How to catch criminals without borders

Establishing jurisdiction in the virtual world is the first challenge for law-enforcement agencies. Training is the second

yogesh

Yogesh Rajput | December 29, 2014



As each country has its own law pertaining to privacy and internet services, jurisdiction is perhaps the biggest challenge law enforcement agencies face in dealing with cyber crimes. “If the services provided by a company based in the US are managed by another company based in Europe for beneficiaries sitting in India, then it becomes a challenge for law enforcement agencies to gather information from three different domains,” explains Rakshit Tandon, a cyber security expert and director of A&R Info Security Solutions, who is often consulted by police from Uttar Pradesh and Haryana.

Neeraj Aarora, a supreme court advocate specialising in cyber law, stresses the need for training. “The expertise has to be built in-house by the police department rather than calling an expert from outside.” However, Tandon says police personnel are quite well equipped with the necessary skills and that there lies a larger problem that counters the training received in solving cyber crime cases. “It often happens that a police personnel is trained in cyber crime handling skills but is later transferred to another unit where there is no requirement of the skills he has learnt, resulting in waste of human resource. A new officer who is brought into the cyber cell has to start afresh in learning the skills.” 

Also Read: Why catching this Twitter terror ideologue was so difficult

Yet, trained police personnel many a time find themselves in a bind as they try to work in collaboration with foreign-based companies on a criminal case. In order to retrieve information about activities of an accused on a website owned by a foreign-based company, police send the company a letter of request asking relevant questions. The response time, however, is not always swift, sometimes also calling for the issuance of a letter rogatory in case of collection of evidence from a witness based abroad. “The response time often becomes a problem due to which either the investigating officer gets tired of working on the case or the information becomes redundant or outdated till the time it reaches the desk of the police. Data has a limited age,” says Tandon. 

But can private companies monitor content poured on their websites 24x7 from millions of users? For Tandon, one cannot expect social media websites to monitor their activities all the time owing to huge traffic. “At the most, they can report any unwanted activities.” Aarora, however, is of the view that catching a criminal is still not that difficult as it may sound. “In cyberspace, every act leaves its trace. If one has the skills, it is easy to track the miscreant.”  

Then there are exceptional cases, given that the new technologies are always emerging. Messaging over BlackBerry posed a one-of-its-kind challenge. In 2012, after repeated requests from the Indian government, BlackBerry maker Research-In-Motion (RIM) agreed to hand over the encryption key of its messenger and email services for security agencies in India as they suspected transfer of information from the mobile device by the accused in the 2008 Mumbai terror attacks. The agreement came after a near four year long stand-off.

Cyber crime cases now call for even greater cautious handling with the recent observation made by the supreme court. The apex court has said that electronic evidence submitted in court needs to be authenticated and should be in compliance with section 65B of the amended evidence Act.

This section requires the person in charge of duplication of electronic record to produce a certificate in court establishing the authenticity of the electronic evidence. Earlier, police used to produce a duplicate copy of the electronic evidence. The supreme court directions have now made it mandatory for law enforcement agencies to obtain a certificate of authenticity from foreign based companies, if required.

Comments

 

Other News

An eye on AI

Google Assistant, Rekognition and Tay. All these, often seen in news, have a common thread – they are powered by Artificial Intelligence (AI). Only difference is that while some have been in news for right reasons, some others have made it to the headlines for all the wrong reasons. For instance, Goo

Data-powered economy

1.33 billion. Let that large number sink in. That number is nearly 18 percent of the total global population, and almost the number of people estimated to currently reside in the republic of India, one of the world’s largest and fastest growing economies. These 1.33 billion people are spread across a

Dams or time bombs?

Kerala is limping back to normal after the devastating floods that wreaked havoc in the state prompting red alert in all 14 of its districts. While the rescue activities and immediate relief are now a thing of the past, the state is struggling to turn a new page and the focus is on reconstruction an

The imprint of the Gurjara Pratiharas

On August 16, when the country lost its beloved former prime minister Atal Bihari Vajpayee, a nondescript village, 70 km from Agra, came into the limelight. Bateshwar, the ancestral village of Vajpayee, is situated along the notorious Chambal ravines on the banks of the Yamuna. Vajpayee&rsq

Imagining the worst

Love Sonia is not a film you would want to watch if you knew its subject: sex trafficking. Without even a scene experienced, the subject induces visceral revulsion. However optimistic the screenplay, it can only deal in ugly dregs and bring up retching bile. Even so, Love Sonia, gritty an

India’s balancing act with China

On the first day of his August 19-20 visit to India, when Japanese defence minister Itsunori Onodera held talks with his Indian counterpart Nirmala Sitharaman, several defence and strategic-related issues had cropped up in their annual talks. But a big smile flashed on Sithraman’s face when Onodera,

Current Issue

Current Issue

Video

CM Nitish’s convoy attacked in Buxar

Opinion

Facebook    Twitter    Google Plus    Linkedin    Subscribe Newsletter

Twitter