CYBER -TERRORISM
AUTHORED BY - PRIYANKA SETHI
Abstract
As India is rapidly becoming a global leader in IT, it is also becoming a significant target for cybercrime, with more and more innocent people falling prey to these attacks every day. When this happens, it's crucial to safeguard citizen rights against crooks who prey on the uninformed. Cyberspace has accelerated the development of all technologies to such an extent that it has widened the knowledge gap between generations. The wealth gap in India is wide, and the nation also has high poverty and literacy rates. As a result, the divide between the generations widens even more for these reasons. Because of how difficult it is to maintain tabs on activity in the virtual world, it is incumbent upon legislators and law enforcers alike to develop an effective legislative system for dealing with cybercrimes. So, the purpose of this study is to undertake an analysis of the legal system in order to get an appreciation for how well it regulates cybercrimes in India.
Since the advent of the internet, the number of people using it has been steadily growing all over the world. Even in India, the number of people who use the internet is growing, and surprisingly, India has surpassed the number of people who use the internet in the United States. The number of people who use the internet in the United States accounts for only 4.4% of the population of global internet users, while the number of people who use the internet in India accounts for 17.2% of all total global users Because the vast majority of people who use the internet in India are under the age of 30, this demonstrates that the Indian workforce is fundamentally dependent on IT-based technologies.[1] This reliance is a primary factor in why India's IT and BPO sectors are now among the most prominent in the world. But, it is also important to recognize that the internet has given rise to a globalized, borderless, and mostly unregulated virtual world. Indeed, this is an issue that needs consideration. Several different kinds of activity, some of which may not be easily traceable back to their origin, are made possible by the internet.[2] This makes it difficult to enforce laws and keep the online world safe in ways that make sense in the real world. So, this paper will attempt to evaluate the Indian legal framework on the subject of cybercrime regulation in the online cyber world. The current era of rapid digitization makes this even more crucial.[3]
The word "cybercrime" is often used to describe any illegal behaviour that is committed via a sequence of electronic operations with the goal of compromising the security of computer systems or the data stored inside them. However, in a broader sense, the word "cybercrime" may be used to refer to any unlawful behaviour or actions using a computer system or network. The holding of information, as well as its provision, diffusion, or exchange through such computer systems or networks, falls within this definition. The Budapest Convention is the first instrument of international law whose principal purpose was to create a uniform set of laws at the global level for combating various cyber offences.[4] The convention was created for this same reason. It was so groundbreaking that it was the first legal mechanism to link cybercrime to violations of human rights.
According to the definitions that are supplied by this Convention, the most prevalent sorts of cyber crimes include data interference, unauthorised access, misuse of equipment, illegal interception, computer-based fraud or forgery, offences associated with copyright, neighbouring rights, and child pornography. These are the types of crimes that are most likely to be committed. With the adoption of an Additional Protocol to this Convention, it became illegal to distribute any literature that promoted racism or xenophobia. Similarly, this Agreement forbids the publication of such data. The scope of this Agreement has been expanded to include acts of terrorism perpetrated online. Given these realities, one may argue that cybercrime encompasses not only those crimes perpetrated over the Internet but also those carried out using mobile phones, networks, and other electronic devices[5]. Even crimes that aren't performed through computers or networks per se may fall under the umbrella of "cyber offences" if they are committed with the intent to disrupt or damage computer systems. Conversely, no piece of Indian law, not even the Information Technology Acts of 2000 and 2008, defines cybercrime or other online offences with any degree of specificity. Hence, it is crucial to investigate the provisions of numerous laws dealing with cyber offences, as well as the many types of cyber offences that have taken place or been committed in India.
The Information Technology Act of 2000, which was recently revised in 2008, is the primary piece of Indian law that addresses offences using computers. This act came into effect in 2000. Nonetheless, statutes such as the Indian Criminal Code 1860 and the Indian Evidence Act 1972, amongst others, do have some broad provisions connected to cyber offences. Certain provisions in these laws have even been added to address issues raised by advances in information technology. According to the IT Act's stated goals, India has come a long way in its pursuit of establishing mechanisms for electronic commerce and government. This development highlights the critical need for the government to establish a strong legislative structure for regulating the IT industry. In recent years, the term "global village" has become more common due in large part to the ways in which the information technology sector has altered communication infrastructure throughout the globe, particularly in India. Although this has helped bring people together from all walks of life, it has also made it hard for governments to safeguard sensitive data, which has given rise to a host of previously unanticipated problems stemming from illegal behaviour. The fundamental goal of the Information Technology Act was, thus, to set new norms for the control of human behaviour inside the virtual world of cyberspace.
Over some period of time, various new types of crimes began to be committed in this online realm. These crimes may be simply broken down into the categories described in the following way.
4. JUDICIAL APPROACH
“The DPS MMS Scanal, or Avnish Rajaj v. State (NCT) of Delhi”[12], concerned the selling of a very sexually explicit MMS depicting a DPS female on the website baazee.com. Several copies of the MMS were sold, resulting in a substantial profit. “Although the website's CEO, Avnish Bajaj, was charged under Section 67 of the Information Technology Act for the publication and transmission of obscene materials, the defendant argued that he was not directly involved in the case and that, since the Section prohibited publication and transmission of obscene materials, his act did not amount to any of such activities and that the company took all reasonable steps to remove the video after 38 hours and that the delay of 38 hours was due to the intervention.” The precedent-setting court agreed with his arguments and released him on bond, with conditions. “Syed Astifuddin v. The State of Andhra Pradesh”[13] was interference by Tata Indicom with a plan by Reliance Info COMM, in which Reliance provided a mobile device to the market at a low price, but the services under the scheme were exclusive to Reliance Info COMM. Tata Indicom personnel hacked into the company's mobile phones and began offering competing services, costing Reliance money. In court, Tata Indicom claimed that its staff had done nothing wrong under the IT Act. The court, however, rejected their claims and found that the cell phone is a "Computer" within the meaning of the Act's Section 2 and that their actions thus violated Section 65.
In the case “PR Transport Agency v. Union of India”[14], the issue was a contract between two parties that were made through email. The defendant signed the contract at first but later backed out, saying that technology made it impossible to keep the deal. The defendant said that the court didn't have the right to hear the case because the place where the email was sent was outside of the court's area of jurisdiction. The court didn't agree with the defendant's point of view, so it interpreted Section 13 of the IT Act, which has general rules about contracts made through email. It says that if a contract is made through email, the usual place of business should be taken into account when deciding which court has jurisdiction in case of a dispute. This is because emails can be received anywhere in the world, so taking into account where the emails were received would be very hard in practice.
5. CONCLUSION
As a result of the difficulty in interpreting the current legal requirements in light of the constantly evolving nature of cybercrime, the Indian Judiciary has had to deal with a significant backlog of cases. Of course, it's also important to note that cybercrime may originate from a variety of locations, not just inside one country. Such crimes may be performed at any time of day or night and from any place in the globe. In such cases, it is necessary to have a precise theory for choosing which bodies have the authority to rule on the matter according to the law. What is lawful in India may not be legal in other nations and vice versa; however, the internet respects no National borders, therefore cultural differences may also contribute to cybercrime. This is why a reliable certifying authority, working around the clock, is required to keep an eye on what people might find online.
Furthermore, international agreements must be reached for bringing uniformity in the legal regime since non uniformity may also lead to several cyber offences, for example, for opening a Facebook account one must be above 14 years of age, which means anybody can enter into contract with Facebook if he or she is above 14 years of age, whereas the Indian Contract Act requires the age of a party to a contract to be 18 years or older, and the state has not provided any restriction on who can enter into contracts. It's quite difficult to determine who is responsible for an offence when there are so many regulations that seem to contradict one another. Since cyberspace is an ever-evolving environment where new techniques of committing crimes and evading legal responsibilities will be invented repeatedly and within short amounts of time, laws must be made more particular and dynamic so that they can conform with the changing demands of the moment.
[1] Jyoti Rattan, “Cyber Laws & Information Technology” (Bharat Law House Pvt. Ltd., New Delhi, 4th edn., 2014).
[2] . Kamal Ahmad: The Law of Cyber-Space (U. N. Institute of Training & Research) 2006
[3] Nandan Kamath, Law relating to Computers, Internet and E-Commerce: A Guide to Cyber Laws and the Information Technology Act, 2000 (Universal Law Publishing Co., New Delhi, 2nd edn., 2009).
[4] Pavan Duggal, “Cyber Law An exhaustive section wise Commentary on the Information Technology Act along with Rules, Regulations, Policies, Notifications etc”, Universal Law Publishing - An imprint of LexisNexis (2014)
[5] R. Nagpal : What is Cyber Crime ; (2003)
[6] Pavan Duggal, Text Book on Cyber Law (Universal Law Publishing Pvt. Ltd.,2013)
[7] Roger W. Smith, “Cybercrime - A Clear and Present Danger: The CEO's Guide to Cyber Security” Create Space Independent Publishing Platform; 1 edition (21 June 2014)
[8] Yatindra Singh (Justice), Cyber Laws (Universal Law Publishing Co. Pvt. Ltd.,2010)
[9] S. K. Bansal: Cyber Crimes (A. P. H. Publishing Corporation, Delhi) 2003
[10] Roger W. Smith, “Cybercrime - A Clear and Present Danger: The CEO's Guide to Cyber Security” Create Space Independent Publishing Platform; 1 edition (21 June 2014)
[11] Yatindra Singh (Justice), Cyber Laws (Universal Law Publishing Co. Pvt. Ltd.,2010)
[12] (2005) 3 CompLJ 364 Del, 116 (2005) DLT 427, 2005 (79) DRJ 576
[13] 2006 (1) ALD Cri 96, 2005 CriLJ 4314.
[14] AIR 2006 All 23, 2006 (1) AWC 504.
Authors: PRIYANKA SETHI
Registration ID: 102202 | Published Paper ID: 2202
Year : Jan-2024 | Volume: 2 | Issue: 16
Approved ISSN : 2581-8503 | Country : Delhi, India
Page No : 15
Doi Link : https://www.doi-ds.org/doilink/01.2024-84167867/CYBER -TERRORISM