Cyberspace
Cyberspace
Cyberspace
INTRODUCTION
Two decades ago, the term cyberspace seemed right out of a science fiction movie.
In the second decade of the twenty-first century, cyberspace is probably the place
where most of us spend a major part of our lives. It has become an inseparable
element of our existence. In this article, we will look at what forms cyberspace and
the reasons why laws are important to ensure cyber security.
Cyberspace's core feature is an interactive and virtual environment for a broad
range of participants.
Cyberspace allows users to share information, interact, swap ideas, play games,
engage in discussions or social forums, conduct business and create intuitive
media, among many other activities. The term cyberspace was initially
introduced by William Gibson in his 1984 book, “Neuromancer.” Gibson
criticized the term in later years, calling it “evocative and essentially
meaningless.” Nevertheless, the term is still widely used to describe any facility
or feature that is linked to the Internet.
They can also manipulate electrical, magnetic, and optical impulses to perform
complex arithmetic, memory, and logical functions. The power of one computer is
the power of all connected computers termed as a network-of-network or the
internet.
Cyberspace is the dynamic and virtual space that such networks of machine-
clones create. In other words, cyberspace is the web of consumer
electronics, computers, and communications network which interconnect the
world.
Cyberspace is a concept describing a widespread, interconnected
digital technology. The term entered the popular culture from science fiction
and the arts but is now used by technology strategists, security professionals,
government, military and industry leaders and entrepreneurs to describe the
domain of the global technology environment. Others consider cyberspace to be
just a notional environment in which communication over computer networks
occurs.
The word became popular in the 1990s when the uses of the Internet,
networking, and digital communication were all growing dramatically and the
term cyberspace was able to represent the many new ideas and phenomena that
were emerging.
The term "cyberspace" first appeared in the visual arts in the late 1960s, when
Danish artist Susanne Ussing (1940-1998) and her partner architect Carsten
Hoff (b. 1934) constituted themselves as Atelier Cyberspace. Under this name
the two made a series of installations and images entitled "sensory spaces" that
were based on the principle of open systems adaptable to various influences,
such as human movement and the behaviour of new materials.
Atelier Cyberspace worked at a time when the Internet did not exist and
computers were more or less off-limit to artists and creative engagement. In a
2015-interview with Scandinavian art magazine Kunstkritikk, Carsten Hoff
recollects, that although Atelier Cyberspace did try to implement computers,
they had no interest in the virtual space as such:
To us, "cyberspace" was simply about managing spaces. There was nothing
esoteric about it. Nothing digital, either. It was just a tool. The space was
concrete, physical.
The term "cyberspace" first appeared in fiction in the 1980s in the work
of cyberpunk science fiction author William Gibson, first in his 1982 short story
"Burning Chrome" and later in his 1984 novel Neuromancer. In the next few
years, the word became prominently identified with online computer networks.
The portion of Neuromancer cited in this respect is usually the following:
Now widely used, the term has since been criticized by Gibson, who
commented on the origin of the term in the 2000 documentary
All I knew about the word "cyberspace" when I coined it, was that it seemed
like an effective buzzword. It seemed evocative and essentially meaningless. It
was suggestive of something, but had no real semantic meaning, even for me, as
I saw it emerge on the page.
Metaphorical
" The term "Cyberspace" started to become a de facto synonym for the Internet,
and later the World Wide Web, during the 1990s, especially in academic
circles and activist communities. Author Bruce Sterling, who popularized this
meaning, credits John Perry Barlow as the first to use it to refer to "the present-
day nexus of computer and telecommunications networks". Barlow describes it
thus in his essay to announce the formation of the Electronic Frontier
Foundation (note the spatial metaphor) in June 199
In this silent world, all conversation is typed. To enter it, one forsakes both
body and place and becomes a thing of words alone. You can see what your
neighbors are saying (or recently said), but not what either they or their physical
surroundings look like.
Town meetings are continuous and discussions rage on everything from sexual
kinks to depreciation schedules. Whether by one telephonic tendril or millions,
they are all connected to one another. Collectively, they form what their
inhabitants call the Net. It extends across that immense region of electron states,
microwaves, magnetic fields, light pulses and thought which sci-fi writer
William Gibson named Cyberspace.
— John Perry Barlow, "Crime and Puzzlement", 1990-06-08
As Barlow, and the EFF, continued public education efforts to promote the idea
of "digital rights", the term was increasingly used during the Internet boom of
the late 1990s.
Virtual environments
Although the present-day, loose use of the term "cyberspace" no longer implies
or suggests immersion in a virtual reality, current technology allows the
integration of a number of capabilities (sensors, signals, connections,
transmissions, processors, and controllers) sufficient to generate
a virtual interactive experience that is accessible regardless of a geographic
location. It is for these reasons cyberspace has been described as the
ultimate tax haven.
In 1989, Autodesk, an American multinational corporation that focuses on 2D
and 3D design software, developed a virtual design system called Cyberspace.
i), while networks between computers are called intranet. Internet (with a
capital I, in journalistic language sometimes called the Net) can be considered a
part of the system a). A distinctive and constitutive feature of cyberspace is that
no central entity exercises control over all the networks that make up this new
domain.
" This does not mean that the dimension of power in cyberspace is absent, nor
that power is dispersed and scattered into a thousand invisible streams, nor that
it is evenly spread across myriad people and organizations, as some scholars
had predicted. On the contrary, cyberspace is characterized by a precise
structuring of hierarchies of power.
The bill was passed in the budget session of 2000 and signed by President K. R.
Narayanan on 9 May 2000. The bill was finalised by group of officials headed
by then Minister of Information Technology Pramod Mahajan.
Section 72: If any person who has secured access to any electronic
record, book, register, correspondence, information, document or other
material without the consent of the person concerned discloses such
electronic record, book, register, correspondence, information, document
or other material to any other person, then he shall be liable to pay
penalty upto Rs.1,00,000/-, or Imprisonment upto 2 years, or both.
Section 72A: If any person who has secured access to any material
containing personal information about another person, with the intent to
cause or knowing that he is likely to cause wrongful loss or wrongful gain
discloses, without the consent of the person concerned, or in breach of a
lawful contract, then he shall be liable to pay penalty upto Rs.5,00,000/-,
or Imprisonment upto 3 years, or both.
Amendments
Offences
A person receives or
retains a computer
Receiving stolen Imprisonment up
resource or
computer or to three years,
66B communication device
communication or/and with fine up
which is known to be
device to ₹100,000
stolen or the person has
reason to believe is stolen.
If a person publishes or
transmits or causes to be
published in the electronic
form, any material which
is lascivious or appeals to
Publishing the prurient interest or if Imprisonment up
information which its effect is such as to tend to five years,
67
is obscene in to deprave and corrupt or/and with fine up
electronic form. persons who are likely, to ₹1,000,000
having regard to all
relevant circumstances, to
read, see or hear the
matter contained or
embodied in it.
Imprisonment up
If a person captures,
to five years,
publishes or transmits
or/and with fine up
images of a child in a
to ₹1,000,000 on
Publishing child sexually explicit act or
first conviction.
67B porn or predating conduct. If a person
Imprisonment up
children online induces a child into a
to seven years,
sexual act. A child is
or/and with fine up
defined as anyone under
to ₹1,000,000 on
18.
second conviction.
Persons deemed as
intermediatary (such as an
Imprisonment up
Failure to maintain ISP) must maintain
67C to three years,
records required records for
or/and with fine.
stipulated time. Failure is
an offence.
If the Controller is
satisfied that it is
necessary or expedient so
to do in the interest of the
sovereignty or integrity of
India, the security of the
State, friendly relations
with foreign States or
public order or for
preventing incitement to
the commission of any
cognizable offence, for
reasons to be recorded in
writing, by order, direct
any agency of the
Government to intercept Imprisonment up
Failure/refusal
69 any information to seven years and
to decrypt data
transmitted through any possible fine.
computer resource. The
subscriber or any person
in charge of the computer
resource shall, when
called upon by any
agency which has been
directed, must extend all
facilities and technical
assistance to decrypt the
information. The
subscriber or any person
who fails to assist the
agency referred is deemed
to have committed a
crime.
Imprisonment up
70 Securing access or The appropriate to ten years, or/and
Government may, by
notification in the Official
Gazette, declare that any
computer, computer
system or computer
network to be a protected
system.
NOTABLE CASES
Section 66
In February 2001, in one of the first cases, the Delhi police arrested two
men running a web-hosting company. The company had shut down a
website over non-payment of dues. The owner of the site had claimed that he
had already paid and complained to the police. The Delhi police had charged
the men for hacking under Section 66 of the IT Act and breach of trust under
Section 408 of the Indian Penal Code. The two men had to spend 6 days
in Tihar jail waiting for bail. Bhavin Turakhia, chief executive officer of
directi.com, said that this interpretation of the law would be problematic for
web-hosting companies.
In February 2017, M/s Voucha Gram India Pvt. Ltd, owner of Delhi
based Ecommerce Portal www.gyftr.com made a Complaint with Hauz Khas
Police Station against some hackers from different cities accusing them for
IT Act / Theft / Cheating / Misappropriation / Criminal Conspiracy /
Criminal Breach of Trust / Cyber Crime of Hacking / Snooping / Tampering
with Computer source documents and the Web Site and extending the threats
of dire consequences to employees, as a result four hackers were arrested by
South Delhi Police for Digital Shoplifting
Section 66A
CRITICISMS
In November 2012, IPS officer Amitabh Thakur and his wife social activist
Nutan Thakur, filed a petition in the Lucknow bench of the Allahabad High
Court claiming that the Section 66A violated the freedom of speech guaranteed
in the Article 19(1)(a) of the Constitution of India. They said that the section
was vague and frequently misused.
On 24 March 2015, the Supreme Court of India, gave the verdict that Section
66A is unconstitutional in entirety. The court said that Section 66A of IT Act
2000 is "arbitrarily, excessively and disproportionately invades the right of free
speech" provided under Article 19(1) of the Constitution of India. But the Court
turned down a plea to strike down sections 69A and 79 of the Act, which deal
with the procedure and safeguards for blocking certain websites.
The data privacy rules introduced in the Act in 2011 have been described as too
strict by some Indian and US firms. The rules require firms to obtain written
permission from customers before collecting and using their personal data. This
has affected US firms which outsource to Indian companies. However, some
companies have welcomed the strict rules, saying it will remove fears of
outsourcing to Indian companies
Section 69 and mandatory decryption
The Section 69 allows intercepting any information and ask for information
decryption. To refuse decryption is an offence. The Indian Telegraph Act,
1885 allows the government to tap phones. But, according to a 1996 Supreme
Court verdict the government can tap phones only in case of a "public
emergency.
But, there is no such restriction on Section 69. On 20 December 2018,
the Ministry of Home Affairs cited Section 69 in the issue of an order
authorising ten central agencies to intercept, monitor, and decrypt “any
information generated, transmitted, received or stored in any computer.” While
some claim this to be a violation of the fundamental right to privacy, the
Ministry of Home Affairs has claimed its validity on the grounds of national
security.
Conclusion