...Ad idem ‘12 | Jurisdictional Issues in Cyber Crimes | | | | | Arashdeep Singh Gurm Address: #181 Anand Nagar A, Gurudwara Street Patiala(147001) E-Mail Id: arashdeepgurm@gmail.com Contact Number: 7508729986,9646020181 RAJIV GANDHI NATIONAL UNIVERSITY OF LAW, PUNJAB Mohindra Kothi, Mall Road, Patiala - 147 001 (PUNJAB) | ABSTRACT In this essay I wish to discuss the various types of crimes that are emerging with special reference to developing countries like India By developing we mean where growth of Information Technology is rampant but still it has not reached its peak. Cyber crimes can take place across various jurisdictions and hence the legal issue of jurisdiction of International Courts and country specific Indian Courts arises. Throw light on the present system in India, how it is ineffective and also upon international treaties and legal solutions to deal with the same. I have suggested possible ways to tackle the problem taking into consideration the domestic laws in India. The inefficiency of legislature to enact a more user friendly law is also examined in detail. Turning back our focus on the main legal dilemma of Jurisdiction of Cyber Crime Courts we have suggested a model that would be successful in India taking into consideration its working in other countries. In my concluding remarks a problem solution approach is taking where we have addressed the issue and after due consideration the solution is suggested. If proposal taken...
Words: 2824 - Pages: 12
...What is Cyber Crime? The has been a remarkable increase in the use of technology in the past decades whether it is computers, mobile phones, iPods, iPads or computer games in both the personal and business sector. There has been significant change in all aspects of society, and new opportunities had risen in every field whether it is entertainment, business, sports, education, health, banking, telephones, air traffic control, electric power, and the stock exchange. The improvements in these industries are huge and now depend on information technology for their operation. This rapid increase and change in technology advance has confirmed that the twenty first century was the new information age. This extraordinary growth, as well as the increase in the capacity and accessibility of computers has brought about innovative changes within crime. Crime refers to breaking or violating the law or the command of an act which is forbidden by law. Countries across the world have different strategies practices when dealing with crime and this is contingent on the extent and nature of crime. According to Wikipidia.com the new type of crime known as cybercrime or computer crimes involves the use of network and a computer as either a tool or a targeted victim. Moreover, Joseph A E, (2006) explains cybercrime as crime committed on the internet using a computer as either a tool or a targeted victim. The computer is considered a target when the crime is intended directly to the computer. Cybercrime...
Words: 701 - Pages: 3
...Diana Cooper Module 6 Planning a Persuasive Essay May 31, 13 Purpose: The purpose of this paper is to identify and understand the cause and effects of cyber bullying. Cyber bullying is a new form of bullying that has harmful psychological side effects on youth such as depression and anxiety. Although I am no longer in high school a friend of mines cousin has recently committed suicide because she was maliciously bullied online. Her story is one of many and the number of teens committing suicide because of cyber bullying seems to only be getting bigger. My goal on this casual analysis research paper is to educate parents and educational professionals on the consequences of cyber bullying and how to help prevent it. Outline: Thesis: Cyber Bullying leads to psychological damage in our community’s adolescents. I. Extent of the issue: a. Explain what cyber bullying is. b. According to CBC 78% of victims of bullying have been cyber bullied. c. Compare how an adult using social media is different then adolescents. IV. Cause of cyber bullying: a. Children do it to prove their social standing 1. Boos their egos 2. Gain praise from peers b. Children use social media as an outlet for revenge 1. Use out lets like face book and twitter to spread mass and public rumors 2. Quick and public way for kids to humiliate others III. Effects of cyber bullying: a. Cyber bullying gives fuel to prejudice issues 1. Can lead to racism. 2...
Words: 632 - Pages: 3
...Risky Business Argumentative Essay: Cyberbullying Draft and Bibliography Cyberbullying means sending insulting or threatening emails, texts, or instant messages directly to someone using a computer or cell phone. It means spreading hateful comments about someone through emails, blogs, online profiles, or chat rooms. It means stealing passwords and sending out threatening messages using a false identity. It means building a website targeting specific people. If there is so many ways to hurt people through technology, how come there is no laws or punishments for cyberbullying. Only recently the United States have been instating laws to help reduce cyberbullying. Even at that it is not enough these laws need to be strictly enforced by the government, and the people being held accountable for their actions. People argue the cyberbullying laws are a violation of the 1st Amendment, more specifically the freedom of speech and the freedom of expression. In Michigan, Joshua Mahaffey was 15, he and a friend created this web site in 2001. The website was called “Satan’s Web page” and according to Joshua it was created it for laughs. On the website listed “people I wish would die,” which listed names of several students at their schools. Then a parent notified the police about the site, it’s a threat and posed an infraction against the cyberbullying laws. Joshua was interviewed and admitted to creating and contributing to the website. Then he was sent to a local psychiatric...
Words: 1012 - Pages: 5
...Is the American Government the Best in the World? Taurean Gardner POL201: American National Government Instructor: Shawon Jackson-Ybarra 19 September 2015 I. The Constitution The American constitution has many strengths and weakness that make our political system best in the world. One major strength of the constitution is the believe that all men are created equal. One unique major weakness it can be extremely vague and it is a 100 years out of date. A way to enhance the strength and correct the weakness of the American constitution is to further push the believe, that all men are created equally, especially in the light of everything going on in today’s society. One way to fix the weakness is the update the constitution to modern language and make it easier to understand. “We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty and the pursuit of Happiness. - That to secure these rights, Governments are instituted among Men, deriving their just powers from the consent of the governed, - That whenever any Form of Government becomes destructive of these ends, it is the Right of the People to alter or to abolish it, and to institute new Government, laying its foundation on such principles and organizing its powers in such form, as to them shall seem most likely to effect their Safety and Happiness. Prudence, indeed, will dictate that Governments...
Words: 2016 - Pages: 9
...PAPER WRITTEN IN PARTIAL FULFILMENT OF THE ESSAY CONTEST ON CYBER CRIME BY ONUOHA, MAUREEN CHIZOBA C/O MR. DIKE G. OKORONKWO, PLOT 607 MONSTERRADO STREET, (NEAR RUSSEL CENTRE) WUSE ZONE 4, ABUJA, NIGERIA 2348055954286 27TH MAY, 2005 onuchizoba@yahoo.com INTRODUCTION Over the past twenty years, unscrupulous computer users have continued to use the computer to commit crimes; this has greatly fascinated people and evoked a mixed feeling of admiration and fear. This phenomenon has seen sophisticated and unprecedented increase recently and has called for quick response in providing laws that would protect the cyber space and its users. The level of sophistication has gone high to the point of using the system to commit murder and other havoc. The first recorded cyber murder committed in the United States seven years ago according to the Indian Express, January, 2002 “has to do with an underworld don in hospital to undergo a minor surgery. His rival goon hired a computer expert who altered his prescriptions through hacking the hospital’s computer system. He was administered the altered prescription by an innocent nurse, this resulted in the death of the patient”[i] This work seeks to define the concept of cyber-crime, identify reasons for cyber-crime, how it can be eradicated, look at those involved and the reasons for their involvement, we would look at how best to detect a criminal mail and in conclusion, proffer recommendations...
Words: 2267 - Pages: 10
...security threat – cyber-attacks. Numerous advantages of the attackers in cyber space and a lack of attribution and awareness has resulted in an increasing number of aggressive operations in the digital realm. Contrary to the beliefs of many, cyber security is not exclusively a technical issue but also a matter of politics and economics. We can observe an increasing number cyber warfare policies in the international realm, which increases the pressure to establish rules of governance in cyber space. The following essay will be concerned with the Stuxnet worm and its role in Operation Olympic Games, which targeted the Iranian nuclear power plant Natanz. The analyses will provide an overview of the attack, including technical comprehension of the attack, and also looks at the attack in term of its political consequences. The first section will discuss the origins of the attack, building on Ralph Langner’s article published in ‘IEEE Software’. Even though numerous cyber offences took place before, it will explain what made Stuxnet stand out. The second part of the essay analyses the political perspective of the attack and two competing theories explaining the presence of malware in the nuclear facilities. The following section analyses the role of cyber warfare as viable military strategy. It will be argued that cyber offences appear to be more applicable as an offensive rather than defensive strategy, due to the attacker’s advantage. The last part of the essay will discuss if it...
Words: 2431 - Pages: 10
...such as Facebook, My Space, Twitter and LinkedIn are due to the fact that they offer users various platforms to create their own profiles to represent themselves to interact with each other through emails, instant messages and many other integrated communication tools. While a variety of definitions of the term SNS have been suggested, this essay will use the one first suggested by Boyd and Ellison (2007:210) who saw it as: “web-based services that allow individuals to construct a public or semi-public profile, communicate with other users with whom they share a connection and view and navigate through their own list of connections as well as those of others.” As more people are becoming SNS users, it could be argued that more negative than positive impacts on society and human relationships can be seen in daily life (Ybarra and Mitchell, 2008:350; Wodzicki et al, 2012:9 ). Minors, in particular, become enmeshed more easily than adults with the increasing use of SNS (Kolbitsch and Maurer, 2006:187). Therefore, the objective of this essay is to assert that SNS generally have negative rather than positive impacts on their growth. This essay has been organized in the following way. It will begin by evaluating a...
Words: 2745 - Pages: 11
...immemorial, where inventions such as the chariot, canon powder and the airplane effectively changed the landscape of warfare.1 The law of armed conflict (LOAC) that exists today has developed as a reaction to the atrocities committed in the past; the four Geneva Conventions and the Additional Protocols of 1977 originated as responses to the increased suffering of civilians in armed conflict due in part to developments of weapon technology.2 The legal instruments to regulate the application of these advances in technology can barely keep up with challenges resulting from the rapidness of the advancement of contemporary military technologies. Moreover, recent technological advances raise the prospect of upheavals in practice so fundamental that they challenge assumptions underlying long-established international laws of war.3 This is because advances in technology have dramatically affected the weapons and tactics of future armed conflict, the “places” where conflicts are fought, the “actors” by whom they are fought, and the “means and methods” by which they are fought.4 These changes stress the fundamental principles of the LOAC, thus undermining its ability to regulate the conduct of hostilities; namely, by posing challenges to the principles of distinction, proportionality, military necessity and unnecessary suffering. This essay aims to assess the impact technology has had upon the LOACs ability to regulate the ...
Words: 3294 - Pages: 14
...For this essay, I will go over if the government done enough to detect and deter the crime of identity theft. I will also go over how technology made identity theft easier to commit. Also for this essay, I will also go over how will emerging technologies changed the role of the cybercrime investigator. Sources used: http://www.cardhub.com/edu/identity-theft/http://securitycourse.blogspot.com/2010/11/identity-theft-and-increase-in.htmlhttp://www.pcworld.com/article/2453400/the-biggest-data-breaches-of-2014-so-far.htmland http://securitycourse.blogspot.com/2010/11/identity-theft-and-increase-in.html The Fight Against Identity Theft Over the years people look at identity theft and say, “Oh it won’t happen to me. I don’t have a lot of money for people to want.” The thing is identity theft can happen to any with a Social Security Number, medical insurance, and any information useful to cyber criminals. Identity theft can occur when someone gains unauthorized access to someone’s personally identifying information. According to The Federal Trade Commission, there is about nine million Americans experience some form of identity theft. That number may be subjected to fluctuate because it can be consider both crime fighting tactics and methods that criminals use to steal identities over time but the FTC’s Consumer Sentinel Network received over...
Words: 606 - Pages: 3
...Cyber crimes essay THE INFORMATION TECHNOLOGY ACT AMENDMENT OF 2008 Cyber law, in a general sense, has been envisaged as a term that encapsulates the legal issues related to the use of communicative, transactional, and distributive aspects of networked information devices and technologies. And the crimes against these issues are termed as cyber crime Cyber law and cyber crime Cyber crime spans not only state and national boundaries, but the international boundaries as well. At the Tenth United Nations Congress on the Prevention of Crime and Treatment of Offenders, in a workshop devoted to the issues of crimes related to computer networks, cybercrime was broken into two categories and defined thus: * In a narrow sense, the term cyber crime has been defined as any illegal behavior directed by means of electronic operations that target the security of computer systems and the data processed by them. * In the broader sense, cyber crime has been defined as any illegal behavior committed by means of, or in relation to, a computer system or network, including such crimes as illegal possession [and] offering or distributing information by means of a computer system or network. The extent of cyber crime is so vast and complicated that an act which may be crime in one nation may not be so in another. Some of the basic examples of cyber crime are unauthorized access, damage to computer data and program, computer sabotage, unauthorized interception of communications, computer...
Words: 5688 - Pages: 23
...of cases that are reported per year. Also, why we need newer and stricter laws implemented against bullying crimes. I. Cyberbullying Definition, History, and Demographics a) Definition of cyberbullying and What other cybercrimes qualify under the category of cyberbullying such as cyber harassment b) History, when did cyberbullying begin c) What are some demographics such as gender, race, sexuality, etc… II. Statistics a) Statistics on how common cyberbullying is b) And the number of new cases each day to show the prevalence of the situation. c) Number of suicide cases related to cyberbullying each year. d) Show the reason we need harsher punishments to stop cyberbullying. III. Effects of cyberbullying a) Show how cyberbullying affects the nation as a whole. b) Show the effects that cyberbullying has on the victims. c) Will touch on a couple of cases from cyberbullying and the affect it had on the victim. IV. Laws on Cyberbullying a) I will show current law on cyberbullying and whether they are federal and/or state b) What new laws need to be implemented and why. c) How the age of the bully affect the punishment’ V. Internet security a) Why internet safety is need in this day and age b) New programs that are designed to stop cyberbullying (ReThink) c) How to protect ourselves from cyberbullying and other cyber crimes d) What to do if you or a love one becomes a victim of cyberbullying...
Words: 556 - Pages: 3
...Realism Theory focused Chinese – United States Foreign Policy There is no disputing that the United States (US) has been known around the world as the superior, single most dominating state for decades (Drew & Snow, 2006). There should be no surprise we are now seeing the rest of the world questioning how to deal with taming the American power (Walt, 2005). China along with other nations are facing this daunting question of how to balance the power, even the playing field by striving to become a great power (Forsyth, 2008). This essay will address the realism theory focusing on the three of the instruments of power (IOP) as it applies to the Chinese foreign policy towards the US. To begin with, this essay will touch on Chinas fluctuating military stance. China continues to display the traditional realist view of balancing power plus states gain their power through war and military intimidation (Forsyth, 2010). Chinas strategic culture and historical record shows they are willing to use force to maintain security and power against the US. They are positioning their assets and “threatening potential US conflict over Taiwan” (Gompert & Phillip, 2011, 42). They’ve increased their military budget, showed capabilities by shooting down a satellite, and “acquired military capabilities-including anti-ship cruise missiles, ballistic missiles, and electronic countermeasure technologies—that could hinder US forces if they tried to operate in China’s neighborhood” (Walt...
Words: 898 - Pages: 4
...Which lawmakers have jurisdiction over actions taking place on the internet? 1 CLN4U Final Culminating Essay April 15th 2016 Topic: hich lawmakers should have jurisdiction over actions taking place on the internet? W Which lawmakers have jurisdiction over actions taking place on the internet? 2 It’s a new world, an electronic world, a world in which laws are being made and broken on the world wide web. The questions at hand are: who should have control over creating and enforcing these laws on the internet? Who should be held accountable? In the 21st century, countries reserve the right to pass legislation upon their government’s discretion, however, there is a community of nations, aptly named the United Nations (UN), that have created a universal commission which defines the legal responsibilities of states in their treatment of individuals within their borders. This is named the International Law Commission. The International Law Commission sets out guidelines and regulations for member states to follow, however, the commission is just a guideline, meaning that each country has the right to prosecute criminals within their border upon their discretion. The nature of illegal internet activity is based around anonymity, a person may use several servers based in various countries around the world in order to hide their IP address and origin...
Words: 1601 - Pages: 7
...Name Institutional Affiliation A Different Word: Subcultures in Cyberspace The way people organize, govern and create meaning in their lives is associated with social patterns that link to other cultures. This describes the study of sociocultural anthropology. This brief essay will examine: Egao, cyberpunk, queer and ethnic cyber-subcultures and relate them to sociocultural anthropology. This field of study as several concerns from the environment to health issues, however, the main in terms of cyber-subcultures deals with social change. Social change can be described as any event that causes a dramatic change immediately or over time. The presence of the Internet and cyberspace has already caused several changes in society. Facebook (FB), Twitter and other social media sights have made it possible to connect with people from different states and countries in seconds. It also makes it possible to find lost friends and reconnect with distant family members. There are opportunities to play games, exchange video files and stream live footage. The possibilities are seemingly endless. Within this new frontier of freedom along with social media Egao can be found. Egao Egao can be defined as a cyber-subculture in satire with the mainstream (Zhang, 2010). It can be accessed from mobile phones and other electronic devices. There are several forms which include: text, audio, image, or video. This particular sub-culture has become a means of free expression for the younger...
Words: 1018 - Pages: 5