CHANAKYA NATIONAL LAW UNIVERSITY, PATNA
EMERGING TRENDS IN CYBERCRIME
Subject- CYBER LAW
Faculty -
Submitted by:
Mr. Kumar Gaurav
Name - Shweta Semester -9th Roll No - 813
1
ACKNOWLEDGEMENT
It is my greatest pleasure to be able to present the project topic “EMERGING TRENDS IN CYBERCRIME” of Private International Law. I found it very interesting to work on this project. I would like to thank my teacher, Mr. Kumar Gaurav, for providing me with such an interesting project topic and for his constant support and guidance.
I would also like to thank my librarian for helping me in gathering data for the project. Last, but not the least, I would heartily thank my family and friends for their unwavering support without which this work would not have been possible.
I hope that the readers will appreciate this project work.
Shweta.....
2
INTRODUCTION The world we are in today is all about Information Technology (IT) because we are in the age of Information Technology and the people with the right information, with proper way of disseminate this information and processing them is considered as the most successful. Information technology is the transfer of information using telecommunication and micro-based computer system. Nowadays, the computer has replaced manual records, and the fraudulent input document has been substituted by manipulating data held in a computer system. This manipulation does not need to be sophisticated. Computers have become the mainstay of business and government processes. Business has been using them for years and in most countries, there are drives towards electronic or joined up government. This is to allow the people to access government services from their desktop in their own home. Cybercrime, like every digital industry, is outsourcing. Though the U.S. still produces more malware, spam and viruses than any country in the world, illicit IT jobs are increasingly scattered across an anarchic and international Internet, where labor is cheap, legitimate IT jobs are scarce and scammers are insulated from the laws that protect their victims by thousands of miles. As Thomas Friedman might say, the criminal underworld is flat. The statistics that have been obtained and reported about demonstrate the seriousness Internet crimes in the world.1 Just the "phishing" emails mentioned in a previous paragraph produce one billion dollars for their perpetrators (Dalton 1). In a FBI survey in early 2004, 90 percent of the 500 companies surveyed reported a security breach and 80 percent of those suffered a financial loss . A national statistic in 2003 stated that four billion dollars in credit card fraud are lost each year. Only two percent of credit card transactions take place over the Internet but fifty percent of the four billion, mentioned before, are from the transaction online.2 All these finding are just an illustration of the misuse of the Internet and a reason why Internet crime has to be slowed down. Internet crime is crime committed on the Internet, using the 1 www.ncpc.org/resources/files/pdf/internet-safety/13020-Cybercrimes-revSPR.pdf 2 ibid 3
Internet and by means of the Internet. Computer crime is a general term that embraces such crimes as phishing, credit card frauds, bank robbery, illegal downloading, industrial espionage, child pornography, kidnapping children via chat rooms, scams, cyber terrorism, creation and/or distribution of viruses, Spam and so on. All such crimes are computer related and facilitated crimes.With the evolution of the Internet, along came another revolution of crime where the perpetrators commit acts of crime and wrongdoing on the World Wide Web. Internet crime takes many faces and is committed in diverse fashions. The number of users and their diversity in their makeup has exposed the Internet to everyone. Some criminals in the Internet have grown up understanding this superhighway of information, unlike the older generation of users. This is why Internet crime has now become a growing problem in the United States. Some crimes committed on the Internet have been exposed to the world and some remain a mystery up until they are perpetrated against someone or some company.3 People have been trying to solve virus problems by installing virus protection software and other software that can protect their computers. Other crimes such as email “phishing” are not as known to the public until an individual receives one of these fraudulent emails. These emails are cover faced by the illusion that the email is from your bank or another bank. When a person reads the email he/she is informed of a problem with he/she personal account or another individual wants to send the person some of their money and deposit it directly into their account. The email asks for your personal account information and when a person gives this information away, they are financing the work of a criminal.
3 www.itu.int/ITU-D/cyb/cybersecurity/docs/Cybercrime%20legislation%20EV6.pdf 4
RESEARCH METHODOLOGY
The researcher has used Doctrinal method of research throughout the preparation of the project. The researcher has used this method in the form of1. BOOKS. 2. JOURNALS. 3. CASE LAWS. 4. WEBSITES.
OBJECTIVES AND IMPORTANCE The objective of doing this research was to know and understand the concept of cyber crime and its impact in present world.
HYPOTHESIS In the initial stage of pilot study, the researcher was of the view that the concept of cyber crime has a great effect on present world and there are not many laws to curb the same. 5
But at the later stage of research work, researcher was proved wrong as she found that there are certain laws which have succeeded in putting a check on cyber crime though it is not sufficient. A lot more is yet to be done in this regard.
PLAN OF STUDY
CONCEPT OF CYBER CRIME
NATURE AND ITS EXTENT
CHALLENGES TO CRIMINAL ADMINISTRATION OF JUSTICE
THREATS OF CYBER CRIME
COUNTER MEASURES
CONCLUSION
6
BIBLIOGRAPHY
CONCEPT OF CYBER CRIME
7
Cyber crime also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy. Cybercrime, especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and government. Because of the early and widespread adoption of computers and the Internet in the United States, most of the earliest victims and villains of cybercrime were Americans. By the 21st century, though, hardly a hamlet remained anywhere in the world that had not been touched by cybercrime of one sort or another. DEFINING CYBERCRIME New technologies create new criminal opportunities but few new types of crime. What distinguishes cybercrime from traditional criminal activity? Obviously, one difference is the use of the digital computer, but technology alone is insufficient for any distinction that might exist between different realms of criminal activity. Criminals do not need a computer to commit fraud, traffic in child pornography and intellectual property, steal an identity, or violate someone’s privacy. All those activities existed before the “cyber” prefix became ubiquitous. Cybercrime, especially involving the Internet, represents an extension of existing criminal behavior alongside some novel illegal activities. Most cybercrime is an attack on information about individuals, corporations, or governments. Although the attacks do not take place on a physical body, they do take place on the personal or corporate virtual body, which is the set of informational attributes that define people and institutions on the Internet. In other words, in the digital age our virtual identities are essential elements of everyday life: we are a bundle of numbers and identifiers in multiple computer databases owned by governments and corporations. Cyber crime highlights the centrality of networked computers in our lives, as well as the fragility of such seemingly solid facts as individual identity.
NATURE AND ITS EXTENT 8
Cybercrime has been defined as encompassing “any proscribed conduct perpetrated through the use of, or against, digital technologies”1.That definition says it all. It embraces three areas of activity. - Crimes in the commission of which computers are used. These include online fraud and financial crime, the electronic manipulation of share and other markets, the dissemination electronically of offensive material, misleading advertising, identity theft and so on. - Specific crimes committed against digital technology itself.
These include “hacking”, cyber stalking, theft of communication services and the transmission of malware – viruses, worms, Trojans, botnets, backdoors, phishing and so on. - Conventional crimes attended by incidental cyber methods. These include encryption or steganography (the embedding of information in data) to conceal information relevant to other crime and the use of databases to store or organize information about criminal activity. Some offending has elements of more than one of those divisions, such as the electronic transmission and perhaps covert storage of child pornography where real children are initially victimized.
Another example is the all-too-prevalent use of computer chat rooms to groom and entice victims into illegal sexual activity with the offenders. Another example is to be found in the new offence called, colloquially, “up skirting” – where offenders use digital cameras to photograph up the skirts of women in public places and then disseminate the images. The infrastructure of cybercrime is in computers, communications technologies and other networked services. It is sometimes known by other names, such as computer crime, or virtual, online, high-tech, Internetrelated, electronic crime, and so on.
Victimization surveys among populations consistently show a concern at the level of cyber offending. That concern is likely to increase as applications of digital technology expand. Already cybercrime accounts for more economic crime than any other type. All that is needed to commence a cybercrime is a computer (with relevant connections, of course). This means of 9
committing crime has been harnessed by everyone from enthusiastic (and sometimes young) amateurs to terrorists and with international drug and money traffickers, smugglers and criminal gangs in between. The bombing in Bali in 2002, for example, was financed by electronic transfers of funds from the Middle East to Bangkok, organized by a man here in Singapore.
It is easy for cybercriminals to identify targets. For crimes using computers, databases of names and addresses and other particulars are compiled for a wide range of purposes and are sold or given away to persons who may wish to use them for criminal purposes. E-mail addresses may be obtained by other means. Targets are then contacted and inveigled into providing, for example, details of their bank accounts or personal particulars. The callers might even pose as government or bank officials seeking to “update” records and using designs on their messages that mimic genuine sites. Done by e-mail, this process is known as phishing.
Even the best equipped law enforcement agencies are likely to be unable to deal with the growing volume of cybercrime even in their own jurisdictions2 . Any increase in cybercrime must be considered in the context of the enormous and continuously expanding growth in the use of digital technologies. Just the capacity of digital storage media has grown exponentially in recent years. The average size of a hard disk installed in a personal computer has grown from 12 gigabytes in 1997 to well over 1,000 gigabytes now. The use of the Internet for financial transactions of many kinds (sales, transfers of funds for many purposes) continues to grow rapidly. Continuing measurement of the extent of the problem and reporting of its incidence are essential. Only against that background can it be judged whether or not the investigation and prosecution of cybercrime are being conducted effectively.
10
CHALLENGES TO CRIMINAL ADMINISTRATION OF JUSTICE The scale and quantity of cybercrime, devices, users and victims Cybercrime, the number of devices, services and users (including of mobile devices and services) and with these the number of victims have reached proportions so that only a minuscule share of cybercrime or other offences involving electronic evidence will ever be recorded and investigated. The vast majority of victims of cybercrime cannot expect that justice will be served.
This raises questions regarding the rule of law in cyberspace and the ability of governments to meet their obligations to protect society against crime and to protect the rights of victims. Technical challenges- In addition to challenges related to cloud computing, criminal justice authorities are faced with a range of other challenges that render investigations highly complex: Peer-to-peer/Virtual Private Networks; Anonymizers (TOR, I2P); Encryption; VOIP; IPv4 to IPv6 transition and Carrier-grade Network Addressing Translators (CGN). These are major challenges and would need to be discussed in detail separately.
11
Cloud computing, territoriality and jurisdiction- Cloud computing raises a number of challenges for criminal justice, in particular with regard to the applicable law and the jurisdiction to enforce. Issues include: Independence of location is a key characteristic of cloud computing. Therefore: - It is often not obvious for criminal justice authorities in which jurisdiction the data is stored and/or which legal regime applies to data. A service provider may have its headquarters in one jurisdiction and apply the legal regime of a second jurisdiction while the data is stored in a third jurisdiction.
Data may be mirrored in several or move between jurisdictions. If the location of data determines the jurisdiction, it is conceivable that a cloud service provider systematically moves data to prevent criminal justice access. - Even if theoretically data may always have a location also when stored on cloud servers, it is far from clear which rules apply for lawful access by criminal justice authorities. It may be argued that the location of the headquarters of the service provider, or of its subsidiary, or the location of the data and server, or the law of the State where the suspect has subscribed to a service, or the location or citizenship of the suspect may determine jurisdiction of the data of a user and thus which rules apply.
Additional jurisdiction issues arise, for example, when the data owner is unknown or when the data is stored via transnational co-hosting solutions. A service provider may be under different layers of jurisdictions for various legal aspects related to its service at the same time. For example: - For data protection purposes, within EU member States, jurisdiction seems to be decided by the location of the data controller, not by the location of the international HQ, the location of the servers, the location of the business area (customers) or other criteria.
However, some companies do not have data controllers in the EU, even if they have a number of European users. In these cases, it appears unclear what if any jurisdiction European data protection agencies have over these services. The "right to be forgotten" case regarding Google 12
in Spain on the other hand was based on different criteria for jurisdiction than the location of international HQ, the location of servers or the location of data controllers. - For tax purposes, jurisdiction seems not decided by the location of the international HQ, servers or data controllers, but on several other criteria, such as the location of the subsidiary doing business. - With regard to consumer protection, the location of the consumer seems decisive. - For intellectual property rights in civil cases the location of the business seems to determine jurisdiction, while for intellectual property in criminal law the location of the perpetrator may be decisive.
The sharing and pooling of resources is a key characteristic of cloud computing. Cloud services may entail a combination of service models (Cloud Software as a Service (SaaS), Cloud Platform as a Service (PaaS), Cloud Infrastructure as a Service (IaaS)). It is often unclear which service provider when providing one or more types of services is in possession or control of which type of data (subscriber information, traffic data, content data) so as to be served a production order. It is often unclear whether data is stored or in transit and thus whether production orders, search and seizure orders, interception or real-time collection orders are to be served. It is not always clear whether different types of cloud services are considered and regulated implications on the type of and conditions for procedural law powers that can be applied.56 Regarding interceptions, specific problems arise. For example: - A court order served to a service provider domestically to intercept an electronic communication between two suspects on its territory and/or its nationals, is often not executable in real time because the server where the interception is to take place is located in a foreign jurisdiction or the communication is routed via a foreign jurisdiction. The foreign authorities are unlikely to respond to an MLA request in real time, given the duration of procedures and the requirements for interception in that country, unless emergency procedures are in place. - A court order may be served for the interception of a communication of a national suspect. However, the suspect moves to another country or moves between different countries. It may be unclear whether the interception is legally possible when the suspect is in roaming. The non-localized nature of cloud computing causes problems for live forensics (online forensics) and searches because of the architecture of the cloud (multi tenancy, distribution and segregation of data) as 13
well as legal challenges related to the integrity and validity of the data collection, evidence control, ownership of the data or jurisdiction.
Mutual legal assistance- Mutual legal assistance remains the principal means to obtain evidence from foreign jurisdictions for use in criminal proceedings. In December 2014, the Cybercrime Convention Committee (T-CY) completed an assessment of the functioning of mutual legal assistance provisions. It concluded, among other things, that: The mutual legal assistance (MLA) process is considered inefficient in general, and with respect to obtaining electronic evidence in particular. Response times to requests of six to 24 months appear to be the norm. Many requests and thus investigations are abandoned. This adversely affects the positive obligation of governments to protect society and individuals against cybercrime and other crime involving electronic evidence. The Committee adopted a set of recommendations to make the process more efficient. These recommendations should be implemented. At the same time, MLA is not always a realistic solution to access evidence in the cloud context for the reasons indicated above.
THREATS OF CYBER CRIME
14
Cybercrime and the challenges related to electronic evidence have reached a level and complexity that undermines the confidence, security and trust in information and communication technologies (ICT). A review of the current scale, scope and challenges related to cybercrime and electronic evidence (that is, evidence in the form of data generated by or stored on a computer system) suggests that cybercrime has become a serious threat to the fundamental rights of individuals, to the rule of law in cyberspace and to democratic societies: The theft and misuse of personal data (email account data, credit card details, address books, patient records etc.) affects the right to private life (including the protection of personal data) of hundreds of millions of individuals. Cybercrime is an attack against the dignity and integrity of individuals, in particular children. Cyber attacks (such as distributed denial of service attacks, website defacement and others) against media, civil society organizations, individuals or public institutions are attacks against the freedom of expression.8 Cybercrime is an attack against democracy.
Governments, parliaments and other public institutions as well as critical infrastructure are faced with attacks every day. Cybercrime is a threat to democratic stability. Information and communication technologies are misused for xenophobia and racism, contribute to radicalization and serve terrorist purposes Cybercrime causes economic cost and risks to societies and undermines human development opportunities through ICT. Cybercrime is a threat to international peace and stability. Military conflicts and political disagreements are increasingly accompanied by cyber attacks.
Reportedly, trillions of security incidents are noted on networks each year and millions of attacks against computer systems and data are recorded every day. Cybercrime is a primary concern to governments, societies and individuals.15 In addition, criminal justice authorities are faced with the problem that evidence in relation to any crime is now often stored in electronic form on computer systems. Most international requests for data are related to fraud and financial crime followed by violent and serious crimes. These may include murder, assault, smuggling of 15
persons, trafficking in human beings, drug trafficking, money laundering, terrorism and the financing of terrorism, extortion and, in particular, child pornography and other forms of sexual exploitation and abuse of children. Predictions are that cybercrime will grow significantly in 2015 and beyond. Reasons include technical vulnerabilities which may affect hundreds of millions of users and the security of organizations. Examples exposed in 2014 are mobile malware threats, defects such as Heart bleed, the hacking of the UMTS standard for mobile phone communications, the cloning of biometric data such as fingerprints or irises or concerns over the security of cloud services for the storage of data.
New forms of electronic payments, including mobile money, provide new opportunities for fraud and financial crime. Big data and the Internet of Everything create further risks to security and privacy under a business model of the Internet that relies increasingly on the exploitation of personal data. Data available are not only used for business purposes, but may also be used for criminal purposes, such as harvesting data through ³crime-as-a-service´. If only a minuscule fraction of offences involving computer data and systems can be prosecuted, victims have a very limited expectation of justice. This raises questions regarding the rule of law in cyberspace. Confusion between criminal justice versus national security Public and political debates on mass surveillance are marked by confusion between criminal justice and national security. Criminal justice authorities carry out specific criminal investigations and secure specified data for use in court cases and proceedings. Such investigations may interfere with the rights of individuals and they are therefore subject to rule of law safeguards, such as judicial control. The evidence can be challenged and remedies are available.
This is very different from bulk interception of data for national security purposes. However, the confusion prevails. It leads to additional conditions for criminal justice authorities and prevents solutions in view of more effective investigations and prosecutions of cybercrime and other offences involving electronic evidence. As stated by the Deputy Secretary General of the
16
Council of Europe in March 2015: We need more effective criminal justice and we need stronger safeguards regarding national
Uncertainty regarding the availability of data Reports on mass surveillance and the ruling of the European Court of Justice on the EU Data Retention Directive has led to uncertainty regarding rules on procedural powers not only within the European Union but also elsewhere. In some countries, not only data retention provisions but also other powers to secure electronic evidence have been abolished or are in question. Delays in the adoption of European data protection frameworks at the level of the European Union and the Council of Europe create further uncertainty.
Moreover, cooperation by cloud service providers and other industry with criminal justice often depends on their own internal policies and they may change these unilaterally at any time. Types of data needed for criminal justice purposes For the purposes of a criminal investigation, three types of data may be needed: Subscriber information; Traffic data; Content data. In many jurisdictions, conditions for access to subscriber information tend to be lower than for traffic data and the strictest regime applies to content data.
Subscriber information. Subscriber information is essential to identify the user of a specific Internet Protocol (IP) address or, vice versa, the IP addresses used by a specific person. Identifying the subscriber of an IP address is the most often sought information in domestic and international criminal investigations related to cybercrime and electronic evidence. Without this information, it is often impossible to proceed with an investigation.
17
As a result of the assessment of the mutual legal assistance provisions, the T-CY recommended to consider a light regime for international requests for a limited set of subscriber information: Parties should consider allowing ± via legal domestic amendments and international agreement ± for the expedited disclosure of the identity and physical address of the subscriber of a specific IP address or user account. Subscriber information also comprises data from registrars on registrants of domains.
Subscriber information is likely to be held by service provider’s services in the territory´ of a Party although the information may actually be stored on servers in other jurisdictions. It may thus not always be clear to whom to address a request for subscriber information. However, Article 18.1.b Budapest Convention offers a practical solution in that competent authorities of a Party should be able to request subscriber information from a service provider offering a service on its territory irrespective of where the information is actually stored: Article 18 ± Production order 1 Each Party shall adopt such legislative and other measures as may be necessary to empower its competent authorities to order: a control, which is stored in a computer system or a computer-data storage medium; and b a service provider offering its services in the territory of the Party to submit subscriber. In Belgium, this power is reflected in Article 46bis (§2) of the Belgian Code of Criminal Procedure and is being tested in the ³Belgian Yahoo! case´.4
Cloud computing. Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics (On-demand self-service, Broad network access, Resource pooling, Rapid elasticity, Measured Service); three service models (Cloud Software as a Service (SaaS), Cloud Platform as a Service (PaaS), Cloud Infrastructure as a Service (IaaS)); and, four deployment models (Private cloud, Community cloud, Public cloud, Hybrid cloud). 4 studymafia.org/cyber-crime-seminar-ppt-with-pdf-report/ 18
Key enabling technologies include: (1) fast wide-area networks, (2) powerful, inexpensive server computers, and (3) high-performance virtualization for commodity hardware data is less held on a specific device or in closed networks but is distributed over different services, providers, locations and often jurisdictions.
In traditional computer forensics, due to the centralized nature of the information technology system, investigators can have full control over the forensic artifacts (router, process logs, and hard disks). However, in the cloud eco system, due to the distributed nature of the information technology systems, control over the functional layers varies among cloud actors, depending on the service model. Therefore, investigators have reduced visibility and control over the forensic artifacts.5
WHICH OF THE FOLLOWING USER GROUPS ARE MOST VULNERABLE TO CYBER CRIME?
Options Govt. Agencies Financial Institutions Private Sectors Personal Users Total
Respondents (a) (b) (c) (d)
5 ibid 19
8 8 5 4 25
20
COUNTER MEASURES
The Indian parliament considered it necessary to give effect to the resolution by which the General Assembly adopted Model Law on Electronic Commerce adopted by the United Nations Commission on Trade Law. As a consequence of which the Information Technology Act 2000 was passed and enforced on 17th May 2000. The preamble of this Act states its objective to legalise e-commerce and further amend the Indian Penal Code 1860, the Indian Evidence Act 1872, the Banker’s Book Evidence Act 1891 and the Reserve Bank of India Act 1934. The basic purpose to incorporate the changes in these Acts is to make them compatible with the Act
21
of 2000.So that they may regulate and control the affairs of the cyber world in an effective manner.6 The Information Technology Act deals with the various cyber crimes in chapters IX & XI. The important sections are Ss. 43,65,66,67. Section 43 in particular deals with the unauthorised access, unauthorised downloading, virus attacks or any contaminant, causes damage, disruption, denial of access, interference with the service availed by a person. This section provide for a fine up to Rs. 1 Crore by way of remedy. Section 65 deals with ‘tampering with computer source documents’ and provides for imprisonment up to 3 years or fine, which may extend up to 2 years or both. Section 66 deals with ‘hacking with computer system’ and provides for imprisonment up to 3 years or fine, which may extend up to 2 years or both. Further section 67 deals with publication of obscene material and provides for imprisonment up to a term of 10 years and also with fine up to Rs. 2 lakhs. Prevention is always better than cure. It is always better to take certain precaution while operating the net. A should make them his part of cyber life. Sailesh Kumar Zarkar, technical advisor and network security consultant to the Mumbai Police Cyber crime Cell, advocates the 5P mantra for online security: Precaution, Prevention, Protection, Preservation and Perseverance. A netizen should keep in mind the following things1. To prevent cyber stalking avoid disclosing any information pertaining to oneself. This is as good as disclosing your identity to strangers in public place. 2. Always avoid sending any photograph online particularly to strangers and chat friends as there have been incidents of misuse of the photographs. 3. Always use latest and up dateanti virus software to guard against virus attacks. 4. Always keep back up volumes so that one may not suffer data loss in case of virus contamination 5. Never send your credit card number to any site that is not secured, to guard against frauds.
6 www.kpmg.com/Global/en/IssuesAndInsights/ArticlesPublications/.../cyber-crime.pdf 22
6. Always keep a watch on the sites that your children are accessing to prevent any kind of harassment or depravation in children. 7. It is better to use a security programme that gives control over the cookies and send information back to the site as leaving the cookies unguarded might prove fatal.7 8. Web site owners should watch traffic and check any irregularity on the site. Putting host-based intrusion detection devices on servers may do this. 9. Use of firewalls may be beneficial. 10. Web servers running public sites must be physically separate protected from internal corporate network. Adjudication of a Cyber Crime - On the directions of the Bombay High Court the Central Government has by a notification dated 25.03.03 has decided that the Secretary to the Information Technology Department in each state by designation would be appointed as the AO for each state.8
7 wsilfi.staff.gunadarma.ac.id/Downloads/files/13309/W03-Cyber+crime.pdf 8 ibid 23
CONCLUSION
Capacity of human mind is unfathomable. It is not possible to eliminate cyber crime from the cyber space. It is quite possible to check them. History is the witness that no legislation has succeeded in totally eliminating crime from the globe. The only possible step is to make people aware of their rights and duties (to report crime as a collective duty towards the society) and further making the application of the laws more stringent to check crime. Undoubtedly the Act is a historical step in the cyber world. Further I all together do not deny that there is a need to bring changes in the Information Technology Act to make it more effective to combat cyber crime. I would conclude with a word of caution for the pro-legislation school that it should be kept in mind that the provisions of the cyber law are not made so stringent that it may retard the growth of the industry and prove to be counter-productive. While there is no silver bullet for dealing with cyber crime, it doesn’t mean that we are completely helpless against it. The legal system is becoming more tech savvy and many law enforcement departments now have cyber crime units created specifically to deal with computer related crimes, and of course we now have laws that are specifically designed for computer related crime. While the existing laws are not perfect, and no law is, they are nonetheless a step in the right direction toward making the Internet a safer place for business, research and just casual use. As our reliance on computers and the Internet continues to grow, the importance of the laws that protect us from the cyber-criminals will continue to grow as well.
24
BIBLIOGRAPHY WEBSITES 1. www.lexisnexis.in/books-cyber-crimes.htm 2. www.jainbookdepot.com/servlet/jbsubjdisp?offset=0&subname=Cyber+Crime 3. www.ncdrc.res.in/national-cyber-crime-reference-hand-book-first-edition.php 4. www.polity.co.uk/book.asp?ref=9780745627359 5. guides.library.lls.edu/c.php?g=497723&p=3407532 6. cyberlaws.net/cyber-law-books/. 7. cybercrimecentre.in/cyber-law-books/.
25