10-Cyber Crimes and Cyber Lawsrpt
10-Cyber Crimes and Cyber Lawsrpt
10-Cyber Crimes and Cyber Lawsrpt
Kevin P. Francis
Roll No : 10
S1, MBA(IB)
School of Management Studies
CUSAT, Kochi – 22
Email : kevinfranc@gmail.com
1.0 INTRODUCTION
A simple yet sturdy definition of cyber crime would be “unlawful acts wherein the computer is
either a tool or a target or both”. Defining cyber crimes, as “acts that are punishable by the
information Technology Act” would be unsuitable as the Indian Penal Code also covers many
cyber crimes, such as e-mail spoofing, cyber defamation etc., In most countries around the
world, however, existing laws are likely to be unenforceable against such crimes. This lack of
legal protection means that businesses and governments must rely solely on technical
measures to protect themselves from those who would steal, deny access to, or destroy
valuable information.
Self-protection, while essential, is not sufficient to make cyberspace a safe place to conduct
business. The rule of law must also be enforced. Countries where legal protections are
inadequate will become increasingly less able to compete in the new economy. As cyber crime
increasingly breaches national borders, nations perceived as havens run the risk of having
their electronic messages blocked by the network. National governments should examine their
current statutes to determine whether they are sufficient to combat the kinds of crimes
discussed in this report.
2.0 TYPES OF CYBER CRIME
Cyber Crime refers to all activities done with criminal intent in cyberspace. These fall into three
slots.
Let us examine the acts wherein the computer is a tool for an unlawful act. This kind of activity
usually involves a modification of a conventional crime by using computer.
Some examples are:
• Financial Claims: This would include cheating, credit card frauds, money laundering etc.
• Cyber Pornography: This would include pornographic websites; pornographic magazines
produced using computer and the Internet (to down load and transmit pornographic
pictures, photos, writings etc.)
• Sale of illegal articles: This would include sale of narcotics, weapons and wildlife etc., by
posting information on websites, bulletin boards or simply by using e-mail
communications.
• Online gambling: There are millions of websites, all hosted on servers abroad, that offer
online gambling. In fact, it is believed that many of these websites are actually fronts for
money laundering.
• Cyber Stalking: Cyber stalking involves following a person’s movements across the
Internet by posting messages on the bulletin boards frequented by the victim, entering the
chat-rooms frequented by the victim.
• Cyber Defamation: This occurs when defamation takes place with the help of computers
and or the Internet e.g. someone published defamatory matter about someone on a
websites or sends e-mail containing defamatory information to all of that person’s friends
• Internet Time Theft: This connotes the usage by unauthorized persons of the Internet
hours paid for by another person..
• Forgery: Counterfeit currency notes, postage and revenue stamps, mark sheets etc., can
be forged using sophisticated computers, printers and scanners.
• Salami attacks: Those attacks are used for the commission of financial crimes. The key
here is to make the alteration so insignificant that in a single case it would go completely
unnoticed e.g. A bank employee inserts a program into bank’s servers that deducts a
small amount from the account of every customer.
• Virus/worm: Viruses are programs that attach themselves to a computer or a file and then
circulate themselves to other files and to other computers on a network. They usually
affect the data on a computer, either by altering or deleting it. Worms, unlike viruses don
not need the host to attach themselves to.
• Logic bombs: These are dependent programs. This implies that these programs are
created to do something only when a certain event occurs, e.g. some viruses may be
termed logic bombs because they lie dormant all through the year and become active only
on a particular date.
• E-Mail spoofing: A spoofed email is one that appears to originate from one source but
actually has been sent from another source. This can also be termed as E-Mail forging.
3.0 PREVENTION
3.1.1. Children
Children should not give out identifying information such as Name, Home address, School
Name or Telephone Number in a chat room. They should not give photographs to anyone on
the Net without first checking or informing parents guardians. They should not respond to
messages, which are suggestive, obscene, belligerent or threatening, and not to arrange a
face-to –face meeting without telling parents or guardians. They should remember that people
online might not be who they seem.
3.1.2. Parents
Parent should use content filtering software on PC to protect children from pornography,
gambling, hate speech, drugs and alcohol.
There is also software to establish time controls for use of limpets (for example blocking usage
after a particulars time) and allowing parents to see which site item children have visited. Use
this software to keep track of the type of activities of children.
The copyright infringement of software (often referred to as software piracy) refers to several
practices which involve the unauthorized copying of computer software. Copyright infringement
of this kind is extremely common. Most countries have copyright laws which apply to software,
but the degree of enforcement varies. After a dispute over WTO membership between Iran and
USA led to the legalization in Iran of the unconstrained distribution of software (see Iran and
copyright issues), there have been fears that world governments might use copyright politically.
When software is pirated, consumers, software developers, and resellers are harmed.
Software piracy increases the risk consumer's computers will be corrupted by defective
software and infected with viruses. Those who provide defective and illegal software do not
tend to provide sales and technical support. Pirated software usually has inadequate
documentation, which prevents consumers from enjoying the full benefits of the software
package. In addition, consumers are unable to take advantage of technical support and
product upgrades, which are typically available to legitimate registered users of the software.
Pirated software can cost consumers lost time and more money.
Developers lose revenue from pirated software, from current products as well as from future
programs. When software is sold most developers invest a portion of the revenue into future
development and better software packages. When software is pirated, software developers
lose revenue from the sale of their products, which hinders development of new software and
stifles the growth of the software company
Legislation were evaluated to determine whether their criminal statutes had been extended into
cyberspace to cover ten different types of cyber crime in four categories: data-related crimes,
including interception, modification, and theft; network-related crimes, including interference
and sabotage; crimes of access, including hacking and virus distribution; and associated
computer-related crimes, including aiding and abetting cyber criminals, computer fraud, and
computer forgery.
Thirty-three of the countries surveyed have not yet updated their laws to address any type of
cyber crime. Of the remaining countries, nine have enacted legislation to address five or fewer
types of cyber crime, and ten have updated their laws to prosecute against six or more of the
ten types of cyber crime
India has enacted the first I.T.Act, 2000 based on the UNCIRAL model recommended by the
general assembly of the United Nations. Chapter XI of this Act deals with offences/crimes
along with certain other provisions scattered in this Acts .The various offences which are
provided under this chapter are shown in the following table
Table 2 : Computer Related Crimes Covered under IPC and Special Laws
Offence Section
Forgery of electronic records Sec 463 IPC
Bogus websites, cyber frauds Sec 420 IPC
Email spoofing Sec 463 IPC
Web-Jacking Sec. 383 IPC
E-Mail Abuse Sec.500 IPC
Online sale of Drugs NDPS Act
Online sale of Arms Arms Act
Sending threatening messages by email Sec 503 IPC
Sending defamatory messages by email Sec 499 IPC
6.0 CONCLUSION
• Reliance on terrestrial laws is an untested approach. Despite the progress being made in
many countries, most countries still rely on standard terrestrial law to prosecute cyber
crimes. The majority of countries are relying on archaic statutes that predate the birth of
cyberspace and have not yet been tested in court.
• Weak penalties limit deterrence. The weak penalties in most updated criminal statutes
provide limited deterrence for crimes that can have large-scale economic and social
effects.
• Self-protection remains the first line of defense. The general weakness of statutes
increases the importance of private sector efforts to develop and adopt strong and efficient
technical solutions and management practices for information security.
• A global patchwork of laws creates little certainty. Little consensus exists among countries
regarding exactly which crimes need to be legislated against. The kinds of gaps that
remain, even in the 19 countries that have already taken steps to address cyber crimes. In
the networked world, no island is an island. Unless crimes are defined in a similar manner
across jurisdictions, coordinated efforts by law enforcement officials to combat cyber crime
will be complicated.
• A model approach is needed. Most countries, particularly those in the developing world,
are seeking a model to follow. These countries recognize the importance of outlawing
malicious computer-related acts in a timely manner in order to promote a secure
environment for ecommerce. But few have the legal and technical resources necessary to
address the complexities of adapting terrestrial criminal statutes to cyberspace. A
coordinated, public-private partnership to produce a model approach can help eliminate
the potential danger from the inadvertent creation of cyber crime havens.
7.0 REFERENCE