CHALLENGES AND APPROACHES IN TACKLING CYBERCRIME LAW IN INDIA THROUGH TECHNOLOGY

Published on 4th March 2025

Authored By: Srijan Vishwakarma
University of Lucknow

Introduction

Concept of Cyber Crime

The term “cybercrime” originated alongside the swift progress in the computer sector and the expansion of networks.

Cybercrimes present a substantial concern owing to their potentially catastrophic repercussions, encompassing financial losses, unauthorized access to and breaches of sensitive information, system failures, and reputational harm to enterprises.

Cybercrime is typically described as the illicit utilization of any communication device to execute or facilitate an unlawful conduct.

This kind of crime entails the targeting or exploitation of a computer or a network of computers to cause damage or attain malevolent goals.

Cybercrimes are generally perpetrated using computers and networks, targeting individuals, businesses, and governmental agencies.

To combat cybercrime, investigators utilize several ways to analyze devices suspected of involvement in cybercriminal operations or those that have been targeted by such actions. 

Categories of Cyber Crimes in India

The Indian Cyber Crime Coordination Centre (I4C) has delineated four primary forms of cyber fraud, emphasizing the many strategies utilized by hackers to mislead and abuse victims. The following is a comprehensive elucidation of each category:

  1. Fraud on Social Media

Social media fraud entails the creation of counterfeit accounts or the impersonation of authentic users to engage in detrimental actions. This encompasses the transmission of menacing communications, impersonation, or participation in fraudulent activities such as email spamming.

  1. Cyber Extortion

Cyber extortion occurs when perpetrators solicit payment in exchange for the return of stolen data or to cease harmful actions, such as distributed denial-of-service (DDoS) attacks. It is a common technique for financially exploiting victims.

  1. Trading Scams

Cybercriminals entice victims via adverts on social media, offering free trading advice or assured riches in the stock market. These advertisements frequently utilize counterfeit photos of famous stock market analysts or fictitious news stories to establish credibility. Unwary individuals adhering to these recommendations may incur substantial financial losses due to deceptive scams.

  1. Digital Arrest Scams

This form of deception involves victims receiving distressing phone calls asserting their involvement in crimes associated with illicit items, contraband, or other unlawful activities. The perpetrators imitate law enforcement personnel or government authorities, coercing victims into remitting “fines” or divulging sensitive personal and financial information to exonerate themselves.

  1. Investment Scams

Victims are solicited via WhatsApp messages originating from international numbers, frequently advertising enticing work-from-home prospects. These programs typically entail generating income by executing uncomplicated chores, such as enhancing social network evaluations. Initially, victims receive little compensations for task completion, thereby fostering their trust. Subsequently, they are requested to undertake “pre-paid tasks” necessitating substantial financial deposits. Upon the completion of payments, the fraudsters vanish, resulting in victims being financially depleted.

  1. Dating Scams

This sort of fraud predominantly targets male victims. Fraudsters impersonate foreign women seeking romantic partnerships or matrimony. Upon establishing the victim’s trust, they may solicit funds for trip expenditures, medical issues, or other contrived justifications. These frauds target emotional susceptibility, resulting in both financial and psychological pain for the victims.

Challenges related to cyber crimes in India

  1. Swift Technological Progressions
  • Emerging Technologies: The rapid advancement of technologies such as AI, IoT, blockchain, and cloud computing frequently surpasses the evolution of cybersecurity protocols.
  • Expanded Attack Surface: The proliferation of online devices and services amplifies the number of susceptible points for cyber assaults. The increase of smartphones and IoT devices in Indian households has resulted in new vulnerabilities.
  • Difficulty in Maintaining Pace: Law enforcement and enterprises frequently have challenges in adapting to the latest technical advancements, resulting in vulnerabilities that cybercriminals exploit.
  1. Advanced Cyber Attacks

Cybercriminals utilize advanced methods such as phishing, ransomware, deepfake technology, and zero-day exploits, which are difficult to identify and counteract.

  • Structured Cybercrime Syndicates: Cybercrime organizations are becoming more well-financed and systematic, utilizing dark web marketplaces to procure tools, pilfered data, and resources.
  • Instances in India: The prevalence and intricacy of data breaches in financial institutions, healthcare systems, and key infrastructure are increasing.
  1. Cyber Warfare and State-Sponsored Assaults
  • Geopolitical Tensions: India’s status as a regional and global power renders it susceptible to state-sponsored assaults from rival nations. Cyber warfare is frequently employed as a mechanism for espionage, sabotage, and economic disruption.
  • Critical Infrastructure Vulnerabilities: Sectors such as electrical grids, transportation, defense, and finance are susceptible to state-sponsored cyberattacks, which might result in extensive damage.
  • Instances: Reports of cyber attacks originating from China and Pakistan against Indian governmental and business sectors are frequent.
  1. Insufficient Cybersecurity Awareness
  • General Public Vulnerability: A significant segment of the population lacks sufficient awareness of fundamental cybersecurity measures. For example, numerous individuals continue to succumb to phishing attacks or employ inadequate passwords.
  • Corporate Oversight: Small and medium-sized firms (SMEs) sometimes lack the resources and understanding necessary to establish comprehensive cybersecurity protocols, rendering them vulnerable targets.
  • Digital Literacy Disparity: Rural regions and individuals with limited technological proficiency are more susceptible to cyber fraud due to a pronounced digital divide.
  1. Insufficient Legal Framework
  • Obsolete Legislation: Although the IT Act of 2000 regulates cybercrimes in India, it has not been thoroughly revised to accommodate the intricacies of contemporary cybercrime.
  • Jurisdictional Challenges: Cybercrimes frequently cross national boundaries, complicating the enforcement of laws and the prosecution of offenders.
  • Restricted Enforcement Mechanisms: The deficiency of skilled cybercrime investigators and allocated resources obstructs the efficient enforcement of current legislation.
  • Necessity for specific Legislation: Emerging challenges such as cryptocurrency fraud, data privacy infringements, and AI-related offenses require more specific legal frameworks. 

Approaches taken by government to overcome cybercrimes in India

  1. National Cyber Forensic Laboratory (Investigation): Situated in New Delhi, this laboratory provides preliminary cyber forensic support to Investigating Officers (IOs) from State/UT Police using online and offline methods.
  2. National Cyber Security Policy (NCSP): Designed to establish a secure cyberspace and enhance cybersecurity in India.
  3. The Indian Cyber Crime Coordination Centre (I4C) functions as a central entity for coordinating initiatives to combat cybercrime by augmenting the capacities of law enforcement authorities to prevent and investigate these instances.
  4. National online Crime Reporting Portal: Facilitates public reporting of various online crimes, emphasizing offenses against women and children.
  5. The National Critical Information Infrastructure Protection Centre (NCIIPC) is dedicated to protecting critical information infrastructure from cyber threats by identifying essential sectors and formulating protective guidelines and policies.
  6. Cyber Swachhta Kendra: Seeks to identify and eradicate malware-infected systems, mitigating the effects of botnets and fostering cybersecurity hygiene.
  7. Computer Emergency Response Team (CERT-In): The national entity tasked with managing and alleviating cybersecurity problems. CERT-In disseminates advisories and notifications to enhance cybersecurity awareness among public and commercial organizations.
  8. The Information Technology (IT) Act, 2000: A thorough legislative framework concerning electronic governance, digital signatures, data protection, and sanctions for cybercrimes.

Conclusion

The increasing frequency and complexity of cybercrimes present substantial difficulties to individuals, corporations, and governments. Despite technological developments, the developing digital ecosystem remains vulnerable to exploitation by cybercriminals, requiring a comprehensive strategy to assure safety and resilience. The Indian government has instituted several initiatives, including the formation of the Indian Cyber Crime Coordination Centre (I4C), Cyber Swachhta Kendra, and the promulgation of the IT Act, 2000, to address these risks. Nonetheless, obstacles such as deficient legislative frameworks, limited public knowledge, and the swift advancement of cyber dangers persist as critical concerns. To successfully manage and mitigate the dangers of cybercrimes, a unified approach incorporating revised legislation, improved cybersecurity education, technology innovations, and international collaboration is needed. As India advances towards a digitally empowered society, tackling cybersecurity will be essential for protecting its digital infrastructure and maintaining public trust.

 

References

International Journal of Legal Research and Analysis, ‘Cybersecurity Legislation in India: Evaluating Effectiveness in the Face of Evolving Threats’ https://www.ijlra.com/paper-details.php?isuur=1753 accessed 16 January 2025.

Policy Bazaar, ‘Cybersecurity Legislation in India: Evaluating Effectiveness in Face of Evolving Threats’ https://www.policybazaar.com/corporate-insurance/articles/cybersecurity-legislation-in-india-evaluating-effectiveness-in-face-of-evolving-threats/ accessed 16 January 2025.

Bhrigu Desai, ‘Cyber Crime Law in India: Has Law Kept Pace with Emerging Trends? An Empirical Study’ (ResearchGate) https://www.researchgate.net/publication/40765441_Cyber_Crime_Law_in_India_Has_Law_Kept_Pace_with_Emerging_Trends_An_Empirical_Study accessed 16 January 2025.

International Comparative Legal Guides, ‘Cybersecurity Laws and Regulations: India’ (ICLG) https://iclg.com/practice-areas/cybersecurity-laws-and-regulations/india accessed 16 January 2025.

Cyber Talents, ‘What is Cybercrime? Types, Examples, and Prevention’ https://cybertalents.com/blog/what-is-cyber-crime-types-examples-and-prevention accessed 16 January 2025.

Shankar IAS, ‘Challenges in Cyber Security’ (Shankar IAS Parliament) https://www.shankariasparliament.com/current-affairs/challenges-in-cyber-security accessed 17 January 2025. 

PW Only IAS, ‘Cyber Crime in India’ (PW Only IAS) https://pwonlyias.com/current-affairs/cyber-crime-in-india/ accessed 17 January 2025. 

Bhardwaj A, ‘Issues and Challenges in Cybersecurity’ (PhilArchive) https://philarchive.org/archive/BHAIAC accessed 17 January 2025. 

 

 

 

 

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top