Crimes Related To IT 27.03
Crimes Related To IT 27.03
1
Crimes related to Information Technology
A. Introduction
Any criminal activity that involves a computer, networked device, or any other related device
can be considered a cyber crime. There are some instances when cyber crimes are carried out
with the intention of generating profit for the cybercriminals, whereas other times a cyber
crime is carried out directly to damage or disable the computer or device. It is also possible
that others use computers or networks to spread malware, illegal information, images, or any
other kind of material. As a result of cyber crime, many types of profit-driven criminal
activities can be perpetrated, such as ransomware attacks, email and internet fraud, identity
theft, and frauds involving financial accounts, credit cards or any other payment card. The
theft and resale of personal and corporate data could be the goal of cybercriminals. In India,
cyber crimes are covered by the Information Technology Act, 2000 and the Indian Penal
Code, 1860. It is the Information Technology Act, 2000, which deals with issues related to
cyber crimes and electronic commerce.
Internet, though offers great benefit to the society, it also present opportunities for crime
using new and highly sophisticated technology tools. Cyber crime is emerging as a serious
threat. Worldwide governments, police departments and intelligence units have started to
react. Initiatives to curb cross border cyber threats are taking shape.In simple words,
cybercrime can be divided into two big categories: Computer as a target and computer as a
tool.
Computer as a target crimes require much higher expertise from the perpetrators and are
usually committed as a group of individuals rather than loners. Given the technical expertise
required to execute and the novelty of these types of crimes, these are the crimes that society
is more unprepared to face. Fortunately, this type of cybercrime is the least common, due to
the expertise and coordination that they require. These crimes usually depend on computer
viruses, malware, and denial of service attacks.
Computer as a tool cybercrime is much less technically unrefined, thus making it more
common; in these cases, the attacker relies on human weaknesses to exploit. These include
thefts, scams, and harassment, which have existed for centuries, way before computer science
started to develop.
The entire world is moving towards development and simultaneously towards technological
advancement and the rapid development of internet and computer technology globally has led
to the growth of new forms of transnational crime especially. The problems and crimes
brought by or in sector of information technology/ internet have virtually no boundaries. All
members of society are negatively impacted by crime, regardless of its form. Due to the
Internet's fast spread and the digitalisation of commercial activity, cyber crime has risen
sharply in developing nations.
Cyber law is actually a law enacted by the concerned Government of the concerned country
and state which allow for computer and cyber offence. Cyber Crime is the crime and other
offensive activity such as computer crime, mobile crime, and IT crime may fall under the
Cyber Crime.
2
Causes of Cyber Crime:
To earn a huge amount of money, Cyber-criminals always choose an easy way. Banks,
casinos, companies, and, financial firms are the prosperous organizations and their target
centers where an enormous amount of money runs daily and has diplomatic information.
It’s very difficult to catch those criminals. Hence, the number of cyber-crimes are
increasing day-by-day across the globe. We require so many laws to protect and safeguard
them against cyber-criminals since the devices we use everyday for businesses and
communication might have vulnerabilities that can be exploited. We have listed some of the
reasons :
3
The following are considered to be the major types of cyber-crimes:
In its simplest sense, child sexual abuse materials (CSAMs) include any material
containing sexual images in any form, wherein both the child being exploited or
abused may be seen. There is a provision in Section 67(B) of the Information
Technology Act which states that the publication or transmission of material depicting
children in sexually explicit acts in an electronic form is punishable.
2. Cyberbullying:
A cyberbully is someone who harasses or bullies others using electronic devices like
computers, mobile phones, laptops, etc. Cyberbullying refers to bullying conducted
through the use of digital technology. The use of social media, messaging platforms,
gaming platforms, and mobile devices may be involved. Oftentimes, this involves
repeated behaviour that is intended to scare, anger, or shame those being targeted.
3. Cyberstalking:
Cyberstalking is the act of harassing or stalking another person online using the
internet and other technologies. Cyberstalking is done through texts, emails, social
media posts, and other forms and is often persistent, methodical, and deliberate.
4. Cyber grooming:
An online job fraud scheme involves misleading people who require a job by
promising them a better job with higher wages while giving them false hope. On
March 21, 2022, the Reserve Bank of India (RBI) alerted people not to fall prey to job
scams. By this, the RBI has explained the way in which online job fraud is
perpetrated, as well as precautions the common man should take when applying for
any job opportunity, whether in India or abroad.
6. Online sextortion:
The act of online sextortion occurs when the cybercriminal threatens any individual to
publish sensitive and private material on an electronic medium. These criminals
threaten in order to get a sexual image, sexual favour, or money from such
individuals.
4
7. Phishing:
Fraud involving phishing is when an email appears to be from a legitimate source but
contains a malicious attachment that is designed to steal personal information from
the user such as their ID, IPIN, Card number, expiration date, CVV, etc. and then
selling the information on the dark web.
8. Vishing:
9. Smishing:
As the name suggests, smishing is a fraud that uses text messages via mobile phones
to trick its victims into calling a fake phone number, visiting a fraudulent website or
downloading malicious software that resides on the victim’s computer.
In credit card (or debit card) fraud, unauthorized purchases or withdrawals from
another’s card are made to gain access to their funds. When unauthorized purchases or
withdrawals of cash are made from a customer’s account, they are considered
credit/debit card fraud. Fraudulent activity occurs when a criminal gains access to the
cardholder’s debit/credit number, or personal identification number (PIN). Your
information can be obtained by unscrupulous employees or hackers.
A person is impersonated or exposed to identity theft when they make fraudulent use
of an electronic signature, a password, or any other unique identifier on another
person’s behalf.
5
Counterfeit and replica goods: Products created to look identical to an existing
product made by a third party’s brand; while counterfeits are branded, replicas are
not.
Piracy: Piracy is the unauthorized reproduction, copying, and spreading of
copyrighted materials.
Patent infringement: These are products that exactly copy the functionality and
mechanism of products protected by utility patents.
Cyber terrorism is also known as information wars and can be defined as an act of
Internet terrorism which contains cautious and large-scale strikes and disturbances
of computer networks using computer viruses or the physical attacks using malware
to strike individuals, governments and other organizations. The aim of terrorists is to
produce a sense of terror in the brains of the victims. Maintaining this idea in mind,
it enhances a simple way to modify the cyber-attacks for a financial or egotistical
and achieve from acts of cyber terrorism. Cyber terrorists drive with the aim of harm
and demolition at the forefront of their activities like a vanguard.
This software based on the Internet or programs that are used to disturb a network.
The software is used to acquire access to a system to loot diplomatic information or
data or causing destruction to the software which is present in the system.
Social engineering attacks are conducted by exploiting human errors and behaviours
to perpetrate a cyber attack. Social engineering means manipulating someone to
reveal confidential or sensitive information, usually through digital communication
and using the same for fraudulent purposes. Since it takes advantage of human
vulnerabilities for unlawful ends, it is also called human hacking. For example, a
cybercriminal impersonating an IT professional contacts you under the guise of
updating your security software. Such cyber criminals build trust with their targets,
collect their personal information, commit the attack, and depart. Some of the
common social engineering attacks include baiting, too good to be true schemes,
phishing, email hacking, etc.
6
constitute the offence of stalking, the element of persistent unwanted communication
which has the potential to intimidate the victim should be there.
Cyber defamation can be broadly defined as any act, deed, word, gesture, or thing on the
internet or concerning cyberspace that is designed to harm a person’s reputation or
goodwill on the internet with a malafide intention so that others in the community,
whether online or offline would view the person with ridicule, hatred, contempt,
indifference or any other negative attribute. For example, posting vulgar pictures of a
person on social media without his consent, creating fake accounts in someone’s name,
sending obscene messages to his friends and relatives, etc. Thus, cyber defamation refers
to defaming a person online or in cyberspace. It is noteworthy that word travels like light
in cyberspace and the defamatory content reaches millions in a matter of seconds. Hence,
defamation in the context of cyberspace has become a serious concern.
Sections 499 and 500 of I.P.C. deals with defamation. Section 66A of the Information
Technology Act, 2000 provides punishment for sending offensive messages through
communication services, etc. However, the said Section was struck down as
unconstitutional by the Supreme Court in the case of Shreya Singhal v. Union of
India(2015) on the ground that it violates the right to free speech and expression.
7
22. Others:
Other cyber crimes usually include:
(a) Unauthorized access of the computers
(b) Data diddling
(c) Virus/worms attack
(d) Theft of computer system
(e) Hacking
(f) Denial of attacks
(g) Logic bombs
(h) Trojan attacks
(i) Internet time theft
(j) Web jacking
(k) Email bombing
(l) Salami attacks
(m) Physically damaging computer system.
C. Historical perspective
From the 1940s to the present, discover how cybercrime and cybersecurity have
developed to become what we know today.Many species evolve in parallel, each
seeking a competitive edge over the other. As cybersecurity and technology have
evolved, so have criminals and ‘bad actors’ who seek to exploit weaknesses in the
system for personal gain – or just to prove a point. This arms race has been going on
since the 1950s, and this article explains the evolution of cyberattacks and security
solutions.
8
1950s: The phone phreaks
The technological and subcultural roots of hacking are as much related to early
telephones as they are to computers.In the late 1950s, ‘phone phreaking’ emerged.
The term captures several methods that ‘phreaks’ – people with a particular interest in
the workings of phones – used to hijack the protocols that allowed telecoms engineers
to work on the network remotely to make free calls and avoid long-distance tolls.
Sadly for the phone companies, there was no way of stopping the phreaks, although
the practice eventually died out in the 1980s. The phreaks had become a community,
even issuing newsletters, and included technological trailblazers like Apple’s founders
Steve Wozniak and Steve Jobs. The mold was set for digital technology.
However, there were early forays into hacking by some of those with access, often
students. At this stage, the attacks had no commercial or geopolitical benefits.
Most hackers were curious mischief-makers or those who sought to improve existing
systems by making them work more quickly or efficiently.
In 1967, IBM invited school kids to try out their new computer. After exploring the
accessible parts of the system, the students worked to probe deeper, learning the
system’s language, and gaining access to other parts of the system.
This was a valuable lesson to the company and they acknowledged their gratitude to
“a number of high school students for their compulsion to bomb the system”, which
resulted in the development of defensive measures – and possibly the defensive
mindset that would prove essential to developers from then on. Ethical hacking is still
practiced today.
As computers started to reduce in size and cost, many large companies invested in
technologies to store and manage data and systems. Storing them under lock and key
9
became redundant as more people needed access to them and passwords began to be
used.
Researcher Bob Thomas created a computer program called Creeper that could move
across ARPANET’s network, leaving a breadcrumb trail wherever it went. It read:
‘I’m the creeper, catch me if you can’. Ray Tomlinson – the inventor of email – wrote
the program Reaper, which chased and deleted Creeper. Reaper was not only the very
first example of antivirus software, but it was also the first self-replicating program,
making it the first-ever computer worm.
Creating early computer security was undertaken by ESD and ARPA with the U.S.
Air Force and other organizations that worked cooperatively to develop a design for a
security kernel for the Honeywell Multics (HIS level 68) computer system. UCLA
and the Stanford Research Institute worked on similar projects.
“Security has become an important and challenging goal in the design of computer
systems.”
10
In 1979, 16-year-old Kevin Mitnick famously hacked into The Ark – the computer at
the Digital Equipment Corporation used for developing operating systems – and made
copies of the software. He was arrested and jailed for what would be the first of
several cyberattacks he conducted over the next few decades. Today he runs Mitnick
Security Consulting.
Despite this, in 1986, German hacker Marcus Hess used an internet gateway in
Berkeley, CA, to piggyback onto the ARPANET. He hacked 400 military computers,
including mainframes at the Pentagon, intending to sell information to the KGB.
Security started to be taken more seriously. Savvy users quickly learned to monitor
the command.com file size, having noticed that an increase in size was the first sign
of potential infection. Cybersecurity measures incorporated this thinking, and a
sudden reduction in free operating memory remains a sign of attack to this day.
1987 was the birth year of commercial antivirus, although there are competing claims
for the innovator of the first antivirus product.
Andreas Lüning and Kai Figge released their first antivirus product for the Atari ST –
which also saw the release of Ultimate Virus Killer (UVK)
11
In the U.S., John McAfee founded McAfee (now part of Intel Security), and released
VirusScan.
Also in 1987:
One of the earliest documented ‘in the wild’ virus removals was performed by
German Bernd Fix when he neutralized the infamous Vienna virus – an early example
of malware that spread and corrupted files.
The encrypted Cascade virus, which infected .COM files, first appeared . A year later,
Cascade caused a serious incident in IBM’s Belgian office and served as the impetus
for IBM’s antivirus product development. Before this, any antivirus solutions
developed at IBM had been intended for internal use only.
By 1988, many antivirus companies had been established around the world – including
Avast, which was founded by Eduard Kučera and Pavel Baudiš in Prague, Czech
Republic. Today, Avast has a team of more than 1,700 worldwide and stops around 1.5
billion attacks every month.
Early antivirus software consisted of simple scanners that performed context searches to
detect unique virus code sequences. Many of these scanners also included ‘immunizers’
that modified programs to make viruses think the computer was already infected and
not attack them. As the number of viruses increased into the hundreds, immunizers
quickly became ineffective.
It was also becoming clear to antivirus companies that they could only react to existing
attacks, and a lack of a universal and ubiquitous network (the internet) made updates
hard to deploy.
As the world slowly started to take notice of computer viruses, 1988 also witnessed the
first electronic forum devoted to antivirus security – Virus-L – on the Usenet network.
The decade also saw the birth of the antivirus press: UK-based Sophos-sponsored Virus
Bulletin and Dr. Solomon’s Virus Fax International.
The decade closed with more additions to the cybersecurity market, including F-Prot,
ThunderBYTE, and Norman Virus Control. In 1989, IBM finally commercialized their
internal antivirus project and IBM Virscan for MS-DOS went on sale for $35.
12
1990s: The world goes online
The first polymorphic viruses were created (code that mutates while keeping the
original algorithm intact to avoid detection)
British computer magazine PC Today released an edition with a free disc that
‘accidentally’ contained the DiskKiller virus, infecting tens of thousands of computers
EICAR (European Institute for Computer Antivirus Research) was established
As more antivirus scanners hit the market, cybercriminals were responding and in 1992
the first anti-antivirus program appeared.
By 1996, many viruses used new techniques and innovative methods, including stealth
capability, polymorphism, and ‘macro viruses’, posing a new set of challenges for
antivirus vendors who had to develop new detection and removal capabilities.
New virus and malware numbers exploded in the 1990s, from tens of thousands early in
the decade growing to 5 million every year by 2007. By the mid-‘90s, it was clear that
cybersecurity had to be mass-produced to protect the public. One NASA researcher
developed the first firewall program, modeling it on the physical structures that prevent
the spread of actual fires in buildings.
The late 1990s were also marked by conflict and friction between antivirus developers:
McAfee accused Dr. Solomon’s of cheating so that testing of uninfected discs showed
good speed results and the scan tests of virus collections showed good detection
results. Dr. Solomon’s filed suit in response
Taiwanese developer Trend Micro accused McAfee and Symantec of violating its
patent on virus scan-checking technology via the internet and electronic mail.
Symantec then accused McAfee of using code from Symantec’s Norton AntiVirus.
Heuristic detection also emerged as a new method to tackle the huge number of virus
variants. Antivirus scanners started to use generic signatures – often containing non-
13
contiguous code and using wildcard characters – to detect viruses even if the threat had
been ‘hidden’ inside meaningless code.
Towards the end of the 1990s, email was proliferating and while it promised to
revolutionize communication, it also opened up a new entry point for viruses.
In 1999, the Melissa virus was unleashed. It entered the user’s computer via a Word
document and then emailed copies of itself to the first 50 email addresses in Microsoft
Outlook. It remains one of the fastest spreading viruses.
With the internet available in more homes and offices across the globe, cybercriminals
had more devices and software vulnerabilities to exploit than ever before. And, as more
and more data was being kept digitally, there was more to plunder.
In 2001, a new infection technique appeared: users no longer needed to download files –
visiting an infected website was enough as bad actors replaced clean pages with infected
ones or ‘hid’ malware on legitimate webpages. Instant messaging services also began to
get attacked, and worms designed to propagate via IRC (Internet Chat Relay) channel also
arrived.
The development of zero-day attacks, which make use of ‘holes’ in security measures for
new software and applications, meant that antivirus was becoming less effective – you
can’t check code against existing attack signatures unless the virus already exists in the
database. Computer magazine found that detection rates for zero-day threats had dropped
from 40-50% in 2006 to only 20-30% in 2007.
As crime organizations started to heavily fund professional cyberattacks, the good guys
were hot on their trail:
2000: the first open-source antivirus engine OpenAntivirus Project is made available
2001: ClamAV is launched, the first-ever open-source antivirus engine to be
commercialized
14
A key challenge of antivirus is that it can often slow a computer’s performance. One
solution to this was to move the software off the computer and into the cloud. In 2007,
Panda Security combined cloud technology with threat intelligence in their antivirus
product – an industry-first. McAfee Labs followed suit in 2008, adding cloud-based anti-
malware functionality to VirusScan. The following year, the Anti-Malware Testing
Standards Organization (AMTSO) was created and started working shortly after on a
method of testing cloud products.
`Another innovation this decade was OS security – cybersecurity that’s built into the
operating system, providing an additional layer of protection. This often includes
performing regular OS patch updates, installation of updated antivirus engines and
software, firewalls, and secure accounts with user management.
With the proliferation of smartphones, antivirus was also developed for Android and
Windows mobile.
The 2010s saw many high-profile breaches and attacks starting to impact the national
security of countries and cost businesses millions.
2012: Saudi hacker 0XOMAR publishes the details of more than 400,000 credit cards
online
2013: Former CIA employee for the US Government Edward Snowden copied and
leaked classified information from the National Security Agency (NSA)
2013-2014: Malicious hackers broke into Yahoo, compromising the accounts and
personal information of its 3 billion users. Yahoo was subsequently fined $35 million
for failing to disclose the news
The increasing connectedness and the ongoing digitization of many aspects of life
continued to offer cybercriminals new opportunities to exploit. Cybersecurity tailored
specifically to the needs of businesses became more prominent and in 2011, Avast
launched its first business product.
15
Attackers were becoming smarter and antivirus was forced to shift away from signature-
based methods of detection to ‘next generation’ innovations.
The Ministry of Law and Company Affairs then vetted this joint draft.
After its introduction in the House, the bill was referred to the 42-member
Parliamentary Standing Committee following demands from the Members. The
16
Standing Committee made several suggestions to be incorporated into the bill.
However, only those suggestions that were approved by the Ministry of Information
Technology were incorporated. One of the suggestions that was highly debated upon
was that a cyber café owner must maintain a register to record the names and addresses
of all people visiting his café and also a list of the websites that they surfed. This
suggestion was made as an attempt to curb cyber crime and to facilitate speedy locating
of a cyber criminal. However, at the same time it was ridiculed, as it would invade
upon a net surfer's privacy and would not be economically viable.
Finally, this suggestion was dropped by the IT Ministry in its final draft.
The Union Cabinet approved the bill on May 13, 2000 and on May 17, 2000, both the
houses of the Indian Parliament passed the Information Technology Bill. The Bill
received the assent of the President on 9th June 2000 and came to be known as the
Information Technology Act, 2000. The Act came into force on 17th October 2000.
With the passage of time, as technology developed further and new methods of
committing crime using Internet & computers surfaced, the need was felt to amend the
IT Act, 2000 to insert new kinds of cyber offences and plug in other loopholes that
posed hurdles in the effective enforcement of the IT Act, 2000.
his led to the passage of the Information Technology (Amendment) Act, 2008 which
was made effective from 27 October 2009. The IT (Amendment) Act, 2008 has
brought marked changes in the IT Act, 2000 on several counts.
The following Act, Rules and Regulations are covered under cyber laws:
In India, cyber laws are contained in the Information Technology Act, 2000 (IT
Act) which came into force on October 17, 2000. The main purpose of the Act is
to provide legal recognition to electronic commerce and to facilitate filing of
electronic records with the Government.
In Poona Auto Ancillaries Pvt. Ltd., Pune v. Punjab National Bank, HO New
Delhi & Others (2018), Rajesh Aggarwal of Maharashtra’s IT department
(representative in the present case) ordered Punjab National Bank to pay Rs 45
17
lakh to Manmohan Singh Matharu, MD of Pune-based firm Poona Auto
Ancillaries. In this case, a fraudster transferred Rs 80.10 lakh from Matharu’s
account at PNB, Pune after the latter answered a phishing email. Since the
complainant responded to the phishing mail, the complainant was asked to
share the liability. However, the bank was found negligent because there were
no security checks conducted against fraudulent accounts opened to defraud
the Complainant.
Case Laws:
1. Frios v/s State of Kerela
Facts: In this case it was declared that the FRIENDS application software as
protected system. The author of the application challenged the notification and the
constitutional validity of software under Section 70. The court upheld the validity
of both.
It included tampering with source code. Computer source code the electronic
form, it can be printed on paper.
Held: The court held that Tampering with Source code are punishable with three
years jail and or two lakh rupees fine of rupees two lakh rupees for altering,
concealing and destroying the source code.
Facts: In this case the Tata Indicom employees were arrested for manipulation of
the electronic 32- bit number (ESN) programmed into cell phones theft were
exclusively franchised to Reliance Infocom.
Held: The Court held that Tampering with source code invokes Section 65 of the
Information Technology Act.
18
3. Parliament Attack Case:
In Parliament case several smart device storage disks and devices, a Laptop were
recovered from the truck intercepted at Srinagar pursuant to information given by
two suspects. The laptop included the evidence of fake identity cards, video files
containing clips of the political leaders with the background of Parliament in the
background shot from T.V news channels. In this case design of Ministry of
Home Affairs car sticker, there was game “wolf pack” with user name of ‘Ashiq’.
There was the name in one of the fake identity cards used by the terrorist. No back
up was taken therefore it was challenged in the Court.
In Kumar v. Whiteley (1991), during the course of the investigation, the accused
gained unauthorized access to the Joint Academic Network (JANET) and deleted,
added, and changed files. As a result of investigations, Kumar had been logging on
to a BSNL broadband Internet connection as if he was an authorized legitimate
user and modifying computer databases pertaining to broadband Internet user
accounts of subscribers. On the basis of an anonymous complaint, the CBI
registered a cyber crime case against Kumar and conducted investigations after
finding unauthorized use of broadband Internet on Kumar’s computer. Kumar’s
wrongful act also caused the subscribers to incur a loss of Rs 38,248. N G Arun
Kumar was sentenced by the Additional Chief Metropolitan Magistrate. The
magistrate ordered him to undergo a rigorous year of imprisonment with a fine of
Rs 5,000 under Sections 420 of IPC and 66 of the IT Act.
19
E. Section 66C: Punishment for Identity Theft, Misuse of Digital
Signature
The focus of this section is digital signatures, password hacking, and other
forms of identity theft. This section imposes imprisonment upto 3 years along
with one lakh rupees as a fine.
20
be punished on first conviction with imprisonment of either description for a term
which may extend to five years and with fine which may extend to Rs 10 lakhs and in
the event of second or subsequent conviction with imprisonment of either description
for a term which may extend to seven years and also with fine which may extend to
Rs 10 lakhs.
21
L. Section 70 : Protected System:
(1) The appropriate Government may, by notification in the Official Gazette,
declare any computer resource which directly or indirectly affects the facility of
Critical Information Infrastructure, to be a protected system.
(2) The appropriate Government may, by order in writing, authorise the persons
who are authorised to access protected systems notified under sub-section (1).
(3) Any person who secures access or attempts to secure access to a protected
system in contravention of the provisions of this section shall be punished with
imprisonment of either description for a term which may extend to ten years and
shall also be liable to fine. [(4) The Central Government shall prescribe the
information security practices and procedures for such protected system.]
Save as otherwise provide in this Act or any other law for the time being in force,
any person who, in pursuance of any of the powers conferred under this Act, rules
or regulation made there under, has secured assess to any electronic record, book,
register, correspondence, information, document or other material without the
consent of the person concerned discloses such material to any other person shall
be punished with imprisonment for a term which may extend to two years, or with
fine which may extend to one lakh rupees, or with both.
(a) the Certifying Authority listed in the certificate has not issued it; or
(b) the subscriber listed in the certificate has not accepted it; or
22
unless such publication is for the purpose of verifying a [electronic signature] created
prior to such suspension or revocation.
(2) Any person who contravenes the provisions of sub-section (1) shall be punished
with imprisonment for a term which may extend to two years, or with fine which may
extend to one lakh rupees, or with both.
Q. Section 75. Act to apply for offence or contravention committed outside India:
(1) Subject to the provisions of sub-section (2), the provisions of this Act shall apply
also to any offence or contravention committed outside India by any person
irrespective of his nationality.
(2) For the purposes of sub-section (1), this Act shall apply to an offence or
contravention committed outside India by any person if the act or conduct constituting
the offence or contravention involves a computer, computer system or computer
network located in India.
CASE LAW:
Facts: In this case the Citibank faced the wrath of a hacker on its cash management
system, resulting in illegal transfer of funds from customers account in to the accounts
of the hacker, later identified as Valdimer Levin and his accomplices. After Levin was
arrested he was extradite to the United States. One of the most important issues was
jurisdictional issue, the ‘place of origin’ of the cyber crime.
Held: The Court helds that the real- time nature of the communication link between
Levin and Citibank computer meant that Levin’s keystrokes were actually occurring
on the Citibank computer.
It is thus important that in order to resolve the disputes related to jurisdiction, the
issue of territoriality and nationality must be placed by a much broader criteria
embracing principles of reasonableness and fairness to accommodate overlapping or
conflicting interests of states, in spirit of universal jurisdiction.
23
Any computer, computer system, floppies, compact disks, tape drives or any other
accessories related thereto, in respect of which any provisions of this Act, rules,
orders or regulations made there under has been or is being contravened, shall be
liable to confiscation:
Provided that where it is established to the satisfaction of the court adjudicating the
confiscation that the person in whose possession, power or control of any such
computer, computer system, floppies, compact disks, tape drives or any other
accessories relating thereto is found is not responsible for the contravention of the
provisions of this Act, rules orders or regulations made there under, the court may,
instead of making an order for confiscation of such computer, computer system,
floppies, compact disks, tape drives or any other accessories related thereto, make
such other order authorized by this Act against the person contravening of the
provisions of this Act, rules, orders or regulations made there under as it may think fit.
There are several aspects of the collection, transmission, and processing of data that
are covered by the IT Rules, including the following:
24
The Information Technology (Guidelines for Cyber Cafe) Rules, 2011: According
to these guidelines, cybercafés must register with an appropriate agency and
maintain a record of users’ identities and their internet usage.
The Information Technology (Electronic Service Delivery) Rules, 2011:
Basically, these regulations give the government the authority to specify the
delivery of certain services, such as applications, certificates, and licenses, by
electronic means.
Information Technology (The Indian Computer Emergency Response Team and
Manner of Performing Functions and Duties) Rules, 2013 (the CERT-In Rules):
There are several ways in which the CERT-In rules provide for the working of
CERT-In. In accordance with rule 12 of the CERT-In rules, a 24-hour Incident
response helpdesk must be operational at all times. Individuals, organisations and
companies can report cybersecurity incidents to Cert-In if they are experiencing a
cybersecurity Incident. The Rules provide an Annexure listing certain Incidents
that must be reported to Cert-In immediately.
Another requirement under Rule 12 is that service providers, intermediaries, data
centres, and corporate bodies inform CERT-In within a reasonable timeframe of
cybersecurity incidents. As a result of the Cert-In website, Cybersecurity Incidents
can be reported in various formats and methods, as well as information on
vulnerability reporting, and incident response procedures. In addition to reporting
cybersecurity incidents to CERT-In in accordance with its rules, Rule 3(1)(I) of the
Information Technology (Guidelines for Intermediaries and Digital Media Ethics
Code) Rules, 2021 also requires that all intermediaries shall disclose information
about cybersecurity incidents to CERT-In.
If the IT Act is not sufficient to cover specific cyber crimes, law enforcement
agencies can apply the following IPC sections:
Section 292:Sale, etc, of obscene books, etc. -The purpose of this section was to
address the sale of obscene materials, however, in this digital age, it has evolved to
deal with various cyber crimes as well. A manner in which obscene material or
sexually explicit acts or exploits of children are published or transmitted
electronically is also governed by this provision. The penalty for such acts is
imprisonment and fines up to 2 years and Rs. 2000, respectively. The punishment
for any of the above crimes may be up to five years of imprisonment and a fine of
up to Rs. 5000 for repeat (second-time) offenders.
Section 354C: Voyeurism - In this provision, cyber crime is defined as taking or
publishing pictures of private parts or actions of a woman without her consent. In
this section, voyeurism is discussed exclusively since it includes watching a
woman’s sexual actions as a crime. In the absence of the essential elements of this
section, Section 292 of the IPC and Section 66E of the IT Act are broad enough to
include offences of an equivalent nature. Depending on the offence, first-time
offenders can face up to 3 years in prison, and second-time offenders can serve up
to 7 years in prison.
25
Section 354D: Stalking: Stalking, including physical and cyberstalking, is
described and punished in this chapter. The tracking of a woman through
electronic means, the internet, or email or the attempt to contact her despite her
disinterest amounts to cyber-stalking. This offence is punished by imprisonment of
up to 3 years for the first offence and up to 5 years for the second offence, along
with a fine in both cases.
A victim in the case Kalandi Charan Lenka v. the State of Odisha(2017) has
received a series of obscene messages from an unknown number that has damaged
her reputation. The accused also sent emails to the victim and created a fake
account on Facebook containing morphed images of her. The High Court,
therefore, found the accused prima facie guilty of cyberstalking on various charges
under the IT Act and Section 354D of IPC.
Section 379: Punishment for theft:The punishment involved under this section,
for theft, can be up to three years in addition to the fine. The IPC Section comes
into play in part because many cyber crimes involve hijacked electronic devices,
stolen data, or stolen computers.
Section 420:Cheating and dishonestly inducing delivery of property - This
section talks about cheating and dishonestly inducing delivery of property. Seven-
year imprisonment in addition to a fine is imposed under this section on
cybercriminals doing crimes like creating fake websites and cyber frauds. In this
section of the IPC, crimes related to password theft for fraud or the creation of
fraudulent websites are involved.
Section 463: Forgery- This section involves falsifying documents or records
electronically.
Section 465:Punishment for forgery: This provision typically deals with the
punishment for forgery. Under this section, offences such as the spoofing of email
and the preparation of false documents in cyberspace are dealt with and punished
with imprisonment ranging up to two years, or both.
In Anil Kumar Srivastava v. Addl Director, MHFW (2005), the petitioner had
forged signed the signature of the AD and had then filed a case that made false
allegations against the same individual. Due to the fact that the petitioner also
attempted to pass it off as a genuine document, the Court held that the petitioner
was liable under Sections 465 and 471 of the IPC.
Section 468: Forgery for purpose of cheating: Fraud committed with the
intention of cheating may result in a seven-year prison sentence and a fine. This
section also punishes email spoofing.
In Gagan Harsh Sharma v. The State of Maharashtra (2018), the Bombay High Court
addressed the issue of non-bailable and non-compoundable offences under sections
408 and 420 of the IPC in conflict with those under Sections 43, 65, and 66 of the IT
Act that is bailable and compoundable.
26
4. Companies Act, 2013:
27
6. Other Landmark Judgment
28
1. Shreya Singhal v. UOI
Analysis– The court also noted that Section 66A of the Information Technology
Act did not violate Section 14 of the Constitution of India because there is a clear
distinction between information transmitted over the Internet and information
transmitted through other forms of speech. Also, the Supreme Court did not even
consider the issue of procedural irrationality because it was inherently
unconstitutional
Issues
29
Judgment–In section 2(1)(i) of the Information Technology Act, “computer” means
an electronic, magnetic, optical or other high-speed data processing device or system
that electronically manipulates logic, arithmetic and memory functions. , magnetic or
optical impulses and any input, output, processing, storage, computer software or
communication connected to or connected to a computer in a computer system or
computer network.
Analysis–
In 2003, Crime No. 20 was dismissed under Articles 409, 420 and 120B, and criminal
cases brought under Article 65 of the Information Technology Act and Article 63 of
the Copyright Act and CID were also dismissed. When complaints are received, it is
suggested that the investigation be completed and a final report be submitted to the
metropolitan court to hear the case within three months.
Facts–Bazee.com CEO Avnish Bajaj had been arrested under section 67 of the
Information Technology Act for broadcasting cyber pornography. Someone else was
selling obscene CD copies through the bazee.com website.
Issues
Is Article 67 of the Information Technology Act against which the case was
brought against the applicant?
Are allegations of misconduct under Sections 292(2)(a) and 292(2)(d) IPC on
the website objectionable or not?
Judgment–
The court noted that Mr Bajaj did not participate in any pornography program
anywhere. No one is allowed to view pornography on the Bazee.com website.
However, Bazee.com receives sales commissions and makes money from
advertisements placed on its web pages. The court also points out that the evidence
gathered indicates that cyber-porn crimes can be attributed to someone other than
Bazee.com. The court granted Mr Bajai two rupees bail. 10,000 won each. However,
the defendant bears the burden of being only a service provider, not a content.
30
Analysis
The testimony could not prove that any publications were written directly or
indirectly by the accused.
Analysis confirms that you cannot view real porn/clips on the Baaze.com
portal.
The consideration for the sale had nothing to do with the defendant.
At first glance, the website (Baaze.com) was trying to close the loop.
The accused took an active part in the investigation.
The nature of the suspected crime has already been determined and can be
protected from unauthorized access.
Evidence gathered suggests that only pornographic content may be
unintentionally offered for sale on a website.
It also indicates that criminal charges may be attributed to others.
E. Suggestions
The law deals an important part in the overall development of the country, and this can be
achieved with proper and effective implementation of it. Now the children are being
exploited. As can be seen, the crime rate against children is rising day by day. It is a
challenge to apprehend a wrongdoer in cybercrime but with proper and strict
implementation it can be curtailed. Some crucial points regarding ineffective protection of
children against cybercrime are-
Educating the children and their parents against the threat of cybercrime.
Proper functioning of legislation to meet up with the growing challenge to
tackle cybercrime.
Enhancement in skilled Manpower and Equipment required.
Mentioned below is a comprehensive list of tips and measures that an individual can
take to protect themselves from cybercrime:
31
your pet’s name in your public profile, you are giving away the answer to one
of the most basic security questions.
d. Strengthening your network-Use strong encryption passwords to protect
your home network from hackers and unwanted interceptions. If you are
someone who uses public WI-FI, you must use a VPN(Virtual Private
Network). A VPN encrypts all traffic until it reaches your computer. Thus,
even if hackers can hack your communication line, they won’t intercept
anything but encrypted data.
You can protect yourself from identity theft by taking the following
precautions:
i. Check your bank statements-It is advised that you should regularly check
your bank account statements and in case you notice some unfamiliar
32
transactions, or unauthorised withdrawals, you can report the same to the
bank.
The first thing you can do to avoid a phishing attack is to learn to recognize it.
Here’s how-typically, phishing attacks call for an urgent action prompting you
to click some link or act immediately to claim this lucrative reward and so on.
Here are the other things that you can do to avoid becoming a victim of
phishing attacks:
k. Other tips
33
Understand the nature and importance of the data that you store on your devices.
Creating a backup of your data and files is a good option to mitigate the loss in
case of a malware attack etc.
Enabling multi-factor authentication is another option that you can explore to level
up your security.
Setting and modifying transaction limits on your accounts and cards.
Be careful while you make payments on the internet. Enter your Card Verification
Value(CVV) only on secure payment websites.
Don’t fall into the trap of fake lotteries scams or get-rich-quick schemes.
You can file a cyber complaint through the National Cyber Crime Reporting Portal
i.e. https://cybercrime.gov.in. The portal also provides the facility of filing
anonymous complaints regarding cybercrime related to child pornography and
sexually explicit content. To file a complaint, you have to give details of the incident
such as the category of cybercrime, date and time, a platform where it occurred,
upload evidence and details of the suspect, etc.
F. Conclusion
The cyber legal system is subject to IT laws and regulations. The Indian Penal Code of
1860 may also be applicable where the Information Technology Act cannot provide for
certain types of crimes or does not contain comprehensive criminal provisions. However,
the cyber law framework is still insufficient to cover all types of cybercrime in India that
exist today. As countries move towards the Digital India movement, cybercrime is
constantly evolving and new types of cybercrime enter the cyber law regime every day.
India’s cyber legal system is weak compared to other countries.
Also, Various initiatives have been taken by the government such as issuing advisories
regarding cyber threats and setting up of Cyber Swacchta Kendra, etc. Cyberspace is very
vast and knows no bounds. The internet offers anonymity to offenders and often it is very
difficult to impossible to trace a skilled cyber offender. Thus, people have to be aware of
their digital surroundings just as they are in the real world.
G. Reference
34
1. Criminology and Penology Book by Prof. N.V. Paranjape.
35