Cybercrime in India: Trends and Challenges: December 2017
Cybercrime in India: Trends and Challenges: December 2017
net/publication/322245372
CITATIONS READS
2 6,127
2 authors, including:
Juneed Iqbal
Mewar University
8 PUBLICATIONS 6 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
Ethical aspects of Software Engineering:Integration into computer science Curriculum View project
All content following this page was uploaded by Juneed Iqbal on 04 January 2018.
Group 4 –Offences related to infringements of in which case its provisions apply – and where such a
copyright and related rights: basis exists – in which case the existing arrangements
Offences related to infringements of also apply to assistance under this Convention.
copyright and related rights Computer- or computer-related crime specific
assistance applies to both situations and covers,
Group 5 – Ancillaryliability and sanctions:
subject to extra-conditions, the same range of
Attempt and aiding or abetting procedural powers as defined in Chapter II”[4].
Corporate liability Group 1–General principles relating to
Sanctions and measures international co-
Section 2 of Chapter II (procedural law issues) – Operation:
“the scope of which goes beyond the offences
defined in Section 1 in that it applies to any General principles relating to international co-
offence committed by means of a computer system operation
or the evidence of which is in electronic form – Group 2–Principles relating to extradition:
determines first the common conditions and Extradition
safeguards, applicable to all procedural powers in Group 3–General principles relating to mutual
this Chapter”[4]. This section has five groups all assistance:
dealing with procedural law issues:
General principles relating to mutual assistance
Group 1 – Common provisions
Spontaneous information
Scope of procedural provisions Group 4–Procedures pertaining to mutualassistance
Conditions and safeguards
Requestsin the absence of
Group 2 – Expedited preservation of stored applicableinternational agreements:
computer data
Procedures pertaining to mutual assistance
Expedited preservation of stored computer requests in the absence of applicable
data international agreements
Expedited preservation and partial disclosure Confidentiality and limitation on use.
of traffic data
Section 2(Specific provisions)has 3 groupscontains
Group 3 – Production order articles 29-35. It“contains a provision on a specific
Production order type of transborder access to stored computer data
Group 4 –Search and seizure of stored computer which does not require mutual assistance (with
data consent or where publicly available) and provides for
the setting up of a 24/7 network for ensuring speedy
Search and seizure of stored computer data
assistance among the Parties”[4].
Group 5 –Real-time collection of computer data
Group 1– Mutual assistance regarding provisional
Real-time collection of traffic data
Measures:
Interception of content data
Expedited preservation of stored computer data
Section 3 of Chapter II (Jurisdiction) deals with
Expedited disclosure of preserved traffic data
jurisdiction provisions over nine offences listed in
Section 1 of Chapter II established by adopting Group 2–Mutual assistance regarding investigative
legislative and other measures. powers
Chapter III –International co-operation Mutual assistance regarding accessing of stored
This chapter contains two sections. Section computer data
1(General principles) of Chapter IIIcontains article Trans-border access to stored computer data with
23-28, It is divided into 4 groups which deal consent or where publicly available
withextradition rules and provisions concerning Mutual assistance regarding the real-time
traditional and computer crime-related mutual collection of traffic data
assistance. “It covers traditional mutual assistance Mutual assistance regarding the interception of
in two situations: where no legal basis (treaty, content data
reciprocal legislation, etc.) exists between parties –
Group 3–24/7 Network: June 30 2017, there were an estimated 3.84 billion
24/7 Network. Internet users in the world. Among all Internet users,
49.85% are located in the Asia region. As can be
Chapter IV –Final provisions
seen in Table 2, China has the most
This chapter has single sections containing articles
Internet users in the Asia and India, issecond largest
36-48 and “contains the final clauses, which – with
and, is followed by Japan, the Republic of Korea
certain exceptions – repeat the standard provisions
(South Korea) and the Philippines. Japan has 94%
in Council of Europe treaties”[4].
population on internet South Korea 89.4 and Hong
Signature and entry into force Kong 82%, Indian population is catching up to 35%.
Accession to the Convention
Territorial application Internet Users in World by Regions- 2017
Effects of the Convention
Asia Europe Lat Am/Carib
Declarations
Federal clause Africa North America Middle East
Reservations Oceania/Australia
Status and withdrawal of reservations 3.80% 0.70%
8.31%
Amendments
Settlement of disputes 10.11%
Consultations of the Parties
Denunciation 49.85%
Notification 10.21%
As seen from above tables Internet usage has disrupting its political structure, which was seen
increased manifolds specifically due to pervasive recently in US presidential elections. Every new day
technology in terms of smart phones, cloud witnesses a new variety of attacks like recent
computing, Internet of things and many more. On WannaCry Ransomware attacks and thousands of
one side human life is comforted but on the other such new breed of malwares. Figure 2 indexes daily
side Cyber-attacks has gone to the next level. In message volumes by top malware categories, as on
2016 we saw “extraordinary attacks, including January-March 2017 [9].
multi-million dollar virtual bank heists, overt Ransomware vs. Banking Trojans vs. Other
attempts to disrupt the US electoral process by Malware
state-sponsored groups, and some of the biggest
distributed denial of service (DDoS) attacks on
record powered by a botnet of Internet of Things
(IoT) devices”[6]. Now cybercriminals do not just
attack assets of an individual but they attack big in
terms of robbing a bank stealing millions of dollars
for example from 2013 onwards , such attacks
happened like Carbanak a remote backdoor,
designed for espionage, data exfiltration and to
provide remote access to infected machines led
serious of attacks on US banks[7]. The Ban swift
group stole $81 Billion from Bangladesh’s central
bank and is responsible for many such bank heists
like $12million from an Ecuadoran bank, Banco
del Austro SA[8] etc. Cyber Criminals go beyond
Figure 2
the imagination as they attack a nation by
“Cybercriminals are using social media to sell and Cybercrime beyond boundaries
share data. Over 50% of all fraud activity is related Cyber Crime is a global problem, it is not only the
to carding and associated fraud-as-a-service magnitude of loss it is causing but the ease with
offerings”[10]. which it can be committed across borders without
any geographical constraints. Jurisdiction is the
major hurdle to successfully prosecute such
criminals, as evidence may be in some other country
with its own laws. Cybercriminals are international
criminals, and thus need special laws and legislation
which can deal with jurisdiction issues. Cybercrime
laws need to be harmonized and international
cooperation on cybercrime is requisite to successfully
prosecute cybercriminals.“The jurisdictional problem
of cybercrime manifests itself in three ways: lack of
criminal statutes; lack of procedural powers; and lack
of enforceable mutual assistance provisions with
foreign states”[13].
1. Lack of Criminal Statutes
Many countries are either without cybercrime laws or
don’t have updated and effective cybercrime
statutes[14]. India has an alarming cybercrime
rate.“According to the Indian Computer Emergency
Figure 3 Response Team (CERT-In), 27,482 cases of
cybercrime were reported from January to June
2017”[15]. Cybercrime rate from January- June of
2017 in India is one cybercrime after every 10
It isCostly minutes[15]. The ratio between conviction and
Cyber threats can potentially target and damage detection of cybercrime in India is abysmally low.
anything like planes, trains, power grids, nuclear Maharashtra which is having highest cybercrime rate,
warfare’s, communication system and anything from 2012 to July 2017, 10,419 cybercrimes were
which is digital. The report on cybercrime by filed, out of which only 34 were convicted. The rate
Cybersecurity Ventures sponsored by Herjavec of conviction is just 0.3%[16].The major reason of
Group “predicts global annual cybercrime costs low conviction rate is lack of criminal statutes and
will grow from $3 trillion in 2015 to $6 trillion by also improper implementation of Information
2021, which includes damage and destruction of Technology Act, 2008 by concerned officials.
data, stolen money, lost productivity, theft of 2. Lack of Procedural Powers
intellectual property, theft of personal and To investigate Cybercrime high tech resources and
financial data, embezzlement, fraud, post-attack procedural tools are required. India lacks both of the
disruption to the normal course of business, pre- requisites. The low conviction rate of India is
forensic investigation, restoration and deletion of also due to the lack of standard procedures for
hacked data and systems, and reputational seizure and analysis of digital evidence. “There are
harm”[11]. Cyberattacks can be so powerful that no standard documented procedures for searching,
it can wash away economy of a city, state or seizing of digital evidence and standard operating
country[12]. To counter cyber threats there is a procedures for forensic examination of digital
huge spending worldwide, it “reached $75 billion evidence”[17]. India also need to allocate more
in 2015, according to Gartner, Inc., the leading IT resources towards fighting cybercrime in terms of
analyst firm. Cybersecurity Ventures forecasts updating cyber security cells using state of the art
global spending on cybersecurity products and technology and regular training of officials to impart
services will exceed $1 trillion over the next five highly specialized skills in them for making them
years, from 2017 to 2021”[11]. competent to fight cybercrime.
used in criminal proceedings. Frequently, Israel cyber framework is yet another effort of India
authorities contact foreign (in particular USA- to streamline itscyberspace. These bilateral
based) service providers directly to obtain agreements have limited scope and are inadequate
subscriber or traffic data. Often investigations are and ineffective to deal with cybercrime. India need a
abandoned.[22:7] multilateral treaty which will harmonize its laws by a
MLA provisions of Budapest Convention as per common criminal policy, and deal with international
the 2014 recommendations of the convention is co-operation for combating cybercrimes at global
not efficient but this area is improving through the level. The treaty should help in formulating
follow up to these recommendations. After 2014 effectivelegislation and robust investigative
recommendations MLA procedures are made techniques, which can foster international co-
efficient, streamlined and for instant cooperation operation to combat cybercrime. The Council of
between states 24/7 points of contact are in place Europe’s Budapest Convention on Cybercrime, is
now. India can be an active partner to address and such international multilateral treaty dealing with
remove these shortcomings by joining the international co-operation for combating cybercrimes
convention, by sidelining itself India is denying its at global level. India should sign the convention to
chance to tailor it as per its requirements. combat cybercrime, even the US and Israel with
whom India is having bilateral agreements to combat
4. India has signed Mutual Legal
cybercrime have joined Budapest cybercrime
Assistance Treaty(MLAT) with many countries
convention.
India for assistance in criminal matters has signed
Mutual Legal Assistance Treaty(MLAT) with few
countries like India is currently a signatory to UN References
Convention against Transnational Organized [1] “CYBERCRIME@COE UPDATE on Council of
Crime. These MLATs can deal with general Europe activities on cybercrime.” Jun-2017.
criminal matters, but are inadequate and [2] “Details of Treaty No.185 Convention on
ineffective particularly to cybercrime. To deal with Cybercrime.” [Online]. Available:
cybercrime more robust laws are required which http://www.coe.int/en/web/conventions/full-list/-
bring “harmonization in both substantive and /conventions/treaty/185. [Accessed: 27-Aug-2017].
procedural laws governing cooperation from other [3] J. CLOUGH, “A WORLD OF DIFFERENCE: THE
countries on legal assistance in cybercrime BUDAPEST CONVENTION ON CYBERCRIME
matters”[23]. Budapest Convention is such an AND THE CHALLENGES OF
HARMONISATION,” Monash Univ. Law Rev., p.
ideal convention to bring harmonization and
702, 2014.
uniformity in legal cooperation. India can join
Budapest convention and still can continue MLAT [4] S. J. Juneidi, “Council of Europe Convention on
Cyber Crime.”
provisions to deal with other crimes[23].
[5] “Convention on Cybercrime European Treaty Series -
No. 185.” Council of Europe, XI-2001.
V. CONCLUSION [6] “Internet Security Threat report (ISTR),” Symantec
The tremendous growth of internet use in world Corporation World Headquarters 350 Ellis Street
and particularly in Indiaislaterally accompanied by Mountain View, CA 94043 United Stated of America,
substantial surge in cybercrime and has made India 22, Apr. 2017.
vulnerable to such crimes. Cybercrimes are of [7] “CARBANAK APT THE GREAT BANK
global nature and criminals are not bound to a ROBBERY,” Kaspersky, 2.1, Feb. 2015.
particular geographical area. Cyberspace is a free- [8] J. L. 27 M. 2016 at 11:56 tweet_btn(), “FOURTH
flowing, borderless and not guarded by local bank hit by SWIFT hackers.”
geographical constraints. These crimes can’t be [9] “The Proofpoint Quarterly Threat Report,”
deterred by local laws, India in such scenario is Proofpoint, 2017.
like sitting ducks. India to counter Cybercrime has [10] “2016-current-state-of-cybercrime.” RSA, 2016.
engaged itself in various bilateral agreements like [11] S. Morgan, “Hackerpocalypse Cybercrime Report,”
cyber agreement with Russia and a framework Cybersecurity Ventures, 12-Aug-2016. .
agreement with the US, resent visit of prime [12] “Economic Cybercrime: The Next Economic Crime
minister of India Mr. Modi to Israel to sign Indo- Vector | RSA Conference.” [Online]. Available: