Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan
Credits: IndiaTimes
Law does provide a remedy against most of the prevalent cyber crimes. ‘Cyber crime’ is not a defined term but a catch-all phrase attributable to any offence involving an internet device. Most of the cyber crimes are listed under the Information Technology Act (IT Act), 2000, which was amended in 2008.
However, this clarity vaporises with the realisation that IT Act is not the only enactment covering cyber crime. The Indian Penal Code (IPC) could also be called in to initiate prosecution against cyber crimes or to supplement the provisions of the IT Act. For instance, offences like hacking, data theft, virus attacks, denial of service attacks, illegal tampering with source codes including ransomware attacks could be prosecuted under S.66 r/w S.43 of the IT Act. Cases of forging a credit or debit card or even cloning a mobile SIM with dishonest or fraudulent intent to cause wrongful loss or wrongful gain could be prosecuted under IPC provisions (S.463 to S.471 IPC, as applicable).
Additions to the IT Act in 2008 protect against identity theft (S.66C) or cheating by impersonating online (S.66D). Victims of revenge porn may register complaints for violation of their privacy under S.66E as also under S.67 and S.67A IT Act in addition to IPC provisions. S.67A and S.67B also provide for prosecution of pornography and child pornography respectively. In case of the latter, the provisions of the Prevention of Children from Sexual Offences Act, 2012 (POCSO) may also be invoked.
As children are armed these days with cameras and data on their mobile phones and raging hormones at increasingly reducing, the instances of revenge porn attacks by children against children are on the rise. Irrespective of the age of the accused, if the offence of circulating sexually explicit content or violating privacy through dissemination of images or videos of private parts, is committed, the person is susceptible to prosecution.
With respect to child pornography, the law is very stringent. It is not only publishing or transmission of child porn that is an offence but even browsing for such content and retaining or downloading it is an offence too, unlike for pornography where only the dissemination and transmission, sale, etc. are considered offences. Further, actions intended to entice children through social media for creatingchild porn content or to record abuse of children and circulating the same are all offences punishable under the IT Act. Most offences carry maximum imprisonment of three years and fine. However, the more serious offences such as child pornography carry stronger punishment ranging from five to seven years. Crimes other than those affecting the “socio-economic conditions” or against women and children, may also be compounded i.e., settled.
Reporting a cyber crime
The procedure for reporting cyber crimes is more or less the same as for reporting any other kind of offence. The local police stations can be approached for filing complaints just as the cyber crime cells specially designated with the jurisdiction to register complaint.In addition, the Ministry of Home Affairs is also launching a website for registering crimes against women and children online including cyber crimes.
Remedies for financial fraud
Apart from the criminal processes, S.46 IT Act also provides for remedies against data theft, hacking, virus attacks and financial frauds covered under Chapter IX (S.43 to S.45) by filing an application before the adjudicating officer. Presently, the ad-hoc system of the secretary of the IT ministry acting as the said authority continues. This remedy has been very successfully availed of by victims of financial frauds. However, there is clear ignorance about the fact that the jurisdiction of this authority far exceeds claims against banks.
The ambiguities
Several initiatives have been taken to ensure awareness among police and judiciary. These exercises have to be balanced with sensitisation programmes to ensure that the persons involved in the system understand the effects of cyber crime and act expeditiously. There are, however, many old systemic problems. Also, there is rampant abuse and misuse of the provisions of the IT Act due to its opacity. Lack of awareness among users merely aggravates this problem.
Other instances where there is actually no ambiguity in law and yet it is being misused is of S.67 being used to prosecute “cyber defamation”. S.67 is on par with S.292 IPC and both have clearly defined high thresholds for initiation of action. This section was neither intended for nor does it apply to “cyber defamation”. Clearly, after ensuring strike-down of S.66A IT Act through its rampant abuse, the enforcement authorities have now resorted to S.67 IT Act. Such instances of patent abuse merely dilute the effectiveness of the provisions.
Expeditious action by police in clear cases of cyber crime; collation of evidence in a manner that will withstand trial; and completion of court proceedings without delay with clear understanding of the technology and the law are just some goals that the system could aim for. It cannot ask users to “keep away” from use of technologies merely due to its inability to protect them. That is akin to asking women to not step out after dark. Until the legal system demonstrates robustness, even irrespective of it, users must exercise due caution in the use of technology. Adapt but do so with care and responsibility, as the the virtual world requires as much caution as the real world.
www.extremehacking.org
Sadik Shaikh | Cyber Suraksha Abhiyan, Ethical Hacking Training Institute, CEHv9,CHFI,ECSAv9,CAST,ENSA, CCNA, CCNA SECURITY,MCITP,RHCE,CHECKPOINT, ASA FIREWALL,VMWARE,CLOUD,ANDROID,IPHONE,NETWORKING HARDWARE,TRAINING INSTITUTE IN PUNE, Certified Ethical Hacking,Center For Advanced Security Training in India, ceh v9 course in Pune-India, ceh certification in pune-India, ceh v9 training in Pune-India, Ethical Hacking Course in Pune-India