+91 99133 42166
Crime is a legal concept and has the sanction of law. Crime or offense is “a legal wrong that can be followed by criminal proceedings which may result in punishment.[1]”
It could be hackers vandalizing your site, viewing confidential information, stealing trade secrets or intellectual property with the use of the internet. It can also include ‘denial of services’ and virus attacks preventing regular traffic from reaching your site. Cyber crimes are not limited to outsiders except in case of viruses and concerning security-related cyber crimes that are usually done by the employees of a particular company who can easily access the password and data storage of the company for their benefit. Cybercrime also includes crimes committed using computers in furtherance of crimes such as financial crimes, sale of illegal items, pornography, online gambling, intellectual property crimes, email, fraud, forgery, online defamation, cybercrime, and unauthorized access. theft of a computer system, information in electronic form, email bombing, physical damage to a computer system, etc. Crime is a legal concept and is punishable by law. A crime or misdemeanor is “a legal wrong that can be followed by criminal proceedings and that can result in punishment”.[2]
However, substantial legal questions have arisen in many contexts. The World Wide Web allows users to circulate content in the form of text, images, videos, and sounds. Websites are created and updated for many useful purposes, but they can also be used to circulate offensive content such as pornography, hate speech, and decorative materials. There is also an upsurge in incidents of financial fraud and cheating in commercial transactions conducted online.
The digital medium provides a convenient shield of anonymity and fake identities. Errant persons become moreemboldened in their offensive behaviour if they think that they will not face any consequences. In recent years, there have been numerous reports of Internet users easily unsolicited emails which often contain obscene language and amount to harassment. To post personal information about themselves on job and marriage on websites or social networking sites is the point at the receiving end of ‘cyber-stalking’. Women and miners who bought their contact details become especially vulnerable since lumpen elements such as sex offenders can use this information to target potential victims.
Cybercrime is a global phenomenon. With the advent of technology, cybercrime and victimization of women are on the high and it poses a major threat to the security of a person as a whole. Even though India is one of the very few countries to enact IT Act 2000 to combat cyber crimes, issues regarding women will remain untouched in this Act. The same act as the downtrodden offense is hacking, publishing obscene material on the net, and tempering the data as a punishable offense. But the grave threat to the security of women, in general, is not covered fully by this act. Cyberbullying can affect everyone, including children[3].
Types of Cybercrime that are Committed against Society[4]:-
Amongst the various cybercrime committed against society at large the crimes which can be mentioned as especially targeting ones are as follow:-
A brief discussion of these offenses is as follows:
The Internet has provided a medium for the facilitation of crimes like pornography. Cyber porn as it is popularly called is widespread. Almost 50% of websites exhibit pornographic material on the Internet today. For graphic materials can be reproduced more quickly and cheaply and new media like hard disks, floppy disks, and CD-ROMs. The new technology is not merely an extension of the existing forms like text, photographs, and images. Apart from still pictures and images, full-motion video clips and complete movies are also available. Another great disadvantage with the media like this is its easy availability and accessibility to children who can now log on to the pornographic websites from their own houses in relative anonymity and the social and legal deterrents associated with physically purchasing an adult magazine from the stand are no longer present. Furthermore, there are more serious offenses that have universal disapproval like child pornography, and are far easier for offenders to hide and propagate through the medium of the Internet[7].
The more common method used by men is to email vulgar photographs of themselves to women, praising their duty, and asking them for a date or enquiring how much they charge for ‘services’. Besides sending explicit messages via email, SMS, and Chat, many also more photographs – placing the victim’s face on another, usually nude, body. In another instance, a couple entered an Internet chat room agreeing to strip for each other using a web camera. The guys stripped, but the person at the other end was another man and his friends, who didn’t. They recorded it and uploaded the clip on a porno website. These things happen in every city but only one in every 500 cases is reported[12].
A court to deliver effective judgment must have proper and well-defined jurisdiction, as without the jurisdiction the court’s judgments would be ineffective. Jurisdictions are of two types namely, personal and subject matter jurisdictions, and for judgment to be effective both must exist contemporaneously. Further, the conventional requirement is to apart can sue another at the place where the defendant resides or whether the cause of action arises. This itself is the problem with Internet jurisdiction on the net it is difficult to establish the above two criteria with certainty. Issues of this nature have contributed to the complete confusion and contradiction that plague judicial decisions in the area of Internet jurisdiction. The IT Act 2000 passed in India is a perfect example of an ambiguous law in the area of jurisdiction in the content of the Internet. This act would apply to the whole of India and otherwise, it applies also to any offence or contravention there under committed outside India by any person[15]. It may apply to Any offense or contravention committed outside India by any person if the actor’s conduct constituting the offense or contravention involves a computer, computer systems, or computer network located in India[16]. Such a provision appears to be against the principle of justice. Going to the next level, let’s that even if the Indian Corps successfully assert jurisdiction and pass a judgment as per the above provisions of the IT Act, 2000, the other question that arises will the foreign courts implement such a judgment? In the case of the about predicament, the only way to resolve such a dispute is using having an extradition treaty with the host nation and India, further, it has been suggested that the Indian courts developed justifiable grounds on which the extraterritorial jurisdiction may validly exercise is done by the American judiciary[17].
From the about becomes necessary to appreciate the complexities involved and thus it becomes indispensable to understand the nature of the cybercrime, and whether the existing penal laws are sufficient.
Even though Chapter XI of the IT Act gives the success tampering with computer source documents[18], hacking with computer systems[19], publishing of information which is obscene in electronic form[20], access to the protected system[21], breach of confidentiality and privacy[22], and publication for fraudulent purposes[23] still needs to be modified. It does not mention any crimes specified against women and children.
The elementary problems, which are associated with cybercrimes, are jurisdiction, loss of evidence, lack of cyber Army, and cyber savvy judges who are the need of the day. The judiciary plays a vital role in shaping the enactment according to the order of the day. One such stage, which needs appreciation, is the PIL, which the camera High Court has accepted to an email. Today with the growing arms of cyberspace the territorial boundary seems to vanish does the concept of terror jurisdiction as envisaged under S.16 of C.P.C and S. 2 of the IPC will have to give way to alternative methods of dispute resolution?
Again under no section in the IT Act 2000, is obscenity-personal viewing-is an offense, in fact like in IPC S. 292 if it is true that you have published or transmitted or caused to be published in the electronic form only then under section 67 it can be an offense. Lastly, the IT Act 2000 does not mention typical cyber crimes like cyber stalking, morphing, and email spoofing as offenses[24].
Conclusion
In the present scenario of cybercrimes are increasing to an alarming extent, the present need of the hour is to have a broad-based convention dealing with criminal substance law matters, criminal procedure questions as well as International criminal procedures and agreements. To overcome the difficulties, necessary amendments must be made to the Code of Criminal Procedure, 1873. Moreover, India at present does not have a proper extradition law to deal with crimes being committed over the Internet.
The biggest problem of cybercrime lies in the modus operandi and the motive of the cybercriminals. Cyberspace is a transit for many people, including offenders. But people do live in cyberspace, they come and go like any other place. This nature provides offenders the chance to escape from the commission of cybercrime. Many websites and blogs were secure for the safety of women and children on the net. But s, till the cybercrime against woman are on rice.
Change is inevitable and dilemmas that advancement in technology poses cannot be avoided, the truth is that criminal search in their method and health started relying on advanced technology, and to deal with them the society the legal and law enforcement authorities, the private corporations, and organization will help to change. Further, such experts must not only be knowledgeable but must also provide the necessary technical hardware and software so that they can efficiently fight cybercriminals. Thus necessary facilities must be established in various parts of the country so that crime in the virtual world cannot be contained.
Another aspect that needs to be highlighted is that a culture of continuous education and learning needs to be included among the legal and law enforcement authorities because the information technology field is very dynamic is the knowledge of today becomes obsolete in a very short time.
From this it can be internal or cannot afford to be static, it is to change with the changing times, and viz. cyberspace this is all more required, as there are many applications of the technology that can be used for the betterment of the men and, similarly it equally true that such application can also be used for the determinant of the mankind. The bottom line is that the law should be made flexible so that it can easily adjust to the needs of society and technological development.
[1] http://www.techterms.com/definition/cybercrime
[2] http://www.legalindia.in/cyber-crimes-and-the-law
[3] http://debaraticyberspace.blogspot.in/
[4] http://www.legalindia.in/cyber-crimes-and-the-law
[5] Dr.B.Muthukumaran, “Cyber Crime Scenario In India” Criminal Investigation Department Review- January,
2008
[6] http://cyberlawpioneers.com/index.php/cyber-pornography/
[7] Rohas Nagpal, “Cyber Crime & Digital Evidence –Indian Perspective”, Asian School of Cyber Laws
[8] Section 499 IPC / Section 67 IT Act
[9] http://cybercrimeindia.org/defamation.php
[10] http://debaraticyberspace.blogspot.in/2013/04/no-relief-for-women-from-stalking-and.html
[11] http://searchsecurity.techtarget.com/definition/email-spoofing
[12] http://knowcybercrime121.blogspot.in/2010/05/spoofing.html
[13] Lior Tabansky, “Cybercrime: A National Security Issue?”, Military and Strategic Affairs, Volume 4 , No. 3 ,December 2012
[14] Abhay Pratap Singh and Pranay Bagdi,“Cyber Crime And Its Jurisdiction In India”, Students of 6th
Semester National Law University – Jodhpur, India (BBA.,LLb {Hons.})
[15] Sec. 1(2) of Information Technology Act, 2000
[16] Sec. 75(2) of Information Technology Act, 2000
[17] Nandan Kamath ‘Law Relating to Computers, Intrenet And E-Commerce’ pg 53
[18] Sec. 65 of Information Technology Act, 2000
[19] Sec. 66 of Information Technology Act, 2000
[20] Sec. 67 of Information Technology Act, 2000
[21] Sec. 70 of Information Technology Act, 2000
[22] Sec. 72 of Information Technology Act, 2000
[23] Sec. 74 of Information Technology Act, 2000
[24] N. S. Nappinai, “Cyber Crime Law in India: Has Law Kept Pace with Emerging Trends? An Empirical Study”, Journal of International Commercial Law and Technology, Vol. 5, Issue 1 (2010)