You are on page 1of 25

CHANAKYA NATIONAL LAW UNIVERSITY,

PATNA

EMERGING TRENDS IN CYBERCRIME

Subject- CYBER LAW

Faculty - Submitted by:


Mr. Kumar Gaurav Name - Shweta

Semester -9th

Roll No - 813

1
ACKNOWLEDGEMENT

It is my greatest pleasure to be able to present the project topic EMERGING TRENDS IN


CYBERCRIME of Private International Law. I found it very interesting to work on this project.
I would like to thank my teacher, Mr. Kumar Gaurav, for providing me with such an interesting
project topic and for his constant support and guidance.

I would also like to thank my librarian for helping me in gathering data for the project. Last, but
not the least, I would heartily thank my family and friends for their unwavering support without
which this work would not have been possible.

I hope that the readers will appreciate this project work.

Shweta.....

2
INTRODUCTION

The world we are in today is all about Information Technology (IT) because we are in the age of
Information Technology and the people with the right information, with proper way of
disseminate this information and processing them is considered as the most successful.
Information technology is the transfer of information using telecommunication and micro-based
computer system. Nowadays, the computer has replaced manual records, and the fraudulent input
document has been substituted by manipulating data held in a computer system. This
manipulation does not need to be sophisticated. Computers have become the mainstay of
business and government processes.

Business has been using them for years and in most countries, there are drives towards
electronic or joined up government. This is to allow the people to access government services
from their desktop in their own home. Cybercrime, like every digital industry, is outsourcing.
Though the U.S. still produces more malware, spam and viruses than any country in the world,
illicit IT jobs are increasingly scattered across an anarchic and international Internet, where labor
is cheap, legitimate IT jobs are scarce and scammers are insulated from the laws that protect their
victims by thousands of miles. As Thomas Friedman might say, the criminal underworld is flat.
The statistics that have been obtained and reported about demonstrate the seriousness Internet
crimes in the world.1

Just the "phishing" emails mentioned in a previous paragraph produce one billion dollars for
their perpetrators (Dalton 1). In a FBI survey in early 2004, 90 percent of the 500 companies
surveyed reported a security breach and 80 percent of those suffered a financial loss . A national
statistic in 2003 stated that four billion dollars in credit card fraud are lost each year. Only two
percent of credit card transactions take place over the Internet but fifty percent of the four billion,
mentioned before, are from the transaction online.2

All these finding are just an illustration of the misuse of the Internet and a reason why Internet
crime has to be slowed down. Internet crime is crime committed on the Internet, using the

1 www.ncpc.org/resources/files/pdf/internet-safety/13020-Cybercrimes-revSPR.pdf

2 ibid

3
Internet and by means of the Internet. Computer crime is a general term that embraces such
crimes as phishing, credit card frauds, bank robbery, illegal downloading, industrial espionage,
child pornography, kidnapping children via chat rooms, scams, cyber terrorism, creation and/or
distribution of viruses, Spam and so on. All such crimes are computer related and facilitated
crimes.With the evolution of the Internet, along came another revolution of crime where the
perpetrators commit acts of crime and wrongdoing on the World Wide Web. Internet crime takes
many faces and is committed in diverse fashions. The number of users and their diversity in their
makeup has exposed the Internet to everyone. Some criminals in the Internet have grown up
understanding this superhighway of information, unlike the older generation of users. This is
why Internet crime has now become a growing problem in the United States. Some crimes
committed on the Internet have been exposed to the world and some remain a mystery up until
they are perpetrated against someone or some company.3

People have been trying to solve virus problems by installing virus protection software and other
software that can protect their computers. Other crimes such as email phishing are not as
known to the public until an individual receives one of these fraudulent emails. These emails are
cover faced by the illusion that the email is from your bank or another bank. When a person
reads the email he/she is informed of a problem with he/she personal account or another
individual wants to send the person some of their money and deposit it directly into their
account. The email asks for your personal account information and when a person gives this
information away, they are financing the work of a criminal.

3 www.itu.int/ITU-D/cyb/cybersecurity/docs/Cybercrime%20legislation%20EV6.pdf

4
RESEARCH METHODOLOGY

The researcher has used Doctrinal method of research throughout the preparation of the project.
The researcher has used this method in the form of-

1. BOOKS.

2. JOURNALS.

3. CASE LAWS.

4. WEBSITES.

OBJECTIVES AND IMPORTANCE

The objective of doing this research was to know and understand the concept of cyber crime
and its impact in present world.

HYPOTHESIS

In the initial stage of pilot study, the researcher was of the view that the concept of cyber
crime has a great effect on present world and there are not many laws to curb the same.

5
But at the later stage of research work, researcher was proved wrong as she found that there
are certain laws which have succeeded in putting a check on cyber crime though it is not
sufficient. A lot more is yet to be done in this regard.

PLAN OF STUDY

CONCEPT OF CYBER CRIME

NATURE AND ITS EXTENT

CHALLENGES TO CRIMINAL ADMINISTRATION OF JUSTICE

THREATS OF CYBER CRIME

COUNTER MEASURES

CONCLUSION

6
BIBLIOGRAPHY

CONCEPT OF CYBER CRIME

7
Cyber crime also called computer crime, the use of a computer as an instrument to further
illegal ends, such as committing fraud, trafficking in child pornography and intellectual
property, stealing identities, or violating privacy. Cybercrime, especially through the Internet, has
grown in importance as the computer has become central to commerce, entertainment, and
government.

Because of the early and widespread adoption of computers and the Internet in the United States,
most of the earliest victims and villains of cybercrime were Americans. By the 21st century,
though, hardly a hamlet remained anywhere in the world that had not been touched by
cybercrime of one sort or another.

DEFINING CYBERCRIME

New technologies create new criminal opportunities but few new types of crime. What
distinguishes cybercrime from traditional criminal activity? Obviously, one difference is the use
of the digital computer, but technology alone is insufficient for any distinction that might exist
between different realms of criminal activity. Criminals do not need a computer to commit fraud,
traffic in child pornography and intellectual property, steal an identity, or violate someones
privacy. All those activities existed before the cyber prefix became ubiquitous. Cybercrime,
especially involving the Internet, represents an extension of existing criminal behavior alongside
some novel illegal activities.

Most cybercrime is an attack on information about individuals, corporations, or governments.


Although the attacks do not take place on a physical body, they do take place on the personal or
corporate virtual body, which is the set of informational attributes that define people and
institutions on the Internet. In other words, in the digital age our virtual identities are essential
elements of everyday life: we are a bundle of numbers and identifiers in multiple
computer databases owned by governments and corporations. Cyber crime highlights the
centrality of networked computers in our lives, as well as the fragility of such seemingly solid
facts as individual identity.

NATURE AND ITS EXTENT


8
Cybercrime has been defined as encompassing any proscribed conduct perpetrated through the
use of, or against, digital technologies1.That definition says it all. It embraces three areas of
activity. - Crimes in the commission of which computers are used. These include online fraud
and financial crime, the electronic manipulation of share and other markets, the dissemination
electronically of offensive material, misleading advertising, identity theft and so on. - Specific
crimes committed against digital technology itself.

These include hacking, cyber stalking, theft of communication services and the transmission of
malware viruses, worms, Trojans, botnets, backdoors, phishing and so on. - Conventional
crimes attended by incidental cyber methods. These include encryption or steganography (the
embedding of information in data) to conceal information relevant to other crime and the use of
databases to store or organize information about criminal activity. Some offending has elements
of more than one of those divisions, such as the electronic transmission and perhaps covert
storage of child pornography where real children are initially victimized.

Another example is the all-too-prevalent use of computer chat rooms to groom and entice victims
into illegal sexual activity with the offenders. Another example is to be found in the new offence
called, colloquially, up skirting where offenders use digital cameras to photograph up the
skirts of women in public places and then disseminate the images. The infrastructure of
cybercrime is in computers, communications technologies and other networked services. It is
sometimes known by other names, such as computer crime, or virtual, online, high-tech, Internet-
related, electronic crime, and so on.

Victimization surveys among populations consistently show a concern at the level of cyber
offending. That concern is likely to increase as applications of digital technology expand.
Already cybercrime accounts for more economic crime than any other type. All that is needed to
commence a cybercrime is a computer (with relevant connections, of course). This means of

9
committing crime has been harnessed by everyone from enthusiastic (and sometimes young)
amateurs to terrorists and with international drug and money traffickers, smugglers and criminal
gangs in between. The bombing in Bali in 2002, for example, was financed by electronic
transfers of funds from the Middle East to Bangkok, organized by a man here in Singapore.

It is easy for cybercriminals to identify targets. For crimes using computers, databases of names
and addresses and other particulars are compiled for a wide range of purposes and are sold or
given away to persons who may wish to use them for criminal purposes. E-mail addresses may
be obtained by other means. Targets are then contacted and inveigled into providing, for
example, details of their bank accounts or personal particulars. The callers might even pose as
government or bank officials seeking to update records and using designs on their messages
that mimic genuine sites. Done by e-mail, this process is known as phishing.

Even the best equipped law enforcement agencies are likely to be unable to deal with the
growing volume of cybercrime even in their own jurisdictions2 . Any increase in cybercrime
must be considered in the context of the enormous and continuously expanding growth in the use
of digital technologies. Just the capacity of digital storage media has grown exponentially in
recent years. The average size of a hard disk installed in a personal computer has grown from 12
gigabytes in 1997 to well over 1,000 gigabytes now. The use of the Internet for financial
transactions of many kinds (sales, transfers of funds for many purposes) continues to grow
rapidly. Continuing measurement of the extent of the problem and reporting of its incidence are
essential. Only against that background can it be judged whether or not the investigation and
prosecution of cybercrime are being conducted effectively.

10
CHALLENGES TO CRIMINAL ADMINISTRATION OF
JUSTICE

The scale and quantity of cybercrime, devices, users and victims Cybercrime, the number of
devices, services and users (including of mobile devices and services) and with these the number
of victims have reached proportions so that only a minuscule share of cybercrime or other
offences involving electronic evidence will ever be recorded and investigated. The vast majority
of victims of cybercrime cannot expect that justice will be served.

This raises questions regarding the rule of law in cyberspace and the ability of governments to
meet their obligations to protect society against crime and to protect the rights of victims.
Technical challenges- In addition to challenges related to cloud computing, criminal justice
authorities are faced with a range of other challenges that render investigations highly complex:
Peer-to-peer/Virtual Private Networks; Anonymizers (TOR, I2P); Encryption; VOIP;
IPv4 to IPv6 transition and Carrier-grade Network Addressing Translators (CGN). These are
major challenges and would need to be discussed in detail separately.

11
Cloud computing, territoriality and jurisdiction- Cloud computing raises a number of
challenges for criminal justice, in particular with regard to the applicable law and the jurisdiction
to enforce. Issues include: Independence of location is a key characteristic of cloud
computing. Therefore: - It is often not obvious for criminal justice authorities in which
jurisdiction the data is stored and/or which legal regime applies to data. A service provider may
have its headquarters in one jurisdiction and apply the legal regime of a second jurisdiction while
the data is stored in a third jurisdiction.

Data may be mirrored in several or move between jurisdictions. If the location of data determines
the jurisdiction, it is conceivable that a cloud service provider systematically moves data to
prevent criminal justice access. - Even if theoretically data may always have a location also when
stored on cloud servers, it is far from clear which rules apply for lawful access by criminal
justice authorities. It may be argued that the location of the headquarters of the service provider,
or of its subsidiary, or the location of the data and server, or the law of the State where the
suspect has subscribed to a service, or the location or citizenship of the suspect may determine
jurisdiction of the data of a user and thus which rules apply.

Additional jurisdiction issues arise, for example, when the data owner is unknown or when the
data is stored via transnational co-hosting solutions. A service provider may be under different
layers of jurisdictions for various legal aspects related to its service at the same time. For
example: - For data protection purposes, within EU member States, jurisdiction seems to be
decided by the location of the data controller, not by the location of the international HQ, the
location of the servers, the location of the business area (customers) or other criteria.

However, some companies do not have data controllers in the EU, even if they have a number of
European users. In these cases, it appears unclear what if any jurisdiction European data
protection agencies have over these services. The "right to be forgotten" case regarding Google

12
in Spain on the other hand was based on different criteria for jurisdiction than the location of
international HQ, the location of servers or the location of data controllers. - For tax purposes,
jurisdiction seems not decided by the location of the international HQ, servers or data controllers,
but on several other criteria, such as the location of the subsidiary doing business. - With regard
to consumer protection, the location of the consumer seems decisive. - For intellectual property
rights in civil cases the location of the business seems to determine jurisdiction, while for
intellectual property in criminal law the location of the perpetrator may be decisive.

The sharing and pooling of resources is a key characteristic of cloud computing. Cloud
services may entail a combination of service models (Cloud Software as a Service (SaaS), Cloud
Platform as a Service (PaaS), Cloud Infrastructure as a Service (IaaS)). It is often unclear which
service provider when providing one or more types of services is in possession or control of
which type of data (subscriber information, traffic data, content data) so as to be served a
production order. It is often unclear whether data is stored or in transit and thus whether
production orders, search and seizure orders, interception or real-time collection orders are to be
served. It is not always clear whether different types of cloud services are considered and
regulated implications on the type of and conditions for procedural law powers that can be
applied.56 Regarding interceptions, specific problems arise.

For example: - A court order served to a service provider domestically to intercept an electronic
communication between two suspects on its territory and/or its nationals, is often not executable
in real time because the server where the interception is to take place is located in a foreign
jurisdiction or the communication is routed via a foreign jurisdiction. The foreign authorities are
unlikely to respond to an MLA request in real time, given the duration of procedures and the
requirements for interception in that country, unless emergency procedures are in place. - A court
order may be served for the interception of a communication of a national suspect. However, the
suspect moves to another country or moves between different countries. It may be unclear
whether the interception is legally possible when the suspect is in roaming. The non-localized
nature of cloud computing causes problems for live forensics (online forensics) and searches
because of the architecture of the cloud (multi tenancy, distribution and segregation of data) as
13
well as legal challenges related to the integrity and validity of the data collection, evidence
control, ownership of the data or jurisdiction.

Mutual legal assistance- Mutual legal assistance remains the principal means to obtain evidence
from foreign jurisdictions for use in criminal proceedings. In December 2014, the Cybercrime
Convention Committee (T-CY) completed an assessment of the functioning of mutual legal
assistance provisions. It concluded, among other things, that: The mutual legal assistance (MLA)
process is considered inefficient in general, and with respect to obtaining electronic evidence in
particular. Response times to requests of six to 24 months appear to be the norm. Many requests
and thus investigations are abandoned. This adversely affects the positive obligation of
governments to protect society and individuals against cybercrime and other crime involving
electronic evidence. The Committee adopted a set of recommendations to make the process more
efficient. These recommendations should be implemented. At the same time, MLA is not always
a realistic solution to access evidence in the cloud context for the reasons indicated above.

THREATS OF CYBER CRIME

14
Cybercrime and the challenges related to electronic evidence have reached a level and
complexity that undermines the confidence, security and trust in information and communication
technologies (ICT). A review of the current scale, scope and challenges related to cybercrime and
electronic evidence (that is, evidence in the form of data generated by or stored on a computer
system) suggests that cybercrime has become a serious threat to the fundamental rights of
individuals, to the rule of law in cyberspace and to democratic societies: The theft and misuse
of personal data (email account data, credit card details, address books, patient records etc.)
affects the right to private life (including the protection of personal data) of hundreds of millions
of individuals. Cybercrime is an attack against the dignity and integrity of individuals, in
particular children. Cyber attacks (such as distributed denial of service attacks, website
defacement and others) against media, civil society organizations, individuals or public
institutions are attacks against the freedom of expression.8 Cybercrime is an attack against
democracy.

Governments, parliaments and other public institutions as well as critical infrastructure are faced
with attacks every day. Cybercrime is a threat to democratic stability. Information and
communication technologies are misused for xenophobia and racism, contribute to radicalization
and serve terrorist purposes Cybercrime causes economic cost and risks to societies and
undermines human development opportunities through ICT. Cybercrime is a threat to
international peace and stability. Military conflicts and political disagreements are increasingly
accompanied by cyber attacks.

Reportedly, trillions of security incidents are noted on networks each year and millions of attacks
against computer systems and data are recorded every day. Cybercrime is a primary concern to
governments, societies and individuals.15 In addition, criminal justice authorities are faced with
the problem that evidence in relation to any crime is now often stored in electronic form on
computer systems. Most international requests for data are related to fraud and financial crime
followed by violent and serious crimes. These may include murder, assault, smuggling of

15
persons, trafficking in human beings, drug trafficking, money laundering, terrorism and the
financing of terrorism, extortion and, in particular, child pornography and other forms of sexual
exploitation and abuse of children. Predictions are that cybercrime will grow significantly in
2015 and beyond. Reasons include technical vulnerabilities which may affect hundreds of
millions of users and the security of organizations. Examples exposed in 2014 are mobile
malware threats, defects such as Heart bleed, the hacking of the UMTS standard for mobile
phone communications, the cloning of biometric data such as fingerprints or irises or concerns
over the security of cloud services for the storage of data.

New forms of electronic payments, including mobile money, provide new opportunities for fraud
and financial crime. Big data and the Internet of Everything create further risks to security and
privacy under a business model of the Internet that relies increasingly on the exploitation of
personal data. Data available are not only used for business purposes, but may also be used for
criminal purposes, such as harvesting data through crime-as-a-service. If only a minuscule
fraction of offences involving computer data and systems can be prosecuted, victims have a very
limited expectation of justice. This raises questions regarding the rule of law in cyberspace.
Confusion between criminal justice versus national security Public and political debates on
mass surveillance are marked by confusion between criminal justice and national security.
Criminal justice authorities carry out specific criminal investigations and secure specified data
for use in court cases and proceedings. Such investigations may interfere with the rights of
individuals and they are therefore subject to rule of law safeguards, such as judicial control. The
evidence can be challenged and remedies are available.

This is very different from bulk interception of data for national security purposes. However, the
confusion prevails. It leads to additional conditions for criminal justice authorities and prevents
solutions in view of more effective investigations and prosecutions of cybercrime and other
offences involving electronic evidence. As stated by the Deputy Secretary General of the

16
Council of Europe in March 2015: We need more effective criminal justice and we need stronger
safeguards regarding national

Uncertainty regarding the availability of data Reports on mass surveillance and the ruling of
the European Court of Justice on the EU Data Retention Directive has led to uncertainty
regarding rules on procedural powers not only within the European Union but also elsewhere. In
some countries, not only data retention provisions but also other powers to secure electronic
evidence have been abolished or are in question. Delays in the adoption of European data
protection frameworks at the level of the European Union and the Council of Europe create
further uncertainty.

Moreover, cooperation by cloud service providers and other industry with criminal justice often
depends on their own internal policies and they may change these unilaterally at any time.

Types of data needed for criminal justice purposes For the purposes of a criminal
investigation, three types of data may be needed: Subscriber information; Traffic data;
Content data. In many jurisdictions, conditions for access to subscriber information tend to be
lower than for traffic data and the strictest regime applies to content data.

Subscriber information. Subscriber information is essential to identify the user of a specific


Internet Protocol (IP) address or, vice versa, the IP addresses used by a specific person.
Identifying the subscriber of an IP address is the most often sought information in domestic and
international criminal investigations related to cybercrime and electronic evidence. Without this
information, it is often impossible to proceed with an investigation.

17
As a result of the assessment of the mutual legal assistance provisions, the T-CY recommended
to consider a light regime for international requests for a limited set of subscriber information:
Parties should consider allowing via legal domestic amendments and international agreement
for the expedited disclosure of the identity and physical address of the subscriber of a specific IP
address or user account. Subscriber information also comprises data from registrars on
registrants of domains.

Subscriber information is likely to be held by service providers services in the territory of a


Party although the information may actually be stored on servers in other jurisdictions. It may
thus not always be clear to whom to address a request for subscriber information. However,
Article 18.1.b Budapest Convention offers a practical solution in that competent authorities of a
Party should be able to request subscriber information from a service provider offering a service
on its territory irrespective of where the information is actually stored: Article 18 Production
order 1 Each Party shall adopt such legislative and other measures as may be necessary to
empower its competent authorities to order: a control, which is stored in a computer system or a
computer-data storage medium; and b a service provider offering its services in the territory of
the Party to submit subscriber. In Belgium, this power is reflected in Article 46bis (2) of the
Belgian Code of Criminal Procedure and is being tested in the Belgian Yahoo! case.4

Cloud computing. Cloud computing is a model for enabling convenient, on-demand network
access to a shared pool of configurable computing resources (e.g., networks, servers, storage,
applications, and services) that can be rapidly provisioned and released with minimal
management effort or service provider interaction. This cloud model promotes availability and is
composed of five essential characteristics (On-demand self-service, Broad network access,
Resource pooling, Rapid elasticity, Measured Service); three service models (Cloud Software as
a Service (SaaS), Cloud Platform as a Service (PaaS), Cloud Infrastructure as a Service (IaaS));
and, four deployment models (Private cloud, Community cloud, Public cloud, Hybrid cloud).

4 studymafia.org/cyber-crime-seminar-ppt-with-pdf-report/

18
Key enabling technologies include: (1) fast wide-area networks, (2) powerful, inexpensive server
computers, and (3) high-performance virtualization for commodity hardware data is less held on
a specific device or in closed networks but is distributed over different services, providers,
locations and often jurisdictions.

In traditional computer forensics, due to the centralized nature of the information technology
system, investigators can have full control over the forensic artifacts (router, process logs, and
hard disks). However, in the cloud eco system, due to the distributed nature of the information
technology systems, control over the functional layers varies among cloud actors, depending on
the service model. Therefore, investigators have reduced visibility and control over the forensic
artifacts.5

WHICH OF THE FOLLOWING USER GROUPS ARE MOST


VULNERABLE TO CYBER CRIME?

Options Respondents
Govt. Agencies (a) 8
Financial Institutions (b) 8
Private Sectors (c) 5
Personal Users (d) 4
Total 25

5 ibid

19
20
COUNTER MEASURES

The Indian parliament considered it necessary to give effect to the resolution by which the
General Assembly adopted Model Law on Electronic Commerce adopted by the United Nations
Commission on Trade Law. As a consequence of which the Information Technology Act 2000
was passed and enforced on 17th May 2000. The preamble of this Act states its objective to
legalise e-commerce and further amend the Indian Penal Code 1860, the Indian Evidence Act
1872, the Bankers Book Evidence Act 1891 and the Reserve Bank of India Act 1934. The
basic purpose to incorporate the changes in these Acts is to make them compatible with the Act

21
of 2000.So that they may regulate and control the affairs of the cyber world in an effective
manner.6

The Information Technology Act deals with the various cyber crimes in chapters IX & XI. The
important sections are Ss. 43,65,66,67. Section 43 in particular deals with the unauthorised
access, unauthorised downloading, virus attacks or any contaminant, causes damage, disruption,
denial of access, interference with the service availed by a person. This section provide for a fine
up to Rs. 1 Crore by way of remedy. Section 65 deals with tampering with computer source
documents and provides for imprisonment up to 3 years or fine, which may extend up to 2 years
or both. Section 66 deals with hacking with computer system and provides for imprisonment up
to 3 years or fine, which may extend up to 2 years or both. Further section 67 deals with
publication of obscene material and provides for imprisonment up to a term of 10 years and also
with fine up to Rs. 2 lakhs.

Prevention is always better than cure. It is always better to take certain precaution
while operating the net. A should make them his part of cyber life. Sailesh Kumar Zarkar,
technical advisor and network security consultant to the Mumbai Police Cyber crime
Cell, advocates the 5P mantra for online security: Precaution, Prevention, Protection,
Preservation and Perseverance. A netizen should keep in mind the following things-

1. To prevent cyber stalking avoid disclosing any information pertaining to


oneself. This is as good as disclosing your identity to strangers in public place.

2. Always avoid sending any photograph online particularly to strangers and chat
friends as there have been incidents of misuse of the photographs.

3. Always use latest and up dateanti virus software to guard against virus attacks.

4. Always keep back up volumes so that one may not suffer data loss in case of
virus contamination

5. Never send your credit card number to any site that is not secured, to guard
against frauds.

6 www.kpmg.com/Global/en/IssuesAndInsights/ArticlesPublications/.../cyber-crime.pdf

22
6. Always keep a watch on the sites that your children are accessing to prevent
any kind of harassment or depravation in children.

7. It is better to use a security programme that gives control over the cookies and
send information back to the site as leaving the cookies unguarded might prove
fatal.7

8. Web site owners should watch traffic and check any irregularity on the site.
Putting host-based intrusion detection devices on servers may do this.

9. Use of firewalls may be beneficial.

10. Web servers running public sites must be physically separate protected from
internal corporate network.

Adjudication of a Cyber Crime - On the directions of the Bombay High Court the Central
Government has by a notification dated 25.03.03 has decided that the Secretary to the
Information Technology Department in each state by designation would be appointed as
the AO for each state.8

7 wsilfi.staff.gunadarma.ac.id/Downloads/files/13309/W03-Cyber+crime.pdf

8 ibid

23
CONCLUSION

Capacity of human mind is unfathomable. It is not possible to eliminate cyber crime from
the cyber space. It is quite possible to check them. History is the witness that no
legislation has succeeded in totally eliminating crime from the globe. The only possible
step is to make people aware of their rights and duties (to report crime as a collective
duty towards the society) and further making the application of the laws more stringent to
check crime.

Undoubtedly the Act is a historical step in the cyber world. Further I all together do not
deny that there is a need to bring changes in the Information Technology Act to make it
more effective to combat cyber crime. I would conclude with a word of caution for the
pro-legislation school that it should be kept in mind that the provisions of the cyber law
are not made so stringent that it may retard the growth of the industry and prove to be
counter-productive.

While there is no silver bullet for dealing with cyber crime, it doesnt mean that we
are completely helpless against it. The legal system is becoming more tech savvy
and many law enforcement departments now have cyber crime units created
specifically to deal with computer related crimes, and of course we now have laws
that are specifically designed for computer related crime. While the existing laws
are not perfect, and no law is, they are nonetheless a step in the right direction
toward making the Internet a safer place for business, research and just casual use.
As our reliance on computers and the Internet continues to grow, the importance of
the laws that protect us from the cyber-criminals will continue to grow as well.

24
BIBLIOGRAPHY

WEBSITES

1. www.lexisnexis.in/books-cyber-crimes.htm

2. www.jainbookdepot.com/servlet/jbsubjdisp?offset=0&subname=Cyber+Crime

3. www.ncdrc.res.in/national-cyber-crime-reference-hand-book-first-edition.php

4. www.polity.co.uk/book.asp?ref=9780745627359

5. guides.library.lls.edu/c.php?g=497723&p=3407532

6. cyberlaws.net/cyber-law-books/.

7. cybercrimecentre.in/cyber-law-books/.

25

You might also like