Top Banner
Combating Cyber crimes- Combating Cyber crimes- Law & Law & Enforcement in India Enforcement in India The 'Diamond Jubilee Celebration The 'Diamond Jubilee Celebration Conference of CIRC Conference of CIRC '. '. Kanpur ,5th July, 2008 Kanpur ,5th July, 2008 - Karnika Seth, Partner & Cyber Lawyer Karnika Seth, Partner & Cyber Lawyer - SETH ASSOCIATES SETH ASSOCIATES ADVOCATES & LEGAL CONSULTANTS ADVOCATES & LEGAL CONSULTANTS Copyright© Seth Associates 2008 Copyright© Seth Associates 2008
38

Combating Cyber crimes- Law & Enforcement in India The 'Diamond Jubilee Celebration Conference of CIRC'. The 'Diamond Jubilee Celebration Conference of.

Mar 26, 2015

Download

Documents

Gabrielle Brown
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Combating Cyber crimes- Law & Enforcement in India The 'Diamond Jubilee Celebration Conference of CIRC'. The 'Diamond Jubilee Celebration Conference of.

Combating Cyber crimes- Combating Cyber crimes- Law & Law & Enforcement in IndiaEnforcement in India

The 'Diamond Jubilee Celebration The 'Diamond Jubilee Celebration Conference of CIRCConference of CIRC'.'.

    Kanpur ,5th July, 2008Kanpur ,5th July, 2008

- Karnika Seth, Partner & Cyber LawyerKarnika Seth, Partner & Cyber Lawyer- SETH ASSOCIATESSETH ASSOCIATES

ADVOCATES & LEGAL CONSULTANTSADVOCATES & LEGAL CONSULTANTSCopyright© Seth Associates 2008Copyright© Seth Associates 2008

Page 2: Combating Cyber crimes- Law & Enforcement in India The 'Diamond Jubilee Celebration Conference of CIRC'. The 'Diamond Jubilee Celebration Conference of.

Introduction to Cyber Introduction to Cyber crimecrime Computer CrimeComputer Crime, , E-E-

CrimeCrime, , Hi-Tech CrimeHi-Tech Crime or or Electronic CrimeElectronic Crime is where is where a a computercomputer is the target of is the target of a a crimecrime or is the means or is the means adopted to commit a crime. adopted to commit a crime.

Most of these crimes are Most of these crimes are not new. Criminals simply not new. Criminals simply devise different ways to devise different ways to undertake standard undertake standard criminal activities such as criminal activities such as fraud, theft, blackmail, fraud, theft, blackmail, forgery, and embezzlement forgery, and embezzlement using the new medium, using the new medium, often involving the Internet often involving the Internet

Page 3: Combating Cyber crimes- Law & Enforcement in India The 'Diamond Jubilee Celebration Conference of CIRC'. The 'Diamond Jubilee Celebration Conference of.

Computer vulnerabilityComputer vulnerability

Computers store huge amounts of data in small spacesComputers store huge amounts of data in small spaces Ease of accessEase of access Complexity of technologyComplexity of technology Human errorHuman error One of the key elements that keeps most members of any society honest is One of the key elements that keeps most members of any society honest is

fear of being caught — the deterrence factor. Cyberspace changes two of fear of being caught — the deterrence factor. Cyberspace changes two of those rules. First, it offers the criminal an opportunity of attacking his victims those rules. First, it offers the criminal an opportunity of attacking his victims from the remoteness of a different continent and secondly, the results of the from the remoteness of a different continent and secondly, the results of the crime are not immediately apparent.crime are not immediately apparent.

Need new laws and upgraded technology to combat cyber crimes Need new laws and upgraded technology to combat cyber crimes

Page 4: Combating Cyber crimes- Law & Enforcement in India The 'Diamond Jubilee Celebration Conference of CIRC'. The 'Diamond Jubilee Celebration Conference of.

Types of Cyber crimesTypes of Cyber crimes

Credit card fraudsCredit card frauds Cyber pornography Cyber pornography Sale of illegal articles-Sale of illegal articles-

narcotics, weapons, wildlifenarcotics, weapons, wildlife Online gamblingOnline gambling Intellectual Property crimes- Intellectual Property crimes-

software piracy, copyright software piracy, copyright infringement, trademarks infringement, trademarks violations, theft of computer violations, theft of computer source code source code

Email spoofingEmail spoofing ForgeryForgery DefamationDefamation Cyber stalking (section 509 Cyber stalking (section 509

IPC)IPC) Phising Phising Cyber terrorism Cyber terrorism

Crime against persons

Crime against Government

Crime against property

Page 5: Combating Cyber crimes- Law & Enforcement in India The 'Diamond Jubilee Celebration Conference of CIRC'. The 'Diamond Jubilee Celebration Conference of.

Computer VirusesComputer Viruses

VirusesViruses A computer virus is a A computer virus is a

computer program that computer program that can infect other can infect other computer programs by computer programs by modifying them in such modifying them in such a way as to include a a way as to include a (possibly evolved) copy (possibly evolved) copy of it. Note that a of it. Note that a program does not have program does not have to perform outright to perform outright damage (such as damage (such as deleting or corrupting deleting or corrupting files) in order to be files) in order to be called a "virus".called a "virus".

Viruses

File infectors

Boot record infectors

Boot and file

viruses

Page 6: Combating Cyber crimes- Law & Enforcement in India The 'Diamond Jubilee Celebration Conference of CIRC'. The 'Diamond Jubilee Celebration Conference of.

Cyber crimes

Hacking Information

TheftE-mail

bombingSalami attacks

Denial of Service attacks

Trojan attacks

Web jacking

Page 7: Combating Cyber crimes- Law & Enforcement in India The 'Diamond Jubilee Celebration Conference of CIRC'. The 'Diamond Jubilee Celebration Conference of.

Combating cyber Combating cyber crimescrimes Technological measures-Technological measures-

Public key cryptography, Public key cryptography, Digital signatures ,Firewalls, Digital signatures ,Firewalls, honey potshoney pots

Cyber investigation-Cyber investigation- Computer Computer forensics is the process of forensics is the process of identifying, preserving, identifying, preserving, analyzing and presenting analyzing and presenting digital evidence in a manner digital evidence in a manner that is legally acceptable in that is legally acceptable in courts of law.courts of law.

These rules of evidence These rules of evidence include admissibility (in include admissibility (in courts), authenticity (relation courts), authenticity (relation to incident), completeness, to incident), completeness, reliability and believability. reliability and believability.

Legal framework-laws & Legal framework-laws & enforcementenforcement

Page 8: Combating Cyber crimes- Law & Enforcement in India The 'Diamond Jubilee Celebration Conference of CIRC'. The 'Diamond Jubilee Celebration Conference of.

International International initiativesinitiatives Representatives from the 26 Representatives from the 26

Council of Europe members, the Council of Europe members, the United States, Canada, Japan and United States, Canada, Japan and South Africa in 2001 signed a South Africa in 2001 signed a convention on cybercrime in efforts convention on cybercrime in efforts to enhance international to enhance international cooperation in combating cooperation in combating computer-based crimes. computer-based crimes.

The The Convention on CybercrimeConvention on Cybercrime, , drawn up by experts of the Council drawn up by experts of the Council of Europe, is designed to coordinate of Europe, is designed to coordinate these countries' policies and laws these countries' policies and laws on penalties on crimes in on penalties on crimes in cyberspace, define the formula cyberspace, define the formula guaranteeing the efficient operation guaranteeing the efficient operation of the criminal and judicial of the criminal and judicial authorities, and establish an authorities, and establish an efficient mechanism for efficient mechanism for international cooperation. international cooperation.

In 1997, The In 1997, The G-8 MinistersG-8 Ministers agreed agreed to ten "Principles to Combat High-to ten "Principles to Combat High-Tech Crime" and an "Action Plan to Tech Crime" and an "Action Plan to Combat High-Tech CrimeCombat High-Tech Crime." ."

Main objectives-Main objectives- Create effective cyber Create effective cyber

crime laws crime laws Handle jurisdiction Handle jurisdiction

issues issues Cooperate in Cooperate in

international international investigations investigations

Develop acceptable Develop acceptable practices for search and practices for search and seizure seizure

Establish effective Establish effective public/private sector public/private sector interaction interaction

Page 9: Combating Cyber crimes- Law & Enforcement in India The 'Diamond Jubilee Celebration Conference of CIRC'. The 'Diamond Jubilee Celebration Conference of.

Frequency of incidents of Cyber crimes in India

Source: Survey conducted by ASCL

Denial of Service: Section 43

Virus: Section: 66, 43

Data Alteration: Sec. 66

U/A Access: Section 43

Email Abuse: Sec. 67, 500, Other IPC Sections

Data Theft: Sec 66, 65

99

Page 10: Combating Cyber crimes- Law & Enforcement in India The 'Diamond Jubilee Celebration Conference of CIRC'. The 'Diamond Jubilee Celebration Conference of.

10

No. of Indian web-sites defaced

4411002

2219

7039

0

1000

2000

3000

4000

5000

6000

7000

8000

1998 1999 2000 2001

Page 11: Combating Cyber crimes- Law & Enforcement in India The 'Diamond Jubilee Celebration Conference of CIRC'. The 'Diamond Jubilee Celebration Conference of.

11

Number of Indian sites hacked

Site of BARC-panic all around

0

6

12

25

0

5

10

15

20

25

1998 1999 2000 2001

Page 12: Combating Cyber crimes- Law & Enforcement in India The 'Diamond Jubilee Celebration Conference of CIRC'. The 'Diamond Jubilee Celebration Conference of.

REPORTED CASES

• State versus Amit Pasari and Kapil Juneja• Delhi Police

– M/s Softweb Solutions– Website www.go2nextjob.com hosted– Complaint of hacking by web hosting service

• State versus Joseph Jose– Delhi Police

• Hoax Email - Purported planting of 6 bombs in bombs in Connaught Place

• State versus Aneesh Chopra– Delhi Police

• Three company websites hacked• Accused: An ex -employee

• State versus K R Vijayakumar– Bangalore Cyber Crime Police Station, 2001

• Criminal intimidation of employers and crashing the company’s server

• Phoenix Global solutions

1212

Page 13: Combating Cyber crimes- Law & Enforcement in India The 'Diamond Jubilee Celebration Conference of CIRC'. The 'Diamond Jubilee Celebration Conference of.

2001 CSI/FBI Computer Crime and Security Survey

Of the organizations suffering security compromises in the last year – 95% had Firewalls and 61%had IDSs

981009896Anti-virus software

90929389Access Control

%%%%SECURITY TECHNOLOGIES USED

64626150Encrypted Files

95789181Firewalls

61504235Intrusion Detection Systems

2001200019991998

•False sense of security – “We already have a Firewall”

13

Page 14: Combating Cyber crimes- Law & Enforcement in India The 'Diamond Jubilee Celebration Conference of CIRC'. The 'Diamond Jubilee Celebration Conference of.

What is India inc’s What is India inc’s biggest threat?biggest threat? Cyber crime is now a bigger threat to India Inc Cyber crime is now a bigger threat to India Inc

than physical crime. In a recent survey by IBM, a than physical crime. In a recent survey by IBM, a greater number of companies (44%) listed cyber greater number of companies (44%) listed cyber crime as a bigger threat to their profitability than crime as a bigger threat to their profitability than physical crime (31%). physical crime (31%).

The cost of cyber crime stems primarily from loss The cost of cyber crime stems primarily from loss of revenue, loss of market capitalisation, damage of revenue, loss of market capitalisation, damage to the brand, and loss of customers, in that order. to the brand, and loss of customers, in that order.

About 67% local Chief Information Officers (CIOs) About 67% local Chief Information Officers (CIOs) who took part in the survey perceived cyber crime who took part in the survey perceived cyber crime as more costly, compared to the global as more costly, compared to the global benchmark of 50%. benchmark of 50%.

Page 15: Combating Cyber crimes- Law & Enforcement in India The 'Diamond Jubilee Celebration Conference of CIRC'. The 'Diamond Jubilee Celebration Conference of.

Combating Cyber crime-Combating Cyber crime-Indian legal frameworkIndian legal framework Information Technology Act, 2000-came into force on Information Technology Act, 2000-came into force on

17 October 200017 October 2000 Extends to whole of India and also applies to any Extends to whole of India and also applies to any

offence or contravention there under committed offence or contravention there under committed outside India by any person {section 1 (2)} outside India by any person {section 1 (2)}

read with Section 75- Act applies to offence or read with Section 75- Act applies to offence or contravention contravention committed outside Indiacommitted outside India by any person by any person irrespective of his nationality,irrespective of his nationality, if such act involves a if such act involves a computer, computer system or computer, computer system or network located in network located in IndiaIndia

Section 2 (1) (a) –”Access” means gaining entry Section 2 (1) (a) –”Access” means gaining entry into ,instructing or communicating with the logical, into ,instructing or communicating with the logical, arithmetic or memory function resources of a arithmetic or memory function resources of a computer, computer resource or networkcomputer, computer resource or network

IT Act confers legal recognition to electronic records IT Act confers legal recognition to electronic records and digital signatures (section 4,5 of the IT Act,2000) and digital signatures (section 4,5 of the IT Act,2000)

Page 16: Combating Cyber crimes- Law & Enforcement in India The 'Diamond Jubilee Celebration Conference of CIRC'. The 'Diamond Jubilee Celebration Conference of.

Civil Wrongs under IT Civil Wrongs under IT ActAct Chapter IX of IT Act, Section 43Chapter IX of IT Act, Section 43 Whoever Whoever without permissionwithout permission of owner of the of owner of the

computercomputer– Secures access (mere U/A access)Secures access (mere U/A access)

Not necessarily through a networkNot necessarily through a network– Downloads, copies, extracts any dataDownloads, copies, extracts any data– Introduces or causes to be introduced any viruses or Introduces or causes to be introduced any viruses or

contaminantcontaminant– Damages or causes to be damaged any computer resourceDamages or causes to be damaged any computer resource

Destroy, alter, delete, add, modify or rearrangeDestroy, alter, delete, add, modify or rearrange Change the format of a fileChange the format of a file

– Disrupts or causes disruption of any computer resourceDisrupts or causes disruption of any computer resource Preventing normal continuance ofPreventing normal continuance of

Page 17: Combating Cyber crimes- Law & Enforcement in India The 'Diamond Jubilee Celebration Conference of CIRC'. The 'Diamond Jubilee Celebration Conference of.

– Denies or causes denial of access by any Denies or causes denial of access by any meansmeans

Denial of service attacksDenial of service attacks

– Assists any person to do any thing aboveAssists any person to do any thing above Rogue Websites, Search Engines, Insiders Rogue Websites, Search Engines, Insiders

providing vulnerabilitiesproviding vulnerabilities

– Charges the services availed by a person to Charges the services availed by a person to the account of another person by tampering the account of another person by tampering or manipulating any computer resourceor manipulating any computer resource

Credit card frauds, Internet time theftsCredit card frauds, Internet time thefts

– Liable to pay damages not exceeding Rs. Liable to pay damages not exceeding Rs. One crore to the affected partyOne crore to the affected party

– Investigation byInvestigation by– ADJUDICATING OFFICERADJUDICATING OFFICER– Powers of a civil courtPowers of a civil court

Page 18: Combating Cyber crimes- Law & Enforcement in India The 'Diamond Jubilee Celebration Conference of CIRC'. The 'Diamond Jubilee Celebration Conference of.

Section 46 IT ActSection 46 IT Act

Section 46Section 46 of the IT Act states that an adjudicating of the IT Act states that an adjudicating officer shall be adjudging whether a person has officer shall be adjudging whether a person has committed a contravention of any of the provisions of committed a contravention of any of the provisions of the said Act, by holding an inquiry. Principles of audi the said Act, by holding an inquiry. Principles of audi alterum partum and natural justice are enshrined in alterum partum and natural justice are enshrined in the said section which stipulates that a reasonable the said section which stipulates that a reasonable opportunity of making a representation shall be opportunity of making a representation shall be granted to the concerned person who is alleged granted to the concerned person who is alleged to have violated the provisions of the IT Act. The said to have violated the provisions of the IT Act. The said Act stipulates that the inquiry will be carried out in the Act stipulates that the inquiry will be carried out in the manner as prescribed by the Central Governmentmanner as prescribed by the Central Government

All proceedings before him are deemed to be judicial All proceedings before him are deemed to be judicial proceedings, every Adjudicating Officer has all powers proceedings, every Adjudicating Officer has all powers conferred on civil courtsconferred on civil courts

Appeal to cyber Appellate Tribunal- from decision of Appeal to cyber Appellate Tribunal- from decision of Controller, Adjudicating Officer {section 57 IT act} Controller, Adjudicating Officer {section 57 IT act}

Page 19: Combating Cyber crimes- Law & Enforcement in India The 'Diamond Jubilee Celebration Conference of CIRC'. The 'Diamond Jubilee Celebration Conference of.

Section 47, IT ActSection 47, IT Act

Section 47Section 47 of the Act lays down that while of the Act lays down that while adjudging the quantum of compensation adjudging the quantum of compensation under this Act, the adjudicating officer shall under this Act, the adjudicating officer shall have due regard to the following factors, have due regard to the following factors, namely-namely-

(a) the amount of gain of unfair advantage, (a) the amount of gain of unfair advantage, wherever quantifiable, made as a result of the wherever quantifiable, made as a result of the default; default;

(b) the amount of loss caused to any (b) the amount of loss caused to any person as a result of the default; person as a result of the default;

(c) the repetitive nature of the default(c) the repetitive nature of the default

Page 20: Combating Cyber crimes- Law & Enforcement in India The 'Diamond Jubilee Celebration Conference of CIRC'. The 'Diamond Jubilee Celebration Conference of.

Section 65: Source Section 65: Source CodeCode Most important asset of software companiesMost important asset of software companies ““Computer Source Code" means the listing Computer Source Code" means the listing

of programmes, computer commands, of programmes, computer commands, design and layoutdesign and layout

IngredientsIngredients– Knowledge or intention Knowledge or intention – Concealment, destruction, alterationConcealment, destruction, alteration– computer source code required to be kept or computer source code required to be kept or

maintained by lawmaintained by law PunishmentPunishment

– imprisonment up to three years and / orimprisonment up to three years and / or– fine up to Rs. 2 lakhfine up to Rs. 2 lakh

Page 21: Combating Cyber crimes- Law & Enforcement in India The 'Diamond Jubilee Celebration Conference of CIRC'. The 'Diamond Jubilee Celebration Conference of.

Section 66: Hacking

• Ingredients– Intention or Knowledge to cause wrongful loss

or damage to the public or any person– Destruction, deletion, alteration, diminishing

value or utility or injuriously affecting information residing in a computer resource

• Punishment– imprisonment up to three years, and / or – fine up to Rs. 2 lakh

• Cognizable, Non Bailable,

21

Section 66 covers data theft aswell as data alterationSection 66 covers data theft aswell as data alteration

Page 22: Combating Cyber crimes- Law & Enforcement in India The 'Diamond Jubilee Celebration Conference of CIRC'. The 'Diamond Jubilee Celebration Conference of.

Sec. 67. PornographySec. 67. Pornography IngredientsIngredients

– Publishing or transmitting or causing to be published Publishing or transmitting or causing to be published – in the electronic form, in the electronic form, – Obscene materialObscene material

PunishmentPunishment– On first convictionOn first conviction

imprisonment of either description up to five years and imprisonment of either description up to five years and fine up to Rs. 1 lakhfine up to Rs. 1 lakh

– On subsequent conviction On subsequent conviction imprisonment of either description up to ten years and imprisonment of either description up to ten years and fine up to Rs. 2 lakhfine up to Rs. 2 lakh

Section coversSection covers– Internet Service Providers,Internet Service Providers,– Search engines, Search engines, – Pornographic websitesPornographic websites

Cognizable, Non-Bailable, JMIC/ Court of SessionsCognizable, Non-Bailable, JMIC/ Court of Sessions

Page 23: Combating Cyber crimes- Law & Enforcement in India The 'Diamond Jubilee Celebration Conference of CIRC'. The 'Diamond Jubilee Celebration Conference of.

Sec 69: Decryption of Sec 69: Decryption of informationinformation IngredientsIngredients

– Controller issues order to Government agency to Controller issues order to Government agency to intercept any information transmitted through any intercept any information transmitted through any computer resource. computer resource.

– Order is issued in the interest of theOrder is issued in the interest of the sovereignty or integrity of India, sovereignty or integrity of India, the security of the State, the security of the State, friendly relations with foreign States, friendly relations with foreign States, public order or public order or preventing incitement for commission of a cognizable preventing incitement for commission of a cognizable

offenceoffence

– Person in charge of the computer resource fails to Person in charge of the computer resource fails to extend all facilities and technical assistance to extend all facilities and technical assistance to decrypt the information-punishment upto 7 years.decrypt the information-punishment upto 7 years.

Page 24: Combating Cyber crimes- Law & Enforcement in India The 'Diamond Jubilee Celebration Conference of CIRC'. The 'Diamond Jubilee Celebration Conference of.

Sec 70 Protected Sec 70 Protected SystemSystem IngredientsIngredients

– Securing unauthorised access or attempting to Securing unauthorised access or attempting to secure unauthorised accesssecure unauthorised access

– to ‘protected system’to ‘protected system’ Acts covered by this section:Acts covered by this section:

– Switching computer on / off Switching computer on / off – Using installed software / hardwareUsing installed software / hardware– Installing software / hardwareInstalling software / hardware– Port scanningPort scanning

PunishmentPunishment– Imprisonment up to 10 years and fineImprisonment up to 10 years and fine

Cognizable, Non-Bailable, Court of SessionsCognizable, Non-Bailable, Court of Sessions

Page 25: Combating Cyber crimes- Law & Enforcement in India The 'Diamond Jubilee Celebration Conference of CIRC'. The 'Diamond Jubilee Celebration Conference of.

Cyber crimes Cyber crimes punishable under punishable under various Indian lawsvarious Indian laws Sending pornographic or obscene emails are punishable under Section 67 of the

IT Act.

An offence under this section is punishable on first conviction with imprisonment for a term, which may extend to five years and with fine, which may extend to One lakh rupees.

In the event of a second or subsequent conviction the recommended

punishment is imprisonment for a term, which may extend to ten years and also with fine which may extend to Two lakh rupees.

Emails that are defamatory in nature are punishable under Section 500 of the Indian Penal Code (IPC), which recommends an imprisonment of upto two years or a fine or both.

Threatening emails are punishable under the provisions of the IPC pertaining to criminal intimidation, insult and annoyance (Chapter XXII), extortion (Chapter XVII)

Email spoofingEmail spoofing is covered under provisions of the IPC relating tofraud, cheating by personation (Chapter XVII), forgery (Chapter XVIII)

Page 26: Combating Cyber crimes- Law & Enforcement in India The 'Diamond Jubilee Celebration Conference of CIRC'. The 'Diamond Jubilee Celebration Conference of.

Arms ActOnline sale of Arms

Sec. 383 IPCWeb-Jacking

NDPS ActOnline sale of Drugs

Sec 416, 417, 463 IPCEmail spoofing

Sec 420 IPCBogus websites, cyber frauds

Sec 463, 470, 471 IPCForgery of electronic records

Sec 499, 500 IPCSending defamatory messages by email

Sec 503 IPC Sending threatening messages by email

Computer Related Crimes under IPC and Special Laws

26

Page 27: Combating Cyber crimes- Law & Enforcement in India The 'Diamond Jubilee Celebration Conference of CIRC'. The 'Diamond Jubilee Celebration Conference of.

Cognizability and Bailability

• Not mentioned in the Act

– Rely on Part II of Schedule I of CrPC• If punishable with death, imprisonment for life or

imprisonment for more than 7 years: Cognizable, Non-Bailable, Court of Session

• If punishable with imprisonment for 3 years and upwards but not more than 7 years: Cognizable, Non -Bailable, Magistrate of First Class

• If punishable with imprisonment of less than 3 years: Non-Cognizable, Bailable, Any Magistrate (or Controller of CAs)

27

Page 28: Combating Cyber crimes- Law & Enforcement in India The 'Diamond Jubilee Celebration Conference of CIRC'. The 'Diamond Jubilee Celebration Conference of.

Power of Police to Power of Police to InvestigateInvestigate Section 156 Cr.P.C. : Power to Section 156 Cr.P.C. : Power to

investigate cognizable offences. investigate cognizable offences. Section 155 Cr.P.C. : Power to Section 155 Cr.P.C. : Power to

investigate non cognizable investigate non cognizable offences.offences.

Section 91 Cr.P.C. : Summon to Section 91 Cr.P.C. : Summon to produce documents.produce documents.

Section 160 Cr.P.C. : Summon to Section 160 Cr.P.C. : Summon to require attendance of witnesses.require attendance of witnesses.

Page 29: Combating Cyber crimes- Law & Enforcement in India The 'Diamond Jubilee Celebration Conference of CIRC'. The 'Diamond Jubilee Celebration Conference of.

Power of Police to investigate Power of Police to investigate (contd.)(contd.)

Section 165 Cr.P.C. : Search by police Section 165 Cr.P.C. : Search by police officer.officer.

Section 93 Cr.P.C : General provision as to Section 93 Cr.P.C : General provision as to search warrants.search warrants.

Section 47 Cr.P.C. : Search to arrest the Section 47 Cr.P.C. : Search to arrest the accused.accused.

Section 78 of IT Act, 2000 : Power to Section 78 of IT Act, 2000 : Power to investigate offences-not below rank of investigate offences-not below rank of DSP.DSP.

Section 80 of IT Act, 2000 : Power of police Section 80 of IT Act, 2000 : Power of police officer to enter any public place and officer to enter any public place and search & arrest.search & arrest.

Page 30: Combating Cyber crimes- Law & Enforcement in India The 'Diamond Jubilee Celebration Conference of CIRC'. The 'Diamond Jubilee Celebration Conference of.

Case Study- BPO Data Case Study- BPO Data TheftTheft The recently reported case of a The recently reported case of a

Bank Fraud in Pune in which some Bank Fraud in Pune in which some ex employees of  BPO arm of ex employees of  BPO arm of MPhasis Ltd MsourcE, defrauded MPhasis Ltd MsourcE, defrauded US Customers of Citi Bank to the US Customers of Citi Bank to the tune of RS 1.5 crores has raised tune of RS 1.5 crores has raised concerns of many kinds including concerns of many kinds including the role of "Data Protection". the role of "Data Protection".

Page 31: Combating Cyber crimes- Law & Enforcement in India The 'Diamond Jubilee Celebration Conference of CIRC'. The 'Diamond Jubilee Celebration Conference of.

Case Study (contd.)Case Study (contd.)

The crime was obviously committed using "Unauthorized The crime was obviously committed using "Unauthorized Access" to the "Electronic Account Space" of the customers. Access" to the "Electronic Account Space" of the customers. It is therefore firmly within the domain of "Cyber Crimes". It is therefore firmly within the domain of "Cyber Crimes".

ITA-2000 is versatile enough to accommodate the aspects of ITA-2000 is versatile enough to accommodate the aspects of crime not covered by ITA-2000 but covered by other crime not covered by ITA-2000 but covered by other statutes since any IPC offence committed with the use of statutes since any IPC offence committed with the use of "Electronic Documents" can be considered as a crime with "Electronic Documents" can be considered as a crime with the use of a "Written Documents". "Cheating", "Conspiracy", the use of a "Written Documents". "Cheating", "Conspiracy", "Breach of Trust" etc are therefore applicable in the above "Breach of Trust" etc are therefore applicable in the above case in addition to section in ITA-2000. case in addition to section in ITA-2000.

Under ITA-2000 the offence is recognized both under Section Under ITA-2000 the offence is recognized both under Section 66 and Section 43. Accordingly, the persons involved are 66 and Section 43. Accordingly, the persons involved are liable for imprisonment and fine as well as a liability to pay liable for imprisonment and fine as well as a liability to pay damage to the victims to the maximum extent of Rs 1 crore damage to the victims to the maximum extent of Rs 1 crore per victim for which the "Adjudication Process" can be per victim for which the "Adjudication Process" can be invoked. invoked.

Page 32: Combating Cyber crimes- Law & Enforcement in India The 'Diamond Jubilee Celebration Conference of CIRC'. The 'Diamond Jubilee Celebration Conference of.

Case Study (contd.)Case Study (contd.)

The BPO is liable for lack of security that enabled the commission of The BPO is liable for lack of security that enabled the commission of the fraud as well as because of the vicarious responsibility for the the fraud as well as because of the vicarious responsibility for the ex-employee's involvement. The process of getting the PIN number ex-employee's involvement. The process of getting the PIN number was during the tenure of the persons as "Employees" and hence the was during the tenure of the persons as "Employees" and hence the organization is responsible for the crime. organization is responsible for the crime.

Some of the persons who have assisted others in the commission of Some of the persons who have assisted others in the commission of the crime even though they may not be directly involved as the crime even though they may not be directly involved as beneficiaries will also be liable under Section 43 of ITA-2000. beneficiaries will also be liable under Section 43 of ITA-2000.

Under Section 79 and Section 85 of ITA-2000, vicarious Under Section 79 and Section 85 of ITA-2000, vicarious responsibilities are indicated both for the BPO and the Bank on the responsibilities are indicated both for the BPO and the Bank on the grounds of "Lack of Due Diligence". grounds of "Lack of Due Diligence".

At the same time, if the crime is investigated in India under ITA-At the same time, if the crime is investigated in India under ITA-2000, then the fact that the Bank was not using digital signatures 2000, then the fact that the Bank was not using digital signatures for authenticating the customer instructions is a matter which would for authenticating the customer instructions is a matter which would amount to gross negligence on the part of the Bank. (However, in amount to gross negligence on the part of the Bank. (However, in this particular case since the victims appear to be US Citizens and this particular case since the victims appear to be US Citizens and the Bank itself is US based, the crime may come under the the Bank itself is US based, the crime may come under the jurisdiction of the US courts and not Indian Courts). jurisdiction of the US courts and not Indian Courts).

Page 33: Combating Cyber crimes- Law & Enforcement in India The 'Diamond Jubilee Celebration Conference of CIRC'. The 'Diamond Jubilee Celebration Conference of.

Case Study- Case of Extortion Case Study- Case of Extortion of Money Through Internetof Money Through Internet

• The complainant has received a The complainant has received a threatening email demanding protection threatening email demanding protection from unknown person claiming to be the from unknown person claiming to be the member of Halala Gang, Dubai. Police member of Halala Gang, Dubai. Police registered a case u/s. 384/506/511 IPC.registered a case u/s. 384/506/511 IPC.

• The sender of the email used the email The sender of the email used the email ID [email protected] & [email protected] ID [email protected] & [email protected] and signed as Chengez Babar.and signed as Chengez Babar.

Page 34: Combating Cyber crimes- Law & Enforcement in India The 'Diamond Jubilee Celebration Conference of CIRC'. The 'Diamond Jubilee Celebration Conference of.

Case Study (contd.)Case Study (contd.)

• Both the email accounts were Both the email accounts were tracked, detail collected from tracked, detail collected from ISP’s & locations were identified.ISP’s & locations were identified.

• The Cyber cafes from which the The Cyber cafes from which the emails has been made were emails has been made were monitored and the accused monitored and the accused person was nabbed red handed.person was nabbed red handed.

Page 35: Combating Cyber crimes- Law & Enforcement in India The 'Diamond Jubilee Celebration Conference of CIRC'. The 'Diamond Jubilee Celebration Conference of.

FIR NO 76/02 PSFIR NO 76/02 PS PARLIAMENT STREETPARLIAMENT STREET

FIR NO 76/02 PSFIR NO 76/02 PS PARLIAMENT STREETPARLIAMENT STREET

Mrs. SONIA GANDHI RECEIVED THREATING Mrs. SONIA GANDHI RECEIVED THREATING E-MAILSE-MAILS

E- MAIL FROM E- MAIL FROM – [email protected]@khalsa.com– [email protected]@hotmail.com

THE CASE WAS REFERRED THE CASE WAS REFERRED ACCUSED PERSON LOST HIS PARENTS ACCUSED PERSON LOST HIS PARENTS

DURING 1984 RIOTSDURING 1984 RIOTS

35

Page 36: Combating Cyber crimes- Law & Enforcement in India The 'Diamond Jubilee Celebration Conference of CIRC'. The 'Diamond Jubilee Celebration Conference of.

ASLU Survey published in ASLU Survey published in March 2003-Incidence of March 2003-Incidence of Cyber crime in IndiaCyber crime in India

UNAUTHORISED ACCESS 19%

E-MAIL ABUSE 21%

DATA THEFT 33%

Non Reporting-causesNon Reporting-causes 60% feared negative 60% feared negative

publicitypublicity 23% did not know 23% did not know

police equipped to police equipped to handle cyber crimeshandle cyber crimes

9% feared further 9% feared further cyber attackscyber attacks

8% had no awareness 8% had no awareness of cyber lawsof cyber laws

False arrest concernsFalse arrest concerns

Page 37: Combating Cyber crimes- Law & Enforcement in India The 'Diamond Jubilee Celebration Conference of CIRC'. The 'Diamond Jubilee Celebration Conference of.

Better Enforcement Better Enforcement initiatives initiatives Mumbai Cyber lab is a joint initiative of Mumbai police Mumbai Cyber lab is a joint initiative of Mumbai police

and NASSCOM –more exchange and coordination of this and NASSCOM –more exchange and coordination of this kindkind

Suggested amendments to the IT Act,2000-new Suggested amendments to the IT Act,2000-new provisions for child pornography, etcprovisions for child pornography, etc

More Public awareness campaignsMore Public awareness campaigns Training of police officers to effectively combat cyber Training of police officers to effectively combat cyber

crimescrimes More Cyber crime police cells set up across the countryMore Cyber crime police cells set up across the country Effective E-surveillance Effective E-surveillance Websites aid in creating awareness and encouraging Websites aid in creating awareness and encouraging

reporting of cyber crime cases.reporting of cyber crime cases. Specialised Training of forensic investigators and experts Specialised Training of forensic investigators and experts Active coordination between police and other law Active coordination between police and other law

enforcement agencies and authorities is required.enforcement agencies and authorities is required.

Page 38: Combating Cyber crimes- Law & Enforcement in India The 'Diamond Jubilee Celebration Conference of CIRC'. The 'Diamond Jubilee Celebration Conference of.

In case you have any queries …please feel free to In case you have any queries …please feel free to write in at [email protected] in at [email protected]

SETH ASSOCIATESSETH ASSOCIATES ADVOCATES AND LEGAL CONSULTANTSADVOCATES AND LEGAL CONSULTANTSNew Delhi Law OfficeNew Delhi Law Office: C-1/16, Daryaganj, New Delhi-: C-1/16, Daryaganj, New Delhi-

110002, India110002, IndiaTel:+91 (11) 55352272, +91 9868119137Tel:+91 (11) 55352272, +91 9868119137Corporate Law OfficeCorporate Law Office: B-10, Sector 40, NOIDA-201301, : B-10, Sector 40, NOIDA-201301,

N.C.R, IndiaN.C.R, IndiaTel: +91 (120) 4352846, +91 9810155766Tel: +91 (120) 4352846, +91 9810155766Fax: +91 (120) 4331304Fax: +91 (120) 4331304E-mail: [email protected] E-mail: [email protected]

www.sethassociates.comwww.sethassociates.com