time indoors, and they use the internet for both job
searching and interacting with others. In an effort to attract or keep
consumers, both the government and other enterprises have
provided incentives to assist people with financial issues. Any
information regarding "COVID-19" will be of interest to internet
users while the world waits for a viable cure to halt the disease's
spread. Scammers utilize this method to send those targeted
malware phishing assaults while pretending to be government
agencies, tax authorities, or other organizations, and they do so by
include links pleading for help with COVID-19.
The World Economic Forum (WEF) underlined in its report
that even when diseases have vanished, hacking and phishing have
become the new standard. 5 Since particularly endangered
individuals are more worried and expecting text messages, emails,
phone calls etc. on COVID-19 from the government, these scams
are much more successful now during the pandemic. It becomes
increasingly easier for hackers to construct fictitious
communications or websites that imitate the look of pertinent and
4 Ibid
5 Ibid
291
CYBER LAW: EMERGING TRENDS AND CHALLENGES
6Understanding and dealing with phishing during the COVID-19 pandemic, available
athttps://www.enisa.europa.eu/news/enisa-news/understanding-and-dealing-with-phis
hing-during-the-covid-19-pandemic. (Visited on January 4, 2023).
292
CYBER LAW: EMERGING TRENDS AND CHALLENGES
7 Wang L., Alexander Ann C.,Cyber security during the Covid-19 pandemic, AIMS
Electronics and Electrical Engineering,5(2), USA,2021, pp.146-157 DOI:10.3934/
electreng.2021008.
8Mastaneh Z, MouseliA. ,Technology and its Solutions in the Era of COVID-19 Crisis:
293
CYBER LAW: EMERGING TRENDS AND CHALLENGES
294
CYBER LAW: EMERGING TRENDS AND CHALLENGES
295
CYBER LAW: EMERGING TRENDS AND CHALLENGES
2) Healthcare Sector
Modern medical organizations are built on ICT programs that
provide a wide range of medical services to their clients, which may
involve medical professionals, pharmacists, nurses, and clients. This
concept of online healthcare is used to describe these services. They
were among the most vulnerable and specifically attacked systems
in the latest pandemic a catastrophe. A poor circumstance might
result from anything that goes wrong, such as the loss of a valued
human life. The challenge now being experienced by medical
facilities, where personnel and assets have become exceedingly thin
in reaction to the new corona virus, is likely to be exacerbated by
Detection and Prevention Mechanism,” EAI Endorsed Trans. Energy Web, 7(26),
2020,DOI: https://doi.org/10.4108/eai.13-7-2018.162691
14 O.E. Omolara, A.I. Oludare, S.E. Abdulahi, Developing a modified hybrid caesar
cipher and vigenere cipher for secure data communication, Comp. Eng. Intelligent
Syst., 5 (5), 2014 , pp. 34-46, ISSN 2222-2863.
296
CYBER LAW: EMERGING TRENDS AND CHALLENGES
3) Education Sector
The COVID-19 crisis' sudden transition had a profound
impact on educational institutions. Regardless of level, the majority
of today's students rely on online education, which puts them at
danger for cybercrime. Additionally, Zoom is used by most
educational organizations to facilitate online learning. However, as
a result of the attack, certain educational institutions in California
were forced to temporarily halt their curricular activities. WebEx,
Zoom, Google Classroom, Ultra Collaborative, Skye, Blackboard
Learn, GoToMeeting, Monitor Lockdown Browser, and Responds
are a few notable examples of software used to deliver lectures.
Using social media platforms like Facebook, YouTube, WhatsApp,
and others that provide online services, both academic and non-
academic employees as well as learners often engage with one
another. During COVID-19, different avenues were utilized for
fostering education. Due to this, during the crisis, expert-led online
https://www.who.int/news/item/23-04-2020-who-reports-fivefold-increase-in-cyber-
attacks-urges-vigilance. (Visited on February 27, 2023).
16 Cyber-Attack Hits U.S. Health Agency Amid Covid-19 Outbreak available at,
https://www.bloomberg.com/news/articles/2020-03-16/u-s-health-agency-suffers-
cyber-attack-during-covid-19-response?leadSource=uverify%20wall. (Visited on
March 6, 2023).
297
CYBER LAW: EMERGING TRENDS AND CHALLENGES
4) Defence Sector
A computer's Master Boot Record (MBR) has been known to
be overwritten by malware with corona virus themes, making the
system unbootable. Another malicious HTA file (HTML executable
file) has been discovered that has the words "Coronavirus Installer"
in its description with Coronavirus themes used the Covid-19 issue
and lock downs regulation as a trap. It most is most certainly a
product of the infamous SideWinder gang, which has a history of
assaulting military targets. A window that opens a Pdfs temptation
containing headlines that are clickable and pictures of the Pakistani
army is present in this HTA file. CEOs and upper management of
energy companies are particularly susceptible to security and cyber
risks. When workers access crucial manufacturing facilities and
utility networks from their homes, rolling power outages, safety
issues, and second-wave crises are all exacerbated. When keeping
the lights or electricity on, rolling power outages and safety events
coincide, which raises the risk of a second-wave crisis when
employees utilize their residences to get to vital production facilities
and grid systems. Attackers will profit from the sudden access to
remote mechanisms, overcrowded facilities, and creative working
techniques.
5) Power Industry
The energy sector concentrates on ways to protect individuals
and keep the lights on for consumers during emergencies like
COVID-19. Utility firms prioritize remote work above all else, yet
this puts the energy sector at risk from both inside and outside of its
cyber defenses. Since lives are at stake, energy firms must both
safeguard their pe-Ronnell and assiduously prevent disruptions.
Because of remote working, energy companies are now subject to
new cyber-risks. Attackers will search for fresh infrastructural flaws
in an energy source to take advantage of. Utility workflows for
power generation are fundamentally altering, and cybersecurity
strategies and organizational frameworks will need to be changed as
well.
298
CYBER LAW: EMERGING TRENDS AND CHALLENGES
6) Manufacturing Sector
If those in the manufacturing industries believed they were
safe from cyber-attacks, that view is rapidly being disproved,
especially in 2020. More people become aware of Industry 4.0 and
the growth of cybercrime in 2017 and 2018. But many businesses in
the industry were utterly ignorant of the dangers. The industrial
sector was the ninth most frequently targeted by cybercriminals by
2019. The issue was made worse in 2020 when a number of
institutions were forced to depend upon almost on remote workers
as a result of the pandemic limitations. Cyber attackers were ready
for COVID-19's impact, but the majority of people were not. In
terms of cyber-attacks, the industrial sector has dropped from eighth
to second place. It is crucial to keep an eye for potential
irregularities in the network environment of the firm in order to
avoid cyberattacks. During the aftermath of COVID-19, it is
impossible to take some security measures when working from
home. For instance, instructions from outside the business were both
legal and erroneous it is challenging to determine who they are and
what they want. Monitoring is therefore considerably more crucial
to distinguish between attackers and workers.
7) Technological Sector
The largest theft of information in history occurred between
2020 and 2021. Businesses in the information technology sector,
such as Google, Twitter, Zoom, Amazon, Finastra, CD Project Red,
Solar Wind supply chain, etc., suffered serious losses as a result of
these breaches. Google claimed on the Chrome update page that it is
cognizant of attacks for two weaknesses, CVE-CVE-2021-38003
and 2021-38000.
Users of Chrome should upgrade their browsers because these
problems have been fixed. Google announced the modification,
saying, "The Fixed line was recently updated to 95.0." Several
trustworthy Twitter accounts were taken over and used to spread
false information about Bitcoin. The accounts requested Bitcoin
payments from their followers in return for a double reward. The
tweets only circulated for a short while, yet they generated more
than $1 million in Bitcoin. Those who sent Bitcoin after being
duped received nothing in return.
Due to the rapid rise in people working from home brought on
by COVID-19, Zoom transformed itself from a previously obscure
299
CYBER LAW: EMERGING TRENDS AND CHALLENGES
exclusive company into one of the most widely recognized and used
video and audio communication platforms almost overnight.
Between the first and subsequent quarters of 2019 and 2020, the
revenue increased 3.55 times. Due to its quick expansion, Zoom ran
into a number of security difficulties, the most serious of which was
the acquisition of over five hundred thousand account users on an
unauthorized internet forum. Credential stuffing, or utilizing
previously disclosed usernames and passwords to access accounts,
is what's thought to have happened. The largest cyberattack in 2020
targeted the Solar Wind supply chain, which also included well-
known commercial companies including Microsoft, as well as
FireEye and Cisco, and NVidia. A major DDoS attack was also
launched on Amazon by the attackers.
8) Commerce Sector
Between the years the initial and subsequent quarters of the
year 2020, the amount of online shopping overall the retail industry
in the US raised carefully via 9.6% to 11.8% or from nine percent to
eleven percent, yet during the initial and next quarters of 2020, it
raised to 16.1%. Electronic commerce is currently the preferred
method of making purchases of goods and services. Similar patterns
have been seen in the UK, where e-commerce's share of retail
increased from seventeen percent to 20.3% during the initial and
subsequent quarters of 2018 and 2020 before significantly
increasing to 31.3 per cent between those same quarters. Similar
trends have been seen in other nations, including the Communist
Party of China, where online retail sales as a percentage of total net
retail sales jumped from 19.4% in the month of August 2019 to
17.3% in August 2018, and then to 24.6% of those between January
to August 2020.
300
CYBER LAW: EMERGING TRENDS AND CHALLENGES
1) Hacking
Scammers targeting clients on online networks, including
those linked to gadgets, laptops, tablets, and phones, launched an
assault on them. This results in the theft of private data like
usernames, passwords, bank information, and other personal details.
The data was stolen by certain attackers, who used it to drain money
from accounts. Bank loan scams also grew swiftly during the
COVID-19 crisis since many of them focused on obtaining people's
cash and private details through online shopping. The pandemic
caused a 42 percent increase in fraud cases from 2019 to 2020 as
fraudsters benefited from the closing a number of physical stores.
Several bank customers asserted that they received SMS texts
instructing them to organize an online product delivery. Others
completed. When other people entered out their financial details at
the same time, their accounts were compromised. Two Indonesian
perpetrators were taken into custody in the month of April, 2021, as
reported by CBS News, for a $60 million scam. The two suspects
were captured in Surabaya, Indonesia's second-largest city, as a
result of a tip from US investigators.17
2) Phishing
Cybercriminals trick their victim into divulging their bank
information, system login passwords, and other personal
information by sending them false messages. Phishing is a popular
technique for exploiting social engineering flaws to obtain sensitive
information from users, such as passwords, usernames, and login
credentials for online banking, companies, and organizations. The
easiest way for attackers to infect an electronic gadget with malware
is still through phishing. Phishing aims to fool users towards
opening emails or tapping on links that look to be from reliable
sources or respectable companies. The link may send individuals to
a harmful website that installs malware on their computers directly
or to a fake website that demands personal information. As a result,
17 Indonesia arrests hackers over $60 million U.S. COVID-19 scam available at,
https://www.cbsnews.com/news/us-covid-relief-hacking-hackers-arrested-indonesia-
aid-program-scam/. (Visited on March 9, 2023).
301
CYBER LAW: EMERGING TRENDS AND CHALLENGES
if you are unsure about a link, you shouldn't click it. Hackers sent
numerous phishing emails to individuals by taking advantage of the
widespread lockdown brought on by the Corona virus.
False websites that can gather a user's personal information
are included in phishing emails. They are susceptible to phishing
assaults since most people increasingly depend on internet to assist
them with the pandemic. 9,116 fraudulent emails pertaining to
COVID-19 were among the 4,67,825 fraudulent emails that were
sent in March 2020, amounting approximately just under two
percent of all phishing messages.18 Although an extensive amount of
fraudulent and smishing incidents happened during the outbreak, the
quantity of suspected email attacks that have been recorded provides
a glimpse into the United Kingdom's (UK) concerns with
cybercrime incidence.
Smishing is a kind of fraud in which victims are persuaded to
provide sensitive information such as debit and credit card numbers,
login details, and passwords via SMS messages that appear to be
from reputable and dependable sources. By the start of May,
specifically on May 7, 2020, nearly 160,000 cautious email
incidents were being disclosed to the National Cyber Security
Centre (NCSC), and by the end of May, specifically on May 29,
2020, approximately £4.6 million was lost to COVID-19-related
frauds, with approximately 11,206 those targeted of fraudulent
and/or smishing advertisements. In reaction, 471 illegal web stores
were shut down by the NCSC and Her Majesty's Revenue and
Customs (HMRC). additionally, 292 forged websites. Offenders
utilize smishing and vishing, two types of online fraud, to trick
consumers into giving them cash or private data. False SMS
messages are used in smishing, whereas telephone conversations are
used in vishing.
3) Ransomware
Ransomware is destructive software that prohibits clients
from using their computers until they pay a fee, and it is produced
by criminals. Ransomware assaults increased during the outbreak as
more people took remote jobs. Ransomware is growing and getting
increasingly complicated. In alongside encoding, additional
18Naidoo R., European Journal of Information Systems, 29(3), Taylor and Francis Ltd.,
South Africa, 2020, pp.306-321 ISSN:0960085X.
302
CYBER LAW: EMERGING TRENDS AND CHALLENGES
4) Botnet Attack
A computer system, server, or mobile device that has been
infected with malicious software, which includes worms, viruses,
malicious programmed, and malicious programmed, is referred to as
a botnet or a bot. These gadgets injure individuals without their
knowledge. Botnets are collections of devices with malware which
operate under the attacker's command. Botnets are used in
303
CYBER LAW: EMERGING TRENDS AND CHALLENGES
5) APT
During the period of lockdown that followed the COVID-19
outbreak, cybercriminals and APT groups preyed on vulnerable
individuals and systems. An attack occurs when unauthorised user
breaks access an appliance or internet using cutting-edge and
sophisticated methods. Attacking groups with governmental support
are known as APTs. APT often use methods like spyware, phishing,
ransomware, and information intrusions to harm their intended
on the security of the internet of things: challenges and solutions, Wireless Pers.
Commun., 119 (3) , 2021, pp. 2603-2637DO.
304
CYBER LAW: EMERGING TRENDS AND CHALLENGES
6) Malware
Malware is software that has been specifically created to harm
computers by encoding data, damaging hardware, obstructing the
correct operation of software, stealing documents or sneaking into a
computer with no permission.
In order to damage a system or delete data, malware
additionally has the ability to reproduce by itself on a device, like a
computer or a network of computers. It is a common cyber-threat
that companies and other entities have to cope with today. The word
means a kind of dangerous malware, including trojan horses,
worms, and ransomware. The peak of COVID-19 occurred when
malware started gathering data. That is to say, the use of data-
harvesting tools by hackers has increased, including banking
Trojans, spyware, info stealers, and Remote Access Trojan gaining
deception model for generating fake documents to curb data exfiltration in networks
during cyber-attacks, IEEE Access, 10, 2022 DOI: 10.1109/ACCESS.2022.3166628
305
CYBER LAW: EMERGING TRENDS AND CHALLENGES
306
CYBER LAW: EMERGING TRENDS AND CHALLENGES
26Supranote at 21
27Supranote at 21
28A.J. Burns, M.E. Johnson, D.D. Caputo, Spear phishing in a barrel: Insights from a
targeted phishing campaign,J.Organiz. Comp. Electr. Commerce, 29 (1) , 2019, pp. 24-
39.
307
CYBER LAW: EMERGING TRENDS AND CHALLENGES
29S. Wu, Y. Chen, M. Li, X. Luo, Z. Liu, L. Liu, Survive and thrive: A stochastic game
for DDoS attacks in bitcoin mining pools, IEEE/ACM Trans. Networking, 28 (2), 2020
, pp. 874-887DOI: 10.1109/TNET.2020.2973410.
308
CYBER LAW: EMERGING TRENDS AND CHALLENGES
CONCLUSION
The growing demand on companies of all sizes to address the
challenges brought on COVID-19 cyberattacks. In actuality,
criminals constantly come up with new ways to attack and deceive
people in order to take advantage of the panic and confusion caused
by the ongoing pandemic and stay one step ahead. In March 2020
compared to February 2020, web stealing increased by 26%, based
on recent Malware bytes statistics. Another interesting discovery
was that there was a 26% rise in people skimming the internet from
February to March 2020, following a 2.5% increase from January to
February 2020. Malware bytes says that despite the fact that this is
still a very little rise, it is indicative of an ongoing trend that is going
to grow more apparent over the next several months. The CEOs
should thus give operational skills a higher priority over the next
two years in order to eliminate dangerous websites in order to
advance business. Researchers also need to look on ways to block
dangerous websites so that digital businesses can be resilient.
309
CYBER LAW: EMERGING TRENDS AND CHALLENGES
CHAPTER 17
INTRODUCTION
1 Dean, Institute of Legal Studies & Research, GLA University, Mathura, (India)
2B.A. LL.B (H), 4th Year, Amity Law School, Amity University, Noida, (India)
310
CYBER LAW: EMERGING TRENDS AND CHALLENGES
311
CYBER LAW: EMERGING TRENDS AND CHALLENGES
312
CYBER LAW: EMERGING TRENDS AND CHALLENGES
used in legal ways. This malware was introduced to him in 2011 and
remained hidden until news broke. In 2011, the NSO helped
Mexican authorities arrest a drug lord named El Chapo. The
Mexican government purchased approximately $80 million worth of
spyware from the NSO group. In 2017, Mexican activists, human
rights lawyers and journalists filed criminal charges after reports
that their smartphones were infected with spy software sold to the
government to combat criminals and terrorists.
In India, news surfaced that between 2018 and his 2019,
Pegasus was being used to spy on more than 121 people. The
disclosure follows a lawsuit filed in U.S. federal court in San
Francisco, in which WhatsApp claims that his NSO group in Israel
used Pegasus to attack about 1,400 of his WhatsApp users. Several
lawsuits allege that NSO assisted customers in manipulating
software and was involved in numerous human rights violations.
The most prominent leaders, journalists and activists were targeted.
Amnesty International's security lab found evidence of a
Pegasus intrusion in mid-2019. The selection of the target figures is
speculated to have started during Prime Minister Modi's visit to
Israel in 2017. His visit to Israel marks growing ties between the
two countries, with a year-long investigation revealing that the
Indian government bought Israeli spyware as part of his $2 billion
package of weapons. However, so far, neither the Indian nor Israeli
governments have accepted participation in the Pegasus deal.
France-based media outlets Forbidden Stories and Amnesty
International had access to leaked documents containing a list of
targeted phone numbers. The list also included a number of
journalists and editors from top Indian media such as Hindustan
Times, India Today and The Wire. This list was shared with other
organizations around the world as part of a joint research project
known as the Pegasus Project.3
NSO sells software for targeted espionage and mass
surveillance. With one license he can spy on multiple smartphones.
In 2016, NSO charged a client for his $650,000 and compromised
10 devices. Prices have risen as spyware has become more
suspicious and harder to track. Previously, techniques were used
the End of Privacy, Dignity, and Democracy”, Henry Holt and Co, ISBN
9781250858696.
313
CYBER LAW: EMERGING TRENDS AND CHALLENGES
that required user interaction. Via text messages, but the latest one
was able to get into the device via WhatsApp missed calls.
WhatsApp sued NSO in 2019 for being the company behind a
cyberattack on 1,400 phones, and the company was banned from
using WhatsApp. The number of still unknown facts about this
entire Pegasus invasion is staggering. So far, the company has
denied all allegations and published its first transparency report
covering it up. The report was not taken seriously by human rights
groups, all parties to the Pegasus project, and victims, and was
dismissed as a sales pamphlet.
4Ajay Chawla, Pegasus Spyware - 'A Privacy Killer', Eliva Press, ISBN:978-
1636483375.
314
CYBER LAW: EMERGING TRENDS AND CHALLENGES
315
CYBER LAW: EMERGING TRENDS AND CHALLENGES
your phone's video camera not only that, hackers can also use the
Pegasus malware to eavesdrop on your microphone.5
5 Laurent
Richard and Sandrine Rigaud,“Pegasus: The Story of the World's Most
Dangerous Spyware”, Pan Macmillan UK, ISBN. 1761265601, 9781761265600.
316
CYBER LAW: EMERGING TRENDS AND CHALLENGES
317
CYBER LAW: EMERGING TRENDS AND CHALLENGES
Telegraph Act
According to Section 5(2) of the Telegraph Act, any officer
specifically authorized in this regard by the central government or
the state government, in the event of a public emergency or in the
interest of public safety, may direct the interception of any
communication or class of communications to or from any person or
class of persons, or relating to any specific subject, brought for
interception.
It must be made clear that, among other things, the central
government or a state government may order such interception if it
determines that doing so is necessary to protect India's sovereignty
and integrity.6
ii. The state's security.
iii. Goodwill towards foreign nations.
iv. Maintaining public order.
v. Preventing the arousal of criminal activity.
The act's provisions provide that an interception should only
be used when there are no other reasonable options for getting the
information. The total number of days that can be intercepted should
not be more than 180.7
6Indian Wireless Telegraph Act, 1933, No. 17, Acts of Parliament, 1933.
7Indian Telegraph Act, 1885, No. 13, Acts of Parliament, 1885.
318
CYBER LAW: EMERGING TRENDS AND CHALLENGES
IT Act – Section 69
Any agency of the appropriate government may be instructed
to, among other things, intercept, monitor, or cause to be intercepted
or monitored any information generated, transmitted, received, or
stored in any computer resource by the central government, the state
government, or any officer specially authorized in this regard by the
central government to the state government.
It must be made clear once more that the aforementioned right
to intercept or monitor communications will only be used if it is
required to protect India's security, sovereignty, or integrity. Having
a cordial relationship with the foreign government or maintaining
public order, prohibiting public incitement to commit any crime
related to the aforementioned, or looking into any crime.
Section 43, among other things, provides for the payment of
damages in the event that anybody uses a computer, computer
system, computer network, or computer system without the owner's
or another person in charge's consent. (i) uses such a computer,
computer system, computer network, or computer resource, or
secures access to them. (ii) obtains any data, computer database, or
information from the aforementioned computer, computer system,
or computer network, including any data retained or stored on any
removable storage medium. (iii) introduces or permits the
introduction of any computer virus or contamination into a
computer, a computer system, or a computer network. If the
aforementioned actions or omissions were committed dishonestly or
fraudulently, the offender may furthermore be punished with up to
three years in prison, a fine up to five lakh rupees, or a combination
of the two.8
Therefore, it may be said that both acts require a court order
to be issued before any type of data collection, monitoring, or
inscription. The installation of spyware on devices for the purpose
of fraudulent hacking is not permitted by the Telegraph Act or the
IT Act,9 so permission can be given for Pegasus to be installed.
intermediary “in the interest of sovereignty and integrity of India, defence of India,
security of the State, friendly relations with foreign States or public order or for
preventing incitement to the commission of any cognisable offence.
319
CYBER LAW: EMERGING TRENDS AND CHALLENGES
10Under the IT Act, the term 'computer' means "any electronic, magnetic, optical or
other high-speed data processing device or system which performs logical, arithmetic
and memory functions by manipulations of electronic, magnetic optical impulses, and
includes all input, output, processing, storage, computer software or communication
facilities which are connected or related to the computer in a computer system or
computer network".
320
CYBER LAW: EMERGING TRENDS AND CHALLENGES
321
CYBER LAW: EMERGING TRENDS AND CHALLENGES
Zero-Click Exploits
Zero-click exploits are distinct from infection attempts in that
they do not necessitate the victim to take an action, such as clicking
a link, or opening an attachment. All that is required for an attack to
succeed is for the victim to have an operating system or application
that is vulnerable installed on their device. Amnesty International's
forensic analysis of the recently made public Pegasus data revealed
that some infections were spread via iMessage or Apple Music
through zero-click attacks. It's crucial to remember that your mobile
should only have the apps you need. This is not the first time NSO
Group products have been linked to zero-click assaults; a complaint
was made in 2017 against Ricardo Martinelli, the former president
of Panama, and one in 2019 against WhatsApp and Facebook. The
complaint alleged that NSO Group developed malware that was able
to exploit vulnerability in WhatsApp.
Zero-click vulnerabilities are the most difficult to fight against
because they do not involve any user interaction. Users can lessen
their "attack surface" and practice device compartmentalization to
reduce their vulnerability to these attacks. Simply said, lowering
your attack surface implies limiting the potential infection vectors
for your device. Device compartmentalization is the practise of
distributing your data and programs across numerous devices. To be
specific, users can -:
322
CYBER LAW: EMERGING TRENDS AND CHALLENGES
Physical Access
Another way a hacker can infect your phone is by contacting
it directly. The brochure says, "If you have physical access to the
device, you can manually inject the Pegasus agent and deploy it in
less than five minutes." It's unclear if could infect his PIN Protected
Phone. Although there doesn't seem to be any evidence of a physical
Pegasus attack, these exploits can be hard to spot and tell apart from
online attacks. The following measures to be taken from online
attacks:
➢ Always keep your gadget in plain sight. You run the risk of
getting hurt if you lose your gadget. There are differences
between leaving your laptop in your room when you go to the
toilet and having a customs officer take your phone at the
airport, but both involve some level of risk and are within
your own risk tolerance. Value needs to be assessed.
➢ If you leave the device unattended, put it in a tamper-resistant
bag, especially in a hazardous environment such as a hotel
323
CYBER LAW: EMERGING TRENDS AND CHALLENGES
room. This does not prevent the device from being tampered
with, but it should immediately alert you that the item has
been removed from your pocket and may have been tampered
with, and the device should not be used at that time.
➢ While entering government buildings, especially those that
may be unfriendly, like embassies and consulates, or while
crossing borders, use burner phones or other
compartmentalised devices.
Pegasus is sophisticated malware, but there are specific steps
you can take to reduce the chances of your device getting infected.
There is no ideal technique for totally reducing risk, but you may
always take steps to mitigate it. There is absolutely no justification
for adopting the pessimistic attitude that Pegasus is "no match" for
you.
324
CYBER LAW: EMERGING TRENDS AND CHALLENGES
325
CYBER LAW: EMERGING TRENDS AND CHALLENGES
326
CYBER LAW: EMERGING TRENDS AND CHALLENGES
327
CYBER LAW: EMERGING TRENDS AND CHALLENGES
CONCLUSION
Spyware incidents like Pegasus mark the beginning of a new
era of digital warfare. Situations like this are likely to become more
common as technology advances. It is important to set strict rules
for restricting unauthorized access to devices and spyware control.
The Pegasus case also highlights the need for spyware regulation.
The purpose of targeting criminals and users suspected of such
activity can also extend to spying on individuals such as activists
and protesters, damaging the entire fabric of democracy and privacy
in the long run because it can give Individual.
Tools like Pegasus are only successful when used against a
small number of high-value targets such as: National security
threats, crime syndicate bosses, etc. This technology relies heavily
on the stealth element of its use, making it of little value as a mass
surveillance tool, heavy consumption can lead to system-wide
failure. Furthermore, NSO Group sells the system and charges on a
per-use basis, so using Pegasus as a large-scale surveillance tool is
clearly disastrously expensive from a financial point of view, and as
a large-scale surveillance tool. The claim regarding the use of it, is
false, nil, and invalid. The extremely wide parameters of the state's
present statute governing surveillance laws impose unfettered
authority on the administration. The well-known case of Shreya
328
CYBER LAW: EMERGING TRENDS AND CHALLENGES
329
CYBER LAW: EMERGING TRENDS AND CHALLENGES
CHAPTER 18
INTRODUCTION
C
yber forensics is the application of scientific procedures and
techniques to gather, assess, and preserve electronic data to
support investigations or lawsuits. It is often referred to as
digital forensics or computer forensics. Cyber forensics uses
specialized software and hardware tools to gather information from
digital devices, networks, and storage media.
Criminals use these exclusive technologies of hers to
perpetrate crimes that are beyond the reach of ordinary people.
Those unfamiliar with this technology cannot truly understand the
origin of crime. In recent times, a new term has emerged
330
CYBER LAW: EMERGING TRENDS AND CHALLENGES
3 https://www.lexisnexis.com/applieddiscovery/LawLibrary/whitePapers/ADI_WP_L
orraineVMarkel.pdf.
331
CYBER LAW: EMERGING TRENDS AND CHALLENGES
1. Criminal Investigation
Cyber forensics plays an important role in investigating and
solving cyber-crimes such as hacks, data breaches and cyber-
attacks. Help identify perpetrators and provide evidence for legal
action.
2. Cyber Security
Cyber forensics play an important role in ensuring cyber
security. It helps companies identify system and network
vulnerabilities and implement appropriate measures to prevent
cyberattacks.
3. Litigation
In litigation, cyber forensics can help provide reliable
evidence that can be used in court. This ensures that justice is served
and cybercriminals are held accountable for their actions.
4. Crisis Management
Cyber forensics helps companies assess the risk of
cyberattacks and develop effective risk management strategies.
Understanding the nature of cyber threats and system vulnerabilities
can help organizations protect against cyber-attacks.
332
CYBER LAW: EMERGING TRENDS AND CHALLENGES
333
CYBER LAW: EMERGING TRENDS AND CHALLENGES
accurately store the details of the work that should not be known to
anyone, and all materials that can be presented as concrete evidence
in court. Whatever best could be done to collect information, we’ll
do.
When all the information and the evidences are collected,
experts will make a report which could be filed in the court. As
these people has the expertise in their respective fields and have
experience in the subject they are working on. Today, malicious
angry employees are attacking many e-commerce websites with
viruses, eavesdropping, financial fraud, etc. in various states and
independent companies and businesses. This e-commerce attack
brings several financial difficulties for businesses. This has been
observed as a common attribute of those who are fired or humiliated
by large departments, whether hackers or cybercriminals. There
were downsides. Retaining data or information for evidentiary
purposes is beneficial to courts, but there can be technical and
human barriers to collecting such information.
334
CYBER LAW: EMERGING TRENDS AND CHALLENGES
335
CYBER LAW: EMERGING TRENDS AND CHALLENGES
336
CYBER LAW: EMERGING TRENDS AND CHALLENGES
337
CYBER LAW: EMERGING TRENDS AND CHALLENGES
should take this into account when working with such information.6
Some electronic evidence can now be submitted in presentable formats
such as physical paper copies or in other formats. It is also a challenge
for investigators to comply with electronic evidence regulations and
submit evidence on a regular basis. Maintaining integrity during this
transformation is the real job. Simply put, evidence from an electronic
source, be it paper or electronic, is valid only if it is from a well-
controlled system and the data has been tampered with. There is no
method that works with or without the integrity of directly generated
data. Human intervention is guaranteed.7
338
CYBER LAW: EMERGING TRENDS AND CHALLENGES
3. Cryptocurrencies
It is difficult to track cryptocurrencies. As a result,
ransomware attackers are having a good time, but cyber forensic
analysts are having a hard time. Cryptocurrencies will be used for
$14 billion in criminal activity in 2021, a 79% increase for him from
2020 (2022; Chavez-Dreyfuss).
5. Anti-Forensic Technology
Criminals are constantly coming up with new strategies to
cover their tracks. Detecting and investigating cyberattacks can
become more difficult as forensics evolves.
1. Behavioural Analysis
Cybercriminals often leave a digital footprint that can be
analysed to gain insights into their behaviour, motivations and
personality traits. This information is used to profile suspects,
identify patterns, and predict future behaviour.
2. Human Factors
Cybersecurity incidents often involve human factors such as:
B. Social Engineering and Phishing. Understanding how people
think, act, and make decisions helps investigators identify
vulnerabilities and develop strategies to prevent future attacks.
339
CYBER LAW: EMERGING TRENDS AND CHALLENGES
340
CYBER LAW: EMERGING TRENDS AND CHALLENGES
IoT Forensics
The Internet of Things (IoT) is a new model that is gaining
exponential importance in today's mobile communication scenarios.
At a conceptual level, IoT refers to the interconnection of our
everyday devices, along with process independence, cognition, and
situational awareness. IoT devices primarily include PCs, laptops,
tablets, smartphones, personal digital assistants (PDAs), and other
portable fixed devices.12 People can now share data thanks to the
IoT contract devices' ongoing rise. These IoT systems can
communicate with one another directly or via internet application
programming interfaces, and they can be controlled by high-tech
computing tools like cloud servers. IoT systems' intelligence and
connectivity have a lot to offer both private and commercial
applications. Even Nevertheless, emerging IoT technologies are
constantly under attack and in danger. Ransomware assaults, denial
of service (DoS) attacks, interruptions to the Internet of Things
(IoT) network, and mass spying are a few notable concerns.1314
Devices", 2021 7th IEEE Intl Conference on Big Data Security on Cloud (BigDataSecurity),
IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl
Conference on Intelligent Data and Security (IDS), pp.186-190, 2021.
12 Q. Zhou and J. Zhang, "Research prospect of Internet of Things geography", Pro
challenges and open problems in the internet of things", World Congress on Services,
pp. 21-28, 2015.
341
CYBER LAW: EMERGING TRENDS AND CHALLENGES
14 M.A. Khan and K. Salah, "Iot security: Review blockchain solutions and open
challenges", Future Gener. Comput. Syst., vol. 82, pp. 395-411, 2018.
15 Z.A. Baig, P. Szewczyk, C. Valli, P. Rabadia, P. Hannay, M. Chernyshev, M.
342
CYBER LAW: EMERGING TRENDS AND CHALLENGES
Cloud Forensics
In recent years, cloud computing has grown in popularity and
is now utilised to support many facets of daily life. The majority of
firms and organisations constantly move their products to the cloud,
and many people are interested in this innovation. Changing to a
cloud infrastructure has a number of advantages, such as: Lower
costs for IT, scalability, automatic update access, business
continuity, etc. The key benefits of cloud computing, according to
EurActive (2011), have dramatically reduced IT expenditures. As a
result, cloud computing will continue to be widely adopted by both
private businesses and governments. 16 Major telecom companies
operate data centres in numerous countries where they provide
cloud services in order to guarantee service availability and cost-
effectiveness. To guarantee adequate security, these several data
centres duplicate the information kept in a specific data centre.
LEGAL PROVISIONS
Modern technology appears to be upending traditional
approaches of acquiring and producing evidence. Digital evidence
gathering and preservation are inherently difficult because of the
intangible nature of digital evidence and the Internet's brittleness.
Domestic cybercrime has surely increased as a result of the absence
of appropriate technological and legal competence as well as the
inability to gather such evidence. Although there are many
cybercrime cases registered under the Cybercrime Section of the IT
Act and the Penal Code of India, there are still a significant number
of cybercrimes that go unreported. This makes cyber forensics even
more important in India today.
Cyber forensics is occasionally used in the strictest legal
terminology to refer to the employment of suitable forensic
instruments and the technical know-how to gather electronic
evidence that can be used in court within the parameters of the
Rules of Evidence. By tracing digital footprints through the storage,
343
CYBER LAW: EMERGING TRENDS AND CHALLENGES
344
CYBER LAW: EMERGING TRENDS AND CHALLENGES
345
CYBER LAW: EMERGING TRENDS AND CHALLENGES
CONCLUSION
Overall, addressing these challenges will require significant
investment in training and resources for law enforcement agencies,
as well as increased public awareness about the risks associated
with cyber-crimes. It is essential to establish clear guidelines and
standard operating procedures for cybercrime investigations too
ensure effective and efficient prosecutions.
346
CYBER LAW: EMERGING TRENDS AND CHALLENGES
CHAPTER 19
“The world has shrunk in many ways thanks to the internet, but it
has also given us access to a plethora of evil forces that are more
diverse and intricate than ever before. The world of hacking has
developed more rapidly than cybersecurity solutions. The practice
of preventing malicious attackers from gaining unauthorized access
to computers, servers, mobile devices, electronic systems, networks,
and corporate data is known as cybersecurity. Online protection
today is a complex and quickly developing field that requires
continuous watchfulness and variation to new dangers. It is
fundamental for people, organizations and states to remain
informed about the most recent network safety patterns and to go to
proactive lengths to safeguard against digital assaults”.
INTRODUCTION
C
yber attackers possess a unique set of abilities and tools. We
should do everything within our power to find data security
dangers and weaknesses through innovation as well as
through human way of behaving. They utilize this data to design
goes after that will cause an expected $6 trillion in harm in 2021. In
contrast to the business world, which guards intellectual property
(IP), hackers are happy to share their methods and tools with other
cybercriminals. As a result, novice hackers can easily locate free
online tools to plan an online cyberattack. With the development of
new technologies on a daily basis, the landscape of cyber security is
ever-evolving, providing opportunities for hackers who are always
looking for new ways to exploit individuals and businesses.
347
CYBER LAW: EMERGING TRENDS AND CHALLENGES
Ransomware Assaults
Ransomware is a kind of malware that encodes a casualty's
documents and requests installments in return for the unscrambling
348
CYBER LAW: EMERGING TRENDS AND CHALLENGES
Cloud Security
As additional organizations move their information and
applications to the cloud, the requirement for solid cloud safety
efforts has become fundamental. Cloud security includes
safeguarding information, applications, and foundation in the cloud
from digital dangers.
Administrative Consistence
States all over the planet are acquainting new network safety
guidelines with guarantee that organizations are going to
satisfactory lengths to safeguard delicate information. Consistence
with these guidelines is turning out to be progressively significant
for organizations to keep away from lawful and monetary
punishments.
Online protection5 today is a complex and quickly developing
field that requires continuous watchfulness and variation to new
dangers. It is fundamental for people, organizations, and states to
remain informed about the most recent network safety patterns and
to go to proactive lengths to safeguard against digital assaults.
349
CYBER LAW: EMERGING TRENDS AND CHALLENGES
350
CYBER LAW: EMERGING TRENDS AND CHALLENGES
https://blogs.lse.ac.uk/humanrights/2020/07/16/beginning-of-artificial-intelligence-end-
of-human-rights/. (Visited on November 27, 2022)
351
CYBER LAW: EMERGING TRENDS AND CHALLENGES
352
CYBER LAW: EMERGING TRENDS AND CHALLENGES
353
CYBER LAW: EMERGING TRENDS AND CHALLENGES
354
CYBER LAW: EMERGING TRENDS AND CHALLENGES
12 Cybersecurity And Cyber Laws Around The World And India: Major Thrust
Highlighting Jharkhand For Concerns, available athttps://thelawbrigade.com/general-
research/cybersecurity-and-cyber-laws-around-the-world-and-india-major-thrust-
highlighting-jharkhand-for-concerns/. (Visited on March 7, 2023).
355
CYBER LAW: EMERGING TRENDS AND CHALLENGES
356
CYBER LAW: EMERGING TRENDS AND CHALLENGES
357
CYBER LAW: EMERGING TRENDS AND CHALLENGES
358
CYBER LAW: EMERGING TRENDS AND CHALLENGES
leak personal data in several ways for example, they may retain
information about users' search queries, which can include personal
information such as names, addresses, and other identifying
information. If this information is not properly protected, it can be
vulnerable to data breaches or other security incidents. This data can
be used to build detailed profiles of users, which can be sold to
advertisers or other third parties. Some search engines may use geo
location data to track users' location, which can be used to deliver
more targeted advertising or other content. This data can also be
used to identify users' physical locations, which can be a privacy
concern if this information is shared or sold without the user's
consent. This can result in the user's personal information being sold
or used for purposes that they did not intend or consent to. To
address these concerns, users can take steps to protect their personal
data, such as using privacy-focused search engines that do not track
user behaviour or using privacy tools such as virtual private
networks (VPNs) and browser extensions that block tracking scripts.
In addition, governments can enact laws and regulations that protect
users' privacy and require companies to obtain explicit consent
before collecting or using personal data. Finally, companies that
operate search engines can take steps to enhance the security and
privacy of their systems, such as implementing encryption and data
protection measures, and being transparent about their data
collection practices.
359
CYBER LAW: EMERGING TRENDS AND CHALLENGES
CONCLUSION
Artificial intelligence (AI) has the potential to revolutionize
many aspects of our lives, from healthcare to transportation to
entertainment. However, as with any new technology, there are also
concerns and dilemmas that must be addressed as AI continues to
develop and become more integrated into our lives. One of the main
dilemmas surrounding AI is the potential impact it could have on the
job market. As AI becomes more advanced, it may be able to replace
human workers in many industries, which could lead to widespread
unemployment and economic instability. This could create a difficult
balancing act between the potential benefits of AI and the need to
360
CYBER LAW: EMERGING TRENDS AND CHALLENGES
361
CYBER LAW: EMERGING TRENDS AND CHALLENGES
STORY NO. 1
One day, a girl named Anushka, who lived in Lajpat Nagar,
Noida, (India), received a mail from her credit card company,
informing her that somebody has tried to obtain a credit card using
her name, address and other credentials. Before telling the police,
Anushka decided to assess the damage and look over her credit card
reports.
The impersonator had gotten so deep into the system that, she
managed to answer all the questions put across by the system before
login. Eventually, as she somehow logged in herself she witnessed
the extent of the damage caused. The impersonator had created
more than 50 accounts in her name, and got credit for utilities such
as heat, cable, electricity and even a newspaper subscription.
Payments were made all over the world in different accounts and
Anushka had zero knowledge about it.
What’s more, the companies went after the girl in order to get
their money back. After notifying the police and tracking down the
impersonator, Anushka got a court order passed against the
impersonator and managed to retrieve her credit card with the help
of cyber experts, she was also able to delete the trail of fake
information created by the perpetrator. All this ordeal has both
physically and mentally exhausted her. While Anushka was
fortunate enough to secure the information back and was able to
delete the fake information, few are lucky enough to get justice.
This story should act as a reminder to always safeguard one’s
personal information.
362
CYBER LAW: EMERGING TRENDS AND CHALLENGES
STORY NO. 2
A man named Alok Singh Chauhan, residing in Hazratganj
area of Lucknow (India) was shopping at a showroom of Allen
Solly. He purchased clothes worth seven thousand, and received the
bill, the employee of the showroom requested Alok to fill in the
feedback form that he would receive on his phone through short
message service (SMS). Alok ignored the message and went home,
later he received a phone call stating that the person was calling
from the Allen Solly showroom and requested him to fill in the
feedback form. Alok who was irritated with these constant
reminders filled in the feedback form, as soon as he filled in his
details, he received a One Time Password (OTP). The person called
Alok to confirm the OTP which Alok did.
Later Alok found out that his account was debited with three
lakh rupees, he was shocked and could not understand the situation,
later he realised that the amount was debited from the same account
through which he made the payment at the showroom. He
immediately filed a complaint in the cyber wing of his nearest
police station, the cops were able to track the culprits as one of them
was employed at the Allen Solly showroom.
Alok was lucky to have received his money back as he did not
waste time and informed the police immediately. Cyber-crimes have
become one of the easiest crimes, which are difficult to track, as the
culprit is not supposed to be physically present to commit such
crimes, a crime is just a call or click away. Therefore in such
situations it is of paramount importance that the victims
immediately inform the agencies so that further damage can be
prevented.
STORY NO. 3
A small company in a small town with easy hubris in the form
of people to fool, the nearly perfect premise for a heist, even better
if we involve technology in the scenario. A housing company
named Speak Asia made a room in a corporate building it's office
and had 5 members in their working in a proper office space. They
asked people to invest in their venture with an initial payment of
50,000 or 1 lakh, or even 20,000 for those who just wouldn't budge
on a higher amount. There was an office, an app, a website, just
about enough for people to believe the legitimacy of the company.
The amount was to be paid through the application after which the
363
CYBER LAW: EMERGING TRENDS AND CHALLENGES
364
CYBER LAW: EMERGING TRENDS AND CHALLENGES
Its also very important that the people are made more aware
of how to prevent these crimes and if unfortunately one falls into the
trap of these criminals then what further steps he/she needs to take
to safeguard his/her interests.
365
CYBER LAW: EMERGING TRENDS AND CHALLENGES
366
CYBER LAW: EMERGING TRENDS AND CHALLENGES
367