Page 61 - cyber law new
P. 61
17MCSC09 CYBER SECURITY AND CYBER LAW
However, cyber cells are developing in each state or city for combating these
cybercrimes but still the officials consists lack of knowledge. This is because the
government didn’t provide a chance to youngster’s who have that much of skills and
Notes
are qualified professionals, as they promote their staff on the basis of deputation like the
constable of a police station now become a typist in cyber cell. If such things happen
then it cause delay in the process of solving cybercrime. To get rid away from this an
official must now about search and seizure process, chain of custody, management of
documentation, and also legalities of searches. Nowadays cyber experts are increasing
day by day who support police officials in investigation process.
1.48 Misuse of Cyber Forensics and Investigation
Computers present new considerations for both substantive criminal law and criminal
procedure. At the heart of many of the questions is the appropriate balance between
privacy rights and necessary criminal investigation. It is particularly problematic
with respect to computer crimes, since serious national security issues can arise when
computers are misused.
1.49 Summary
The boundaries of cybercrimes, actually, are not so clear. For example, if someone uses
high-tech hacking into a computer or server, getting something valuable, it's hard to say
it must be a “theft” in tool cybercrime or a “hacking” in target cybercrime. So why do we
still categorize cybercrime? I think we can analyze cybercrime better and more efficiently
by this way. Although there are some intersections, with categorization, we will focus
on each part of cybercrime respectively and then have a comprehensive concept finally.
In following decades, the increasing of computer network and personal computers
transformed “computer crime” into real cybercrime. Since Internet was invented, people
began to exchange information based on networks of computers, also keep data in
computer rather than paper. At the same time, the cybercrime was not only restricted in
target cybercrime, but expanded into tool cybercrime and computer incidental.
Cybercrimes have become a real threat today and are quite different from old- school
crimes, such as robbing, mugging or stealing. Unlike these crimes, cybercrimes can be
committed single handedly and does not require the physical presence of the criminals.
The crimes can be committed from a remote location and the criminals need not worry
about the law enforcement agencies in the country where they are committing crimes.
Computers have become an important part of our lives and as such are involved
in almost everything we do from paying bills to booking vacations. However, computer
Self Learning Material 61