AUTHORED BY: PRIYANSH RAJ SINGH SENGER
B.A.LL.B., 5th year
Ramaiah Institute of Legal Studies, Bangalore 560054
CO-AUTORED BY: SIDDHARTH MISRA
B.A.LL.B., 5th year
Ramaiah Institute of Legal Studies, Bangalore 560054
INTRODUCTION
Crime is as old as human civilization. Our age old books and stories are described with the crimes perpetrated by people and rebuffed likewise to the laws of the than culture. The Idea of these crimes changes as society developed and moved forward. In the present techno-shrewd climate, the world is turning out to be increasingly more carefully modern as are the violations. Internet was at first evolved as a researching and data sharing subject and was in an unregulated way. As the time passed by it became more transactional with e-business, e-commerce, e- governance etc., so did the transactions and the crimes as well like that of Online job fraud, Online sextortion, Child pornography or Child Sexually Abusive Material [1](CSAM), Cyberbullying, Cyberstalking, Cyber grooming, Phishing, Vishing, Smishing, Credit card fraud or debit card fraud, Impersonation, Identity theft and to name a few.
The well-defined field of law known as "Internet Law" offers guidelines to users regarding appropriate online behavior. Cyber laws are classified into two categories: criminal laws and civil laws. Cyber law is any legislation or regulation pertaining to the use of computers, smartphones, the internet, and other connected technology by individuals.
Sussman and Heuston [2]first proposed the term “Cyber Crime” in the year 1995 as “Cybercrime cannot be described as a single definition, it is best considered as a collection of acts or directs." The internet is the term for the virtual domain that exists on the web. Cyber Laws, which regulate this domain, apply to all residents of cyberspace since they have a sort of universal authority over it. Because it covers nearly every facet of transactions and activity using the internet, World Wide Web, and cyberspace, cyberlaw is important.
Cyberlaw encompasses laws relating to domains such as Cybercrimes, Electronic and digital signatures, Intellectual property, Data protection and privacy and a number of others which include crypto currency and Non-fungible Tokens (NFTs) which are in their developing stage in the terms of the legal procedures which are still unexplored in the legal domain.
BACKGROUND
The trailblazer in the space of Cybercrimes is, Donn B. Parker[3], a senior computer security consultant at the Stanford Research Institute in the United States. His journey with computer crime and cyber security started in the early 1970s; his first book on the subject was Computer Crime published in 1976. Parker was additionally the lead creator of Computer Crime: Criminal Justice Resource Manual (1979), the primary fundamental US government manual. In 1982, the Organization of Economic Co- operation and Development [4](OECD) appointed an expert committee, the Information and Computer Communication Policy[5] (ICCP) Committee, to discuss computer-related crimes and the need for changes in the legal systems. This committee presented its recommendations in 1986, stating that, given the nature of cyber crime, it was highly desirable to forge some form of international cooperation to reduce and control such activity. Likewise, it suggested that the nations under the banner of the United Nations change their corrective regulation to cover digital wrongdoings (OECD[6], 1986).
At the Eighth United Nations Congress on the Prevention of Crime and the Treatment of Offenders held in Havana, a pivotal resolution was adopted, addressing the escalating challenge of computer-related crime. This resolution stands as a testament to the international community's recognition of the pressing need for concerted efforts in combating cyber threats. In light of the dynamic and ever-evolving nature of cyberspace, the United Nations, through this resolution, aimed to provide a framework for nations to formulate judicious legislation and policy directives.
The UNCITRAL Model Law on Electronic Commerce was developed in 1996 by the United Nations Commission on International Trade Law (UNCITRAL)[7]. Its goal is to make it easier for people to use contemporary communication and information storage methods. It is predicated on the creation of an electronic medium that serves as a functional equivalent for paper-based concepts like "writing," "signature," and "original."
The Council of Europe Convention on Cybercrime (Budapest Convention) [8]which came in 2001 is one and only multilateral agreement on the subject of cybercrime. The Convention is the first international treaty on crimes committed via the internet and other computer networks, particularly infringing copyright, computer-related fraud, child pornography, and network security violations along with a series of powers and procedures such as the search of computer networks and interception. Its principal level head, set out in the prelude, is to seek after a typical criminal strategy to safeguard society against cybercrime, particularly by taking on proper regulation and cultivating global collaboration. The Budapest Convention went into force on January 7, 2004.India has a very point by point and clear cut general set of laws set up. Notwithstanding the splendid keenness of our drafters of such laws, the prerequisites of the internet could scarcely at any point be expected. In that capacity, the approaching of the Web prompted the development of various sensitive legitimate issues and issues which required the authorization of Digital regulations. The Information Technology Act is a result of the goal dated 30th January 1997 of the United Nations, which took on the Model Regulation on Electronic Business, embraced the Model Regulation on Electronic Commerce on International Trade Law. This goal suggested, entomb alia, that all states give ideal thought to the said Model Regulation while updating sanctioning new regulation, so consistency might be seen in the regulations, of the different digital countries, material to choices to paper based techniques for correspondence and capacity of data.
However, the Indian Information Technology Act, 2000 has charged Computer Emergency Response Team (CERT)[9] to cooperate and collaborate with organizations within and outside the country. CERT being directly under the administrative control of the Ministry of Communications and Informational Technology does not have any operational independence or discretion to cooperate unless approved by the Government therefore it acts upon the direction of its master, which is the Government of the day. This vastly reduces the organizational utility of CERT when it comes to prosecuting international cybercrimes, in collaborating on information sharing and coercive interception of networks/computers, as an organization of national importance.
CHALLENGES SURFACED
In the year 2008, Sergei Nicolaevich Tsurikov[10] was sentenced to eleven years, three months in prison, with three years of supervised release, for his involvement in a complex scheme that defrauded a credit card processor of over $9.4 million. The indictment, issued nearly five years prior, detailed Tsurikov's role in conspiring to commit wire fraud and computer intrusion.
In November 2008, Tsurikov and his accomplices gained unauthorized access to RBS WorldPay's computer network, in the Royal Bank of Scotland Group PLC, payment processing division which came under the United States of America. Employing advanced hacking techniques, they breached the data encryption safeguarding customer data on payroll debit cards. Exploiting compromised accounts, the group used 44 counterfeit payroll debit cards to withdraw $9 million from ATMs across 280 cities globally within 12 hours.
To conceal their activities, the hackers attempted to destroy data on the card processing network. RBS World Pay promptly reported the breach, aiding the subsequent investigation. Tsurikov, extradited to the U.S. in August 2010, pleaded guilty in September 2012. He monitored fraudulent ATM withdrawals in real time during the cashout. The sentence includes restitution of $8,400,000. The FBI and U.S. Secret Service, with international law enforcement collaboration, investigated this cybercrime case.
Similarly, an 18-year-old hacker named Arion Kurtaj[11] from Oxford, who is autistic, was a key member of the notorious Lapsus cyber-crime gang. The firms like the Uber, Nvidia and Rockstar Games have lost nearly $10m under this gang’s attacks. Kurtaj leaked clips of a forthcoming Grand Theft Auto (GTA) game and was sentenced to an indefinite hospital order.
Cybercrime acts show a broad distribution across the range of offences. According to the perceptions of law enforcement institutions, financial-driven acts, such as computer-related fraud or forgery, make up around one third of acts across almost all regions of the world. A number of countries mentioned that ‘fraud in electronic commerce and payment’, ‘fraud on auction sites such as ebay,’ ‘advanced fee fraud’, ‘cybercrime targeting personal and financial information’ and ‘fraud scheme through email and social networking sites’ were particularly prevalent.
CYBER LAWS AROUND THE GLOBE
Today in the age of computers, smartphones and the use of the internet and technology in all walks of life has inevitably led to an increase in cybersecurity concerns around the globe, all the countries are trying to have a safer cyber ecosystem and facilitate better international trade and e- commerce activities, here is an overview of cyber laws in western countries such as
THE INDIAN SCENARIO
In the present techno-canny climate, the world is turning out to be increasingly more carefully refined as are the crimes. Cyber world was at first evolved as a researching and data sharing device and was in an unregulated way. As the time elapsed by it turned out to be more conditional with e-business, web based commerce, e-administration and e-acquisition and so forth. All legitimate issues connected with web wrongdoing are managed through digital regulations. According to the digital wrongdoing information kept up with by the National Crime Records Bureau (NCRB), a sum of 217, 288, 420 and 966 Digital crimes cases were enlisted under the Information Technology Act of 2000 during 2007-10 separately[18].
According to 2011 NCRB figures, there were 1,791 cases enlisted under the IT Act during the year 2011 when contrasted with 966 cases during the earlier year (2010) in this way reporting an increase of 85.4% in 2011 over 2010. The age-wise profile of persons arrested in cyber crime cases under the IT Act, 2000 showed that 58.6% of the offenders were in the age group 18–30 years (695 out of 1184) and 31.7% of the offenders were in the age group 30-45 years (376 out of 1184)[19].
According to Norton Cybercrime Report 2012, 66% of Indian online adults have been a victim of cyber fraud in their lifetime. In the past 12 months, 56% of online adults in India have experienced cyber fraud[20].
With regards to the interest of the times, the Cyber Crime Investigation Cell (CCIC) of the CBI[21], advised in September 1999, began working with impact from 3.3.2000. Cyber Crime Investigation Cell is a wing of Mumbai Police, India, to deal with Cyber crimes, and to enforce provisions of the Information Technology Act 2000, and different digital crime-related arrangements of criminal regulations, including the Indian Penal Code[22].
India has an intricately detailed and definitive legal system in place. However the arrival of Internet signaled the beginning of the rise of new and complex legal issues. Also that all the existing laws in place in India were enacted long ago while keeping in mind at that point of time the relevant political, social, economic, and cultural scenario. Nobody then could really visualize about the Internet. The approaching of the Web prompted the rise of various sensitive legitimate issues that required the establishment of Digital Regulations. None of the current regulations gave legitimate legitimacy or consent to the exercises on the Internet.
THE GENESIS OF I.T. LEGISLATION IN INDIA:
Mid 90’s saw an impetus in globalization and computerization, with more and more nations computerizing their governance, and e-commerce seeing an enormous growth. With quite a bit of global exchange being finished through electronic correspondence and with email picking up speed, an earnest and inevitable need was felt for perceiving electronic records for example the information that is put away in a PC or an outer stockpiling connected thereto. The Assembled Countries Commission on Global Exchange Regulation (UNCITRAL[23]) took on the Model Regulation on web-based business in 1996. The Overall Gathering of Joined Countries passed a goal in January 1997 entomb alia, prescribing all States in the UN to give great contemplations to the said Model Regulation, which accommodates acknowledgment to electronic records and concurs it a similar treatment like a paper correspondence and record. The Data Innovation Act is a result of the goal dated 30th January 1997 of the overall together of the Assembled Countries, which took on the Model Regulation on Electronic Business and embraced the Model Regulation on Electronic Business on Global Exchange Regulation. This goal suggested, bury alia, that all states give good thought to the said Model Regulation while amending and establishing new regulations, so consistency might be seen in the regulations, of the different digital countries, pertinent to choices to paper-based strategies for correspondence and capacity of data.
The Division of Gadgets (DoE) in July 1998 drafted the bill. Be that as it may, it must be presented in the House on December 16, 1999 (after a hole of very nearly one and a half years) when the upgraded IT Service was shaped. It went through significant adjustment, with the Business Service making ideas connected with internet business and matters relating to World Exchange Association (WTO) commitments. The Service of Regulation and Company Undertakings then verified this joint draft. After its presentation in the House, the bill was alluded to the 42-part Parliamentary Standing Advisory group following requests from the Individuals. The Standing Board of Trustees made a few ideas to be integrated into the bill. In any case, just those ideas that were supported by the Service of Data Innovation were consolidated. One of the ideas that were profoundly bantered upon was that a digital bistro proprietor should keep a register to record the names and addresses surprisingly visiting his bistro and a rundown of the sites that they surfed. This idea was made as an endeavor to check digital wrongdoing and to work with expedient situating of a digital crook. Be that as it may, simultaneously it was criticized, as it would attack a net surfer's security and wouldn't be financially practical. At last, this idea was dropped by the IT Service in its last draft. The Association Bureau endorsed the bill on May 13, 2000, and on May 17, 2000, the two places of the Indian Parliament passed the Data Innovation Bill. The Bill got the consent of the President on the ninth of June 2000 and came to be known as the Data Innovation Act, of 2000. The Demonstration came into force on the seventeenth of October 2000.
SHORTCOMINGS UNDER INDIAN LAW
The Indian Information Technology Act, 2000 has charged CERT to cooperate and collaborate with organizations within and outside the country although it does not lay down any whatsoever criteria for CERT to exercise or to refuse to exercise its power. CERT being directly under the administrative control of the Ministry of Communications and Informational Technology does not have any operational independence or discretion to cooperate unless approved by the Government.
CERT is not an independent entity entitled to draw the limits of cyber-surveillance; it acts upon the direction of its master, which is the Government of the day. The limits of surveillance are undefined with the want of privacy law. This vastly reduces the organizational utility of CERT when it comes to prosecuting international cybercrimes, in collaborating on information sharing and coercive interception of networks/computers, as an organization of national importance.
The cyber-surveillance discretion of CERT is therefore restricted by administrative powers exercised by the incumbent Government. Therefore, instead of acting towards preventing cyber- attack incidents on the universality principle, it is reduced to serving the present-day Government and regulated by changing governments' policies. The present Indian framework of cyber law ignores that it is administratively impossible to seek government approval on day to day basis when cyber surveillance is an ongoing and continuous process to avert crime.
Indian law only provides for information security management systems (ISMS) and cyber crisis management plans (CCMP)[24] for safeguarded frameworks pronounced by the Public authority in public safety, economy, general well-being and security. India lacks a cyber-surveillance law and a framework that is instrumental in preventing cyber-attacks and an organization that monitors cyber violations continuously (not only incidence-based).
An autonomous position to forestall wrongdoing events and gather data for occurrences and exercises influencing any partner locally or globally is a need of great importance. In the absence of privacy law, the Indian Government has felt reluctant to part with the authorization process and grant operational freedom to agencies, without which real-time monitoring and collecting traffic data and information is impossible, leading to failure to discover crime before it happens. The Indian regulation is exceptionally crude in characterizing digital offenses and disregards a significant part of the contemporary improvements in the internet. For instance, the Information Technology Act, of 2000 doesn't characterize licensed innovation cybercrime offenses, digital washing, virtual monetary standards, online clubs, and cyber warfare. Offenders can open e-gold accounts in different countries and combine them, complicating the use of financial instruments for money laundering and terrorist financing. Account-holders may likewise utilize wrong data during enlistment to cover their personality. In the absence of specific law, the prosecutions are initiated on deductive reasoning and broad, inclusive definition as including offences within the term by employing interpretative tools, which essentially negates access to justice for the absence of notice of the law and adequately defined safeguards to protect human rights violations.
Cybercrimes are multisector, and India has not commanded a multisector CIRT by partners, consequently fundamentally diminishing its compass and power. India needs a complete digital regulation that incorporates all developing wrongdoings and a digital technique with a multisector approach with the foundation to screen and answer the rates consistently. The Indian regulation misses the mark on preventive ways to deal with wrongdoings that don't address the worldwide worry of other states and comes up short on a cooperative reconnaissance instrument that is multisector-driven and comprehensive.
CONCLUSION
In conclusion, the current state of the Indian Information Technology Act, of 2000, places CERT in a position where its effectiveness is hindered by administrative constraints. Operating under the direct control of the Ministry of Communications and Information Technology, CERT lacks the autonomy to set the boundaries of cyber surveillance independently. Instead, it acts under the directives of the government, limiting its utility in prosecuting international cybercrimes and collaborating on information sharing. The absence of a privacy law further compounds the challenges faced by CERT, as it operates within the administrative powers wielded by the incumbent government. This situation diminishes CERT's role in preventing cyber-attacks based on universal principles, relegating it to serving the interests of the present-day government and being subject to changing policies. The inadequacies in the current Indian cyber law framework are evident in the lack of a dedicated cyber-surveillance law and a comprehensive monitoring organization capable of addressing cyber violations continuously. While the law focuses on information security management systems and cyber crisis management plans for specific frameworks, it falls short in preventing cybercrimes on a broader scale. There is a pressing need for an autonomous entity that can proactively prevent cybercrimes, gather data on incidents, and respond to activities affecting stakeholders globally.
The absence of a privacy law has led to a reluctance on the part of the Indian government to grant operational freedom to agencies, hindering real-time monitoring and data collection essential for crime prevention. In light of the evolving nature of cybercrimes, the existing regulations in India lack specificity, especially in defining offenses related to intellectual property, cyber laundering, virtual currencies, online clubs, and cyber warfare. The prosecutions initiated under such vague legal frameworks often rely on deductive reasoning and broad definitions, compromising access to justice and failing to provide clear safeguards against human rights violations. To address the multisector nature of cybercrimes, India requires a comprehensive digital regulation that encompasses emerging offenses. A multi-sector approach, supported by a well-defined digital strategy, is crucial for effective monitoring and response capabilities. The current regulatory framework falls short in offering preventive measures for crimes that concern the global community, highlighting the need for a collaborative surveillance mechanism that is multisector-driven and inclusive.
[1] Siegle, Del. "Cyberbullying and sexting: Technology abuses of the 21st century." Gifted child today 33.2 (2010): 14-65.
[2] Sabillon, Regner, et al. "Cybercriminals, cyberattacks and cybercrime." 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF). IEEE, 2016
[3] Parker, Donn B. "Computer Crime: Criminal Justice Resource Manual." (1989).
[4] Outlook, OECD Economic. "Organization for Economic Cooperation and Development." Paris, France (2001).
[5] Kimbel, Dieter. "Policy research for information activities: The OECD programme on information, computers and communications policy." Telecommunications Policy 1.5 (1977): 367-373
[6] Supra 4
[7] Rules, UNCITRAL Arbitration. "United Nations Commission on International Trade Law (Uncitral)." General Assembly Resolution. Resolution 31 (1976): 98
[8] Wicki-Birchler, David. "The Budapest Convention and the General Data Protection Regulation: acting in concert to curb cybercrime?" International Cybersecurity Law Review 1 (2020): 63-72
[9] Bada, Maria, et al. "Computer security incident response teams (CSIRTs): An overview." The Global Cyber Security Capacity Centre (2014)
[10] Kadlecová, Lucie. "Russian-speaking cybercrime: reasons behind its success." Eur Rev Organised Crime 2.2 (2015): 104-121.
[11] Tidy, Joe. “Lapsus$: GTA 6 Hacker Handed Indefinite Hospital Order.” BBC, BBC News, 21 Dec. 2023, https://www.bbc.com/news/technology-67663128.
[12] Chander, Harish, and GAGANDEEP KAUR. Cyber laws and IT protection. PHI Learning Pvt. Ltd., 2022.
[13] Barnsdale Jr, William J., and Frank G. Ford. "Computer security device." U.S. Patent No. 4,685,056. 4 Aug. 1987.
[14] President's Information Technology Advisory Committee. Cyber security: A crisis of prioritization. National Coordination Office for Information Technology Research and Development, 2005.
[15] Ring, Tim. "UK cyber-strategy suffers as spooks meet the suits." Computer Fraud & Security 2013.11 (2013): 9-13.
[16] Kigerl, Alex C. "Email spam origins: does the CAN SPAM act shift spam beyond United States jurisdiction?." Trends in Organized Crime 21 (2018): 62-78.
[17] Rajaretnam, Thilla. "A review of data governance regulation, practices and cyber security strategies for businesses: An Australian perspective." International Journal of Technology Management and Information System 2.1 (2020): 1-17.
[18] Kumar, Sanjeev, and Anupam Manhas. "Cybercrimes in India: Trends and Prevention." Galaxy International Interdisciplinary Research Journal 9.05 (2021): 363-370.
[19] Supra 18
[20] Supra 18
[21] Rathod, Falgun. Handbook on Cyber Crime and Law in India Compiled by Falgun Rathod: Cyber Crime, Investigation and Cyber Law. Falgun Rathod, 2014.
[22] Supra 21
[23] Rattan, Jyoti. "Law Relating To E-Commerce: International and National Scenario with Special Reference to India." International Journal of Social Science and Economics Invention 1.2 (2015).
[24] Bhoorani, Kamlesh, D. Murali Krishna, and Anand Shankar. "Cybersecurity for Indian Power Sector: A standards based approach." Water and Energy International 66.1 (2023): 39-44.
Authors: Priyansh Raj Singh Senger & Siddharth Misra
Registration ID: 102192 | Published Paper ID: 2192 & 2193
Year : Jan-2024 | Volume: 2 | Issue: 16
Approved ISSN : 2581-8503 | Country : Delhi, India
Page No : 19
Doi Link : https://www.doi-ds.org/doilink/01.2024-83891576/Cyber Law: An Overview Of Cyber Laws In The Intern