Professional Documents
Culture Documents
$SXUED.XPDU5R\.DO\DQ'DV
ABSTRACT
The word “cyber law” encompasses all the cases, statutes and constitutional provisions that affect
persons and institutions who control the entry to cyberspace, provide access to cyberspace, create the
hardware and software which enable people to access cyberspace or use their own devices to go
“online” and enter cyberspace. In simple way we can say that cyber crime is unlawful acts wherein the
computer is either a tool or a target or both. Cyber crimes can involve criminal activities that are
traditional in nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to
the Indian Penal Code. The abuse of computers has also given birth to a gamut of new age crimes that
are addressed by the Information Technology Act, 2000.
Keywords : Cyber Law, Cyber Crime, Cyber Forensics, information security, IT Act.
1.0 Introduction
Success i n any fi eld of h uman activity le ads to crim e th at ne eds m echanisms to c ontrol it. L egal
provisions sho uld prov ide a ssurance to users, empowerment to la w enforcement a gencies an d
deterrence to criminals. The law is as stringent as its enforcement. Crime is no longer limited to space,
time or a gr oup of p eople. Cyber sp ace cre ates mora l, civ il a nd cr iminal wrongs. It has now given a
new way to express criminal tendencies. Back in 1990, less than 100,000 people were able to log on
to the Internet w orldwide. Now a round 50 0 milli on people are h ooked u p to surf the n et aroun d the
globe. Until recently, many information technology (IT) professionals lacked awareness of and interest
in th e c yber c rime p henomenon. In ma ny cases, l aw enforcement officers h ave lacked th e to ols
needed to tack le th e pr oblem; old laws di dn’t quit e fit the crimes b eing c ommitted, n ew la ws ha dn’t
quite caught up to the realit y of what was happening, and there were few court preced ents to look to
for guidance. Furthermore, debates over privacy issues hampered the ability of enforcement agents to
gather th e evi dence ne eded to prosecut e these new cases. F inally, the re was a c ertain amo unt of
antipathy—or at the l east, d istrust—between the t wo m ost importa nt players in an y effective fig ht
against cyber crime: law enforcement agencies and computer professionals. Yet close cooperation
between the two is crucial if we are to control the c yber crime problem and make the Internet a safe
“place” for its users. Law enforcement personnel understand the criminal mindset and know the basics
of gatheri ng e vidence an d b ringing offen ders to justice. IT personnel understand c omputers a nd
networks, ho w the y work, an d ho w to track do wn i nformation on th em. Each h as half of the ke y t o
defeating t he cyber crim inal. IT profession als n eed good defin itions of cybercrime in order to kn ow
when (and what) to re port to police, but law enforcement agencies must have statutory definitions of
specific crimes in order to charg e a crimin al with a n offense. T he first step in spec ifically d efining
individual c ybercrimes is to sort all the acts that can be cons idered c ybercrimes i nto orga nized
categories.
(2) A sound enforcement machinery: A law might have been properly enacted and may be theoretically
effective too b ut it is useles s unless e nforced in its true letter and sp irit. The la w e nforcement
machinery in India is not well equipped to deal with cyber law offences and contraventions. They must
be trained appropriately and should be provided with suitable technological support.
(3) A so und judicial system: A sound judicial system is the backbone for preserving the law and order
in a s ociety. It is commo nly misunderstood that it is th e “ sole” r esponsibility of the “B ench” alone t o
maintain law and order. That is a misleading notion and the “Bar” is equally responsible for maintaining
it. This essentially means a rigorous training of the members of both the Bar and the Bench. The fact is
that the c yber law is in its infa ncy stage in In dia hence not much Jud ges and Lawyers are aware of it.
Thus, a sound c yber la w tra ining of the Ju dges and Lawyers is the n eed of the h our. In short, the
dream for a n “Ideal C yber La w i n Indi a” requir es a “ considerable” amou nt of time, mone y and
resources. In the present state of things, it may take five more ye ars to appreciate its application. The
good n ews is that Govern ment has s anctioned a co nsiderable amo unt as a grant to brin g e-
governance within the judicial functioning. The need of the hour is to appreciate the difference between
mere “comp uterisation” an d “c yber la w l iteracy”. T he judges a nd l awyers must b e trained in th e
contemporary l egal issu es lik e c yber law so that their enfo rcement in India is effective. With all th e
challenges that India is fac ing in education and training, e-learning has a lot of a nswers and needs to
be a ddressed seriously b y t he cou ntries planners and pr ivate in dustry a like. E-lear ning can pr ovide
education to a large population not having access to it.
protocol t ype used f or com munications, but some fu nctions of th e troj ans us e th e U DP protoc ol as
well.
1.7.3 Virus and Worm attack
A program that has capability to infect other programs and make copies of itself and s pread into other
programs is called virus. Programs that multiply like viruses but spread from computer to computer are
called as worms.
1.7.4 E-mail & IRC related crimes
1.7.4.1 Email spoofing
Email spoofing refers to email that appears to have been originated from one source when it was
actually sent from another source.
1.7.4.2 Email Spamming
Email "spamming" [7] refers to sending email to thousands and thousands of users - similar to a chain
letter.
1.7.4.3 Sending malicious codes through email
E-mails are used to send viruses,Trojans etc through emails as an attachment or by sending a link of
website which on visiting downloads malicious code.
1.7.4.4 Email bombing
E-mail " bombing" is char acterized b y abusers rep eatedly s ending an i dentical email message to a
particular address.
1.7.4.5 Sending threatening emails
1.7.4.6 Defamatory emails
1.7.4.7 Email frauds
1.7.4.8 IRC related
Three main ways to attack IRC are: "verbal attacks, clone attacks, and flood attacks.
1.7.5 Denial of Service attacks
Flooding a co mputer r esource with mor e r equests th an i t can handle. This causes th e res ource t o
crash thereby denying access of service to authorized users.
1.7.5.1 Examples include
attempts to "flood" a network, thereby preventing legitimate network traffic
attempts to disrupt connections between two machines, thereby preventing access to a service
attempts to prevent a particular individual from accessing a service
attempts to disrupt service to a specific system or person.
Adjudication of a C yber Cr ime - On the dir ections of the Bombay H igh Court the C entral
Government h as b y a n otification dated 25.03.03 has d ecided that th e Secretar y to the
Information Technology Department in each state by designation would be appointed as the
AO for each state.
(k) The use of private defence for cyber terrorism must be introduced in the IT Act, 2000
(l) The legality of sting operations (like Channel 4) must be adjudged
(m) The deficiencies of Indian ICT strategies must be removed as soon as possible
(n) A sound BPO platform must be established in India, etc.
The concerns are too ma ny to be d iscussed in this s hort article. The Government must seriously take
the “ge nuine c oncerns” an d should av oid the cosm etic c hanges th at ma y s hake the base of alr eady
weak cyber law in India.
References
[1] Vakul Sharma, Information Technology: Law and Practice, Universal Law Publishing Co. Pvt.
Ltd., 2008.
[2] IT act 2000
[3] New Amendments to IT Act 2000
[4] www.cyberlawindia.com
[5] www.legalserviceindia.com/cyber/cyber.htm
[6] www.delhicourts.nic.in
[7] www.cyberlawsindia.net
[8] www.cyberlawenforcement.org
[9] www.cyberlaw.in
[10] www.cyberlawportal.com
involves