Chapter - 1 Crime in Cyberspace: An Introduction
Chapter - 1 Crime in Cyberspace: An Introduction
Chapter - 1 Crime in Cyberspace: An Introduction
1.1 Introduction
1
Internet World Stats, World Internet Usage and Population Statistics, available at
http://www.internetworldstats.com. (Retrieved on 2 June, 2016).
2
Ernest Tambo, Kazienga Adama “Promoting cyber security awareness and resilience
approaches, capabilities and actions plans against cyber crimes and frauds in Africa”.
International Journal of Cyber-Security and Digital Forensics. The Society of Digital
Information and Wireless Communications (SDIWC),Vol.6(3) (2017).
3
Bhat, T.H., Khan, A.A. “Cybercrimes, security and challenges”. International Journal of
Advanced Research in Computer and Communication Engineering, Vol.6 (5) (2015).
1
complexities. 4 These figures make it imperative that today cyber security has
become compulsion rather than consideration. Cyber-security performs various
tasks such as protection of data, important assets, computers and computer
networks etc. Developing countries which lack cyber expertise and infrastructure
such as India has become the favourite among cybercriminals, mostly hackers
and other malicious actors who misuse the internet and online social
communication mode to commit crimes such as hacking, bullying, pornography,
identity theft, spamming, phishing etc. In view of the rising cyber attacks in U.S,
the concerned authorities have established the regulation of cybercrime as the
foremost priority of the nation. malicious actors who misuse the internet and
online social communication mode to commit crimes such as hacking, bullying,
pornography, identity theft, spamming, phishing etc. In view of the rising cyber
attacks in U.S, the concerned authorities have established the regulation of
cybercrime as the foremost priority of the nation.5 Although Cyber security is a
critical concern but due to limited resources it has become difficult for various
nations to provide complete security coverage at all times. 6It is very urgent today
to promote cyber security norms for prevention and protection of cyber space. The
rise in digital economy is dependent upon safe and secure cyberspace in order to
continue growing and supporting state's economy in future. In order to secure
cyber security regime, there is an urgent need to implement strategic policies of
the government with cooperation from industries, businesses and consumers to
step up the cyber capabilities and counterattacks the cyber intrusions, hacking,
online frauds and ransom ware across the world. Government need to build
practical, cost effective, strong strategies while establishing global cooperation for
4
Juniper research: The Future of Cybercrime & Security: Financial and Corporate Threats
& Mitigation 2015-2020 (2015). Available at: https://www.afcea.org/content/?q=Blog-
juniper-research-cybercrime-cost-businesses-21- trillion-2019. (Retrieved on 5 June,
2016).
5
Director of National Intelligence :Worldwide Threat Assessment of the US Intelligence
Committee (2014). For more details see; Finklea, K. and Theohary, C.A.: Cybercrime:
Conceptual Issues for Congress and U.S. Law Enforcement, Congressional Research
Service, R42547 (2015)
6
Arunesh Sinha, Thanh H. Nguyen, Debarun Kar, Matthew Brown, Milind Tambe, Albert
Xin Jiang; “From physical security to cyber security” Journal of Cybersecurity, Vol.
1, Issue 1, 1 September 2015, Pages 19– 35.
2
sustainable cyber security landscape to increase productivity and economic
prosperity. Today cyber security is not a concern of a single department but rather
an attitude of people in every organization.7 Government has to comprehend and
realize that cyber attacks have turned into more sophisticated attacks and entail
incessant monitoring by government and all other stake holders due to gigantic
threat to data and proprietary information to prepare a strong cyber security
policy in order to keep pace with these threats that not have been integrated in
their security strategies to provide a more complex solution to cyber-attacks.8 The
government needs to approve a framework which comprises of assessment of the
risk to the network, organizing a response team, implementing a security change
management practice, monitoring the network for security violations, maintaining
a review process that modifies the existing policy and adapt to lessons learned.9
Now let’s discuss in brief about Cyber space and its definition.
7
John Hernams, Gerben Schreurs, “The five most common cyber security mistakes,
Management’s perspective on cyber security”, available at : www.kpmg.nl,KMG
Advisory, 2013. (Retrieved on 3 June, 2016).
8
Kevin Mickelberg, Laurie Schive, and Neal Pollard, “US Cybercrime: Rising risks,
reduced readiness, Key findings from the 2014”, US State of Cybercrime Survey.
Available at : http://www.pwc.com/cybersecurity, June, 2014. (Retrieved on 3 June,
2016).
9
Oredola A. Soluade, Emmanuel U Opara, “Security Breaches, Network Exploits and
Vulnerabilities: A Conundrum and an Analysis” International Journal of Cyber-Security
and Digital Forensics, Vol (3)4, Sep, 2014.
10
ISO/IEC 27032-2012(National Cyber Security Policy-2013) (Retrieved on 3 June, 2016).
11
Available at :
http://www.oxforddictionaries.com/us/definition/american_english/cyberspace) .
(Retrieved on 4 June, 2016).
3
The term "Cyberspace" gained popularity during 1990 period and a well known
name around the house hold and after the invention of World Wide Web, it
became to gather the attention of professionals, academicians, scholars especially
to explore more about this topic. 12 Cyberspace stand for the latest means of
communication, business, shopping, social media and electronic communication,
which has completely is substituted the older methods of communication.
Cyberspace has opened the doors towards new opportunities, dreams, new
dimensions, exchange of different thoughts and literally shrink the boundaries of
the world.13 Cyber space has helped people across the world to “connect” with
the people from different cultures within seconds, which was unthinkable fifty
years ago. It has changed the way of doing business, education and development.
Every country now depends on cyberspace for its economic and social growth.14
Now-a-days people of every nationality, race, and faith have come closer due to
online communication. Successful digital infrastructure has now become a must
for every country. Its importance can be gathered from the point that now it is
considered indispensable for economic growth of every Nation. Slowly due to
various benefits of cyberspace, financial and social communication as well as
transactions completely dependent on computers and internet based networking.
This has given rise to more cyber crime incidents and digital attacks around the
world. earlier these attacks and intrusions were just done by IT scholars to
explore its various dimensions but slowly it has become a organised crime
syndicate. Hackers even started competed against one another to win the label of
the superlative hacker. But slowly these hackers became more skilled, they started
employing their knowledge and expertise to gain advantage monetary or otherwise
by exploiting others .These hackers found out that in cyberspace the rate of return
on investment is high and the risk is low and moreover chances of getting caught
12
Jay Clayton, "Postmodernism and the Culture of Cyberspace", Published in course
syllabus of Vanderbilt university, Fall 1996 course syllabus. Available at :
https://www.vanderbilt.edu/AnS/english/Clayton/sch295.htm. (Retrieved on 5 June,
2016).
13
Terry flew “New Media: An Introduction” Pub by; OUP Australia and New Zealand, 3
edition (31 Jan 2008).
14
“The Worldwide Crime Web” available at : www.bbc.com/news/uk-politics, July 2010
BBC News (Retrieved on 5 June,2016).
4
are very bleak which lured more hackers and other interested crime organisations
into this business. Cybercriminals came to know about the unique quality of
online exploitation where they don’t have to invest anything but they can gain
15
mush in the context of money, name and fame in the cyber world. Hence, this
has led to an augment in cyber crime across the world.
15
Available at : www.crossdomainsolutions.com/cyber-crime/. (Retrieved on 6 June, 2016).
16
Available at : https://www.techopedia.com/definition/2387/cyber crime. (Retrieved on 6
June, 2016).
17
Moore, R. Cyber Crime: Investigating High-Technology Computer Crime, Cleveland,
Mississippi: Anderson Publishing. (2005).
5
Cheating and fraud
Online pornography
Cyber bullying
Identity theft
Spam
Malicious program or virus
Drug trafficking
Web-hijacking
Breach of Privacy
6
Cyber trafficking
Online gambling
Increase in cyber attacks in India Year after year, cyber attacks continue to shoot
up in occurrence, relentlessness and impact. Deterrence and exposure methods
have proved largely futile against the increasingly proficient assaults. A survey
has revealed that incidents of contravention in the Indian cyberspace have
increased twofold over the year 2014-15. Indian organisations detected 117%
more incidents over the previous year. These incidents were 6, 284 in 2014 and in
2015 there were reports of 2,895 intrusion attempts in India.19 Indian firms have
reported that they have observed that every year these incidents keep growing
with the yearly rate of 68 percent
1.5.2 Increase in reported cases under the Information Technology Act, 2000
The most frequent cyber attacks inflicted were virus attacks, phishing attacks,
online bullying, financial frauds, hacking to steal data, identity theft, spam,
malware attack and bot net attacks etc. A report by the National Crime Records
Bureau (NCRB), Ministry of Home Affairs, Government of India, titled Crime in
India-2014, shows a 69% increase in cases reported under the Information
18
Nancy Gonchar and JoanRoper Adam, ‘Living in Cyberspace: Recognizing the
Importance of the virtual World in social work assessment”, Journal of Social Work
Education ,Vol. 36, No.3(fall 2000).
19
Source: National Crime Records Bureau (NCRB): Crime in India, PwC analysis
2015, available at : ncrb.gov.in. (Retrieved on 6 June 2016).
7
Technology (IT) Act in 2014 from the last year.20 The number of cases recorded
increased from 5,693 in 2013 to 9,622 in 2014.21
Financial losses increase twofold fiscal losses increased by 135% over the
previous year, due to escalation of cyber incidents which is a steep rise compared
to the earlier year losses. These rising cyber incidents caused a huge fiscal losses
and Indian enterprises had to suffer more monetary losses which increased by 8
percent which is a cause of concern among the commerce fraternity.22
Another alarming fact associated with cyber crime and its nexus with terrorism is
that there are presence of some online accounts of terrorist named 'Mehdi' alias
'Shami Witness' who was misleading the youth with the help of these accounts in
order to persuade them to join the “Jihadi” movement in India from Bengaluru.
Over the past few years, India has witnessed a huge rise in cyber intrusions upon
its defence and national security servers with an aim to create panic and steal
important data such as hacker group called 'Anonymous' has launched a high
20
Ibid.
21
CERT-In. Available at: http://cert-in.org.in. (Retrieved on 7 June, 2016).
22
Turnaround and transformation in cyber security, PwC analysis 2015, available at :
https://www.pwc.com/us/en/services/consulting/cybersecurity/library/information-
security-survey.htm. (Retrieved on 7 June, 2016).
23
Prakash Katoch “ Like China, India needs to encourage 'hacker clubs' in view of the
challenges of virtual terrorism”, available at: www.rediff.com/news/April 24, 2015.
(Retrieved on 8 June, 2016.
8
level cyber breaches against various government authorities to protest against the
decision of the Indian government regarding censorship of online Data.24 There
are various hackers group as recognised by the Investigating agencies such as
'Pakistan Cyber Army' and “Hackers from Algeria” who are found involved in
different cyber intrusion activities in India against the important government
departments.
In January, 2016 there was a terrorist attack on The Pathankot IAF base which is
near the border with Pakistan. .25 This attack although not directly associated with
cyber intrusion, still highlight the deplorable security system and technical support
system to detect doubtful movement in India especially around such a high
security area . To counter such threats India need to undertake sound, preventive
and responsive security measures.
After analysing the present landscape, we can say that India needs a well planned
and comprehensive Cyber security policy to tackle and mitigate this growing
challenge.
This Act was enacted with an aim to consider the resolution of the United Nations
Commission on trade law in which the United Nations passed a mandate to its
member Nations to enact a legislation based on model law on electronic
commerce. As corollary of which Information Technology Act, 2000 was
approved and imposed on 17 May 2000. Moreover government amended, Reserve
Bank Of India Act, 1934, the Indian Evidence Act, 1891 and Indian Penal Code,
1860 with an aim make them attuned with the Act 2000. IT Act, 2000 was the
most awaited legislation in India because at that time there was no statute to deal
with information technology and its related activities in India. But still it was
24
Haris Zargar, “India must wake up to cyber-terrorism” Indo-Asian News Service ,
available at : www.gadgets.ndtv.com/ internet/news /2 April 2013. (Retrieved on 8
June, 2016).
25
S G Vombatkere, “Security beyond the Pathankot Attack” Issue- Net Edition 15 Jan,
2016, available at : http://www.indiandefencereview.com, (Retrieved on 9 June,2016).
9
criticised by scholars, technical experts and industrial stockholders due to it’s
inadequate and insufficient legal provisions to encompass the latest cyber security
issues. There are various loopholes in the Act. e.g.—Act neither comprehensive
nor exhaustive.
26
Karnika Seth “IT Act2000vs 2008 Implementation, challenges and the Role of
adjudicating Officers” National seminar on Enforcement of Cyber Law, New Delhi on 8th
May @2010
10
1.6.3 Shortcomings in Information Technology (Amendment) Act, 2008
27
Pranesh Prakash ,Short note on IT Amendment Act, 2008, (2009), available at:
www.cis-india.org. (Retrieved on 9 June, 2016).
28
IT (Amendment) Act, 2006 (S.66A(a)).
29
Ibid, (S.66A(c)).
30
Id. (S.79).
11
Another major changes done by the Government is reduction of quantum
of punishment for many cyber crimes which should be other way round to
effectively deal with rising cyber crime scenario in India.31
The majority of cyber crimes need to be made non-bailable offences.
Detailed legal regime needed to protect privacy of individuals and
institutions.
Section 66F(1)(B), which was incorporated to define and provide
punishment of the term "cyber terrorism" is clearly too broad and is very
likely to be misused and misinterpreted very easily. Thus this might cause
much confusion rather than helping in eradication of cyber criminals. It
also included the act of slander into the realm of ‘terrorism’ which is
beyond comprehension.
To plug in these loopholes, Government of India has been enacting
various rules under Information Technology Act to cover the latest cyber
crimes and challenges. Some of these rules are hereunder-32
Digital Signature (End Entity) Rules, 2015.
The Digital signature or electronic Authentication Technique and
Procedure (Amendment) rules, 2015.
Information Technology Act (The Indian Computer Emergency Response
team and manner of performing function and duties) Rules, 2013.
Information Technology Act (Procedure and Safeguards for Interception,
Monitoring and Decryption of information) rules, 2009.
Information Technology Act (Procedure and Safeguards for blocking for
access of information by public) rules, 2009.
In spite of all the legal legislation regarding maintaining cyber security, still there
is constant rise in cyber crime in India. Our policy makers must draw their
attention towards goal oriented legislation rather that describing about the
offences and punishments with clear guidelines. Cyber security environment in
31
Soumik Chakraborty and Sreedhar Kusuman “Critical Appraisal of Information
Technology Act” December 17, 2014, available at: www.lawctopus.com. (Retrieved on
10 June, 2016).
32
Available at : Deity,gov.in/content/notifications, (retrieved on 11 June, 2016).
12
India is in great danger and cyber threat and risks are becoming more and more
harmful in the context of their capabilities and consequences.
To counter the escalating effects and causes of cyber intrusions, the Government
of India released the National Cyber Security Policy, 2013 on July 2, 2013. 33 The
rationale of this document is to make certain a safe and sound cyberspace for
citizens, commerce and the government. With swift information stream and
business occurring via cyberspace, a National policy was much necessitated.
33
Sanjeev Tomar “National Cyber Security Policy 2013: An Assessment” IDS comment
August 26, 2013, available at: www.idsa.in. (Retrieved on 12 June, 2016).
34
Available at : www.merrium-webster.com/dictionary. (Retrieved on 12 June, 2016).
35
Available at : https://www.techopedia.com/definition. (Retrieved on 13 June, 2016).
36
Available at : https://cactusblog..files.wordpress.com/201. (Retrieved on 13 June, 2016).
37
Available at : Deity.gov.in/content/national-cyber-security-policy-2013. (Rretrieved on
14 June, 2016).
13
incidents through a amalgamation of institutional organizations,
individuals, method, technology and assistance.
The purpose of this policy in clear word is to build a secure cyberspace
ecological unit and reinforce the regulatory structure
A National and sectoral 24X7 machinery has been visualized to deal with
cyber intimidation through National Critical Information Infrastructure
Protection Centre (NCIIPC).
Computer Emergency Response Team (CERT-In) has been elected to
proceed as a Pilot agency for harmonization of disaster management
endeavours.
The policy aim at promoting efficient public and private corporation and
collaborative rendezvous through technical and operational assistance.
This Policy endeavours to promote the research and progress processes in
cyber security.
The policy envisages to encourage each institutes/ organisations dealing
with online contact whether public or private to assign a person to act as
Chief Information Security Officer (CISO) who will be accountable for
cyber security initiatives.
The National Cyber Security Policy, 2013 is very significant effort on part of the
Government of India towards safeguarding the cyber security environment of our
Country, but there are certain grey areas and drawbacks which needed a review
and revision to make it more efficient for future complexities.38
Cyber security has been grabbing the attention of lawmakers and cyber experts for
the last few years and in view of the various government initiatives to turn Indian
economy into digital economy, this topic comes out to be as more significant
aspect to achieve that. Secure and safe cyber security infrastructure will definitely
prove to be a boon for Indian Economy and it’s status in International market.
“Can we secure the world from the bloodless war? I’m talking about cyber
security. India must take the lead in cyber security through innovation. I dream of
38
Available at : www.idsa.in/idsa comments/national cyber security
policy2013_stomar_260813. (Retrieved on 14 June, 2016).
14
Digital India where cyber security becomes an integral part of National security,”
Prime Minister Narendra Modi quoted on Cyber Security.39
1.9 Literature
39
Prime Minister Narendra Modi’s quote on cyber security. Available at :
http://www.ndtv.com/cheat-sheet /five-points-pm-narendra-modi-made-on-digital-india-
777199 and http://www.assocham.or g/event detail.php?id=1168#. (Retrieved on 14
June, 2016).
40
Pavan Duggal, Indian National Cyber Security Policy-A Lega; Analysis, Saakshar Law
Publications (15 January 2015).
15
1.9.1 Books
Ananda Mitra 42 in his book has discussed in detail all the disadvantages of
widespread internet in the international level .It has also highlighted various
computer crimes and types of cyber attacks being committed all over the world
and their impact on global arena. This book portrays how computers are equally
responsible for committing and stopping crimes.
Gurpreet S Dhillon 43 in his book has explained about various hurdles that
countries across the globe has to face in order to safeguard their cyber security
framework. This book enlightens that government plays a very important role in
diminishing the rising threats of cyber intrusions due to its financial and
infrastructure abilities and resources. This book covers and explains the many
cyber criminal activities such as online frauds, cyber stalking, Cyber bullying,
Virus attacks, malware attacks cyber forensics and Cyber terrorism.
41
Pavan Duggal, Indian National Cyber Security Policy- A Legal Analysis, Saakshar Law
Publications (15 January 2015).
42
Ananda Mitra. Digital Security: Cyber Terror and Cyber Security (The Digital World),
Chelsea House. ; 1 Edition (1 May 2010).
43
Dr. Gurpreet S Dhillon, Essentials of Cyber Security, Paradigm Books (14 May 2014).
44
Mark Johnson, Cyber Security, Law and Digital Intelligence, Gower Publishing Ltd.
(2013).
16
dependence, cyber risks have also increased which is growing each passing day.
This book analyses the importance of understanding the present cyber security
threats to face the unprecedented challenges as well as emphasising that cyber
security framework and digital capabilities are the necessary tools to effectively
retort to this challenge.
P.W. Singer and Allan Friedman 45 in their book highlights the importance of
cyberspace and all the positive and negative impact it has on society. Since the
above research has been undertaken to throw light on present cyber crime
situation, this books provides an insight to it. This book also discusses cyber
security issues from cybercrime to online freedom, politicians protecting their
Nation from new forms of attack, while planning new cyber wars with their
neighbours to get strategic advantage.
Nina Godbole, Sunit Belapure48 in their book has focused on cyber threats and
cyber security. This book explains the general concept of cyber security to help
researcher to understand the implications of cybercrime. The book explains the
45
P.W. Singer and Allan Friedman, Cyber Security and Cyberwar, Oxford University
Press (2014)
46
Raghu Santanam, M. Sethumadhavan and Mohit Virendra, Cyber Security, Cyber crime
and Cyber Forensics:--Applications and Perspective, Idea Group inc.(2010).
47
Roger W. Smith, Cybercrime - A Clear and Present Danger: The CEO's Guide to Cyber
Security, Create Space Independent Publishing Platform; 1 Edition (21 June 2014).
48
Nina Godbole, Sunit Belapure, Cyber Security: Understanding Cybercrime, Computer
Forensics and Legal Perspectives, Wiley India Ltd., (2011).
17
very significant legal framework of India dealing with cyber crime and cyber
security. This book covers both national and international aspect of this issue
while providing a list of cautionary steps for end users to avoid being a cyber
attack victim.
Nir Kshetri 49 in his book has examined and evaluated cybercrime in diverse
countries and to create its impact on international market and economy’s
affluence. Global cybercrime has become a flourishing financial industry today.
Nir Kshetri Appraises and compares the blueprints, description and progression of
cybercrime activities in chief areas and economies in the world such as Latin
America, China, India, Sub-Saharan Africa and the Caribbean, to analyse state
preparations and policies.
Pavan Duggal50 in his book, compares the legal legislation of various countries
regarding regulation of cyber crime. This book explains and highlight the other
significant issues such as right to free speech, right to privacy and legal legislation
related with these issues in India.
Pavan Duggal 52 in his book seeks to analyze the legalities concerning use of
WhatsApp in India. It also examines the role of this app in criminal activities as
well as legal provisions pertaining to its regulation in India.
49
Nir Kshetri, Cyber Crime and Cyber Security in Global South, Palgrave
Macmillan, (2013).
50
Pavan Duggal, Cyber Law, Free Speech & Privacy, Saakshar Publication, (30 December
2014).
51
Dr. M. Dasgupta Cyber Crime In India A Comparative Study, Eastern Law House
(2014).
52
Pavan Duggal, WhatsApp & Indian Cyber Law, Saakshar Law Publications, (15 January
2015).
18
1.9.2 Articles
Nalini R53 her article illustrates the history and origin of cyberspace. In this article
she described the advent of computer and its step by step evolution in India. She
has also highlighted the harmful effects of these cybercrime activities on an
individual, society and nation as a whole. She has divided the crime in cyber space
into three major categories i.e. crime against persons, crime against property and
crime against government. She has also given clear examples of such crimes and
discussed these in detail. She has also prescribed various recommendations to
strengthen our cyber policy. In this article she has analysed The Information
Technology Act 2000 in depth and points out its loopholes and drawbacks .she
also discussed in detail to how to plug in these loop holes and create a stronger
defence mechanism to deal with this growing menace.
Juhi Talati54 in her article has discussed in detail the loopholes in our judicial
procedure in matter of cybercrime and cyber criminals. This article emphasize that
proper judicial procedure and investigation of cyber offences are really important
to curb these increasing menace around the world. In this article she explains the
importance of various international conventions which provide guidelines to be
followed in matter of cybercrimes. She also described in detail that cyber crime is
not national issue but an international phenomena that needs to be addressed
through international covenants and treaties. She has tried to throw light on
various drawbacks of Indian Judicial system dealing with cyber criminal. She has
also illustrated that efforts made by Indian government in this direction are not
sufficient and effective to tackle this menace.
Pavan Duggal 55 in his article described in detail, the origin and history of The
Information Technology Act 2000.This article illustrates in depth all the step by
step procedure which led to the enactment of this Act. This article highlights all
53
Nalini R “Prevention of Cyber Crime”, available at : admin@legalserviceindia.com
December 13, 2012
54
Juhi Talati “Cyber Crime: Default in Success of Conviction due to lack of Jurisdiction”
available at : admin@legalserviceindia.com November 07, 2012. (Retrieved on 15 June,
2016).
55
Pavan Duggal “India: Cyberlaw In India: The Information Technology Act 2000” 6
September 2001, available at : www.mondaq.com. (Retrieved on 15 June, 2016).
19
the objectives that this Act seeks to achieve through this Act in detail. In this
article author has provided chapter wise detail and highlights its importance as
well as drawbacks of this Act. He has also explained all the positive sides and
negative side of this Act. This article points out how this Act may cause conflict
of jurisdiction in India. It also provides various measures to strengthen this Act by
amending it for its successful implementation.
Marco Gercke 56 in his article has tried to explain the advantages and risks
involved in the growing phenomena of cyberspace at a global level. It has offered
in deep investigation of following topics namely, effect of rising crime on
developing countries , concept of cybercrime , definitions and kinds of
cybercrime, ramifications of cybercrime offences , International elements of
cybercrime offences against the privacy, veracity and accessibility of computer
data and systems , growth of computer crime, anti-cybercrime policies,
cybercrime legislation as an vital part of a cyber security strategy , a cybercrime
strategy as preliminary stage and the responsibility of regulators in curbing
cybercrime etc.
Anoop Kumar Verma, Aman Kumar Sharma57 in their article depicts the diverse
challenges of cyber security in India and around the world. Cyber security is now
not restricted only to usage of Internet on a Desktop PC but securing information
on Tablets, smart phones as they became very important communication medium
because of technological advancements has grown up very rapidly in past few
years. This book highlights the importance of collaboration between various
stockholder of cyber space landscape such as politicians, scholars, IT experts,
industrialists, and community to counter the cyber crime hazard in India and in the
World.
56
Prof. Dr. Marco Gercke, “Understanding Cyber crime: Phenomena, Challenges and Legal
Response” September 2012, available at : www.itu.int/ITU-
D/cyb/cybersecurity/legislation.html. (Retrieved on 15 June, 2016).
57
Anoop Kumar Verma Aman Kumar Sharma “Cyber Security Issues and
Recommendations” Volume 4, Issue 4, April 2014 ISSN: 2277 128X, International
Journal of Advanced Research in Computer Science and Software Engineering Research
Paper, available at : www.ijarcsse.com. (Retrieved on 16 June, 2016).
20
Rupinder Pal Kaur58 in her article has covered variety of issues such as diverse
kinds of cyber crimes, cyber crime rate and comparison between the rate of cyber
crime occurred in 2012 with previous years. This article has thrown light upon
major cyber intrusion such as phishing, vishing, botnets, stalking etc with example
of some currently happened cases.
60
Atul M. Tonge1, Suraj S. Kasture, Surbhi R. Chaudhari in their article has
examined the significance of privacy for individuals as a fundamental human
right. Violations of human rights arise from the unlawful collection and storage of
personal data, the problems associated with inaccurate personal data, or the abuse,
or unauthorised disclosure of such data. This paper also includes the current
threats, issues, challenges and importance of IT sector in our society.
Beside above sources Government policies and parliamentary debates which are
available online provide insight regarding what Government is doing to strengthen
the cyber security of the Nation. All above research tools help the research scholar
to do up to date and comprehensive research on this issue
58
Rupinder Pal Kaur, ““Statistics of Cyber Crime In India: An Overview” IJECS Vol.
2, Issue 8, August, 2013 Page No.2555-2559.
59
Dr. Atul Bamrara “The Challenge of Cyber Crime in India: The Role of Government”
Pakistan Journal of Criminology, Vol. 3, No. 3, Jan, 2012, pp. 127 – 134.
60
Atul M. Tonge, Suraj S. Kasture, Surbhi R. Chaudhari “Cyber Security: Challenges for
Society- Literature Review” IOSR-JCE, Vol. 12, Issue 2 (May. - Jun. 2013), PP 67-
75, available at: www.iosrjournals.org. Retrieved on 16 June, 2016).
21
1.10 Research Problem
According to recent reports of International Data Corporation theft, the
number of devices connected to the internet will reach 30 billion in 2020,
up from estimated10.3 billion last year.61Broadband penetration in India is
only 10 per cent. By 2018, it will be 62 percent of India’s mobile data
traffic, and there will be 526 million internet users.62In this study, efforts
will be done to showcase that in today’s data-centric environment, where
huge amount of information is left online without any safety guards will
cause catastrophic losses.
During 2014-15 the government of India launched various schemes and
projects like Digital India, the UID scheme, the 100 Smart Cities Mission,
E-health, E-commerce, Mobile payment and Digi locker etc. 63 These
programmes will involve large scale digitisation, storage and transfer of
data, electronic collection of data from residents and processing, common
standard for interoperability between schemes and potential data sharing of
data.64 This study will try to throw light on the fact that without strong
cyber security policy these schemes might prove more harmful than
beneficial.
The unveiling of the National Cyber Security Policy in 2013 was a
welcome step in effort towards a secure cyberspace. However the policy
suffers from several shortcomings. In fact, the essential techno-legal
framework is still evolving in the country for emerging areas like Cyber
Forensics, e-Discovery, Encryption, Cyber Insurance, Cyber privacy and
Data-protection etc. The lethality and the sophistication of the cyber
61
International Data Corporation (IDC) (June 2015) Connecting the IOT: The Road to
Success, available at : https://www.idc.com/. (Retrieved on 15 June, 2016).
62
Sneha Maselkar & Madanmohan Rao "A billion mobile users: new startup profiles and
innovation insights from Mobile India 2016" 14th January 2016, available at :
https://yourstory.com/2016/01/billion-mobile-users-startup-profiles-innovation-insights-
mobile-india-2016/. (Retrieved on 16 June, 2016).
63
Krishna Prasad, Smitha,” Back to the Basics: Framing a New Data Protection Law for
India (January 30, 2018). Available at SSRN: https://ssrn.com/abstract=3113536
ohttp://dx.doi.org/10.2139 /ssrn.3 113536) (Retrieved on 17 Apr, 2018).
64
Ibid.
22
threats continue to grow at a menacing speed with every passing day. It is,
therefore, imperative to keep pace with the ever-changing threat scenario
by continually updating the techno-legal framework and our skill power
and technical complexities. So this study is most significant in present
scenario and will be relevant and helpful to general public and policy
makers.
1.11 Hypothesis
The enactment of National Cyber Security Policy, 2013 although, a step in right
direction but suffers from major shortcomings which needs to be rectified for
controlling cyber crime and successful implementation of various government
schemes and projects in India.
1.12 Objectives
1. To study the diverse and profound benefits of cyberspace in India and across
the globe.
2. To analyse the dark side of this phenomenon i.e. digital crime and all the
challenges it is posing today in front of every Nation whether Developed or
Developing.
2. To study the present legal landscape in India regarding cyber crime.
3. To evaluate and examine the effectiveness of National Cyber Security Policy,
2013.Also to see whether this policy is appropriate to handle the current problem?
1. Are there any benefits or advantages of cyberspace In India and around the
world?
2. Are there any negative effects of rising cyber crime and challenges?
3. Does India have effective legal landscape to counter the growing Cyber security
concerns?
4. Is the Present National Cyber Security Policy, 2013 sufficient to tackle the
current cyber crime scenario in India?
23
1.14 Scope of Study
Cyber security has primarily three components: prevention, defence and remedies.
This study mainly revolves around prevention and remedies. It includes cyber
security policy of India, legal provisions, law enforcement and investigation
agencies and role of judiciary in India. To find out the loopholes and drawbacks in
Indian policy a comparative and evaluative analysis is done between India and
Other developed Nations regarding Cyber Policies. The role of International
Organisations will also be assessed.
Cyber security in cyber space is very vast and never ending subject. It has various
components that cannot be studied in a single study. The present study will
discuss and analyse only the cyber security landscape in India which includes
legal provisions, regulatory authorities and National cyber security policy of India,
2013.
The main aim of this particular study is to analyse the National Cyber Security
Policy of India, 2013 and to exhibit the loopholes, gaps, ambiguities or
inconsistencies prevalent in it and to make suggestions for improvements in it. It
will be analytical study, so doctrinal research will be conducted in this study.
Tools of research will be secondary sources to throw light upon the importance,
logical coherence, consistency and technical soundness of this policy. Doctrinal
research is also helpful to make the law dynamic and cope with changing social
setup. Since cyber space is a Global phenomenon that is why it is not possible to
gather first hand data. The secondary data will be derived from the published
document and literature related to research problem i.e. case reports, standard
textbooks and reference books, legal periodicals, Parliamentary Debates and
Government Reports etc.
From the past one decade or so, internet has turn into a vital resource of
information and an efficient means of study. To collect latest information and data
regarding digital crime, help will be taken from electronic mail, e-journals, online
24
articles, online focus groups, online video conferencing and online questionnaire
to assess the present scenario in India and International landscape regarding cyber
crime. To throw light on the gravity of this phenomenon an analysis will be done
with the help of online articles, judicial proceedings in India, National and
International symposium, conventions and intensive courses held around the
world. The cyber Crime rate and incidents in India will be based on secondary
data available on the website of National crime report bureau of India which
provide statistics of National crime online and this data will be systematically
tabulated and arranged as per research problem. To collect data regarding
International Cyber Security policies of various Nations help will be taken from
both public and private libraries as well as online databases like SAGE, Elsevier
and Springer etc which provide latest and authentic information regarding the
relevant topics in this study. After retrieving the relevant information from various
countries, comparison will be drawn to understand the importance of cyber
security policies of different nations and their utility in combating cyber Crime.
The comparison would help us to formulate and develop effective concerted
strategies and policies to provide a strong deterrent to the menace of rising
cybercrime in India. The data analysis done in this study is based on an
interpretive qualitative research design.
1.17 Chaptrization
Chapter: 1 Introduction
The first chapter of this study explains the general concept related with cyber
space, cyber crime and cyber security. In this chapter there is brief description
about the definition, types and present scenario of cyber crime in India. There is a
general outline of the Information technology Act, 2000 and its shortcomings as
well as the Amended provisions of the Act. This chapter describes the various
literary resources such as books, articles etc. which provided insight as to what
has been done so far related to cyber crime in India. This chapter also highlights
the main objectives of the study, Hypothesis of the study, scope of the study,
limitation of the study and research methodology adopted to conduct the present
study.
25
Chapter: 2 The Concept and Genesis of Crime in Cyber space
The Second chapter of the study throw light upon the growth and genesis of crime
in cyber space. In this chapter a detailed analysis has been done to define the
meaning, growth, impact, types of cyber crime in India and various reasons for its
growth around the world. Another important topic that has been discussed here is
the criminal profiling and emerging trends relating to cyber space in India. This
chapter also analyses the meaning, importance and various benefits of having a
robust cyber security infrastructure in the country. Lastly there has been a brief
discussion on the national cyber Security policy of India released in 2013.
In Third chapter, there has been detailed study regarding the gravity of this issue
at a global level. This chapter discusses the cyber security framework of four
countries to highlight the strength and weaknesses of their strategies to understand
the global scenario regarding cyber crime. The cyber security strategies of U.S.A,
United Kingdom, Australia and Canada have been analysed to highlight the efforts
and action plans that are needed to counter the growing menace of cyber crime in
India. Above mentioned countries establish some guiding roadmaps that can be
followed by Indian organisations for strengthening the cyber security regime.
Further there has been comparative analysis of the strategies of above mentioned
countries to find out the most effective and successful strategy to regulate cyber
crime in India. Chapter concludes with explaining the basic guiding principles
regarding strengthening of cyber security policy of a country.
Chapter four of the study provide detailed analysis of the present regulatory
landscape in India which is responsible for controlling the growing cyber risks in
India. This chapter explains the roles and duties of various stakeholders
responsible for cyber security such as Home Ministry, Ministry of Defence,
Department of telecommunication(DoT), National cyber response centre Indian
computer emergency response team(CERTs), National information board(NIB),
26
National crisis management committee (NCMC), National information
infrastructure protection centre (NCIIPC), National disaster management of
authority (NDMA), Sectoral CERTs, and Central bureau of investigation (CBI)
Standardisation, testing and quality certification directorate(STQC), which are
designated as the principle regulatory agencies in India to manage cyber security
issues. This chapter also evaluate the present cyber regulatory landscape at global
level by highlighting the work done by major International agencies such as The
Commonwealth of Nations, The Group of Eight (G8), The European Union, The
United Nations, and G 20 (Group of Twenty) etc. This chapter also throw light
upon the few of the important cyber security international conventions to discuss
the role and work done to take action against rising cyber crime and promote
cyber safety across the globe. This chapter highlight the importance of
international organisations in harmonising the cyber security framework at global
level and improve cyber security scenario with mutual co-operation and harmony.
Chapter fifth of the study describes and analysis the present legal landscape
regarding cyber crime in India. This chapter provide detailed description of the
importance, growth, objectives, salient features and offences/penalties enlisted in
the Information technology Act, 2000 in India. Information technology Act, 2000
is the singular legislation concerning cyber offences in India. This chapter also
analysis Information amendment Act, 2008 and various offences and penalties
inserted through this amendment Act, in order to strengthen the cyber security
legal landscape in India. This chapter also examines the other important aspects of
cyber securities such as Intermediaries, data interception and monitoring
regulation and cyber law under other legal enactments such as Indian penal
code1860, The Indian Evidence Act, 1872, The Criminal Law (Amendment) Act,
2013, The Bankers’ Books Evidence (BBE) Act 1891,The Reserve Bank of India
Act, 1934. A critical analysis has been done of the present legal framework to
highlight the drawbacks and pitfalls of the Indian cyber legal framework. Chapter
also enlist various recommendations to strengthen the cyber security infrastructure
of the India.
27
Chapter: 6 National Cyber Security Policy of India 2013: An Analytical
Study
Chapter six of the of the study focuses on critical analysis of the national cyber
security policy of India released in July, 2013. This is the first cyber security
policy/strategy adopted by India to strengthen the cyber security infrastructure in
India. This chapter discusses in detail the reasons for adopting the policy, mission
of the policy, objectives enlisted and various strategies proposed to be adopted to
make Indian cyber space secure and safe in future from cyber intrusions. This
chapter highlights the various positive points of the policy and also critically
analyse the said policy while comparing it to foreign policies/strategies to point
out its flaws. This chapter also enlist few of the cyber security initiatives
undertook by the Indian government to secure our cyber space from impending
cyber attacks. Lastly this chapter proposes various recommendations to strengthen
the cyber security infrastructure in India.
Seventh chapter of the study investigates the various challenges faced by the
countries while regulating crime in cyber space. Just like cyber space, its
challenges are also vast and growing. This chapter analyse the jurisdictional
challenges, contractual challenges, political challenges and legal challenges in
general and in context to Indian landscape. This chapter also throw light upon the
various measures that needed to be taken in consideration by the Indian
government in order to strengthen the cyber security regime. This chapter
examines the different emerging trends in cyber space that is being witnessed in
India during the last few years such as E-governance in India, Cyber liability
Insurance in India, The Emergence of Social networking Sites and Services,
Cloud computing, Bitcoins-the Virtual Currency and Net Neutrality in India etc.
This chapter scrutinise the present cyber security landscape in India while
explaining the various challenges and emerging trends that has to be taken into
consideration while evaluating the true picture of present digital India scenario.
28
Chapter: 8 Conclusion and Suggestions
29
30