Cyber Crime Scenario in India and Judicial Response
Cyber Crime Scenario in India and Judicial Response
Cyber Crime Scenario in India and Judicial Response
Volume: 3 | Issue: 4 | May-Jun 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 - 6470
@ IJTSRD | Unique Paper ID - IJTSRD24025 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 1108
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
capabilities associated with the transport of communication to include traditional crimes in which computers or
and control product and services.5 networks are used to enable the illicit activity.11
Electricity was first harnessed in 1831, but it was not until In the words of Pawan Duggal, “Cyber crime refers to all the
1882 that the first power station was built in 1882. Then it activities done with criminal intent in cyberspace or using
took another 50 years before reaching 80 percent in United the medium of internet. These could be either the criminal
States. Radio took 38 years to be used by 50 million people. activities in the conventional sense or activities, newly
TV took 13 years to reach 50 million people, whereas PC evolved with the growth of the new medium. Any activity,
took 16 years to reach 50 million people. However, the which basically offends human sensibilities, can be included
internet took only 4 years to have 50 million people online; in the ambit of cybercrimes.”
thus, increasing the horizon of cyber space.8
In the words of Dr. R.K. Tewari, “cyber crime may be said
3. WHAT IS CYBER CRIME? those species, of which, genus in the conventional crime, and
“Cybercrime” is a combination of two terms “crime” with the where either the computer is an object or subject of the
root “cyber” derived from the word “cybernetic”, from the conduct constituting crime”.13
Greek, “kubernan”, which means to lead or govern. The
“cyber” environment includes all forms of digital activities, According to UNO expert recommendations, the term of
irrespective of whether they utilize single network. “cybercrimes “covers any crime committed by using
Cyberspace is borderless as no Courts across the globe can computer system or networks, within their framework or
claim jurisdiction. Any illegal act which involves a computer, against them. Theoretically, it embraces any crime that can
computer system or a computer network is cybercrime.9 be committed in the electronic environment. In other words,
crimes committed by using e-computers against information
Crime consists of engaging in conduct that has been processed and applied in the internet can be referred to
outlawed by a society because it threatens the society’s cybercrimes.14
ability to maintain order.
In the words of Katyal, “cyber crimes are offences conducted
The expression crime is defined as an act which subjects the in the “cyberspace” and the term “cyberspace” is ambiguous
doer to legal punishment or any offence against morality, in the first place. A diverse range of act such as the spread of
social order or any unjust or shameful act. The offence is computer viruses, visting an obscene website and cyber
defined in code of criminal code of criminal procedure to stalking may qualify as a cybercrime”.15
make punishable by any law for the time being in force.10
5. OBJECTIVES:
Cyber crime is a term used to broadly describe criminal To Study the implementation on enactments of cyber
activity in which computer networks are a tool, a target, or a law.
place of criminal activity and include everything from To know the types cyber crimes and its functions.
electronic cracking to denial of service attacks. It is also used
brief study on Cyber Crime and Cyber Law’s of India Volume: the cost, ISSN 2347 – 8527 Volume 3, Issue 2 April 2014” (
04 Issue: 06 June 2017 ( last visited on 25th October 2018) last visited on 23rd October 2018)
@ IJTSRD | Unique Paper ID - IJTSRD24025 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 1109
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
To analyze the problems faced by the police for viewed by other users. Examples of such code include HTML
investigation on cybercriminals.16 code and client-side scripts. An exploited cross-site scripting
vulnerability can be used by attackers to bypass access
5. CYBER CRIME INCLUDES: controls21.
Following are the few examples of cyber Crime:
5.1.1. Email spoofing: 5.1.7. Vishing:
This technique is a forgery of an email header. This means Vishing is the criminal practice of using social engineering
that the message appears to have received from someone or and Voice over IP (VoIP) to gain access to private .personal
somewhere other than the genuine or actual source. These and financial information from the public for the purpose of
tactics are usually used in spam campaigns or in phishing, financial reward. The term is a combination of "voice" and
because people are probably going to open an electronic phishing. Vishing exploits the public's trust in landline
mail or an email when they think that the email has been telephone services, which have traditionally terminated in
sent by a legitimate source.17 physical locations which are known to the telephone
company, and associated with a bill-payer. The victim is
5.1.2. Hacking: often unaware that VoIP allows for caller ID spoofing,
Amongst all types of cyber crime it is the most dangerous inexpensive, complex automated systems and anonymity for
and serious threat to the internet and e-commerce. Hacking the billpayer. Vishing is typically used to steal credit card
refers to the secretively breaking into the computer system numbers or other information used in identity theft schemes
and stealing valuable data from the system without any from individuals.22
permission. Spreading computer virus: It refers a set of
Cyber instructions which are able to perform some malicious 5.1.8. Cyber trafficking:
operations. Viruses stop the normal functioning of the It may be trafficking in weapons, drugs, human beings, which
system programs and insert few abnormalities. A computer affect the large numbers of persons.
viruses can be spread through- Emails, CDs, pen drives
(secondary storage), Multimedia, Internet.18 5.1.9. Web jacking:
The term Web jacking has been derived from hi jacking. In
5.1.3. Phishing: this offence the attacker creates a fake website and when the
Phishing refers to stealing information’s like passwords, victim opens the link a new page appears with the message
credit card details, usernames etc of target person/persons and they need to click another link. If the victim clicks the
over the internet. Phishing is carried out by email spoofing link that looks real he will redirected to a fake page. These
and instant messaging. In this type of crime hackers make a types of attacks are done to get entrance or to get access and
direct link which directs the targeted persons to the fake controls the site of another. The attacker may also change
page which looks and feels identical to the actual one.19 the information of the victim’s webpage.23
@ IJTSRD | Unique Paper ID - IJTSRD24025 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 1110
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
up their marriage and the young lady created some fake woman, and forwarded emails received in that account. The
email ids such as “Indian bar associations” and sent mails to victim also received phone calls by people who believed that
the boy‘s foreign clients. She used the banks computer to do she was soliciting for sex work .The police complaint was
this. The boy‘s company lost a huge number of clients and lodged in February 2004 and within a short span of seven
took the bank to court. The bank was held liable for the months from the filing of the First Information Report, the
emails sent using the bank‘s system.25 Chennai Cyber Crime Cell achieved a conviction. Katti was
punished with two years’ rigorous imprisonment and Rs.
B. Bazee.com case: 500 fine under S. 469 IPC (forgery for the purpose of
In December 2004 the Chief Executive Officer of Bazee.com harming reputation), one year’s simple imprisonment and
was arrested because he was selling a compact disk (CD) Rs. 500 for offence under S. 509 IPC (words, gestures or acts
with offensive material on the website, and even CD was also intended to insult the modesty of a woman) and two years’
conjointly sold-out in the market of Delhi. The Delhi police rigorous imprisonment and Rs. 4000 fine for offence under S.
and therefore the Mumbai Police got into action and later the 67 of IT Act 2000 (punishment for publishing or transmitting
CEO was free on bail.26 obscene material in electronic form).30
@ IJTSRD | Unique Paper ID - IJTSRD24025 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 1111
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
The alleged accused was then a class XII student who created the said section. In fact, a large number of innocent persons
a pornographic website as revenge of being teased by have been booked.41
classmates and teachers. He listed in that website the name
of his 12 school mates ‘girls and teachers in sexually explicit The Court held that the provision of section 66A of the IT Act
manner. He was then suspended by the School Authorities is derogative to the Article 19(1) (a) and as such it is an
though the juvenile court allowed his bail prayer. However, arbitrary provision which breaches the right of citizen to
he was charged under s. 67 of the Information Technology have freedom of speech and expression of their views on
Act 2000, and ss. 292, 293, 294 of the Indian Penal Code and internet. As such the provision concerned is constitutionally
the Indecent Representation of Women Act. The most invalid and as such struck down in its entirety.42
significant steps were taken by the law enforcement
agencies in India. 7. CONCLUSION
It is cleared from the previous studies and records that with
Further, Honble Judge also restrained the defendant from the increment in technology cybercrimes increases. Qualified
publishing, transmitting or causing to be published any people commit crime more so, there is need to know about
information in the actual world as also in cyberspace which principles and computer ethics for their use in proper
is derogatory or defamatory or abusive of the plaintiff.36 manner. Cybercrime and hacking is not going away, if
anything it is getting stronger. By studying past incidents, we
I. Shreya Singhal v. U.O.I37 this is a landmark judgment, can learn from them and use that information to prevent
concerning section 66A of the Information Technology Act, future crime. Cyber law will need to change and evolve as
2000. This Section was not in the Act as originally enacted, quickly as hackers do if it has any hopes of controlling
but came into force by virtue of an Amendment Act of 2009 cybercrime. Law must also find a balance between
with effect from 27.10.2009.38 protecting citizens from crime, and infringing on their rights.
The great thing about the internet is how vast and free it is.
The reason behind the insertion of section 66A Will it be able to remain the same way while becoming
according to the Amendment Bill was: tougher on criminals? Only time will tell. There will always
“A rapid increase in the use of computer and internet has be new and unexpected challenges to stay ahead of cyber
given rise to new forms of crimes like publishing sexually criminals and cyber terrorists but we can win only through
explicit materials in electronic form, video voyeurism, and partnership and collaboration of both individuals and
breach of confidentiality and leakage of data by government. There is much we can do to ensure a safe,
intermediary, e-commerce frauds like personation secure and trustworthy computing environment. It is crucial
commonly known as Phishing, identity theft and offensive not only to our national sense of well-being, but also to our
messages through communication services. So, penal national security and economy. Yet India has taken a lot of
provisions are required to be included in the Information steps to stop cybercrime but the cyber law cannot afford to
Technology Act, the Indian Penal code, the Indian Evidence be static, it has to change with the changing time.
Act and the Code of Criminal Procedure to prevent such
crimes”.39
Facts:
The Petitioners have raised a large number of points as to
the constitutionality of section 66A. According to them, first
and foremost Section 66A infringes the fundamental right to
freedom of speech and expression and is not saved by any of
the eight subjects covered in Article 19(2).40
@ IJTSRD | Unique Paper ID - IJTSRD24025 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 1112