Page 61 - cyber law new
P. 61

17MCSC09   CYBER SECURITY AND CYBER LAW








               However, cyber cells are developing in each state or city for combating these
           cybercrimes  but  still  the  officials  consists  lack  of  knowledge.  This  is  because  the

           government didn’t provide a chance to youngster’s who have that much of skills and
                                                                                                Notes
           are qualified professionals, as they promote their staff on the basis of deputation like the
           constable of a police station now become a typist in cyber cell. If such things happen
           then it cause delay in the process of solving cybercrime. To get rid away from this an
           official must now about search and seizure process, chain of custody, management of
           documentation, and also legalities of searches. Nowadays cyber experts are increasing
           day by day who support police officials in investigation process.


           1.48  Misuse of Cyber Forensics and Investigation


           Computers present new considerations for both substantive criminal law and criminal
           procedure. At the heart of many of the questions is the appropriate balance between
           privacy  rights  and  necessary  criminal  investigation.  It  is  particularly  problematic
           with respect to computer crimes, since serious national security issues can arise when
           computers are misused.

           1.49  Summary


           The boundaries of cybercrimes, actually, are not so clear. For example, if someone uses
           high-tech hacking into a computer or server, getting something valuable, it's hard to say
           it must be a “theft” in tool cybercrime or a “hacking” in target cybercrime. So why do we
           still categorize cybercrime? I think we can analyze cybercrime better and more efficiently
           by this way. Although there are some intersections, with categorization, we will focus
           on each part of cybercrime respectively and then have a comprehensive concept finally.

               In following decades, the increasing of computer network and personal computers
           transformed “computer crime” into real cybercrime. Since Internet was invented, people
           began  to  exchange  information  based  on  networks  of  computers,  also  keep  data  in
           computer rather than paper. At the same time, the cybercrime was not only restricted in
           target cybercrime, but expanded into tool cybercrime and computer incidental.

               Cybercrimes have become a real threat today and are quite different from old- school
           crimes, such as robbing, mugging or stealing. Unlike these crimes, cybercrimes can be
           committed single handedly and does not require the physical presence of the criminals.
           The crimes can be committed from a remote location and the criminals need not worry
           about the law enforcement agencies in the country where they are committing crimes.

               Computers have become an important part of our lives and as such are involved
           in almost everything we do from paying bills to booking vacations. However, computer



                                                                                        Self Learning Material 61
   56   57   58   59   60   61   62   63