Concept of “Cyber space”

By Dr.Debarati Halder, LL.B., M.L., Ph.D(Law) (NLSIU)

Image curtsy: Google

The modern human society is overly dependent on the internet now. Artificial intelligence and Internet of things (IOT)   have made it possible for machines to work and speak for humans. In other words, human minds are now ‘colonized’ by machines which compel most  human beings to think, act and text what  they (the machines) want the later to do. While this statement may be considered as ‘dramatic’. The fact is, the machines are controlled by human intelligence. This human intelligence (which  controls the machines) is developed by few skilled people who may have developed the software, the hardware and may have done the entire designing of machines for the benefit of human society.  This human intelligence is the main factor which empowers the machines to control the thought process, activities and execution of the thought process of many other human beings.

 Let us understand this process through the following diagram :

A fine example of this could be using automatic washing machines.  Almost every households have washing machines and many of them are automatic. This auto mechanism is the first box : humans  make software and user-friendly hardware  understanding the needs of fellow human beings. Next , the machines get adjusted to human needs. No, it’s not about befriending humans; it’s about how the machine decides how much clothes should be washed /dried on a daily /weekly basis, what should be the water temperature and how best that temperature may suite the clothes. Next, humans get dependent on the machine, its artificial intelligence and its ability. The manual work time that should have been  done by the humans, is now taken over by the machine. The humans now can use this time for more positive (and in several cases negative too) productive works. The psychology of human beings then becomes completely connected with the machines and dependent on the machines.  At one point of time, when the machine stops working or does not perform according to the expected performance level of humans, the later becomes angry, irritated, annoyed.  What we see here is  the connection between human psychology and artificial intelligence.  This is a unique connection between physical space and mental space, which is bridged by something called cyber space.  Let us understand the typology of space here:

Physical space is that space for which laws may be made for governing behaviors, contracts, marriages, succession, criminal and civil liabilities etc.  Traditionally laws are made for controlling those incidences which can be felt physically, financially and to a certain extent psychologically. Consider Penal laws meant for governing criminal activities like causing grievous physical harm. Law is made to address pre execution plan, execution of the plan and post execution impact on the body, mind and society as a whole. It is for this reason that we get to see the application of law meant for abetment, motive, means rea, commission of offence, compensation, punishment of the offender  and also rehabilitation of the offender as well as the victim. 

Mental space on the other hand, is  a logical and formal abstract space where ideas may generate. Laws may be created for governing outer behavior of individuals. But mental space may not be governed by any law. It has to be disciplined to think create action plans as per the positive societal norms. A good example of law versus mental space can be, a plan to commit a theft is made in the mind. Until and unless this is executed and committed in the physical space, it can not be prosecuted or laws can not be used to regulate that particular act. This means that planning or thinking something in mind  and doing the same on physical space are two different things. Unless both are connected by plan and consequent action and execution of the plan, laws may not be applied.

Cyber space on the other hand, is a  virtual space where machines are made to work at the command given by humans. Laws are necessary to govern this space because it executes several plans or motives, makes contracts and creates criminalities and civil liabilities too. however, there is a common overlapping of the concepts of cyber space and internet.

On 1st April,2019, Gmail celebrated its 15th birthday. This free email service by Google rapidly became popular across the globe and threw a tough competition to other email services including Hotmail, Yahoo mail, AOL mail etc. These are also known as web mail services. They are termed as Web mail services because unlike postal mail services, these web mail services connect people through cyber space, which, to many is popularly known as Worldwideweb.

But technically speaking, the concept of cyber space evolved much more earlier than the concept of Worldwideweb. The abstract concept of “Cyber space” was created first by a novelist and science fiction writer William Gibson in his novel  “Neuromancer”. He described the cyber space as ““A graphic representation of data abstracted from banks of every computer in the human system. Unthinkable complexity. Lines of light ranged in the nonspace of the mind, clusters and constellations of data. Like city lights, receding.”[1]

The term cyberspace is actually derived from the term cybernetics (which comes from the Greek term kybernētikḗ [2]) which was  coined by Norbert Weiner in 1948. Weiner explained it as “scientific study of control and communication of animal and machine”. [3]

As one can see, the description of cyber space by Gibson not only threw light on the complexities of computer technologies, but also emphasized on involvement of human mind in operating on this space. In 1989 Tim Bernes Lee invented WorldWideWeb, which is an information space. This made the documents and other web resources easily available on the web space.

Image created by Dr.Debarati Halder

 But this does not mean that  WorldWideWeb or cyber space is only machine oriented. As Gibson emphasized, cyber space (and later WorldWideWeb) is necessarily controlled by human beings. Cyber Space has been used positively as well as negatively  to create documents, interconnect military departments with universities for security research purposes, for networking, creating and providing huge data base for several types of information. At the same time, cyber space is also used for several criminalities, for plotting terror, for carrying out terror activities and for executing criminal activities targeting governments, corporate houses and individuals .  with the emergence of  internet, new information and digital communication technologies cyber space has now become the most chosen space for  carrying out criminalities against individuals including women and children.

Lawrence Lessig, a fine academician and a Harvard professor addressed cyber space from the perspective of governing cyber space. According to him, the concept of cyber space can be explained on the basis of the followings[1]:

  • Cyber space is a livable place.
  • It has Possibility of actions
  • It has its own Time organization mechanism
  • It has Spatial organization
  • It has distinctive  four pillars of cyber space (law, norms, market, constraint)
  • Cyber space is regulable.

Jaishankar Karuppannan, the Father of Cyber Criminology also added one more basic feature of cyber space, which is connected with human psychology; he said people behave differently when they move from one space to another and this ‘space’ is none other than the cyber space.[2]

The UK Cyber Security Strategy Protecting and promoting the UK in a digital world however defined the concept of cyber space from cyber security aspect.[3] According them,

  • Cyberspace is an interactive domain made up of digital networks that is used to store, modify and communicate information.
  • It includes the internet, but also the other information systems that support our businesses, infrastructure and services. Digital networks already underpin the supply of electricity and water to our homes, help organise the delivery of food and other goods to shops, and act as an essential tool for businesses across the UK.
  • And their reach is increasing as we connect our TVs, games consoles, and even domestic appliances

According to National Military Strategy for Cyberspace Operations, a classified document, the Joint Chiefs of Staff, US, 2006, “Cyber space is a domain characterized by the use of electronics and the electromagnetic spectrum to store, modifies and exchange data via networked systems and associated physical infrastructures.”[4]

According to National Cyber Security Policy, India , 2013, Cyberspace is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information and communication technology (ICT) devices and networks.[5]

The latest definition of cyber space could be found in the definition developed by Marco Mayer, Luigi Martino, Pablo Mazurier and Gergana Tzvetkova in their 2014 paper on how to define cyber space .[6] Their definition runs as follows:

“Cyberspace is a global and dynamic domain (subject to constant change) characterized by the combined use of electrons and the electromagnetic spectrum, whose purpose is to create, store, modify, exchange, share, and extract, use, eliminate information and disrupt physical resources. Cyberspace includes:

 a) Physical infrastructures and telecommunications devices that allow for the connection of technological and communication system networks, understood in the broadest sense (SCADA devices, smartphones/tablets, computers, servers, etc.);

 b) Computer systems (see point a) and the related (sometimes embedded) software that guarantee the domain’s basic operational functioning and connectivity;

 c) Networks between computer systems;

d) Networks of networks that connect computer systems (the distinction between networks and networks of networks is mainly organizational);

 e) The access nodes of users and intermediaries routing nodes;

 f) Constituent data (or resident data). Often, in common parlance (and sometimes in commercial language), networks of networks are called the Internet (with a lowercase i), while networks between computers are called intranet. Internet (with a capital I, in journalistic language sometimes called the Net) can be considered a part of the system a).

 A distinctive and constitutive feature of cyberspace is that no central entity exercises control over all the networks that make up this new domain.”

All these definitions however skirt around the concept of cyber space as developed by Lessig.

Hence, cyber space may be explained as below:



Cyber space therefore is a holistic concept of abstract space which is inclusive of computer devices that are enabled to communicate with other computers, computer networks, storage spaces that may be enabled to import and export data , communication platforms, memory and memory chips etc. Cyber space necessarily includes infrastructure, information super highway, webpages etc  which facilitates information and data  exchange as well.


[1] Lessig Lawrence. The Laws of cyber space. https://cyber.harvard.edu/works/lessig/laws_cyberspace.pdf. 1998

[2] Jaishankar Karuppannan. Space transition theory. “Crimes of the Internet” edited by Frank Schmalleger & Michael Pittaro, published by Prentice Hall (2008: 283-301).

[3] See https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/60961/uk-cyber-security-strategy-final.pdf

[4] https://www.hsdl.org/?view&did=35693

[5] Retrieved from http://datia.nic.in/doc/cyber.pdf

[6] Definition by Marco Mayer, Luigi Martino, Pablo Mazurier and Gergana Tzvetkova, Draft Pisa, 19 May 2014 https://www.academia.edu/7096442/How_would_you_define_Cyberspace


Duping women in the name of matured friendship: The Pollachi sextortion case

CYBER CRIME AGAINST WOMEN BY DEBARATI HALDER

Couple of days back I received a friends request on FaceBook from a male profile whom I do not know either personally or through any of my networks. But the profile was apparently very impressing : the man was an alumni of Oxford University , works in Mercedes Benz company and he is better looking than the average. From  my experience as a cybercrime victim counsellor , lawyer and a cyber right activist for more than a decade now  I could understand that this may be one of many fake profiles that are created to allure women (and not necessarily  young girls) to trap them and victimize them through online and offline crimes including sexual crimes. It is an obvious phenomena now that women, especially educated women are using social media like Facebook, Twitter, LinkedIn etc for expanding their network  for various purposes including Job searching, getting connected with like-minded people, expanding their research network , volunteering for social causes etc.  
In the recently held #Webwonderwomen award ceremony in Delhi, the Ministry of Women and Child affairs awarded 30 women including myself the #Webwonderwomen award for positively using social media (especially Twitter), spreading awareness about the social causes they are working on and their real life support for women empowerment all across India. It was a joint initiative of Ministry of Women and Child affairs, Twitter and Breakthrough India. My fellow awardees work in different fields of public health, women’s health, right to breast feeding, women empowerment, journalism especially for the causes of women, proper nutrition for women, education for women and girls especially in socio-economically backward sectors of the society, empowering women of all age group from socio-economically backward sectors  about their rights against domestic violence, sexual reproduction rights etc.  All of them could actually make their journey stronger because of positive use of social media. I too have been using Facebook, Twitter, LinkedIn etc  to get connected with  people who have become my knowledge partners, mentors and friends in the field of law and policy especially for Cyber Victimology, Cyber law for women, Cyber Criminology, Revenge Porn, Non consensual porn,  Women’s Rights, Child Rights, Criminal law, Penology, Therapeutic Jurisprudence  etc.  It would not have been possible for me reach to the world about my work including my pro bono work without social media and the friends that I have made. I consider myself privileged to have 24 hours  access to internet  and a platform where I can share my opinion bravely, gather information without any fear and build a reputation.  Some of my fellow awardees  could win this award staying in remote places because they are well connected with the world through internet and social media.  Internet as such has given a platform to earn money in a positive way too. Consider thousands of women who make daily/weekly/monthly  Vlogs and upload it on Youtube . They have their recognition as “Youtuber” and YouTube duly recognizes their “popularity” (marketability) by awarding and rewarding them.
But still then, internet is not safe for women.  The Pollachi case proved it again.  Pollachi is the second largest town in Coimbatore district in Tamil Nadu.  This place is famous for its world famous jaggery  market and beautiful lush green agricultural fields. One would actually not imagine that this can be a center for news on cyber crimes against women, but it has now surfaced because of a brave young woman who had lodged a complaint against  the  smart gang of men who had been “enjoying” sex by way of connecting with women through fake profiles (mostly of women), grooming them to enter into chats and sharing more details, turning the chats into typical sex chats and then alluring them to come and meet in person. In my book Cyber crimes against women in India (coauthored with  prof(Dr) Jaishankar, Halder D., & Jaishankar K. (November 2016). Cyber Crime against Women in India. New Delhi: SAGE. ISBN: 978-93-859857-7-5.) I had discussed about such kinds of grooming and consequent victimization of women and this can be shown through the flow chart as below:
Image created by Dr.Debarati Halder 
 This brave woman was sexually harassed , molested and assaulted when she went to meet the so called ‘friends’, who had been doing this to many women, recording their sexual assault in their phones and threatening them to leak the clippings if they dare to refuse their demands or to go to the police. The police has now arrested all the four members of the gang applying provisions including Ss. 354A, B of the Indian Penal Code , S.66E of the Information technology Act and S.4 of the  Tamil Nadu Prohibition of harassment of women’s Act. [1]. Let us see what do these provisions say and whether  these Sections may play a pivotal role in delivering justice to women victims such as this brave heart:
S. 354A of the IPC says
(1) “A man committing any of the following acts—
(i)  physical contact and advances involving unwelcome and explicit sexual overtures;
(ii) or a demand or request for sexual favours;
(iii)or showing pornography against the will of a woman;
(iv) or making sexually coloured remarks, shall be guilty of the offence of sexual harassment.
(2) Any man who commits the offence specified in clause (i) or clause (ii) or clause (iii) of sub-section (1) shall be punished with rigorous imprisonment for a term which may extend to three years, or with fine, or with both.
Any man who commits the offence specified in clause (iv) of sub-section (1) shall be punished with imprisonment of either description for a term which may extend to one year, or with fine, or with both.
S.354 B of the Indian Penal Code states that
“Any man who assaults or uses criminal force to any woman or abets such act with the intention of disrobing or compelling her to be naked, shall be punished with imprisonment of either description for a term which shall not be less than three years but which may extend to seven years, and shall also be liable to fine.”.
S.66E of the Information technology Act 2000 (amended in 2008) states as follows:
 Punishment for violation of privacy. -Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person, shall be punished with imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both. Explanation. -For the purposes of this section-
(a) “transmit” means to electronically send a visual image with the intent that it be viewed by a person or persons;
(b) “capture”, with respect to an image, means to videotape, photograph, film or record by any means;
(c) “private area” means the naked or undergarment clad genitals, pubic area, buttocks or female breast;
(d) “publishes” means reproduction in the printed or electronic form and making it available for public; e) “under circumstances violating privacy” means circumstances in which a person can have a reasonable expectation that;-
(i) he or she could disrobe in privacy, without being concerned that an image of his private area was being captured; or
(ii) any part of his or her private area would not be visible to the public, regardless of whether that person is in a public or private place.
Section 4 of the Tamil Nadu Prohibition of Harassment Act states as follows:
Penalty for harassment of woman: Whoever commits or participates in or abets harassment of woman in or within the precincts of any educational institution, temple or other place of worship, bus stop, road, railway station, cinema theatre, park, beach, place of festival, public service vehicle or vessel or any other place shall be punished with imprisonment for a term which may extend to three years and with fine which shall not be less than ten thousand rupees.”
Noticeably, this provision may have been used for punishing the accused for committing the crime in the “specific place”; for secluding the victim from her  ‘comfort zone’ where she could have raised an alarm for help and committing the crime in a place which may be a public place or a moving vehicle from where the victim may not escape easily. 
The other news report suggested that the District Collector had ordered for detention of the accused under Goondas Act (officially known as Tamil Nadu Prevention of  Dangerous Activities of Bootleggers, Drug offenders, Goondas, Immoral traffic offenders, Sand offenders, Slum grabbers, and Video pirates Act, 1985) .[2]In my earlier blog I had explained how Goondas Act can be relevant in cyber offences by stating that this law can be very relevant especially where crimes including committing or attempting to commit extortion of money , threatening for the same, cheating, etc are involved.[3]
However, I have not seen any news report indicating that S.67A of the Information Technology Act (amended in 2008) was used for booking of the offences or not. This Section speaks about   Punishment for publishing or transmitting of material containing sexually explicit act, etc., in electronic form and says “Whoever publishes or transmits or causes to be published or transmitted in the electronic form any material which contains sexually explicit act or conduct shall be punished on first conviction with imprisonment of either description for a term which may extend to five years and with fine which may extend to ten lakh rupees and in the event of second or subsequent conviction with imprisonment of either description for a term which may extend to seven years and also with fine which may extend to ten lakh rupees”. It does not necessarily speak about creating such content by clicking the images and this has to be inferred from the provision itself. However, this lacuna has been partly covered by S.66E of the Information technology Act which speaks about violating the privacy of any individual.

Clearly, this is not a case of revenge porn, but a case of non consensual porn especially when the accused persons would have stored the clipping of sexual assault of the woman concerned with an intention of visual sexual gratification through the clipping/s and also to use it for future threatening or creating/producing sexually explicit contents on internet . But unfortunately the laws are still handicapped in this regard when it comes to grooming and sextortion. There is no law which may holistically cover the whole issue of grooming women for sexual gratification , which is narrowly addressed in the POCSO Act. Here lies the major lacuna which may have motivated many for victim blaming. 
Women like Pollachi brave heart would not have created “virtual friendship” with another unknown man or woman unless the perpetrator would have customized the fake profile to gain trust. This could have been done by thorough data mining about the victim/s.  apparently the victims of this gang were adult women including doctors, teachers etc. Such perpetrators look for their prey from social media profiles who may have not taken full precautions to protect their albums, posts, friend lists and above all the email ids and/or the  phone numbers  which  are used for accessing social media through phones. This ignorance may invite major risks as this particular case. However, social media site is also to be blamed for not monitoring the creation of fake profiles which they would not necessarily scan unless someone reports the profile as fake.
This case should have a happy ending and this can be possible only when this particular  victim and other victims of this gang cooperate with the prosecution till the end and the police uses its legal power to extract all evidences from the social media website. We as civil society members are also responsible to make a happy ending of this case : please do not circulate the images of the victim/s if in case you are conveyed the images from any number, profile etc. Such circulation would also attract penal provisions against the person who may not be directly involved in the case, but may circulate it thinking that it is “fun” to circulate such images, or he/she is doing the same to make the society aware that such crimes have happened. We all should respect the privacy of the victims and at the same time praise the victims for breaking social taboo  and reporting the matter to the police.
Stop cybercrimes against women. Start positive usage of social media .
Please note : Do not violate copyright of this blog. If you would like to use information provided in this blog for your own assignment/writeup/project/blog/article, please cite it as “Halder D. (2019),Duping women in the name of matured friendship: The Pollachi sextortion case  ” 12th March, 2019 , published in http://debaraticyberspace.blogspot.com

Computer: Basic legal understanding

BY : Dr.Debarati Halder, LL.B., M.L., Ph.D(Law)(NLSIU, Bangalore)

During the Board Exams in 2019, several exam centers across the country including Gujarat, found unique “cheating” ways by student examinees: many had smart watches which was used to download the answers. They had apparently accessed the answers by simply tapping on the watches which revealed the answers; some had gone to the wash rooms and clicked pictures of the question papers to send circulate it to their aides who would instantly send them the answers via communication apps.[1]

We can see here two types of “computers” : a smart watch which would not only show time and date, but also can store images/contents and display the same through its screen; a general mobile phone which can take pictures, store the images, circulate information, receive signals and information and display the same to the user. As such, the meaning of the word “computer” has been  expanded to include many things which previously were not considered as a “computer”.

Computer is an inherent part of our lives now. It has not only made our lives easy, it has also created many security risks as well. While many may agree with the first part of the above mentioned statement, they may not agree with the second part of the statement : the main reason behind this is, many may not know the basic definition of computer as per legal terms. Popularly, the term computer has many simple definitions; for example, according to Cambridge dictionary, computer is an electronic machine that is used for storing, organizing, and finding words, numbers, and pictures, for doing calculations, and for controlling other machines.[2] Again, whenever anyone searches the meaning of computer on Google, one of the first definition that appears is computer is  “an electronic device which is capable of receiving information (data) in a particular form and of performing a sequence of operations in accordance with a predetermined but variable set of procedural instructions (program) to produce a result in the form of information or signals”.[3]

 The definitions would show the common understanding about computer. Hence it may be explained as follows:

  • It is an electronic device.
  • It can receive, store and process certain data or information
  • It may be operating under the command of certain person
  • It needs to have procedural instructions for operation
  • It can control other machines
  • It can be connected with devices
  • It may necessarily have input and output devices

Computer therefore may mean any electronic  device which may perform several functions of receiving information, storing, processing etc of data and performing some other functions  including operating other machines which may get connected with the main computer through electro-magnetic  mechanisms. Seeing from modern perspectives, computer may necessarily mean an electronic magnetic device which may be connected with internet.

Presently, computer is being considered as one of mechanism to perform crimes online as well as offline.  But computer as a machine may never be considered as a “perpetrator “because this is infact “used” to commit crimes. It is therefore necessary to understand how the term has been defined by laws:

The 2001 EU Convention on Cyber Crimes, also known as Budapest convention, defines “computer system” as follows:

  • Any device or a group of interconnected or related devices,
  • one or more of which, pursuant to a program,
  • Performs automatic processing of data.

What we get from it is, computer system means

Now let us see how the Indian Information Technology Act, 2000(amended in 2008) defines it:

S.2(i)  of the Information Technology Act , 2000(amended in 2008) defines the term “Computer” .  it says  “Computer” means any electronic, magnetic, optical or other high-speed  data processing device or system which performs logical, arithmetic, and  memory functions by manipulations of electronic, magnetic or optical  impulses, and includes all input, output, processing, storage, computer  software, or communication facilities which are connected or related to the  computer in a computer system or computer network

Hence, this definition explains the term from 4 main aspects:

  • Nature : any electronic, magnetic, optical or other high-speed  data processing device or system
  • What does it perform :  performs logical, arithmetic, and  memory functions
  • How does it perform the task :  by manipulations of electronic, magnetic or optical  impulses,
  • What else can it do: and includes all input, output, processing, storage, computer  software, or communication facilities which are connected or related to the  computer in a computer system or computer network.

As such, it may be seen that there are several devices which may be termed as “computer”, including:

  • A simple mobile phone which is not a smart phone, but can store data like phone numbers, SMSs, images etc.
  • Smart phones
  • Smart digital cameras
  • Ipads, laptops, desktops, pen drives, smart TVs , Smart toys etc.
  • Any other electronic gadget which has the facilities of input, output, processing, storage, computer  software, or communication facilities which are connected or related to the  computer in a computer system or computer network

All of these can be used for committing cybercrimes including monetary crimes, crimes against women and children, crimes involving infringing privacy, cyber stalking and even cyber terrorism.

Hence, be careful while buying and activating all electronic gadgets, buying second hand gadgets and also while using such gadgets. Misuse of such gadgets for ulterior purposes may attract imprisonment which may be as high as life imprisonment in certain cases.

Stay safe, be safe !

Note: Please do not violate the copyright of this blog. If you wish to use it for your assignment/ writeup/ research etc, please refer  it as Halder Debarati (2019) Computer: Basic legal understanding. Published in Gender and Internet @ https://internetlegalstudies.com on 11-03-2019


[1] See for more @https://timesofindia.indiatimes.com/home/education/news/board-exam-2019-students-caught-with-smart-watch-and-mobile/articleshow/68338515.cms Accessed on 10.03.2019

[2] See https://dictionary.cambridge.org/dictionary/english/computer. Accessed on 02-01.2019

[3] Retrieved from https://www.google.com/search?rlz=1C1CHBF_enIN822IN822&biw=1366&bih=608&q=Dictionary#dobs=computer  on 02.01.2019

Women’s Day, 2019 : Views of a #webwonderwoman

webwonderpic

Picture Curtsy: https://www.ndtv.com/india-news/centre-honours-30-web-wonder-women-for-driving-reforms-via-social-media-2003833?fbclid=IwAR0h6TDvuaPHOP_mFZuq2Z3Tbk8szdy–8inqBOiBqhd4bVpo7rTudLeY1s

 

In a late afternoon in the last week of February, 2019 I received a message from Ministry of Women & Child Affairs, Government of India congratulating me for winning the #webwonderwomen award in the category of Legal/policy . #Webwonderwomen is an initiative of Ministry of women & Child, BreakThrough India, an NGO which works for women and girls and Twitter to honor 30 women  from diverse fields who had used Twitter positively for spreading awareness, reaching out to people in need and above all, advocating for women empowerment. Among the 30 women were women activists, lawyers, journalists, sanitation & public health activists, food blogger & nutritionist, film maker, activist promoting breast-feeding, women government officials and myself, who works for victims, especially women victims of cyber crimes.  There were different heartwarming  as well as heart breaking stories told by award winners ; they shared stories of  failures and success, happiness and pain, the feeling of being ridiculed by others because of their support to other women. No wonder, I have also gone through the same while executing my wish to help victims of cyber crimes: I have been cyber  bullied, stalked, trolled and threatened by men and women for my work . I have been asked ridiculous questions regarding my “attachment” with the virtual world. Finally with this award, I could prove that being on Twitter or Facebook or Instagram or on internet as a whole for more than the time allotted for general women by their families and societies is not that bad. I have an “unlimited” (in regard to time)  access to net and my husband respects my time on net.  I am fortunate to make this space. I have seen many women who are not allowed to be on net for more than a limited period by their families especially men folk, who may be enjoying (consuming) avatars of other women when their women enter the ‘restricted time period’ for net surfing on a daily basis.

This women’s day is special because as #webwonderwomen awardee I have become a proud ambassador of the Ministry of women and children affairs like my fellow award winners. This is also special because on the very day when I received the award, I saw nothing changed when it comes to cyber crimes against women. While going through the newspaper that very morning, I noticed two news items which  made me think how womens day becomes meaningless for several thousands of women victims of cyber crimes : one was regarding a gang rape survivor who came across the clipping of her own rape scene and dared to walk into the police station to report not only about the physical rape, but also about the virtual consumption of her physical assault by many. The second was about duping of a woman in a renowned matrimonial site . None of these incidents is new for me. However, I salute the rape survivor who took the matter to the police. She must have undergone severe secondary victimization and traumatization by now just like the other victim that I mentioned above. We do not know what would happen to them later: how far the police and prosecution  may help  them ? with a limited legal awareness and fear of  societal taboo, many victims like these two have to withdraw their cases and disappear.

Women’s day is necessarily  related to The Convention on elimination of all forms of discrimination against women (CEDAW), which was adopted by the UN general Assembly in 1979 and which defines discrimination against women as “…any distinction, exclusion or restriction made on the basis of sex which has the effect or purpose of impairing or nullifying the recognition, enjoyment or exercise by women, irrespective of their marital status, on a basis of equality of men and women, of human rights and fundamental freedoms in the political, economic, social, cultural, civil or any other field.”  The scope of this definition has automatically expanded to include gender discrimination, misogyny and abuse of women’s rights online.  I was more interested in the award ceremony because of Twitter as its  partner.  Social media like Twitter, Faceook , Instagram, YouTube etc are used for women empowerment. But they are notorious platforms for victimization of women. This year’s theme for International women’s day is “Think equal, build smart, innovate for change” , which signifies women empowerment in the field of technology and innovative work by women and men alike for gender equality and betterment of  situation of women across the globe. This won’t fructify unless web companies take the responsibility of  providing safety against gross abuse of women. As women activists, many of us know that there more takers of CEDAW; but how many States are actually ensuring proper implementation of laws especially for women victims of cybercrimes is a question that needs to be researched. There is no uniform law to recognize several cyber offences against women. Majority of countries have no laws for prevention of cyber bullying, stalking, impersonation  of women, online sexual offences  targeting women.  Sexting and revenge porn still fall in the grey line in majority of the countries. It is still considered a taboo for women to watch porn ; women who are caught watching porn/porn contents  are severely moral policed by the society . But on the other hand, when men watch porn including revenge porn and nonconsensual porn, it is still considered as normal because unless the websites flag them as illegal , men (and in certain cases women and  children too) may not be prevented even by the courts because apparently the victims would not have moved the police and / or the courts for taking action to take down the offensive contents .   Majority of these victims may be completely unware of the fact that they have been made subjects of  online consumption as ‘sex items’. Consider the case of  socio-economically poor  women who may be trafficked and their videos of having sexual activities may be floating for many years without making them understand how they are being ‘consumed’ by millions.[1]

“Think equal, build smart, innovate for change” would be possible only when the society including the government stakeholders  as a whole come together to take a holistic step towards preventing cyber victimization of women and creating safe place for women and girls online and in real life.

Wish you all, a very happy WOMEN’S DAY . Lets “Think equal, build smart, innovate for change”.

 

[1] See for example Halder D., & Jaishankar, K. (2014). Online Victimization of Andaman Jarawa Tribal Women: An Analysis of the Human Safari YouTube Videos (2012) and its Effects. British Journal of Criminology, 54(4), 673-688. (Impact factor 1.556). DOI: 10.1093/bjc/azu026.

 

Please Note: This blog was first posted @   “Halder D. (2019), ” Women’s Day, 2019 : Views of a #webwonderwoman”  8th March, 2019 ,@https://debaraticyberspace.blogspot.com/2019/03/womens-day-2019-views-of-webwonderwoman.html?spref=fb&fbclid=IwAR1-zH4VuTEEisNLYWogvHvMDOfWDduzkGWvlRl05_CzfopCRtF9OJ3tLTc

Continue reading “Women’s Day, 2019 : Views of a #webwonderwoman”

Women’s Day, 2019 : Views of a #webwonderwoman

CYBER CRIME AGAINST WOMEN BY DEBARATI HALDER

In a late afternoon in the last week of February, 2019 I received a message from Ministry of Women & Child Affairs, Government of India congratulating me for winning the #webwonderwomen award in the category of Legal/policy . #Webwonderwomen is an initiative of Ministry of women & Child, BreakThrough India, an NGO which works for women and girls and Twitter to honor 30 women  from diverse fields who had used Twitter positively for spreading awareness, reaching out to people in need and above all, advocating for women empowerment. Among the 30 women were women activists, lawyers, journalists, sanitation & public health activists, food blogger & nutritionist, film maker, activist promoting breast-feeding, women government officials and myself, who works for victims, especially women victims of cyber crimes.  There were different heartwarming  as well as heart breaking stories told by award winners ; they shared stories of  failures and success, happiness and pain, the feeling of being ridiculed by others because of their support to other women. No wonder, I have also gone through the same while executing my wish to help victims of cyber crimes: I have been cyber  bullied, stalked, trolled and threatened by men and women for my work . I have been asked ridiculous questions regarding my “attachment” with the virtual world. Finally with this award, I could prove that being on Twitter or Facebook or Instagram or on internet as a whole for more than the time allotted for general women by their families and societies is not that bad. I have an “unlimited” (in regard to time)  access to net and my husband respects my time on net.  I am fortunate to make this space. I have seen many women who are not allowed to be on net for more than a limited period by their families especially men folk, who may be enjoying (consuming) avatars of other women when their women enter the ‘restricted time period’ for net surfing on a daily basis.
This women’s day is special because as #webwonderwomen awardee I have become a proud ambassador of the Ministry of women and children affairs like my fellow award winners. This is also special because on the very day when I received the award, I saw nothing changed when it comes to cyber crimes against women. While going through the newspaper that very morning, I noticed two news items which  made me think how womens day becomes meaningless for several thousands of women victims of cyber crimes : one was regarding a gang rape survivor who came across the clipping of her own rape scene and dared to walk into the police station to report not only about the physical rape, but also about the virtual consumption of her physical assault by many. The second was about duping of a woman in a renowned matrimonial site . None of these incidents is new for me. However, I salute the rape survivor who took the matter to the police. She must have undergone severe secondary victimization and traumatization by now just like the other victim that I mentioned above. We do not know what would happen to them later: how far the police and prosecution  may help  them ? with a limited legal awareness and fear of  societal taboo, many victims like these two have to withdraw their cases and disappear.
Women’s day is necessarily  related to The Convention on elimination of all forms of discrimination against women (CEDAW), which was adopted by the UN general Assembly in 1979 and which defines discrimination against women as \”…any distinction, exclusion or restriction made on the basis of sex which has the effect or purpose of impairing or nullifying the recognition, enjoyment or exercise by women, irrespective of their marital status, on a basis of equality of men and women, of human rights and fundamental freedoms in the political, economic, social, cultural, civil or any other field.\”  The scope of this definition has automatically expanded to include gender discrimination, misogyny and abuse of women’s rights online.  I was more interested in the award ceremony because of Twitter as its  partner.  Social media like Twitter, Faceook , Instagram, YouTube etc are used for women empowerment. But they are notorious platforms for victimization of women. This year’s theme for International women’s day is “Think equal, build smart, innovate for change” , which signifies women empowerment in the field of technology and innovative work by women and men alike for gender equality and betterment of  situation of women across the globe. This won’t fructify unless web companies take the responsibility of  providing safety against gross abuse of women. As women activists, many of us know that there more takers of CEDAW; but how many States are actually ensuring proper implementation of laws especially for women victims of cyber crimes is a question that needs to be researched. There is no uniform law to recognize several cyber offences against women. Majority of countries have no laws for prevention of cyber bullying, stalking, impersonation  of women, online sexual offences  targeting women.  Sexting and revenge porn still fall in the grey line in majority of the countries. It is still considered a taboo for women to watch porn ; women who are caught watching porn/porn contents  are severely moral policed by the society . But on the other hand, when men watch porn including revenge porn and non-consensual porn, it is still considered as normal because unless the websites flag them as illegal , men (and in certain cases women and  children too) may not be prevented even by the courts because apparently the victims would not have moved the police and / or the courts for taking action to take down the offensive contents .   Majority of these victims may be completely unaware of the fact that they have been made subjects of  online consumption as ‘sex items’. Consider the case of  socio-economically poor  women who may be trafficked and their videos of having sexual activities may be floating for many years without making them understand how they are being ‘consumed’ by millions.[1]
“Think equal, build smart, innovate for change” would be possible only when the society including the government stakeholders  as a whole come together to take a holistic step towards preventing cyber victimization of women and creating safe place for women and girls online and in real life.
Wish you all, a very happy WOMEN’S DAY . Lets “Think equal, build smart, innovate for change”.
Please Note: Do not violate copyright of this blog. If you would like to use information provided in this blog for your own assignment/writeup/project/blog/article, please cite it as “Halder D. (2019), \” Women’s Day, 2019 : Views of a #webwonderwoman”  8thMarch, 2019 , published in http://debaraticyberspace.blogspot.com


[1] See for example Halder D., & Jaishankar, K. (2014). Online Victimization of Andaman Jarawa Tribal Women: An Analysis of the Human Safari YouTube Videos (2012) and its Effects. British Journal of Criminology, 54(4), 673-688. (Impact factor 1.556). DOI: 10.1093/bjc/azu026.

Trolling on Instagram photos: Should women restrain from uploading personal pictures?

CYBER CRIME AGAINST WOMEN BY DEBARATI HALDER

Image curtsy : Google

 

Off-late I have been getting to see many incidences of trolling on personal pictures of individuals, especially women on Instagram. These photos may include photos of young women and girls in trendy clothes, showing more skin than expected by orthodox societies. Such pictures may attract the attention of self-acclaimed moral police trolls who wish to condemn women for their choice of outfits; these trolls use extremely harsh words which may even go to the extent of threatening women for their choices. They may even broaden their harassment pattern by sharing the target pictures through different profiles to defame the victims, threat the victims and create many more morphed images of the victims and this may go on till the victims reach a stage to withdraw from the social media. This indeed generates various levels of criminal liability, some of which have been addressed by laws in India. Apart from self-acclaimed moral police trolls, several women have also complained of fashion police trolls who intentionally data mine and troll women, whose fashion sense according to the trolls is not upto the mark. Unlike the moral police trolls, the fashion police trolls  may not create security or life risking threats, but they may definitely target the reputation of the victims and  their self-esteem.

 

Now let us see what sorts of harm or damage can be done by both types of trolls:
trolling can creation of threat, intimidation
trolls necessarily create posts which are defamatory; these can be teasing remarks  and extremely  insulting comments
trolling can result in reputation damage, violation of privacy, unauthorised access to data, copyright violation (in certain cases)
Trolls are necessarily bullies. But bullying and trolling are not the same. Trolling can be more vicious than bullying. Trolling infact attracts more perpetrators and more victims in the same thread. These victims and perpetrators may not be known to  each other  previously; resultant, the new “victims” who may have joined the thread to support or disagree with the primary victim  may finally put all blames to the primary victim for the victimisation by way of trolling. Trolling is more public than bullying. As such the effects of trolling may be more traumatising than bullying. Trolling can not only damage reputation of the primary victims, trolls may go a long way to harass cyber bystanders or commenters who may support or disagree with the victims as well as with the trolls. The situation worsens if these bystanders or commenters are women; trolls may threaten these secondary victims with legal consequences (for aggravating the issues) which may force the latter to withdraw from social media just like the primary victims.
This may adversely affect women’s usage of Instagram : Instagram unlike Facebook may instantly help the user to get connected with people/group with common interest especially when the user uses the hashtags. The pictures/videos armed with hashtags may help the user to reach a wider audience. Several people including women aspiring to showcase their creativity in fashion industry, upcoming models, actors singers, anchors, performers etc, who use the platform for getting connected with the industry people, mentors and a wider audience, may suffer hugely if trolls attack them on Instagram. Victims may not only feel completely withdrawn, they may also be pulled into unnecessary legal tangles especially if the trolls misuse their pictures which may have been uploaded by the victims for promoting certain brands (which in turn may not appreciate such negative publicity of their product).
        But this in no way should mean that women should restrain from uploading pictures on Instagram. There are several ways to protect the privacy, reputation and the copyright of the pictures of the users :
1.  Women and girls should always opt for privacy options in Instagram. This may reduce the responsibility of the users and increase that of the website. The victims may directly charge the websites for not applying due diligence and  neglecting the security features which should have restricted unwanted people from infringing the privacy and copyrights. Further, in case the women wish to make the profiles open for public and had been harassed/trolled/stalked/unauthorisedly accessed etc, the victims must report the matter to the websites. The websites would not be letting the victim know the about the original identity of the harasser in case the profile is that of unknown person/s; but they would be duty bound to repair the damage, i.e. , restrict the unauthorised circulation of the image of the victim and generating anymore message that may harm the reputation of the victims. S.79(3) of the Information technology Act, 2000(amended in 2008) (exceptions to exemption from liability of intermediary in certain cases)  may be applied in such cases.
2.  Indian laws do not recognise online trolling and bullying as separate offences. This definitely had created problems for proper justice delivery to the victims. However, basing on the modus operandi for trolling several penal provisions may be applied; for instance, S.509 (punishment for harming the modesty of women), 507 (criminal intimidation by anonymous person), 499 and 500 (defamation and punishment for the same), 354D (punishment for stalking including cyber stalking) of the IPC may be used for posting intimidating, insulting, defamatory comments, stalking, creating threats etc.
3.  If trolling results in creation of Fake avatars especially sexually explicit contents, obscene contents etc, and if this involves unauthorised access to data, manipulation of data etc, the police may also apply provisions including Ss. 43(unauthorized access to the computer, data etc) 66 (punishment for computer related offences), 66C (punishment for fraudulently using password, unique identification features etc of any other person), 66D (punishment for cheating by impersonation), 66E (violation of privacy)(incase the picture has been used to create morphed pictures/images), 67 (punishment for creating sexually explicit contents), 67A (punishment for creating obscene contents ) of the Information technology Act, 2000(amended in 2008), S.354C IPC(punishment for voyeurism) etc. Police may also necessarily apply provisions from Indecent representation of women (prohibition )Act, 1986 for indicting the accused for indecent representation of the victim online.
Some of the above mentioned laws are non bailable and cognizable. This means that trolling may not be considered as a simple offence especially if it results in heavy offences including creation of sexually explicit contents ( the contents include not only the images, but the texts as well) etc. As such, women should not refrain from using Instagram fearing trolling. But they must be aware of their rights against trolling and the duties of the websites.
Let us unite against misogynist trolling. Let us spread the message that trolling, its modus operandi and its consequences should not be taken lightly and the criminal justice machinery must emphasise with the victims of trolling.

 

 Please Note: Do not violate copyright of this blog. If you would like to use informations provided in this blog for your own assignment/writeup/project/blog/article, please cite it as “Halder D. (2018), ” Trolling on Instagram photos: should women restrain from uploading personal pictures?” 15th January, 2019, published in http://debaraticyberspace.blogspot.com

 

Need for a model prohibitory provision for preventing and punishing Cybercrimes targeting women

CYBER CRIME AGAINST WOMEN BY DEBARATI HALDER

The festive seasons not only bring joy and happiness, but also brings tinges of tensions, disappointment, frustrations and unnecessary worries especially for women and girls. This is because of the negative use of digital and information technology; women and girls may be photographed inappropriately, touched inappropriately and may be photographed in such conditions, they may be stalked, their data may be unauthorisedly accessed and misused and over all, they may also be targeted for revenge porn. It may generally happen even during non-festive seasons too. But during the festive seasons such off-line and online harassment targeting women may increase more. In my previous research I have observed that this may happen due to two main reasons : lack of strict central laws relating to public place photography and engagement of the police force in crowd management. It may necessarily become almost impossible to protect every woman and girl in the crowds from the perpetrators who may be digitally empowered to violet the privacy.  The second reason plays a major role in motivating the perpetrators to take the harassment of women and girls online so that victims may not be able to understand the impact of victimisation immediately; simultaneously the perpetrators may not only satisfy their sadistic ego by harassing women and girls online, but may also gain unethically by  supplying the voyeur pictures and clippings to adult sites and even to YouTube. By the time  the victims understand and feel the impact of victimisation, their reputation may have been badly damaged due to viral spreading of the images.  
A year back the ministry of women and children rolled out project for portal to complain about online harassment. But this could neither reduce the alarming growth of online victimisation of women. The reason could be ill drafted laws and poor execution of the existing laws. These ill drafted laws may include S.66A of the Information Technology Act, 2000(amended in 2008) which prescribed punishment for offensive, annoying etc speech, which was later scrapped off in the case of Shreya Singhal vs Union of india & others (however, the Information Technology Act has not been amended so far to either amend or delete this provision from the present version of the Provision); Ss. 354 C and D of the Indian Penal Code which speaks about voyeurism and cyber stalking, S.509 of the Indian Penal Code which speaks about word gesture etc about harming the modesty of women etc.[1]I have also created a model law for penalising revenge porn and had submitted the same to the ministry of women and child affairs.[2]However, no step has been taken on this so far even though revenge porn does exist in the Indian cyber space context as well.
It needs to be noted that the internet has provided a broader platform for expressing views and opinions and women are using it share their opinion on various issues including sexual harassment that may have been meted out to them through Me too movement. But this would definitely have another side of the coin. Many women may prefer to bring up the issue of sexual harassment on public platforms through social media; but the accused persons may neither leave these victims on the cyber space. They may try to counter attack them through trolls, bullies and hired-hackers who may try to vandalise the victims reputations online by infringing the digital privacy of the Me Too fighters. This in other ways may also affect the documentary evidences that the victim/s may have saved in their electronic devices for further court proceedings.
At this juncture It is time that  the existing law must be amended to include provisions for offensive communication and revenge porn. On behalf of Centre for Cyber Victim Counselling a  draft model Law  is proposed as below:
Model law for prohibiting Cybercrime against women
Chapter 1 : preliminary
S.1 Extent and purpose:
It extends to the whole of India.
It has been seen that even though Criminal Law Amendment Act, 2013 has introduced several new provisions for the safety of women, but still there exists lacuna. Further, the Information technology Act, 2000 (amended in 2008) also failed to prevent crimes against women which include cyber bullying, trolling and revenge porn.
In view of the above, this model law is proposed to bring amendment to (a) the present provisions especially in the Indian penal Code (specifically in Ss. 354 C & D) and insert new provision for prohibiting and punishing revenge porn, (b) amend and introduce new version of S.66A to create preventive law to prevent offensive communication including bullying, trolling, online harassment etc against women and individuals in general, (c) to introduce special provision in the Information technology Act, 2000 (amended in 2008) to provide confidentiality to the victims.
Chapter 2 : Proposed amendments
S.2 Insertion of a new provision on Revenge porn:[3]
The model Revenge porn prohibitory provision :(This can be included in Chapter XVI of the Indian Penal Code as S.354E, which may be inserted after S.354D (stalking)).
1.    Anyone, who in order to satisfy his anger and frustration for a broken relationship, takes revenge  through publishing, transmitting, conveying, publicizing false and sexually provocative portrayal of his/her victim, by misusing the information that he may have known naturally and that he may have stored in his personal computer, or that which may have been conveyed to his electronic device by the victim herself, or may have been stored in the device with the consent of the victim herself; and which may have been done to publicly defame the victim essentially, commits the offence of revenge porn.
2.    Whoever commits the offence of revenge porn, shall be punished in the first conviction with imprisonment of either description for a term which shall not be less than one year, but which may extend to three years, and shall also be liable to fine of not less than 1 lakh rupees and pay reasonable compensation to the victim for damaging his/her reputation in real life and online. If he be punished on a second or subsequent conviction, he shall be punished with imprisonment of either description for a term which shall not be less than three years, but which may extend to seven years, and shall also be liable to fine of not less than 5 lakh Rupees and reasonable compensation to the victim.
 Provided that the perpetrator must also be liable to remove the offensive image either original or morphed, irrespective of the fact whether the image was conveyed to him by the victim herself or not, from his own electronic device/s and from the websites and social media profiles where he may have uploaded the same for the purpose of taking revenge.
Provided further, that the investigating officer shall immediately after coming to know of the offence of revenge porn committed by the perpetrator as reported by the victim or anyone on behalf of the victim, contact the concerned website to remove such contents including any text accompanying the image/s which may falsely portray the victim.
Provided further that if the website concerned fails to cooperate with the police on being alerted by the investigating police officer and also if the website concerned fails to remove the content within 36 hours  after being alerted by the victim herself, the said website would not be exempted from third party liability as has been explained under S.79 of the Information Technology Act, 2000 (amended in 2008) and would be liable to pay compensation to the victim for an amount not less than Rs. 5 lakhs and also fine.
Explanation:
In Subsection 1, the words “publishing, transmitting, conveying, publicizing false and  sexually provocative portrayal of his/her victim” shall include  publishing, transmitting, conveying  any image of woman whether nude, semi-nude or normal to anyone individual and/or to any website including social media, with an intention to take revenge on that said woman.
(Rationale behind proposing a new law: Why S.354C IPC would not be able to regulate revenge porn:
1.    S.354C IPC speaks about voyeurism which is inclusive of “private acts” whereby victim’s private body parts may be shown. It does not mention anything about publishing/conveying/morphing etc of pictures of women for taking revenge. The ultimate motive, i.e., taking revenge is absent here.
2. S.354C does not speak about morphed pictures published/conveyed/transferred etc for gratifying revenge. In cases of revenge porn, majority of the offensive images may be morphed. This has neither been covered under S.66E of the Information Technology Act.
3.    Creation of revenge porn may be done with normal, innocent, un-morphed pictures as well. In such case, we need to look into the accompanying text that describes the image. For example, a normal picture of the woman victim may be published with a text describing her as “horny”, “Prostitute”, “my sexy wife during honeymoon”(when in reality, the woman is not married to the perpetrator, or even if married, did not allow publication of such normal photo with such text ).
4.    Revenge porn differs from non-consensual pornography as well. Non-consensual pornography is a larger term which may include revenge porn, voyeurism or even sexual slavery including forcing the woman to be captured naked for some unethical gain. Hence, revenge porn needs a separate definition.)
S.3.  Amendment to the definition of voyeurism under S.354C of the Indian Penal Code (punishment for voyeurism) : In the place of “Any man”, it should  Any one and the amended provision should be  read as follows:
Any one who watches, or captures the image of a woman engaging in a private act in circumstances where she would usually have the expectation of not being observed either by the perpetrator or by any other person at the behest of the perpetrator or disseminates such image shall be punished on first conviction with imprisonment of either description for a term which shall not be less than one year, but which may extend to three years, and shall also be liable to fine, and be punished on a second or subsequent conviction, with imprisonment of either description for a term which shall not be less than three years, but which may extend to seven years, and shall also be liable to fine.
Explanations:   For the purpose of this section, “private act” includes an act of watching carried out in a place which, in the circumstances, would reasonably be expected to provide privacy and where the victim’s genitals, posterior or breasts are exposed or covered only in underwear; or the victim is using a lavatory; or the victim is doing a sexual act that is not of a kind ordinarily done in public.
  
Where the victim consents to the capture of the images or any act, but not to their dissemination to third persons and where such image or act is disseminated, such dissemination shall be considered an offence under this section.
S.4. Amendment to S.354D of the Indian Penal Code (punishment for stalking including cyber stalking): In the place of Any man, it should be anyone. The amended version should be read as follows:
1) Anyonewho—
   follows a woman and contacts, or attempts to contact such woman to foster personal interaction repeatedly despite a clear indication of disinterest by such woman; or
   monitors the use by a woman of the internet, email or any other form of electronic communication,commits the offence of stalking;
 Provided that such conduct shall not amount to stalking if the man who pursued it proves that—
it was pursued for the purpose of preventing or detecting crime and the man accused of stalking had been entrusted with the responsibility of prevention and detection of crime by the State; or
  
it was pursued under any law or to comply with any condition or requirement imposed by any person under any law; or
  
in the particular circumstances such conduct was reasonable and justified.
 (2) Whoever commits the offence of stalking shall be punished on first conviction with imprisonment of either description for a term which may extend to three years, and shall also be liable to fine; and be punished on a second or subsequent conviction, with imprisonment of either description for a term which may extend to five years, and shall also be liable to fine.
(Rationale behind broadening the concept of perpetrator for Ss.354 C&D: It has been seen that women may also commit voyeurism and cyber stalking for victimising fellow women.  This amendment may help reduce such sorts of victimisation.)
S.5. Insertion of new provision prohibiting photography of individuals in general without the consent of the individuals concerned (this may be inserted after S.268 of the Indian penal Code as S.268A)
1. Anyone who uses his camera devices in any public place to capture the images of anyone including men, women, children, people belonging to LGBT groups, with a motive to either sexual gratification of the self, or sexual gratification of others, or uses these images for unethical gain, or for ridiculing or causing hatred,  defamation , damage to the reputation of the said persons by way creating, circulating, spreading etc of such images through electronic medium  without the consent of  such men, women, children  or member of LGBT group when the said men, women, children, or member of LGBT group are  not expected to give consent and/or not expected to be alert for not allowing such photography,  and also publishes, transmits, circulates the same through electronic medium shall be punished with an imprisonment  of either description for a term which shall not be less than six months r, but which may extend to one year , and shall also be liable to fine of not less than 20 thousand  rupees and pay reasonable compensation to the victim for damaging his/her reputation in real life and online. If he be punished on a second or subsequent conviction, he shall be punished with imprisonment of either description for a term which shall not be less than one  year, but which may extend to three years, and shall also be liable to fine of not less than 50 thousand Rupees and reasonable compensation to the victim.
 Provided that the perpetrator must also be liable to remove the non-consensual offensive image either original or morphed, from his own electronic device/s and from the websites and social media profiles where he may have uploaded the same for the purpose mentioned above.
Provided further, that the investigating officer shall immediately after coming to know of the offence mentioned above committed by the perpetrator as reported by the victim or anyone on behalf of the victim, contact the concerned website to remove such contents including any text accompanying the image/s which may falsely portray the victim.
Provided further that if the website concerned fails to cooperate with the police on being alerted by the investigating police officer and also if the website concerned fails to remove the content within 36 hours  after being alerted by the victim herself, the said website would not be exempted from third party liability as has been explained under S.79 of the Information Technology Act, 2000 (amended in 2008) and would be liable to pay compensation to the victim for an amount not less than Rs. 5 lakhs and also fine.
Explanation:
In Subsection 1, the words “capture images” shall also include  capturing images of accident victims and doing so without offering any help to the victim, any other heinous, serious or petty crimes and doing so without reporting the matter to the police and offering help to the victim, capturing images of  rape or sexual molestation or sexual assault of any women or children, taking self portraits or selfies in the above situations.
Explanation 2: The act of capturing the images of men, women, children and members of the LGBT groups may not be considered as an offence if the same is done for academic and research purposes, provided the person/s capturing such images has prior consent of proper authorities, or for medical research purposes or for the purpose of creating documentary evidences which must be provided to the criminal justice machinery including the courts for further legal actions to punish the wrong doers.
S.6. Amendment to Information Technology Act, 2000(amended in 2008):
Punishment for offensive speech (this can be inserted after S.66 (offences related to the computer) of the Information Technology Act, 2000 (amended in 2008). This may also be considered as the amended version of S.66A (punishment for annoying etc speech), which was scrapped off by the Supreme court in Shreya Singhal’s case)
1.      Anyone who sends, posts produces, publishes, creates, circulates or sponsors to be circulates  any offensive speech including any text or cartoon or caricature or image accompanied with text to any woman by way of electronic, digital and information communication, which may damage her reputation, damage the reputation of her family and  children create threat to her, her family and children, damage her reputation to an extent that may affect her job or may affect her reputation in the prospective job, shall be punished with an imprisonment for in the first conviction with imprisonment of either description for a term which shall not be less than one year, but which may extend to three years, and shall also be liable to fine of not less than 1 lakh rupees and pay reasonable compensation to the victim for damaging his/her reputation in real life and online. If he be punished on a second or subsequent conviction, he shall be punished with imprisonment of either description for a term which shall not be less than three years, but which may extend to seven years, and shall also be liable to fine of not less than 5 lakh Rupees and reasonable compensation to the victim.
 Provided that the perpetrator must also be liable to remove the offensive speech from his own electronic device/s and from the websites and social media profiles where he may have published etc the said speech targeting the woman.
Provided further, that the investigating officer shall immediately after coming to know of the offence of posting, publishing etc of the offensive speech committed by the perpetrator as reported by the victim or anyone on behalf of the victim, contact the concerned website to remove such contents including any text accompanying the image/s which may falsely portray the victim and damage her reputation.
Provided further that if the website concerned fails to cooperate with the police on being alerted by the investigating police officer and also if the website concerned fails to remove the content within 36 hours  after being alerted by the victim herself, the said website would not be exempted from third party liability as has been explained under S.79 of the Information Technology Act, 2000 (amended in 2008) and would be liable to pay compensation to the victim for an amount not less than Rs. 5 lakhs and also fine.
Explanation:
For the purpose of this section, offensive speech targeting women shall include the followings:
1.      Any speech which lowers the moral character of the woman concerned within the meaning of Article 19(2) of the constitution of India.
2.    Any speech which defames the woman concerned in the society as a whole within the meaning of Article 19(2) of the constitution of India as well as Ss.499 and 500 of the Indian Penal Code and Indecent representation of women Prohibition Act.
3.    Any speech which includes Cyber bullying. Cyber bullying  may mean attacking anyone with harsh or rude  words in the cyber space, including publicly available web platforms, social media, private and public  chat rooms, emails, blogs etc, and such harsh or rude words are particularly made to ridicule one’s body shape, gender, gender orientation, physical or mental incapability, race, colour, opinion, educational background, language  etc.
4.    Any speech which includes Cyber trolling. Cyber trolling is  an extreme usage of freedom of speech which is exercised to disrupt the community discussions in social networking sites and which is done to deliberately insult ideologies such as feminism, secularism etc; of the topic starter or the supporters of the topic starter.
5.     Any speech which contains Cyber hate propaganda. Cyber hate propaganda may mean offensive communication between the sender and multiple recipients with intent to spread hatred against a particular individual for her opinion, race, gender etc.
It is expected that if this model Act is considered by the government, the growing rate of cyber crimes against women may be brought down.
Please Note: Do not violate copyright of this blog. If you would like to use informations provided in this blog for your own assignment/writeup/project/blog/article, please cite it as “Halder D. (2018), ” Need for a model prohibitory provision for preventing and punishing Cybercrimes targeting women”  22ndOctober 2018 , published in http://debaraticyberspace.blogspot.com


[1] My observations on these laws can be found in my book. (Cyber Crimes against Women in India. New Delhi: SAGE Publishing. ISBN: 978-9385985775, https://in.sagepub.com/en-in/sas/cyber-crimes-against-women-in-india/book253900  (co-authored with Professor K.Jaishankar.
[2]See the model law @Halder.D(2017) Criminalizing Revenge Porn From The Privacy Aspects: The Model Revenge Porn Prohibitory Provision. Available @
[3]This was published in supra@2

The great Facebook hack: Liability of Facebook as service provider

CYBER CRIME AGAINST WOMEN BY DEBARATI HALDER

Photo curtsy: Google

By the late evening of 28th September, 2018 almost all of Facebook users would have received messages in their electronic devices that their “session expired”. It indicated that the subscriber needs to log in again to continue the Facebook activities. Many of the users felt it was a hoax, many felt it was a hackers act and some could understand it was an alert alarm as they were always ‘online’ and never logged off even when their phones were ‘sleeping’ or switched off. By late night-early morning on 29th September, 2018 the Facebook subscribers got an official information from Facebook help center stating that the company had discovered that there was an attack on their system and the attackers had illegally accessed Facebook access tokens which would give way to access the subscribers’ data. On an emergency precautionary step, Facebook logged off all users so that they can log on again with a secured code provided by Facebook. It was confirmed that Facebook was trying to exercise due diligence to protect the data of the users and in the course of the same users were directed to log off.
Due diligence has been addressed by  S.512 © of the Digital Millennium Copyright Act, 1998 which indicates that the intermediary may be saved from third party liabilities (especially for copyright infringements) if  the intermediary practiced due diligence, i.e., it   did not have the requisite level of information about the said infringement, it must not have been financially benefited from such infringement, it must have taken expeditious measures to take down the content concerned or block the access to the material concerned upon receiving the information of the infringement. The same has also been addressed by S.79 (3) of the Information Technology Act, 2000 (amended in 2008) and has been further explained in Information Technology intermediary guidelines Rules, 2011 whereby the term cyber security incident has been defined as follows:
Rule .2(d) “Cyber security incident” means any real or suspected adverse
event in relation to cyber security that violates an explicit or implicity
applicable security policy resulting in unauthorised access, denial of
service or disruption, unauthorised use of a computer resource for
processing or storage of information or changes to data, information
without authorisation;
The rules further goes on to explain what are the due diligence practices that should be adopted by the intermediary under Rule.3(3), which states that  The intermediary shall not knowingly host or publish any information or shall not initiate the transmission, select the receiver of transmission, and select or modify the information contained in the transmission as specified in sub-rule (2):
Interestingly Rule. 4 of the Intermediary Guidelines Rule further provides a clear direction to the intermediaries as what is to be done and within how much time when the intermediary has come to know about any information which harms the interest of users or threatens the security of the nation etc (which are mentioned in rule 3), by stating that The intermediary, on whose computer system the information is stored or hosted or published, upon obtaining knowledge by itself or been brought to actual knowledge by an affected person in writing or through email signed with electronic signature about any such information as mentioned in sub-rule (2) above, shall act within thirty six hours and where applicable, work with user or owner of such information to disable such information that is in contravention of sub-rule (2). Further the intermediary shall preserve such information and associated records for at least ninety days for investigation purposes.
This Rule 4 (read with Rule 3) mentions that the intermediary should either remove the offensive content or block the access to the content. Facebook in its action in practicing due diligence and exercising reasonable security practices (in India, the guiding principle in this regard is mentioned in the Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011), had alerted the users, logged them off and logged them in with fresh code and also expressed that they are not aware whether any individual has been affected by such unauthorised access to the Facebook system as a whole.
By doing this Facebook actually tried to escape its liability as a ‘negligent body corporate’ or a company which may be brought to the courts under S.43A of the Information Technology Act, 2000(amended in 2008). Compare the incident of Facebook- Cambridge analytica data breach and how the EU parliament addressed the issue by accusing Facebook for having extremely poor cyber security measures compared to Europe. Facebook users were also advised by an Illinois court to go for a class suit against the company (Facebook) for unethically scanning and storing personal photos and information of the users.[1]The recent news also suggests that in the US Facebook users have started going for class actions against Facebook for data breach which occurred apparently because of  the company’s negligence in securing the data.[2]Under the Indian information technology Act, 2000(amended in 2008), S.43A empowers the victims of privacy (including data ) breach to claim compensation from the faulting body corporate to a maximum limit of Rs. 5 Crores, which however is subject to modification depending upon the damage suffered by the victims, reputation harm etc and the discretion of the adjudicator. Not many users have applied this law for bringing big companies under the Indian scanners. There are however some cases of bank’s liability or hospital managements liability which are now coming up because of the awareness among the users/data owners and their lawyers.
However, web companies like Google, Facebook etc may have another option to shred the liability: they may always shift the major burden to the data owners or data managers, i.e. the private individuals who upload data almost every minute in average to expose their private information.[3]It is for this that we need to be vigilant on our own practices of data sharing.
Stay safe, play safe.
Please Note: Do not violate copyright of this blog. If you would like to use informations provided in this blog for your own assignment/writeup/project/blog/article, please cite it as “Halder D. (2018), “ The great Facebook hack : Liability of Facebook as service provider”  30thSeptember, 2019 , published in http://debaraticyberspace.blogspot.com


[1]See Halder Debarati (2018), FB, Its content regulation policies & photo matching tech: boon or bane for Indian women from privacy law aspect. Published in LiveLaw on April, 20018 @https://www.livelaw.in/fb-its-content-regulation-policies-photo-matching-tech-boon-or-bane-for-indian-women-from-privacy-law-aspects/
[2]See for instance, see Knoop Joseph (2018), Facebook sued over data breach that involved 50 million accounts . available @ https://www.dailydot.com/layer8/facebook-breach-lawsuit/
[3] For better understanding about this see Halder & Jaishankar ((November 2016). Cyber Crime against Women in India. New Delhi: SAGE. ISBN: 978-93-859857-7-5.

5 key factors about hacking and the laws

CYBER CRIME AGAINST WOMEN BY DEBARATI HALDER

Photo curtsy: Google 

Hacking is undoubtedly one of the worst issues that one wants to deals with. Often I get to see women complaining about hacking of their social media accounts, people including men and women fearing about and getting victimized by way of hacking of their email accounts , net banking profiles and overall, the computer devices. New netizens are more prone to getting victimized by hacking; so are their parents if these netizens are pre-teens or teenagers. It is important to know some key factors which are associated with hacking. These are as below:
The five key factors which everyone should know about hacking:
1.    The term hacking is not defined in any uniform style. Different researchers have defined hacking in different ways. All most all academic definitions have indicated that computer hacking or cyber hacking may mean unauthorized access to the computer, computer data etc, changing the data without any authorization etc. In a way, it is directly related to unauthorized data privacy infringement. A ‘smart’ example could be the allegedly unauthorized access into the personal documents including bank access details of the TRAI chief by the ethical hackers when the TRAI chief threw challenge that  ADHAR ‘hack proof’.[1]
2.    Indian laws especially Information Technology Act, 2000 (amended in 2008) does not address the issue as “hacking”. The issue is dealt with by not one, but three Sections, namely, Ss. 65 which prescribes punishment for tampering with computer source documents, 66, which prescribes punishment for computer related offences and 43, which speaks about Penalty and compensation for damage to computer, computer system etc.
3.    Hacking may literally start with unauthorized access or securing to the computer, computer system, computer network etc. Accessing or ‘securing access’ can be done by various ways. This may also include giving way to the hackers by opening suspicious mails/messages or links. It is for this reason that new users of internet and digital technology must be extremely cautious while opening suspicious mails/links etc.
4.    Hacking may also include downloading/extracting data etc, modifying such data, reproducing that data in an altered form etc. It may also include unauthorized access to the computer or computer system or data etc and infecting the same with viruses which will immediately or gradually destroy all data, software etc stored in the computer and computer system. Hacking may necessarily include unauthorized accessing and then using of the computer network, email id, phone number or social media profile for impersonating and unethical gain. It is for this reason that often people complaint about hacking when their accounts have been unauthorisedly accessed, data extracted/accessed and modified and email ID/social media profiles etc are used for impersonating by way of a fake avatar.
5.    Hacking may also involve denial of services, which is why a computer or computer system  thus affected may not get connected to the internet easily and according to the wish of the real owner of the computer or computer system etc, but according to the wishes of the hacker only.
Now you may understand that when your computer shows activities which are not generally expected, you must be alarmed that your computer or the computer network or the computer system has been affected by hacking : typically your device may slow down for no reason, you may start getting to see that the data is altered, your net banking account or email or social media account’s password and username and the related phone number and email id may get changed without your authorization, your documents including your photo may get published or circulated elsewhere without your knowledge. Most scary of these is the camera device of your phone or laptop or Ipad (when they are on switch on mode) etc may become active even when you are not using the camera. It is for this reason that  cyber security experts suggest to not to use the electronic devices when one expects complete privacy from the outside world, like when one is in the washroom.
So, what about the punishment?
Do Indian laws address hacking as “hacking” ? The answer is NO.  But this does not mean that the act of hacking is not punishable.  As discussed above, when the constituting elements mentioned under points nos 3, 4 and 5 create unauthorized access to the computer, computer system,  data etc, Sections 65, 66 and 43 may immediately be applicable for booking the offences for tampering the computer source code, computer related offences and damage to the computer  system etc. As such there are two types of punishments that are prescribed for hacking related offences : punishment as per civil offences which are regulated by S.43 and punishments as per criminal nature of the offence, which are regulated by Ss. 65 and 66. In the later, the punishments may include imprisonment for a period upto three years  and/or fine which may extend to Rs. two lakhs. In case S.66 is applied, then the fine amount increases upto Rs. 5 lakhs. Again, if the act of hacking is judged as per S.43, then the provision would be read with S. 45 of the Information technology Act, which indicates that, a maximum of Rs. 25, 000/ may be paid as compensation to the victim for such offences (this is especially so because S.43 does not mention any specific amount of compensation and this lacuna is filled by S.45 which prescribes residuary penalty).  However, the recent trend may show that most of hacking related cases had been booked under Ss. 66, 65 and 43 so that the perpetrators may undergo jail term as well as are bound to pay fine.
Interestingly, the Information Technology Act does not restrict the criminal liability to a specific age as is seen in the Indian penal code. Hence, even if it is a computer genius as young as 10 or 12 years of age, he/she may not escape the clutches of law in case he/she has done the offence/s which may constitute hacking. Considering their age and maturity level, Juvenile Justice  (care and protection) Act , 2015 may also be applicable.  Again, this would NOT mean that parents would be considered completely innocent. Very recently the courts in Gujarat had made the parents liable for underage kids driving two and four wheelers.  If the children are arrested, the parents may have to pay for negligence in monitoring the wrong doing of their children.
I end this piece with a positive note: if we adults are aware, then our children will also be aware and we can prevent the digital as well as real life privacy infringement in a swift way.

Please Note: Do not violate copyright of this blog. If you would like to use informations provided in this blog for your own assignment/writeup/project/blog/article, please cite it as “Halder D. (2018), “ 5 key factors  about hacking and the laws”  3rd September, published in http://debaraticyberspace.blogspot.com


[1] See Rachel Chitra(2018), Hackers deposit Re 1 in Trai chief’s account. Published in https://timesofindia.indiatimes.com/india/hackers-deposit-re-1-in-trai-chiefs-account/articleshow/65190556.cms on 30/07/2018