Free Essay

Jurisdictional Issue in Cyber Crime

In:

Submitted By aanchal
Words 2824
Pages 12
Ad idem ‘12 | Jurisdictional Issues in Cyber Crimes | | | | |
Arashdeep Singh Gurm
Address: #181 Anand Nagar A,
Gurudwara Street
Patiala(147001)
E-Mail Id: arashdeepgurm@gmail.com
Contact Number: 7508729986,9646020181
RAJIV GANDHI NATIONAL UNIVERSITY OF LAW, PUNJAB
Mohindra Kothi, Mall Road, Patiala - 147 001 (PUNJAB)

|

ABSTRACT

In this essay I wish to discuss the various types of crimes that are emerging with special reference to developing countries like India By developing we mean where growth of Information Technology is rampant but still it has not reached its peak. Cyber crimes can take place across various jurisdictions and hence the legal issue of jurisdiction of International Courts and country specific Indian Courts arises. Throw light on the present system in India, how it is ineffective and also upon international treaties and legal solutions to deal with the same. I have suggested possible ways to tackle the problem taking into consideration the domestic laws in India. The inefficiency of legislature to enact a more user friendly law is also examined in detail. Turning back our focus on the main legal dilemma of Jurisdiction of Cyber Crime Courts we have suggested a model that would be successful in India taking into consideration its working in other countries. In my concluding remarks a problem solution approach is taking where we have addressed the issue and after due consideration the solution is suggested. If proposal taken and implemented with effectiveness it would lead to a better result and can be followed by other nations in solving the predicament regarding cyber crimes and criminals.

In recent years, use of the Internet has grown at an explosive rate. However, there currently exists no single entity to control the enormous amount of information that is transmitted through it. In its beginnings, the Internet was essentially a network of linked computers owned by the military, defence contractors, and university laboratories conducting defence-related research this network was specifically designed to be a decentralized and completely self-maintaining system, which was capable of transmitting information without human control. The point of this was “to allow vital research and communications to continue even if portions of the network were damaged.”While this system may function well during a war or other catastrophic event, it does not allow for efficient monitoring. There is no single entity that supervises the Internet. It functions only because of the millions of separate computers that independently decide to transfer data.
Therefore, the task of preventing illegal conduct on the Internet has fallen on the courts of individual nations. However, one very important question remains. Which courts should govern? Who has jurisdiction over cyberspace? In one recent case, a French court assumed jurisdiction over Yahoo, an American online content provider, and ordered it to remove web pages showing Nazi memorabilia, material that is illegal to view in France but legal almost everywhere else. In another case, a British court held a British subject liable for posting photographs on an American web server considered obscene in Britain but not in the United States.
The challenge in determining if and when courts have jurisdiction over activities conducted on the Internet would not be great if the Internet were confined to a single geographical area, or if it were neatly divisible along territorial boundaries into distinct local networks. By its nature, however, the Internet is international: it disrespects local and national jurisdiction.
The challenge, therefore, is to create rules that work smoothly across local, national, and international boundaries. The objective of this essay is to discuss the jurisdictional problems that might arise due to cyber crimes in India and suggest solutions to address the same.
The terms “cyber crime,” “computer crime”, “Information Technology crime,” and “high-tech crime” are often used inter-changeably to refer to two major categories of offenses: in the first, the computer is the target of the offense; attacks on network confidentiality, integrity and/or availability-- i.e. unauthorized access to and illicit tampering with systems, programs or data - all fall into this category; the other category consists of traditional offenses--such as theft, fraud, and forgery - that are committed with the assistance of or by means of computers, computer networks and related information and communications technology. This article uses the broad definition of “cybercrime,” referring to offenses falling into either category.
Cyber crimes range from economic offenses (fraud, theft, industrial espionage, sabotage and extortion, product piracy, etc.) to infringements on privacy, propagation of illegal and harmful con-tent, facilitation of prostitution and other moral offenses, and organized crime. At its most severe form, cyber crime borders on terrorism, encompassing attacks against human life and against national security establishments, critical infrastructure ,and other vital veins of society. In cyber terrorism, as in cyber crime, the “cyber” component usually refers to perpetrating qualitatively new offenses enabled by information technology or integrating cyberspace into more traditional activities (such as planning, intelligence, logistical capabilities, finance, etc.). The categories may also overlap, as they frequently do in the cases of capable, computer-savvy offenders.
Unlike traditional crime, cyber crime is global crime. As a European Commission report explains, “computer-related crimes are committed across cyber space and do not stop at the conventional state-borders. They can be perpetrated from anywhere and against any computer user in the world.” Technology gives the ability to loot and inflict harm upon the entire world with little risk of apprehension and allows for experimenting with new varieties of criminal endeavours.
Jurisdiction, of course, defines three kinds of power: the power to prescribe, the power to adjudicate, and the power to enforce. The first of these relates principally to the power of a government to establish and prescribe criminal and regulatory sanctions; the second, to the power of the courts to hear disputes, especially civil disputes; and the third, to the power of a government to compel compliance or to punish noncompliance with its laws, regulations, orders, and judgments.
The internet may be seen as multi–jurisdictional because of the ease which a user may access a website anywhere in the world. It may even be viewed as a jurisdictional in the sense that from the user’s perspective state and national border are essentially transparent. The developing law of jurisdiction must address whether a particular event in cyber space is controlled by the laws of the state or country where the website is located, by the laws of the state or country where the internet service provider is located by the laws of the state or country where the user is located, or perhaps by all of these laws. Commentators have voiced the notion that cyber space must be treated as a separate jurisdiction. In practice, this view has not been supported by the courts or addressed by law makers. The two main areas of cyber law requiring further clarification are cyber crime and jurisdiction. For instance in cyber laws there are only a limited number of cases on point and no major statutory scheme on the books. In cyber jurisdiction, the courts must address the question of which law–makers has jurisdiction over actions taking place on the internet. In the few cases the courts have adjudicated they have applied long term statutes and personal jurisdiction principles in making decisions.
In order for a national court to adjudicate criminal and regulatory sanctions internationally, there must be some connection, or nexus, between the regulating nation (the forum) and the crime or criminal.
Four nexuses have been invoked by courts to justify their exercise of jurisdiction.
The territoriality nexus holds that the place where an offense is committed-in whole or in part-determines jurisdiction.
The nationality nexus looks to the nationality or national character of the person committing the offense to establish jurisdiction.
The protective nexus provides for jurisdiction when a national or international interest of the forum is injured by the offender.
The universality nexus holds that a court has jurisdiction over certain offenses that are recognized by the community of nations as being of universal concern, including piracy, the slave trade, attacks on or the hijacking of aircraft, genocide, war crimes, and crimes against humanity.
It is not enough that these nexuses exist; the connection between the forum and the person or activity also must be “reasonable.” In determining reasonableness, courts consider one or more of the following factors, depending on the circumstances of the particular case: * the extent to which the criminal or regulated activity takes place, or has a substantial, direct, and foreseeable effect, within the territory of the forum; * the extent to which the defendant or the injured party has a “genuine link” (i.e., an ongoing and real relationship) with the forum; * the character of the activity (that is, its importance to the forum, whether other countries regulate it, and the extent to which countries generally regard it as appropriate for regulation); * the extent to which justified expectations will be protected or harmed by the regulation; * the extent to which another country has an interest in regulating the activity and the likelihood of a conflict with those regulations; * the importance of the regulation to the international community;and * the extent to which the regulation is consistent with the traditions of the international community.
There is one final preliminary matter to note before we look at examples of cases in which the different nexuses have been used. That is: the nexuses are not mutually exclusive. Courts routinely rely on more than one in assuming jurisdiction.
In India, The Information Technology (IT) Act 2000 has been passed to deal with cyber crimes and there are specific forums in the Act which have the sole jurisdiction to deal with the cyber crimes mentioned in the Act.
Adjudicating Officers Appointed by Controller
The Controller appoints adjudicating officers to hear and resolve alleged violations of the aforementioned rules and determines the geographical locations where each may exercise jurisdiction. After giving all parties an opportunity to present their cases at a hearing, the officer will render a decision in the matter. The officer will take into account: the wrong doer’s “gain of unfair advantage;” the amount of loss caused by the wrongful acts; and the number of times the wrongdoer committed the acts.Penalties will be imposed or awards will be made on a case-by-case basis. The qualifications for adjudicating officers will be stated by the government and will include both information technology experience and legal/judicial experience. The officers‟ authority will be both civil and criminal in nature.
Cyber Regulations Appellate Tribunal
The government of India is authorized to establish one or more Cyber Regulations Appellate Tribunals, and to specify the “matters and places” pertinent to their jurisdiction. Their general purpose is to serve as the first appellate level to which cases may be appealed from decisions of the Control Board or adjudicating officers established in the ITA. No other court has jurisdiction to meddle in the affairs of an adjudicating officer under the ITA or in the affairs of the Appellate Tribunal by issuing an injunction against their orders or acts, so long as the adjudicating officer or the Tribunal has been properly empowered by the ITA. If the parties previously agreed to an order of an adjudicating officer, it may not be appealed. An appeal to the Tribunal must be filed within 45 days from the date on which the aggrieved party received a copy of the order of the Controller or the adjudicating officer. The Tribunal will make every effort to dispose of each appeal within six months from the date it is received. The Tribunal will hear all parties to the controversy and may affirm the previous order, modify it or set it aside. All parties and the concerned Controller or adjudicating officer will be given a copy of the Tribunal‘s order.
Appeal to High Court
Decisions rendered by the Appellate Tribunal may be appealed to the High Court. The appeal must ordinarily be filed at the High Court within 60 days after the decision has been received. However, for good cause shown, the High Court may allow up to an additional 60 days in which to file the appeal.

Conclusion
In the present scenario where the cyber crimes are increasing to an alarming extent, the present need of the hour is to have broad based convention dealing with criminal substantive law matters, criminal procedural questions as well as with international criminal law procedures and agreements. The IT Act, 2000 would be crippled without proper means and ways of implementing it. To overcome the difficulties, necessary amendments must be made to The Code of Criminal Procedure, 1973. Moreover, it is important to note that India at present does not have a proper extradition law to deal with crimes that have been committed over the Internet. To address this issue, India should become a signatory to the Convention of cyber crimes treaty and should ratify it. This move would go a great deal in resolving the jurisdictional controversies that may arise in cyber crime cases. Furthermore, have suggested the setting up of special courts, Cyber Infringements Courts‟ to replace the Adjudication Officer under the IT Act. These courts would be dealing exclusively with cyber law and other related matters like trademark etc, to ensure efficient delivery of justice.

BIBLIOGRAPHY

* The Information Technology Act, 2000 * Bruce Sterling, The Hacker Crackdown (1992) * Benjamin Wright, The Law of Electronic Commerce (1991)
SPECIAL ISSUES OF JOURNALS ON CYBERLAW ISSUES * Law in Cyberspace, 55 U. Pitt. L. Rev., no. 4 * Legal Regulation of the Internet, 28 Conn. L. Rev., no. 4 * Restatement (Third) of Foreign Relations Law of the U.S * Jurisdictional Issues In The Prosecution And Punishment Of Cyber Crime by Amal S.
ARTICLES
* Dan L. Burk, Patents in Cyberspace: Territoriality and Infringement on Global Computer Networks, 68 Tul. L. Rev. 1 (1993) * Dan L. Burk, Trademarks Along the Infobahn: A First Look at the Emerging Law of Cybermarks, 1 Rich. J. L. & Tech. 1 (1995)
WEB SOURCES 1. http:// news.zdnet.co.uk/story/0,,t269-s2082683,00.html. 2. http://news.bbc.co.uk/hi/english/sci/tech/newsid_ 382000/ 382152.stm. 3. http:// jolt.law.harvard.edu/articles/10hjolt465.html 4. http:// europa.eu.int/ISPO/eif/InternetPoliciesSite/Crime/CrimeCommEN.html

--------------------------------------------
[ 1 ]. Ligue Contre la Racisme et l’Antisemitisme v. Yahoo, Inc. See Yahoo Ordered to Bar French from Nazi Web
Sites, (Nov. 20, 2008), at
[ 2 ]. Crown v. Waddon. See Chris Nuttal, Police Hail Net Porn Ruling, BBC News (January 1,2010), at

[ 3 ]. Marc D. Goodman, Why the Police Don’t Care About Computer Crime, 10 HARV. J.L. & TECH., 465, 468-
469 (1997), available at
[ 4 ]. See- Bruce Sterling, The Hacker Crackdown (1992)
[ 5 ]. Communication from the European Commission to the Council and the European Parliament, Creating a Safer
Information Society By Improving the Security of Information Infrastrutures and Combating Computer-Related
Crime 9 (2000),
[ 6 ]. Restatement (Third) of Foreign Relations Law of the U.S. § 401 (1987)
[ 7 ]. Research in International Law: II. Jurisdiction with Respect to Crime, 29 Am. J. Int’l L. 435 (Supp. 1935)
[ 8 ]. Jurisdictional Issues In The Prosecution And Punishment Of Cyber Crime by Amal S. R.
[ 9 ]. ibid
[ 10 ]. Jurisdiction - The Overriding Conceptual Problem in Cyberspace by S. Ravishankar
[ 11 ]. Id. §§ 402, 404; Draft Convention on Jurisdiction with Respect to Crime, arts. 3-10, reproduced in Harvard
Law School, Jurisdiction with Respect to Crime.
[ 12 ]. An offense does not have to be consummated within the forum‟s territory for the forum to have jurisdiction. If an offense is commenced within the forum, even if it is completed or consummated abroad, the forum will have jurisdiction. Harvard Law School, Jurisdiction with Respect to Crime, supra note 8, at 484-87. Logically, jurisdiction based on the place where an offense was commenced is the converse of jurisdiction based on the effects nexus, which focuses on the place where the offense is consummated
[ 13 ]. Restatement (Third) of Foreign Relations Law of the U.S. § 404 (1987
[ 14 ]. See Ray August, Public International Law 345-46 (1995)
[ 15 ]. Restatement (Third) of Foreign Relation Law of the U.S. § 403(2)(c)
[ 16 ]. Id. § 403(2)(d)
[ 17 ]. Id. § 403(2) (g), (h).
[ 18 ]. Id. § 403(2)(e).
[ 19 ]. Id. § 403(2)(g), (h).
[ 20 ]. Id. § 403(2)(e).
[ 21 ]. Id. § 403(2)(f).
[ 22 ]. S.46(2) of The Information Technology Act, 2000
[ 23 ]. S.47 of The Information Technology Act, 2000
[ 24 ]. S.46(1) of The Information Technology Act, 2000
[ 25 ]. S.48 of The Information Technology Act, 2000
[ 26 ]. S.57(1) of The Information Technology Act, 2000
[ 27 ]. S.61
[ 28 ]. S.57(2)
[ 29 ]. S.57(3). However, for good cause shown, the Tribunal may allow an appeal to be filed beyond the 45 day cutoff. ITA, The Limitation Act of 1963 applies to the Tribunal. Id. S.60
[ 30 ]. S.57(6)
[ 31 ]. S.57(4)
[ 32 ]. S. 57(5)
[ 33 ]. S.62

Similar Documents

Premium Essay

The Role of Federal Agencies in Fighting Digital Crime

...The Role of Federal Agencies in Fighting Digital Crime Abstract The United States of America is the most connected and technologically advanced country in the world. The genius of our electrical engineers, computer scientists, and technology companies has helped to change the way that the world does business, made our daily lives safer and more enjoyable, and brought the world closer together. Albeit, these are remarkable innovations, but they have unfortunately given criminals, terrorists, and hostile states new opportunities to steal American property, disrupt our way of life, and compromise our National security. This paper will attempt to show the roles and challenges of law enforcement agencies such as the Secret Service, FBI, Department of Homeland Security, and others that have taken on roles to fight computer crimes and terrorism. This paper will also discuss how the U.S. could align the efforts of these agencies to better protect the nation against digital crimes and terrorism. Keywords: law enforcers, national security, protect, crime The Role of Federal Agencies in Fighting Digital Crime Cyber crooks are always working to steal the privacy and money of hard-working Americans. The computers of American consumers are subject to endless scams and schemes achieved by malicious e-mails, malware turning their computers into unwitting bots that send out unwanted spam, or the plethora of identity theft conjured up by these crooks to steal hard-working people’s...

Words: 892 - Pages: 4

Premium Essay

Law Enforcement Challenges

... Date Law Enforcement Challenges In the world today, enhanced technology has come to permeate every aspect of life. Technology molds how people interact, how banking services are provided and even how crimes are committed. Cyber crimes have developed in volume and substance over the years, and this has posed a great challenge, especially to law enforcement agencies. This paper seeks to give a detailed explanation of the utmost challenges facing the jurisdiction systems against cyber crime, as well as the possible solutions to these challenges. Challenge facing law enforcement agencies investigating exploitation, cyber stalking and obscenity Jurisdictional issues, as well as, determining who the online crime perpetrators are remains to be the greatest challenge the Law enforcement agencies face. Before arresting any suspect, law enforcers need to determine who the criminal is and his or her location. Determining this has become increasingly difficult over the years because it is extremely easy, and cheap, for individuals to hide their identities online due to the countless services that allow users to mask their IP addresses freely. Besides, some crimes such as obscenity are difficult to determine before making an arrest because of their nature. For instance, it is almost impossible to determine whether an individual charged with child pornography content downloaded the material intentionally or not. This difficulty...

Words: 791 - Pages: 4

Free Essay

Is Cyber Crime a Serious and Growing Threat?

...Is Cyber crime a serious and growing threat? 1. INTRODUCTION Cyber crime cannot be clearly defined but all the definitions that are attributed to it basically boil down to the following: “an unlawful act wherein the computer is either a tool or a target or both" (Dubey 2004). On the other hand, ‘threat’, in this context, can be construed as “something likely to cause damage or danger” (Online dictionary 2014). Generally speaking, any unlawful act is expected to cause harm and cyber crime is no exception to this general rule. It has been noted that since the public release of the World Wide Web in 1991, the Internet has known an explosive expansion and continuous upgrading. Unfortunately, cyber crime has also gained in preponderance and sophistication in direct correlation with this Internet revolution. Given its stealth characteristics coupled with its alleged multifaceted implications in terms of both financial loss and security issues, cyber crime has already got the legitimate recognition of a growing and serious threat by the various stakeholders concerned. The only contentious issue is perhaps the monetary quantification ascribed to the resulting damages which is often greeted with much skepticism. 2. CATEGORIES OF CYBER CRIME Indeed, cyber crime does not lend itself to a narrow definition and is generally classified into four categories; that is, crimes committed against the individual, property, organisation and society (Mali 2009). This classification also gives...

Words: 2796 - Pages: 12

Free Essay

Law Enforcement Challenges

...race when a crime is committed behind a keyboard. While this challenge can pretty much be crossed off of the list, there are many more that law enforcement agencies face when investigating computer crime. There are so many laws that apply to regions of enforcement and also to the rights of the suspected criminal. The even more difficult part is that while all parties are working together to achieve the same goal, there are so many grey areas in the chain of command and jurisdictional rules. Agencies investigation crimes such as corruption face a number of different challenges as well. In my eyes, if the crime can be solved, it should not matter where the officer is from. All members of law enforcement have the same goals and that is to keep the citizens of this nation safe by preventing crime. When prevention is not possible or fails, the teams investigating should not have to worry about whether they are allowed to be doing their job. They should simply work together and document evidence and witness material accordingly. Before we tackle the jurisdiction let us point out some of the other challenges that law enforcement faces with different types of computer crime. The long list of crimes that can be carried out via the computer creates an equal list of issues that the authorities have to deal with. There is so much that goes into a crime scene and the investigation process that we take for granted. First, let’s discuss the different types of crimes that cause corresponding...

Words: 1964 - Pages: 8

Premium Essay

Cyber Crime Team

...Cyber-Crime Article Analysis Team D June 12, 2013 CJA/394 Cyber-Crime Article Analysis Cyber-crime is an increasing type of crime locally and globally. Cyber-crime is defined as, “criminal activity or a crime that involves the Internet, a computer system, or computer technology,” ("Cyber-crime," 2012). Law enforcement, courts, and corrections are affected in different ways by cyber-crimes. Law enforcement faces issues with cyber-crime, such as privacy, confidentiality, determining the location the crime initiated, and locating the perpetrator(s). Courts face issues, such as loss of evidence and loop holes in laws. Correctional facilities face internal cyber-crimes and overcrowding as a result of cyber-crimes. The following information will discuss the issues within each division of the criminal justice system and provide remedy recommendations. The information will conclude with an analysis of global crime. Cyber-crime and Law Enforcement Cyber crime has made a major impact on the law enforcement it has not only given them more things to have to worry about but also has helped them to solve and organize crime better. The internet has changed so many things about this world, from how we purchase things, how we keep in touch with one another, and of course how some can conduct crime. Not only can a criminal stalk someone, but they can also stalk that person’s child, especially at sites like Face Book. A Hacker...

Words: 1524 - Pages: 7

Free Essay

Cybercrime

...Organized Crime and Cyber-Crime: Implications for Business Phil Williams, CERT® Coordination Center Introduction The capabilities and opportunities provided by the Internet have transformed many legitimate business activities, augmenting the speed, ease, and range with which transactions can be conducted while also lowering many of the costs. Criminals have also discovered that the Internet can provide new opportunities and multiplier benefits for illicit business. The dark side of the Internet involves not only fraud and theft, pervasive pornography and pedophile rings, but also drug trafficking and criminal organizations that are more concerned about exploitation than the kind of disruption that is the focus of the intruder community. In the virtual world, as in the real world, most criminal activities are initiated by individuals or small groups and can best be understood as “disorganized crime.” Yet there is growing evidence that organized crime groups or mafias are exploiting the new opportunities offered by the Internet. Organized crime and cyber-crime will never be synonymous – most organized crime will continue to operate in the real world rather than the cyber-world and most cyber-crime will continue to be the result of individuals rather than criminal organizations per se. Nevertheless, the degree of overlap between the two phenomena is likely to increase considerably in the next few years. This is something that needs to be recognized by business...

Words: 3403 - Pages: 14

Premium Essay

Engineer

...faster and easier accessibility. As it is another mode of commercial and personal transaction and one that is heavily dependent on interaction through computers and automatic agents rather than face-to-face meetings, which increases distance and allows anonymity, it is another avenue for crimes to perpetuate. “Computer Crime” encompasses crimes committed against the computer, the materials contained therein such as software and data, and its uses as a processing tool. These include hacking, denial of service attacks, unauthorized use of services and cyber vandalism. “Cyber Crime” describes criminal activities committed through the use of electronic communications media. One of the greatest concerns is with regard to cyber-fraud and identity theft through such methods as phishing, pharming, spoofing and through the abuse of online surveillance technology. There are also many other forms of criminal behaviour perpetrated through the use of information technology such as harassment, defamation, pornography, cyber terrorism, industrial espionage and some regulatory offences. The existing criminal laws in most countries can and do cover computer-related crimes or electronically perpetrated crimes. Offences against the computer are relatively new as they arise from and in relation to the digital age, which threatens the functionality of the computer as an asset of a borderless information society. New laws are required in order to nurture and protect an orderly and vibrant digital...

Words: 24175 - Pages: 97

Premium Essay

Challenges to Criminal Law Makers

...faster and easier accessibility. As it is another mode of commercial and personal transaction and one that is heavily dependent on interaction through computers and automatic agents rather than face-to-face meetings, which increases distance and allows anonymity, it is another avenue for crimes to perpetuate. “Computer Crime” encompasses crimes committed against the computer, the materials contained therein such as software and data, and its uses as a processing tool. These include hacking, denial of service attacks, unauthorized use of services and cyber vandalism. “Cyber Crime” describes criminal activities committed through the use of electronic communications media. One of the greatest concerns is with regard to cyber-fraud and identity theft through such methods as phishing, pharming, spoofing and through the abuse of online surveillance technology. There are also many other forms of criminal behaviour perpetrated through the use of information technology such as harassment, defamation, pornography, cyber terrorism, industrial espionage and some regulatory offences. The existing criminal laws in most countries can and do cover computer-related crimes or electronically perpetrated crimes. Offences against the computer are relatively new as they arise from and in relation to the digital age, which threatens the functionality of the computer as an asset of a borderless information society. New laws are required in order to nurture and protect an orderly and vibrant digital...

Words: 24175 - Pages: 97

Free Essay

Cyber Law

...Report On Cyber law LEGAL ASPECTS OF MANAGEMENT Submitted to: Mr. Maneesh Yadav Submitted by: Ankita Bhatnagar (JL12PGDM030) Introduction: Computers and their use is a day to day activity of all the students, professionals, teachers, Universities, banks, Supermarkets, in the entertainment field, in medical profession and also in higher education. The use of this Weapon is spreading very widely in all parts of our society. As every weapon has two ways of operation. One is good and essential and the other are bad and not essential. Many times, whenever a new weapon is invented, many people use it unknowingly for the wrong purpose. So to aware them and to make the proper use of the Power of the newly invented weapon, laws is to be formulated and should be implemented. This chapter introduces the cyber law and many terms involved in it. There are two basic definitions of cyber crime. (a) One definition says that ‘cyber crime’ consists of only those offences provided in the Information technology Act, 2000. As per this definition, cyber crimes would mainly be restricted to tampering with the computer source code, hacking and cyber pornography. Cyber fraud, defamation, harassment, e – mail abuse and IPR thefts, would not classify as cyber crimes. (b) In second definition, ‘cyber crime’ is said to be an act of commission or omission with the internet, committed on the internet or through the internet or with the help of the internet or connected with the internet, whether...

Words: 3963 - Pages: 16

Premium Essay

Police Fuctions

...Contemporary Issues and Futures in Criminal Justice University of Phoenix Jonathan V. Dunn CJA/394 Barbara Mitchell February 20, 2012 The world of criminal justice contains almost 18,000 state, local, and federal agencies. These agencies have over a million employees nationwide. The subject of this paper focuses on the various perspectives of policing within the state, local, and federal levels of organizations. The possible future changes in laws is addressed and identified in the paper. Finally, the impact these changes will cause in policing. These agencies have certain fragments that interfere with the development of centralized systems to regulate or coordinate the different agencies. Policing has four different levels of service that consist of federal, state, city, and county. These agencies have different responsibilities and roles in the law enforcement industry. The six largest police agencies in the United States are Detroit, New York, Philadelphia, Chicago, Houston, and Los Angles. In the United States the...

Words: 1207 - Pages: 5

Premium Essay

Essay On Cyber Terrorism

...Rising Cyber Terrorism and Role of Law in India Abstract: This paper makes an attempt to realize how cyber-crime and the measures to contain it are implemented in India. With the rise of global terrorism, terrorists are more inclined to use the vast internet for their nefarious activities. Something that they can accomplish without them physically being present and having the assurance of not being caught has promoted this form of terrorism all the more. In this paper an attempt has been made to understand cyber-terrorism, its various facets and also the laws and legislations in our country that inhibit such acts of terror. Introduction: The separation between the real world and virtual world is vanishing. The dependence of life on computers has increased high level. This dependency is used by the terrorists to their advantage by the use of internet. There are several types of cyber-crimes, such as Cyber Theft, Cyber Trespass, Cyber Stalking, Cyber Pornography, Cyber laundering, Cyber Theft, Cyber Vandalism and Cyber Terrorism, but the most threatening and dangerous are ones the that come under the category of the term cyber terrorism. Techno legal experts of India have been warning against growing incidences of cyber-attacks, cyber-crimes, cyber espionages, etc....

Words: 2882 - Pages: 12

Premium Essay

Digital Crimes

...The Future of Digital Crimes and Digital Terrorism Strayer University Assignment 4 Submitted in Partial Fulfillment Of the Requirements for the Course CIS 170 Information Technology in Criminal Justice Dr. Jacob Ogunlade Spring 2015 Table of Contents Certificate of Authorship 3 name 3 Purposes one (1) strategy that the U.S. could use in order to mitigate the challenges in question. 8 Explain the fundamental manner in which the U.S. could align the efforts of federal agencies in order to better protect the nation against digital crimes and terrorisms 9 Conclusion 10 References 12 Certificate of Authorship I have read and understand Strayer University's Academic Integrity Policy. I promise to conduct myself with integrity in the submission of all academic work to the University and will not give or receive unauthorized assistance on the completion of assignments, research papers, examinations or other work. I understand that violations of the Academic Integrity Policy will lead to disciplinary action against me, up to and including suspension or expulsion from the University. I know that all students play a role in preserving the academic integrity of the University and have an obligation to report violations of the Academic Integrity Policy committed by another student. In addition, I name certify that I am the author of this document and any assistance I received in preparing this report fully acknowledged. I have also cited in APA format for all...

Words: 2106 - Pages: 9

Premium Essay

Csec Ia1

...organizations. As we are more depending on technological management of such critical infrastructure and centralization of such system throughout the network, cybercrime targeting those critical infrastructures can have detrimental effects for both private and government sectors. There has been a steady increase in numbers of cybercrime with its benefits over the traditional crime in the past decades. Cyber criminals are getting smarter and equipped with more resources with every passing days and are becoming bigger threats. Therefore, it is important to scrutinize those cybercrime-related issues as well as to delve into planning a well-thought out countermeasure for both private and government sectors in various aspects for betterment of safer society of the information era. In this paper, Part I addresses how government intervention justifies telling private industry how to set up or improve their cybersecurity with its policies. Part II addresses the impacts on national security due to government regulation by private industry’s compliance. Part I. Government Regulation of Private Sector Cybersecurity Cyber criminals always look for vulnerabilities such as unsecured network to gain backdoor access to attack critical infrastructure or collect...

Words: 3978 - Pages: 16

Premium Essay

Cyber Crime

...Cyber Crime Erika Moore CRJU 5500-02F What is cybercrime and how can someone get caught in participating in a cybercrime? Cybercrime any kind of crime committed via the internet or on a computer network.  Cybercrime can be anything from hate crimes, telemarketing and Internet fraud, identity theft, to credit card account thefts. All are considered to be cybercrimes when the illegal activities are committed through the use of a computer and the Internet. How bad could cybercrime really be? “Cybercrime is a type of crime that not only destroys the security system of a country but also its financial system.” (Real Cost of Cyber Crime) Cybercrime is the type of crime that is hard to trace, but once traceable it then opens a whole can of worms. Once our government finds out about cybercrimes usually they find more than what they were looking for to begin with. In the past there have been some cybercrime laws that were insufficient but the law enforcement agencies and government have proposed many plans to help fight cybercrime. Once a cybercrime has been committed and traced back to the hacker punishment is required. “Cybercrime must be dealt with very seriously because it causes a lot of damage to businesses and the actual punishment should depend on the type of fraud used. The penalty for illegally accessing a computer system ranges from 6 months to 5 years. The penalty for the unofficial modification on a computer ranges from 5 to 10 years.”(Real Cost of Cyber Crime)...

Words: 3822 - Pages: 16

Premium Essay

Anthony

...Categories of Computer Crime CIS 170 Information Technology in Criminal Justice Dr. Johnson Strayer University February 5, 2014 The four common categories of computer crimes are: Computer as a target, Computers as an instrument crime, Computers as an incidental to a crime and Computers associated with the common occurrence of a computer. Cybercrime is criminal activity or crimes committed over the internet, through a computer system or though technology. Cybercrimes is also highly known around the world. Also these computer crimes are not authorized by the victim The four common categories of computer crimes are: 1. Computer as a target – Crimes in which the computer is the target in theft, intellectual property, theft of marketing information and blackmail from information gathered from another computer. Other things such as hacking into businesses, government or state information and creating false identities, stealing information or destroying their files which causes havoc. 2. Computers as an instrument of a crime – This doesn’t refer to stealing information rather it is the lawful possession of the item to infiltrate committing the crime. In this case it is the computer that is being used. 3. Computers as an incidental to a crime – The computer isn’t the direct crime being committed however, it is used to make the crime occur faster and to gather the information more quickly, this method makes it harder to trace. These crimes include money laundering...

Words: 1427 - Pages: 6