Information Technology Laws: International Co-Operation in Cyber Crime Mitigation
Information Technology Laws: International Co-Operation in Cyber Crime Mitigation
Information Technology Laws: International Co-Operation in Cyber Crime Mitigation
INTERNATIONAL CO-OPERATION
IN CYBER CRIME MITIGATION
SUBMITTED TO :
Miss Tamanna Kohli
SUBMITTED BY :
Vishal Kaushik
Hemantdeep
Navdeep
TABLE OF CONTENTS :
2
1 Acknowledgement 3
2 Introduction 4
3 Challenges 5
4 International Bodies 8
5 Indian Perspective 10
6 Strategies 11
7 Conclusion 14
ACKNOWLEDGEMENT :
3
Working on this topic has helped me to understand the topic deeply and to
extended my understanding of the topic.
INTRODUCTION :
4
On the positive side, e-business through the Internet has opened a new world
of communication for consumers in all facets of life, but on the negative side, it
has also created an environment as an open playground for seamless criminal
activities on a global scale. Crimes can be committed thousands of miles away
from the real crime scene. In other words, a cyber criminal does not need to
leave his/her own home or cross a national boundary to commit an act in
several countries around the globe. The communications may be routed
through a variety of ways, ranging from local phone companies, long distance
carriers, Internet service providers, wireless and satellite networks, and may go
through computers located in several countries before attacking targeted
systems around the world.
There are many challenges faced by law enforcement agencies. In this section,
we analyze the most important ones, such as the lack of harmonization of
national criminal laws regarding to cyber crimes and the difficulties to find a
clear and comprehensive definition of computer related crime. With the ever-
increasing number of cyber crime offences, it is essential to highlight the
problems concerning the minimal risk of detection and apprehension. These
are lack of training of investigating officials, unknown or anonymous victims,
disinclination of victims to report them upon discovering cyber crimes,
difficulties of locating and identifying perpetrators across
borders and other computer procedural problems of such crimes.
There has been a great deal of debate among experts regarding what
constitutes a computer crime. The intent of different authors to be precise
about the scope and use of particular definitions means, however, that the use
of these definitions out of their intended context often creates inaccuracies,
with a result that a universally agreed definition of computer crime has not
been achieved to-date.
Computer crime can involve criminal activities that are traditional in nature, all
of which are generally subject to criminal sanction. Nevertheless, the computer
and the Internet have created a number of potentially new misuses or abuses
that may be criminal as well. With respect to traditional forms of crime
committed through the use of new technologies, this updating may be done by
clarifying or abolishing provisions that are no longer completely adequate,
such as statutes unable to create new provisions for new crimes, or as
unauthorized access to computers or data networks. Thus, any
criminal activity committed exclusively through the Internet should be
nominated more specifically a cyber crime.
(3) Unknown victims. Most of the time, victims are collective groups. In the
case of individual victims, many of them may even fail to realize that a security
problem exists and as such they do not have possibilities for responding to
incidents of cyber crime.
The legal world has been based on paper for so long that adaptation to the
digital era has proceeded slowly in relation to the digitalization of the rest of
the business world. In the last few years, courts have begun to routinely accept
electronic evidence, though always very carefully, knowing that electronic
alteration is often simple and that proving it is often hard. Frequently,
discussions about electronic evidences become a confrontation among forensic
technologists. The replacement of visible and corporeal objects of proof with
invisible and intangible evidences in the field of information technology not
only creates practical problems but also opens up new legal issues: the
coercive powers of prosecuting authorities, specific problems with personal
data and the admissibility of computer-generated evidence.
The lead international bodies are the United Nations, the G-8 Subgroup on
High-Tech Crime , the Organisation for Economic Cooperation and
Development.
In 1986, the study resulted in a report which surveyed existing laws and
proposals to be reformed, and recommended a minimum list of abuses that
countries should consider penalizing by criminal law (OECD-ICCP, 1986).
In 1992, the Council of the OECD and two dozen of its member countries
approved a Recommendation of the Council Concerning Guidelines for the
Security of Information Systems intended to make available a foundational
information security structure for the public and private areas.
In 1994, the U.N published the United Nations Manual on the Prevention and
Control of Computer Related Crime (United Nations, 1994). This Manual
studied the phenomenon of computer-related crimes, substantive criminal law
protecting privacy, procedural law, and the needs and avenues for
international cooperation.
INDIAN PERSPECTIVE:
The Information Technology Act, 2000 In May 2000, both the houses of the
Indian Parliament passed the Information Technology Bill. The Bill received the
assent of the President in August 2000 and came to be known as the
Information Technology Act, 2000. Cyber laws are contained in the IT Act, 2000
. This Act aims to provide the legal infrastructure for e-commerce in India. And
the cyber laws have a major impact for e-businesses and the new economy in
India. So, it is important to understand what are the various perspectives of
the IT Act, 2000 and what it offers. The Information Technology Act, 2000 also
aims to provide for the legal framework so that legal sanctity is accorded to all
electronic records and other activities carried out by electronic means. The Act
states that unless otherwise agreed, an acceptance of contract may be
expressed by electronic means of communication and the same shall have
legal validity and enforceability.
The IT Act, 2000 attempts to change outdated laws and provides ways to deal
with cyber crimes. We need such laws so that people can perform purchase
transactions over the Net through credit cards without fear of misuse. The Act
offers the much-needed legal framework so that information is not denied
legal effect, validity or enforceability, solely on the ground that it is in the form
of electronic records.
11
Victim cooperation :
Without the cooperation of cyber crime victims, efforts to suppress these acts
can be only partially effective. Reporting incidents to authorities is necessary to
discover criminal behaviour. The accurate reporting of cyber crimes provides
an additional benefit. The more information the law enforcement community
has on new trends of cyber crimes, the better it can adapt existing methods of
detection to fight against them. Reporting of crimes would definitely promote
12
Community:
Familiarity with electronic complexity is slowly spreading among the general
population. It is necessary to educate the users of computers and network
systems. Law enforcement and IT professionals need to work more closely with
the community to build a cyber-fighting team that has the skills, the means and
the authority necessary to reduce the instances of crime on the Internet.
Training in this area and familiarity with the concepts behind complex
computer techniques are required before law enforces can operate
adequately.
Social Control:
It is necessary to convince the community about the need to track down cyber
criminals and expose the problems that these individuals pose to different
sectors of the society under varying circumstances. If cyber criminals are
shamed rather than admired, some will be less likely to engage in the criminal
conduct. A number of potential cyber criminals are attracted by the idea of
impressing not only people in their environments but also colleagues in the
cyber community. Emphasizing on the fact that a crime in the cyberworld can
be of the same high significance and have similar consequences as a crime in
the physical world is still a major challenge. There is no doubt that some
people will commit crimes regardless of peer pressure. However, this pressure
is a valuable tool to reduce the level of cyber crime based on the “everyone
does it” argument.
13
CONCLUSION:
Cyber crime is a persisting international threat that transcends national
boundaries in a manner that renders this form of organized crime a global
concern. Cyber crime may take several forms including online fraud, theft and
cyber terrorism. It has been seen that amongst the most important reasons
that facilitate the perpetration of this crime is the globalization of technology
and the revolutionary advancement of information technologies that have
impacted on criminal activity. The increasing proliferation in usage of
technology assisted criminal activity and cyber crime merits further attention
from the global community by enacting the necessary legislative provisions and
implementing effective technological and enforcement tools that reduce IT-
facilitated criminal activities.
Bibliography :
• Moore, R. (2005) “Cyber crime: Investigating High-Technology Computer
Crime,” Cleveland, Mississippi: Anderson Publishing.