Enough Law of Horses and Elephants Debated…, …Let’s Discuss the Cyber Law Seriously

Main Article Content

Sandeep Mittal
Priyanka Sharma

Abstract

The unique characteristic of cyberspace like anonymity in space and time, absence of geographical borders, capability to throw surprises with rapidity and potential to compromise assets in virtual and real world has attracted the attention of criminal minds to commit crimes in cyberspace. The law of crimes in the physical world faces challenge in its application to the crimes in cyberspace due to issues of sovereignty, jurisdiction, trans-national investigation and extra-territorial evidence. In this paper an attempt has been made to apply routine activity theory (RAT) of crime in physical world to crime scene cyberspace. A model for crime in cyberspace has been developed and it has been argued that the criminal law of crime in physical world is inadequate in its application to crimes in virtual world. To handle crime in cyberspace there is a need to address issues of ‘applicable laws and ‘conflicting jurisdiction by regulating the architecture of the internet through special laws of cyberspace. A case has been put forward for having an International Convention of Cybercrime with Council of Europe Convention on Cybercrime as yard stick.

Downloads

Download data is not yet available.

Article Details

Section
Articles
Author Biographies

Sandeep Mittal, LNJN National Institute of Criminology and Forensic Science, Government of India, Ministry of Home Affairs, New Delhi

Director, LNJN National Institute of Criminology and Forensic Science Ministry of Home Affairs Government of India

Priyanka Sharma, Raksha Shakti University, Ahmedabad, India

Professor & Head Information Technology & Telecommunication, Raksha Shakti University, Ahmedabad, India

References

REFERENCES

Sandeep Mittal, 'A Strategic Road-map for Prevention of Drug Trafficking through Internet' (2012) 33 Indian Journal of Criminology and Criminalistics 86

Marco Gercke, Europe’s legal approaches to cybercrime (Springer 2009)

Marco Gercke, 'Understanding cybercrime: a guide for developing countries' (2011) 89 International Telecommunication Union (Draft) 93

David L Speer, 'Redefining borders: The challenges of cybercrime' (2000) 34 Crime, law and social change 259

Sandeep Mittal, 'Perspectives in Cyber Security, the future of cyber malware' (2013) 41 The Indian Journal of Criminology 18

Sandeep Mittal, 'The Issues in Cyber- Defense and Cyber Forensics of the SCADA Systems' (2015) 62 Indian Police Journal 29

Sandeep Mittal, 'A Strategic Road-map for Prevention of Drug Trafficking through Internet'

Open-ended Intergovernmental Expert Group on Cybercrime, Comprehensive Study on Cyber Crime, 2013)

https://wildequus.org/2014/05/07/sufi-story-blind-men-elephant/ (Accessed on 13/04/2017)

http://www.constitution.org/col/blind_men.htm (Accessed on 13/04/2017)

Martina Gillen, 'Lawyers and cyberspace: Seeing the elephant' (2012) 9 ScriptED 130

Frank H Easterbrook, 'Cyberspace and the Law of the Horse' (1996) U Chi Legal F 207

Ibid at 207, para 3

Joseph H Sommer, 'Against cyberlaw' (2000) Berkeley Technology Law Journal 1145

Lawrence Lessig, 'The law of the horse: What cyberlaw might teach' (1999) 113 Harvard law review 501

Andrew Murray, 'Looking back at the law of the horse: Why cyberlaw and the rule of law are important' (2013) 10 SCRIPTed 310

James Baxendale, 'FORTIETH ANNIVERSARY ISSUE: EQUINE CONSIDERATIONS AND COMPUTER LAW-REFLECTIONS FORTY YEARS ON' (2010) 36 Rutgers Computer & Tech LJ 161

Susan W Brenner, 'Toward a criminal law for cyberspace: A new model of law enforcement' (2004) 30 Rutgers Computer & Tech LJ 1

Ibid at page 104

Susan W Brenner, 'Cybercrime Metrics: Old Wine, New Bottles?' (2004) 9 Va JL & Tech 13

Susan W Brenner, 'Is There Such a Thing as' Virtual Crime'?' (2001)

Brenner, 'Toward a criminal law for cyberspace: A new model of law enforcement'

Miltiadis Kandias and others, An insider threat prediction model (Springer 2010)

Sandeep Mittal, 'Understanding the Human Dimension of Cyber Security' (2015) 34 Indian Journal of Criminology and Criminalistics 141

Majid Yar, 'The Novelty of ‘Cybercrime’ An Assessment in Light of Routine Activity Theory' (2005) 2 European Journal of Criminology 407

Ibid

Lawrence E Cohen and Marcus Felson, 'Social change and crime rate trends: A routine activity approach' (1979) American sociological review 588

Nir Kshetri, 'The simple economics of cybercrimes' (2006) 4 IEEE Security & Privacy 33

Yar, 'The Novelty of ‘Cybercrime’ An Assessment in Light of Routine Activity Theory'

Majid Yar, Cybercrime and society (Sage 2013)

Yar, 'The Novelty of ‘Cybercrime’ An Assessment in Light of Routine Activity Theory'. at page 424

Ibid

Mittal, 'A Strategic Road-map for Prevention of Drug Trafficking through Internet'

Statistics Source: Crime in India Statistics, NCRB, Ministry of Home Affairs, Government of India, New Delhi.

Karuppannan Jaishankar, 'Establishing a theory of cyber crimes'

(2007) 1 International Journal of Cyber Criminology 7

Susan W Brenner, 'Toward a criminal law for cyberspace: Product liability and other issues' (2004) 5 Pitt J Tech L & Pol'y i

Bill McCarthy, 'New economics of sociological criminology' (2002) 28 Annual Review of Sociology 417

JR Probasco and William L Davis, 'A human capital perspective on criminal careers' (1995) 11 Journal of Applied Business Research 58

Kshetri, 'The simple economics of cybercrimes'

Neal Kumar Katyal, 'Criminal law in cyberspace' (2001) 149 University of Pennsylvania Law Review 1003

Ibid

https://www.washingtonpost.com/blogs/comic-riffs/post/nobody-knows-youre-a-dog-as-iconic-internet-cartoon-turns-20-creator-peter-steiner-knows-the-joke-rings-as-relevant-as-ever/2013/07/31/73372600-f98d-11e2-8e84-c56731a202fb_blog.html?utm_term=.8cc4b79354f7

Alexandre López Borrull and Charles Oppenheim, 'Legal aspects of the Web' (2004) 38 Annual review of information science and technology 483

Though every computer or smart device has a machine address which can be easily spoofed, we are talking here specifically about geographical location. The remote access, incognito logins, encrypted platforms for communication, anonymous remailers and availability of ‘cached’ copies of frequently accessed internet resources further complicate and make impossible to attribute actions in cyberspace.

Dan L Burk, 'Jurisdiction in a World without Borders' (1997) 1 Va JL & Tech 1

Lessig, 'The law of the horse: What cyberlaw might teach'

In real space nature is represented by architecture.

That includes software that makes internet to behave as it is.

Graham Greenleaf, 'An endnote on regulating cyberspace: architecture vs law?' (1998)

Lessig, 'The law of the horse: What cyberlaw might teach'

Greenleaf, 'An endnote on regulating cyberspace: architecture vs law?'

Council of Europe, Convention on Cybercrime, 23 November 2001, available at: http://www.refworld.org/docid/47fdfb202.html [accessed 26 February 2017]

Ibid. Articles 23-35

Ibid. Preamble