Chapter-I: 1.1 General
Chapter-I: 1.1 General
INTRODUCTION
1.1 General
“However nowadays Crime wave is measured in minutes and hours rather
than in months and years.1 The globe is being recreated in the image of a global
community thanks to the new electronic interdependence. 2 If you know the enemy
and know yourself you need not fear the results of a hundred battles. If you only
know yourself and not the enemy, every victory will be followed by a defeat. You
will lose every war if you don't know yourself or your opponent.”3
Crime is eternal; it has existed since the dawn of civilization and will
continue to exist indefinitely. Criminals will modify their tactics as long as
society improves its safeguards. 4 Since man's fall, crime and criminality have
been associated with him. Crime is elusive, and it always tries to hide in the face
of progress. Depending on the nature and scope of the crime, many countries have
implemented different ways to combat it. 5 Because the link of family was
significantly stronger than that of the community, the injured party and his
kindred may avenge the injustice through private vengeance and self-redress prior
to the 10th century, and resort to legal remedies was considered merely an
optional alternative to self-redress.6
At the time, the wrongdoer was required to compensate the victim, with the
amount of compensation determined by the severity of the wrongdoing and the
victim's social rank. In comparison to present times, the law did not compel the
regulation of social connections in the early days. During the 12th and 13th
centuries the Early English society included only those acts as crimes if
committed against the state or the religion not others. During the early societies,
there was no distinction between the law of crime and the law of torts, and these
communities solely followed the law of wrongs. When an offence is committed in
1
D.S. Wall, Cyber Crime: The Transformation of Crime in the Information Age, 2007, p. 3.
2
Marshall Herbert MeLuhan, “The Promise of Global Networks”, Annual Review of Institute for
Information Studies, 1999, p. 6.
3
Sun Tzu and Col. John M. Fabry, Cybercrime, Cyber Terrorism and Network Warfare: The Next
Generation of Concerns for Users of Networked Information Systems, 1999, p. 161.
4
Anwar M.S. Masadeh, Combating Cyber Crimes- Legislative Approach- A Comparative Study,
p.6, available at: http://www.almeezan.qa/ReferenceFiles.aspx?id=54&type=doc&language=en
(visited on March 21, 2017).
5
Aghatise E. Joseph, “Cyber Crime Definition”, Cyber Crime Research Centre (Last modified on
June 28, 2006), available at: http://www.scribd.com/document/195552552/Cybercrime-Definition
(visited on Feb. 22. 2017).
6
Amita Verma, Cyber Crimes & Law, 2009, p. 34.
1
modern legal systems, the law is applied immediately regardless of the wishes of
the victimized party, but in early cultures, the law was initiated only when both
parties agreed to submit to the judgments. During the 18th century, also known as
the "miracle reorientation" period in criminology, it was thought that only the
wrongdoer could confess criminal responsibility for his conduct, and that no one
else, even external agents, had any involvement. with it. At that time it was clear
that the concept of crime is interlinked with social policy of that time.
The scientist is well-versed in the approach for locating criminals who are
engaged in illicit activity and avoiding notice because the chance of being caught
is reduced.
Following this, there was an increased need for a fresh strategy to crime
and criminals in order to battle the new situations and criminals. In criminology,
it has been rightly said that a crime will happen where and only when the
opportunity avails itself. Before this we were known only about the traditional
types of crimes like murder, rape, theft, extortion, robbery, dacoity etc. But now
with the development and advancement of science and technology i.e. computers
and internet facilities, new types of crimes exist like hacking, cyber pornography
etc.
The internet has transformed the entire planet into a global village. It has
established a virtual world with no boundaries, allowing people to improve both
personal and professional interactions beyond national boundaries. The rise of
globalisation has had a significant impact on the socioeconomic and cultural
aspects of society. Human civilization has benefited from cyberspace. Internet has
connected people around the globe. 8 It is a powerful tool for development,
paradoxically it is a double edged sword providing opportunities for government
business industry etc. to develop and operate reaching the international landscape
at the same time equipping the greed motivated individuals with risk free
7
N.V. Paranjape, Criminology and Penology, 2007, p. 4.
8
Tanaya Saha and Akanchs Srivastava, “Indian Women at Risk in the Cyber Space: A Conceptual
Model of Reasons of victimization, International Journal of Cyber Criminology, vol. 8 No. 1,
Jan.- June, 2014, pp. 57-58, available at: http://www.cybercrimejournal.com/ sahasrivastavatalijcc
2014 vol8issue1.pdf (visited on March 6, 2017).
2
opportunities of committing crime.9
Today, the time is that the security of our nation, the viability of our
economy and the health of our citizen is relied on infrastructures for
communication, finance, energy distribution, and transportation which completely
depend on networked information systems. The challenge posed by crimes
initiated or committed through the online environment is not so much their
identification as the nature of the environment in which they are committed.
9
Mohammad Talib and Virginiah Sekgwathe, “E-Crime: An Analytical Study and Possible Ways
to Combat”, International Journal of Applied Information Systems, vol. 2, No. 2, May, 2012, p. 1,
available at: http://research.ijais.org/volume2/number2/ijais12-450261.pdf (visited on March 21,
2017).
10
Anirudh Rastogi, Cyber Law- Law of Information Technology and Internet, 2014, p. 2.
11
M. Dasgupta, Cyber Crime in India- A Comparative Study, 2009, p. 1.
12
Supra note 3.
3
Cyber criminals can operate from anywhere in the world, targeting large groups
of people or businesses across international borders, and the scale and volume of
the crimes, as well as the technical difficulty of identifying the perpetrators and
the need to work internationally to bring them to justice, all pose challenges.
In India, the legal framework for cyber world was found in the form E-
Commerce Act, 1998. After this, a need was felt of having the basic law which
covers all the areas of cyber world then in May, 2000 the Parliament of India
passed the Information Technology Act, 2000 with the objective to combat cyber
crimes and to provide a legal framework for e-commerce transactions. In India
13
Donn B. Parker, “Automated Crime in Cyber Crime”, International Conference Course Book,
1997.
14
Farooq Ahmad, Cyber Law in India- Law on Internet, 2008, p. 367.
15
Veer Singh and B.B. Parsoon, “Cyber Crimes and the Need for National and International
Legal Control Regimes”, PULR, vol. 44, 2002, p. 39.
16
D. Latha, Jurisdiction Issues in Cybercrimes, Law Weekly Journal, vol.4, 2008, p. 85,
available at www.scconline.com, (visited on July 25, 2015).
17
Guillaume Lovet Fortinet, “Fighting Cybercrime: Technical, Juridical and Ethical Challenges”,
Virus Bulletin Conference, 2009.
4
this was the very first cyber legislation which is specifically deals with
cybercrimes. It deals with the various types of offences which is done in the
electronic form or concerning with computers, computer systems, computer
networks. This Act amends many provisions of our existing laws i.e. Indian Penal
Code, 1860; the Indian Evidence Act, 1872; the Bankers Book Evidence Act,
1891 and the Reserve Bank of India Act, 1934.
The United State of America enacted several Federal and State laws for
the protection of computer, computer system and computer network from various
forms of cyber crimes i.e. Computer Fraud and Abuse Act, 1986; Data Protection
Act, 1998; Patriot Act, 2001; Child Pornography Prevention Act, 1996 and the
Child Online Protection Act, 1998; Communication Decency Act, 1996; CAN-
SPAM Act, 2003; Anti-Cyber Squatting Consumer Protection Act in 1999 etc.
but still cyber crimes are happening day-by-day and United States is considered
as the birth place of these crimes.
The United Kingdom has also enacted several legislations for combating
the cyber crimes like Data Protection Act, 1984; Access to Personal Files Act
1987, Copyright (Computer Software) Amendment Act 1985, Interception of
Communications Act 1985, Local Government (Access to Information) Act 1985,
and Electronic Communication Act 2000. But the problem of cyber crime is not
18
“Supreme Court of India: To Hear Eight IT Act Related Cases on 11 th April 2014- SFLC”,
available at: http://www.medianama.com/2014/03/223-supreme-court-of-india-to-hear-eight-it-
act-related-cases- on-11th-april-2014-sflc/ (visited on June 29, 2016).
19
Samiksha Godara, “Prevention and Control of Cyber Crimes in India: Problems, Issues and
Strategies”, A Thesis submitted to Maharishi Dayanand University, April 1, 2013, p. 2, available
at: http://shodhganga.inflibnet.ac.in/bitstream/10603/7829/12/12_chapter%203.pdf (visited on
May 20, 2016).
5
resolved yet in spite of lots of legislation.
1. Dr. Amita Verma in her book “Cyber Crimes & Law”21 has discussed
every concept which is related to cyber crimes like cyber space, computer,
internet, information technology etc. She has comprehensively mentioned
the early concept of crime, its elements and now the status of crime which
is emerged as cyber crime, its nature, essential elements, scope,
characteristics, different basis of classifications etc. because she mentioned
it in her book as the new species of crime. According to her cybercrime
has recently become a catchy term for a group of security issues in
cyberspace. She has also stated that cyber crime is the deadliest epidemic
20
Supra note 9.
21
Dr. Amita Verma, Cyber Crimes & Law (Central Law House Publications, Allahabad, 2009).
6
confronting our planet in this millennium.
She has classified cyber crimes on different basis i.e. victims of cyber
crimes includes cyber pornography, cyber stalking, cyber harassment, cyber
defamation etc.; computer as a target or tool includes cyber fraud, theft, sabotage
of computer, cyber hacking etc.; based on cyber offenders, cyber crime done
against various groups like industry, institution, business, government entity,
trade, military and intelligence agency etc.; civil or criminal liability and also
based on role played by the computers. According to her hackers, phreaks,
information merchants and mercenaries, terrorists, extremists and deviants are the
cyber offenders.
She has also discussed the role of judiciary at national and international
level for combating the growth of these types of computer related crimes. She has
also elaborately explained the legislative approach towards the emerging national
and international control regimes and status of civil or criminal liability of these
crimes in the contemporary time period. She has mentioned the challenges faced
by criminal justice system due to the origin of this new species of crime in
modern time.
After stating all the relevant provisions of law, at the end she has made
some suggestions, if implemented effectively and in a coordinated manner, it
would go a long way to make this scientific wonder of all ages sustainable not
only for this generation but also for many more generations to come.23
22
Id, p. 8.
23
Id, p. 464.
24
Dr. M. Dasgupta, Cyber Crime in India: A Comparative Study (Eastern Law House Pvt. Ltd.,
Kolkata, 2009).
7
terrorism in India with the laws applicable in United States and United
Kingdom. He has also defined the concept of crime, cyber crime, its
nature, elements, characteristics and classifications etc. He has
acknowledged in the preface of his book that cyber crime is one of the
emerging branches of law which is becoming socially relevant at a rapid
pace as it is the result of boom in information technology whose impact is
all pervasive and with far reaching consequences in different fields.
While discussing about the nature and commenting on the scope of cyber
crimes, he has stated that “it is very essential to emphasise that the world is not
run by weapons anymore, or energy, or money. It is run by ones and zeros….little
bits of data….it is all electrons. There’s a war out here, a world war. It is not
about who has the most bullets. It is about who controls the information- what we
see and hear, how we work, what we think etc. It’s all about information”25
3. Dr. Talat Fatima in her book “Cyber Crimes”28 has explained all the
concepts relating to cyber space and cyber crimes starting from the history
of telegraph to telephone to computers. She has also traced the concept of
crime from primitive to information society. In her study, she has
discussed the traditional and modern approach to crime and its elements.
She has stated cybercrimes as a deviance from traditional crimes. She has
also highlighted the evolution of criminal law, criminal justice system,
cyber crimes and taxonomy of cybercrimes. She has exhaustively
discussed the meaning, concept, nature, characteristics, scope, classifications
and other related concept of cyber crimes. According to her cyber crimes
are the crimes unknown to the legal world prior to the birth of the internet
and include not only acts which are employed to commit traditional crimes
using the net but also those crimes which are committed thoroughly and
exclusively using internet.29
She acknowledges in the preface of her book that the her work is inspired
by writers like Chris Reed, Ian Walden, Margaret J. Radian, Don Parker, Graham
J.H. Smith, Y. Akdeniz, D.S. Wall etc. She has analysed the legal complexities
which arise due to presence of an array of foreign components on the entire cyber
crime scene. She has also analysed the vulnerabilities in the transient regime of
the cybercrimes as these elusive crimes present unprecedented challenges to the
27
Ibid.
28
Dr. Talat Fatima, Cyber Crimes, (Eastern Book Company, Lucknow, 2011).
29
Id, p. 91.
30
Id, p. 78.
9
legal world. She has also critically pointed out the jurisdictional issues and legal
liability in cyberspace. Her book covers the latest topics i.e. SMS Spoofing,
hacking by Trojan Horse, Logic Bomb, threat to privacy by Cookies, Web bug,
very-chip, WoZNet chip, spyware and adware etc.
After analysing systematically at the end she has suggested that crime
knows no frontiers. The criminal has no sense of patriotism, humanism or
jurisprudence. But the crime of the modern age being borderless, the accusatorial
laws have to take international character.31 She has mainly made suggestions in
the area of substantive criminal law and in the procedural law. She has also
suggested the preventive and enforcement strategies for dealing with these types
of crimes.
4. Justice Yatindra Singh in his book “Cyber Laws”32 has mentioned the
meaning, concept, nature and importance of intellectual property rights i.e.
trademarks, copyrights, patents etc. on cyber space. According to him,
intellectual property rights refer to the property that is a creation of the
mind
i.e. inventions, literary and artistic works, symbols, names, images and designs
used in commerce.33
In his book, he has properly analysed the cyber laws in order to sort out the
legal issues by explaining the science behind the new emerging technology. He
has mentioned the concept of digital signature, electronic signature and all the
relevant provisions relating to it including with procedure of authentication and
recognition of it. He has also through light on the electronic governance with
relevant provisions given under the Information Technology Act, 2000 as
amended by Amendment Act, 2008. He analysed that the internet has brought
Considering the fact that most of the software companies enter into the
‘Invention and Proprietary Information Agreement (IPIA)’ with their employees,
he has also added the new chapter in his book and explained it with all relevant
provisions.
He has critically analysed and pointed out the powers and functions of the
cyber Regulatory Appellate Tribunal, Controller of Certifying Authorities,
Adjudicating Officers and Police officers under the Information Technology Act.
35
Vakul Sharma, Information Technology: Law and Practice, (Universal Law Publication, Co.,
Delhi, 2010).
36
Dr. Jyoti Rattan, Cyber Laws & Information Technology (Bharat Law House Pvt. Ltd., New
Delhi, 2014).
11
civil and criminal cases.
He has pointed out that the discussion about the cyber crime has been
dominated by the media and the politicians who often act without knowing about
the nature of such crimes. He stressed on the introduction of new laws for the
satisfaction of corporate and State needs. In his work, he provides all the relevant
material and the scientific framework for the analysis of his research problem.
He has properly analysed all the relevant provisions of cyber laws in order
to sort out the legal issues by explaining the science behind the new emerging
technology. He has mentioned the concept of digital signature, electronic
signature and all the relevant provisions relating to it including with procedure of
authentication and recognition of it. He has also through light on the electronic
governance with relevant provisions given under the Information Technology
Act, 2000 as amended by Amendment Act, 2008. He has also mentioned all the
cyber offences recognised and punishable under Information Technology Act,
2000 as amended by Amendment Act, 2008.
11. R.K. Chaubey in his book “An Introduction to Cyber Crime and
Cyber Law”43 has introduced the cyber crime including its meaning,
40
Id, p. 18.
41
Id, p. 2.
42
Rodney D. Ryder, Guide to Cyber Laws (Information Technology Act, 2000, E-Commerce,
Data Protection and the Internet), Wadhwa Publication, (2001)
43
R.K. Chaubey, An Introduction to Cyber Crime and Cyber Law, Kamal Law House Publication,
(2009)
14
concept, nature, characteristics, various classifications etc. He has
discussed all the relevant provisions of cyber law dealing with cyber
crimes in cyber age. According to him, cyber crime is a latest type of
crime which affects the huge number of peoples in cyber age. He has
pointed out that it is increasing day-by-day as a greater challenge for law
investigators, law makers, law protectors and law researchers in the cyber
age. He has stressed on the concept of privacy and suggested for adopting
the privacy policies by websites at national and international level.
Computers and the internet can be used to amass huge amount of data
regarding people, profile it in various ways, modify it and deal with it in a manner
which could violate individual’s privacy.44
12. Dr. Farooq Ahmed in his book “Cyber Law in India”45 has explained
the concepts of computer, internet with its evolutionary history. He has
discussed all relevant concepts pertaining to cyber crimes. He has
classified the cyber crimes on the basis of nature and purposes of the
offence and broadly grouped into three categories depending upon the
target of the crime. It may be against person, property or Government.
While emphasizing the present scenario of cyber crimes, he has stated that
“amidst the surging excitement and interest, however, runs a deep thread of
ambivalence toward connecting to the Internet. The Internet’s evil twin is the
home of Bad Guys- hackers, crackers, snackers, stalkers, phone phreaks and
other creepy web crawlers. Business fear that the Infobahn could suddenly veer
into the highway to Hell.”46
The main concern of his work is to address and to point out that the scope
of the cyber crime is itself changing rapidly with the evolution of the information
technology and the scale at which it is used, or often misused. He has also
discussed the concept of intellectual property rights i.e. trademarks, copyrights,
patents and domain name dispute on cyber space.
14. Vivek Sood in his book “Cyber Law Simplified”48 has discussed about
all the legal issues relating to cyber crimes, electronic evidence, its
relevancy, investigation procedure for dealing cyber crimes etc. He has
made the harmonious analysis of key provisions of the Information
Technology Act, 2000. He has explained all the concepts in a simple way
which would provides us the clear understanding of all the areas like
business, commerce, tax, information technology and human resources etc.
His book suggested solutions for various cyber legal problems. He has
given the suggestion for the application of various strategies to combat
cybercrimes and how to investigate these crimes. He also suggested for enhancing
the cooperation between the nation and the law enforcement agencies for bringing
the cyber criminals before law. His work successfully made an effort to facilitate
the legal planning, decision making and cyber legal compliance in the cyber
world. Moreover, he also stressed on the implementation of the extradition
Anirudh Rastogi, Cyber Law- Law of Information Technology and Internet (LexisNexis, 2014).
47
Vivek Sood, Cyber Law Simplified, (Tata Mcgraw- Hill Publishing Company Limited, New
48
Delhi, 2008).
16
treaties in the cyber age.
In his book he has made efforts to investigate and find out the relevant
legislation and judicial trends towards cyber crimes and cyber criminals. He has
also traced the origin of these types of crimes and its impact on the criminal
justice administration system. He has suggested that there is a need of
international cooperation between nations for curbing the cyber crimes.
16. Nandan Kamath in his book “Law relating to Computers, Internet and
E- Commerce: A Guide to Cyber Laws and the Information
Technology Act, 2000”50 has discussed about the legislative approach
towards computes, internet and e-commerce in cyber age with special
reference to Information Technology Act, 2000. According to him, the
internet has emerged as a means with immense potential which poses new
challenges in the recent times. He said that it is not surprising if any one
says that there are have been many attempts to control this crime through
the laws and regulations.
49
Dr. Vishwanath Paranjape, Legal Dimensions of Cyber Crimes and Preventive Laws with
Special Reference to India (Central Law Agency Publication, 2010).
50
Nandan Kamath, Law relating to Computers, Internet and E-Commerce: A Guide to Cyber
Laws and the Information Technology Act, 2000 (Universal Law Publishing Co., 2009).
17
and cyber porn to the regulation of free speech on the net and the right to privacy.
He has also employed the comparative approach on the legislations.
17. Dr. Pawan Duggal in his book “Text Book on Cyber Law”51 has
comprehensively and simply discussed the emerging developments in
cyber law and its legal consequences and control mechanism for
understanding the phenomenon of cyber crime. This book covered not
only the emerging developments in cyber law but also the dark side of
Internet and World Wide Web with its consequences. He has covered all
the concepts relating to cyber crime. According to him, cyber law is a
phenomenon which is the most latest and complex in legal jurisprudence.
18. V.D. Dudeja in his book “Cyber Crime and the Law”52 has discussed
the new type of crime which has come into existence due to the use of
information technology, computer, internet and its advancement. He has
highlighted the various concepts relating to cyber crime and all the
relevant provisions of cyber laws. He has emphasized on the significance
of freedom of expression with reference to use of internet and suggested
that some reasonable restrictions can also be put on the use of computers
and internet in the interests of privacy and security purposes so that the
law can recognize the computer as a ‘weapon of offence’ as well as a
‘victim of offence.’ He has suggested various measures for the prevention
of these types of crime which are increasing day-by-day in the cyber
world.
They have provided various suggestion with the help of which anyone can
understand how to identify the inappropriate use of corporate information
technology, examine computer environments to identify and gather electronic
evidence of wrongdoing, secure corporate system from further misuse, identify
individual responsible for engaging in inappropriate acts taken with or without
corporate computing system and protect and secure electronic evidence from
intentional and accidental modification or destruction. They have suggested the
essential procedures for protecting the corporate assets.
54
Peter Stephenson, Investigating Computer- Related Crime (CRC Press, New York, 2000).
19
cyber crime scene assessment.
21. Chris Reed in his book “Internet Law Text and Materials”55 has
discussed the internet laws globally as compared to other available
materials on internet laws. His work is praised by many authors because he
uniquely examined the internet laws globally. In his book he
fundamentally analyzed those legal problems and principles which are
common to all countries. By analysed his book a researcher can easily
understand the true nature of a particular legal problem and to be able to
apply adequate legal rules to a problem.
23. Bary C. Collin in his book “The Future of Cyber Terrorism”57 has
discussed classifications of cyber crimes but mainly stressed on cyber
terrorism. In his book he has examined the concept, history, evolution and
modes of cyber terrorism. According to him, cyber terrorism is a crime
against humanity. In his book he has also critically analysed the global
initiatives which are taken to prevent and control cyber terrorism.
iii) to discuss the various cyber offences punishable in India under the
Information Technology Act, 2000 and also to examine the role of
judiciary in the implementation of Information Technology Act, 2000 with
the purpose to check whether the existing legal framework has been able to
cure the problem of cyber crimes.
iv) to analyse the international legislative and judicial response towards the
cyber crimes specially deals with the United States of America and United
Kingdom.
The purpose of this study is to see if there are any shortcomings or gaps
21
between the cyber laws of India and the United States of America (USA) and the
United Kingdom (UK), as well as a review of judicial trends in the interpretation
of current cyber laws. The necessary information for this study was gathered from
both primary and secondary legal sources. The researcher primarily relied on the
cyber legislations of the countries studied, namely India, the United States of
America, and the United Kingdom, as well as decided case laws of the courts in
India, the United States of America, and the United Kingdom, Law Commission
Reports, and all other information available on the official websites. The
researcher also used secondary materials such as law dictionaries, legal journals,
law reviews, periodicals and newspapers, and legal theories, as well as text books
on cyber law by prominent writers from these three nations, as noted above.
22
propositions by way of analysing the existing statutory provisions and case laws
by applying the reasoning power. An attempt has been made to verify the
hypothesis through legal reasoning or rational deduction by analyzing the primary
and secondary sources of law including legislations, case laws, text books on law,
commentaries and official websites etc. The present research work also factually
relies on academic writings and newspaper reports to access the impact of cyber
crimes. The purpose of using this methodology is to ascertain a legal rule for
solving the problem of cyber crimes at national and international level and to
arrive at certain conclusion and to give suggestions.
1.7 Hypothesis
Hypothesis means an idea, supposition or proposed explanation which is
made as a starting point of further investigation without any assumption of its
truth on the basis of limited evidences or reasoning power. In simple words it is a
tentative statement the validity of which is yet to be tested. It may be proven
correct or wrong because it is based on supposition which is provisionally
accepted in order to interpret certain events or phenomenon and to provide
guidance for further investigation. The hypothesis formed for the present study is
mentioned as under:
23
CHAPTER-II
MEANING, CONCEPT AND CLASSIFICATION
OF CYBER CRIMES
2.1 Introduction
“It is critical to emphasise here that the globe is no longer ruled by
weapons, oil, or money. It is controlled by ones and zeros.... little pieces of
data.... It's all about electrons. There is a world war going on out there. It isn't a
competition to see who has the most bullets. It's about who has power over what
we see and hear, how we work, and what we think. It's all about the data.” The
film follows the use of information technology to conduct theft on the
superhighway, with information serving as the commodity. 59
Social networking services have grown in popularity since the turn of the
millennium. Many people have used these sites to express themselves, make new
acquaintances, and reconnect with old ones. 60 Unfortunately, cyber criminals
have taken use of these sites to further their nefarious goals. People have started
to spend more and more time on such networks in recent years as they have
become increasingly reliant on them. The advancement of information technology
has an impact on people's lives all around the world in the current day. Every day,
new technologies and discoveries broaden the scientific reach while also posing
new problems for scientists for legal world. With the widespread growth of these
technology leads to commission of new types of crimes today on the cyber space
and also has become matter of global concern in future.
59
M. Dasgupta, Cyber Crime in India- A Comparative Study, 2009, p.8.
60
David Decary Hetu and Carlo Morselli, “Gang Presence in Social Network Sites”, International
Journal of Cyber Criminology, vol. 5 No. 2, July- Dec., 2011, p. 876, available at: http://
www.cybercrimejournal.com/davidcarlo2011julyijcc.pdf (visited on Oct. 8, 2012).
61
Farooq Ahmad, Cyber Law in India- Law on Internet, 2008, p. 367.
24
These attacks do not target a physical body, but rather a person's or
company's virtual body.
The Internet has also evolved into a new medium for wrongdoing, such as
threatening, harassing, intimidating, and injuring others. A harmful divergence
exists between the social (norms, legislation) and environmental (computer
availability) limits of computer criminal activity, which is a direct effect of
technological lobalization.63 Despite the fact that computers and the internet have
such a large impact on people's daily lives, just a small percentage of individuals
understand what they are.64 There is a need for a systematic study that thoroughly
examines the fundamental ideas of crime, cyber crime, cyber space, and cyber
security.
Concept of Cyberspace
William Gibson coined the phrase "cyber space," which he later described
as "an evocative and basically meaningless" buzzword that could be used as a
cypher (a text transformed to disguise its meaning) for all of his cybernetic ideas.
62
Steven D. Hazelwood and Sarah Koon Magnin, “Cyber Stalking and Cyber Harassment
Legislation in the United States: A Qualitative Analysis”, International Journal of Cyber
Criminology, vol. 7 No. 2, July- Dec., 2013, p. 155, available at: http://www.cybercrimejournal.
com/haze lwoodkoonmagninijcc2013vol7issue2.pdf (visited on Dec. 19, 2014).
63
Kathryn Seigfried- Spellar, Individual Differences of Internet Child Pornography Users:
Peculiar Findings in a Community Based Study, International Journal of Cyber Criminology, vol.
7 No. 2, July- Dec., 2013, p. 141, available at: http://www.cybercrimejournal.com/seigfried
spellarijcc 2013vol7issue2.pdf (visited on Feb. 22. 2017).
64
S.C. Sharma, “Study of Techno- Legal Aspects of Cyber Crime and Cyber Law Legislations”,
Nyaya Deep, 2008, p. 86.
65
Jyoti Ratan, Cyber Laws & Information Technology, 2014, p. 48.
25
worldwide electronic community with real-time communication and no physical
boundaries.66
66
Anirudh Rastogi, Cyber Law- Law of Information Technology and Internet, 2014, p. 2.
67
Supra note 7.
68
Veer Singh and B.B. Parsoon, “Cyber Crimes and the Need for National and International
Legal Control Regimes”, PULR, vol. 44, 2002, p. 39.
69
Supra note 7.
70
Krishan Pal Malik, Computer & Information Technology Law, 2010, p. 71.
71
Lawrence Gomes, “Cyber Crimes”, Criminal Law Journal, vol. 4, 2001, p. 185.
72
Available at: http://en.wikipedia.org/wiki/Cyberspace#cite_note-3 (visited on June 6, 2016).
26
public opinion from time to time, nation to country, and even within the same
country, from decade to decade," as it has been said.73
Crime is eternal; it has existed since the dawn of civilization and will
continue to exist indefinitely.
To better grasp the concept of crime, an attempt has been made to explain
it from the beginning to the present day.
The following are the explanations for these two time periods:
if committed against the state or the religion not others. There was no
recognition of distinction between the law of crime and torts during the early
societies and these societies only follow the law of wrongs. After entering into the
modern legal systems the law is administered at once irrespective of the wants of
the suffered party as soon as an offence is committed but in early societies the law
73
R.C. Nigam,” Law of Crimes in India”, Principles of Criminal Law, vol. 1, 1965, p. 3.
74
Anwar M. S. Masadeh, Combating Cyber Crimes –Legislative Approach– A Comparative Study,
p. 6, available at: http://www.almeezan.qa/ReferenceFiles.aspx?id=54&type=doc&language=en
(visited on March 21, 2017).
75
Aghatise E. Joseph, “Cyber Crime Definition”, Cyber Crime Research Centre (Last modified on
June 28, 2006), available at: http://www.scribd.com/document/195552552/Cybercrime-Definition
(visited on Feb. 22. 2017).
76
Amita Verma, Cyber Crimes & Law, 2009, p. 34.
27
was set into motion only when both the parties wants to submit themselves to the
judgement. During the period of 18th century also called as an era of miraculous
reorientation in criminology, it was believed that only the wrongdoer himself
could admit his criminal responsibility for his crime and no one including any
external agencies had anything to do with it. At that time it was clear that the
concept of crime is interlinked with social policy of that time.
Crime was less common in ancient society, when many aspects of human
life such as agriculture, political institutions, health services, medical science, and
basic amenities of life were still in their infancy. When it did occur, it was simple
in nature and stemmed from baser human instincts such as lust, greed, vengeance,
jealousy, and sexual drive.77 Physical force, body muscles, and intimidating tools
were also claimed to have been used in the past to perpetrate crimes..
The law is always changing, adding new crimes to the catalogues while also
revising, adjusting, and eliminating previous ones. In the field of crime, there have
been remarkable changes.81 The evolving concept of crime depends on the progress of
human beings in society all over the world. Because a crime in one country may not
be a crime in another, and a crime at one period may not be a crime at another, and
77
Talat Fatima, Cyber Crimes, 2011, p. 61.
78
N.V. Paranjape, Criminology and Penology, 2007, p. 4.
79
Supra note 15, p. 36.
80
Supra note 19, p. 62.
81
Supra note 18, p. 36.
28
vice versa, the notion of crime takes on diverse meanings in different countries at
different times.
Instead of months and years, crime waves are now recorded in hours and
minutes.82
Its unabated growth can be attributed to all of the social and economic
reasons, but it also has additional reasons, such as its ability to provide reasonable
anonymity to criminals and the insignificance of geographical borders, making
jurisdiction completely impossible to define and giving criminals a fair chance to
avoid legal action, which encourages them to go further.. Therefore, concept of
cybercrime finds its explanation in all those in other crimes with additional
features of its vastness, anonymity and lack of legal control regimes.83
Nature of Crimes
Almost all communities, in general, have some rules, beliefs, habits, and
traditions that its members implicitly accept as beneficial to their well-being and
healthy development. Anti-social behaviour is defined as a violation of these
respected norms and customs.84 Human actions that are prohibited by criminal law
and for which the state imposes a penalty are to be treated as crimes. There are
several human conducts in our society some are prohibited by moral code i.e.
immoral, some are prohibited by civil law i.e., civil wrong and some are
prohibited by criminal law i.e., crimes and those which are not prohibited by any
of these are not wrong. Therefore, crime is criminal wrong. 85 The changing nature
of the crime can be understood by the following way:
82
D.S. Wall, Cyber Crime: The Transformation of Crime in the Information Age, 2007, p. 3.
83
Supra note 18, pp. 36-37.
84
N.V. Paranjape, Criminology and Penology, 2009, p. 5.
85
Supra note 1, p. 6.
29
because Constitutional Law, Administrative Law, and other public law infractions
are not crimes. Second, he changes his definition to imply that a crime is a
violation of the public right obligations owed to the entire community, as a
whole.86
92
Edwin. H. Sutherland., Principles of Criminology, 1965, p. 4.
93
Austin, Lecture on Jurisprudence, 1920, pp. 249-253.
94
Supra note 29.
95
Supra note 26, pp.6-7.
96
Supra note 4, p.162.
31
imposed.97
Criminal law was simple and limited at the time, and offences were
equally simple and limited. However, by the 13th century, major offences known
as crimes had been recognised, and bot and wit were considered insufficient to
punish the guilty. The initial division between crime and tort was made as a result
of this. Moral culpability was related to criminal responsibility. The realisation of
the mental element in culpability was the catalyst for this shift in legal thinking. 98
The following are the two necessary ingredients of crime:
J.C. Smith and B. Hogan considered actus reus as such result of human
conduct as the law seeks to prevent.102 Merely guilty intention is not enough to fix
the criminal liability but some act or omission on the part of doer is
necessary to complete offence.103 Actus reus in cyber crimes has become a
challenge as the entire act is committed in intangible surroundings. The
perpetrator may leave some footmarks in the machine itself though it becomes a
herculean task to prove it in the law courts as, it is required to be in physical form
or at least in such a form where it becomes admissible in evidence.104
97
Supra note 19, p.63.
98
Supra note 19, p.64.
99
Available at: https://www.merriam-webster.com/dictionary/actus (visited on April 9, 2017).
100
J. W. C. Turner, Kenny’s Outlines of Criminal Law, 1966, p. 17.
101
Samiksha Godara, “Prevention and Control of Cyber Crimes in India: Problems, Issues and
Strategies”, A Thesis submitted to Maharishi Dayanand University, April 1, 2013, p. 59, available
at: http://shodhganga.inflibnet.ac.in/bitstream/10603/7829/12/12_chapter%203.pdf (visited on
May 20, 2016).
102
J.C. Smith and B. Hogan, Criminal Law, 1988, p.103.
103
Supra note 19, pp.64-65.
104
Pretty Lather, “Cyber Crimes in India and the Legal Regime to Combat”, A Dissertation
submitted to University of Delhi, 2006, p. 15.
32
access to data stored outside; or attempts to gain access through the internet; or
passes signals through various computers, the fact of the occurrence of the act that
can be called a crime can be said to have occurred. 105 The prosecutrix's lack of
consent is a key component of the actus reus in rape proceedings. If the
prosecution fails to prove the absence of permission, the accused's actus reus will
likewise fail to prove, and the prosecution will lose. In this sense we can say
sometimes mens rea is also the part of actus reus.106
The mens rea in case of cyber crimes comprises two essential elements.
First, there must be ‘intent to secure access to any programme or data held in any
computer, computer system or computer network. Secondly, the person must
know at the time that he commits the actus reus that the access he intends to
secure is unauthorised.113 The nature of cyber crimes and the skills involved are
such that existing legal framework cannot do much to control and contain the
same. In fact, the cyberspace technology has undermined to a major extent the
traditional legal concepts like property and has impacted the rules of evidence like
burden of proof, locus standi and concepts of ‘mens rea’.114
111
Supra note 19, p. 67.
112
Supra note 18, p.40.
113
Vakul Sharma, Information Technology- Law & Practice, 2008, p. 135.
114
Supra note 10, pp.41-42.
34
It is extremely difficult to prove both aspects of a crime in the case of
cybercrime. Cybercrime's actus reus is incredibly dynamic and diversified. 115 For
example, when a person uses a keyboard and mouse to operate a computer and
tries to access information on another person's computer without their knowledge,
there is an actus reus in cyberspace that the law wishes to regulate.
There are three main branches of criminal science that deal with this: first,
criminology is the main branch of criminal science that deals with the causes of
crime and also whether an atomic structure, social surrounding circumstances, or
genetic history are contributory factors in crime commission. Second, Penology is
a discipline of criminal science that works with ideas of punishment, such as
preventative, rehabilitative, deterrent, reformative, therapeutic, and corrective
theories, that will be appropriate in today's societal environment to lower crime
rates. Third, criminal law is the substantive part of criminal science that defines
115
Supra note 1, p.11.
116
Watkins, “Computer Crime: Separating the Myth from Reality”, C.A. Magazine, Jan. 1981.
117
Parker, “Computer Abuse Research Update”, Computer Law Journal, vol. 2, 1980, pp. 329-52.
35
crimes and provides punishments, such as the Indian Penal Code 1860 for the
performance of wrongful acts that are prohibited by law and contrary to public
policy. The following are the numerous conceptions of criminal behaviour in
cyberspace:
In the contemporary time period there are so many hi-tech society and
now-a-days it very common to see cyber criminal groups. In the year 1993, it was
rightly said by R. Blackburn that the behaviours of an individual is influenced by
peer pressures and peer attitudes. In the year 1989, the same was accepted by C.
Hollin in his work ‘Psychology and Crime: An Introduction to Criminological
Psychology’ in which he says that persons being associated with the criminals
have to be criminal and that they only have to express the favourable situation for
committing crime.
There are various factors present on the cyberspace which provides the
offenders the choice to commit cyber crime i.e. Identity Flexibility,
Dissociative Anonymity and lack of Deterrence etc.
119
Christine Conradt, “Online Auction Fraud and Criminological Theories: the Adrian Ghighina
Case”,
International Journal of Cyber Criminology, vol. 6, No. 1, Jan.- June, 2012, p. 917.
available at: http://www.cybercrimejournal.com/christine2012janijcc.pdf (visited on Feb. 22.
2017)
120
Olumide, Longe, et.al., “Towards a Real Time Response Model for Policing the Cyberspace”,
2010,
p. 2 available at: http://www.iimahd.ernet.in/egov/ifip/oct2010/olumide-longe.htm (visited on
Jan.24, 2013)
121
Jai Shankar Kumar, Crimes of the Internet, 2008, p. 283-284.
37
Intermittent ventures of offenders
The conflict between Norms and Values of Physical Space with cyberspace
Structural-Functional Theories
The structural-functional theory's core discovery is that crime and
deviance are an unavoidable aspect of social order.
Pratt, Holtfreter, and Reising points out that while Routine Activity
122
Supra note 62, p. 119.
123
Ibid.
38
Theory suggests that victims engaging indeviant ehavior are more likely to be
victimized victims of online auction fraud are typically involved in legitimate,
lawful ehavior at the time of victimization. Because of this, simply engaging in
procuring items from online auction sites is a high-risk behavior compared to
individuals that do not buy items via online auctions. In essences, although it is
not unlawful, the behavior of buying items through online auctions is not the
norm.124 Further, since the routine activities perspective was proposed after the
introduction of the lifestyle exposure theory and it encompasses not only the
theoretical element inherent in the lifestyle exposure theory but also two
additional elements, routine activities theory is thus perceived as an extension and
more general expression of the lifestyle exposure theory.125
124
Supra note 61, p. 915.
125
Fawn T. Ngo and Raymond Paternoster, “Cybercrime Victimization: An Examination of
Individual and Situational level Factors”, International Journal of Cyber Criminology, vol. 5, No.
1, Jan.- July, 2011, pp. 774-775, available at: http://www.cybercrimejournal.com/ngo2011ijcc.pdf
(visited on Feb. 22. 2017).
126
Supra note 64.
39
3. Bringing the unique challenges to old crimes.
Cyber crimes are nothing but crimes of the real world perpetuated in the
medium of computer and hence there is no difference in defining a crime in cyber
world and real world. Only the medium of crime is different. 129 Cybercrime is
"international" or "transnational" – there are ‘no cyber-borders between
countries'.130 Computer crime, cyber crime, e-crime, hi-tech crime or electronic
crime generally refers to criminal activity where a computer or network is source,
tool, target or place of crime as well as traditional crime through the use of
computers like child pornography, Internet Fraud. In addition to cyber crime,
there is also ‘Computer supported crime’ which covers the use of computers by
criminals for communication and document or data storage.131
To put it another way, cyber crime refers to any offence or crime that
127
Norbert Weiner, “The Human Use of Human Beings: Cybernetics and Society” (1954)
referred by T.P.S. Rathore, “Cyber Terrorism and Information Technology Act, 2000”,
International Journal of Language Studies, vol.5, Aug. 2014, p. 1.
128
Supra note 7, p.215.
129
D. Latha, “Jurisdiction Issues in Cybercrimes”, Law Weekly Journal, vol.4, 2008, p. 86,
available at www.scconline.com (visited on July 25, 2015).
130
Guillaume Lovet Fortinet, “Fighting Cybercrime: Technical, Juridical and Ethical Challenges”,
Virus Bulletin Conference, 2009.
131
Supra note 71, p.85.
132
“Investigators Feel the Heat as Cyber Crimes on the Rise”, The Pioneer, February 22, 2010, p.
8.
133
Supra note 18, p.43.
40
involves the use of a computer. According to some experts, cybercrime is simply
conventional crime perpetrated by high-tech computers. Others argue that
cybercrime is a new category of crime that necessitates a comprehensive new
legal framework to reflect the unique nature of modern technology and issues that
traditional crimes do not address. States have viewed cybercrime as both classic
crime perpetrated through new means and a crime with a distinct character that
necessitates a new legal structure.
“Computer crime can entail acts that are classic in nature, such as theft,
fraud, forgery, and mischief, all of which are normally subject to criminal
sanctions everywhere,” according to the United Nations Manual on the
Prevention and Control of Computer-Related Crime. The computer has also
spawned a slew of new possible misuses or abuses, some of which may or should
be illegal in nature.144 As a result, a more accurate definition of cybercrime is the
use of computer technology to commit crime; engaging in conduct that
jeopardises a society's ability to maintain internal order. Traditional and rising
cybercrime are both covered by this concept. It also encompasses any use of
computer technology, not merely the use of networked computer technology.145
139
Sameer Hinduja, “Computer crime Investigations in the United States: Leveraging Knowledge
from the Past to Address the Future”, International Journal of Cyber Criminology, Vol. 1, No. 1,
January, 2007, available at: http://cybercrimejournal.com/sameer.pdf (visited on Feb. 22. 2017).
140
Susan W. Brenner, “At Light Speed: Attribution and Response to Cybercrime/ Terrorism/
Warfare”, The Journal of Criminal Law & criminology, vol. 97, No. 2, 2007, p. 382, available at:
http://scholarlycommons.law.northwestern.edu/cgi/viewcontent.cgi?article=7260&context=jclc
(visited on Feb. 13, 2017)
141
Peter Stephenson, Investigating Computer – Related Crime, 2000, p. 3.
142
Supra note 19, p.89.
143
Pawan Duggal, Cyberlaw- The Indian Perspective, 2002, p. 256.
144
UN Manual on the Prevention and Control of Computer Related Crime, 1994, para 22,
available at:http://216.55.97.163/wp-content/themes/bcb/bdf/int_regulations/un/
CompCrims_UN_Guide
.pdf (visited on Feb. 22. 2017).
145
Supra note 82, p. 386.
146
Supra note 74.
42
computer-specific crimes like hacking, e-mail spamming, and denial-of-service
assaults, as well as traditional crimes like theft, fraud, and extortion conducted
with a computer. As a result, a cyber crime may be subject to not just the
Information Technology Act of 2000, but also normal criminal law, such as the
Indian Penal Code of 1860. Depending on the nature of the offence, further laws
may be applied.147
Prof. S.T. Viswanathan has explain the nature of cyber crimes as follows:
firstly, any illegal action in which a computer is a tool or object of the crime; in
other words, any crime, the means or purpose of which is to influence the
function of computer. Secondly, any incident associated with computer
technology in which a victim suffered or could have suffered loss and a
perpetrator, by intention, made or could have made a gain. Thirdly, computer
abuse is considered as any illegal, unethical or unauthorized behaviour relating to
the automatic processing and transmission of data.148 According to Loader B.D., a
flexible communications system designed to withstand attack by means of
rerouting message has also proved difficult for governments to control. Sources
of illegal activity often require advanced computer skills to be detected as a
consequence of their anonymous character. 149
The nature of cybercrime and the legal challenges it raises are international
147
Supra note 8, p. 82.
148
S.T. Viswanathan, The Indian Cyber Laws: with Cyber Glossary, 2001, p. 81.
149
D. Thomas and B.D. Loader, Cyber Crime Law Enforcement, Security and Surveillance in the
Information Age, 2000, p. 3.
150
Supra note 18, p. 47.
151
Supra note 1, p. 9-10.
43
in scope. Efforts have been made to ensure the harmonisation of provision in
particular countries through international organisations such as the G-8 Group,
OAS (Organization of American States), APEC (Asia-Pacific Economic
Cooperation), and the Council of Europe. Ensuring that the dual criminality
requirement is met could lead to more effective global cybercrime prosecution.
An strategy like this is especially important when it comes to investigating and
prosecuting assaults on computer systems and networks' infrastructure. 152 By
nature cyber crimes are different from other types of crimes which are discussed
as follows:
The evidence of the offences is the other distinction between these two
phrases. In classic crimes, criminals normally leave any evidence of the crime,
such as fingerprints or other tangible evidence, after or during the commission of
the crime. However, cybercriminals commit their crimes over the internet, and
there are extremely few chances of leaving any tangible evidence. According to
forensic investigators, it is sometimes difficult to acquire evidence for the
conviction of cybercriminals because they alter their identities after committing
the crime or commit the crime using the false identities of others. But as compare
to traditional criminals it is very difficult to fake their gender, race, or age etc.
On the basis of the use of force, these two terms can be distinguished.
Many conventional crimes, such as rape, murder, and burglary, entail the use of
157
E. Casey, Digital Evidence and Computer Crime, 2000, pp. 8-9.
158
Glenn Curtis, Ronald Dolan, et.al., “Cybercrime: An Annotated Bibliography of select Foreign-
Language Academic Literature”, 2009, pp. 3-4, available at: http://www.ncjrs.gov/pdffiles1/nij/
231832.pdf (visited on Feb.23, 2011)
159
Ibid.
160
“Cybercrime”, available at: http://www.webopedia.com/TERM/C/cyber_crime.html (visited on
Feb. 22, 2017).
45
extreme force, resulting in physical injury to the victim. However, in contrast to
traditional crimes, cybercrime does not necessitate the use of force because the
thieves just use the identities of other people to steal confidential information.
This type of crime creates high impact. In the case of bank robberies, for
example, the quantum of losses is constrained by the weight, and volume of
currency that can be carried away by the burglars. The amount burgled does not
close down the bank operations permanently. The chances of robbery taking place
again in the same bank are remote since it is possible to take suitable
161
Supra note 18, p. 48.
162
Supra note 1, p. 8.
46
precautionary measures and revamp the security of the bank. The loss of goodwill
isn't significant either. On the other hand, the impact of computer crimes is
significant, and it is not a one-time event, but rather a long-term one. It has the
potential to stifle the victim's operations and, in the majority of cases,
permanently disable them. More than the monetary loss, it is the loss of client
trust that will deliver the knockout blow, especially for companies whose primary
operation is dependent on the internet, i.e., e-commerce. Customers may lose faith
in the seller, and all of the efforts done to earn that trust may be lost in the blink
of an eye.163 These are also high-potential and simple-to-commit crimes.
Cyber crimes are also known for their low-risk, high-reward activities.
Cybercrime's most noticeable aspect is that it is relatively easy to commit,
difficult to detect, and even more difficult to prove. Cyber criminals with
rudimentary computer skills and experience can readily destroy valuable
databases, causing significant financial loss or damage to the victims of the
crime.164 As a result, this characteristic distinguishes this crime from others. This
characteristic of low risk, high reward initiatives may be evident in only a few
sorts of crimes.
Many times, the party or organisation that has been harmed by cybercrime
decides not to report it to the police for fear of negative publicity or losing public
faith. The victims' unwillingness and reluctance to come forward and submit a
police report against the cybercriminal exacerbates the scope of the problem of
cybercrime detection and control.
163
Supra note 103.
164
S.K. Bansal, Cyber Crime, 2003, p. 17.
165
Supra note 103.
47
Category of Cyber Criminals
“Amidst the surging excitement and interest, however runs a deep thread
of ambivalence towards connecting to the internet. The internet’s evil twin is the
home of “Bad Guys”-hackers, crackers, snackers, stalkers, phone preaks and
other creepy web crawlers. Business fear that the Infobahn could suddenly veer
into the highway to Hell”166
Cybercriminals attempt to use computers in three ways: first, they use the
computer as a target for attacking other people's computers in order to carry out
malicious activities such as spreading viruses, data theft, identity theft, and so on;
second, they use the computer as a weapon for committing traditional crimes such
as spam, fraud, and illegal gambling.
The age profile of persons arrested in cyber crime cases under the IT Act,
2000 revealed that 62.5 percent of offenders were in the age group 18 years in
2015 and 52.7 percent in 2014, 3,188 out of 5,102 persons in 2015 and 2,238 out
166
Michael Rustard and Lori E. Eisenschmidt, “The Commercial Law of Internet Security”, High
Technology Law Journal, vol.10, No.2, 1995, p. 215, available at: http://scholarship.law.
berkeley.edu/cgi/viewcontent.cgi?article=1129&context=btlj (visited on Feb. 22. 2017)
167
Farooq Ahmed, Cyber Law in India-Law on Internet, 2005, p. 31.
168
Cary Janssen, “Cyber Criminal”, available at: http://www.techopedia.com/definition/ 27435/
cybercriminal (visited on June 19, 2015).
169
Supra note 45, p. 42.
48
of 4,246 persons in 2014 were under 30 years, and 30.08 percent of offenders
were in the age group 30 years in 2015 and 39.1 percent in 2014. A total of 3,502
people were charged in 2015, up to 1,931 in 2014. A total of 250 person during
2015 and 65 persons during 2014 were convicted and 358 persons during 2015
and 165 persons during 2014 were acquitted under cyber crime cases.170
The following are the category of cyber criminals on the basis of the object
because the cyber criminals constitute of various groups or category:
Discontented Employees
Employees who have been fired or ehavior by their employers for their
illegal conduct fall under this category. To avenge their dissatisfaction, these
individuals frequently resort to hacking their employers' computer systems in
order to inflict him financial loss or damage. Because of the widespread use of
computers and automation processes in modern times, it is simpler for unhappy
employees to cause more harm to their employers by hacking the computer,
which can knock the entire system down and so halt the employer's commercial
operations.175 This is due to the lack of trust by the employers on the employees,
poor communication between them and unlawful ehavior to each other is the main
factors responsible for the employees discontented. It will lead for increasing
negative relationship between them and encouraging for involvement in crimes.
173
Bombay Indian Express, July 10, 2001.
174
Taylor Armerding,“Cybercrime: Much more Organized”, (Last Modified on June 23, 2015),
available at: http://www.csoonline.com/article/2938529/cyber-attacks-espionage/cybercrime-
much-more- organized.html (visited on Nov. 28, 2016).
175
Supra note 45, p. 44.
50
The Typical Cybercriminal
Those who use computers and networks to conduct crimes fall into this
group of cyber criminals. There are almost always exceptions to the
characteristics of this category of people, but the majority of cybercriminals share
some characteristics. First, some of them have a measure of technical knowledge,
i.e. they use other people's malicious code. Second, some of them are
unconcerned about the law or rationalisations, and they wonder why certain laws
are in place. and lastly, some of the cyber criminals have the motive to commit
the crime for monetary gain, strong emotions, sexual impulses, political or
religious beliefs, or having the desire for fun and enjoyment.
176
R.K. Raghvan, “Salutations”, CBI Bulletin, vol.8, No. 2, Feb., 1999, p. 4.
177
Gabriel Weimann , “Internet Security of Germany’s Federal Police Office”, The Times of
India, Nov. 23, 2007.
178
U.N. Report on International Review of Criminal Policy and Prevention & Control of
Computer Crime, Oct., 2005.
51
expanding globally day-by-day and affected the huge amount of peoples at the
same time.
179
Supra note 45, p. 57.
180
B. Muthukumaran, “Cyber Crimes Scenario in India”, Criminal Investigation Department
Review, 2008, p. 17, available at: http://www.gcl.in/downloads/bm_cybercrime.pdf (visited on
April 10, 2016).
181
Harpreet Singh Dalla and Geeta, “Cyber Crime- A Threat to Persons, Property, Government
and Societies”, International Journal of Advanced Research in Computer Science and Software
Engineering, vol. 3, No. 5, 2013, p. 997, available at: http://www.ijarcsse.com/docs/papers/
Volume_3/5_May2013/V3I5-0374.pdf (visited on Dec. 10, 2013)
52
Cybercrimes against Individual
The term crimes against the individual refers to those criminal offences
which are committed against the will of an individual like bodily harm, threat of
bodily harm generally including assault, battery, and domestic violence,
harassment, kidnapping, and stalking etc. but in reference to cyber crime this
category can be in the form of cyber stalking, distributing pornography,
trafficking, cyber bulling, child soliciting and abuse. Such cybercrime affects the
individual’s personality and affect the psychology of younger generation in a
unlawful manner. These are as following:
iii. Cyber-stalking
v. E-mail Harassment
vi. Defamation
Cyber vandalism to steal databases from other firms with the help of a
corporate cyber spy to spread harm are examples of these types of cyber crimes.
A cyber thief can steal a person's bank details, misuse a credit card for online
purchases, use software to obtain access to an organization's website in order to
disrupt the organization's systems, and so on, much like in the real world.
These crimes are done with the intent of instilling fear among the
inhabitants of a specific country by disseminating false information. If effective,
this category has the potential to generate panic among civilians. Cyber criminals
hack company websites, government firms, and military websites, or distribute
propaganda under this category of cyber crime. The offenders could be hostile
foreign governments or terrorist groups. This includes:
i. Cyber terrorism
v. Cyber vandalism.
vi. Virus
vii Net-trespass
i. Cyber Pornography
54
v. Cyber Forgery
Credit card frauds, online fund transfers and stock transfers, Scams, and
theft are all examples of cyber crime in this area. The following are the
cybercrimes included in this category:
iii. Fraudulent use of Automated Teller Machine (ATM) cards and accounts
v. Telecommunications fraud
i) Internet Crime are those crimes which includes the group crimes that make the
criminal use of the internet infrastructure like hacking, spamming,
Espionage etc.
ii) Web based Crime are those crimes which includes crimes relating to
website, e-mail, internet chat i.e. cheating, pornography, insurance fraud,
extortion, e-mail bombing, gambling, forgery, spoofing, cyber squatting,
sale of pirated software, defamation, sale of stolen data, cyber stalking,
illegal access etc.
v. Identity Theft
The first cause for the growth of cybercrime is a large amount of data
storage capacity. The computer can store a large amount of data in a little amount
of space. In a CD-ROM, a little microprocessor computer chip can hold lakhs of
pages. Even if the power is switched off, the data contained in ROM is protected
and will not be lost. In a few of minutes, a cyber criminal can obtain a big amount
of confidential or official data from another person's computer. As a result,
cybercrime is on the rise.
Wider access to information is the fifth reason which is responsible for the
emergence of cybercrimes. Computer is defined as an electronic device which
performs function through complex technology rather than manual actions of
human beings. The wider access to information resources is the greatest
advantage of computer networking in the cyber age. More and more organizations
are resorting to networks for providing easily accessible information to their
employers, customers and parties with which they deal. In the present information
58
age this is the reason why networking and cyber activities are increasing day by
day. Due to the information dissemination through World Wide Web, new
resources have been created for faster and cost effective access to information
throughout the world. This facility leads to involve in crime commission on the
cyber space.
In the field of criminology, it has been argued that a crime will occur when
and only when the chance arises. Previously, we only knew about classic forms of
crimes such as murder, rape, theft, extortion, robbery, and dacoity. However, with
the advent of science and technology, such as computers and internet services,
new forms of crimes have emerged, such as hacking and cyber pornography.
Science, new technology, and the internet have created a new virtual heaven for
good and wicked people to enter and mingle with a wide variety of civilizations
and subcultures.
However, the internet will become a virtual hell for everyone in the future
if it falls into the wrong hands or is utilised or controlled by those with dirty
minds and malevolent motives. Because of the usefulness of information
technology and the internet, cyber criminals and terrorists have turned to
computers as a target or a tool for committing crimes.
183
“State Actor linked to major Cyber Intrusions in India, World: McAfee report says 72
organizations in 14 countries hacked into four years”, The Hindu, Aug. 4, 2011, p. 1.
59
CHAPTER-III
HISTORICAL DEVELOPMENT OF CYBER CRIMES
3.1 Introduction
“In online, the bounds of acceptable activity, or even ethical behaviour,
have yet to be properly established. There is also no agreement on what sorts of
data can and should be deemed network property, as well as what constitutes theft
or interference with this property.”184
The Internet was considered to be a unique medium with the highest speed
of dispersion in human history as early as the early 1990s. There are relatively
few people today whose lives are unaffected by Internet-era technology, both
positively and negatively. On the plus side, the capacity to instantly communicate
and distribute knowledge has brought unparalleled benefits to education, trade,
entertainment, and social contact. On the bad side, it has increased the opportunity
for crime to be committed. Information technology has allowed potential
criminals to commit large-scale crimes for essentially little money and with a
184
Marshall Herbert MeLuhan, “The Promise of Global Networks”, Annual Review of
Institute for Information Studies, 1999, pp. 164-165.
185
M.E. Kabay, A Brief History of Computer Crime, 2008, p. 3 available at:
http://www.mekabay. com/overviews/history.pdf (visited on March 9, 2017)
186
“History of Cyber Crime”, available at: http://www.bezaspeaks.com/cybercrime/history.htm
(visited on March 9, 2017).
60
considerably lower risk of being caught.
Before 1957 there was no scope to communicate with others through new
technology worldwide. In the year 1957 the then President of the United States of
America Dwight Eisenhower authorized the creation of the Advanced Research
Projects Agency (ARPA) following the Soviet Union’s first artificial earth-
orbiting satellite called sputnik. In the 1960s due to cold war the United States of
America concentrated on communication during war time more than others
concerned. Therefore, in the year 1962, Dr. J.C.R. Licklider was appointed to
administer new technology. He developed network system which is called ARPA
net. The US Defense Department and APRA-Net joined together in the year 1969
and introduced first node for communication as network installation at the
University California, Los Angeles. Other nodes were installed at Stanford research
Institute, University of Utah and UC Santa Barbara; first four computers with
internet with about 50 KBPS circuits and at that time UNIX were developed.192 In
1971, Ray Tomlinson sent the first electronic mail message and the University of
Wisconsin developed system or server for Internet in the year 1983.
In the year 1976 Steve Jobs and Steve Wozniak created the Apple I.193 In
the year1984; Domain Name Server (DNS) was introduced. Meanwhile, Willian
Gibon described online world and communication and coined the name of cyber
world as ‘cyberspace’ in his publication named “Neuromancer”.
The origins of the Internet lie in the military domain. 194 In the year 1990
the internet was introduced ceasing ARPA Net and Tim Berners Lee writes the
first browser which was coined as World Wide Web. By the year 1995 the
internet split globally through World Wide Web with concepts of Local Area
Network (LAN), Network Neighborhood and Data over Cable Service Interface
Specific (DOCSIS). Wireless communication with Wireless Application Protocol
(WAP) and Wireless Markup Language (WML) were introduced in the 20th
century and developed in the year 2001. On April 2002 wireless network was
published on the Extreme Tech website.195 At that time mostly hackers were
motivated for using low cost, speedy and wireless communication device for
remote access connections along with mobile computer systems. With the same
time in the contemporary era of communication convergence and new multimedia
technology period Mobile Technology took their shape worldwide.
192
M.Dasgupta, Cyber Crime in India- A Comparative Study, 2009, pp. 27-28.
193
Supra note 7.
194
Steven Furnell, Cybercrime: Vandalizing the Information Society, 2002, p. 3.
195
Supra note 9, p. 29.
62
3.2 History of Cyber Crimes
It can be said that cybercrime has had a short but highly eventful history.
There are different views regarding the actual status of existence of this new
variety of crime actually. Some says that when the computer came with the
invention of the first abacus since people used calculating machines for wrong
purposes, hence it can be said that cybercrime per se has been around ever.
Actually the history of cyber crimes firstly started with the hackers who trying to
break into computer networks just only for the thrill of accessing high level
security networks or to gain sensitive or secured information or any secret for
personal benefits or for revenge. The brief historical development of cyber crime
in the use of computers and computer networks is discussed as under:
In the year 1820, the first cybercrime was documented. That's hardly
unexpected given that the abacus, which is regarded to be the earliest form of
computer, has been used in India, Japan, and China since 3500 B.C. The era of
contemporary computers, on the other hand, began with Charles Babbage's
analytical engine. The loom was invented by Joseph-Marie Jacquard, a French
textile producer, in 1820. This technology allowed a succession of steps in the
weaving of specific fabrics to be repeated. Employees at Jacquard were concerned
196
United Nations Manual on the Prevention and Control of Computer Related Crime, 1994, p. 5,
available at: http://216.55.97.163/wp-content/themes/bcb/bdf/int_regulations/un/
CompCrims_UN_ Guide.pdf, (visited on March 15, 2017).
197
Frederick B. Cohen, Protection and Security on the Information Superhighway, 1995, p. 13.
63
that their traditional jobs and livelihoods might be jeopardised as a result of this.
They carried out acts of sabotage in order to deter Jacquard from using it again. 198
This is known as the first recorded cyber crime in the history. Actually the
physical damages to computer systems and subversion of the long distance
telephone networks were involved in the early computer crimes.
The history of hacking can be traced from 1870’s use of brand new
telephone by teenager’s generally for telephone phreaking.199 It is considered that
with the evolution of computer technology, for the first time in history the
computer related problems are going to evolve with negative result in the form of
computer crime or cyber crime like cyber theft, unauthorized access to computer,
systems and device etc. After this there was the great need of a new technology
which would help in maintaining information stored in computer as well as their
system data base.
U.S. is the birthplace of the Internet and experienced the first computer
facilitated crime in the year 1969.200 After this in the time period of 1960s and
1970s, a litany of early physical attacks on computer systems was catalogued by
Thomas Whiteside. Those cyber criminals who were involved in telephone
phreakers became hackers in the 1960’s because they had an extra curiosity to
know about computer, computer system and its use for their own ends in the early
1960’s. They went on their work with the curiosity to learn the change of
computer code of the system. But in the early stage of this new technology these
crimes were committed by technology experts who directly attack into the
computer, computer system or computer network.
By the year 1970, the cyber world and network was open to worldwide
users. And by that time another cyber crime evolved and became legal challenge
worldwide that is cyber pornography. The year of 1970 is the landmark for telephone
tampering by John Draper. He was an U.S. Air Force veteran and engineering
technician for national semi-conductor. He went by the alias of cap’n crunch. In
the year 1971 in Vietnam he found that the cap’n crunch cereal boxes whistle can
reproduce a tone of 2,600 megahertz; by blowing that whistle into a telephone
receiver, phreakers could make free calls at that time. By blowing a precise tone
the accused John Draper used to make long distance call for free of charge into a
telephone. That precise tone used to inform the telephone system to open a line or
connect with line.202 Most of the teenagers were encouraged by magazines and
also with the technical assistance programmes at that time because these consist
with the process of tampering the telephone phreaking.
In the year 1981 the first virus exposed to world that came into being
before the experimental work which defines viruses of contemporary world. That
was founded on the Apple II operating system and spread on Appeal II floppy
disk which contains the operating system. In the year 1983 in November, the first
documented experimental virus was conceived to be presented at a weekly
seminar computer security, by the author and the name “virus” by Len Adleman.
In the year 1984 Fred Cohen defines computer virus as “a computer programme
that can affect other computer programmes by modifying them in such a way as
to include a possibly evolved copy of itself”. In the year 1986 Brain and Virdem,
two Pakistani’s, developed a method of infecting it with a virus they dubbed
“Brain” which could infect 360 kb floppy with “© Brain” for a volume
label.205They also widely sped this virus on MS-DOS P system. It is called that
this was the first file virus which was created in this year.
The United Kingdom has enacted several legislations like the Data
Protection Act, 1984; the Access to Personal Files Act 1987, the Copyright
(Computer Software) Amendment Act 1985, the Interception of Communications
Act 1985, the Local Government (Access to Information) Act 1985, the
Electronic Communication Act 2000. The Interception of Communication Act,
1985 which was passed by The Parliament of United Kingdom prohibits forgery,
criminal damage and intentional acts for intercepting a communication in the
course of its transaction by means of a public telecommunications system as
offence.
military information, passwords and other data. 206 In the same year the
oldest virus created by Pakistani Brain under unauthorized circumstances with the
purpose of infecting IBM computers. After that the government passed the
Computer Fraud and Abuse Act with the objective to make this a criminal offence
under cyber law. But there was the weakness of this law of not covering juveniles
under its purview.
After 1986, the Lawrence Berkeley lab intrusion was followed by Robert
Morris for the discovery of worm virus. In United States v. Robert Tappan
Morris208 case, Morris was pursuing Ph.D from the Cornell University in
computer science in the year 1988. The Cornell University has given him an
account on the computer to use it and after that he has discovered “worm” called
as one form of “virus” which may be used to demonstrate the inadequacies of
security systems and networks. Then, he released the worm through a computer at
the Massachusetts Institute of Technology (MIT) on 2nd November 1988 which
caused damage and infection very fast to other computers. He then discussed it
with his friend at Harvard and sent an anonymous message from Harvard over
network, instructing clogged, but it was too late because by that time military
sites, medical research sites, installations sites, Universities websites were
infected. The court found him guilty under title, 18 USC s. 1030(a)(5)(A) and was
sentenced to 3 years of probation, 400 hours of community service, a fine of
$10,050 and the costs of his supervision. This was affirmed by the circuit court in
the year 1991 and held that section 1030(a) (5) (A) does not require the
Government to demonstrate that the defendant intentionally prevented authorized
use and thereby caused loss. There was sufficient evidence for the jury to
206
“A Brief History of Cyber Crime”, available at: https://www.floridatechonline.com/blog/
information-technology/a-brief-history-of-cyber-crime/ (visited on March 10, 2017).
207
D. Thomas and B.D. Loader, Cyber Crimes, Law Enforcement, Security and Surveillance in the
Information Age, 1995, p. 59.
208
(1991) 928 F. 2d 504 [Cert. denied, 502 U.S. 917 (1991)].
67
conclude that Morris acted “without authorization” within the meaning of s.
1030(a) (5) (A) and s. 2(d) of the Computer Fraud and Abuse Act 1986. That
conviction was made appropriate by the District Court.
The Electronic Frontier Foundation was formed in 1990. For the first time,
dark Avenger released polymorphic virus in the year of 1992 which was called as
first in the history. The United Kingdom has published working papers relating to
data protection, computer hacking, fraud and related crimes from 1990 to 1998.
The federal websites i.e. the US Department of Justice, US Air-force, and NASA
were broken and defaced by the hackers in the late 1990s. Meanwhile, in August
1990, United Kingdom passed the Computer Misuse Act but before this
enactment the Telecommunication Act, 1984 which prohibits the misuse of the
public telecommunications network was very significant in scope. United
Kingdom Parliament has revised this Act in 1994 and amended in the late 1996.
After revision and amendment the Act provides for prohibiting the unauthorized
access for committing espionage, unauthorized access to non-public government
computer, computer fraud, damage to computer, trafficking in passwords, threats
to damage a computer etc.
Therefore, after the above mentioned case, the House of Lord’s appointed
the Law Commission for their recommendations and suggestions to make law to
prevent and control hacking in the year 1988. They submitted their report in the
year 1989 with recommendation to enact specific law on Computer Misuse in the
United Kingdom.
After R. v. Gold212 case, the United Kingdom enacted the specific law on
Computer Misuse for the purpose of controlling and preventing the commission
of cyber terrorism on the recommendations and suggestions of Law Commission.
Because in this case, the defendant gained unauthorized access into the network in
211
(1988) 2 WLR 984.
212
(1988) 2 WLR 984; see also (1987) 3 WLR 803.
69
order to highlight the deficiencies in its security system. They hacked Customer
Identification Numbers (CIN) and password. But the Appellate court quashed
their conviction and was confirmed by the House of Lords. The appellate court
observed that the act of accused by using dishonest trick to gain unauthorized
access to the British Telecom files did not come under this type of criminal
offence but they may be convicted for deceiving a computer; and deceiving a
machine which is not possible.
In the year 1995, people of India started using internet and internet surfing
not only confined to departments and corporate sectors rather people started to
use net to access information’s and communications.213 Then in the year 1985 the
Telegraph Act was passed in India. This Act was further amended with the
objective of adopting proper regulations in the cyberspace.
In United States of America v. Jake Barker and Arthur Gonda 214 the
defendant was charged for threatening and kidnapping with objectionable materials
in electronic mail messages through internet. In December, 1994 the messages
through electronic mail were exchanged between J. barker and co-accused A.
Gonda. But J. Barker was then in Michigan and A. Gonda was in some unknown
place with unknown identity. That’s why they exchanged that electronic mail
message through a computer in Ontario, Canada and this exchange began from
November 29, 1994 to January 25, 1995 with the intention of sexual needs and
violence against women and girls. He also posted this story with the real name of
that student on electronic bulletin board so that it could be available for the world
through World Wide Web. But FBI agent’s with affidavit made a complaint
against him and he was arrested on the basis of that complaint where FBI citied
the language used by the accused and posted in internet news group
“alt.sex.stories” and electronic mail to Gonda which are based on torture, rape,
murder of woman citing same name of their classmate at the University of
Michigan. The District Court affirmed the order of his detention as passed by
the Judicial Magistrate on February 10, 1995 by recognizing him as a threat to the
community. But the court on his motion passed an order for his release on bond
and for psychological evaluation on March 8, 1995.
213
Supra note 9, p. 38.
214
(1995) 890 F.Supp, 1375 (E.D. Mich).
70
Federal Bureau of Investigation’s headquarters of the Justice Ministers of the G-8
countries, the news released for collaboration of these major countries to 215 (i)
assign adequate number of properly trained and equipped law enforcement
personnel to investigate high-tech crimes (ii) Improve ways to track attacks on
computer networks (iii) When extradition is not possible, prosecute criminals in
the country where they are found. (iv) preserve key evidence on computer
networks. (v) Review the legal codes in each nation to ensure that appropriate
crimes for computer wrongdoing are prescribed and to ensure that the language
makes it easier to develop new ways to detect and prevent computer crimes. (vii)
Increase efforts to use new communication technologies, such as video
teleconferencing to obtain testimony from witnesses in other nations. In October
1997, alleged transcript of telephonic conversation about the Tata Tea case
between Ratan Tata, Nusli Wadia and Field Marshal Sam Manek Shaw are
remarkable case of telephone trapping.216
The “yahoo!” internet search engine was attacked by hackers in the year
1997 with the threat that to release from prison Kevin Mitnick 217 the so called
popular hacker, otherwise they will send a “logic bomb” in the personal
computers of yahoo users on December 25, 1997. On January, 1998 thousands of
fake information requests were received by the federal bureau labour statistics
due to cyber attack called “spamming” which was developed as new mode of
attack by hackers.
In the year 1998, the hackers were threatening again by a holocaust that if
Kevin Mitnick was not released from prison they will break into United Nation’s
Children Fund’s website and they will also sell the military satellite system
software to terrorists.219 In the same year one hacker group releases a Trojan
horse program if it was once installed in a Windows 9x machine the program will
allow for unauthorized remote access.
The United States of America in the year 1998 opened 547 computer
intrusion cases, after one year in 1999 that number of cases had jumped to 1154.
In the year 1998 the number of intrusion cases closed was 399 and in the year
1999 the number of other cases closed was 912. The losses traced to denial of
service. (DOS) attacks were only $77,000 in the year 1998 and 1999 had risen to
just $116,250.220 In this year for the demand of release of Kevin Mitnick from
prison hackers break in a “holocaust” of the United Nation’s Children Fund
Website and also they claimed to break Pentagon network by committed cyber
theft of stealing software of a military satellite system and then threatened to sell
it to terrorists.
In United States v. Thomas223 case the accused were convicted for posting
sexually explicit magazines on an electronic bulletin board. In this regard the
United States of America passed the Electronic Communications Privacy Act,
1999 for the protection of right to privacy. The significant Amendments have
been made for cryptography, security and freedom in cyberspace in the
Constitution of United States of America. Recently certain statute has also been
enacted like the Spy-were Control and Privacy Protection Act, 2000 (USC s.
3180IS) to protect the disclosure of the collection of information through
computer, computer software and other related purposes.
In United States v. Hilton224 case, a federal grand jury charged Hilton for
criminal possession of computer disks containing three or more images of child
pornography in violation of 18 U.S.C. $ 2252A (A)(5)(B). He challenged the state
without denying the charges. He contended to dismiss the charges on grounds that
the act was unconstitutional under the First Amendment. The U.S. district court
was also agreed with his contention regarding the vagueness of the definition of
child pornography but in this case the issue was raised whether the CPPA poses
substantial problems of over breadth and which would sufficient to justify
overturning the judgment of the lawmaking branches. It was held by the court that
the CPPA is not unconstitutionally overbroad and the judgment of the district
222
(1997) 111 F. 3d 1472 (10th Cir).
223
(1997) 4 F. 3d 701, 6th Circuit Court [ Cert. denied 117 S. Ct 74 (1996)].
224
(1999)167 F.3d 61 (1” GR.), [cert. denied, 120 S. Ct. 115].
73
court is reversed.
In the year 1999 on September, the Dig Dirt Inc. files a complaint that an
employee of Steptoe & Johnson LLP of Washington, D.C. hacked into their
system by using password and internet account. Before that the computer hacker
tried to hack their system more than 750 times. The hackers also tried to post
critical message in various internet forums. In Amazon and Alibris case on
November 1999, an online bookseller and internet service provider was fined
$250,000 for intercepting electronic mail sent by amazon.com and other net book
retailer i.e., Alibris. The Hackers allegedly copied customer lists of that
company.225 Alibri was an internet service provider with name ‘valinet’ in the
Greenfield and Massachusetts with Interloc, Inc. who provided the electronic mail
service to the book dealers. He allegedly intercepted electronic mail messages of
amazon.com to Alibris bookseller between January to June 1998. The accused
copied thousands of electronic mail information illegally by that time and
unauthorizedly accessed confidential password and customer lists of amazon. com
which was also one of its competitors and internet service providers. But at the
end Alibris co-operated with the law enforcement agencies and was ready to pay
the fine as was charged. 226
In India, the first case was the Yahoo, Inc v. Akash Arora227 in which an
Indian Court delivered its judgment relating to domain names. In this the plaintiff
Yahoo Inc. filed a suit against the defendants for seeking permanent injunction by
restraining them and their partners, servants and agents from doing any business
on internet under the domain name ‘Yahooindia.com’ or any other domain name
which is identical with the plaintiff’s trademark ‘Yahoo!’ . During the pendency
of the suit, the plaintiff also moved an application seeking temporary injunction
against the defendants. In this case the Court granted an ad interim injunction
restraining the defendants from doing any business on the internet under the
trademark/domain name “Yahooindia.com” or any other trademark/domain name
which is identical with the plaintiff’s trademark “Yahoo!”.
The Information Technology Act (ITA) of 2000 was passed by the Indian
Parliament with the goal of combating cybercrime and providing a legal
framework for e-commerce transactions. This was India's first cyber legislation,
which dealt specifically with cybercrime. It covers a wide range of offences
committed in an electronic format or involving computers, computer systems, and
computer networks. Surprisingly, the terms "cyber crime" and "cyber offence" are
neither defined nor utilised in the Information Technology Act of 2000. This Act
amends many provisions of our existing laws i.e. Indian Penal Code, 1860; the
Indian Evidence Act, 1872; the Bankers Book Evidence Act, 1891 and the
Reserve Bank of India Act, 1934.
228
“Emerging Cyber Threats and Challenges”, 2014, available at: http://www.mcciorg.com/
AttachFile/EventAttach/backgrounder-emerging-cyber-threats-240414.pdf (visited on March 26,
2015).
229
AIR 2000 Bom 27.
75
On July 29, 2001, in Jayesh S. Thakkar v. State of Maharashtra case230,
the petitioners wrote a suo moto writ petition for complaining about pornographic
websites on the internet to the Chief Justice of Bombay High Court. On the basis
of this petition, the Division Bench of the Bombay High Court passed an order to
appoint a committee for suggesting and recommending preventive measures for
protecting from pornographic and obscene material on the internet. Then on
January 30, 2002, several recommendations have been given by Bombay High
Court’s Special Committee through the public opinions on internet relating to
Protecting Minors from Unsuitable Internet Material. Reference can be taken
from Antony v. State of Kerala231 case, in which it was held by the court that an
object need not be visible to the naked one to be an obscene object. In C.K.
Karodkar v. State of Maharashtra232 case, the Supreme Court held that standard
of obscenity would differ from country to country depending on the standards of
morals of contemporary society. After this in
On 18th -19th May 2001 Claude R. Carpenter who was a former employee
of IRS working as systems administrator of hardware and software within the
IRS and unauthorizedly logged in one of the servers of his supervisor’s computer
profile with the intention to modify the profile and inserted several lines of
destructive computer code. 237 After this he intentionally inserted those destructive
codes to three other servers of IRS and then he tried to log out the system for the
purpose of removing the history files tried by him. But the investigative
personnel’s of the treasury inspector general for tax administration traced him. He
was pleaded guilty for intentionally causing damage to a protected computer or
sabotage to Internet Revenue Service (IRS). The U.S. District Judge punished him
with ten years imprisonment and a fine of $250,000.
In the year 2002 more than 400 websites with Arabian and English anti-
war appeals were attacked immediately after military operations in Iraq through
computer virus with e-message “Go USA!!!” for viewing the latest photos of
military events so that damage can be caused to several computers, computer
system and computer network.238 In the latter half of 2002, in the United Kingdom
the cyber hacking cases increased by 32% as compared to 2001 as shown by a
report released by Computer Security Institute and also the unauthorized
modification of data increased eventually because internet has became the prime
source of information in political and economic field around the world after
September 11, 2001 when terrorist attacks on World Trade Centre and Pentagon
235
“The Most High Profile Cases, India”, The Times of India, Kolkata, Aug. 5, 2005, p. 11.
236
Supra note 9, p. 48.
237
United States Department of Justice, Press Release, 2001.
238
Mikhael Crutsaluk, “Fighting Cyber Crime”, Computer Crime Research Centre, 2003,
available at: http://www.crime-research.org/library/Gutsaluk.html (visited on March 10, 2017).
77
in the United States of America.
In the phase of 2004 to 2005, data breaches happen on a daily basis with
having a negative impact on the attacked business. They can change the security
industry and influence legislation in some cases. At that time the cyber scammers
had proved their skills and for them it was the good time to move for causing
damage and gain money in real sense. By this time the cyber criminals become
professionally experts in doing cyber crimes and also for encouraging others for
their involvement. That’s why this time period is remembered as lure of money
and professionalism.
In 2004, Choice Point, a consumer data broker which has since been
purchased by LexisNexis, was widely criticized for how it handled its breach.
Although the company knew customer data was compromised by a 41-year-old
Nigerian citizen, it only informed 35,000 people about the breach- until scrutiny
from the media urged the company to reveal another 128,000 people had
information compromised. Because so many people were upset by the way the
company handled the incident, many believe it helped improve privacy practices
across many businesses, according to Radware. Choice point eventually settled
the data security breach charges, paid $1o million in civil penalties and $5 million
for consumer redress. But the settlement required choice point to implement new
procedures to ensure that it provides consumer reports only to legitimate
businesses for lawful purposes establish and maintain a comprehensive
239
Supra note 9, pp. 49-50.
78
information security program and to obtain audits by an independent third party
security professional every other year until 2026.240
Stealing physical credit cards and creating fake ones are part of the
criminal technique called “carding”. One of the significant successful
investigations and prosecutions of an international credit card fraud ring of the
2000 decade began with the US Secret Service’s Operation Firewall in the late
2004. The investigators discovered a network of over 4,000 members
communicating through the Internet and conspiring to use phishing, spamming,
forged identity documents, creation of fake plastic credit cards, and resale of gift
cards bought with fake credit cards, fencing of stolen goods via eBay and
interstate or international funds transfers using electronic money such as E- Gold
240
Samantha Murphy, “4 Turning Points in the History of Cyber Crime”, Oct. 15, 2012, p. 2,
available at: http://mashable.com/2012/10/15/corporate-security-attacks/#14cimujMDEq2 (visited
on March 10, 2017).
241
“A Good Decade for Cyber Crime”, McAfee Report, 2011, p. 5, available at: http:// cdn.
bizcommunity.com/f/1106/rp_good_decade_for_cybercrime.pdf (visited on March 10, 2017).
79
and Web Money.242
In 2004, in India the landmark case which is considered to be the first case
of conviction under section 67 of Information Technology Act which makes this
section is of the historical importance is State of Tamil Nadu v. Suhas Katti 244. In
this case, some defamatory, obscene and annoying messages were posted about
the victim on a yahoo messaging group which resulted in annoying phone calls to
her. She filed the FIR and the accused was found guilty under the investigation
and was convicted under section 469, 509 of Indian Penal Code and section 67 of
Information Technology Act.
In 2005, in India the first case which was registered under section 65 of
the Information Technology Act is Syed Asifuddin and Ors. v. State of Andhra
Pradesh and Anr.245 In this case the court held that the cell phones fulfilled the
definition of ‘computer’ under the Information Technology Act and the unique
Electronic Serial Numbers which are programmed into each handset like ESN,
SID (System Identification Code), MIN (Mobile Identification Number) are the
‘computer source code’ within the definition under the Information Technology Act
which is required to be kept and maintained by the law.
In Avinash Bajaj v. State (NCT) of Delhi246 case, obscene material was put
up for sale by one person on the website Baazee.com and sold/transmission of
these clip to several people resided in different parts of country which took place
in a very short time period. The issue was raised whether it was a publication
under section 67 before the amendment or website had indirectly published the
material. The court held that the ultimate transmission of the obscene material
wouldn’t have been possible without the initial facilitation by the website and
therefore, the website had liable under the section.
242
Supra note 18, p. 49.
243
Supra note 58.
244
(2004) Cr. Comp 4680, Egmore, available at: http://lawnn.com/tamil-nadu-vs-suhas-kutti/
(visited on April 5, 2017).
245
(2005) Cri LJ 4314.
246
(2005) 3 Comp LJ 364 Del, 116.
80
In Kumar v. Whiteley247 the accused gained the unauthorized access to the
Joint Academic Network and deleted files and changed the passwords to deny
access to the authorized users. The magistrate, chennai sentenced him to undergo
a rigorous imprisonment for one year with a fine under section 420 of IPC and
section 66 of Information Technology Act for computer related offence through
communication service, etc.
247
(2005), available at: https://www.scribd.com/doc/190389306/Case-studies-under-Indian-IT-
Act-200 (visited on April 10, 2017).
248
(2006) Cri LJ 3463 Raj 2411.
249
AIR 2006 Ker 279.
250
Anirudh Rastogi, Cyber Law- Law of Information Technology and Internet, 2014, pp. 118-119.
81
In 2007, discount retailer TJ Maxx was subject to a huge security data
breach that put more than 45 million credit and debit card users at risk. Over an
18 month period, customers had their personal information stolen by hackers who
infiltrated the company’s computers. This was deemed the largest card hack ever.
Officials have since charged six people in Florida who used stolen credit card
information from the breach. For many, this was the 1st major scare that impacted
consumers and personalized the dinginess that comes with security breaches.251
During this phase, attackers were also looking for ways to manipulate
software features for their own purposes. For instance, a feature in Microsoft
Windows software called Auto run was designed to automatically launch
programs from external devices. By taking advantage of this feature, cyber crooks
could get Microsoft’s flagship operating system to automatically launch malicious
code. By exploiting both software vulnerabilities and features, cybercriminals
were discreetly gaining access to user’s systems while at the same time thumbing
their noses at software makers. Meanwhile Unique services such as Skype and
Twitter launched, offering computer users new ways to keep connected and share
information. Along with Facebook, Twitter would soon become an irresistible
platform for crooks to interact with users, and try to trick them out of money and
information.252 This phase was also known for the period when the iPhone came
to market with huge number of mobile applications and criminal opportunities.
In 2008, serial blasts in Ahmadabad, Delhi, Jaipur and Banglore are the
live examples of the cyber terrorism in India. In 2008 attack on Mumbai Taj
Hotel which is also known as 26/11 and the Varanasi blast in 2010 had the trails
of cyber terrorism. The main purpose of the cyber terrorist is to gather the
restricted information and to spread terror by cyber communications method for
disruption of national security, unity, integrity and peace etc.
251
Supra note 57.
252
Supra note 58.
253
“Supreme Court of India: To Hear Eight IT Act Related Cases on 11 th April 2014- SFLC”,
available at: http://www.medianama.com/2014/03/223-supreme-court-of-india-to-hear-eight-it-
act-related- cases-on-11th-april-2014-sflc/ (visited on June 29, 2016).
82
for curbing cyber crimes, but the problem is that still this statute is more on
papers than on execution because lawyers, police officers, prosecutors and Judges
feel handicapped in understanding its highly technical terminology.254 It was
enacted as the basic law for the cyberspace transactions in India but due to some
weaknesses it was amended in the year 2008.
This phase is known for social networking and engineering because the
social networking sites such as Facebook and Twitter started to take off in the
later part of the decade. Cyber criminals started to collect the personal
information of users with a growing amount of money at stake because users post
everything on the sites like from where they lived and worked to their current
location. They have also played the game by employing social engineering by
finding out the topics of Internet user’s interest and then post a message or images
or videos by mentioning or using that topic with a link to a website which was
created with the aims to steal credit card and other personal information for lure of
money. By this time the cyber criminals become more experts in doing cyber crimes
through connecting with social networking sites.
In 2010, Google for the 1st time publicly announced that it was hit with a
cyber attack called Operation Aurora; the search engine giant was hit along with
other major organizations such as Adobe Systems, Yahoo and Symantec and
launched advanced persistent threats (APTs) into the mainstream. APTs typically
refer to a group that persistently targets certain entities and cyber espionage and
intelligence to gather sensitive data.255
In Vinod Kaushik and Ors. v. Madhvika Joshi and Ors. 256 Case, the issue
was raised that whether the wife accessing husband’s and father-in-law’s email
account without their permission in order to acquire evidence in a Dowry
harassment case amounts to be liable under section 66C of Information
Technology Act for unauthorized access and dishonest use of password of any
person. The court held that the wife was liable under this section.
254
Samiksha Godara, “Prevention and Control of Cyber Crimes in India: Problems, Issues and
Strategies”, A Thesis submitted to Maharishi Dayanand University, April 1, 2013, p. 2, available
at: http://shodhganga.inflibnet.ac.in/bitstream/10603/7829/12/12_chapter%203.pdf (visited on
May 20, 2016).
255
Supra note 57.
256
(2010) Cr. Comp 2.
83
In India in the light of a series of arrests made under section 66A of the
Information Technology Act, 2000, Shreya Singhal v. Union of India257 is the
case where the writ petition was filed in public interest under Article 32 of the
Constitution of India for seeking to strike down Section 66A as unconstitutional
by arguing that section 66A is so wide, vague and incapable of being judged on
objective standards that it is susceptible to wanton abuse. It was further argued
that the terms ‘offensive’, ‘menacing’, ‘annoyance’, ‘danger’, ‘obstruction’ and
‘insult’ have not been defined in the Information Technology Act, General
Clauses Act or any other legislation. Citing the arrests made under section 66A,
the petitioner submits that the wide legislative language of the Section severely
disincentives citizens from exercising their Constitutionally protected right to free
speech for fear of frivolous prosecution (the ‘chilling effect’), which violates the
Freedom of Speech and Expression guaranteed under Article 19(1)(a) of the
Constitution. Furthermore, whether or not section 66A meets the test of
‘reasonableness’ laid down under Article 19(2), it is nonetheless violative of
Articles 14 (Right to Equality) and 21 of the Constitution.
There are a large number of cyber laws passed and amended in India as
well as in United States of America and United Kingdom. But instead of these
laws the cyber crimes are increasing day by day. For example, a total of 8, 045
cases were registered under Information Technology Act during the year 2015 as
260
“Twitter Hacked by Syrian Group”, New York Times, Aug. 28, 2013, available at: http://www.
thedailystar.net/news/new-york-times-twitter-hacked-by-syrian-group (visited on March 11, 2017)
261
National Crime Records Bureau, Ministry of Home Affairs, Cyber Crimes in India, 2013, p.
176, available at: http://ncrb.nic.in (visited on Sep. 22, 2015)
262
AIR 2015 SC 1523.
85
compared to 7, 201 cases during the previous year 2014 and 4,356 cases during
2013, showing an increase of 11.7% in 2015 over 2014 and an increase of 65.3%
in 2014 over 2013.263 As compare to India, in United States of America for the
year 2015, Cost of Data Breach Study by IBM and the Pone mom Institute
revealed that the average total cost of a data breach increased from $ 3.52 million
in 2014 t0 $ 3.79 million. Another study said that cyber crime will become a $ 2.1
trillion problem by 2019.264 The National Crime Agency (NCA) released a report
on July 7, 2016 by highlighting the need for stronger law enforcement and
business partnership to fight cyber crime. According to the NCA cyber crime
emerged as the largest proportion of total crime in the United Kingdom with
“cyber enabled fraud” making up 36 % of all crime reported and computer misuse
accounting for 17%.265 The Office of National Statistics (ONS) estimated that
there were 2.46 million cyber incidents and 2.11 million victims of cyber crime in
the United Kingdom in 2015 and only 16, 349 cyber dependent and
approximately 700, 000 cyber enabled incidents reported to Action Fraud over the
same period.266
Thus, the cyber crime is an evil having its origin in the growing
dependence on computer in modern life. There is a wide range of offences that
can be committed through communication technology.269 It is not going to stop
anytime soon and it seems like it will just continue to grow until new methods of
263
Supra note 78, pp. 163-164.
264
Limor Kissem, “2016 Cyber Crime Reloaded: Our Prediction for the Year Ahead”, (Last
Modified on Jan. 15, 2016), available at: https://securityintelligence.com/2016-cybercrime-
reloaded-our- predictions-for-the-year-ahead/ (visited on Dec. 2, 2016).
265
National Crime Agency (UK), Cyber Crime Assessment, 2016, available at:
www.nationalcrimeagency.gov.uk/publications/709-cyber-crime-assessment-2016/file (visited on
Feb. 14, 2017).
266
The Office of National Statistics(UK), Cyber Crime Assessment, 2015, pp. 5-6, available at:
www.nationalcrimeagency.gov.uk/publications/709-cyber-crime-assessment-2016/file (visited on
Feb. 14, 2017)
267
“Cybercrime”, available at: https://en.wikipedia.org/wiki/Cybercrime (visited on March 11,
2017).
268
Ibid.
269
“History of Cyber Crime”, available at: http://www.bezaspeaks.com/cybercrime/history.htm
(visited on March 9, 2017).
86
fighting it are introduced. Because it is found that at some point of time history
become current events.
Today, it is found that due the technology of the Internet era there are very
few people whose lives are not affected whether it is beneficially or harmfully.
There is also the positive side of this technology as well as negative. By the
positive side it is found that there is tremendous increase in the ability to share
and exchange information instantaneously which led to provide unprecedented
benefits in the areas of education, commerce, entertainment and social interaction
and on the negative side, it is felt that there is the increase in opportunities for the
commission of crimes because this latest technology has encouraged the potential
criminals to commit crimes through computer, computer system or computer
network with almost no monetary cost and with lesser risk of being caught.
87
CHAPTER - IV
CYBER CRIMES IN INDIA: LEGISLATIVE AND
JUDICIAL RESPONSE
4.1 Introduction
The internet has a global face. India, too, being a formidable part of the
globe, felt a seism shift in the technological set up when the Information
Technology waves surged ahead and necessitated the formation of the
Information Technology ministry in the country in the year 1999.270 Obviously the
information society offers vast scope and opportunities to human beings to
identify information, to evaluate information, and to exchange information for the
benefits of the citizens the world over. Information technology creates a new
working environment, work culture, commercial connections, and trading
networks. It enables information and knowledge-based work to be carried out
from any location.. It is virtually transforming and revolutionizing the world.271
Abhijit Kumar Pandey, “Cyber Crimes in Cyber Age and its Response by Indian Judiciary”,
271
attributes like spamming, spoofing etc. have grave impacts on its user
community.275 Lawyers and legal consultants' work is also included in the
improvements. Given the importance of this critical sector and its powerful role in
the judicial system, there has been a growing interest in regulating the legal
profession in what appears to be a genuine drive towards upgrading the
profession. 276
As cyber crime has spread across the globe at an exponential rate, many in
the criminal justice industry have lacked appropriate and up-to-date understanding
about the pedestrian realities of current cyber crime. The popular media has
portrayed cyber crime as a lone hacker breaking through seemingly impenetrable
security barriers to gain access to lucrative secret data. These kind of crimes are
uncommon, but cybercrime is all too widespread. 277 The increasing relevance of
information technology may be shown in the fact that, for the first time in India, a
Delhi-based businessman has created a digital will of the confidential information
stored in his e-mail account. The concept of digital will is a foreign one that is
gaining traction in India as well. 278
The success of the nation's legislative, judicial, and executive powers is the
source of its strength. The judiciary's role is to promote justice and equity through
the effective implementation of laws and regulations, ensuring that everyone gets
their fair share.279 The Legislature and the judiciary is the important organs of any
country for its success in making the good international relations and attracting
investment and sufficient laws. A judicial system whi8ch is fair and modern is
needed for getting the confidence of the international community and for the
collective action on the part of several entities in order to reach the desired end.
The society needs some degree of order and continuity for the purpose of
functioning in a good and orderly way because from the long time safety and
security is a question of protection against dangers from the physical world
275
Supra note 2.
276
Hassan Arab, “The Development of The Judiciary- Challenges and outlook”, available at:
http://www.tamimi.com/en/magazine/law-update/section-7/October-november-1/the-development-
of- the-judiciary-challenges-and-outlook.html (visited on Jan. 1, 2015).
277
Jose R. Agustina, “Exploring Internet Crimes and Criminal Behaviour”, Book Review of Cyber
Criminology, vol. 6 No. 2, July- Dec., 2012, p. 1044, available at: http://www.cybercrime
journal.com/Augustinabookreview2012julyijcc.pdf (visited on March 7, 2013)
278
“Ab E-mail Accounts Ki Bhi Hui Wasiyat”, Navbharat Times, April 5, 2010, p. 5.
89
because from the last century, the cyberspace arose alongside the old world.
With this traditional offline world the better legislative response is required. In
this present chapter an attempt is made to discuss the national laws which are
passed for combating the cyber offences in India. These are discussed as follows:
Indian Parliament has passed the first legislation in the Fifty-first year of
the Republic of India called as the Information Technology Act 279, 2000 which is
based on the resolution280 adopted by the General Assembly of United Nations
regarding the Model Law on Electronic Commerce on January 30, 1997 which is
earlier adopted by the United Nations Commission on International Trade Law
(UNCITRAL). This resolution recommends that all States must give favorable
consideration to this Model Law when the States are going to enact or revise their
laws with the view of uniformity of law as alternative to paper based methods of
communication and storage of information. India was also the signatory to this
Model Law and had to revise its national laws as per the said Model Law. As a
result, India created the Information Technology Act of 2000 to provide legal
recognition to transactions using electronic data interchange and other forms of
electronic communication, as well as to make the filing of paperwork with
government institutions easier. The Indian Penal Code, 1860, the Indian Evidence
Act, 1872, the Bankers Books Evidence Act, 1891, and the Reserve Bank of India
Act, 1934 are also amended by the Act. Some instruments, such as a negotiable
instrument, a power of attorney, a trust, a will, including any other testamentary
disposition, any contract for the sale or conveyance of immovable property, and
any contract for the sale or conveyance of personal property, are exempt from the
provisions of this Act.
Supra note 7.
279
It received the assent of the President on June 9, 2000 and notified in the Official Gazette on
280
Though since 2000 In India, the Information Technology Act was enacted
to combat cybercrime, but the problem is that it is still more on paper than in
practice since lawyers, police officers, prosecutors, and judges are unable to
comprehend its highly technical wording. 282 Primarily, the IT Act, 2000 is meant
to be a legislation to promote e-commerce which is not very effective in dealing
with several other emerging cyber crimes like cyber harassment, defamation,
stalking etc. There was a need to amend the Information Technology Act, 2000
for the purpose of making it more relevant in today’s context. For this purpose the
Information Technology (Amendment) Bill, 2006 was proposed which was
further amended by Information Technology (Amendment) Bill, 2008 and passed
in Lok Sabha on Dec. 22 and in Rajya Sabha on Dec. 23, 2008. Then the
Information Technology Act, 2000 is amended by Information Technology
(Amendment) Act283, 2008.
281
Resolution No. A/RES/51/162, January 30, 1997.
282
Section 1(4) of Information Technology Act, 2000 (Act No. 21 of 2000).
283
Samiksha Godara, “Prevention and Control of Cyber Crimes in India: Problems, Issues and
Strategies”, A Thesis submitted to Maharishi Dayanand University, 2013, p. 2, available at:
http://shodhganga.inflibnet.ac.in/bitstream/10603/7829/12/12_chapter%203.pdf (visited on May
20, 2016).
91
specified in the First Schedule read with section 91.284 The extra territorial
jurisdiction of the Indian Penal Code, 1860 was also expanded to include all the
offences which targets computer resources in India and various sections which are
relating to a false document were also amended to include a false electronic
record.285 Through these amendments section 29 A which defines the words
“electronic record” has been inserted after section 29 which defines the word
“document” with the purpose to maintain the statutory balance.
The words "such public worker, charged with the preparation or translation
of any document, frames or translate that document" have been replaced in
section 167 by "such public servant, charged with the preparation or translation of
any document or electronic record.". The Act amends this section which deals
with the framing an incorrect document by a public servant with intent to cause
injury, by substituting the words “electronic record”. By this amendment now a
public servant may be charged for framing an incorrect electronic record with
intent to cause injury.
Section 91 and First Schedule has been repealed by the Information Technology (Amendment)
285
Act, 2008
286
Sections 4, 192, 463, 464, 466, 468, 469, 471, 474, 476 and 477A of Indian Penal Code,
1860 (Act
No. 45 of 1860).
92
section 22, section 22A is inserted which provides the circumstances when an oral
admission as to contents of electronic records are relevant.
Section 34 highlights the areas when entries in the books of account are
relevant. This section is amended to include accounts books in electronic form.
Section 35 is amended to maintain the register of births, deaths or marriages, revenue
records etc. in electronic form. Section 39 is amended to take into consideration
the evidentiary value of a statement, which forms the part of an electronic record.
Section 131 is also amended to include production of electronic records which
another person, having possession, could refuse to produce. Some other important
sections are inserted by this Act which is related to opinion as to electronic
signature when relevant287, admissibility of electronic records288, proof290 and
verification of digital signatures291 and lastly, presumptions as to electronic
evidence292.
the computer programmes and to protect the copyright violation. The court
of Judicial Magistrate of First Class has jurisdiction over this offence, which is
bailable, cognizable, and triable. The Hon'ble court ruled in a case that cell
phones met the definition of a "computer" under the Information Technology Act,
and that the unique Electronic Serial Numbers (ESNs), SIDs (System
Identification Codes), and MINs (Mobile Identification Numbers) programmed
into each handset are "computer source code" under the Information Technology
94
Act.291 Fabrication of an electronic record or forgery by way of interpolations in a
CD produced as evidence in court is punishable under this section, it was
decided..292
In a case, where the accused gained the unauthorized access to the Joint
Academic Network and deleted, added files and changed the passwords to deny
access to the authorized users. It was revealed by the investigations that Kumar
was logging on to the BSNL broadband Internet connection as if he was the
authorized genuine user and made alteration in the computer database pertaining
to broadband Internet user accounts of subscribers. The Additional Chief
Metropolitan Magistrate, Egmore, Chennai sentenced him to undergo a rigorous
imprisonment for one year with a fine under section 420 of Indian Penal Code for
cheating and section 66 of Information Technology Act for computer related
offence through communication service, etc.295
295
Syed Asifuddin and Ors. v. State of Andhra Pradesh and Anr., (2005) Cri LJ 4314 AP.
96
steal, conceal;
c) any electronic mail or electronic mail message sent with the intent to
annoy, inconvenience, or deceive or mislead the addressee or receiver as to
the origin of the message296
The first clause of this section deals with the sending of information which
is ‘grossly offensive’ or having a ‘menacing character’ such as online stalking, online
defamation and text bullying, etc. But these two terms are not defined in the Act
itself. The clause (b) of this section deals with the sending of false messages with
repetition for causing inconvenience like online insult, online intimidation, net
extortion, hate mails etc. The clause (c) of this section deals with spam and
unsolicited mails such as e-mail spoofing and cyber phishing etc. Under this
section the message may be in any form so long as it involves a computer
resource or a communication device like e-mails, SMS’s blogs, tweets, images,
and voice over IP, Skype etc.
However, the Supreme Court ruled that section 66A was unconstitutional
in its entirety and violated the right to freedom of speech and expression, and it
was knocked down.
Identity Theft
Identity Theft is punishable under Section 66 C of the Information
Technology Act of 2000, which was added by the Amendment Act of 2008.
According to this clause, anyone who uses another person's electronic signature,
password, or other unique identity features fraudulently or dishonestly faces a
three-year prison sentence and a fine of up to one lakh rupees.
This section deals with identity theft i.e. the dishonest or fraudulent use of
a unique identification feature of a person, which includes identifiers like an
electronic signature, a login password, a PIN, a photograph or a biometric
identifier. The terms ‘dishonest’ and ‘fraudulent’ have been explained previously
to mean an intention to cause economic loss or gain to a person, and the intention
to cause loss through deception respectively. This section does not differentiate
between a natural person and legal person like a company.298 This offence is
bailable, cognizable and triable by the court of Judicial Magistrate of First Class.
For example: if A has made a duplicate copy of ATM card of B and withdraws
rupees from his account, then A is liable under section 66C for theft of identity.
In one case, the question was raised as to whether a wife accessing her
husband's and father-in-email law's accounts without their permission in order to
obtain evidence in a Dowry harassment case is liable under section 66C of the
Information Technology Act for unauthorised access and dishonest use of any
person's password. The wife was found to be accountable under this provision by
the court.303
Violation of privacy
Section 66 E is inserted by Information Technology (Amendment) Act,
2008 for providing punishment for violation of privacy. According to this section,
anyone who intentionally or knowingly captures, publishes, or transmits an image
of a person's private area without his or her consent, thereby infringing on that
person's privacy, shall be punished with either imprisonment for a term not
exceeding three years or a fine not exceeding two lakh rupees, or both. The court
of Judicial Magistrate of First Class has jurisdiction over this offence, which is
bailable, cognizable, and triable.
99
This section covers the three steps of a breach of a person's bodily privacy:
capture, publishing, and transmission. This section makes any of these stages
illegal if they are carried out without the victim's agreement. Capturing include to
capture an image by any means such as videotaping, filming or recording by
using any kind of technology like video recorders, cameras, CCTVs, webcam in a
PC or any other forms of electronic surveillance like spy cameras or any kind of
hidden cameras, smart phones etc. Publication includes the creation of copies
both in print i.e. magazines, books, newspapers and in an electronic form i.e. on
the websites or CDs. Transmission means to deliberate or intentional electronic
transfer of the image via emails, internet, messaging, Bluetooth etc. with the
purpose that it can be viewed instantly by other persons. The offence is complete
immediately on the sending of the mail. It is irrelevant that whether the person to
whom the mail is sent read the mail or not.
A 24 year old cyber crime accused and his two aides who are wanted in
cyber crime cases, walked into the cyber crime police station, Mumbai, posing as
vigilance officers and tried to conduct a sting operation on the investigation
officer on Feb. 17, 2017. They wanted to blackmail the senior police inspector of
the cyber crime cell to not take any action against the accused. However, their spy
pen camera did them in. Subsequently, the police found that the three men had
fake Central Vigilance Commission (CVC) identity cards and fake letterheads
with the names of CBI officers. The Spy camera has been seized. 302 Then the
police charged him under section 34 (common intention), 170 (personating a
public servant), 174, 419(cheating by personation), 420 and 506 of IPC.
299
N. G. Arun Kumar v. Whiteley, (2005), available at:
https://www.scribd.com/doc/190389306/Case- studies-under-Indian-IT-Act-200 (visited on April
10, 2017).
300
Inserted vide Information Technology (Amendment) Act, 2008.
301
AIR 2015 SC 1523: (2005) 5 SCC.
302
Anirudh Rastogi, Cyber Law- Law of Information Technology and Internet, 2014, p. 109.
100
Cyber Terrorism
“Get ready …. Terrorists are preparing ….cyberspace based attacks….”303
Terrorism is a kind of threat or terror against common people or government
which is not predictable.304 Cyber terrorism is a new form of terrorism, which
exploits the system we have put in place. There is a continual drive to
computerize every process, in order to add remote access, accuracy features and
ease of use.305 Generically, cyber terrorism consists of using computer technology
to engage in terrorist activity.306 This type of cyber crime can involve using the
internet to communicate with other terrorists, to transfer the money needed to
fund a terrorist act or any other related activity.
Cyber war and cyber terrorism do not find any mention in the Indian
Cyber law before. But now the Information Technology (Amendment) Act, 2008
made the provision for cyber terrorism under section 66F which provides
punishment for cyber terrorism. This offence is non-bailable, cognizable and
triable by the court of Sessions. The legislative provisions relating to cyber
303
Vinod Kaushik and Ors. v. Madhvika Joshi and Ors., (2010) Cr. Comp 2.
304
“Sting Operation”, Wikipedia, available at: https://en.wikipedia.org/wiki/Sting_operation
(visited on April 6, 2017).
305
The Hindu, New Delhi, June 24, 2016, available at:
http://www.thehindu.com/news/national/sting- operation-not-a-legal-method-of-law-enforcement-
supreme-court/article5944283.ece (visited on April 6, 2017).
306
(2013) WP (C) 162, Del.
307
The Times of India, Mumbai, Feb. 20, 2017, available at: http://timesofindia.indiatimes.
com/city/mumbai/cyber-crime-accused-2-aides-try-sting-op-on-cop/articleshow/57240684.cms
(visited on April 6, 2017).
308
John Arquila, “Waging War Through the Internet”, p. E1 (Last Modified on Jan. 15, 2006),
available at: http://www.sfgate.com/opinion/article/Waging-war-through-the-Internet-
America-is-far- 2506659.php (visited on March 6, 2017).
309
P. Kraber, “Urban Terrorism: Baseline Data and a Conceptual Framework”, Social Science
Quarterly, 1971, p. 52.
101
terrorism is given as follows:
(1) Whoever;
(i) preventing or causing the denial of access to any person who has been
given permission to utilise a computer resource; or
(2) Anyone who acts or conspires to commit cyber terrorism faces a sentence
of imprisonment that might last a lifetime.
Clause 1(A) of this section deals with cyber terrorism that directly affects
or threatens to influence the public with the intent of jeopardising the nation's
unity, integrity, or security, and instilling fear in the people's minds. This section's
clause 1(B) deals with cyber terrorism that has a direct impact on the state as a
result of unlawful access to restricted information, data, or a computer database.
102
A terrorist means a person who indulges in wanton killing of persons or in
violence or in disruption of services or means of communications essential to the
community or in damaging property with the view to putting the public or any
section of the public in fear; or affecting adversely the harmony between different
religious, racial, language or regional groups or castes or communities; or
coercing or overawing the government established by law; or endangering the
sovereignty and integrity of the nation.310 Thus, cyber terrorist is a person who
uses the computer system as a means to achieve the above stated objective and
every act which is done in pursuance thereof is called cyber terrorism. Cyber
terrorists use a various tools for completing their purpose of cyber terrorism
including hacking, cryptography, Trojan attacks, and computer worms, viruses,
denial of service attacks, E-mail related crimes etc.
In a case, the issue was raised before the court that whether an offence of
defamation could reasonably covered under section 499 of I.P.C. or it requires
section 66 F of IT Act. The court has to make the distinction between two and it is
observed that section 499 of I.P.C. covered the offence of defamation with respect
to person and the term ‘person’ does not include a State whereas section 66F
covered the defamation of State.311
In India, the serial blasts in Ahmadabad, Delhi, Jaipur and Banglore are
the live examples of the cyber terrorism in 2008. The Mumbai Taj Hotel attack in
2008, popularly known as 26/11, and the Varanasi blast in 2010 both had cyber
terrorism tracks. 312 The fundamental goal of a cyber terrorist is to obtain sensitive
information and disseminate fear via cyber communications in order to jeopardise
national security, unity, integrity, and peace, among other things.
Section 67A and 67B are the only sections which are non-bailable as per
section 77B of the Act, whereas others are bailable. We also have section 69A of
Information Technology Act, 2000 where Central Government or its officer
appointed can issue directions to other Government Agencies and Intermediaries
to block such information for public access if it is necessary or expedient so to do
in the interest of sovereignty and integrity of India, defense of India, security or
the State, friendly relations with foreign state or for the sake of maintaining public
order or preventing incitement to the commission, or any cognizable offence
relating to above.
It is clear from the wording of this section that the Controller could only
give the directions to a Certifying Authority or any employee of such Authority,
105
but by the virtue of section 18 (1) his power may also be extendable to the
subscribers of a digital signature certificates because this section provides that
Controller has also the power to resolve any conflict of interests between
Certifying Authority and the Subscribers.
Syed Mohd. Uzair, “Cyber Crime and Cyber Terrorism in India, A thesis submitted to Aligardh
313
This section gives the right of privacy over any information which is
acquired in official capacity. The person shall be liable under this section when he
made the disclosure of information without consent or permission from the
authorized person. This offence is bailable and non-cognizable.
This section states that anyone who obtains access to any electronic record,
book, register, correspondence, information, document, or other material without
the consent of the person concerned, or discloses such electronic record, book,
register, correspondence, information, document, or other material to any other
person is subject to a penalty of up to five years in prison.
107
provisions of services under a lawful contract. This offence is also bailable and
cognizable.
The Supreme Court defined the term ‘publication’ in the case of Bennett
Coleman & Co. v. Union of India315. The term ‘publication’ means dissemination
and circulation. The term includes dissemination, storage and transmission of
information or data in electronic form if we talk about in the context of digital
medium.
Offences by Companies
314
Dorothy Denning, Activism, Hactivism and Cyber terrorism: The Internet as a tool for
Influencing Foreign Policy, 2001, p. 241.
315
“White Collar Crimes with special Reference to Cyber Crimes”, Legal Services India,
available at: http://www.legalservicesindia.com/article/article/white-collar_crimes_cyber_crimes-
255-1.html (visited on May 2,, 2012).
108
Section 85 of the Information Technology Act incorporates the concept of
corporate criminal liability, or the criminal liability imposed on a company for its
contravention of the Act or any rule, direction or order made there under. The
explanation to this section provides that a company is anybody corporate,
including a firm or association of individuals. The company may be corporate or
incorporated.
However, if such a person can show that the violations occurred without
his knowledge or that he took reasonable steps to prevent them, he will not be
held accountable under this section. Furthermore, if it is proven that such
contraventions under section 85 occurred with the consent or convenience of, or
are attributable to the negligence of, any director, manager, secretary, or other
officer of the company, such director, manager, secretary, or other officer must be
deemed guilty of the contraventions and must be prosecuted and punished.316
Jurisdiction over other cyber crimes, for instance under the Indian Penal
Code, 1860 has to be determined by the provisions of the Criminal Procedure
Code, 1973. The fundamental principle on jurisdiction is the same under the
Information Technology Act324 and the Criminal Procedure Code, 1973, though
stated differently. The basic legal principle of jurisdiction under the code of
Criminal Procedure, 1973 is that every offence shall ordinarily be inquired into
the tried by a court within whose local jurisdiction it was committed.325 Any court
under section 182 within whose jurisdiction such letters or messages were sent or
where they were received may enquire into or try any offence that includes
cheating if the deception is carried out through letters or telecommunication
320
AIR 1972 2 SCC 788.
321
Supra note 48, p. 289.
322
Sheoratan Agarwal v. State of Madhya Pradesh, (1985) SCR (1) 719.
323
AIR 2012 SC 2795.
324
(2009) Crl. Appl. 1483.
325
Supra note 48, p. 345.
110
messages.
Sections 177 to 188 of the Criminal Procedure Code, 1973 deals with
criminal jurisdiction. The jurisdiction of this code is based on the place of inquiry
where the offence or elements of the offence are committed, as well as the place
of trial. Section 177 this code provides that every offence shall ordinarily be
inquired into and tried by a court within whose jurisdiction it was committed. It is
necessary to mention here that this section does not purport to restrict territorial
jurisdiction. It operates as a general provision that sets out where the offence may
be tried ordinarily, without laying down exclusions to jurisdiction.
Section 187 (1) provides that when a magistrate of the first class sees
reason to believe that any person within his local jurisdiction has committed
outside such jurisdiction whether within or outside India an offence which cannot,
under the provisions of sections 177 to 185 (both inclusive), or any other law for
the time being in force, be inquired into or tried within such jurisdiction but is
under some law for the time being in force triable in India, such magistrate may
inquire into the offence, as if it had been committed within such local jurisdiction
and compel such person in the manner hereinbefore provided to appear before
him, and send such person to the Magistrate having jurisdiction to inquire into or
try such offence, or, if such offence is not punishable with death or imprisonment
for life and such person is ready and willing to give bail to the satisfaction of the
Magistrate acting under this section, take a bond with or without sureties for his
appearance before Magistrate having such jurisdiction. Clause (2) of the said
section says that where there are more Magistrates than one having jurisdiction
and the Magistrate acting under this section cannot satisfy himself as to the
Magistrate to or before whom such person should be sent or bound to appear, the
case shall be reported for orders of the High court.
Section 1(2) of the Information Technology Act, 2000 provides for the
jurisdiction of Indian courts in cyber crimes only. It does not talk about civil
jurisdiction.329 The said Act beings by saying, in clause (2) of section 1 that “it
shall extend to the whole of India and, save as otherwise provided in the Act, it
applies also to any offence or contravention hereunder committed outside India
by any person”. As a result, it is explicitly established that the court's cyber
jurisdiction would apply to cyber crimes committed both within and outside of the
country.
Section 75(2) of the said Act states that it shall apply to an offence or
contravention committed outside India by any person irrespective of his
nationality, if the act or conduct constituting the offence or contravention involves
a computer, computer system or computer network located in India. This section
provides for the extra- territorial jurisdiction of the Indian courts over the
offences or contraventions committed outside India. Under this section, the
jurisdiction of the Act extends to every person having any nationality, who
commits an offence on foreign territory by using a computer situated within India.
This section is restricted only to those offences or contraventions which are
provided therein but not to other offences punishable under other laws.
Section 4 of the Indian Penal Code, 1860 provides that the law is assuming
jurisdiction over violators of The Information Technology Act, 2000 outside the
territorial boundaries of India. This provision is explained perhaps by the unique
nature of cyberspace, which knows no boundaries. The Information Technology
Act, 2000 specifically provides that unless otherwise provided in the Act, it also
applies to any offence or contravention there under committed outside India by
any person irrespective of his nationality.333 It is however clarified that the Act
shall apply to an offence or contravention committed outside India by any person
if the act or conduct constituting the offence or contravention, involves a
computer, computer system or computer network, located in India.334
In the event where it is uncertain in which of several areas the offence was
committed, again it may be inquired into or tried by a court having jurisdiction
over either of such areas of uncertainty.335Certain specified offences have been
required by law to be inquired into or tried in certain places. 336 When two or more
courts take cognizance of the same offence and a question arises as to which of
the courts has jurisdiction to inquire into or trial that offence, the question shall be
330
Sec. 177 of Cr.P.C., 1973.
331
Section 181 (4) of Cr. P.C.
332
Section 186 of Cr. P.C.
333
Supra note 48, p. 346.
334
D. Latha, “Jurisdiction Issues in Cyber Crimes”, The Weekly Law Journal, vol. 4, 2008, p. 88.
335
Sec. 1(2) and sec 75 of Information Technology Act, 2000.
336
Sec. 177 of Cr.P.C., 1973.
114
decided by the High Court under whose jurisdiction both such courts operate. 337
The issue of jurisdiction is not settled yet because India is still not a
signatory to the Cyber Crime Convention and the bilateral Extradition Treaties
which it has signed with around 35 countries so far do not mention ‘cyber crime’
as extraditable offences.
However, as the Supreme Court of India held in Rambabu Saxena v. State 338,
“extradition may still be granted if the treaty does not enlist a specific offence for
which extradition is sought, but authorises the Indian government to grant extradition
for some additional offences by inserting a general clause to this effect.”339
Currently, Maharashtra is the first state in the country which will have a
cyber police station in each district simultaneously.342 Section 28 of the Act gives
the power to the Controller or any other officer authorized by him in this behalf
for the investigation of any contravention of the provision, rules or regulations
made under the Act. They shall also have the like powers which are conferred on
the Income Tax authorities under Chapter XIII of Income Tax Act, 1961 and
under Information Technology Act. Chapter XIII of Income Tax Act, 1961 gives
337
Sec. 178 of Cr.P.C., 1973.
338
Sec. 1(2) of IT Act, 2000.
339
Sec. 75 of IT Act, 2000.
340
Sec. 178(a) of Cr.P.C., 1973.
341
Sec. 180 of Cr.P.C., 1973.
342
Sec. 186 (a) of Cr.P.C., 1973.
115
the power to Controller or any other officer authorized by him in this behalf for
the discovery and inspection of the documents and books of accounts during
search and also empowers to examine a person on oath for the purpose of
collecting evidence in any proceeding. Section 29 of the Act as amended vide
Amendment Act, 2008 empowers the Controller or any other person authorized
by him to access any computer system, an apparatus or data and to make search
for any information which is available in such computer system if he suspects that
there is something which is contrary to the provisions under the Act. Here, in this
Act, the term ‘apparatus’ has not been defined clearly but it may include the
output devices such as scanners, external hard disk, pen drives or other storage
devices.
Under 66A of IT Act, 2000, the police have also given excessive powers.
This section had been misused by police in various States to arrest the innocent
person for posting critical comments about social and political issues on
116
networking sites. This section had led to the arrest of many people’s for posting
content deemed to be allegedly objectionable on the internet. Due to this reason,
recently, the Hon’ble Supreme Court has declared section 66A as unconstitutional
in its entirety and against the freedom of speech and expression and struck it
down in Shreya Singhal and others v. Union of India343.
“The investigation under this Code, taken in several aspects and stages,
ending ultimately with the formation of an opinion by the police as to whether, on
the material covered and collected, a case is made out to place the accused before
the magistrate for trial, after submission of either a charge sheet or a final rep,”
according to the Supreme Court in Roopchand Lal v. State of Bihar 344 case. The
formation of the opinion that no case against the accused is made out, is a final
step in the investigation, and that final step is to be take only by the police and by
no other authority.”345
On September 9, 2010, the imposter made a fake profile in the name of the
Hon’ble President Pratibha Devi Patil. A complaint was made from Additional
Controller, President Household, President Secretariat regarding the four fake
profiles created in the name of Hon’ble President on social networking website,
Facebook for misleading the general public. The FIR under section 469 of Indian
Penal code and section 66A of Information Technology Act, 2000 was registered
on the basis of said complaint at police station.346
Judicial Response
343
AIR 1950 SC 155: 1950 SCJ 406: 1950 SCR 573.
344
Vakul Sharma, Information Technology- Law and Practice, 2016, pp. 371-372.
345
Mr. Pramod Mahajan, Information Technology Minister(then), address in one day seminar on
“Cyber Law and Police” organized by CBI in Delhi on July 23, 2000.
346
Mr. R.K. Raghvan, CBI Chief (then), address in one day seminar on “Cyber Law and Police”
organized by CBI in Delhi on July 23, 2000.
117
Cybercrime being of intangible nature, it does not require any physical
violence or the presence of accused at the scene of crime. Under these
circumstances, the traditional adversarial system of litigation would hardly meet
the ends of justice in cases relating to cybercrime. Commenting on the problem
faced by the judiciary and the enforcement agencies in dealing with computer
related crimes, the Supreme Court of India in State of Punjab and Others v. M/S
Amritsar Beverages Ltd. and Others347 observed that:
“Internet and other information technologies have brought with them the
issues which were not foreseen by law. It also did not foresee the difficulties which
may be faced by the officers who may not have any scientific expertise or not have
the sufficient insight to tackle with the new situations. Various new developments
leading to various kinds of crimes unforeseen by our Legislature came to
immediate focus. Although the Information Technology Act of 2000 was updated
to encompass numerous sorts of cybercrimes and punishments for them, it does
not address all of the issues that officers enforcing the Act face.”
Above all, the Indian Judiciary has played an important role in handling
cyber crimes in cyber age. Because India's Supreme Court has been the final
arbiter of laws for decades. The judicial and law enforcement agencies are fully
aware that the resources available to investigate and punish crimes and terrorist
activities perpetrated against or through computers or computer networks are
almost entirely national in scope at the moment.
The important function of the judiciary is to interpret the laws with the
purpose to find out the real intention of the legislature which is expressed in the
form of language used in the legislation. It is said on the basis that the court does
not legislate but only interprets the existing laws. The Honorable Supreme Court
held in Institute of Chartered Accountants of India v. Price Waterhouse348 case
that a statute is an edict of the legislature. The language used in a statute is
considered as determinative factor of legislative intent. The words and phrases
used are the symbols that stimulate mental references to referents. That’s why the
main purpose of interpreting the laws is to find out the real intention of the
legislature enacting it.
347
The Tribune, Chandigarh, Nov. 4, 2016, p. 7.
348
AIR 2015 SC 1523: (2005) 5 SCC.
118
their technological temperament.349 In this case the Hon’ble Supreme Court held
that “when an effective consultation can be achieved by resort to electronic media
and remote conferencing, it is not necessary that the two persons required to act in
consultation with each other must necessarily sit together at one place unless it is
the requirement of law or of the ruling contract between the parties.”350
v. State of Andhra Pradesh and Anr. 356 is the first case which is related to
section 65 of the Information Technology Act. In this case, the court determined
that cell phones met the definition of "computer" under the Information
349
AIR 1968 SC 117: (1967) 3 SCR 668: 1968 Cr LJ 97.
350
Vakul Sharma, Information Technology- Law and Practice, 2016, p. 278.
351
Case Studies under IT Act, 2000, available at: https://www.scribd.com/doc/190389306/Case-
studies- under-Indian-IT-Act-200 (visited on April 10, 2017).
352
AIR 2006 SC 2820 (Para II).
353
AIR 1998 SC 74: (1997) 6 SCC 312.
354
(2002) 7 SCC 736.
355
Grid Corporation of Orissa Ltd. v. AES Corporation, (2002) 7 SCC 736.
356
AIR 2003 SC 2053: (2003) 4 SCC 601.
119
Technology Act, and that the unique Electronic Serial Numbers (ESNs), SIDs
(System Identification Codes), and MINs (Mobile Identification Numbers)
programmed into each handset are "computer source code" under the Information
Technology Act, which must be kept secret..
In Bhim Sen Garg v. State of Rajasthan and Others357 case, it was held that
fabrication of an electronic record or committing forgery by way of interpolations
in CD produced as evidence in a court attract punishment under this section.
In Sanjay Kumar v. State of Haryana 358 case the petitioner has been
convicted for an offence punishable under section 65 and 66 of IT Act read with
420, 467, 468 and 471 of IPC and sentenced for rigorous imprisonment but the
petitioner filed an appeal against such order which was dismissed by the appellate
court and upheld the trial court judgment. In this case the manager of Vijay Bank,
NIT, Faridabad, filed a complaint to police by stating that the petitioner was
deputed by M/S Virmati Software and Telecommunication Ltd. to maintain the
software system supplied by them to the Bank. But the petitioner has manipulated
the interest entries of computerized bank account and thereby cheated the
complainant bank by forging electronic record in order to cause wrongful loss to
the bank.
In Dilip Kumar Tulsidas v. Union of India 370 case, the petitioner has also
sought directions against the respondents to carry out widespread awareness
campaigns relating to cyber crime sought to be punishable under Information
Technology Act and other penal law. In the prevalent system of cyber crime
investigation, there is a lack of procedural safeguards. There are also a number of
instances where the police and cooperating private entities have displayed great
negligence towards the innocent citizens and the investigative methods are not
suited to dealing with complex cyber crimes.
369
AIR 1982 SC 710.
370
AIR 2015 SC 1523: (2005) 5 SCC.
123
In People’s Union for Civil Liberties v. Union of India 371 case, a writ
petition was filed in public interest under Article 32 of the Constitution of India
regarding the misuse of the Rules framed under the IT Act throughout the country
despite the fact that Supreme Court issuing the similar notice in Shreya Singhal v.
U.O.I372 soon before this. The Information Technology (Intermediaries
Guidelines) Rules, 2011 which provide for legal determinations and effective
censorship by private on-line service providers are vague and undefined
categories and contrary to Articles, 14, 19 and 21. The Information Technology
(Procedure and Safeguards for Blocking for Public Access to Information) Rules,
2009, which provide that the blocking process is completely secret, fail to meet
constitutional safeguards of natural justice under Articles 19 and 21, and the
unreasonably restrictive procedure for banning websites also fails to meet
procedural natural justice standards for book banns.
Identity Theft
The Indian judiciary is playing the important role in dealing with the cyber
crimes relating to identity theft. In Vinod Kaushik and Ors. V. Madhvika Joshi
and Ors.373 Case, the issue was raised that whether the wife accessing husband’s
and father-in- law’s email account without their permission in order to acquire
evidence in a Dowry harassment case amounts to be liable under section 66C of
Information Technology Act for unauthorized access and dishonest use of
password of any person. The court held that the wife was liable under this section.
Then India found its first successful cybercrime conviction in May, 2002
in Sony. Sambandh. Com. Case374 in which Asif Azim was found guilty for
cheating and it was found as a first offence in which the sentence was only for
one-year probation and a personal surety bond of Rs.20, 000. In this case Azim,
who had been working in I- Energizer, a call centre in Noida. He took the credit
card details of one of his clients, Barbara Campa and decided to do some
shopping on free basis by creating an e-mail address in Campa’s name. Then on
May 8 he placed an order on Sony India’s website by using Barbara Campa’s
credit card details. The products were delivered to Azim’s residence the very next
week because it was found a valid transaction by the Sony India’s credit card
company, Citibank and a mail was sent to Campa with the photographs of Azim
371
(2010) 4 SCALE 467.
372
(2013) W.P. Crl. No. 23.
373
(2013) W.P. Crl. No. 21.
374
(2013) W.P. Crl. No. 97.
124
receiving the products. Around the end of June, Campa realized that anything had
not been bought and informed about this to the bank. On the basis of this
information the Citibank made the cross-checking and reported that the
transaction was fraudulent and hence, invalid. This matter was reported to the
CBI and the team found that the Internet Protocol address from where the
messages came was not in the US but in Noida. After this the source computer
which was used by Azim was tracked down and he confessed everything to CBI
by saying that he had done it just for the sake of getting something free of charges
nothing else. The court convicted him under sections 418, 419 and 420 of the
Indian Penal Code.
Violation of Privacy
The Indian judiciary is playing the important role in dealing with the
cyber crimes relating to violation of privacy. In Court on its own Motion v.
State376 case, the Division bench held that where a sting operation made by a
private person or an agency, which may result in violating bodily privacy of
another person will fall under section 66 E of the Act. Such person shall be liable
under the Act.
On Feb. 17, 2017, a 24 year old cyber crime accused and his two aides
who are wanted in cyber crime cases, walked into the cyber crime police station,
Mumbai, posing as vigilance officers and tried to conduct a sting operation on the
investigation officer. They wanted to blackmail the senior police inspector of the
cyber crime cell to not take any action against the accused. However, their spy pen
camera did them in. Subsequently, the police found that the three men had fake
Central Vigilance Commission (CVC) identity cards and fake letterheads with the
names of CBI officers. The Spy camera has been seized.377 Then the police
charged him under section 34 (common intention), 170 (personating a public
servant), 174, 419(cheating by personation), 420 and 506 of IPC.
375
(2013) W.P. Crl. No. 97.
376
(2013) 10 SCC 1.
377
AIR 2015 SC 1523: (2005) 5 SCC.
125
Cyber Terrorism
The Indian judiciary is playing the important role in dealing with the cyber
crimes relating to cyber terrorism. In Krishnan v. Krishnaveni378 case, the issue
was raised before the court that whether an offence of defamation could
reasonably covered under section 499 of I.P.C. or it requires section 66 F of IT
Act. The court has to make the distinction between two and it is observed that
section 499 of I.P.C. covered the offence of defamation with respect to person and
the term ‘person’ does not include a State whereas section 66F covered the
defamation of State.
In 2008, serial blasts in Ahmadabad, Delhi, Jaipur and Banglore are the
live examples of the cyber terrorism in India. In 2008 attack on Mumbai Taj
Hotel which is also known as 26/11 and the Varanasi blast in 2010 had the trails
of cyber terrorism.379 The main purpose of the cyber terrorist is to gather the
restricted information and to spread terror by cyber communications method for
disruption of national security, unity, integrity and peace etc.
Prior to the passage of the Information Technology Act of 2000, the Indian
judiciary played this function in dealing with this type of crime.. In Sukanto v.
State of West Bengal381 case which is relating to a magazine ‘Nara Nari’ as a
obscene publication, the under section 292 of IPC convicted the petitioner for
giving effect to public morality above art, literature. Indian court followed the
principle of obscenity in Ranjit D. Udeshi v. State of Maharastra382 case as given
378
(2010) Cr. Comp 2, available at:
https://it.maharashtra.gov.in/Site/Upload/ACT/Madhvika%20Vs%20Kaushik- Rajesh
%20Aggarwal.pdf (visited on April 6, 2017).
379
(2002), available at: http://www.legalserviceindia.com/lawforum/index.php?topic=2242.0
(visited on April 10, 2017).
380
“Kareena Kapoor and the Curious Case of Identity Theft”, NDTV News, (Oct. 1, 2016),
available at:http://www.ndtv.com/mumbai-news/unknown-person-files-income-tax-return-in-
kareena-kapoor- name-1468962 (visited on April 6, 2017).
381
(2013) WP (C) 162, Del.
382
The Times of India, Mumbai, Feb. 20, 2017, available at: http://timesofindia.indiatimes.com/
126
by the U.S. court in Regina v. Hicklin383 case and the honourable court interpreted
the word “obscene” and stated that obscene may be defined as “offensive to
modesty or decency, lewd, filthy and repulsive”. The court also held in the case
that it constituted the reasonable restriction on the right of freedom of speech and
expression guaranteed under article 19, clause 2 of the Indian Constitution in the
interest of decency or morality. The honourable court in Samaresh Bose v. Amal
Mitra384 case held that depending on the standards of morals of contemporary
society, the concept of “Obscenity” would differ from country to country. In this
case the court also clear a difference between the term “vulgarity” and
“obscenity” by stating that a vulgar writing is not necessarily obscene.
As regards the Cyber pornography, most of the reported Indian Cases are
disposed of in the lower court at the magisterial level. However, the case of State
of Tamil Nadu v. Suhas Katti390 deserves a special mention in this context because
this case was disposed of within a record period of seven months from the date of
filing of the FIR by the expeditious investigation made by the Chennai Cyber
Crime Cell (CCC). This is a landmark case which is considered to be the first case
of conviction under section 67 of Information Technology Act in India which
makes this section is of the historical importance. In this case, some defamatory,
obscene and annoying messages were posted about the victim on a yahoo
messaging group which resulted in annoying phone calls to her. She filed the FIR
and the accused was found guilty under the investigation and was convicted under
section 469, 509 of IPC and section 67 of Information Technology Act.
Further in District Registrar and Collector v. Canara Bank 396 case, the
Hon’ble Supreme Court held by stating that: “the exclusion of illegitimate
intrusions into the privacy depends on the nature of the right being asserted and
the way in which it is brought into play; it is at this point that the context becomes
crucial, to inform substantive judgment. If these factors are relevant for defining
the right to privacy, they are quite relevant whenever there is invasion of that
right by way of searches and seizures at the instance of the State.”
In Ram Jethmalani v. Union of India 398 case, the Hon’ble Supreme Court
has dealt with the right to privacy and elaborately held that right to privacy is the
394
(1999) 1 SCC 759.
395
(2004) Cr. Comp 4680, Egmore, available at: http://lawnn.com/tamil-nadu-vs-suhas-kutti/
(visited on April 5, 2017).
396
(2005) 3 Comp LJ 364 Del: 116 (2005) DLT 427.
397
2010 [SCR. A/1832/2009] Guj.
398
AIR 2006 Ker 279.
129
integral part of right to life and this has a cherished Constitutional value. Here, it
is important to note that human beings be allowed domains of freedom that are
free of public scrutiny unless they act in an unlawful manner.
Offences by Companies
The Indian judiciary is playing the important role in dealing with the cyber
crimes relating to offences committed by companies. In the case of Sheoratan
Agarwal v. State of Madhya Pradesh400, it was held that “there is no statutory
compulsion that the person-in-charge or an officer of the company may not be
prosecuted unless he is ranged alongside the company. Each or any of them may
be separately prosecuted or along with the company if there is a
contravention….by the company.”
India enacted the Information Technology Act on June, 2000 and became
part of a select group of countries to have put in place cyber laws. But the internet
is still a dirty place to hand out; beware those viruses and spam mails. Cyber
hooligans are growing in numbers and are very much at large and we are still
wary of using our credit card online. Despite the enactment of cyber laws, a lot
more needs to be done, both online and offline, as well as within the judiciary and
law enforcement agencies, experts feel. However, a number of right steps have
also been taken to make the Information Technology Act more relevant in
today’s context.409 The Information Technology Act, 2000 has been proved to be
a highly controversial piece of legislation. In its sixteen-odd years of operation,
the Act has managed to draw considerable criticism from the legal community
and the general public. It is alleged to contain a whole spectrum of flaws,
shortcomings and pitfalls ranging from being inefficient in tackling cyber crimes
to placing unfair curbs on the civil liberties of citizens.410
It is found that a number of these types of crimes are not registered under
the existing provisions of Indian Penal Code, 1860 which are ineffective and do
not cover the said cyber crimes. Some market players believe that this will
provide an encouragement to electronic fund transfers and also help in promoting
electronic commerce in the country. But the result is not similar as it is. The cyber
crime cells are doing training programmes for its forces and plans to organize
special courses for corporate to combat cyber crime and use the Information
Technology Act effectively.
409
AIR 2000 Bom 27.
410
(1999) 19 PTC 229 Del.
411
AIR 2000 Bom 27.
132
harassment, defamation, stalking etc. There is a need to take a number of right
steps for the purpose of making the Information Technology Act more relevant
in today’s context.
The current position of Indian cyber cases are increasing day by day. A
total of 8, 045 cases were registered under Information Technology Act during
the year 2015 as compared to 7, 201 cases during the previous year 2014 and
4,356 cases during 2013, showing an increase of 11.7% in 2015 over 2014 and
an increase of 65.3% in 2014 over 2013. 81.6% of the total 8,045 cases in 2015
and 77.0% (5,548 cases) of the total 7,201 cases under IT Act were related to
computer related offences (under section 66A, 66B, 66C, 66D and 66E of the IT
Act) followed by 10.1% in 2015 and followed by 10.5% in under publication/
transmission of obscene/sexually explicit content (under section 67A, 67B and
67C of the Information Technology Act). A total of 14, 121 cases during 2015
and 2,246 cases during 2014 under Information Technology Act were pending for
investigation from previous year. A total of 8,088 at the end of the year 2015 and
6,269 cases at the end of the year 2014 were remained pending for investigation.
A total of 2,396 during 2015 and 1,451cases during 2014 were charge sheeted. A
total of 2,316 remained pending for the trial at the end of the year during 2014.
Uttar Pradesh and Maharashtra has reported the maximum number of persons
arrested under such crimes during 2015 as well as in 2014.412
414
Vipin V. Nair, “Dark Deeds Remain in the Dark”, The Hindus Business, available at:
http://www.thehindubusinessline.com/ew/2003/09/10/stories/2003091000080100.htm (visited on
March 6, 2017).
134
CHAPTER - V
CYBER CRIMES IN UNITED STATES OF AMERICA:
LEGISLATIVE AND JUDICIAL RESPONSE
5.1 Introduction
Technological advancements in communication have facilitated
conversation between people who reside on opposite sides of the globe. One of
the most important inventions in the field of communication is the internet. The
internet has transformed the entire planet into a global village. It has given people
sufficient opportunity to improve both personal and professional interactions
across borders by creating a virtual world with no limits. 415 Because the rise of
globalization have been largely affected by the socio-economic and cultural facets
of life. For the human civilization the cyberspace is as a blessing. Around the
globe people has been connected by the internet.416
As we know cyber crimes are of current origin and affect the whole world
at large, all regional organizations and State countries have called upon
legislatures to draft laws dealing with these crimes; as a result most of the
countries started to do so. In this chapter an attempt has been made to discuss the
cyber legislations and to find out the role of judiciary for combating these new
types of crime emerging in United States.
423
Hassan Arab, “The Development of The Judiciary- Challenges and outlook”, available at:
http://www.tamimi.com/en/magazine/law-update/section-7/October-november-1/the-development-
of- the-judiciary-challenges-and-outlook.html (visited on Jan. 1, 2015).
424
Talat Fatima, Cyber Crimes, 2011, pp. 76-77, see also Donald Brackman’s remarks on the
2009 Annual Report on Cyber crime released by the FBI on March 13, 2010.
425
Ritika Patni and Nihal Joseph, “WTO Ramifications of Internet Censorship: The Google- China
Controversy”, National University of Juridical Sciences Law Review, Vol.3, 2010, p. 337,
available at: http://nujslawreview.org/2016/12/04/1440 (visited on Feb. 10. 2017).
426
Supra note 5, p. 454.
427
“Computer Crime Law and Legal Definition”, available at: https://definitions.uslegal. com/c/
computer-crime/, (visited on March 15, 2017).
137
based on the present offence and prior criminal history. 428 Under the U.S. federal
system each of the fifty states of United States is also permitted, within the
constraint imposed by federal law, to pass additional substantive criminal laws to
regulate computer law at state level. 429 The Youth Internet Safety Survey (YISS),
a nationally representative study of 10 to 17 year old, has researched youth
internet victimization and involvement for multiple years.430
Congress revised the Act in 1986, 1994, 1996, 2001, and 2002 to expand
security for computers and information in the private sector as damage to
corporations escalated as a result of clandestine attempts by individuals outside
the companies and unhappy employees within them. The Act's punishment
provisions were also strengthened, and civil remedies were added.. 431 In 2004, the
Fourth Plenary Session of the Organization of American States General Assembly
passed the resolution on “Adoption of a Comprehensive Inter-American Strategy
to Combat Threats to Cyber security: A Multidimensional and Multidisciplinary
Approach to Creating a Cyber Security Culture,” argues that an effective cyber
security strategy must acknowledge that the security of the Internet's network of
information systems necessitates collaboration between government and
industry.432
On the 9th of February 2009, the President of United State Barack Obama
has directed the National Security and Homeland Security Advisors to conduct a
review of the plan, programs, and activities underway throughout the
government dedicated to cyber security, including new regulations to combat
cyber crime.433 The legislative provisions with respect to various cyber crimes in
428
Davis McCown, “Federal Computer Crimes”, 1995, available at:
https://books.google.co.in/books? id=qZBXcX0ZgZwC&pg=PR5&1pg=
PR5&dg=Federal+Computer+Crimes+by+Davis+McCown&source=bl&ots=JDjoZ5CyyT&sig=J
Yg
XcWqLS13SsX4BnWo0eWlpZDk&hl=en&sa=X&ved=0ahUKEwjA0M26g4bSAhUGpI8KHccO
Be 4Q6AEILjAC#v=onepage&q=Federal%20Computer%20Crimes%20by%20Davis
%20McCown&f=fa lse (visited on Feb. 10, 2017).
429
Tonya L. Putnam and David D. Elliott, “International Responses to Cyber Crime”, University of
Petroleum and Energy Studies Review, Vol. 1, 1999, pp. 39-40, available at:
http://www.hoover.org/sites/default/files/uploads/documents/0817999825_35.pdf (visited on Feb.
13, 2017).
430
Catherine D. Marcum, Goerge E. Higgins, et.al., “Doing Time for Cyber Crime: An
Examination of the Correlates of Sentence Length in the United States”, International Journal of
Cyber Criminology, vol.5, No.2, July.- Dec, 2011, p. 827, available at: http://www.cybercrime
journal.com/marcumetal2011julyijcc.pdf (visited on Feb. 13, 2017).
431
Supra note 10, p. 40.
432
Supra note 11, p. 48.
433
James M. Thomas, “The Computer Fraud and Abuse Act: A Powerful Weapon vs. Unfair
Competitors and Disgruntled Employees”, Employment Law Magazine, 2007, p. 10, available
138
United States of America are given as follows:
Hacking
Hacking is a crime that involves breaking into computer systems and
getting unauthorised access to the data they contain.434 To put it another way,
hacking is equivalent to trespassing. Trespassing has traditionally been considered
a type of crime. Criminal trespass statutes are intended to protect the integrity and
privacy of real properties, such as land and buildings on land, by prohibiting
persons from entering areas where they do not have permission. Hacking is
comparable to trespassing on one's real properties because computers are a type of
property.435 In trespass, there is a strict restriction on the legal or real property
belonging to others but on the other hand in hacking, there is a strict restriction on
the use of computer or computer system or computer network without the
permission of authorized person.
The United State of America enacted several Federal and state laws for the
protection of computer, computer system and computer network from various
forms of cyber crimes i.e. hacking, cracking, cyber fraud, cyber theft etc. The
legislations which deal with ‘Hacking’ are discussed as under:
The Computer Fraud and Abuse Act (CFAA) of 1986 was enacted by
Congress as an amendment to existing computer fraud law (18 USC 1030), which
states that a person is guilty of an offence if he causes a computer to perform any
function with the intent to secure access to any programme or data held in any
computer, or the access he intends to secure is unauthorised; and he knows at the time
when he causes the computer to perform any function that the access he intends to
secure.436 Unauthorized access to a computer or network without a further offense
(e.g. system impairment, obtaining protected information) is per se illegal only
with respect to computers used exclusively by the Government of the United
States. Unauthorized access to all other computers, for instance, those used non
exclusively by the federal government, including computers containing national
security records, and those containing financial and credit records require some
Then after the Data Protection Act, 1998 was enacted which also control
the use and storage of personal data or information relating to individuals If any
person has knowingly accessed a computer without authorization or exceeding
authorised access, and has obtained information that has been determined by the
United States Government pursuant to an Executive order or statute to require
protection from unauthorised disclosure for reasons of national defence or foreign
relations, or restricted data, as a result of such conduct, as a result of such
conduct, as a result of such conduct, as a result of such conduct, as a result of
such conduct, as a result of such conduct, as a result of such, delivered, or
transmitted the same to any person not entitled to receive it, or willfully retains
the same and fails to deliver it to the officer or employee of the United States
entitled to receive it shall be liable to punishment under Section 1030 (1) of this
Act. Section 1030 (2) of the Act provides that if a person who intentionally
accesses a computer without authorization or in excess of authorised access,
obtaining information from a financial institution's or a card issuer's financial
record, as defined in section 1602 (n) of title 15, or from a consumer reporting
agency's file on a consumer, as defined in the Fair Credit Reporting Act (15
U.S.C. 1681 et seq. ); information from any department or agency of United
States; or information from any protected computer if the conduct involved an
interstate or foreign communication shall be liable to punishment under this Act.
This Act also provides that if a person who knowingly and with the intent
to defraud, accesses a protected computer without authorization, or exceeds
437
Zhicheng Yang, “A Survey of Cyber crime”, available at:
http://www.cse.wustl.edu/~jain/cse571- 11/ftp/crime.pdf (visited on Jan.25, 2013).
140
authorized access, and by means of such conduct furthers the intended fraud and
the thing obtained consists only the use of the computer and the value of such use
is not more than $ 5,000 in any one-years period shall be liable to punishment
under § 1030 (4) of this Act.
The Act also provides that if a person who knowingly and with intent to
defraud traffics (as defined in section 1029) in any password or similar
information through which a computer may be accessed without authorization, if
such trafficking affects interstate or foreign commerce; or Such computer is used
by or for the Government of the United States shall be liable to punishment under
Section 1030 (6) of the Act. The Act also provides that if a person who with
intent to extort from any person any money or other thing of value, transmits in
interstate or foreign commerce any communication containing any threat to cause
damage to a protected computer; shall be punished Whoever attempts to commit
an offense shall be liable to punishment under Section 1030 (7) of the Act.
After this in 2000, the Spyware Control and Privacy Protection Act is
passed in which there are also provision for preventing and controlling hacking in
the United States of America. This Act prohibits any deceptive activities relating
141
to Spyware in which unauthorized use of protected computer and causing other
crimes are prohibited under section 2(1). According to this section the internet
browser cannot be opened by the authorized user unless closing all the
programmes or turning off the computer or diverting the internet the internet
browser as a kind of Denial of Service (DOS) attack. Unauthorized modification of
computer settings, network and web page is also prohibited under section 2(2) of
the Act.
Cyber terrorism
Cyber terrorism is a new form of terrorism, which exploits the system we
have put in place. There is a continual drive to computerize every process, in
order to add remote access, accuracy features and ease of use.438 Generically,
cyber terrorism consists of using computer technology to engage in terrorist
activity.439 This sort of cybercrime can include using the internet to connect with
other terrorists, transfer funds to fund a terrorist act, or engage in any other related
conduct.
Before Sep. 11, 2001, the United States of America passed the Computer
Fraud and Abuse Act, 1986 and due to some weaknesses it was amended twice in
the years 1994 and 1996. But after Sep. 11, 2001, an attack on World Trade
Centre and Pentagon, the United States of America passed the Patriot Act, 2001
and recognized hacking as cyber terrorism. Section 814 of The Patriot Act is tilted
as ‘Deterrence and Prevention of Cyber terrorism’ amends section 1030(a) (5) of
title 18, United States Code. The amended section punishes any person who
causes unauthorized damage to a protected computer by either knowingly causing
the transmission of a program, information, code, or command, or intentionally
and unauthorizedly accessing a protected computer. This section applies only if
the accused's actions resulted in a loss of at least $5,000 to one or more people
over a one-year period, or the actual or potential modification or impairment of
one or more people's medical examination, diagnosis, treatment, or care, or
physical injury to anyone, or a threat to public health or safety, or damage to the
environment.
The Patriot Act, 2002 empowers the Attorney General under section 816
to establish adequate regional computer forensic laboratories and provide support
to existing computer forensic laboratories, in order that all such computer forensic
438
Section 1(1) of the Computer Fraud and Abuse Act, 1986.
439
Supra note 10.
142
laboratories have the capability to provide forensic assessments of computer
evidence obtained or intercepted in the course of criminal activities (including
cyber terrorism), providing training and teaching to federal, state, and local law
enforcement officers and prosecutors in the areas of computer crime
investigations, forensic analyses, and prosecutions (including cyber terrorism),
assist Federal, State, and local law enforcement in enforcing Federal, State, and
local criminal laws relating to computer-related crime, facilitate and promote the
sharing of Federal law enforcement expertise and information about the
investigation, analysis, and prosecution of computer-related crime with State and
local law enforcement personnel and prosecutors, including use of multi
jurisdictional task forces, and carry out such other activities as the Attorney
General considers appropriate.
Cyber Pornography
Pornography on the internet can take many different forms. It may include
the hosting of a website containing these banned items, as well as the use of
computers to create these obscene materials and the downloading of obscene
materials via the Internet. These obscene matters can impair an adolescent's
mentality and tend to deprave or corrupt them. 440 taint their minds This term can
also be defined as describing or depicting sexual acts for the purpose of eliciting
sexual excitement through the use of books, films, and pornographic websites, as
well as the use of the internet to download and transmit pornographic videos,
pictures, photos, and writings, among other things.
In United States of America, there are two child pornography laws i.e. The
Child Pornography Prevention Act, 1996 and the Child Online Protection Act,
1998. The former Act prohibits the use of computer technology to knowingly
produce child pornography, that is, depictions of sexually explicit conduct
involving or appearing to involve minors. The latter Act requires commercial site
operators who offer material deemed to harmful to minors to use bonafide
methods to establish the identity of visitors to their site.
The Communication Decency Act, 1996 has been passed to protect minors
from pornography. The CDA states that any person, who knowingly transports
obscene material for sale or distribution either in foreign or interstate commerce
or through the use of an interactive computer service, shall be liable to
imprisonment upto five years for a first offence and up to ten years for each
440
R.K. Tiwari, P.K Sastry, et.al., Computer Crime and Computer Forensics, 2002, p. 99.
143
subsequent offence.
Child Pornography Prevention Act has been passed in 1996 which defines
the ‘Child pornography’ under Section 2256 as any visual depiction of a minor
engaging in sexually explicit conduct, including any photograph, film, video,
picture, or computer or computer-generated images or picture, whether made or
produced by electronic, mechanical, or other means, or sexually explicit conduct,
where the production of such visual depiction involves the use of a minor
engaging in sexually explicit conduct; such visual depiction is, or appears to be,
of a minor engaging in sexually explicit conduct that conveys the impression that
the material is or contains a visual depiction of a minor engaging in sexually
explicit conduct. After this the Child Online Protection Act, 1998 has been passed
which provides for opportunities for minors to access materials through the web,
physical and psychological protection of minors, restrict a minor’s access to
harmful materials, prohibiting the distribution of material harmful to minors,
protection of children from being exposed to harmful materials found on the
internet under sec. 231.
In 1998, the Protection of Children from Sexual Predators Act has been
passed with the ambit of expanding the liability to those persons who attempts to
use the internet for purposes of Child pornography. This Act specifically targets
commercial pornographers and makes it crime to knowingly make a
communication for commercial purposes harmful to minors (16 years old and
younger) or to use the internet for purposes of engaging in sexual activities with
minors.
Cyber Stalking
Stalking is a crime that causes the victim to feel fear, terror, intimidation,
stress, or anxiety.441 The use of the Internet or other technological means to stalk
someone is known as cyber stalking. The terms "online harassment" and "online
abuse" are often used interchangeably. 442 Mostly cyber stalking involves
following a person’s movement across the internet by positing threatening
messages to the victim or by entering the chat-rooms frequented by the victim or
441
Susan W. Brenner, “At Light Speed: Attribution and Response to Cybercrime/ Terrorism/
Warfare”, Journal of Criminal Law and Criminology, vol. 97, No. 2, 2007, p. 386, available at:
http://scholarlycommons.law.northwestern.edu/cgi/viewcontent.cgi?article=7260&context=jclc
(visited on Feb. 13, 2017).
442
Parthasarathi Pati, “Cyber Crimes”, available at: http://www.naavi.org/pati/pati_ cybercrimes_
dec03.htm (visited on Feb. 13, 2017).
144
by constantly bombarding the victim with the e-mails etc.443 In general it may be
defined as the repeated acts of harassment targeting the victim such as following
the victim, making harassing phone calls, vandalizing victims property, leaving
written messages or objects using through computer, computer system or
computer network in the absence of universally accepted definition of cyber
stalking.
In United States of America almost every state has laws dealing with cyber
stalking. US federal Code 18 under section 2261 A (2) states that whoever with
the intent uses the mail, any interactive computer service, or any facility of
interstate of foreign commerce to engage in a course of conduct that causes
substantial emotional distress to that person or places that person in reasonable
fear of the death of, or serious bodily injury shall be liable under section 2261 B
(b) for a imprisonment which may extend upto life imprisonment if the death of
the victim results; for not more than 20 years if permanent disfigurement or life
threatening bodily injury to the victim results; for not more than 10 years, if
serious bodily injury to the victim results or if the offender uses a dangerous
weapon during the offense.
2016).
146
Cyber Defamation
Defamation can be understood as the intentional infringement of another
person’s right to his good name. It is the wrongful and intentional publication
of words or behavior concerning another person’s status, good name, or
reputation in society. It is not defamatory to make a critical statement that does
not have a tendency to cause damage, even if the statement turns out to be
untrue.447 Any derogatory statement, which is designed to injure a person’s
business or reputation, constitutes cyber defamation. Defamation can be
accomplished as libel or slander. Cyber defamation occurs when defamation takes
place with the help of computers and/or the Internet.448 For example if A
publishes a defamatory statement on a website or to send an e-mails containing
defamatory information about B to all his friends.
The United States also has a unique law which governs the accountability
of the acts relates to online defamation. The Communications Decency Act
(CDA), 1996 is one of the most valuable tools for protecting freedom of
expression and innovation on the internet. After Stratton Oakmont Inc. v. Prodigy
Services Co.449 case, the Congress applied the standard publisher/ distributor test
to find an online bulletin board liable for the post by a third party and specially
enacted Communications Decency Act (CDA), 1996 for the purpose of reversing
the Prodigy findings and providing for private blocking screening of offensive
material.
Section 223 of Communications Decency Act (CDA), 1996 lays down that
any person who puts the information on the web which is obscene, lewd,
lascivious, filthy or indecent with intent to annoy, abuse, threaten or harass
another person will be punished either with imprisonment or with fine. Section
230 also provides for protection for private blocking and screening of offensive
material. The section says that no provider or user of an interactive computer
service shall be considered as the publisher or speaker of any information
provided by any other information content provider.
447
Christa Miller, “High-Tech Stalking”, Investigation Magazine, available at: http://www.
officer.com/article/10233633/high-tech-stalking (visited on Feb. 13, 2017).
448
R.C. Mishra, Cyber Crime: Impact in the New Millennium, 2002, p. 54.
449
Sallie Spilsbury, Media Law, 2000, p. 60.
450
Syed Mohd. Uzair, “Cyber Crime and Cyber Terrorism in India”, A thesis submitted to
Aligardh Muslim University, 2013, p. 50.
147
Drudge451, the court have demonstrated that although applying section 230 of the Act
is expressly uneasy for them and they are also bound to find providers who are
immune like AOL (Initialism of America Online) from defamatory postings. This
immunity applies even if the providers are notified of defamatory material and
neglect to remove it, because provider liability upon notice would likely cause a
burden of complaints on providers and on their right of freedom of speech and
expression.
The Hon’ble court ruled in Obsidian Finance Group, LIC v. Cox452 case
that liability for a defamatory blog post involving a matter of public concern
cannot be imposed without proof of fault and actual damages. Bloggers saying
libelous things about private citizens concerning public matters can only be sued
if they are negligent.
Phishing
Phishing occurs when consumers of financial institutions receive
unsolicited emails demanding their username, password, or other personal
information in order to access their account for whatever purpose. When
customers click on the links in the email to submit their information, they are
directed to a false clone of the actual institution's website, and they are unaware
that they have been duped. The fraudster now has access to the customer's online
bank account, as well as the funds in it. 453
It's simply one of the many types of
internet-based fraud.
On January 26, 2004 the United States Federal Trade Commission filed
the first lawsuit against a suspected phisher. The defendant, a Californian
teenager, allegedly created a webpage designed to look like the America Online
website, and used it to steal credit card information.454 After this, Senator Patrick
Leahy introduced the Anti- Phishing Act in Congress on March, 2005 which
would punish and fined those cyber criminals who created the fake websites and
sent bogus e-mails with the purpose of defrauding consumers. But it did not pass.
In Jan. 2007, Jeffrey Brett Goodin of California was become the first
convicted cyber criminal by a jury under The CAN- SPAM Act, 2003 for
sending thousands of e-mails to America Online users which prompted
customers to submit personal credit card information. In United States of
451
(1995) N.Y. Misc. Lexis 229.
452
(1997) 129 F. 3d 327 (4th Cir).
453
(1998) 992 F. Supp. 44 (D.D.C).
454
(2011) CV- 11- 57- HZ.
148
America, The CAN- SPAM Act, 2003 is the direct response of the growing
number of complaint over spam e-mails and is also the first USA cyber law which
establishes national standards for sending of commercial e-mail. It controlled the
assault of non-solicited pornography and market. A person or a business engaging
in commercial emails can be fined upto $ 11000 for each and every violation of
the Act.
Cyber Fraud
The United States of America enacted the Computer Fraud and Abuse Act,
1996 for prohibiting and punishing computer and internet fraud which was further
amended in the year 1994, 1996 and also amended by the Patriot Act, 2001 and in
2008 by the Identity Theft Enforcement and Restitution Act. U.S Criminal Code’s
provisions are also applicable on the cyber fraud and the violators can be
prosecuted under title 18 i.e. no. 1028 prohibits social security cards fraud and
credit card frauds, no. 1029 prohibits identity fraud including telemarketing fraud,
no. 1341 prohibits mail fraud, no. 1343 prohibits wire fraud etc. The Federal
Statute title 18 U.S. Code s. 1030 also prohibits fraud and other related activities
in connections with computers.
Cyber Squatting
The act of registering, selling, or utilising a domain name with the goal of
benefitting on the goodwill of another's trademark is known as cyber squatting. It
refers to the practise of purchasing domain names that contain the names of
existing businesses with the intention of reselling the names to those firms for a
profit.455 United States passed the federal laws on cyber squatting which is
known as Anti-Cyber Squatting Consumer Protection Act in 1999. According to 15
U.S.A s. 1125(d), cyber squatting is registering, trafficking in, or using an internet
domain name with bad faith intent to profit from the goodwill of a trademark
Mohit Goyal, “Ethics and Cyber Crime in India”, International Journal of Engineering and
455
Title 18 section 1037 of United States Criminal Code provides that if any
person accesses a protected computer without authorization and intentionally
initiates the transmission of multiple commercial electronic mail messages from
or through such computer, uses a protected computer to relay or retransmit
multiple commercial electronic mail messages with the intent to deceive or
mislead recipients, or any internet access service, as to the origin of such
messages, materially falsifies information in a commercial electronic mail
message or two or more domain names and intentionally initiates the transmission
of multiple commercial electronic mail messages from any combination of such
accounts or domain names, falsely represents oneself to be the registrant or the
legitimate successor in the interest to the registrant of five or more internet
protocol addresses and intentionally initiates the transmission of multiple
commercial electronic mail messages from such addresses or conspires to do so
shall be liable to punishment under this code.
In cyber jurisdiction, the Court must address the question of which law
maker has jurisdiction over actions taking place on the Internet. In the few cases
the Courts have adjudicated, they have applied long-arms statutes and personal
jurisdictional principles in making decision.460 The law of cyber jurisdiction
involves determination whether a particular activity in cyberspace is controlled by
the laws of the State or country where website is located, or by the laws of the
State where Internet Service Provider (ISP) is located, or by the laws of the State
where user is located or by all these law. The Internet can be seen as multi-
jurisdictional because of the ease which a user can access a Web site anywhere in
the world.461
457
“Cyber Squatting: What it is and what can be done about it”, available at:http://www.
nolo.com/legal- encyclopedia/cybersquatting-what-what-can-be-29778.html (visited on Jan. 26,
2017).
458
Anirudh Rastogi, Cyber Law-Law of Information Technology and Internet, 2014, p. 17.
459
Nandan Kamath, Law Relating to Computer Internet & E-Commerce: A Guide to Cyber Law &
IT Act, 2000 with Rules & Regulations, 2000, p. 20.
460
Suryajyoti Gupta, “Civil and Criminal Jurisdiction in the Internet”, Indian Bar Review, vol. 29,
2002, p. 45.
461
Yashraj Vakil, “Jurisdictional Challenges – Cyber Crime Prosecutions”, The Lawyers
Collective, February, 2005, p. 29.
462
“Judicial Response on Cyber Crime”, p. 276, available at: http://shodhganga.inflibnet.ac.in:
8080/jspui/bitstream/10603/70095/6/chapter%205.pdf (visited on June 7, 2016).
463
Id, p. 277.
151
with such a transnational nature of cybercrimes.464 The advent of Internet
overturned the century-old- established theories of jurisdiction which were deeply
rooted in the territorial and physical concept.465 Most of the traditional theories of
jurisdiction are over-inclusive in relation to the Internet because they allow for the
almost unlimited exercise of judicial jurisdiction.466
464
Gray v. American Radiator & Standard Sanitary Corp., (1961) 22 III 2d 432.
465
Supra note 5, p. 339.
466
Supra note 39.
467
Supra note 5, p.21.
468
Adria Allen, Internet Jurisdiction Today, 22 J Int’1 L & Bus 69 (2001).
152
received their material.469 On this the court ruled that the defendants had a
preexisting method of screening potential members and they could protect
themselves from being subjected to liability in jurisdiction with less tolerant
standards by pre-screening their members. The court further ruled the defendants
were free to tailor their messages to the communities on a selective basis.
Accordingly, the court held that there was no need to develop a new definition of
community and the obscenity was to be judged by what the average person
applying the community standards.470
In United States v. Robert Tappan Morris 472 case, Morris was pursuing
Ph.D from Cornell University in computer science in the year 1988. Cornell
University provided him an account on the computer for using it. That time by his
hard work he discovered a worm called which is a form of virus used for
demonstrating the inadequacies of security systems and networks. Then he
released that worm in the computer of Massachusetts Institute of Technology
(MIT) on November 2, 1988 which could break into computers and networks and
could cause damage and infection at very fast to other computers. But the speed
of that worm was not known by the accused and then he discussed it with his
friend at Harvard. Then he sent an anonymous message from Harvard over
network, instructing clogged, but it was too late because by that time military
sites, medical research sites, installations sites, Universities websites were
infected. The court found him guilty under title, 18 USC s. 1030(a)(5)(A) and
469
(1977) 326 US 310, 316: 66SCt154, 158:90 L Ed 2d 683.
470
(1973) 413 US 15:37 L.ED 2d 419.
471
(1987) 480 U.S. 102.
472
(1991) 928 F. 2d 504 [cert. denied, 502 U.S. 917].
153
sentenced him 3 years of probation, 400 hours of community service, a fine of
$10,050 and the costs of his supervision. That conviction of his was appropriated
by the District Court.
The United States of America v. Jake Barker and Arthur Gonda 473 was a
case of criminal prosecution under tile 18 U.S.C.s. 875 c. The defendant was
charged with transmitting threats to injure, kidnap another and objectionable
materials in electronic mail messages through internet. In Dec. 1994 the e-mail
messages were exchanged between Jake barker and co-accused A. Gonda. J. Barker
was then in Michigan and A. Gonda was in some unknown place with unknown
identity. They exchanged electronic mail through a computer in Ontario, Canada.
They began this exchange on 29th November 1994 and ended on 25th January
1995. Sexual interest and violence against women and girls were their point of
view. J. Barker was arrested for language used by the accused and posted in
internet news group are based on torture, rape, murder of woman citing same
name of their classmate at the University of Michigan. Barker was arrested and
the Judicial Magistrate recognized him as a threat to the community and ordered
to detain him which was affirmed by the District Court. But on 8th March, 1995
court released accused on bond on his motion.
In Martiz, Inc. v. Cyber Gold, Inc.477, case the US District Court for the
Eastern District of Missouri had reached a similar conclusion in finding that it had
jurisdiction over a California defendant in a trademark infringement case, where
the defendant’s only contact with the state was through its California based
website, which was accessible in Missouri.
475
U.S.C. Constitution Amendment XIV.
476
(1996) 937 F. Supp. 295 (S.D.N.Y).
477
(1996) 96-CV01340 (E.D. Mo).
478
(1997) 95 Cir 4037 (S.D.Ca).
479
Shaffer v. Heitner, (1997) 433 US 186: 53 L Ed 2d 683.
155
injury occurred is the place of trying the case was followed in torts matters. But
now both in civil and criminal matters, the emerged boundaries of the internet
have exposed the cyber criminal under universal jurisdiction.
In U.S. v. Gorshkov486 case, it was found by the FBI that there has been a
series of breakdown into the computer systems of various businesses in the
United States. The court held in the case that the act of downloading information
from a computer in country by the FBI agents do not constitute a search or seizure
since the copying of the data on the Russian computers did not interfere with the
possessory interest of the defendant in the data.
485
(1997) 106 F. 3d 1069, [1st Circuit Court].
486
(2001) W1 1024026.
157
Sentencing Guidelines (USSG). The USSG is a detailed sentencing guideline,
with the ranges of sentencing calculated with current offense and past criminal
history, which acts a uniform sentencing policy for federal court.487
Under the U.S. federal system each of the fifty states of United States is
also permitted, within the constraint imposed by federal law, to pass additional
substantive criminal laws to regulate computer law at state level. 488 The Youth
Internet Safety Survey (YISS), a nationally representative study of 10 to 17 year
old, has researched youth internet victimization and involvement for multiple
years.489 As damage to companies increased due to the clandestine efforts of
individuals outside the companies and disgruntled employees within, Congress
amended the Act in 1986, 1994, 1996, 2001 and 2002 to expand protections to
computers and information in the private sector. Congress also beefed up the
penalty provisions in the Act and added civil remedies.490 In USA, for the year
2015, Cost of Data Breach Study by IBM and the Ponemom Institute revealed
that the average total cost of a data breach increased from $ 3.52 million in 2014
t0 $ 3.79 million. Another study said that cyber crime will become a $ 2.1 trillion
problem by 2019.491
Hacking
The United States of America judiciary has played an important role in
dealing with the unauthorized access. The US Department of Justice had
pronounced the punishments for hacking under 18 USC s. 1029 of the Computer
Fraud and Abuse Act, 1986. In United States v. Morris492 case, the Circuit Court
concluded that s. 1030 (a) (5)(A) of the said Act does not require the Government
to demonstrate that the defendant intentionally prevented authorized use and
thereby caused damages.
After this case, in Briggs v. State of Maryland493 case, the Court held that
487
Supra note 11.
488
Supra note 10, p.40.
489
Supra note 11, p .48.
490
Supra note 14.
491
Limor Kissem, “2016 Cyber Crime Reloaded: Our Prediction for the Year Ahead”, (Last
Modified on Jan. 15, 2016), available at: https://securityintelligence.com/2016-cybercrime-
reloaded-our- predictions-for-the-year-ahead/ (visited on Dec. 2, 2016).
492
(1991) 504 F 2d.
493
(1998) 348 MD 470.
158
the statute of the state of Maryland that criminalizes unauthorized access to
computers was intended to prohibit use of computers by those not authorized to
do so in the first place, and may not be used to criminalize the activities of
employees who use employers’ computer system beyond the scope of their
authority to do so.
494
(1997) 106 F.3d 1069 (1st Cir).
495
(1995) Commonwealth No. 60488.
159
and without authority or lawful excuse destroys, erases or alters data is guilty of
an offence. In this case, the Court held that a person commits an offence under
this section if he lacks the authority to insert the particular information into a
computer, notwithstanding that he has general authority to insert other
information into such computer. The Court further held that an entry intentionally
made without lawful excuse and known to be false is made without lawful
authority.
In United States v. Ivanov496 case, the Computer Fraud and Abuse Act was
discussed regarding its extraterritorial applicability. In this case the accused was
charged for illegally accessing the computer systems of a web hosting service
under the Computer Fraud and Abuse Act. He contended that he was in Russia at
the time of commission of offence that’s why he cannot be prosecuted under the
above mentioned Act. But the court rejected his contention and held that he can
be prosecuted under the interstate and foreign commerce of the Act. The Act
applied not only within the boundaries of America but also beyond it.
In United States v. Harris497 case the accused was charged and convicted
by the court under Computer Fraud and Abuse Act for unauthorized access to her
employer’s computer system and obtained the Social Security Numbers of several
people in order to target them in a fraudulent credit card scheme.
496
(2001) 175 F Supp 2d 367 (D. Conn).
497
(2002) 302 F 3d 72 EDNY (2nd Cir Court).
498
United States Department of Justice, Dec. 2, 2015, available at: https://www.justice.gov/usao-
cdca/pr/operator-revenge-porn-website-sentenced-2-years-federal-prison-email-hacking-scheme
(visited on April 9, 2017).
499
United States Department of Justice, District Court of New Jersey, Dec.15, 2015,
available at: https://www.justice.gov/usao-nj/pr/three-men-arrested-hacking-and-spamming-
scheme-targeted- personal-information-60-million (visited on April 9, 2017).
160
Cyber Terrorism
The United States of America judiciary has also played an important role
for combating the cyber terrorism which is emerging in the recent times. In
United States v. Robert Tappan Morris500 case, Morris was pursuing Ph.D from
the Cornell University in computer science in the year 1988. The Cornell
University has given him an account on the computer to use it and after that he
has discovered “worm” called as one form of “virus” which may be used to
demonstrate the inadequacies of security systems and networks. Then, he released
the worm through a computer at the Massachusetts Institute of Technology (MIT)
on 2nd November 1988 which caused damage and infection very fast to other
computers. He then discussed it with his friend at Harvard and sent an anonymous
message from Harvard over network, instructing clogged, but it was too late
because by that time military sites, medical research sites, installations sites,
Universities websites were infected. The court found him guilty under title, 18
USC s. 1030(a) (5) (A) and was sentenced to 3 years of probation, 400 hours of
community service, a fine of $10,050 and the costs of his supervision. This was
affirmed by the circuit court in the year 1991 and held that section 1030(a) (5) (A)
does not require the Government to demonstrate that the defendant intentionally
prevented authorized use and thereby caused loss. There was sufficient evidence
for the jury to conclude that Morris acted “without authorization” within the
meaning of s. 1030(a) (5) (A) and s. 2(d) of the Computer Fraud and Abuse Act
1986. That conviction was made appropriate by the District Court.
In United States v. Robert Lyttle502 case, the defendant was pleaded guilty
in Federal Court for hacking into government computers and defacing
government websites violating Title 18 U.S.C. s. 1030. The defendant was
admitted his crime that he had unlawfully accessed computer system of various
500
(1991) 928 F. 2d 504 [Cert. denied, 502 U.S. 917 (1991)].
501
US Department of Justice (2003).
502
US Department of Justice (2005).
161
government agencies for obtaining confidential files and data to deface websites
hosted on computers. The court held his conviction and sentenced him for cyber
terrorism under the Act.
Cyber Pornography
The judiciary of United States of America has played an important role to
overcome with the cyber pornography. The test of obscenity was laid down firstly
in the case of Regina v. Hicklin504 as the tendency “to deprave and corrupt those
whose minds are open to such immoral influences and into whose hands a
publication of this sort may fall”. But later on this test of obscenity was slightly
changed in United States v. One Book Entitled “Ulysses”505 case by stating that
the criterion for obscenity was not the content of isolated obscene passages but
rather “publication taken as a whole has a libidinous effect”. Then after the
Hon’ble U.S. Supreme Court redefined the obscenity in Roth v. United States506
case by stating that “whether, to the average person, applying community
standards, the dominant theme of the material taken as a whole appeals to prurient
interests.”
503
US Department of Justice (2007).
504
(1868) 3 QB 360.
505
(1934) 72 NY 705.
506
(1957) 354 US 476.
507
(1997) 997 F. Supp. 246 (D. Conn).
162
In United States v. Hilton508 case, a federal grand jury charged Hilton for
criminal possession of computer disks containing three or more images of child
pornography in violation of 18 U.S.C. $ 2252A (A)(5)(B). He challenged the state
without denying the charges. He contended to dismiss the charges on grounds that
the act was unconstitutional under the First Amendment. The U.S. district court
was also agreed with his contention regarding the vagueness of the definition of
child pornography but in this case the issue was raised whether the CPPA poses
substantial problems of over breadth and which would sufficient to justify
overturning the judgment of the lawmaking branches. It was held by the court that
the Control and Privacy Protection Act (CPPA), 2000 is not unconstitutionally
overbroad and the judgment of the district court is reversed.
In United States v. Mathews509 case, the court held that under federal law
each transfer of child pornography image by email is a separate offence. The
defendant contended that the successive email transmissions were also the part of
a single online conversation. But the court rejected his contention. The Appellate
court affirmed this decision.
508
(1999) 167 F.3d 61 (1st GR.), [cert. denied, 120 S. Ct. 115].
509
(1998) 11 F. Supp 2d 656 (D. Md).
510
(1997)111 F. 3d 1472 (10th Cir).
511
(1999) 35 F. Supp. 852 (D. Utah).
163
and accessible to a global audience with no chance of encountering the offender was
not reasonably related to the non-punitive goal of preventing additional sex offences,
according to the court, and thus violated the Double Jeopardy and Ex Post Facto
Clauses. The statute did not violate the Equal Protection Clause, according to the
court, because it was logically tied to the purpose of preventing sexual offences. The
Court also held that the Due Process Clause was not violated because the
information to be posted is considered “non private” and therefore there is no
cognizable injury to the plaintiff’s reputation.
Cyber Stalking
The stalker's ability to access the victim at any time and from any distance
undermines the victim's sense of security and might lead to the victim's persistent
worry. In July of 2013, New York prosecutors obtained an arrest warrant for
Jessica Parker, a New Zealand woman who had been online stalking a writer
called Melissa Anellin for five years. “You will have much to fear from me in the
future months,” one e-mail from 2009 stated. This isn't over until someone is
512
(2002) 95 Ohio St 3d 254 : 767 NE 2d 242.
513
(2002) 28 Cal 4th 396: 48 P 3d 1148.
514
Supra note 79.
164
bleeding to death on the floor.” Despite the distance, the internet enabled Parker
to stalk, threaten, and terrorise on a regular basis, instilling fear and eroding a
sense of security.515
Cyber Defamation
The judiciary of United States has played an important role in dealing with
the cyber defamation emerged in cyber space day-by-day. In Anderson vs. New
York Telephone co519 case, the Court held a defendant must have had a direct hand
515
Steven D. Hazelwood and Sarah Koon Magnin, “Cyber Stalking and Cyber Harassment
Legislation in the United States: A Qualitative Analysis”, International Journal of Cyber
Criminology, Vol. 7 (2), July- December, 2013, p.157, available at:
http://www.cybercrimejournal.com/hazel woodkoonmagninijcc2013vol7issue2.pdf (visited on
Jan. 27, 2017).
516
R. v. Vose, (1999) VSCA 200.
517
United States Department of Justice, December 4, 2015, available at: https://www.justice.gov/
opa/pr/defendant-pleads-guilty-tallahassee-cyberstalking-case (visited on April 9, 2017).
518
Available at: https://www.justice.gov/opa/pr/former-us-state-department-employee-
pleads-guilty- extensive-computer-hacking-cyberstalking (visited on April 9, 2017).
519
(1974) 35 NY 2d 746.
165
in disseminating the material whether authored by another, or not in order to be
deemed to have published a libel. If Xerox Corporation had no notice then it could
not be held liable.
534
(1998) FSR 265.
535
(1999) 196 F.3d 1137 (Cri Utah).
536
(2001) 19304-7-III (Wash. Ct. App)
167
agenda of harmonizing the atmosphere between nations for combating cyber
crimes by the international treaties, conventions or commissions i.e. UNCITRAL
Model Law etc. It can also be concluded that United States of America has
enacted several laws for combating cyber crimes; despite this many complicated
legal issues are still unresolved. The legal positions relating to electronic
transactions and civil liability in cyberspace is still confused or not clear by the
reason of not having any adequate laws on globally.
There are a large number of cyber laws passed and amended in United
States of America. But instead of these laws the cyber crimes are increasing day
by day. For example, in United States of America for the year 2015, Cost of Data
Breach Study by IBM and the Ponemom Institute revealed that the average total
cost of a data breach increased from $ 3.52 million in 2014 t0 $ 3.79 million.
Another study said that cyber crime will become a $ 2.1 trillion problem by
2019.538
537
“Cyber Thieves are Caught, But conviction is Wobbly”, Hindustan Times, at 18 (August 9,
2006)
538
Supra note 72.
539
Donald Brackman’s remarks on the 2009 Annual Report on Cyber crime released by the
Federal Bureau of Investigation (FBI) on March 13, 2010.
168
CHAPTER - VI
CYBER CRIMES IN UNITED KINGDOM:
LEGISLATIVE AND JUDICIAL RESPONSE
6.1 Introduction
Digital technology is encompassing in all walks of life, all over the world
and has brought the real meaning of globalization.540 This cyber system is means
for two sided
i.e. at the one side it provides opportunities to communicate and the other
side some cyber criminals use it for the purpose of exploiting others with the
medium of the Internet and other network communications which are
international in scope.
People can visit the entire world, speak with anyone they want, see anyone
they want, even thousands of miles away, have online discussions with each
other, sell and purchase things, access banking facilities, create information, and
exchange information online with a single click of a keyboard and mouse. 541 This
is another problem in cyber space of not having the specific location.
540
Ajeet Singh Poonia, “Cyber Crimes: Challenges and its Classification”, International Journal
of Emerging Trend & Technology in Computer Science, vol. 3, No. 6, Nov. –Dec. 2014, p. 119,
available at: http://www.ijettcs.org/Volume3Issue6/IJETTCS-2014-12-08-96.pdf (visited on
March 8, 2015).
541
M. Dasgupta, Cyber Crime in India- A Comparative Study, 2009, p. 1.
542
Prafulla Kumar Nayak, “Cyber Attacks More Terrifying Than Terrorists- A Critical Analysis”,
Indian Bar Review, Vol. XL, No.2, 2013.
169
this war as cyber war or net war.543 At present, the internet has become a way to
engage in cyber war like Taiwan against China, Israel against Palestine, India
against Pakistan, China against the United States of America etc.
The ever-soaring cyber crime graph and the money loss connected thereto,
the unending innovations and the formidable challenges did not spare even the
most advanced nations. The technological strokes were felt even in United
Kingdom and accordingly, it started responding to it.545 Because for every
country’s success legislature and judiciary are important organs for making the
sufficient laws, its enforcement by punishing wrongdoer, maintaining good
international relations and to attract investment. A country needs some degree of
order, laws and continuity and its better and timely enforcement for functioning in
a good and systematic way. Safety and security laws have long been merely a
question of protection against dangers from the physical world. This new cyber
world is increasingly intertwined with the traditional offline world and therefore
safety laws and its enforcement in cyberspace have become a pre-requisite for a
well-functioning country. In this chapter an attempt has been made to discuss the
cyber legislations and to find out the role of judiciary for combating these new
types of crime emerging in United Kingdom.
The General Assembly of the United Nations by resolution dated January 30,
1997 has adopted the Model Law on Electronic Commerce regarding electronic
mail, data interchange, internet etc. to adopt uniform, international, adequate and
effective law.549 The United Nations Model law UNCITRAL provides that there
must be equal legal treatments for users of electronic communication and paper
based manual communication. There are number of offences which have been
emerged in the cyber space like cyber defamation, cyber pornography, child
password sniffing, spoofing, email bombing, spamming, phishing,
telecommunications fraud, Internet pedophilia, computer network break-ins,
industrial espionage, software piracy, the availability of illicit or unlicensed
products and services etc. and also there are various emerging cyber offences
now-a-days like cyber terrorism, cyber hacking, cyber laundering , credit card
fraud etc.
United Nations alerted states about the importance of putting special laws
to deal with cyber crime. Many Resolutions on combating the criminal misuse of
information technologies were adopted by the General Assembly, the 13th of May
2005 resolution included:551
546
(1996) 3 All ER 481.
547
(1987) 3 WLR 803: (1988) 2 All ER 186. In this case, the Court of Appeals, helplessly
applied the Forgery and Counterfeiting Act, 1981 to unauthorised access to password codes of
various mailboxes.
548
Supra note 6.
549
B.B. Nanda and R.K. Tewari, “Cyber Crime- A Challenge to Forensic Science”, The Indian
Journal, 2000, pp. 102-103.
550
Steven Furnell, Cybercrime: Vandalizing the Information Society, 2004, p. 27.
551
S. Schjolberg and A.M. Hubbard, “Harmonizing National Legal Approaches in Cybercrime”,
171
“International cooperation at all levels should be developed further.
Because of its universal character, the United Nations systems, with improved
internal coordination mechanisms called for by the General Assembly, should
have the leading role in intergovernmental activities to ensure the functioning and
protection of cyberspace so that it is not abused or exploited by criminals or
terrorists.”
Unauthorized Access
In the United Kingdom, Professor L. Lloyd says 553, “the stereotypical
depiction of a cyber hacker tends to be that of a male teenager in a greasy T-shirt
and torn jeans who spend hours slumped over a terminal, eyes gazing fixedly at
the green glow of the VDU monitor. Nowhere is safe, no one can keep him out,
no one knows of the scale of the threat, the silent deadly menace stalks the
networks as seen in R v. Gold.”554
After this the United Kingdom Audit Commission has recommended some
International telecommunication Union, WSIS Thematic Meeting on Cyber Security, Geneva,
June 28-July 1, 2005.
552
World Summit on the Information Society, Tunis, Nov. 18, 2005, available at: http://www.itu.
int/net/wsis/docs2/tunis/off/6rev1.html (visited on Feb. 14, 2017).
553
L.J. Lloyd, Information Technology Law, 2000, p. 27.
554
(1988) AC 1060.
172
preventive measures with the British standard for information security
management on the basis of prevention is better than cure. In this reports it was
identified that there are certain security polices which must be followed urgently
including firstly, cyber security which is adequate with business strategy,
secondly, clear statement of the importance of cyber security, thirdly, clear
statement of the adequate and proper law regarding Information Technology
security, fourthly, clear statement of the responsibilities of staff to protect
investment in new Technology and computer data, fifthly, clear statement of the
steps taken by the management to encourage to adopt and maintain high security
standards as well as to enforce it in reality by the management, sixthly, statement
of the steps taken to reduce computer misuse i.e. secure password systems etc.
and lastly, Internal control mechanisms.
In United Kingdom, before the Computer Misuse Act (CMA), 1990, there were
laws like the Theft Act and the Telecommunications Act, 1984 which prohibits
misuse of the public telecommunications. The Interception of Communication
Act, 1985 prohibits forgery and other criminal activities in the course of
transmission by the public telecommunication systems. The Data Protection Act,
1084 was also passed to protect computer data and database from any violations
or damage. But in 1988, the Law commission submitted its report in which
suggestions and recommendations has been made for enacting a specific law on
computer misuse. On these recommendations the Computer Misuse Act (CMA),
1990 has been passed.
Cyber Terrorism
Generically, cyber terrorism consists of using computer technology to
engage in terrorist activity.555 This type of cyber crime can involve using the
internet to communicate with other terrorists, to transfer the money needed to
fund a terrorist act or any other related activity. Cyber terrorism may be defined
to be the premeditated use of disruptive activities, or the threat thereof, in cyber
space, with the intention to further social, ideological religious, political or similar
objectives, or to intimidate any person in furtherance of such objectives. 556
Before the Terrorism Act, 2000 United Kingdom enacted the Data
Protection Act, 1984 and in the year 1990 to prevent and control cyber terrorism
555
Susan W. Brenner, “At Light Speed: Attribution and Response to Cybercrime/ Terrorism/
Warfare”, Journal of Criminal Law and Criminology, vol. 97, No. 2, 2007, p. 386,
available at: http://scholarlycommons.law.northwestern.edu/cgi/viewcontent.cgi?
article=7260&context=jclc (visited on Feb. 13, 2017).
556
Parthasarathi Pati, “Cyber Crimes”, available at: http://www.naavi.org/pati/pati_
cybercrimes_ dec03.htm (visited on Feb. 13, 2017).
557
Syed Mohd. Uzair, “Cyber Crime and Cyber Terrorism in India, A thesis submitted to Aligardh
Muslim University, 2013, p. 68, available at: http://shodhganga.inflibnet.ac.in/ bitstream/
10603/63591/9/09_chapter%202.pdf (visited on Feb. 13. 2017).
558
Dorothy Denning, Activism, Hactivism and Cyber terrorism: The Internet as a tool for
Influencing Foreign Policy, 2001, p. 241.
559
Supra note 2, p. 204.
174
and other crimes the Computer Misuse act was passed after R. v. Gold case.560
After this the Terrorism Act, 2000 is passed which defines the term “Terrorism”
which includes the use or threat of action that is designed seriously to interfere
with or seriously to disrupt an electronic system designed; to influence the
government or to intimidate the public or a section of the public, and made for the
purpose of advancing a political, religious or ideological cause”.
Cyber Pornography
Pornography includes hosting the website containing this prohibited
material, use of computers for producing these obscene materials and
downloading through the internet the obscene material. These obscene matters
may cause harm to the minds of adolescent and tend to corrupt their minds. 562 In
simple terms, cyber pornography means to describe or to show sexual acts in
order to cause sexual excitement through e-books, e-films, images, videos etc. by
using internet on cyberspace.
Cyber Stalking
Cyber stalking is use of the Internet or other electronic means to stalk
someone. This term is used interchangeably with online harassment and online
abuse.566 Mostly cyber stalking involves following a person’s movement across
564
“Cyber Pornography”, available at: http://www.lawyersclubindia.com/articles/Cyber-
Pornography- 6396.asp (visited on April 12, 2016).
565
Section 1(2) of Obscene Publications Act, 1964.
566
B. Muthukumaran, “Cyber Crime Scenario in India”, Criminal Investigation Department
176
the internet by positing threatening messages to the victim or by entering the chat-
rooms frequented by the victim or by constantly bombarding the victim with the
e-mails etc.567 Stalking is defined as persistent acts of harassment directed at a
victim, such as following the victim, making harassing phone calls, killing the
victim's petitioner, vandalising the victim's property, and leaving written
messages or objects. Following stalking, major aggressive acts such as bodily
injury to the victim may occur. Everything is contingent on the stalker's actions. 568
In United Kingdom, there are various laws which deal with stalking and
cyber stalking. The Protection of Freedoms Act, 2012 has been passed which
created two new offences of stalking by inserting sections 2A and 4A into the
Protection from Harassment Act (PHA), 1997. Section 2A creates a specific
offence of stalking and a person guilty of it shall be liable for a imprisonment not
exceeding 51 weeks or with fine not exceeding level 5 of standard scale or both.
Section 4 A creates the offence of stalking involving a fear of violence or serious
alarm or distress and a person guilty of it shall be liable for a imprisonment not
exceeding 5 years or with fine or both on indictment or a imprisonment not
exceeding twelve month or fine not exceeding statutory maximum or both on
summary conviction. Under this Act, stalking element is defined as those acts
which include monitoring a person online, contacting a person, loitering in a
public or private place, interfering with property or spying.
Cyber Defamation
Any derogatory statement, which is designed to injure a person’s business
or reputation, constitutes cyber defamation. Defamation can be accomplished as
libel or slander. Cyber defamation occurs when defamation takes place with the
help of computers and/or the Internet. E.g. someone publishes defamatory matter
about someone on a website or send e-mails containing defamatory information to
In United Kingdom, before the passing of Defamation Act, 1996, the Malicious
Communication Act, 1988 regulates the electronic communications with serious
consequences through controlling technology if it is abused or used to intimidate,
threaten or harass other people. It also deals with online abuse but now this Act
considered as outdated and needs to be reformed. In United Kingdom, the
Defamation Act, 1996 was passed with an intention to clarify the defence of
innocent dissemination for internet service providers. Section 1 (1) and 1(3) of the
Defamation Act, 1996 states that whoever is not the editor, publisher or author of
the material may have a defence to a defamation action. The provider in the UK
must show that it had no reason to suspect that it was publishing defamatory
material after taking all reasonable care. The liability against overseas publishers
is still exists.
The Defamation Act, 2013 enhancing the scope existing defence for
website operator, public interest and privileged publications. This Act governs the
processes which the website operator must follow when informed about alleged
defamatory comments on their site to avoid of becoming liable for that material
themselves. Under this Act, a statement can be said to be defamatory if its
publication caused or is likely to cause serious harms to individuals or business
reputation. Under the current legal measures, any person who threaten and offend
others on social media shall be liable to a maximum sentence of prison of six
month and a fine of 5,000 pounds or both.
Phishing
The term ‘Phishing’ may be defined as the receipt of unsolicited emails by
customers of financial institutions, requesting them to enter their username,
password or other personal information to access their account for some reason. 571
In this category of cybercrimes the fraudster are remained conscious to
unauthorized access to the customer’s online bank account for the purpose of
569
Id, p. 50.
570
Sallie Spilsbury, Media Law, 2000, p. 60.
571
Mohit Goyal, “Ethics and Cyber Crime in India”, International Journal of Engineering and
Management Research, vol. 2, No. 1, Jan., 2012, available at: http://www.ijemr. net/Jan
2012/Ethics And Cyber Crime In INDIA (1-3).pdf (visited on Feb. 13, 2017).
178
transferring the funds contained in that account in their own accounts. The
customers are directed to aware about the original institutions website when they
want to click on the given links in the email for entering their information for any
transaction.
In United Kingdom, a new Anti Fraud Act has been passed in 2006 for
England, Wales and Northern Ireland which is known as The Fraud Act, 2006. It
came into effect on Jan. 15, 2007. This Act banned the using of phishing kits for
sending and creating bogus e-mails by millions. Before this, there was no proper
law which deals with phishing. This Act punishes fraud by false representation,
fraud by failing to disclose information and fraud by abusing position. It provides
that a person found guilty of fraud was liable to fine or imprisonment upto twelve
months on summary conviction or fine or imprisonment upto ten years on
summary indictment.
The United Kingdom saw a significant rise in phishing attacks during 2015
as cybercriminals increasingly targeted consumers with online scams. Overall, the
number of reported phishing scams reported from November, 2014 to October,
2015 is 95,556 according to figures from Action Fraud, a 21 percent increase over
the same period of the previous year.572
Cyber Fraud
While discussing cyber fraud in the United Kingdom we must refer to
David Bainbridge. He said “as far as the criminal is concerned, the creation of an
account in his own name, followed by instructions via a computer terminal to the
main computer to transfer large sums into that account is much more attractive
than walking into a bank with a shotgun.573 Under the English Law, section 15 of
the Theft Act, 1968 required that deception is the essential element whether
relating to fact or law, whether it is made by words or conduct for liability under
the Act.
572
Michael Moore, “Phishing Scams Cost UK Consumers £ 174m in 2015”, Tech Week Europe,
Jan. 18, 2016, available at: http://www.techweekeurope.co.uk/security/cyberwar/uk-phishing-
attacks-rise- 2015-183964#VH5VOCzvS4mFyS1H.99 (visited on Sep. 19, 2016).
573
David Bainbridge, Introduction to Computer Law, 2000, p. 291.
574
(1996) 3 All ER 481.
179
to abandon the element of ‘deception’ which is the essential ingredients of
traditional fraud. After this case, the Council of Europe Convention on
Cybercrime formulated an offence of fraud without the element of deception
under article 8 under heading ‘Computer related Fraud’.
After this, United Kingdom has taken active initiatives to adopt criminal
law to curb computer misuses. The Scottish Law Commission published a
memorandum in the year 1986 and a report in the year 1987 on computer misuse.
Subsequently, in 1988- 89, the United Kingdom Law Commission published their
report through their working paper.575 And lastly, Computer Misuse Act was
passed in June, 1990 by following their recommendations which came into force
on 1st April, 1990.
In the United Kingdom the Audit Commission has conducted four triennial
surveys of computer related fraud based on a definition referring to ‘any
fraudulent behavior connected with the computerization by which someone
intends to gain financial advantage’.576 The computer Misuse Act, 1990 provides
that a person is guilty of an offence if he intentionally causes a computer to
perform any function to secure access to any computer; he intends to secure
unauthorized access; and he knowingly causes the computer to perform the
function for these two above mentioned purposes. 577 With related to this, section
17 also provides that the access is considered as unauthorized only if a person is
not entitled to control access of the kind in question to the programme or data and
secondly, he does not have consent to access by him of the kind in question to the
programme or data from any person who is so entitled.
Cyber-Squatting
In some countries there are specific cyber squatting laws like the Anti
Cyber squatting Consumer Protection Act in United States of America. In the
United Kingdom, there are not specially domain names laws but the Courts have
extended the existing trademark law to the cases of cyber-squatting in Harrods
plc v. UK Network Services Ltd578., in which the court accepted the principle that
the law relating to trademarks and passing off can be applied to domain names. It
means that if any person who deliberately registers a domain name on account of
its similarity to the name, brand name, or trade mark of an unconnected
575
Supra note 2, p. 110.
576
Amita Verma, Cyber Crimes & Law, 2009, p. 202.
577
Section 1 of Computer Misuse Act, 1990.
578
(1997) 4 EIPR D106.
180
commercial organization must expect to find himself at the receiving end of an
injunction to restrain the threat of passing off, and the injunction will be in terms
which will make the name commercially useless to the dealer. It is further added
that the use of a trademark in the course of a business of a professional dealer for
the purpose of making domain names more valuable and extracting money from
the trade mark owner is a use in the course of trade.
In the late 1989, the Trojan virus was distributed via floppy disk by a
computer calling itself ‘PC Cyborg’. The said Trojan encrypted the contents of the
victim’s hard disk after 90 re-boots, leaving just a README file containing a bill
and a Post Office Box address in Panama to which the payment was to be sent.580
The Trojan was later on extradited to United Kingdom to stand trial on charges of
blackmail and damaging computer systems by its the alleged author Dr. Joseph
Popp.
The Computer Misuse Act, 1990 is the relevant law that establishes
jurisdiction on the United Kingdom for the violation of cybercrime. The crimes
covered by the law are various acts of computer misuse which are defined under
sections 1 to 3 which includes unauthorized access with intent to commit or
facilitate of further offence and unauthorized modification of computer material.
This Act was further amended by the Police and Justice Act, 2006 which enhances
the punishment under the Act for committing the cybercrime.
582
(2010) C 385 W, available at: https://www.publications.parliament.uk/pa/cm201011/
cmhansrd/ cm100615/ text/100615w0011.htm#10061561001632 (visited on April 10, 2017).
182
6.4 Judicial Response
In the United Kingdom, the advent of the computer and internet has given
rise to the cyber crimes. The first recorded cyber crime was in 1960s and the case
of R v. Gol583d is the first cybercrime matter heard in the United Kingdom court.
Before the Computer Misuse Act, 1990, there were laws like the Theft Act, the
Telecomm- unications Act, 1984, prohibiting misuse of the public
telecommunications. The Interception of Communication Act, 1985, prohibits
forgery and other criminal activities in the course of transmission by the public
telecommunications systems. The Data Protection Act, 1984 was passed to protect
computer data and database from any violations or damage.
Unauthorized Access
The judiciary has played an important role in dealing with the cyber crimes
of hacking. In R. v. Gold585 case, two alleged computer hackers who were
journalists by profession gained access into the British Telecom Prestel Gold
computer network without permission and modified the data. One of the accused
also accessed the personal files of the Duke Edinburgh on his personal computer
and left there a message “Good Afternoon Hrh Duke of Edinburgh”. They
contended that they had gained access into the network for the purpose of
highlighting the deficiencies in its security system. But the court rejected their
583
(1988) 1 AC 1063.
584
National Crime Agency (UK), Cyber Crime Assessment, 2016, available at: www.national
crimeagency.gov.uk/publications/709-cyber-crime-assessment-2016/file, (visited on Feb. 14,
2017).
585
The Office of National Statistics(UK), Cyber Crime Assessment, 2016, available at:
www.national crimeagency.gov.uk/publications/709-cyber-crime-assessment-2016/file, (visited
on Feb. 14, 2017).
183
contention and charged them under section 1 of the Forgery and Counterfeiting Act,
1981, for making the false instrument with the intention to use it for the purpose of
inducing others. Under section 8(1) of the said Act though the instrument is
recorded or stored on disc, tape, soundtrack or other device but it can be treated as
false instruments. The crown court held them guilty and imposed $ 750 and $ 600
fine respectively. Appeal court quashed their conviction and later on, this was
confirmed by the House of Lords. The House of Lords confirmed this sensible
judgment and declared hacking as not only an illegal act but also a crime which
needs to prevent immediately.
Therefore, after the above mentioned case, the House of Lord’s appointed
the Law Commission for their recommendations and suggestions to make law to
prevent and control hacking in the year 1988. They submitted their report in the
year 1989 with recommendation to enact specific law on Computer Misuse in the
United Kingdom.
In the another case R. v. Crop586587, the court held that the Computer
Misuse Act, 1990 will be applicable only when one computer is used to access
another computer. In DPP v. Bignell588 case, the issue was raised before the court
that whether a person will be guilty of the unauthorized access where he is
authorized to access computer data but exceeds his authorization for unauthorized
purposes. Here in the present case, two police officers used the computer and took
information from a police database and used this information for their private
purposes. The Divisional Court of Queen’s Bench Division held that their conduct
did not constitute unauthorized access because they were very much authorized to
control access to the material in question.
In R. v. Whiteley589 case, the issue before the court was relating to section 3
of the Computer Misuse Act, 1990, which provides for unauthorized modification
of computer materials by the hackers. In this case, the defendant developed
software which he transferred to complainant. The defendant then, believed that
he had retained the software copyright. Therefore, he also believed that he was
entitled to insert a logic bomb into the software in order to prevent its use. But in
fact there was no contract between the parties to the dispute about the retention of
copyright by the defendant. The court held the defendant guilty of unauthorized
586
(1988) 2 WLR 984.
587
(1992) 3 WLR 432.
588
(1998) 1 Cr App R 1.
589
(1991) 93 Cri App R 25.
184
modification of computer material under section 3 of the Act of 1990.
185
Cyber Terrorism
In United Kingdom, the National Security Council recently says on Cyber
Terrorism “comprise acts of international terrorism, hostile computer attacks on
United Kingdom cyberspace, a major accident or natural hazard such as a flu
pandemic, or an international military crisis between states drawing in the United
Kingdom and its allies.590
After R. v. Gold591 case, the United Kingdom enacted the specific law on
Computer Misuse for the purpose of controlling and preventing the commission
of cyber terrorism on the recommendations and suggestions of Law Commission.
In this case, the defendant gained unauthori1zed access into the network in order
to highlight the deficiencies in its security system. They hacked Customer
Identification Numbers (CIN) and password. But the Appellate court quashed
their conviction and was confirmed by the House of Lords. The appellate court
observed that the act of accused by using dishonest trick to gain unauthorized
access to the British Telecom files did not come under this type of criminal
offence but they may be convicted for deceiving a computer; and deceiving a
machine which is not possible.
In April 2005, one Algerian named Kamel Boungass had allegedly links
with Al- Quida was convicted for poison attack against the United Kingdom.592
But in modern time period apart from these methods the modern terrorists are
trying to access to computer, computer system, computer network of government
unauthorizedly by violating the provisions of the computer Misuse Act, 1990 and
the Data Protection Act, 1984.
Cyber Pornography
The judiciary has played an important role in dealing with the cyber
pornography cases. Though the United Kingdom does not have any written
Constitution, their freedom of speech and expressions is recognized through
several laws but subject to some reasonable restrictions. In R. v. Curl593 case,
obscenity was treated as common law offence in the year of 1727.
590
“Cyber Attacks and Terrorism Head threats facing UK” BBC News, (October 18, 2010),
available at:
www.bbc.com/news/uk-11562969 (visited on Dec. 2, 2016)
591
(1988) 1 AC 1060; see also (1987) 3 WLR 803
592
Supra note 2, p. 206
593
(1727) 2 S 788 KB.
186
R. v. Fellows594 case was the first of cyber pornography in the United
Kingdom. In this case, an employee of the Birmingham University compiled a
database of pornographic images of children without the consent or knowledge of
the University. The database was stored and maintained on a computer with
internet connection. The Court held him liable for cyber pornography with
reference to section 1 and 7(4) of the Protection of Children Act, 1978; the
Obscene Publications Act, 1959 and the Criminal Justice and Public Order Act,
1994.
594
(1997) 2 All ER 548 (CA).
595
(1868) 3 LR QB 360.
596
Supra note 24.
597
(1994) LGR 474.
598
(1998) Bristol Crown Court.
187
In R. v. Bowden599 case, the court held that downloading and printing
images from the internet fell within the concept of ‘making’ and held liable under
the Act. Similar issue came up before the court in R v. Westgarth and Jayson600
case. In this case the prosecution was able to prove that the defendant was aware
of the caching function within his browser software and the court held that the
mere act of voluntarily downloading an indecent image from a webpage on to
computer screen is an act of ‘making.’
Cyber Stalking
The UK judiciary is playing an important role in dealing with cyber
stalking and harassment cases. The Hon’ble court have ruled in R v. Patel601 and
Lau v. DPP602 cases that it is not just the number of incidents which make up a
course of conduct but whether those incidents could be said to be so connected in
type and context as to justify the conclusion that they could amount to a course of
conduct. The incident could be accepted by the court if it amounting to a course
of conduct as laid down by the court in Pratt v. DPP603 case.
Cyber Defamation
The judiciary is playing an important role in dealing with the cyber
defamation cases. In Cubby, Inc. v. CompuServe, Inc.606 case, the issue was raised
that whether the service provider exerted enough control over or had knowledge
of or reason to know, the contents of allegedly defamatory statements posted on
one of its bulletin boards. In this case the court held that the service provider was
liable defamatory statements posted on its bulletin boards, notwithstanding the
599
(2000) 1 Cri App R 438, 444.
600
(2002) EWCA Cri 683.
601
(2005) 1 Cr. App. 27.
602
(2000) Cr. L.R. 580.
603
(2001) EWHC 483.
604
(2010) EWCA 123.
605
(2008) EWHC 148.
606
(1991) 776 F. Supp. 135 (S.D.N.Y).
188
fact that the control it exerted over content was intended to improve its service
and keep them free from objectionable material.
In Stratton Oakmont, Inc. v. Prodigy Services Company 607 case, the defendant is a
publisher which led to the court for holding a finding that it would be a hurdle
for a plaintiff to overcome in pursuit of their claims because one who repeats or
republishes a libel is subject to liability as if he had originally published it. In this
case the court clearly indicated and followed the decisions given in cubby case
and held that it would be impossible for the provider to monitor every message
posted.
In another case, Jameed (Yousef) v. Dow Jones & Co. Inc. 611, the foreign
607
(1995) N.Y. Misc. LEXIS 229, 1995 WL 323710 N.Y. Sup Ct. (May 24, 1995).
608
(1998) 992 F. Supp. 44 (D.D.C).
609
(2000) WL 491456: (2000) Court of Appeal (Cr).
610
(2001) QB 201.
611
(2005) QB 946.
189
claimant issued defamation proceedings in England against the publisher of a
United States newspaper in respect of an article posted on an internet website in
the United States of America, which was available to subscribers in England. The
claimant alleged that the article, together with a list of names in an internet
hyperlink referred to in the article,
In Bunt v. Tilley and Others614 case, the claimant filed a suit for libel
against the defendants for posting the defamatory statements on websites. But the
defendants pleaded for the dismissal of the claims on the summary basis. In this
case, the issue was raised before the court that whether an internet service
provider could be liable in respect of the material which was simply
communicated via the services they provided. In this case the court held that an
internet service provider could not be deemed to be a publisher at common law
because they performed no more than a passive role in facilitating postings on the
internet.
Cyber Fraud
The judiciary has played an important role for combating with the cyber
612
“Cyber Defamation- The Law, Practice and Future”, pp.17-18, available at: http://www. scribd.
com/document/29692790/Cyber-Defamation-The-Law-Practice-and-Future (visited on Feb. 13,
2017).
613
(2005) EWCA Cri. 52.
614
(2006) 3 All ER 336.
190
fraud cases. In R v. Thompson615 case, the accused, a computer programmer
employed by a bank in Kuwait made two plans to defraud the bank by devising a
programme which instructed the computer to transfer sums from these accounts
to his newly opened
In R. v. Gold617 case, one of the accused accessed the files of the Duke
Edinburgh’s personal computer and left there a message. They were charged
under section 1 of the Forgery and Counterfeiting Act, 1981, because they made
the false instrument with intention to use it to induce others to accept it as genuine
one. Under section 8(1) of the said Act though the instrument is recorded or
stored on disc, tape, soundtrack or other device but it can be treated as false
instruments. In this case, the crown court held the accused him liable for his act
and imposed a fine of $ 750 and $ 600 respectively. But the Appellate court
quashed their conviction order and later on this order was confirmed by the House
of Lords. The House of Lords declared that hacking is not only an illegal act but
also a crime which needs to be controlled immediately.
Cyber-Squatting
In the United Kingdom, the Courts have played an important role in
extending the existing trademark law to the cases of cyber-squatting. The first
case of cyber- squatting in United Kingdom was that of Harrods plc v. UK
Network Services Ltd619., in which the court accepted the principle that the law
relating to trademarks and passing off can be applied to domain names. In
Intermatic Incorporated v. Dennis Toeppen620 case, the Court held that the
defendant’s desire to resell the domain name is sufficient to meet the commercial
use requirement of the Lanham Act. The Court in regard to dilution further held
that the dilution of Intermatic’s mark is likely to occur because the domain name
appears on the web page and is included on every page that is printed from the
web page.
The Court stated that anyone who registers a domain name on the basis of
its similarity to the name, brand name, or trade mark of an unrelated commercial
organisation should expect to be served with an injunction to prevent the threat of
passing off, and that the injunction will be written in such a way that the name
will be rendered commercially useless to the dealer. The court further stated that
using a trademark in the course of a professional dealer's business to increase the
value of domain names and collect money from the trademark owner is a use in
the course of trade. This was held in Marks & Spencer v. One in A Million Ltd.621
case. In this case the Hon’ble High Court in London observed after finding the
respondent to be guilty of Cyber squatting that any person who deliberately
registers a domain name on account of its similarity to the name, brand name or
trademark of an unconnected commercial organization, must expect to find
himself on the receiving end of an injunction to restrain the threat of passing off,
and the injunction will be in terms which will make the name commercial useless
to the dealer and held that registration of domain names for the purpose of resale
to owners of the trademarks is an action preparatory to trademark infringement.
In every day a new technique is being developed for doing the cyber
619
(1997) 4 EIPR D 106.
620
(1996) 947 F Supp. 1227.
621
(1998) FSR 265.
192
crime through using the internet facilities and many a times we are not having the
proper investigating methods or techniques to understand and to tackle that newly
cyber act which is called as cyber crime. United Kingdom has enacted several
laws for combating cyber crimes; despite this many complicated legal issues are
still unresolved and still these laws are only a gap-filler and there are so many
legal issues which have no mentioned yet. And also there are thousands of cases
taking place in the countries but only the few cases are lodged as a complaint.
Because many of the victims due to the threat and fear of getting abused in the
society does not move any complaint against the cyber criminals, some of the
cyber victims accept this incident as nightmare or bad destiny or as wished by
God and moving on the life by forgot all the incidents. But due to this the cyber
criminals are more encouraged to get involved in such type of cyber criminal
activities.
The cyber laws are passed and amended in United Kingdom from time to
time but instead of these laws the cyber crimes are increasing day by day. The
National Crime Agency (NCA) released a report on July 7, 2016 by highlighting
the need for stronger law enforcement and business partnership to fight cyber
crime. According to the NCA cyber crime emerged as the largest proportion of
total crime in the U.K. with “cyber enabled fraud” making up 36 % of all crime
reported and computer misuse accounting for 17%.622 The Office of National
Statistics (ONS) estimated that there were 2.46 million cyber incidents and 2.11
million victims of cyber crime in the UK in 2015 and only 16, 349 cyber
dependent and approximately 700, 000 cyber enabled incidents reported to Action
Fraud over the same period.623
622
Available at: www.nationalcrimeagency.gov.uk/publications/709-cyber-crime-assessment-
2016/file, (visited on Feb. 14, 2017).
623
Ibid.
193
194
CHAPTER - VII
COMPARATIVE ANALYSIS STUDY OF CYBER
CRIMES BETWEEN US, UK AND INDIA
7.1 Introduction
Cyber world is the combination of computers and other communication
convergence.624 The internet has transformed the entire planet into a global
village. It has established a virtual world with no boundaries, allowing people to
improve both personal and professional interactions beyond national boundaries.
The rise of globalisation has had a significant impact on socioeconomic and
cultural aspects of life. Human civilisation has benefited much from
cyberspace.625 The Internet's main purpose is to link individuals all over the world
who have a desire to learn more about the indispensible human nature that led to
the creation of the cyber world.
For a long time, safety and security have been viewed solely as a means of
avoiding bodily harm. Alongside the old world, ‘cyberspace' evolved in the late
twentieth century. Because this new world is becoming increasingly entwined
with the traditional offline one, internet safety has become a must for a well-
functioning society. A secure cyberspace is one in which no crime is perpetrated
(and from which no crime is committed). 630
There are various issues which need
to be sort out in Cyber law for a comprehensive and systematic comparative
study.
R.C. Mishra, Cyber Crime: Impact in The New Millennium, 2002, p. 53.
628
Justice T. Ch. Surya Rao, “Cyber Laws- Challenges for the 21 st Century,” Andhra Law Times,
629
2004, p. 24.
630
Rutger Leukfeldt, Sander Veenstra, et.al., “High Volume Cyber Crime and the Organization of
the Police: The Results of Two empirical Studies in the Netherlands”, International Journal of
Cyber Criminology, vol. 7 No. 1, Jan.- June, 2013, p. 1, available at:
http://www.cybercrimejournal.com/
Leukfeldtetal2013janijcc.pdf (visited on Oct. 19, 2014).
631
Jose R. Agustina, “Exploring Internet Crimes and Criminal Behaviour”, Book Review of Cyber
Criminology, vol. 6 No. 2, July- Dec., 2012, p. 1044, available at:
http://www.cybercrimejournal.
com/Augustinabookreview2012julyijcc.pdf (visited on March 7, 2013).
196
Study has shown that the United States of America and the United
Kingdom are the two traditional giants who are giving a tough defiance to the
silicon onslaught. The US bags the highest number of cyber specific legislation
followed by the United Kingdom which apart from having cyber laws, has at the
same time applied traditional laws to the knotty areas, though Judges in United
Kingdom were reluctant to apply the traditional laws to new computer situations
and pressed the need to have a technology specific legislation.632 That’s why these
two countries legal systems have been chosen as the parameters of comparison in
almost studies.
Cyber crimes are of current origin and affect the whole world at large, all
regional organizations and State countries have called upon legislatures to draft
laws dealing with these crimes; as a result most of the countries started to do so.
In this chapter an attempt has been made to compare the Indian current status of
cyber legislation with the legislation of United States and United Kingdom for
exploring the deficiencies and inadequacies of Indian cyber laws. A comparative
study is mentioned as under:
United Nations Manual on the Prevention and Control of Computer Related Crime, 1994, p. 5,
633
While in India the cyber crimes are given under Chapter XI of the
Information Technology Act, 2000 under the heading of ‘Offences’ which deals
with the various types of offences which is done in the electronic form or
concerning with computers, computer systems, computer networks. Hereunder
are mentioned those cyber crimes which are punishable under the Information
Technology Act, 2000 under separate sections. These are as follows:
the petitioner filed an appeal against such order which was dismissed by
the appellate court and upheld the trial court judgment.
The Computer Fraud and Abuse Act of 1986 in the United States of
America deals with the crime of "hacking," which is per se criminal only with
respect to systems used exclusively by the US government. All other computers,
such as those utilised by the federal government but not solely, including those
carrying national security records and those containing financial and credit
records, require some additional act or damage before criminal penalties can be
imposed.640 Other statutes, such as the Data Protection Act of 1998, have been
enacted to regulate the use and storage of personal data or information relating to
individuals under sections 1030 and 1031.641
In United States v. Harris642 case, the accused was charged and convicted
by the court under Computer Fraud and Abuse Act for unauthorized access to her
employer’s computer system and obtained the Social Security Numbers of several
people in order to target them in a fraudulent credit card scheme.
another man to hack into e-mail accounts to steal nude photos that were
later posted on his website.
But in United Kingdom the term ‘Hacking’ is not used but it covered
under ‘unauthorised access.’ Computer Misuse Act (CMA), 1990 has been passed
in United Kingdom which introduces three new criminal offences under sections
1 to 3; firstly, unauthorized access to computer material means to use a computer
without permission is a punishable offence. Secondly, it is to be called more
malicious hacking or cracking if unauthorized access to computer material is done
with intent to commit or facilitate commission of further crimes. Thirdly,
unauthorized modification of computer material is also a punishable offence. After
this, certain amendments has been made in CMA relating to hacking by the part 2
of Serious Crime Act, 2015 which provides that if any unauthorized act results in
serious damage to human welfare or national security, than the person shall be
liable upto the maximum punishment of life imprisonment and if any unauthorized
act results in serious damage to economy or the environment than the maximum
sentence is 14 years.
In DPP v. Bignell645 case, the issue was raised before the court that
whether a person will be guilty of the unauthorized access where he is authorized
to access computer data but exceeds his authorization for unauthorized purposes.
Here in the present case, two police officers used the computer and took
information from a police database and used this information for their private
purposes. The Divisional Court of Queen’s Bench Division held that their conduct
did not constitute unauthorized access because they were very much authorized to
control access to the material in question.
Now the Indian law is close to United States of America and United
Kingdom in this respect. Under United States law mens rea is not recognised but
(1998) 1 Cr App R 1.
645
646
“Lauri Love the Student Accused of Hacking the US”, available at: http://www.
computerweekly.com/feature/Lauri-Love-the-student-accused-of-hacking-the-US (visited on April
10, 2017).
201
it is recognised both under United Kingdom and India. Criminal liability is
imputed under United Kingdom and Indian laws but not in United States of
America. In India it is imputed only if it done with dishonest or fraudulent
intention to cause wrongful gain or wrongful loss.
Cyber Terrorism
In India, there was no specific section under the originally IT Act, 2000
under which sending of threatening emails, which may cause harassment, anxiety
nuisance and terror or which may seek to promote instability, have been made a
penal offence. But now the Information Technology (Amendment) Act 2008 for
the first time made provision for cyber terrorism and defines it under section 66F
with the imprisonment of life which is considered as the highest punishment
under this Act. Clause 1(A) of section 66 F deals with cyber terrorism that
directly affects or threatens to affects the people with the purpose to threaten the
unity and integrity or security of the nation and to fill the terror into the mind of
the peoples. Clause 1(B) of this section deals with cyber terrorism that directly
affects the State by unauthorized access to restricted information, data or
computer database. Section 124 A of Indian Penal Code can also be applied
because the damage is caused to national property and as integrity of the nation is
also jeopardised.
In the United States of America, the Computer Fraud and Abuse Act, 1986
has been passed which was further amended in 1994 and 1996. But after Sep. 11,
2001, an attack on World Trade Centre and Pentagon, the United States of
America passed the Patriot Act, 2001 and recognised hacking as cyber terrorism
and for the first time defines the term “cyber terrorism”. It provides that if any
person who causes unauthorized damage to a protected computer by either
knowingly causing the transmission of a program, information, code, or
command, or intentionally and unauthorizedly accessing a protected computer
shall be liable to punishment.
650
US Department of Justice (2007).
651
Central Bureau of Investigation, United States, available at:
http://c.ymcdn.com/sites/
www.issa.org/resource/resmgr/2015_April_CISO_Forum/Cyber_Espionage_and_Cyberter.pdf
(visited on April 10, 2017).
203
“Terrorism” as including the use or threat of action that is designed seriously to
interfere with or seriously to disrupt an electronic system designed; to influence
the government or to intimidate the public or a section of the public, and made for
the purpose of advancing a political, religious or ideological cause. Serious Crime
Act, 2015 provides that if any unauthorized act results in serious damage to
human welfare or national security, than the person shall be liable upto the
maximum punishment of life imprisonment.
In April 2005, one Algerian named Kamel Boungass had allegedly links
with Al- Quida was convicted for poison attack against the United Kingdom.652
But in modern time period apart from these methods the modern terrorists are
trying to access to computer, computer system, computer network of government
unauthorizedly by violating the provisions of the computer Misuse Act, 1990 and
the Data Protection Act, 1984.
Cyber Pornography
In India, section 292 to 294 of IPC contained the Indian law of obscenity.
However, the IT Act, 2000 was deficient in dealing with obscenity before
amendment by IT Amendment Act, 2008. It has reformed the Indian law of
obscenity to a greater extent.
Now, the Information Technology Act, 2000 after amendment states that
storing or private viewing of pornography is legal as it does not specifically
restrict it. On the other hand transmitting or publishing the pornographic material
is illegal. There are some sections of Information Technology Act, 2000 which
prohibit cyber pornography with certain exceptions to Section 67 & 67A. The
combined effect of sections 66 E, 67, 67A and 67 B is to differentiates between
cyber pornography, child pornography and mainstream pornography and to bring the
online pornography within the legal regime. For offence under section 67 the
person shall be punished on first conviction with imprisonment which may extend
to three years and with fine which may extend to five lakh rupees and in the event
of a second or subsequent conviction with imprisonment which may extend to
five years and with fine which may extend to ten lakh rupees.
As regards the Cyber pornography, most of the reported Indian Cases are
disposed of in the lower court at the magisterial level. However, the case of State
of Tamil Nadu v. Suhas Katti653 deserves a special mention in this context because
this case was disposed of within a record period of seven months from the date of
filing of the FIR by the expeditious investigation made by the Chennai Cyber
Crime Cell (CCC). This is a landmark case which is considered to be the first case
of conviction under section 67 of Information Technology Act in India which
makes this section is of the historical importance. In this case, some defamatory,
obscene and annoying messages were posted about the victim on a yahoo
messaging group which resulted in annoying phone calls to her. She filed the FIR
and the accused was found guilty under the investigation and was convicted under
section 469, 509 of IPC and section 67 of Information Technology Act.
In United States of America, there are two child pornography laws i.e. The
Child Pornography Prevention Act, 1996 and the Child Online Protection Act,
1998. The former Act prohibits the use of computer technology to knowingly
produce child pornography, that is, depictions of sexually explicit conduct
involving or appearing to involve minors. The latter Act requires commercial site
operators who offer material deemed to harmful to minors to use bonafide
methods to establish the identity of visitors to their site. The Communication
Decency Act, 1996 has been passed to protect minors from pornography. The
CDA states that any person, who knowingly transports obscene material for sale
or distribution either in foreign or interstate commerce or through the use of an
interactive computer service, shall be liable to imprisonment upto five years for a
653
(2004) Cr. Comp 4680, Egmore, available at: http://lawnn.com/tamil-nadu-vs-suhas-kutti/
(visited on April 5, 2017).
654
2010 [SCR. A/1832/2009] Guj.
205
first offence and up to ten years for each subsequent offence.
After this there are other Act’s which deals with obscenity including the
Obscene Publications Act, 1959 and 1964, Telecommunications Act, 1984 and
655
(2002) 95 Ohio St 3d 254 : 767 NE 2d 242.
656
Available at: https://www.justice.gov/usao-cdca/pr/operator-revenge-porn-website-sentenced-
2-years- federal-prison-email-hacking-scheme (visited on April 9, 2017).
657
Chris Reed, Computer Law, at 300 (2003).
658
“Cyber Pornography”, available at: http://www.lawyersclubindia.com/articles/Cyber-
Pornography- 6396.asp (visited on April 12, 2016).
206
Criminal Justice Act, 1988. Criminal Justice Act, 1988 has been passed which
explains under section 160 as amended by section 84(4) of the Criminal Justice
and Public Order Act (CJPOA), 1994 that it is an offence for a person to have an
indecent photograph or pseudo-photograph of a child in his possession. This
offence is now a serious arrest able offence with a maximum imprisonment term
not exceeding six months.
Cyber Stalking
The legislation on cyber stalking are varies from country to country. Prior
to February 2013, there were no legislation in India that specifically regulated
cyber stalking; it was covered under sections 66A, 72, and 72 A of the
Information Technology Act, 2000. By enacting the Criminal Law (Amendment)
Act, 2013, the Indian parliament amended the Indian Penal Code, 1860, to make
internet stalking a criminal offence. Cyber stalking is not directly recognized
cyber crimes in India under Section 66 A by the Information Technology
(Amendment) Act 2008 and under section 72, 72A. Section 66 A provides
punishment for sending offensive messages through communication service etc
and section 72 provides for breach of confidentiality and privacy.
In Shreya Singhal and others v. Union of India 662, the Honble Supreme
Court deemed it unconstitutional and anti-freedom of speech and expression, and
struck it down. Police in several jurisdictions have utilised this part to falsely
arrest people for making critical remarks about social and political problems on
social media sites. Ritu Kohli's case was India's first case of cyber stalking, and it
was filed by the Delhi Police's Economic Offenses Wing under section 509 of the
Indian Penal Code for infringing on a woman's modesty. Stalking and harassment
are both prohibited under Section 503 of the IPC. Further, section 504 provides a
remedy for use of abusive and insulting language. This is another form in which
cyber stalking takes place where abusive words etc. are sent through e-mail.
2016).
208
passed ant-stalking laws, by 2009 only 14 of them had laws specifically addressing
“high-tech stalking.664
In United States of America almost every state has laws dealing with cyber
stalking. US federal Code 18 under section 2261 A (2) states that whoever with
the intent uses the mail, any interactive computer service, or any facility of
interstate of foreign commerce to engage in a course of conduct that causes
substantial emotional distress to that person or places that person in reasonable
fear of the death of, or serious bodily injury shall be liable under section 2261 B
(b) for a imprisonment which may extend upto life imprisonment if the death of
the victim results; for not more than 20 years if permanent disfigurement or life
threatening bodily injury to the victim results; for not more than 10 years, if
serious bodily injury to the victim results or if the offender uses a dangerous
weapon during the offense.
In United Kingdom, there are various laws which deal with stalking and
cyber stalking. The Protection of Freedoms Act, 2012 has been passed which
created two new offences of stalking by inserting sections 2A and 4A into the
Protection from Harassment Act (PHA), 1997. Section 2A creates a specific
offence of stalking and a person guilty of it shall be liable for a imprisonment not
exceeding 51 weeks or with fine not exceeding level 5 of standard scale or both.
664
Christa Miller, “High-Tech Stalking, Law Enforcement Technology”, available at:
http://www. officer.com/article/10233633/high-tech-stalking (visited on March 6, 2017).
665
(March, 2012), SC New Jersey, available at: https://en.wikipedia.org/wiki/New_Jersey_v._
Dharun_Ravi (visited on April 10, 2017).
666
Available at: https://www.justice.gov/opa/pr/former-us-state-department-employee-pleads-
guilty- extensive-computer-hacking-cyberstalking (visited on April 9, 2017).
209
Section 4 A creates the offence of stalking involving a fear of violence or serious
alarm or distress and a person guilty of it shall be liable for a imprisonment not
exceeding 5 years or with fine or both on indictment or a imprisonment not
exceeding twelve month or fine not exceeding statutory maximum or both on
summary conviction. Under this Act, stalking element is defined as those acts
which include monitoring a person online, contacting a person, loitering in a
public or private place, interfering with property or spying. The Malicious
Communication Act, 1988 makes it illegal to send or deliver letters or other
articles for the purpose of causing distress or anxiety by electronic
communication. There are other Act’s which deals with stalking including the
Offences against the Persons Act, 1861, Criminal Justice and Public Order Act,
1994, Wireless Telegraphy Act, 2006.
Cyber defamation
In India, the term ‘cyber defamation’ is not specially used and defined
under section 66A of the IT Act, 2000 but it makes punishable the act of sending
grossly offensive material for causing insult, annoyance or criminal intimidation.
Section 499 of the Indian Penal Code criminalises cyber defamation, which was
expanded by the IT Act of 2000 to include "speech" and "documents" in
electronic form. Section 499 of the Criminal Code defines defamation as the
publication of an imputation about a person with the aim to injure or having
grounds to believe that such imputation would impair that person's reputation.
The defamatory item has been published, that is, it has been communicated to
someone other than the person to whom it is directed. In India, an e-mail that
makes defamatory statements about the person to whom it is addressed is not
considered defamatory if it is not conveyed to a third party. Statements on mailing
lists and the World Wide Web world are defamatory as they would be available to
667
(2010) EWCA 123.
668
(2008) EWHC 148.
669
(2001) EWHC 483.
210
persons other than the person to whom they refer.
The Hon’ble court ruled in Obsidian Finance Group, LIC v. Cox671 case
that liability for a defamatory blog post involving a matter of public concern
cannot be imposed without proof of fault and actual damages. Bloggers saying
libellous things about private citizens concerning public matters can only be sued
if they are negligent. In Firth v. State of New York case672, the plaintiff claimed that
publication of an alleged libel on the internet was continuous publication, which
would extend the statute of limitations. The court held that the statue would run
from the date of material was first posted not from the continuity. And the
decision was also affirmed by the New York Appellate Division Court.
670
“Court Summons Kejriwal, Azad in DDCA Defamation Case”, Sportz Wiki, Jan. 30, 2017,
available at: http://sportzwiki.com/cricket/court-summons-kejriwal-azad-ddca-defamation-case/
(visited on April 10, 2017).
671
(2011) CV- 11- 57- HZ.
672
(2000) N.Y. Court of Claims.
211
In United Kingdom, Malicious Communication Act, 1988 regulates the
electronic communication with serious consequences through controlling
technology if it is abused or used to intimidate, threaten or harass other people. It
also deals with online abuse but now this Act considered as outdated and needs to
be reformed. In United Kingdom, the Defamation Act, 1996 was intended to
clarify the defence of innocent dissemination for internet service providers.
Section 1 (1) and 1(3) of the Defamation Act, 1996 states that whoever is not the
editor, publisher or author of the material may have a defence to a defamation
action. The provider in the United Kingdom must show that it had no reason to
suspect that it was publishing defamatory material after taking all reasonable care.
The liability against overseas publishers is still exists. The Defamation Act, 2013
enhancing the scope existing defence for website operator, public interest and
privileged publications. This Act governs the processes which the website
operator must follow when informed about alleged defamatory comments on their
site to avoid of becoming liable for that material themselves. Under this Act, a
statement can be said to be defamatory if its publication caused or is likely to
cause serious harms to individuals or business reputation. Under the current legal
measures, any person who threaten and offend others on social media shall be
liable to a maximum sentence of prison of six month and a fine of 5,000 pounds
or both.
In Bunt v. Tilley and Others673 case, the claimant filed a suit for libel
against the defendants for posting the defamatory statements on websites. But the
defendants pleaded for the dismissal of the claims on the summary basis. In this
case, the issue was raised before the court that whether an internet service
provider could be liable in respect of the material which was simply
communicated via the services they provided. In this case the court held that an
internet service provider could not be deemed to be a publisher at common law
because they performed no more than a passive role in facilitating postings on the
internet.
Phishing
In India, the term ‘Phishing’ is not used anywhere in this section as given
under IT Act, 2000 before or after amended by the amendment Act, 2008. But
now it is a punishable offence under section 66, 66A, 66C, 66 D of IT Act, 2000
and under Indian Penal Code. Section 66 A of Information Technology Act
provides punishment
673
(2006) 3 All ER 336.
212
for sending offensive messages through communication service etc.
Section 66 C of Information Technology Act, 2000 which is inserted by
Amendment Act, 2008 provides punishment for Identity Theft if any person
whoever fraudulently or dishonestly make use of the electronic signature,
password or any other unique identification features of any other person. Section
66 D is applied to any case of cheating by personation which is committed by
using a computer resource or a communication device which can be used for
phishing but not directly.
In United Kingdom, a new Anti Fraud Act has been passed in 2006 for
England, Wales and Northern Ireland which is known as The Fraud Act, 2006. It
came into effect on Jan. 15, 2007. This Act banned the using of phishing kits for
sending and creating bogus e-mails by millions. Before this, there was no proper
law which deals with phishing. This Act punishes fraud by false representation,
fraud by failing to disclose information and fraud by abusing position. It
provides that a person found guilty of fraud was liable to fine or imprisonment
upto twelve months on summary conviction or fine or imprisonment upto ten
years on summary indictment.
Cyber Fraud
In India, the term ‘Fraud’ is neither defined in the Indian Penal Code, 1860
nor in the IT Act. Section 66 D is inserted by the Amendment Act, 2008 for
providing punishment for cheating by personation by using computer resource
674
Jeordan Legon, “Phishing scams reel in your identity”, CNN News, (Jan. 26, 2004), available
at: http://edition.cnn.com/2003/TECH/internet/07/21/phishing.scam/index.html?iref=newssearch
(visited on March 6, 2017).
213
which is also used for cyber fraud but not directly. According to this section if
any person who by means of any communication device or computer resource
cheats by personation, shall be punished with imprisonment of either description
for a term which may extend to three years and shall also be liable to fine which
may extend to one lakh rupees.675 This offence is bailable, cognizable and triable
by the court of Judicial Magistrate of First Class.
The Computer Fraud and Abuse Act of 1996 was enacted in the United
States of America to ban and punish computer and internet fraud. It was updated
in the years 1994 and 1996, as well as by the Patriot Act of 2001 and the Identity
Theft Enforcement and Restitution Act of 2008. The provisions of the United
States Criminal Code apply to cyber fraud, and violators can be prosecuted under
title 18, for example, no. 1028 prohibits social security card and credit card
frauds, no. 1029 prohibits identity fraud, including telemarketing fraud, no. 1341
prohibits mail fraud, no. 1343 prohibits wire fraud, and so on. Fraud is likewise
prohibited under Title 18 U.S. Code s. 1030.
678
Supra note 24, p. 346.
679
D. Latha, Jurisdiction Issues in Cyber Crimes”, The Weekly Law Journal, vol. 4, 2008, p. 88.
680
Section 1(2) of IT Act, 2000.
216
In United States of America, a number of traditional principles relating to
jurisdiction are being interpreted in the light of borderless world of cyberspace,
jurisdictional problems remain a thorny issue and many lega experts are of
opinion that mere availability of a website is not enough to establish minimum
contact to entrench the cyber criminal.681 In rem, jurisdiction might apply to the
assertion of claims for jurisdiction based on e-mail storage box or stored file that
is located on a computer server in the forum jurisdiction.682 The rule of lex loci
delicti, or the place in which the injury occurred is the place of trying the case
was followed in torts matters. But now both in civil and criminal matters, the
emerged boundaries of the internet have exposed the cyber criminal under
universal jurisdiction.
The Computer Misuse Act, 1990 is the relevant law that establishes
jurisdiction on the United Kingdom for the violation of cybercrime. The crimes
covered by the law are various acts of computer misuse which are defined under
sections 1 to 3 which includes unauthorized access with intent to commit or
facilitate of further offence and unauthorized modification of computer material.
This Act was further amended by the Police and Justice Act, 2006 which enhances
the punishment under the Act for committing the cybercrime.
681
Supra note 9, p. 457.
682
Shaffer v. Heitner, (1997) 433 US 186: 53 L Ed 2d 683.
683
Supra note 9, p. 346
684
Adel Azzam Saqf Al Hait, “Jurisdiction in Cybercrimes: A Comparative Study”, Journal of
Law, Policy and Globalization, vol. 22, at 80 (2014), available at: http://www.iiste.org/Journals/
index.php/JLPG/article/viewFile/11050/11351 (visited on Nov. 30, 2016)
217
7.4 Judicial Comparative Approach
Another attempt has been made to compare the role of judiciary in tackling
the emerging cyber crimes after having the related laws on cyber crime. The
judiciary of India, United States of America and United Kingdom are playing the
important role of dealing with such type of crime. Indian judiciary has followed
the cyber authority of cases of United States of America and United Kingdom for
dealing with cyber crimes in India because there is very less judicial response.
The comparative study has been discussed as under:
685
(1999) 19 PTC 210 Del.
686
AIR 2000 Bom 27.
687
(1997) 6 SCC 241.
688
(2004) Cr. Comp 4680, Egmore, available at: http://lawnn.com/tamil-nadu-vs-suhas-kutti/
(visited on April 5, 2017).
689
AIR 2015 SC 1523: (2005) 5 SCC.
690
(2010) 4 SCALE 467.
691
(2013) W.P. Crl. No. 21.
218
Judicial Response in United States of America
As compare to India, there have been a number of statutory provisions in
the United States Code to regulate the use of computers and computer technology for
the purpose of preventing and controlling cyber crimes. The United States
Department of Justice advises punishment of computer crime offenders by federal
court judges in the same manner as is advisement for all other federal crimes
under the United States
In State v. Maxwell697 case, the defendant was charged for act of bringing
child pornography into the State where both the defendant and the victim were the
residents of the State of Ohio while the service provider’s servers were located in
Virginia. According to the Ohio statute knowledge on the part of the defendant
was required, although the defendant was seemed to be ignorant of the fact the
692
Catherine D. Marcum, Goerge E. Higgins, et.al., “Doing Time for Cyber Crime: An
Examination of the Correlates of Sentence Length in the United States”, International Journal of
Cyber Criminology, vol.5, No.2, July.- Dec, 2011, p. 827, available at:
http://www.cybercrimejournal. com/marcumetal2011julyijcc.pdf (visited on April 30, 2015).
693
(1991) 504 F 2d.
694
(2001) 255 F. 3d 728 (9th Cir).
695
(2001) 175 F Supp 2d 367 (D. Conn).
696
(2002) 28 Cal 4th 396: 48 P 3d 1148.
697
(2002) 95 Ohio St 3d 254 : 767 NE 2d 242.
219
disputed transmission crossed the State lines yet. The Hon’ble Supreme Court of
Ohio upheld the conviction by applying the strict liability standard concerning
transmission. In United States v. William Sutcliffe698 case, the defendant was
sentenced for making interstate threats to cause injury, killing and posting
thousands of social security numbers on websites. The United States District
Judge imposed restrictions that after his release he cannot access computer and
must not communicate with victims and witnesses.
The Hon’ble court has ruled in R v. Patel705 case that it is not just the
number of incidents which make up a course of conduct but whether those
incidents could be said to be so connected in type and context as to justify the
conclusion that they could amount to a course of conduct. The incident could be
accepted by the court if it amounting to a course of conduct as laid down by the
court in Pratt v. DPP706 case. In R v. Curtis707 case, the Hon’ble Court held that it
is necessary to prove that the conduct is unacceptable to a degree which would
698
US Department of Justice (2007).
699
(1988) 1 AC 1063.
700
(1988) 1 AC 1060: (1987) 3 WLR 803.
701
R. v. Crop, (1992) 3 WLR 432.
702
(1997) 2 All ER 548 (CA).
703
(2000) 1 Cri App R 438, 444.
704
(2002) EWCA Cri 683.
705
(2005) 1 Cr. App. 27.
706
(2001) EWHC 483.
707
(2010) EWCA 123.
220
sustain criminal liability, and also it must be oppressive in nature. The court
earlier held in the case of C v. CPS708 that it is important to note that matters to
constitute the course of conduct amounting to harassment must be properly
particularized in the information laid or in the indictment.
In India, the basic law for the cyberspace transactions has emerged in the
form of the Information Technology Act, 2000 which was further amended in the
year 2008. The Information Technology Act amends some of the provisions of
our existing laws i.e. Indian Penal Code, 1860; the Indian Evidence Act, 1872; the
Bankers Book Evidence Act, 1891 and the Reserve Bank of India Act, 1934. 709
But the problem is still as it was though since 2000 the Information Technology
Act is working in India for combating cyber crimes. The reality is that the
working of this statute is more on papers than on execution because the police
officers, lawyers, prosecutors and Judges feel handicapped in understanding its
highly technical terminology.
708
(2008) EWHC 148.
709
Samiksha Godara, “Prevention and Control of Cyber Crimes in India: Problems, Issues and
Strategies”, A Thesis submitted to Maharishi Dayanand University, April 1, 2013, p. 2, available
at: http://shodhganga.inflibnet.ac.in/bitstream/10603/7829/12/12_chapter%203.pdf (visited on
May 20, 2016).
221
Kingdom and Indian approaches towards these offences.710 Different countries
have the different cyber laws dealing with cyber hacking. United States of
America prescribed the punishment for hacking, United Kingdom prescribed the
punishment for hacking under the name “unauthorised access” while India
replaced it under the computer related crimes or a criminal offence only if it
satisfy the prerequisites condition of dishonestly or fraudulently. It is interesting
to note that United Kingdom and United States of America specifically legislate
to deal with cyber offence of hacking or unauthorised access by avoiding the
definite definition of it.
In the United States of America, the Computer Fraud and Misuse Act,
1986 as amended twice in 1994 and 1996 and the Patriot Act, 2001 are very
significant to prevent and control cyber fraud. In the United Kingdom the
Computer Misuse Act, 1990 and the Data Protection Act, 1984 provides world
standard for data protection, security system and to prevent and control cyber
fraud. In India, there is a need to follow the same standard.711 The computer
related fraud or cyber fraud has become one of the most pervasive form of white
collar crime in United State, Canada, United Kingdom., Europe, Australia,
Singapore, India etc. The losses due to misuse of computer or cyber or
information technology or digitised technology have resulted in to billions of
dollars. With the development of global communications networks, computer
fraud as with other forms of computer related crime in increasingly adopting
global dimension.712
The United Kingdom Cyber Laws, however, is criticized for not including
the definition of computer but the Law Commission of United Kingdom found
general support for the view that to attempt such a definition would be so
complex in an endeavour to be all embracing, that they are likely to produce
extensive argument. However, the Indian law on the subject gives the definition
of “computer” in its general clauses definition in section 2(l) of the IT Act,
2000.713 All these three countries i.e. United States of America, United Kingdom
and India does not define the term “cybercrimes” yet.
It can also be said that there is no uniformity around the world in treating
the cyber defamation cases. The major commonwealth countries are following the
710
“Cyber ragging Ki Line Kategi”, Navbharat Times, July 10, 2008, p. 7.
711
Supra note 1, p. 131.
712
Supra note 14, p. 202.
713
Syed Mohd Uzair, “Cyber crime and cyber terrorism in India”, A Thesis submitted to Aligarh
Muslim University, 2013, pp. 126-127, available at: http://shodhganga.inflibnet.ac .in/bitstream/
10603/63591/9/09_chapter%202.pdf (visited on Feb. 13. 2017).
222
different practice relating to cyber defamation cases. In United States of America,
a cyber defamation case is very difficult to prove because of the rigid nature of
first amendment in Constitution law. In United Kingdom, the defendant publisher
has to establish his innocence whereas in India, the specific cyber defamation law
is yet to develop because under IT Act, 2008 a hope in this regard to tackle the
defamatory activities.
There are a large number of cyber laws passed and amended in India as
well as in United States of America and United Kingdom. But instead of these
laws the cyber crimes are increasing day by day. For example, a total of 8, 045
cases were registered under Information Technology Act during the year 2015 as
compared to 7, 201 cases during the previous year 2014 and 4,356 cases during
2013, showing an increase of 11.7% in 2015 over 2014 and an increase of 65.3%
in 2014 over 2013.716 As compare to India, in USA for the year 2015, Cost of
Data Breach Study by IBM and the Pone mom Institute revealed that the average
714
Loknath Behera, “Investigating External Network Attacks”, The Indian Police Journal, Jan.-
March, 2004, p. 27.
715
Supra note 1, p. 97.
716
National Crime Records Bureau, Ministry of Home Affairs, cyber Crimes in India, 2015, pp.
163-164
, available at: http://ncrb.nic.in/StatPublications/CII/CII2015/FILES/Compendium-15.11.16.pdf
(visited on Nov. 11, 2016) .
223
total cost of a data breach increased from $ 3.52 million in 2014 t0 $ 3.79
million.
Another study said that cyber crime will become a $ 2.1 trillion problem
by 2019.717 The National Crime Agency (NCA) released a report on July 7, 2016
by highlighting the need for stronger law enforcement and business partnership to
fight cyber crime. According to the NCA cyber crime emerged as the largest
proportion of total crime in the U.K. with “cyber enabled fraud” making up 36 %
of all crime reported and computer misuse accounting for 17%.718 The Office of
National Statistics (ONS) estimated that there were 2.46 million cyber incidents
and 2.11 million victims of cyber crime in the UK in 2015 and only 16, 349 cyber
dependent and approximately 700, 000 cyber enabled incidents reported to Action
Fraud over the same period.719
717
Limor Kissem, “2016 Cyber Crime Reloaded: Our Prediction for the Year Ahead”, (Last
Modified on Jan. 15, 2016), available at: https://securityintelligence.com/2016-cybercrime-
reloaded-our-
predictions-for-the-year-ahead/ (visited on Dec. 2, 2016).
718
National Crime Agency (UK), Cyber Crime Assessment, 2016, available at: www.national
crimeagency.gov.uk/publications/709-cyber-crime-assessment-2016/file (visited on Nov. 11,
2016).
719
The Office of National Statistics(UK), Cyber Crime Assessment, at 5-6 (2015), available at:
www.nationalcrimeagency.gov.uk/publications/709-cyber-crime-assessment-2016/file (visited on
Nov. 11, 2016).
224
CHAPTER - VIII
CONCLUSION AND SUGGESTIONS
“Crimes have always depended on the force, vigour and movement of public
opinion from time to time and country to country and even in the same country
from decade to decade.”720
During the 12th and 13th centuries the Early English society included only
those acts as crimes if committed against the state or the religion not others.
During the early societies, there was no distinction between the law of crimes and
torts, and these communities merely followed the law of wrongs. When an
offence is committed in modern legal systems, the law is applied immediately
regardless of the wishes of the victimised party, but in early cultures, the law was
initiated only when both parties agreed to submit to the judgement. During the
18th century, also known as the "miracle reorientation" period in criminology, it
was thought that only the wrongdoer could confess criminal responsibility for his
conduct, and that no one else, even external agents, had any involvement. At that
time it was clear that the concept of crime is interlinked with social policy of that
time.
The new medium which has suddenly confronted humanity does not
distinguish between good and evil, between national and international, between
just and unjust, but it only provides a platform for the activities which take place
in human society. Law as the regulator of human behaviour has made an entry
into the cyberspace and is trying to cope with its manifold challenges. 723 Due to
720
R.C. Nigam, Law of Crimes in India- Principles of Criminal Law, vol. 1 (1965), p. 3.
721
Donn B. Parker, “Automated Crime in Cyber Crime”, International Conference Course Book,
1997.
722
Farooq Ahmad, Cyber Law In India- Law on Internet, 2008, p. 367.
723
Justice T. Ch. Surya Rao, “Cyber Laws- Challenges for the 21st Century”, Andhra Law Times,
225
the rapid advancements in the functionality of information technologies cyber
crimes offending are becoming technically complex and legally intricate which
leads to disparity between systems of law globally with the first responders,
investigating authorities, forensic interrogators, prosecuting agencies, and
administrators of criminal justice. Because presently the situation is becoming
alarming and the cyber crime is talk of the town in every field of the society or
system. This is because every day a new technique is being developed in the
cyberspace for doing the cyber crime and many times we are not having the
proper investigating methods or techniques to tackle that newly cyber crime. It
becomes critically important to explore factors impending investigation and
prosecution of cyber crime with the purpose of raising awareness and exposing
these barriers to justice.
8.1. Conclusion
Cyberspace has developed since the 1990’s and the impact on societies has
been so fast and enormous, that codes of ethics and the common sense of justice
and penal laws have not kept pace.724 It can be said that cybercrime has had a
short but highly eventful history. There are different views regarding the actual
status of existence of this new variety of crime actually. Some says that when the
computer came with the invention of the first abacus since people used
calculating machines for wrong purposes, hence it can be said that cybercrime per
se has been around ever. Actually, the history of cybercrime began with hackers
attempting to break into computer networks solely for the excitement of gaining
access to high-security networks or obtaining sensitive or secured information or
any secret for personal gain or revenge. In the field of criminology, it has been
argued that a crime will occur when and only when the chance arises. Previously,
we only knew about classic forms of crimes such as murder, rape, theft, extortion,
robbery, and dacoity. But now with the development and advancement of science
and technology i.e. computers and internet facilities, new types of crimes exist
like hacking, cyber pornography, cyber defamation etc.
Cyber crimes are silent in nature and can be committed in the privacy of
one’s home without any need to physically present in front of the victim without
any eye witnesses. At the time of commission of such offences there are no signs
of physical violence or no cry of pain etc. because a cyber criminal silently
commits the crime without any sound or without any afraid of being caught red
handed. These crimes can be committed with a single click on the mouse and
without the knowledge of the victim of such crime. In most of cases of this type
of crimes the victim will not even realise what has happened to him and who have
done it against him and when it was done. It is very hard to identify a cyber
criminal because of lack of effective measures to identify them both at national
and international level.
726
D. Latha, “Jurisdiction Issues in Cybercrimes”, Law Weekly Journal, vol.4, 2008, p. 86,
available at:
www.scconline.com, (visited on July 25, 2015).
727
Guillaume Lovet Fortinet, “Fighting Cybercrime: Technical, Juridical and Ethical Challenges”,
Virus Bulletin Conference, 2009.
227
effective counter-measures.
228
It is also appears that section 66 A was inserted with the purpose of
protecting the person’s reputations and preventing the misuse of the networks.
But the language used in the said section is far beyond the reasonable restrictions
which may be imposed on free speech under Article 19(2) of the Indian
Constitution which may affects the guaranteed fundamental right of free speech in
the social networking media. The nature of offence is cognizable under section
66A and the police authorities based on charges brought under the section were
initially empowered to arrest or investigate without warrants. This will result in a
string of highly publicized arrests of citizens for posting objectionable content
online, where the ‘objectionable’ contents were more often than not, and
dissenting political opinions. The relief provided in the form of advisory by the
Central Government in January, 2013, which said no arrests under 66A were to be
made without prior approval of an officer not below the rank of Inspector General
of Police was mostly ignored by authorities. The Hon’ble Supreme Court declared
section 66 A as unconstitutional and against the freedom of speech and expression
and struck it down in Shreya Singhal and others v. Union of India728 because this
section had been highly misused by police in various states to arrest the innocent
person for posting critical comments about social and political issues on
networking sites.
In India, there are very less litigation because the corporate sector has been
shy of reporting cyber crimes fearing adverse publicity which results into less
judicial pronouncements. Most of the cases are not registered due to the lack of
knowledge and awareness of peoples. This led to encourage the cyber criminals to
get involved in such types of crimes. These crimes are emerged due to the lack of
multi-threat security systems, technology based programmes or camps and non-
adoption of foolproof computer procedures in organizations both at national and
international level.
230
international level.
Justice A.K. Ganguly said that crime in cyber space was intruding into the
privacy of the common man, which was a violation of human rights. He has
rightly said, “This is a very serious threat, as it puts privacy at stake. Most of
such crimes are not reported. Information technology is ruling the world today. It
has brought about substantial erosion in the traditional forms of governance. The
judiciary has little role to play…the area of crime detection lies in the hands of
the police and enforcement agencies.” 729
The US and UK are the two traditional vast countries which are giving a
tough defiance to the silicon onslaught. The US has passed the highest number of
cyber specific legislation which is followed by the UK having apart from cyber
laws, applied the traditional laws to the knotty areas at the same time. But it is
found that the Judges in UK were unwilling to apply these traditional laws to
current cases and make a sound for the need of having specific technology
legislation. The judicial and law enforcement agencies well understand that the
means available to investigate and prosecute crimes and terrorist acts committed
against, or through the medium of computers or computer networks are at present
almost wholly international in scope. That’s why these two countries legal
systems have been chosen as the parameters of comparison in almost studies.
Though both the countries have lots of legislation for dealing with these
crimes but in some situations these are found insufficient which will be a great
challenge for international judicial system on cybercrime in near future. Presently,
many efforts are going on to develop the common agenda of harmonizing the
atmosphere between nations for combating cyber crimes by the international
treaties, conventions or commissions i.e. UNCITRAL Model Law etc. Many
complicated legal issues are still unresolved despite having several laws for
combating cyber crimes in both countries. The legal positions relating to
electronic transactions and civil liability in cyberspace is still confused or not
clear by the reason of not having any adequate laws on globally. This is due to the
lack of co-ordination between three main components namely; law enforcement,
adjudication and correction leads to an insufficient utilization of resources and
retards the process of justice and also these are frequently operate in a
disorganized manner with little knowledge of what the other segments are doing
Cybercrimes as well as the legal issues both are global. So many efforts
have been taken to ensure the harmonization of provision in the individual
729
Justice A.K. Ganguly, “Legal framework inadequate to tackle cyber crime”, The Hindu, 2008.
231
countries by the international organizations, such as the G-8 Group, OAS
(Organization of American States), APEC (Asia-Pacific Economic Cooperation)
and the Council of Europe but such an approach is found vital in the matters of
investigation and prosecution of attacks against the infrastructure of computer
systems and networks. Due to this nature of cyber crimes, any cyber criminal
commits a crime from any place globally. There is no need to go the victim place
for committing crime against him. There is lack of the universal legal framework
which should be adopted globally, backed by specialised and fully equipped law
enforcement mechanisms and appropriate awareness among masses.
National Crime Records Bureau, Ministry of Home Affairs, cyber Crimes in India, 2015, pp.
730
8.2 Suggestions
734
M. Dasgupta, Cyber Crime in India- A Comparative Study, 2009, p. 8.
234
enhance punishments for cyber offences keeping in mind the International and
jurisdictional aspects in the era of Global Communication Convergence and
Mobile Technology. The nature of almost all the offences punishable under the
Act is bailable which makes it as a matter of right to get release immediately on
bail. The punishment is also very less for dealing with such crimes except the
punishment for cyber terrorism which is the highest punishment under this Act.
There is a need to take a number of right steps for the purpose of making the
Information Technology Act more relevant and comprehensive in today’s context.
235
The Information Technology Act does not have any specific provision for
defining and punishing cyber spamming. In the contemporary time period
spamming is the most threatening act of cyber world. Therefore, there is a need to
adopt the Anti-Spam law for the protection of children. In USA, the CAN- SPAM
Act, 2003 is the direct response of the growing number of complaint over spam e-
mails and is also the first USA cyber law which establishes national standards for
sending of commercial e- mail.
United States passed the federal laws on cyber squatting which is known
as Anti- Cyber Squatting Consumer Protection Act in 1999. In India, the
Information
Technology Act does not have any specific provision for defining and
punishing cyber squatting and these cases are decided under Trade Mark Act,
1999. Therefore, there is a need to adopt the Anti-Squatting law.
There is a great need of further clarification in two areas of cyber law are
the proper and comprehensive definition of cyber crime and proper law on
jurisdiction both at national and international level. Like in India there are only a
limited number of cases on cyber law and also no main statutory schemes on the
books. The Policy makers and the judiciary who are dealing with cyber crime are
usually confined to refer the scare existing laws and cases.
Even USA and UK has signed this Convention735 which covers a number
of offences as extraditable including firstly, offences against the confidentiality,
integrity and availability of computer data and systems such as illegal access,
illegal interception, data interference, system interference and misuse of devices;
secondly, computer related offences such as computer related r fraud and forgery;
thirdly, content related offences such as child pornography; fourthly, offences
related to infringements of copyrights and related rights, attempt and aiding or
abetting. However, there is need to update or ratify the convention because all
types of cyber crimes are not covered under this. There is also need to update the
list of extradition crimes under Extradition Act, 1962 by including certain other
recent growing cyber crimes which are quite popular with cyber criminals and
which affects the economic and social fabric of a country. International Cyber
Law Treaty is also required.
India has signed Mutual Legal Assistance Treaty (MLAT) for cooperation
on criminal matters with a number of other countries and presently a signatory to
UN Convention against Transnational Organized Crime. Although India has
signed this MLATs and convention for cooperation and legal assistance on
criminal matters, a cyber crime may not be covered by it in those arrangements
which require dual criminality to be satisfied and there are no time limits for
execution of requests. Proper investigation and prosecution of cyber crimes
requires quick action but it is felt that such treaty may not provide effective
procedure or cooperation framework in dealing with cyber crime matters. There
is need to make efforts for framing MLATs which could expressly deal with
international cooperation on cyber crime matters and also efforts should be made
to update the existing MLATs with effective provisions so that it will bring
harmonization in substantive and procedural laws which govern cooperation from
other countries on legal assistance in cyber crime matters.
238
Need to Adopt and Enforce the Recommendation Made by the United
Nation General Assembly
United States of America has passed several laws on Cyber Crimes but the
cyber crimes are increasing day-by-day. United States is considered as the
birthplace of cyber crimes. There is a need to amend the laws by removing
defects and need of proper enforcement of cyber laws in the country. The United
States is being criticized for not including the definition of computer crime. There
is not any specific comprehensive law in United States of America which covers
all the cyber crimes in it. There are so many legislations on cyber crimes but
being criticized on any points by the internet activists. Like, the CAN-SPAM Act,
2003 of United States is not found adequate to comprehensively tackle with
spamming cases. This was criticized by internet activists who work to stop spam.
They stated that this Act is appeared to give federal approval to spam practices
and seems to fail to tell the marketers about the spam. There is need to amend the
law. There is also no uniformity around the world in treating the cyber defamation
cases. The major commonwealth countries are following the different practice
relating to cyber defamation cases. In United States of America, a cyber
defamation case is very difficult to prove because of the rigid nature of first
amendment in Constitution law. The Computer Fraud and Abuse Act, 1996 has
239
been criticized for allowing companies to forbid legitimate activities such as
research or remove protection found elsewhere in Law. There is a need to amend
all these laws by removing defects and to consolidate a comprehensive law on
cyber crime cases.
The e-Courts project736 is based on the National Policy and Action Plan for
Implementation of information and communication technology in the Indian
736
Ministry of Law & Justice, Government of India, E-Courts Mission Mode Project, Dec. 10,
2015,
available at: http://pib.nic.in/newsite/PrintRelease.aspx?relid=132954 (visited on April 8, 2017).
240
judiciary in 2005 submitted by e-committee of Supreme Court of India with the
vision to transform the Indian judiciary by information and communication
technology enablement of courts and to make justice delivery system more
affordable and cost effective and to provide designated services to litigants,
lawyers, and the judiciary by universal computerization of districts/subordinate
courts, to facilitate e-filing, e- Payment and use of mobile applications. This
Mission Mode project is one of the national e-governance projects being
implemented in High courts and districts/subordinate courts of the country. The
government approved the computerization of 14,249 district and subordinate
courts under this project by March 2014.
United Kingdom and United States of America have also provides this
facility of e- filing. United Kingdom provides this facility of e-filing in Chancery
Division Court since October, 2014 and in Admiralty and Commercial Court
since June, 2015. Maryland737, the US State also provides the facility of e-courts
and upto June, 2017 this facility will extend to Southern Districts and Circuit
Court of Maryland.
The Information Technology Act, 2000 does not contain any specific
provisions for the offence of internet time theft. It has not made any amendments
in the Indian Telegraph Act, 1885 or Sections 378 and 379 of the Indian
Telegraph Act, 1885 that define the offence and provides punishment for theft.
The Indian Telegraph Act was enacted in 1885 with the purpose to give power to
the Government and to any company or person licensed under section 4 of the
Indian Telegraph Act, 1876 and specially empowered in this behalf, to place
telegraph lines under or over property belonging whether to private persons or to
public bodies. IT Act, 2000 amends only the Indian Penal Code, 1860, Indian
737
Maryland Courts, available at: http://mdcourts.gov/mdec/ (visited on April 8, 2017).
738
The Hindu, October 18, 2014 (Last modified on May 24, 2016), available at: http://www.
thehindu.com/todays-paper/tp-national/tp-karnataka/high-court-to-establish-two-ecourts/
article6513535.ece (visited on April 8, 2017).
241
Evidence Act, 1872, The Bankers Book of Evidence Act, 1891, and the
Reserve Bank of India Act, 1934 but not Indian Telegraph Act. So there is a
need to amend the Indian Telegraph Act with the purpose to make it more
relevant in today’s context.
Need to Amend the Penal Laws with Clarity and Specificity without
Relying on Vague Interpretations
Cyberspace which is developed since the 1990’s and having the fast and
negative impact on societies. For the purpose of establishing ethical standards in
cyberspace there is a need to enact the penal laws with as much clarity and
specificity as possible without relying on vague interpretations in the existing
legislation and the perpetrators must be convicted for their explicit acts. This must
be done on both national and international level.
There are thousands of cases taking place in the countries but only the few
cases are lodged as a complaint. Because many of the victims due to the threat
and fear of getting abused in the society does not move any complaint against the
cyber criminals, some of the cyber victims accept this incident as nightmare or
bad destiny or as wished by God and moving on the life by forgot all the
incidents. But due to this the cyber criminals are more encouraged to get involved
in such type of cyber criminal activities.
242
There is a great need to encourage litigation both at national and
international level because the corporate sector has been shy of reporting cyber
crimes fearing adverse publicity which results into less judicial pronouncements.
Conviction reinforces the confidence of the people which enhances the capability
of the law enforcement agencies to combat cybercrime and in the Indian judicial
system’s resilience in dealing with new challenges in the cyber age. Public due to
unawareness that a cyber crime has been committed against them, are not able to
approach the police about the commission of cyber crimes. There is a need to take
effective steps for encouraging the public as well as the corporate sector to come
forward for combating with these types of crimes with the assistance of
government.
There is need to see cyber crime and cyber security as an ever present
challenge by the major businesses which requires continuous investment and
monitoring at management and crucially board level. Major businesses firstly
need to ensure that adequate cyber security is in place in the context of increasing
technically complex attacks. Then after, there is need to increase cyber resilience
in particular the ability to detect, contain and remediate breaches and other cyber
incidents by the businesses. It is critically found that businesses are not interested
to implement and maintain the latest technical and high demanded practices, but
also they did not actively test how well they are prepared for combating cyber
criminal attacks because this testing will encompass both their resistance to
threats and their ability to mitigate the loss or fear caused by cyber attacks.
Cyber crime is ever growing threat of complex nature. Neither the law
enforcement agencies nor the businesses will be able to alone mitigate and control
this challenge. There is need of partnership approach between law enforcement
agencies and businesses to control cyber threats and to identify and disrupting the
cyber criminals. Such partnership would be build on existing intelligence sharing
initiatives, including sector based information sharing forums and the
Governments Cyber Security Information Sharing Partnership but would go
further in encouraging and enabling the reporting of cyber crimes as suggested by
National Crime agency (NCA).
243
Need to Develop the Common Agenda of Harmonizing the
Atmosphere between Nations
The common network is being used by the entire globe at national as well
as international level with the warranties of having existence of international co-
operation. With the purpose to maintain it there is a need for every nation to
develop a common infrastructure for dealing with cyber crimes which is
harmonizing with the legal system of other nations. Presently, many efforts are
going on to develop the common agenda of harmonizing the atmosphere between
nations for combating cyber crimes by the international treaties, conventions or
commissions i.e. UNCITRAL Model Law etc.
It is rightly said that prevention is always better than cure. Public should
take certain effective precautions for protecting themselves from such crimes
while operating the internet Government as well as public awareness is highly
required for combating this recent growing cyber crime both at national and
international level because public and government both is the pillar of a nation.
Government will work out on the basis of what the public required or demanded.
If any cyber crime is committed against them then immediately report to police
about this. If the public is aware about their rights and duties then the government
will work properly. For this technology based programmes, education, camps and
other effective means should be adopted by the government for awaking the
public at large to protect themselves from these types of crimes.
It is also found that the cyber crimes are causing monetary and non-monetary
losses to the government sector as well as private sector entities, departments,
institutions etc. at national and international level. There is a need to tackle this
problem at both levels with the co-operation of both private and public sector and
also a need to develop the investigation capabilities. Because in India there are
very few institutions that are providing Cyber Crimes Investigation Training, so
there is a need to establish more such institutions and from time to time such type
of camps should be organized. Technical training of the police, cyber authorities,
investigating officers, prosecutors, judges and advocates is highly demanded from
time to time. Indian police force is not qualified in the complex field of
computers, computer networks. It is also suggested that due to the very dynamic
244
nature of information technology there is a need to inculcate the culture of
continuous and learning education among the law enforcement authorities because
the today’s knowledge becomes obsolete in a very short time.
There must be uniform guidelines for the internet service providers and
cyber café both at national and international level which expressly mentioned
their liability and accountability such as there must be the provision for
prohibiting them from use of user’s numbers of their clients and for keeping the
secrecy of their personal information which is provided on the basis of utmost
good faith. These guidelines must be updated from time to time according to
change in circumstances.
739
“Sting Operation”, Wikipedia, available at: https://en.wikipedia.org/wiki/Sting_operation
(visited on April 6, 2017).
245
same is not the position in India.740 In court on its own motion v. State741 case, the
Division bench held that where a sting operation made by a private person or an
agency, which may result in violating bodily privacy of another person will fall
under section 66 E of the Act. Such person shall be liable under the Act. There is
a need to legally adopt this method in certain cases where required in public
interest and national security.
It has been rightly said, “If information technology was going to be the
integral part of life, it would be imperative to ensure that its abuses were curbed
and punished. Information technology’s legitimate and beneficial uses should be
promoted and encouraged in public interest. He said creating an institution
awareness of cyber threats, responsibilities and solutions were essential to
curbing cyber crimes. He also said that the law should necessarily respond to
social changes if it were to fulfil its function as a paramount instrument of social
order.” 742
740
The Hindu, New Delhi, June 24, 2016, available at:
http://www.thehindu.com/news/national/sting- operation-not-a-legal-method-of-law-enforcement-
supreme-court/article5944283.ece (visited on April 6, 2017).
741
(2013) WP (C) 162, Del.
742
Legal framework inadequate to tackle cyber crime” The Hindu, July 27, 2008.
743
Talat Fatima, Cyber Crimes, 2011, p. 77, see also Donald Brackman’s remarks on the 2009
Annual Report on Cyber crime released by the FBI on March 13, 2010.
246
BIBLIOGRAPHY
National Crimes Records Bureau, Ministry of Home Affairs, cyber
crimes in India.
Dr. Jyoti Rattan, Cyber Laws & Information Technology (Bharat Laws
House Pvt Ltd , New Delhi,2014)
S.k Verma and Raman Mittal , Legl Dimension of Cyber Space ((India
Law Institute Publications,2004)
249