Professional Documents
Culture Documents
1781
International Journal of Pure and Applied Mathematics Special Issue
1. Introduction
Computer crime is a general term that embraces such crimes as phishing, credit
card frauds, bank robbery, illegal downloading, industrial espionage, child
pornography, kidnapping children via chat rooms, scams, cyber terrorism,
creation and/or distribution of viruses, Spam and so on. All such crimes are
computer related and facilitated crimes. With the evolution of the Internet,
along came another revolution of crime where the perpetrators commit acts of
crime and wrongdoing on the World Wide Web. Internet crime takes many
faces and is committed in diverse fashions. The number of users and their
diversity in their makeup has exposed the Internet to everyone. Some criminals
in the Internet have grown up understanding this superhighway of information,
unlike the older generation of users. This is why Internet crime has now become
a growing problem in the United States. Some crimes committed on the Internet
have been exposed to the world and some remain a mystery up until they are
perpetrated against someone or some company.
The different types of Internet crime vary in their design and how easily they
are able to be committed. Internet crimes can be separated into two different
categories. There are crimes that are only committed while being on the Internet
and are created exclusively because of the World Wide Web. The typical crimes
in criminal history are now being brought to a whole different level of
innovation and ingenuity. Such new crimes devoted to the Internet are email
―phishing‖, hijacking domain names, virus immistion, and cyber vandalism. A
couple of these crimes are activities that have been exposed and introduced into
the world. People have been trying to solve virus problems by installing virus
protection software and other software that can protect their computers. Other
crimes such as email ―phishing‖ are not as known to the public until an
individual receives one of these fraudulent emails. These emails are cover faced
by the illusion that the email is from your bank or another bank. When a person
reads the email he/she is informed of a problem with he/she personal account or
another individual wants to send the person some of their money and deposit it
directly into their account. The email asks for your personal account
information and when a person gives this information away, they are financing
the work of a criminal.
Email has fast emerged as the world's most preferred form of communication.
Billions of email messages traverse the globe daily. Like any other form of
communication, email is also misused by criminal elements. The ease, speed
and relative anonymity of email has made it a powerful tool for criminals. These
crimes are committed by a selected group of criminals. Unlike crimes using the
computer as a tool, these crimes require the technical knowledge of the
perpetrators. As such, as technology evolves, so too does the nature of the
crime. These crimes are relatively new, having been in existence for only as
long as computers have—which explains how unprepared society and the world
in general is towards combating these crimes. When the individual is the main
1782
International Journal of Pure and Applied Mathematics Special Issue
target of cybercrime, the computer can be considered as the tool rather than the
target. These crimes generally involve less technical expertise. Human
weaknesses are generally exploited. The damage dealt is largely psychological
and intangible, making legal action against the variants more difficult.(United
Nations 2010) These are the crimes which have existed for centuries in the
offline world. Scams, theft, and the likes have existed even before the
development in high-tech equipment. The same criminal has simply been given
a tool which increases his potential pool of victims and makes him all the harder
to trace and apprehend.
3. Research Methodology
The researcher has adopted doctrinal method of research and the entire paper is
in the form of analysis of the established procedures, thereby following
analytical mode of research. The primary sources for this research paper are the
Information Technology Act, 2000 and relevant judicial decisions. Secondary
sources include books, articles and web sources.
1783
International Journal of Pure and Applied Mathematics Special Issue
The different types of Internet crime vary in their design and how easily they
are able to be committed. Internet crimes can be separated into two different
categories. There are crimes that are only committed while being on the Internet
and are created exclusively because of the World Wide Web. The typical crimes
in criminal history are now being brought to a whole different level of
innovation and ingenuity. Such new crimes devoted to the Internet are email
―phishing‖, hijacking domain names, virus immistion, and cyber vandalism. A
couple of these crimes are activities that have been exposed and introduced into
the world. People have been trying to solve virus problems by installing virus
protection software and other software that can protect their computers. Other
crimes such as email ―phishing‖ are not as known to the public until an
individual receives one of these fraudulent emails. These emails are cover faced
by the illusion that the email is from your bank or another bank. When a person
reads the email he/she is informed of a problem with he/she personal account or
another individual wants to send the person some of their money and deposit it
directly into their account. The email asks for your personal account
information and when a person gives this information away, they are financing
the work of a criminal. (Wall 2007)
What is Email Related Crimes and its Types
Email has fast emerged as the world's most preferred form of communication.
Billions of email messages traverse the globe daily. Like any other form of
communication, email is also misused by criminal elements. The ease, speed
and relative anonymity of email has made it a powerful tool for criminals. These
crimes are committed by a selected group of criminals. Unlike crimes using the
computer as a tool, these crimes require the technical knowledge of the
perpetrators. As such, as technology evolves, so too does the nature of the
crime. These crimes are relatively new, having been in existence for only as
long as computers have-which explains how unprepared society and the world
in general is towards combating these crimes. When the individual is the main
target of cybercrime, the computer can be considered as the tool rather than the
target. These crimes generally involve less technical expertise. Human
weaknesses are generally exploited. The damage dealt is largely psychological
and intangible, making legal action against the variants more difficult. These are
the crimes which have existed for centuries in the offline world. Scams, theft,
and the likes have existed even before the development in high-tech equipment.
The same criminal has simply been given a tool which increases his potential
pool of victims and makes him all the harder to trace and apprehend.(Wall
2007; Computer Forensics and Cyber Crime: A...)
Email has fast emerged as the world's most preferred form of communication.
Billions of email messages traverse the globe daily. Like any other form of
communication, email is also misused by criminal elements. The ease, speed
and relative anonymity of email has made it a powerful tool for criminals.
1784
International Journal of Pure and Applied Mathematics Special Issue
A spoofed email is one that appears to originate from one source but has
actually emerged from another source. Falsifying the name and / or email
address of the originator of the email usually does email spoofing. usually to
send an email the sender has to enter the following information:
email address of the receiver of the email
email address(es) of the person(s) who will receive a copy of the email
(referred to as CC for carbon copy)
email address(es) of the person(s) who will receive a copy of the email
(referred to as CC for carbon copy, but whose identities will not be
known to the other recipients of the e-mail (known as BCC for blind
carbon copy)
Subject of the message (a short title / description of the message)
Message
Emails are often the fastest and easiest ways to propagate malicious code over
the Internet. The Love Bug virus, for instance, reached millions of computers
within 36 hours of its release from the Philippines thanks to email. Hackers
often bind Trojans, viruses, worms and other computer contaminants with e-
greeting cards and then email them to unsuspecting persons. Such contaminants
can also be bound with software that appears to be an antivirus patch. E.g. a
person receives an email from Compose From To CC BCC Subject.(Singer and
Friedman 2014; Glaessner et al. 2004; Viano 2016)
Message
1785
International Journal of Pure and Applied Mathematics Special Issue
Email Bombing
Email is a useful tool for technology savvy criminals thanks to the relative
anonymity offered by it. It becomes fairly easy for anyone with even a basic
knowledge of computers to become a blackmailer by threatening someone via
e-mail.
In a recent case, Poorva received an e-mail message from someone who called
him or herself 'your friend'. The attachment with the e-mail contained morphed
pornographic photographs of Poorva. The mail message said that if Poorva were
not to pay Rs. 10,000 at a specified place every month, the photographs would
be uploaded to the Net and then a copy sent to her fiancé. Scared, Poorva at first
complied with the wishes of the blackmailer and paid the first Rs. 10, 000. Next
month, she knew she would have to approach her parents. Then, trusting the
reasonableness of her fiancé she told him the truth. Together they approached
the police. Investigation turned up the culprit - Poorva's supposed friend who
wanted that Poorva and her fiancé should break up so that she would get her
chance with him.(Poulsen 2011)
Defamatory Emails
1786
International Journal of Pure and Applied Mathematics Special Issue
Email Frauds
The media seeing this as a story that would interest a lot of readers hyped it up
and played a vital role in spreading this misinformation. Mr. Rao then went to
many banks and individuals and told them that having won such a large sum of
money he was afraid for his safety. He also wanted to move into a better house.
He wheedled money out of these institutions and people by telling them that
since the lottery prize money would take some time to come to him, he would
like to borrow money from them. He assured them that the loan amount would
be returned as soon as the lottery money came into his possession. Lulled into
believing him (all thanks to the Income Tax clearance) most of these people
loaned large amounts of money to him. It was only when he did not pay back
the loan amounts to the banks that they became suspicious. A countercheck by
the authorities revealed the entire scheme. Mr. Rao was arrested. Later, it was
found that some of the money had been donated for philanthropic causes and
also to political parties(Dunbar 1570).
In this chapter, we will discuss about the existing provisions in the Indian laws
say Information Technology Act,2000 and the Indian Penal Code.
Section-65B
The computer from which record is generated was regularly used to
process or store information in respect of activity regularly carried on by
a person having lawful control over the period.
1787
International Journal of Pure and Applied Mathematics Special Issue
Emails that are defamatory in nature are punishable under Section 500 of the
Indian Penal Code (IPC), which prescribes an imprisonment of upto two years
or a fine or both.
Threatening emails are punishable under the provisions of the IPC pertaining to
criminal intimidation, insult and annoyance (Chapter XXII), extortion (Chapter
XVII)
Email Spoofing
1788
International Journal of Pure and Applied Mathematics Special Issue
of the criminal and judicial authorities, and establish an efficient mechanism for
international cooperation. In 1997, The G-8 Ministers agreed to ten "Principles
to Combat High-Tech Crime" and an "Action Plan to Combat High-Tech
Crime."
Main objectives
Create effective cyber crime laws,
Handle jurisdiction issues ,
Cooperate in international Investigations,
Develop acceptable practices for search and seizure,
Establish effective public/private sector interaction.[9]
Relevant Cases and Recent Incidents on Hoax Emails
The threatening emails and SMS were hitherto covered under Section 506
Indian Penal Code. However, with the insertion of Section 66A IT Act, in force
w.e.f. 27th October, 2009, these offending emails, SMS are covered under IT
Act.
Threatening Email to Naveen Patnaik, Chief Minister of Orissa: The
news report shows that various threatening emails have been sent to the
Chief Minister, Orissa Mr. Naveen Patnaik. A person was arrested and
the investigation revealed that though the e-mail was sent in the name of
one Prakash Behera alias Babuli Behera, the police nabbed his cousin
Pratap Behera (35) of Astaranga in Puri who confessed to the crime
during interrogation. The investigation revealed that the Prakash Behera
has no knowledge of Internet. The investigation revealed that Pratap’s
family had some land dispute with Prakash’s family and to settle a score
Pratap created an e-mail ID in the name of Prakash and sent the mail to
the Chief Minister. The case was registered u/s 66A IT Act, r/w 506
IPC.
Man arrested for making hoax call: A 25-year-old man was arrested
on 9TH May, 2010 for making an anonymous call warning that Delhi
Chief Minister Sheila Dikshit’s life was in danger. Veer Singh, a
resident of Farsh Vihar in east Delhi, allegedly made the call Thursday
to implicate a man who was harassing him to repay his dues. He had
stolen a mobile phone from Narela in outer Delhi to make the call to the
police control room and then called up the other man. Veer Singh
thought the police would track down the other person and arrest him in
connection with the death threat to the Delhi chief minister.
Threatening SMS sent to Shashi Tharoor, Ex-Union Minister for
State and other Parliamentarians: The accused person ―A‖ was
having animosity towards other person ―B‖ in a love triangle, and the A
in order to frame B, impersonated himself as B and send threatening
SMSs to parliamentarians. The various FIRs were registered u/s 66A IT
Act, r/w 506, 507, 509 IPC was registered in various police stations in
Delhi, Haryana and Himanchal Pradesh.[10]
1789
International Journal of Pure and Applied Mathematics Special Issue
The aforesaid incidents revealed that the offending SMS, emails were generally
send by the accused persons via electronic medium be it mobile phone or
computer network to implicate others. Thus, the alleged act of sending SMS via
mobile phone or offending or threatening Email involving criminal intimidation
including danger and obstruction are squarely covered under Section 66 A of
Information Technology Act, 2000 and there is no application of Section 506
IPC to the alleged act. It would be pertinent to mention here that the bail of the
accused person who sent threatening email to CM Naveen Patnaik was denied
because of the applicability of Section 506 IPC which in State of Orissa is non
bailable. However, the invoking of Section 506/507 IPC to the alleged act is not
correct by virtue of Section 81 of the Information Technology Act, 2000 which
gives an overriding effect to the provisions of the IT Act over the other Acts
including the Indian Penal Code. It clearly states that, ―the provisions of this
Act shall have effect notwithstanding anything inconsistent therewith
contained in any other law for the time being in force.‖ Thus, this section of
the Information Technology Act 2000 if read with Section 66A makes the
legislative mandate very clear & loud that in matters pertaining to threat or
criminal intimidation via a computer resource or communication device, the IT
Act 2000 would have an overriding effect over other law including the Indian
Penal Code in view of the clear mandate of Section 81 IT Act. The Section 81
IT Act, is reproduced below:-
“81. Act to have overriding effect.
Provided that nothing contained in this Act shall restrict any person from
exercising any right conferred under the Copyright Act, 1957 or the Patents
Act, 1970.”
Even otherwise, Hon’ble Apex Court in case titled as Suresh Nanda Vs.
C.B.I.[11] held that the Special Act prevails over General Acts. The author has
successfully represented the accused persons in the Shashi Tharoor SMS case
and secured their bail by successfully arguing that in view of the specific
provisions in the I.T. Acts, 2000, which are bailable in nature, the same would
have the overriding effect by virtue of non obstante clause in Section 81 IT Act
and the other offences of the IPC have been added by the prosecution merely for
the purpose of making the offence non bailable in nature and they are not
applicable. The author argued in length and stated vehemently before the
Session Court that as the result of the investigation done by the Delhi Police
which clearly reveals that the alleged act of threatening, criminal intimidation
and endanger was with the sole intention to harass the other person involved in
love triangle and clearly, there was no intention to execute the threat or commit
extortion which is one of the essential ingredients to bring home the offences
mentioned under Section 506 IPC. Even otherwise the offence u/s 506 IPC in
Delhi is bailable. Further, no overt act has been alleged to be done by the
1790
International Journal of Pure and Applied Mathematics Special Issue
accused persons which show any intention to execute the threat or extortion.
Bomb Hoax mail In 2009, a 15-year-old Bangalore teenager was arrested by the
cyber crime investigation cell (CCIC) of the city crime branch for allegedly
sending a hoax email to a private news channel. In the email, he claimed to have
planted five bombs in Mumbai, challenging the police to find them before it was
too late. At around 1pm. on May 25, the news channel received an email that
read: ―I have planted five bombs in Mumbai; you have two hours to find it.‖
The police, who were alerted immediately, traced the Internet Protocol (IP)
address to Vijay Nagar in Bangalore. The Internet service provider for the
account was BSNL, said officials.(Richardson 2014)In a joint operation with the
Bangalore police, CCIC investigators identified the perpetrator of the e-mail
and zeroed in on teenager Krishna Singh (name changed), son a local
businessman.
Singh was brought to Mumbai on Thursday night and arrested for criminal
intimidation. The Information Technology (amended) Acts section for cyber
terrorism, however, was not included in the charge sheet.
Curiosity, it appears, was the main motive. During the interrogation, Singh
allegedly told the police that he had no intention of committing any crime, but
simply wanted to know what would happen if he sent a hoax threat by email to a
news channel. Nevertheless, police officials said they checked his computer
thoroughly. Singh was sent to a juvenile remand home in Dongri, and was
granted bail later.
Jurisdiction to Investigate Cyber Crimes
In India, the concept of cyber offences and laws are new and witnessed only
few policies and laws. The main provisions which deal with the jurisdiction of
cyber law in the country, are section 75 of the information Technology Act.
Section 3 and 4 of IPC deals with the extra judicial power given to the Indian
courts in interpreting matters relating to deciding the jurisdiction of Indian
courts. The Delhi High court in SMC Pneumatics pvt.ltd v Jogesh Kwarta[13]
opined that the concept of consequences and cause of action extends jurisdiction
but a conflicting situation arises where there is no defined regulation at one of
the places. The Supreme Court has recognized the need of the judiciary to
interpret a statute by making allowances for any relevant technological change
that has occurred.
Section 46
1791
International Journal of Pure and Applied Mathematics Special Issue
have violated the provisions of the IT Act. The said Act stipulates that the
inquiry will be carried out in the manner as prescribed by the Central
Government.
1792
International Journal of Pure and Applied Mathematics Special Issue
6. Conclusion
ASLU Survey published in March 2003-Incidence of Cyber crime in India Non
Reporting-causes
60% feared negative publicity
23% did not know police equipped to handle cyber crimes
9% feared further cyber attacks
8% had no awareness of cyber laws
False arrest concerns
Mumbai Cyber lab is a joint initiative of Mumbai police and
NASSCOM –more exchange and coordination of this kind.(Kannan and
Jayanthi Kannan 2017)
The above mentioned survey shows that the present cyber crimes prevention
system in India is ineffective and it needs several further amendments regarding
the technicalities and the growing technology advancements. More provisions to
be included regarding the hoax email and the email bombing offences and their
specific punishments. Suggested amendments to the IT Act,2000-new
provisions for child pornography, etc
More Public awareness campaigns
Training of police officers to effectively combat cyber crimes
More Cyber crime police cells set up across the country
Effective E-surveillance
Websites aid in creating awareness and encouraging reporting of cyber
crime cases.
Specialised Training of forensic investigators and experts
Active coordination between police and other law enforcement agencies
and authorities is required.
References
[1] https://en.wikipedia.org/wiki/Cybercrime, lastly visited on
26/05/2018.
[2] Moore, R. (2005) "Cyber crime: Investigating High-Technology
Computer Crime," Cleveland, Mississippi: Anderson Publishing.
[3] http://www.cyberlawsindia.net/internet-crime.html, lastly visited
on 26/05/2018.
[4] https://en.wikipedia.org/wiki/Cybercrime, lastly visited on
26/05/2018.
[5] Moore, R. (2005) "Cyber crime: Investigating High-Technology
Computer Crime," Cleveland, Mississippi: Anderson Publishing.
[6] http://www.cyberlawsindia.net/internet-crime.html, lastly visited
on 26/05/2018.
1793
International Journal of Pure and Applied Mathematics Special Issue
1794
1795
1796