JUL-SEP 2007 Vol 3 Issue14

Brainwave                                                 

 

THE INFORMATION TECHNOLOGY ACT, A DYNAMIC LEGISLATION TRAPPED IN AN ARCHAIC LEGAL SYSTEM:

THE INSTANCE OF HACKING- A CYBER CRIME

by Saurabh Awasthi
MBA (IT), IIIT Allahabad

Computer Crime as defined by the I.T. Act, 2000 has become a new menace to society with hacking being one of the most popularized forms of computer crime. It is not that the legislature is not capable to equipping to Indian Laws to meet the needs of society but the constant need of the legislature to refer to archaic principles of criminal law engraved in the Indian Penal Code to justify computer crimes as being criminal in nature has lead to a serious devaluation of computer crimes by the legislature as being capable to raging serious chaos and disarray in all aspects of societal life especially business activities.

 Cyberspace is not an entity that has already evolved and therefore ready to be analyzed threadbare. It is still developing and unfolding. But it is already transforming the world we live in. The convergence of communication and information technology has touched upon almost all the aspects of human life. Computers are not only used to perform the industrial and economic functions of the society but are also used to perform many functions upon which human life depends. It has opened up a wave of criminal behavior in ways that would never have previously been possible as computer system offer new and highly sophisticated opportunities for law breaking, and they create the potential to commit traditional type of crimes in non traditional ways. Cyber revolution and its reach in the human lives offer many opportunities for criminal behavior.

 The age of information technology has opened up a Pandora’s Box as far as criminal activities are concerned. We face a distinct disadvantage in the formulation of laws relating to cyber crime because of the inherent lack of belief shown by the judiciary in the area of privacy. It is ironical that not only has the Supreme Court failed to recognize the right to privacy but has given a impression that privacy is hardly a right and any remedy for  the breach of privacy is to be left at the mercy of the honorable courts. Needless to say there has been a legislative failure to actualize on this principle. The intensity and complexity of life have rendered necessary some retreat from the world. The development of media in modern times has a special relevance to the evolution to the law of privacy. Computer technology and telecommunications have dramatically increased the amount of information that can be stored, retrived, accessed and collected most accessible to the potential hacker.

Challenges that hacking poses to the Criminal Justice System

The wide variety of information that can be transferred, the open, unregulated nature of the internet, and the irrelevance of geography implies that Internet also provides fertile grounds for criminal enterprise. Since the platform for Internet is a computer, crimes occurring on the internet are referred to as “computer crimes”. Defining “computer crime” is relatively difficult because of the wide array of criminal activities that may be perpetrated by means of a computer. A computer may be the subject of a crime by being stolen or damaged; it can be the site of a crime such as a fraud or copyright infringement; or it can be the instrument of a crime such as when it is used to access other machines or store information illegally. Since the internet’s strength and purpose is facilitation of communication, traditional crimes such as conspiracy, solicitation, securities fraud even espionage can be committed via the internet.

According to the proposed convention for the Cyber Crime by the Council of Europe, hacking has been given the term ‘illegal access’ and refers to access to the whole or any part of the computer system without such right being assigned or delegated. Such access should be committed intentionally and might be committed by infringing security measures, with the intent of obtaining computer data or other dishonest activity, or in relation to a computer system that is connected to another system. The scope of illegal access is somewhat broader tan mere hacking. It would also include ‘cracking’ and any other access made without authorization, by whatever name it may be called. The requirements are that it must be accessed without right and that it must be intentional access.

Section 66 of the I.T.Act deals with “Hacking”, however the scope and meaning is much beyond than mere ‘illegal access’ as contemplated under the proposed cyber Crime Convention. It states that whoever with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or person destroys or deletes or alters any information residing in a computer recourse or diminishes its value or utility or affects it injuriously by any means commits a hack. Therefore the pre requirement for ‘hacking’ under section 66 is not unauthorized access to a computer, whether intentional or not, but whether there has been firstly a destruction or deletion or alteration of any information residing in a computer recourse, secondly whether such activity has led to the diminution of value of the material contained inside or has effected the information injuriously and lastly whether such activity was done to accuse wrongful loss or damage to public or person. Thus the emphasis for committing hacking under the act is based on the effect on the information residing in the computer and any subsequent wrongful loss due to access rather than mere access to the computer itself. If someone only accesses a computer system without authorization, he cannot be charged under Section66 of the Act.

Hacking acts as gateway to other criminal acts. The laws in force should act as a deterrent to such a behavior. It is a bit too presumptuous to assume that one law would take care of all and sundry criminal acts but we should have a law in force which should stand on its own footing and sends a clear message of intolerance towards activities to potential hackers/crackers.

 Lack of Adaptability

 The Information Technology Act is not just about triggering e-governance. To get the bureaucrats to move will require more and more computers. At present the penetration in India is just about four as compared to three hundred and sixty two per thousand in the United States. IT will need a serious change of attitude. Opinions from various segments of society confirm that our law enforcement agency is not ready to tackle the issues of cyber crime and digital discovery. The police in India are not well equipped to deal with the contingencies and kinetics of prevention and detection of cyber crimes. In the first cyber case in the State of Uttar Pradesh, the investigation officer of the rank of Deputy Superintendent of Police confessed that he had never used the Internet and now, for the purpose of proper investigation of cyber crimes he has gone to the net. This is not an uncommon situation .Victims in cyber stalking have been advised by the police to “turn off their computers” or change their phone numbers, rather than trailing the guilty. The problem is ignorance, merely because it is a cyber crime, las enforcement agencies do not give it the importance that it deserves. It is not their fault either; they merely mirror the attitude of the judiciary.

 The problem, of course, does not lie in the fact that so many diverse kinds of crimes can be committed using the internet but the fact that the existing criminal law is still equipped to deal with this up gradation in the methods and media of committing crimes. The present Indian Law of crime has no definition of computer crime which would be understandable considering computers were not even invented at that point of time. Criminal Act involving the use of computers should be looked at independently. The current wave of judicial thinking in play is a sort of ‘pigeon hole’ formulate where actions like hacking, unauthorized access are constantly equated to established criminal wrongs like mischief and criminal trespass as means of justification to convince courts that the end justifies the means or vice versa.

 Cyber wrongs if one can call them as such are to be judged in their own light. Moreover, the people involved should have a certain mental framework to change their way of thinking and should approach the new cyber crimes penetratingly and silently. If we are to learn anything from the way; it is that we should learn from their mistakes. Our privacy is at stake, the time has come for us to gear up to reality, cyber crimes have arrived and are here to stay.

Disclaimer : The views expressed in the articles are author’s own views B’Cognizance or IIITA is not liable for any objections arising out of the same. The matter here is solely for academic use only.

Google
WWW www.mba.iiita.ac.in