Cyber Crimes in India: R. Muralidharan
Cyber Crimes in India: R. Muralidharan
Cyber Crimes in India: R. Muralidharan
INDIA
R. Muralidharan
[email protected]
1
ROADMAP
• INTRODUCTION
• COVENTIONAL VS. CYBER CRIME
• JURISDICTION
• REASONS, MODES , CLASSIFICATION AND HAZARDS
• PORNOGRAPHY
• LAWS IN INDIA
• ADJUDICATION, PENALTIES AND COMPENSATION
• UNDER IPC
• CASE LAWS
• LATEST DEVELOPMENT
• RECOMMENDATIONS
• CONCLUSION
2
CYBER CRIMES
3
INTRODUCTION contd…
Genesis
• Back in 1990 less than 100,000 people logged on to
the net worldwide, now it has crossed 500 million.
Crime is no longer limited to space, time or a group of
people.
• Criminals often used unauthorized access to subvert
security systems as they modified data for financial
gain or destroyed data out of vendetta.
• As telecommunication spread, programmers started
writing malicious software, including self-replicating
programs, to interfere with sensitive and confidential
data stored on personal computers.
• The genesis of every cyber crime is available in the
general criminal law of that country i.e. in The IPC,
1860 in case of India. 4
INTRODUCTION contd…
Definitions
5
INTRODUCTION contd…
Definitions
7
CONVENTIONAL CRIME VS. CYBER CRIME contd...
8
CONVENTIONAL CRIME VS. CYBER CRIME contd…
As for the victims, most are men, who traditionally
are the persons controlling the property or
exercising power.
The victims of the offences are clearly identifiable.
In terms of damage, damage to the victim is
localized and can easily be quantified and
compensated.
9
Jurisdiction
• Active Nationality Principle
• Passive Nationality Principle
• Territoriality Principle
• Sovereign Integrity Principle
10
Jurisdiction
• COMPUSERVE Inc. Vs Patterson (1996)
• Facts: Patterson from Texas entered in to an
agreement with COMPUSERVE that permitted
the use of the services of COMPUSERVE in
the making and selling of an internet navigation
product. When COMPUSERVE later marketed
its own internet navigation software, IP dispute
arouse and the COMPUSERVE filed a
declaratory suit to clear its name as a possible
infringer. 11
Jurisdiction
• There was a question regarding the jurisdiction
• Patterson had an electronic contract with
COMPUSERVE which was governed by Ohio
laws.
• He had also sent email to COMPUSERVE from
Ohio. The court in Ohio therefore assumed
jurisdiction on the ground of doctrine of minimum
contacts
12
Lotus Case
• There was a collision in international waters in
which a French ship and a Turkish ship was
involved.
• Turkey arrested the French ship Captain and
sought to prosecute him
• French government contended that since the
collision occurred in International waters, the
“Flag State” alone could exercise jurisdiction and
that the Turks must hand them over
13
Lotus Case
• The PCIJ rejected the French contention.
• In the past the Flag State had normally exercised
jurisdiction. The convenience of the state, as
manifested in the uniform state practice over
300 years cannot take away the right of a victim
state to exercise jurisdiction as and when the
State feels that its interest is affected.
• The Court held that there cannot be any such
adverse presumptions on sovereignty.
14
BENSUSAN VS KING(1996)
15
BENSUSAN VS KING(1996)
• Facts: King posted a “Site” in the World Wide
Web to promote his club. The website was
located on a computer server at Missouri and
contained an advertisement logo that was
allegedly substantially similar to the logo used by
Bensusan. King moved the court to dismiss the
case for the lack of jurisdiction
• The Court decided that the facts did not merit
the assumption of personal jurisdiction to decide
the case. 16
REASONS FOR CYBER CRIMES
• The reasons for the vulnerability of
computers may be said to be:
Capacity to store data in comparatively
small space
Easy to access
Complex
Negligence
Loss of evidence
17
MODE OF COMMITTING CYBER CRIME
• Hacking
• Theft of information contained in electronic form
• Email bombing:
• Data diddling
• Salami attacks
• Denial of Service ( DOS)attack
• Virus / worm attacks
• Logic bombs
• Trojan attacks
• Internet time thefts
• Web jacking
18
CLASSIFICATION OF CYBER CRIMES
• Cyber Crimes against Persons:
Harassment via E-Mails, Facebook, Twitter
Cyber-Stalking
Dissemination of Obscene Material
Defamation
Hacking
Cracking
E-Mail Spoofing
SMS Spoofing
19
CLASSIFICATION OF CYBER CRIMES
Carding
Cheating & Fraud
Child Pornography
Assault by Threat
20
CLASSIFICATION OF CYBER CRIMES
• Crimes Against Person’s Property:
Intellectual Property Crimes
Cyber Squatting
Cyber Vandalism
Hacking Computer System
Transmitting Virus
Cyber Trespass
Internet Time Thefts
21
CLASSIFICATION OF CYBER CRIMES
• Cybercrimes Against Government:
Cyber Terrorism
Cyber Warfare
Distribution of pirated software
Possession of Unauthorized Information
22
CLASSIFICATION OF CYBER CRIMES contd..
• Cybercrimes Against society at large:
Child Pornography
Cyber Trafficking
Online Gambling
Financial Crimes
Forgery
23
CYBER CRIME RELATED PROFESSIONALS
• IT or Tech Professionals : Network Engineers,
Cyber Security Software Professionals, Cyber
Forensic Experts, IT Governance Professionals,
Certified Internet Security Auditors, Ethical Hackers
etc.
• Cyber Law Experts: They handle - Patent and
Patent Infringements or other Business Cyber
crimes, Cyber Security for Identity thefts and Credit
Cards and other Financial transactions, General
Cyber Law.
• Cyber Law Implementation Professionals: E-
Governance agencies, law and enforcement agencies,
cybercrime research cells and cyber forensic labs.
24
CYBER CRIMES HAZARDS: INSTANCES contd..
26
Pornography
• In India, watching or possessing pornographic
materials is legal. Distribution is illegal
• Prior to ITA, this was guided by Section 292
IPC. Now its also under Section 67 ITA. Section
67B ITA, deals with child pornography. Section
292 prohibits:
– Selling, renting, distributing, exhibiting or circulating
– importing, exporting or conveying
– Advertising or offering or attempting to do any act
which is an offence 27
Pornography
• 67. Publishing of information which is obscene in
electronic form.
• Whoever publishes or transmits or causes to be published in the
electronic form, any material which is lascivious or appeals to the
prurient interest or if its effect is such as to tend to deprave and
corrupt persons, shall be punished
• Punishment:
– 1st conviction: imprisonment to the extend of five years and with fine
which may extend to 1 lakh Rs.
– 2nd conviction: imprisonment to the extend of ten years and also with fine
which may extend to 2 lakh Rs.
28
Pornography
• In The People v James D Kent, 2012, the New York court of Appeal
ruled that “streaming” child pornography online is not the same
as possessing it. Hence, he was released from conviction. This is
in effect saying that watching child pornography online is not an
offence.
In India, following is prohibited with regard to porography:
– Circulation: passing of something, such as money or news, from place to
place or person to person.
– Transmission: act or process of sending a message, picture, or other
information from one location to one or more other locations by means
of radio waves, electric signals, light signals etc.
– Transfer: to make over the possession or legal title of.
29
LAWS FOR COMBATING CYBER CRIMES IN INDIA
• "INFORMATION TECHNOLOGY ACT, 2000"
[ITA- 2000]- Enacted by the Indian parliament protect
the field of e-commerce, e-governance, e-banking, to
facilitate filing of electronic records with the Government
as well as penalties and punishments in the field of cyber
crimes.
• "INFORMATIONTECHNOLOGY(AMENDME
NT) ACT, 2008"[ITAA- 2008]-Act punishes various
cyber crimes including cyber terrorism, increases the scope
and applicability of ITA-2000 by incorporating changes like
increasing the scope of “ communication devices”,
replacing section 43 with section 66, naming “hacking” as
“data theft”, making “digital signatures” valid etc.
30
LAWS FOR COMBATING CYBER CRIMES contd…
• The Indian Penal Code 1860
• The Indian Evidence Act 1872
• The Banker’s Book Evidence Act 1891
• The Reserve Bank of India Act 1934
• Information Technology (Procedure and
Safeguards for Interception, Monitoring and
Decryption of Information) Rules, 2009
• Information Technology (Procedure and Safeguard
for Monitoring and Collecting Traffic Data or
Information) Rules, 2009
31
LAWS FOR COMBATTING CYBER CRIMES contd…
• Information Technology (Procedure and
Safeguards for Blocking for Access of Information
by Public) Rules, 2009
• The Cyber Appellate Tribunal (Salary, Allowances
and Other Terms and Conditions of Service of
Chairperson and Members) Rules, 2009
• Cyber Appellate Tribunal (Procedure for
Investigation of Misbehavior or Incapacity of
Chairperson and Members) Rules, 2009
32
ITAA-2008 ACT: SPOTLIGHT
• Eight new cyber offenses added viz:
1. Sending offensive messages through a computer or
mobile phone (Section 66A)(Anti-Thackeray
Facebook row and FIR against Taslima for Twitter
comment)
2. Receiving stolen computer resource or
communication device (Section 66B)
3. Punishment for identity theft (Section 66C)
4. Punishment for cheating by personation using
computer resource (Section 66D)
5. Punishment for violating privacy or video voyeurism
(Section 66E)
6. Cyber Terrorism (Section 66F)
7. Publishing or transmitting material in electronic form
containing sexually explicit act (Section 67A) 33
ITAA-2008 ACT: SPOTLIGHT contd…
• Section 43: Require corporates to maintain reasonable
security practices, and procedures as to sensitive personal
data or information.
• Section 43A: A body corporate shall be liable to pay
compensation if it is negligent in implementing “reasonable
security precautions” with respect to “sensitive personal
data”. The liability would arise if the negligence leads to a
wrongful loss or wrongful gain to a person.
• Section 69 & 69A : Empowers the state to issue directions
for interception, monitoring, decryption of any information
through any computer resource; and for blocking websites
in the interest of national security, and friendly relations
with foreign states.
• Section 69B : Empowers the government to authorize to
monitor, collect traffic data or information through any
computer resource for cyber security.
34
ITAA-2008 ACT: SPOTLIGHT contd…
• Section 72A: A person including an intermediary is
held liable if he discloses “personal information” which
he accessed while providing services under a contract.
The liability arises if the disclosure was made with an
intention to cause or knowing that he is likely to cause
wrongful loss or wrongful gain to a person.
• Section 66E: Defends privacy and now one cannot
publish or transmit nude photo of a person without
his/her permission.
• Section 77A: Compounding of offenses has been
incorporated under this newly introduced section, but
the second conviction is not compoundable and it also
not compoundable where such offence affects the
socio-economic conditions of the country or has been
committed against a child below the age of 18 years or a
woman.
35
ITAA-2008 ACT: SPOTLIGHT contd…
• Offences made bailable, less stringent: Now most
of the offences are considered “Cognizable” but
“Bailable” and “Compoundable”. Now offences,
punishable with imprisonment of more than three years
are only non bailable.
• Abetment of the offences under the act is also made
punishable with the punishment provided for the
offence committed in pursuance of such under IT AA,
2008.
• The level of investigation has been brought down to
the level of inspector from that of DSP.
36
ITAA-2008 ACT: SPOTLIGHT contd…
37
ADJUDICATION
39
PENALTIES & COMPENASTION contd…
• Computer Related Offences (Section 66): If
any person, dishonestly, or fraudulently, does
any act referred to in section 43, he shall be
punishable with imprisonment for a term which
may extend to three years or with fine which
may extend to five lakh rupees or with both.
• Punishment for cyber terrorism (Section
66F): Punishable with imprisonment which may
extend to imprisonment for life.
40
PENALTIES & COMPENASTION
• Punishment for publishing or transmitting
obscene material in electronic form (Section
67): Imprisonment of either description for a
term which may extend to three years and with
fine which may extend to five lakh rupees and in
the event of a second or subsequent conviction
with imprisonment of either description for a
term which may extend to five years and also
with fine which may extend to ten lakh rupees.
41
PENALTIES & COMPENASTION
• Preservation and Retention of information by
intermediaries (Section 67C): Punished with an imprisonment
for a term which may extend to three years and shall also be
liable to fine.
• Section 43: It deals with the unauthorized access, unauthorized
downloading, virus attacks or any contaminant, causes damage,
disruption, denial of access, interference with the service availed
by a person. This section provide for a fine up to Rs. 1 Crore by
way of remedy.
• Section 85: All persons responsible to the company for conduct
of its business shall be held guilty in case offense was committed
by a company unless no knowledge or due diligence to prevent
the convention is proved.
42
CYBER OFFENSES UNDER IPC
CYBER CRIME SECTION UNDER INDIAN
PENAL CODE, 1860 (IPC)
Sending threatening message by email S. 506
Sending defamatory message by email S.499
Sending a mail outraging the modesty S.509
Forgery of electronic records S.465
Bogus websites, cyber frauds, phishing S.420
Email spoofing S. 465, 419
Web-jacking S.383
Criminal breach of trust S.406,409
Obscenity S.292, 293, 294
Theft of Computer Hardware S.378, 379
43
CYBER OFFENSES UNDER IPC AND SPECIAL LAWS contd…
44
CASE LAWS
• Sony-sambandh.com case:
India saw its first cybercrime conviction recently. It all began
after a complaint was filed by Sony India Private Ltd, which runs
a website called www.sony-sambandh.com, targeting Non
Resident Indians. The website enables NRIs to send Sony
products to their friends and relatives in India after they pay for
it online.
In May 2002, someone logged onto the website under the
identity of Barbara Campa and ordered a Sony Colour Television
set and a cordless head phone , credit card number was given
and the address where the product was supposed to be delivered
was furnished. The address was of Arif Azim, Noida.
45
CASE LAWS contd…
The transaction closed at that, but after one and a half months
the credit card agency informed the company that this was an
unauthorized transaction as the real owner had denied having
made the purchase.
The company lodged a complaint for online cheating at the
Central Bureau of Investigation which registered a case under
Section 418, 419 and 420 of the Indian Penal Code.
The matter was investigated into and Arif Azim was arrested.
Investigations revealed thatArif Azim, while working at a call
centre in Noida gained access to the credit card number of an
American national which he misused on the company’s site.
The case has shown that IPC can come in handy where ITA-
2000 did not cover certain categories of cyber crimes.
46
CASE LAWS contd…
48
CASE LAWS contd…
• Chhatrapati Shivaji defamation picture case:
An Indian posts ‘insulting images’ of respected warrior-saint Shivaji on
Google’s Orkut. Google, India handed over the IP address to the
Indian police in compliance with Indian legal process.
The computer with that IP address is using Airtel, India as the
ISP to connect to the internet and Orkut. Airtel gives police the
name of an innocent person using a different IP address.
An innocent Indian, Lakshmana Kailash K, is arrested in
Bangalore and thrown in jail for 3 weeks. Eventually, his
innocence is proved and he is released in Oct, 2007.
Airtel was asked to pay a monetary compensation of 2 lakhs by
the Bombay High court (Aurangabad bench).
49
CASE LAWS contd…
• Bazee.com case (Avnish Bajaj vs. State):
CEO of Bazee.com was arrested in December 2004 because a CD
containing MMS of a DPS, R.K. Puram girl was being sold and hosted
on the website.
This opened up the question as to what kind of distinction do we draw
between Internet Service Provider and Content Provider.
The burden rests on the accused that he was the Service Provider and
not the Content Provider.
It also raises a lot of issues regarding how the police should handle the
cyber crime cases and a lot of education is required.
CEO was held liable by the Delhi High Court under Section 67 read
with Section 85 of the IT Act recognizing the concept of an automatic
criminal liability attaching to the director where the company is an
accused.
50
CASE LAWS contd…
• State of Tamil Nadu Vs. Suhas Katti :
The case related to posting of obscene, defamatory and
annoying message about a divorcee woman in the yahoo message
group.
E-Mails were also forwarded to the victim for information by
the accused through a false e-mail account opened by him in the
name of the victim.
The posting of the message resulted in annoying phone calls to
the lady in the belief that she was soliciting.
Charge Sheet was filed u/s 67 of IT Act 2000, 469 and 509 IPC
Court relied upon the expert witnesses and other evidence
produced before it, including the witnesses of the Cyber Cafe
owners and came to the conclusion that the crime was
conclusively proved.
51
CASE LAWS contd…
52
CASE LAWS contd…
53
CASE LAWS contd…
54
CASE LAWS contd…
56
CYBER LAW TRENDS OF INDIA 2013 contd…
• New fields like e-legal due diligence and technological legal due
diligence in India would also assume significance.
• Online pharmacies websites of India has been brought under
regulatory scanner and punishment may follow .
• SEBI would get power to monitor investor’s call records and
conduct Searches at companies suspected of wrongdoing.
• Election commission of India would scrutinize social media
platforms for model code of conduct violations.
• Indian Supreme Court has issued notice to Maharashtra
government and deity for framing cyber crimes investigation
guidelines.
57
RECOMMENDATIONS FOR THE BETTERMENT OF ITAA-2008
• The statement of object and reasons must be stretched to cover
crimes committed in the cyber space, and not limited to safeguard
electronic commerce and related communications only.
• Cyber terrorism must be broadly defined to include the usage of
cyber space and cyber communication.
• An altogether new chapter dedicated for cyber terrorism and
extremist speeches in the main legislation should be introduced.
• The act refers to on-line privacy in only two areas, namely in
sections 43 & 72, which is not sufficient.
• Provisions should be made for the Intellectual property regime,
which is the backbone of any e- commerce transaction.
• The Act is silent about the regulation of the payment gateways.
• Other related Acts should be amended accordingly to safeguard
against the atrocities of cyber crimes.
58
CONCLUSION
• Information Technology Act, 2000, itself is a comprehensive
legislation but it has had some inherent shortcomings.
• The amended act is a welcoming attempt to fill gaps in old act in
India, for instance, introducing legal recognition to electronic
signatures, data protection obligations and mechanisms,
provisions to combat emerging cyber security threats such as
cyber terrorism, identity theft, spamming, video voyeurism,
pornography on internet, and other crimes. It paved the way for
removing the implementation of the IT Act by removing certain
undesirable wordings in some sections.
• It can be expected that the lacunae in ITAA-2008 may also be
eliminated with the time as and when more problems will be
encountered by the Judiciary.
59
CONCLUSION contd…
• Successful criminal prosecution and civil litigation will require
that members of the legal community familiarize themselves with
the various hacking techniques to ensure that the perpetrators
are tried and convicted under the relevant statutes.
• It is impossible to create permanent solutions in the criminal
legislation, and it can be maintained that the legislation will
always be more or less behind the real development. In order to
keep this gap as narrow as possible, close and continuous
cooperation between the law enforcement and legislative
authorities is required, as well as active following of the technical
development. Also international cooperation is also very
significant because of the transnational nature of the IT crimes.
60
THANK YOU
61