Cyber Crime Investigation in India
Cyber Crime Investigation in India
Cyber Crime Investigation in India
* Assistant Professor, Amity Law School, Amity University Gurugram, Haryana, India
** Assistant Professor, Amity Law School, Amity University Gurugram, Haryana, India
INTRODUCTION
Another way for the protection and detection of Cyber-crimes in India is- Crime and Criminal
tracking system, which is approved by the Central Govt. in 2009 under national E- Governance
project to detect Cyber-crimes in India by using IT, enabled tracking and Crime detection
system. But unfortunately, till today it is not completed by all the States in India.
DETECTION OF CYBER-CRIMES
There are different ways to deal with detection of different Cyber-crimes. These Cyber-crimes
can broadly be divided in to two parts:
1 Cyber-crimes, where Computer is target for Cyber Offence.
2 Cyber-crimes, where Computer used as a mean(s) for the commission of crime.
The Investigation process of such crimes is often not exactly similar as other crimes.
1
• Cyber Crimes Investigation Cell (CCIC)
2
• Cyber Crimes Research & Development Unit (CCRDU)
3
• Cyber Forensics Laboratory (CFL)
4
• Network Monitoring Centre
iii
vi
The Code of Criminal Procedure, 1973 contained various legal provision regarding the
investigation of Criminal offence which is also applicable to Investigation of Cyber offences
also. Here below is list of those legal provisions:
The followings charts are showing the Seizure process to be adopted by a Cyber Investigator
with precautions (Chart No. 1 & 2) and the submission report after investigation (Chart No.
3):
Chart NO. 2:
viii
7. Determination of Cyber Criminal Jurisdiction, Provisions in Cr. Pc, 1973 and It Act,
2000:
The origin of word jurisdiction has origin from the Latin word ‘jus, juris and diare’ meaning
thereby ‘Law’ and ‘Speak’. Jurisdiction and competency of the court is the most important
aspects of every Criminal Justice System. Every jurisdictional error and incompetency of court
is always an error of law of court. Every court has inherent right to decide these things. A
decision without jurisdiction and incompetency is a coram non judice and denial of justice.
Jurisdiction is the legal and statutory right of the court to hear and decide a case.
Today cyber-world has no geological precincts. It can establish instant remote communications
with anyone who can have access the computer or Internet. Generally, web-user is unaware of
source and the network and servers/routes exactly from where the information on a site is being
accessed. Jurisdictional issues are of primary importance in Cyber-world. World Wide Web
(www) does not make the clear geographical and jurisdiction border. The web user though
physically in one place but may be in jurisdiction of other country virtually or technologically.
Even a single Cyber /web- transaction may engross the laws of at least three jurisdictions.
Those are:
1 The laws of the Country/ State where- the user victim or accused reside.
2 The laws of the Country/ State of the location of transaction-server host.
The laws of the Country/ State of the person or business with whom the
3
transaction takes place.
*Technically even the intermediary server hosting Country/ State also have jurisdiction for
being the Intermediary both accessory and victim of Cyber-crime. Here below is the list of
legal provisions enumerated in Code of Criminal Procedure Code, 1973 and Information
Technology Act, 2000 which deal with the determination of jurisdiction for Investigation of
Cyber Offences:
1 Place of Trail/ Inquiry where the offence was committed- Sec. 177
If the offence committed in more than one jurisdiction- any of the relevant
2
jurisdiction- Sec. 178
Where the accused found to possess the property obtained in theft, extortion or
3
stolen property- Sec. 181
4 Offences Committed by letters, massages- where send or received- Sec. 182
Offences committed outside India by a Indian citizen, on aircraft registered in
5 India, tried as if offence committed in India with prior sanction of Central Govt.-
Sec. 188
6 Period of limitation to take cognizance- Sec. 468
Confiscation of any Computer or accessory liable to be confiscated if used for
7
commission of offence- Sec. 77 r/w Sec. 81 of IT Act, 2000.
Compensation, penalty, confiscation not to interfere with other remedies under
8
statutes
Compounding of offences, where the sentence is below 3 years Sec. 77A of IT
9
Act, 2000
10 Offence with 3-year punishment are bailable- Sec. 77B
Power to investigation is given to Inspector and above the rank of Inspector-Sec.
11
78 of IT Act, 2000
Inspection provision- to be consistent with Sec. 80, which gives the power of
Police Inspector/ officer to search and arrest, without warrant any person who
12
has committed, is committing or about to commit any offence under IT act,
2000- Sec. 80
6 Recording Equipment- to video graph and taking photographs of the crime scene
7 Custody of report sheets and other paper for inventories and seize evidencesix
Qus. What types of physical and digital evidence were involved with the crime?
Qus. Does any of the evidence need to be photographed/ preserved immediately?
Qus. When were the crimes committed?
Qus. Where the physical and digital evidence might be placed?
Qus. How can the evidence be preserved and maintained for court proceedings?x
examinations and lingers on the cases for an unlimited time. One more thing about digital
evidence is improper acquisition of digital evidence can make it inadmissible.
The Anti-Corruption Bureau of India has recently removed this lacuna and incrimination aspect
while analyzing the digital data obtained during the sting operation campaigning of Aam
Aadmi Party. The Aam Aadmi Party’s sting operations seem to have slight impact upon
dishonest officials. Merely about 30 people have acted on the Chief Minister’s advice to
secretly doing of these sting operations. The Anti-Corruption Bureau affirmed that- most of
these recordings are of very poor quality that it could not be the basis of action. Those
recordings were not clear and also the complainants are not to ask incriminating questions.
After the launch of anti-corruption helpline, the Anti Corruption Department has received about
40,000 calls in first week. Now the officials are guiding the callers on properly conducting
sting operations.
2) Mobile Forensics Would Solve Northern Railways Recruitment Paper Leak Case:
Now the mobile phones are commonly used for commissions of crimes. It includes
conventional crimes and modern technology linked crimes. Mobile phones have valuable
digital evidence which is relevant for trial. Our law enforcement agencies are away from
complicated mobile forensics investigations. However, that would be necessary for them to do
so in future. The Indian telecom companies are still unaware of least concern of Indian laws
pertaining to preservation of digital evidence pertaining to various cases. They are violating
the provisions of Information Technology Act, 2000 and the Information Technology
(Intermediaries Guidelines) Rules 2011. The investigators in Northern Railways recruitment
Exam have summoned 50 persons for interrogation.
The police arrested six persons for possessing coded slips of solved answers. Total four mobile
phones were also confiscated, used by the master minds. Two of the accused had deleted SMSs
of particular questions prior to their entry in examination centre and investigators have not
found any text message connected to the questions on their mobiles. All the mobiles were sent
to Central Forensic Science Laboratory for retrieving the deleted messages and the reports were
pending.
CONCLUSION
After the above discussion we can conclude that- ‘Cyberspace presents a challenging new
frontier for criminology, police science, law enforcement and policing. Since the 1990s,
academics and practitioners have observed how cyberspace has emerged as a new field of
criminal activity.’- Gottschalk, Petter (2010).
This aspect has changed the modes, nature and scope of criminalization and victimization. The
legislative will and initiative is very significant, which is required to amended from time to
time. Further then the legislative framework, even the NCCS (National Cyber Security
Strategy) is very essential. Our Country must aim to develop a very secure and pliant
cyberspace for cyber citizens, Netizens, businesses and government organizations. A Cyber
security law develop and articulates the vision, objectives, guiding principles and approach to
meet cyber security targets. The advancement of Cyber Crime Investigation Modules, hands
on training to cyber-crime investigators on Cyber Crime Investigation and Forensics,
accessibility of required devices and equipments with the State Forensic Science Laboratories
and infrastructure are other important determinants in effective cyber-crime policing and
investigation. Finally, we can say - more professionalism, more expertise, updated
technologies, experts and analysts required for cyber-crime investigation and cyber policing
ever before.
ENDNOTES
i
IJSTM.com, Vol. No. 6, Issue No. 04, April 2017.
ii
How to Register Cyber Crime Complaint with Cyber Cell of Police- online Complaint procedure- by Ramanuj,
May 25, 2014.
iii
Available at https://www.yumpu.com
iv
https://www.yumpu.com
v
Available at www.slideshare.net
vi
Available at http://www.nja.nic.in
vii
Bare Act, The Code of Criminal Procedure, 1973.
viii
Secure of Digital Space by Dr. S. Murugan IPS- https://www.slideshare.net/prpoint/secure-digital-space-by-
dr-s-murugan-ips
ix
Available at https://www.yumpu.com/en/document/view/28923514/crime-manual-2005-full-in-pdf-central-
bureau-of-investigation
x
Available at http://www.iacpcybercenter.org/officers/cyber-crime-investigations/
xi
Available at http:slideshare.net/karnikaseth/cybercrime-investigations-and-it-act2000.