10 - Chapter IV 21.2.2018
10 - Chapter IV 21.2.2018
10 - Chapter IV 21.2.2018
“Universal Law is not a true Law but a code of rules of conduct“. John Austin.i
Introduction
In this chapter the researcher discusses the international laws with respect to cyber laws
governing cybercrime at the global level. The researcher discusses the convention governing
cybercrime at international level. Further a comparison is drawn between the international
convention and Information Technology Act 2000.
International Law is a body of law which is composed of principles and rules of conduct, bound
by each stateii. They include:
i) The governance of international institutions
ii) Rules of law relating to individuals.
Thus international law is primarily a system regulating the rights and duties of states inter se
popularly known as the ‘Laws of Nations’. Basic primary aim is securing justice for human
beings. The history of International Law dates back to earliest times to the beginning of the
period of antiquity. As different communities existed there was a need to regulate the relation
between such communities. Before the dawn of Christianity references, as to immunities of
ambassadors and certain laws and usages of war were found in ancient Egypt and India. We can
date back to historical cases of recourse to arbitration and mediation in ancient China and in
early Islamic world.
During the period of Rome’s dominance there were rules governing the relations between Rome
and various nations with which it had commercial relations.
In the 19th Century, this law further expanded the reason being the emergence of powerful states
within and outside Europe.iii
• Development of International Law
The present day century has witnessed a greater impetus to the development of international law,
the reason being growing interdependence of states and of vastly increased intercourse between
them due to all kinds of inventions that overcame the difficulties of time, space and intellectual
communication. The need was felt to develop new rules or devise techniques to meet
innumerable new situations leading to speedier method of law making. Great number of
multilateral treaties of last 80 years is laying down rules to be observed by the majority of states.
The United Nations with the expert aid of a body known as the International Law Commission
codified and developed the International Law. iv
• Jurisdiction in Cyberspace
The word jurisdiction is the authority of a person or a body to exercise its power. The
Constitution provisions are followed for such jurisdictional sovereignty.vii
The I.T Act under sec 75 specifies the jurisdiction of the Act which states that the Act covers all
the offences committed in and outside India. This offence may be committed by any person of
any nationality.ix It so happens, that jurisdiction of local laws is different from international
laws, as it extends only to its land and not outside the territory.
The following are the case laws which determine the jurisdiction of the state.
In the case of S.S Lotus Case (France v Turkey) x , it was laid down that the state refrains from
use of its power in other’s territory, thereby, making jurisdictional territory. The only time it can
exercise it is through permission derived from international custom or convention.
• Jurisdiction in cyberspace
As there are no physical boundaries the accessibility becomes easy only on the click of a mouse.
The terms and policies of particular websites have only domestic laws applicability. So when the
question arises as to international crime then a person may be trapped in the applicability of
laws. The procedural aspect of I.T. Act 2000 is also inadequate.
This was adopted by the the ministry of Europe on 8-11- 2001, it further was signed on 23-11-
2001 in Budapest and it came into force in 2004 in the month of July.xv As of November, 2013,
41 states have approved the convention. It was further signed by 11 states.This was the first
global agreement on cybercrimes which used internet and a computer as a tool to commit the
offence. It tackled issues of copyrights, internet fraud, pornography (child), and covered network
violation.xviVarious powers and procedures were laid down. The Convention is the outcome of
the work of the European experts. There are a number of other protocols which has tackled
issues of racism through the internet. Cyber Terrorism is part of the Convention.xvii
The Convention allows getting data across the boundary. By being a signatory consent is not
required and provides 24/7 assistance to Signatories.
3. It further emphasis that every member to provide assistance to one another and aid in the
collection of data transmitted via the internet.xix
One of the major threats to every nation is the Electronic Espionage, Cyber Warfare and
Cyber Terrorism. A practice of obtaining secret or confidential information about an
organization or a society that may be detrimental to the country or the state without the
permission of the holder of the information.xx
The treaty sets out procedural law issues with respect to information stored in computers and
transfer of the same. There exists constant usage of computer and Internet. Due to the low costs
and easier accessibility, face to face communication has long gone taken a back seat due to the
development of internet accessibility. People prefer to use the internet as it is cost effective and
easy and has high speed as to transfer of information. The United States of America share similar
legal systems and historical ties the United Kingdom. These countries have a well-developed
information technology infrastructure.
The following are some of the provisions of the Convention of Budapest in comparison with the
Information Technology Act 2000.
The researcher has analyzed the Budapest Treaty in comparison with the I.T. Act, 2000, drawing
out the similarities between them. This has been depicted in the tabular format given below:-
Art- 2 Unlawful accesses xxiiicorrelates to Sec 70 of the I.T. Act, 2000 where the government of
any country can may make any computer reserve as protected system. It further prescribes
punishment with imprisonment. A National Nodal Agency set up by the Government to deal
with research and its development for protecting of dire information.xxiv
Art- 3 Illegal Interception- Every party to have its own laws as to the offences and proving
such offences. The Indian I.T. Act, 2000 has in its ambit certain offences, from Section 65 – Sec
67- B, which are offences which are punishable.xxv
Art 4 – Data intrusion, Article 5 – System intrusionxxvi - These provisions of the Convention
correspond to offences laid down u/s 65 – 67-B of the I.T. Act, 2000.
Art 6 - Illegal actsxxvii- This is with respect to crimes against secrecy and national integrity. The
corresponding changes are made to the Indian Penal Code, 1860 and Evidence Act, 1872.As the
Indian Penal Code deals with Forgery of electronic Records,xxviii Sending Defamatory messages
by email,xxix sending threatening messages by email,xxx Bogus websites cyber frauds, xxxi
email
spoofing,xxxiiweb jacking,xxxiii email abuse,xxxiv online sale of drugs ,xxxvonline sale of
arms.xxxviNecessary amendments are being made to Bankers Act and Evidence Act yet no
significant laws are made up for misuse of devices in India, whereas in USA there is a special
Act known as an 1986 Act for Computer Fraud and Abuse, in misuse of computer Act, 1993
Singapore deals with such matters.
Art 10 - Against infringement of Copyright and related rights xxxix - Allows every member to
have its own rules and regulation in consonance with the Paris Act, 1971, the Agreements on
Trade – Related Aspects of Intellectual Property Rights and WIPO Copyright
Treaty.Corresponding Laws are framed under the Indian Copyright Act 1957; whereby the main
objective of the Act is to provide protection to artistic, literary works.xlIndia has been a member
of the Berne Conventionxli. India is also a party to the Rome Convention. India has made
necessary changes to its Patent Act by compiling the TRIPS Agreement.
Art11, 12 - Attempt and aiding or abetting, Corporate Liability –Every member to have its
own rules and regulations so as to establish offences of crime. These may be done
intentionally.xlii
Article 14 – Scope of procedural provisions – Every member to have their own e powers and
procedures for offences of computers and for the collection of evidence.
Art 15 – Conditions and safeguards – Every member shall apply its powers and procedures so
as to protect rights of human beings.
Art 16 – 18 – Computer information and its preservation – are made available irrespective of
service providers.
Art 19 – Examination and confiscation of stored data – Every member to have laws with
respect to retrieval and finding of computer data.
Art20 – Traffic Data and its collection - The Information Technology Act has created
Certifying Authority to ensure search and seizure and misuse of hardware, software and
procedures.xliv
Art 22 Jurisdiction – read with Article 2 to 11 for the establishment of jurisdiction over crimes
which may be committed in
a) One’s own land ; or
b) On a ship or
c) on an aircraft ; or
d) By the nationality, on its own land or outside
India has laid down the jurisdiction in the Act, 2000. Section 1(2), applicable to entire India, and
also to trans-border offences.xlvi Thereby the jurisdiction of the I.T. Act, 2000 includes trans-
border offences.
Art 23 – of the Budapest Treaty- states and makes it binding on the parties to co-operate with
each other. Each member country can have mutual laws and treaties to gain co-operation .It may
be on uniform or reciprocal legislations.xlvii
Art 24 - Extradition – Every member country is liable for punishment if the take away the liberty
xlviii
for one or more years. They must give mutual assistance so as to conduct investigation,
making it universally acceptable. The convention has entered into agreement with a number of
companies to support countries for the implementation of the Budapest Convention.xlix
Art 6(1) and (2) of the Protocol specifically allows the party, to prosecute, offense for inciting
hatred and violence. lVienna Declaration and Programme of Action also urge all governments to
take immediate measures and to develop strong policies to prevent racism, xenophobia or related
intolerance, where necessary by enactment of appropriate legislation including penal measure.li
There are several federal computer crime and cybercrime statues in the United States governing
cybercrime.lix The other statutes include
1. 18 U.S. Code § 1028 – it makes it a crime to produce, transfer or possess device, computer, that
falsifies identification documents.
2. The 18 U.S. Code § 2319 - makes it a federal offense to infringe a valid copyright.
3. 18 U.S. Code § 1462-1463 prohibits the use of a computer to import or transport obscene
material in the United States.
4. The 18 U.S. Code 2251-2252A - makes it a crime to employ/ induce participation by a minor in
the making of visual depiction of a sexually explicit act and transporting it by electronic means.lx
There are a number of laws framed in the USA to combat Cybercrime, right from 1984 till date
as compared to India with lone legislation i.e. I.T. Act 2000.
The US legal system is and always more tech savvy and specialized to tackle various issues. In
case of credit Card Fraud in USA there is a separate Federal Credit Card Law that stipulates
the consumer. The Fair Credit Billing Act (FCBA) will apply to billing errors on credit card,
unauthorized charges, charges for goods and services. This Act is an attempt to minimize Credit
Card Fraud.lxx
• United Kingdom
The main Council known as the Council of Europe creates laws which control the British
Criminal justice system. It has set up standards for all member states to follow. This makes all
the countries interconnected as they have the same background. But such is not so in the U.S.A.
The Council of Europe (COE)- globally protects from the threat of cybercrime by implementing
Xenophobia and Racism, the Cybercrime Convention Committee (T-CY) and the technical
cooperation Programs on Cybercrime.
The Convention on Cybercrime of the Council of Europe is the only binding international
instrument, providing guideline for all countries through the tool of cooperation.lxxiiIn The United
Kingdom the computer crimes legislation is the Computer Misuse Act of 1990 (CMA).lxxiii It
has been followed by Singapore and Malaysia.lxxiv
The CMA gives powers to the police to investigate matters. There are specialized units which
handle investigation called the Computer Crimes Branch of the Criminal Investigation
Department (CID), the Forensics Branch of the Singapore Police Force (SPF), and the Singapore
Computer Emergency Response Team (SINGCERT) of the IDA.lxxviCybercrime is under the
provisions of the Penal Code (Cap. 224) and other legislations. lxxviiIrrespective if deficiency the Act
is constantly amended from time to time and is more advanced as compared to the U.K laws. lxxviii
• Status of India
Till date, there exists no treaty with other countries to extradite a cyber-criminal. In India the
Indian Penal Code, The Evidence Act, The Information Technology Act 2000, The Negotiable
Instruments Act as discussed in the previous chapters of this thesis are applicable for computer
related crime committed in India.
• Extradition
International Extradition is the surrender by one nation to another, for trial and punishment of a
person accused under the jurisdiction of the latter.lxxxi
The basic objective of Extradition is to ensure that criminals are returned from one country to
another. Their rights have also to be protected. There is a need for evidence or proof to hold the
accused.
In a Apex Court Case on extradition , as per sec 21 of the Extradition Act , 1962 the accused can
be tried only for those offences laid down in the extradition decree and for no other offences . So
it was further laid down that criminal courts of India have no jurisdiction to try any other
offence.lxxxiiEvery country exercises control over the persons of one’s own territory, but
sometimes there may be cases when a person after committing a crime runs away to another
country.lxxxiii In such a case the country affected finds itself helpless to exercise jurisdiction to
punish the guilty person this situation is detrimental for the peace and order. Then in such a
situation peace and order can be maintained only when there is international cooperation among
the states. There are social needs to punish such criminals and in order to fulfill this social
necessity the principle of extradition has been recognized.lxxxiv
“The inability of a state to exercise its territory rights would serious undermines the maintenance
of law and order if there were no cooperation in the administration of justice. The awareness
operation is illustrated by the widespread practice of returning an accused or convict to the
country where the crime was made.”lxxxvExtradition is the process of handing over the accused
or of a convicted person to the state on whose territory he has alleged to have committed or have
been convicted of a crime ,by the state on whose territory the alleged criminal happens to be for
the time being.lxxxvi
The emphasis was on the right to demand extradition and corresponding duty to surrender him to
the demanding state. Such was based on the treaty. But as pointed out in Wheaton’s International
lxxxviii
Law, that there is no universal rule or recognized practice that there can be no extradition
except under a treaty because some countries grant extradition without a treaty.
In India, the Extraditions Act, 1962 which governs the law relating to extradition in India. With
reference to III part of the Act, dealing with the return of the fugitive, criminals from the
commonwealth countries having such arrangements. Part II deals with extradition of convicts to
foreign states and to Common wealth countries. Under Section 4 of the Act, a demand can be
made to government for the submission of a fugitive criminal.lxxxixUnder sec. 7(4), if the
magistrate is of the opinion that a prima facie case exists over the foreign state or commonwealth
country, he may put him in prison, and shall report his enquiry to the government, it may further
issue a warrant for the custody of the fugitive and his delivery.xc Thus Extradition Treaty is not
the only basis for extradition of a fugitive criminalxciFurther ,definition of the words “extradition
offence” in section 2(c) includes” (ii) in relation to a foreign state other than a treaty State. This
enumerates offence in relation to Commonwealth countries.xciiIndia has signed Extradition
Treaties
2. Bhutan 1997
3. Canada 1987
6. Netherlands 1989
7. Russia 2000
8. Switzerland 1996
9. UAE 2000
10. UK 1993
• Extradition Arrangements
1. Australia 1971
2. Fiji 1979
3. Italy 2003
5. Singapore 1972
8. Tanzania 1966
9. Thailand 1982
The status of India with respect to extradition of cybercriminal, India is yet to sign any special
treaty on cybercrime with other countries on matters of extradition of cyber criminals yet the
existing extradition treaty with the above mentioned countries holds good to extradite cyber
criminals from the above mentioned countries. In India the Bureau of Investigation at the
center, has formed a Cybercrime unit for research and development. It has correspondence with
international agencies like the FBI, Interpol and other foreign police agencies and share
expertise on cybercrime.
The I.T. Act 2000 allows the government to use the following techniques to catch cyber
criminals. They are
• Sec 69: Government (Central or State) can issue instructions to ‘intercept’, ‘monitor’ or ‘decrypt’
any information which is connected with the purpose mentioned in this section.
• Sec 69A: Government (Central) can issue instructions for ‘blocking of in access to the Public,
any information which is connected with the purpose mentioned in this section.
• Sec 69 B: Government (Central) can issue instructions to collect data on the internet for safety.xcv
• Spontaneous information
1. A Party may, forward investigation reports to the other party so as to assist the other party with
its investigation.
2. A request can be made to keep all investigations confidential and notify to the other party from
time to time.
The Criminal Law Amendment Bill 2013 is pending in India. The Bill claims to boost the
privacy of individuals in India. The Bill further claims to remove the ambiguities in the Indian
law which threatens the confidentiality and self-respect of individuals. The bill will protect the
safety of female individuals.
There is a need for the Global community on Rights of human and Cyber Safety to think on
issues like Warfare, Terrorism, Espionage, Crimes, E-Surveillance, and Unlawful Interceptions
in cyber which are “Global” in nature.
As of today the major drawback is that major different Countries of the world have different laws
for such issues, making it problematic to apply such against threats. UN needs to look into this
matter and have corresponding agreements. In India balance has to be drawn between civil,
nation’s security and law enforcement bodies. India should be a part of the Convention on
Cybercrime so as to get international cooperation in attacking cybercriminals further to create
cyber boundary encompassing cyber criminals. India at the present is having not so strong cyber
law, cyber security and cyber forensics. The lack of comprehensive laws and introduction of an
unfamiliar legal framework into its legislation prevents India from signing the Treaty.
Some Countries like the U.S. view new offers with doubt, as such may not be able to create a
strong legal framework. India has not yet signed any Cyber treaty with any country. Therefore
the question of apprehending the cybercriminal would be a difficult task due to absence of
international cooperation. The United States continues to have laws which protect their state. To
resolve disputes related to jurisdiction and not to enhance the border of territory and nationality,
is by implementing the principles of reasonableness and fairness so as to have universal
jurisdictionciv.Yet it is difficult to punish offence under the extradition as both the contracting
parties should have similar laws. In one case the punishment is for one year and in another
contracting state the punishment is for 2 years then it becomes a difficult task for
conviction.India is yet not a signed the Convention on Cybercrime.cv This aspect does have a
detrimental effect on the enforcement of the I.T. Act 2000.
Chapter IV
i
J.G.Starke,” Introduction to International Law”, Aditya Book, Butterworths&
Co (Publishers) Ltd 1989, 10th edition, P. 100.
ii
Professor Charles Cheney Hyde,“ Hyde International Law, The American Law
Institute’s Revised Statement of the Foreign Relations Law of the Uniter ”,2nd
edition,1947, Vol. I, Para 1
iii
Ibid 55
iv
J.G.Starke, ”Introduction to International Law”, Aditya Book, Butterworths& Co
(Publishers) Ltd 1989, 10th edition P. 106.
v
Dennis Lloyd, “The Idea of Law”, Penguin revised edition, 1970,pp37-40,186-
190,224-5, and 238- 239, Passim L. Henkin, “How Nations Behave “,2nd
edition,1979, and J.G.Merrills,” Anatomy of International Law “, 2nd
edition,1981.
vi
J.G.Starke, ”Introduction to International Law, 10th edition Aditya Book,
Butterworths&Co (Publishers) Ltd 1989, P 107.
vii
Vakul Sharma, “Information Technology Law and Practice”, Universal Law
Publishing co, Second Edition, P248-249.
viii
Supra P. 249
ix
Section 75 – I.T. Act of 2000
x
PCIJ Ser A (1927), No.9
xi
Dr. .H.O.Agarwal, ”International Law & Human Rights”, Central Law
Publications, Allahabad, Sixteen Editions (2009), P 225.
xii
Ibid
xiii
Convention on Cybercrime, Budapest, 23 November 2001. Available on website of
the Council of Europe, Available on: http://
conventions.coe.int/Treaty/EN/Treaties/Html/185.htm. Visited on 20th January
2013.
xiv
Ms. Ujjain Ghosh, “Cyber-crimes And Extradition Laws”, manupatra. Available
on www.manupatra.com,
http://portal,unesco.org/culture/en/ev.php_url_id=1955&url_do=do_ topics
&url_section=201.html. Visited on 20th January 2013.
xv
The COE International Convention on Cyber crimebefore Its Entry Into
Force, UNESCO, January– March 2004.Available on: http. Visited on 20th January
2013.
xvi
“List of signatories and ratifications of the treaty”, Council of Europe, Available
on: http://en.wikipedia.org/wiki/Convention_on_Cybercrime#cite_ref-6 . Visited
on 20th January 2013.
xvii
Ibid 133
xviii
http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm; visited on: July 30,
2010.
xix
Convention on Cybercrime, Art. 33(1), Budapest, 23, XI.2001,
http://conventions.coe.int/Treaty/EN/Treaties/Html/185.htm. Visited on 18th
January, 2013.
xx
Espionage, http://ethics.csc.ncsu.edu/risks/security/espionage/study.php.Visited on
:20th January ,2013
xxi
Ibid 136
xxii
Vaidya, “Cybercrimes and Law An Overview”, 1st edition: 2007,
xxiii
Prof. VimlenduTayal, ”Cyber Law Cyber crimeInternet and E-Commerce”, Bharat
Law Publication, Jaipur, (2011), P 670.
xxiv
Section 70, 70- The I.T. Act, 2000.
xxv
I.T. Act, 2000. Indian Penal Code, 1860
xxvi
ibid 96
xxvii
ibid
xxviii
Section 463 Indian Penal Code
xxix
Section 499 Indian Penal Code
xxx
Section 503 Indian Penal Code
xxxi
Section 420 Indian Penal Code
xxxii
Section 463 Indian Penal Code
xxxiii
Section 383 Indian Penal Code
xxxiv
Section 500 Indian Penal Code
xxxv
NDPS Act
xxxvi
Arms Act
xxxvii
Prof.VimlenduTayal,”Cyber Law Cyber crimeInternet and E-Commerce”, Bharat
Law Publication, Jaipur, (2011), P 672.
xxxviii
Section 67, 67-A, B of Information Technology Act 2000, Bare Act, Professional
Book Publishers. (2013).
xxxix
Prof.Vimlendu Tayal, “Cyber Law Cyber crime Internet and E-Commerce”, Bharat
Law Publication, Jaipur,(2011),P 673
xl
The Indian Copyright Act 1957, available at
http://www.ircc.iitb.ac.in/webnew/Indian%20Copyright%20Act%201957.html . :
5th February, 2013.
xli
WIPO Administered Treaties, WIPO International, Contracting Parties, Berne
Convention, available on
http://www.wipo.int/treaties/en/ShowResults.jsp?treaty_id=15.
xlii
Prof.Vimlendu Tayal,”Cyber Law Cyber crime Internet and E-Commerce”, Bharat
Law Publication, Jaipur, (2011), P674.
108A Indian Penal Code, 1860, (Act No. 45 of Year 1860)
xliv
Section 30 The Information Technology Act 2000,Bare Act, Professional Book
Publishers, (2013), P 17.
xlv
Section 65 onwards, “The Information Technology Act 2000”, Bare Act,
Professional Book Publishers (2013) Delhi, P 673.
xlvi
Section 1(2)” The Information Technology Act 2000”, Bare Act , Professional Book
Publishers , (2013),P 17
xlvii
Convention on Cybercrime, Budapest,
23. XI.2001,
http://conventions.coe.int/Treaty/EN/Treaties/Html/185.htm..Visitedon: 12th
February, 2013
xlviii
ibid
xlix
Council of Europe Convention on Cybercrime: Frequently Asked Questions and
Answers by the United States Department of Justice. Last update 10 November
2003.Available on:
http://www.us.doj.gov/criminal/cybercrime/COEFAQs.htm#topic. Visited on: 20th
February, 2013.
l
Explanatory Report on the additional protocol to the convention on cybercrime,
http://conventions.coe.int/Treaty/en/Reports/Html/189.htm. Visited on: 20th
February, 2013.
li
Vienna Declaration and Programme of Action, Part II Para 20.
http://www.ohchr.org/EN/ProfessionalInterest/Pages/Vienna.aspx. Visited on 28th
February,2013
lii
Art. I § 8, U.S. Constitution.
liii
Ibid 139
liv
Susan W. Brenner, ”State Cyber crimeLegislation in the United States of America:
A Survey”, 7 RICH. J.L. & TECH. 28 (Winter 2001), available at
http://www.richmond.edu/jolt/v7i3/article2.html. Visited 0n25th February, 2013.
lv
National Institute of Justice, U.S. Department of Justice, “Computer Crime:
Criminal justice”, Resource Manual 2 (1989).
lvi
Ibid.
lvii
Dana L. Bazelon, Yun Jung Choi and Jason F. Conaty, “Computer Crimes”, 43 Am.
Crim. L. Rev. (2006), P 259, 264.
lviii
18 U.S. Code § 1030.
lix
18 U.S. Code § 1030.
lx
ibid 138
lxi
18 USC 1343 1988: Emphasis Added. The Mail Fraud Statute 18USC 1341(1988)
lxii
Geraldine SzottMoohr, “Mail Fraud and the Intangible Rights Doctrine: Someone to
Watch over “, US 31 Harvard Journal on Legis. 1994. P153; 163-66.
lxiii
18 US Code 1030.
lxiv
Samuel .C...Mcquade,III “Encyclopedia of Cybercrime”, Greenwood Press,
Westport ,London ©2009
lxv
D. Glenn Baker, ”Trespasser will be prosecuted: Computer Crime in the 1990’s”,
Computer/Law Journal. 1993. 12 (1) P 68.
lxvi
http://www.cpsr.org/cpsr/privacy/communications/wiretype/electroniccommunprivacyact.txt,
electronic communication privacy Act internet. Visited on: 10th March 2013.
lxvii
Cyber Security Enhancement Act
http://itlaw.wikia.com/wiki/Cyber_Security_Enhancement_Act,Visited on 11th
March 2013.
lxviii
Information Technology Act 2000 (Amended 2008).
lxix
The Times of India, Cyber Law,
http://www.cyber.law.harvard.edu/media/files/wpsupplement2005.pdf .Visited on: 19th June
2014.
lxx
Ibid 142
lxxi
Ibid 142
lxxii
Martin Wasik, “The Computer Misuse Act, 1990”, Criminal Law Review 767. Available on: The
United Kingdom CMA available at:
http://www.opsi.gov.uk/acts/acts1990/Ukpga_19900018_en_1.htm. Visited on 20th March
2013.
lxxiii
Ibid 156
lxxiv
Lilian Edwards, “Dawn of the Death of Distributed Denial of Service: How to Kill
Zombies”, 24 Cardozo Arts & EntLJ23, 36, (2006), http://cardozoaelj.com/wp-
content/uploads/Journal%20Issues/Volume%2024/Issue%201/Edwards.pdf.Visited on: 20th
February, 2013
lxxv
Michael Lee ,“Australia joins convention on cyber crimetreaty”, Financial Crime
TrainingMarch 4, 2013, available on http://www.zdnet.com/australia-joins-convention-on-
cybercrime-treaty-7000012071/visited on 25th February, 2013.
lxxvi
The Computer Misuse Act 1990 (Amendment) Bill. Bill 102 Sess. 2004-2005
lxxvii
The Miscellaneous Offences (Public Order and Nuisance) Act (Cap.184).
lxxviii
The Computer Misuse Act 1990 (Amendment) Bill. Bill 102 Sess. 2004-2005. See also, the
U.K. Parliament web site at:
http://www.publications.parliament.uk/pa/cm200405/cmbills/102/2005102.htm, The Police and
Justice Bill. Bill 119 Sess. 2005-06. See also, the U.K. Parliament web site at:
http://www.publications.parliament.uk/pa/cm200506/cmbills/119/2006119.htm
http://www.lga.gov.uk/Legislative.asp?lsection=59&ccat=1156). See Bill Thompson, How to
Legislate against Hackers (BBC News, 13 March 2006), available at:
http://news.bbc.co.uk/1/hi/technology/4799338.stm.Visited on: 20th February, 2013.
lxxix
Dr.H.O.Agarwal,”International Law & Human Rights”, Central Law Publications, Allahabad,
Sixteen Editions (2009), P 263.
lxxx
Treaty on Principles Governing the Activities of States in the Exploration and Use of Outer
Space Including, The Moon and Other Celestial Bodies, 27 January 1967,610 U.N.T.S 205.
http://www.unoosa.org/pdf/publications/ST_SPACE_11_Rev2_Add2E.pdf .Visited
on 25th February,2013
lxxxi
P.RamanathaAiyar “Concise Law Dictionary”, Third Edition Reprint 2009, Lexis
Nexia, ButterworthsWadhwa, P 431.
lxxxii
Daya Singh Lahoria v Union of India (2001) 4 SCC 516.
lxxxiii
Dr. Rahul JairamNikam, ”Space Activities and IPR Protection, Need for a New
Legal Regime”,1st Edition, Haritha Graphics, Hyderabad, Pp 14-15.
lxxxiv
Dr.S.K Kapoor ,”International Law Human Rights “, Central Law Agency
Allahabad, 17th Edition(2009),P 342
lxxxv
Edward Collins, “International Law in changing World (1969), Central Law
Publishing, P 216
lxxxvi
L. Oppenheim, “International Law”, Vol. 1 , Eighth Edition, Pg 696 ; See also Oppenheim’s
International Law, Ninth Edition , Vol 1, Edited by Sir Robert Jennings and Sir Arthur
Watts,Longman Group U.K Ltd. And Mrs. Tomoko Hudson, 1992, Pp 948 – 949.
lxxxvii
(193)280 U.S.276
lxxxviii
Edition, 4. Ss 116 (a) to (d), Pp.186 to 189.
lxxxix
Section 5 of The ExtradictionAct,1962(34 of 1962)
xc
Section 8 ,ibid
xci
Section 31,ibid
xcii
Dr.S.K. Kapoor, “International Law Human Rights “, Central Law Agency Allahabad, 17th
Edition (2009), P 343.
xciii
The Convention on Cybercrime, Budapest, 23.XI, 2001, available on http:www.
convention.coe.int/Treaty/en/Treaties/Html/185.htm.Visited on 21st September, 2013.
xciv
The Convention on Cybercrime, Budapest, 23.XI, 2001, available on http:www.
Convention.coe.int/Treaty/en/Treaties/Html/185.htm.Visited on 21st September, 2013.
xcv
108A Indian Penal Code, 1860, (Act No. 45 of Year 1860) available at
471http://www.advocatekhoj.com/library/bareacts/indianpenalcode/index.php?Title=Indian%20
Pe nal%20Code . Visited on 1st September, 2013.
xcvi
Title 2, Article 24, The Convention on Cybercrime, Budapest, 23.XI, 2001, available on
http:www. convention .coe.int/Treaty/en/Treaties/Html/185.htm.Visited on 21st September,
2013.
xcvii
Prof.Vimlendu Tayal,”Cyber Law Cyber crime Internet and E-Commerce”, Bharat Law
Publication, Jaipur,(2011), P 680.
xcviii
Article 23 - 27 The Convention on Cybercrime, Budapest, 23.XI, 2001. Available on http:www.
convention .coe.int/Treaty/en/Treaties/Html/185.htm, Visited on 25th September, 2013.
xcix
Section 75 The Information Technology Act 2000,Pg 17 , Bare Act , Professional Book
Publishers , (2013)
c
Xinden, Alice Kirkland, African Convention Cybercrimes, November 27, 2013, available at:
http://www.indexoncensorship.org/2013/11/african-convention-cybercrimes-silence-free-
speech- online/Visited on 15th March, 2013.
ci
MaryEllen O’Connel, “Cyber Security without Cyber war, Journal of Conflict and
Security Law, Oxford Journals, Vol17, Issue 2. Pp. – 187 – 209.
cii
Ibid 205
ciii
‘NATO and Cyber Defense’ NATO <http://www.nato.int/cps/en/SID-E61FF165-
78BBC3C8/natolive/topics_78170.htm? Visited on: 20 June 2012.
civ
Ms. Ujjaini Ghosh, “Cyber-crimes And Extradition Laws”, manupatra. Available on :
www.manupatra.com
cv
Vakul Sharma, “Information Technology Law and Practice”, Universal Law
Publishing Co, Second Edition, P. 258.