Victimization of Women: Cyber Crimes

Attili Lakshmi and Bhimreddy Chamanthi


With the increase in awareness regarding the electronic, computerised mechanisms, the information technology has played an important role in shaping the present technical and universal advancement of a nation in terms of technology. With this advancement in technology, another angle of the same, which being negative has come into light through cyber-crimes. The cyber-crimes are posturing as a great peril to every person. They are challenging the national security of a nation. On the other hand, it is a known fact that women face a lot of violence throughout their lifetime. Particularly in India where the general public looks downward on the women, and the law doesn’t even legitimately perceive cybercrimes, it is high time we address these sensitive issues in a delicate manner. This paper focuses on the various cyber-crimes a woman may come across or face during one’s lifetime.

Despite the fact that wrongdoings against women is on an ascent in all fields, being a casualty of cybercrime could be most awful experience for a woman. We will likewise quickly look at upon the different laws that exist to ensure ladies in such cases, for example, the Information Technology Act (2000) and the new laws that are happening upon in this field, for example, the Criminal Amendment Bill (2013). We will take help of different cases rumoured cases (eg: Yogesh Prabhu v. State of Maharashtra; State of Tamil Nadu v. SuhasKatti) in cybercrime to land at our decision. We will additionally plan to recommend a few solutions to counter the consistently expanding cybercrime against ladies in India. At our decision we will centre upon the choices accessible to the unfortunate casualties to cybercrime and the progressions required in legitimate framework to viably check the rising spirits of digital crooks.


Cybercrime is a criminal action done utilizing personal computers or laptops or etcetera and the Internet. This encompasses anything from downloading illicit music records to taking a large number of dollars from online financial balances. Cybercrime further incorporates non-money related offenses, for example, originating and dispersing infections on different PCs or posting classified business data on the Internet.

Maybe the most noticeable type of cybercrime is the Identity Fraud, in which offenders utilize the Internet to take individual data from different clients. Two of the most widely recognized ways are through Phishing and Pharming. Both of these strategies draw clients to counterfeit sites (that have all the earmarks of being authentic), where they are approached to enter individual data. This could consist of login data, for example, usernames and passwords, telephone numbers, addresses, charge card numbers, ledger numbers, and other data which the culprits can use to “take” someone else’s character. Consequently, it would be clever to check the URL or Web address of a website to ensure that it is genuine before entering your own data.

Since cybercrime covers such a wide extent of criminal action, the precedents above are just a couple of a large number of wrongdoings that are viewed as cybercrimes. While PCs and the Internet have made our lives less demanding from multiple points of view, tragically individuals additionally utilize these innovations to exploit others. Along these lines, it is shrewd to secure yourself by utilizing antivirus and spyware blocking programming and being watchful where you enter your own data.

Cybercrime runs over a range of exercises. Towards, one side is the violation that includes breaking of principles of an individual or corporate security, for example, attacks on the honesty of data held in computerized vaults and the utilization of fraudulently advanced data to extort a firm or person. Additionally, towards the end of the range is the developed wrongdoing of fraud. Along the range also lie transaction based frauds, for example, misrepresentation, dealing in youngster erotic entertainment, computerized theft, tax evasion, and duplicating. These are explicit wrongdoings with straight forward unfortunate casualties, however the criminal stows away in the relative secrecy given by the Internet. Another section of this kind of wrongdoing includes people working under companies or government administrations purposely modifying information for either benefit or political targets. At the other end of the range, there are those malpractices that include endeavours to disturb the genuine activities of the Internet. This range from spam, hacking, and disavowal of administration assaults against explicit destinations to demonstrations of cyber-terrorism: that is, the utilization of the Internet to cause open unsettling influences and even demise. Cyber-terrorism centres upon the utilization of the Internet by non-state wrongdoers to influence a country’s financial and mechanical foundation.

Discussing these cyber-crimes, Phishing is a kind of an offence where fraudulent people endeavour to trap clueless clients into accomplishing something they wouldn’t usually do, for example, tapping on a pernicious URL or email connection. These fraudulent people as a rule influence phishing assaults to take clients’ login accreditations, subtleties which they would then be able to maltreat to increase unapproved access to their injured party’s messages or money related records.

Ransom ware is a subset of crime ware that mostly taints a casualty’s PC by means of phishing assaults or an adventure unit crusade. Upon fruitful disease, the ransom ware normally encodes the injured individual’s information. It is at this point that requests for a payment instalment are made in return for the arrival of their information. In any case, that is not an unchangeable reality. There is no surety as to whether the causalities will ever be able to recover their information.

Malware comes in a wide range of structures. Some explicitly focus on clients’ monetary data by introducing key loggers onto sufferer’s PCs. Malware tests can likewise achieve clients by means of various conveyance strategies, including phishing assaults and vindictive programming bundles that misuse unpatched programming vulnerabilities. Once introduced, aggressors can utilize the malware to keep an eye on online exercises, take individual’s monetary data or hack into different frameworks. Malware has turned out to be one of the greatest online dangers and it’s been utilized in a large portion of the world’s biggest digital assaults including WannaCry, NotPetya and Cryptolocker.

Also Read  Cybercrimes Against Women and Children in India

Aggressors can do a wide range of activities with an individual’s character. They can seize the control of exploited people’s money credentials, apply for new managing account, take clients’ well deserved reserve funds, and that’s just the beginning. All they need are some key bits of data about you to persuade a bank or a client administration delegate that they’re you.

Indian women users of internet are yet not open to promptly reporting the digital maltreatment or digital wrongdoing. The most serious issue of digital wrongdoings lies in the usual way of doing things and the rationale of the cyber-criminal. The internet is a passage for some individuals, including wrongdoers. While individuals don’t live in the global village, they go back and forth like some other spot. This nature gives the convicts the opportunity to escape after the exercise of cyber fraud.

In realism, it is seen that many online companions appreciate prodding their women companions by different words like “captivating”, “alluring”, and so on which are the virtual start of digital indecency. They gradually bring their female companions into certainty and begin talking about their own issues like a genuine companion. Henceforth, in numerous events they are effective in transforming the internet friendly relationships into a solid bond and steadily continue to send foul or defamatory comments. On the off chance that the beneficiary shies away, the sender of such messages would turn out to be progressively urged to proceed. The issue would be understood just when the defrauded women without further ado report back or even caution the abuser about taking powerful decisions.

Under the Information and Technology Act, 2000 (hereinafter known as ITA), stalkers and cybercriminals can be sued under a few segments for rupturing of protection:

Section 67 of the ITA manages distributing or transmitting profane material in electronic structure. The prior segment in ITA was later enlarged according to Indian Information (Amendment) Act, 2008 in which youngster sex entertainment and maintenance of records by delegates were altogether included.

According to Section 66A of the ITA, sending hostile messages through correspondence administration, causing disturbance and so on., through an electronic correspondence or sending an email to delude or swindling the beneficiary about the inception of such messages (commonly known as IP or email satirizing) are altogether secured here. Discipline for these demonstrations is detainment as long as three years or fine.

As per the Section 66B of ITA dishonestly accepting stolen PC asset or specialized gadget is charged with castigation as long as three years or one lac rupees as fine or both.

Section 66C of the act deals with electronic signature or other wholesale frauds like utilizing others’ secret phrase or electronic marks.

Section 66D whereas deals with cases of cheating by individual on utilizing PCs or a specialized gadget which will be rebuffed with detainment of either portrayal for a term which reaches out to three years and will likewise be at risk to fine which may stretch out to one lac rupees.

Section 66E mentioned in ITA Privacy infringement – Publishing or transmitting private space of any individual without his or her assent and so on. Punishment is three years’ detainment or two lac rupees fine or both.

Section 66F of ITA, Cyber psychological warfare intents to undermine the solidarity, uprightness, security or sway of the country and denying access to any individual, approving to get to the PCs or endeavouring to enter or get to PCs without approval.

Section 72 of ITA : regarding the punishment for breaking security and classification, and Section 72A of ITA deals with the punishment for uncovering data amid legitimate contract.

Section 441of the Indian Penal Code (IPC) manages criminal trespassing. Section 354D of ITA talks about stalking. It characterizes stalker as a man who pursues a women and attempts to contact such women, screens each action embraced by the women while utilizing computerized media.

In the case of Dr. L. Prakash v. Superintendent[1], the respondent was an orthopaedic specialist who compelled women to perform sexual acts and later on transferred and dealt these recordings as obscene materials around the world. He was charged under Section 506 of IPC (Clause2 of the Article which recommends discipline for criminal terrorizing to cause demise or on the other hand intolerable hurt), Section 367 of IPC (which manages capturing or kidnapping for causing demise or shocking hurt) and Section 120-B of IPC (criminal scheme) and Section 67 of Information Technology Act, 2000 (which managed foul proclamation in the web). He was condemned lifetime confinement and a fine of Rupees 1, 25,000 under the Immoral Trafficking (Prevention) Act, 1956.

In the case of State of Tamil Nadu v. Suhas Katti[2], the accused had posted indecent, slanderous messages about a woman who was divorced, in the yahoo messenger and publicized her as a request for sex. This case is considered as one of the main cases to be reserved under the Information Technology Act, 2000 (IT Act). He was indicted under sections 469, 509 of Indian Penal Code (IPC) and 67 of the IT Act 2000 also, was rebuffed for a long time thorough detainment and fine.

The cases mentioned above were reviewed for the first time under the ambit of IT Act. Besides these cases there are a couple of essential cybercrimes that fundamentally happen against Indian women in the internet, for example, badgering through email, digital stalking, digital criticism, transforming, email mocking, hacking, digital sex entertainment and digital sexual maligning, digital being a tease and digital tormenting.

Also Read  Rehabilitation or Torture: The Plight of Indian Prisons, a Third Gender Perspective

Ritu Kohli’s Case was India’s first instance of digital stalking, in this case Mrs. Ritu Kohli protested against an individual to police, who was utilizing her personality to visit over the Internet at the site, which was largely channelled in Delhi for four continuous days. Mrs. Kohli further whined that the individual was talking on the Net, utilizing her name and giving her address and was talking in an indecent language. A similar individual had intentionally given her telephone number to different prattles urging them to call Ritu Kohli at odd hours. Subsequently, Mrs. Kohli got around 40 calls in three days which mainly included odd hours. The said call had ruined the private life of the complainant, therefore the IP addresses was followed and police scrutinised the whole issue and at last captured the guilty party. A case was enlisted under the section 509, of IPC and also, from that point he was discharged on surety. This is first time when an instance of digital stalking was accounted.

In a certain case, which was observed from Kottayam in Kerala where a young woman went to meet with an individual who she had progressed towards becoming a friend on Facebook. When she met him, she was snatched. The young woman was followed and later she told the police that when she met with the youngster he had coercively taken her to a lodge and attacked her.

A quick increment in the utilization of PC and web has offered ascend to new types of wrongdoings, like distributing explicitly express materials in electronic structure, video voyeurism and break of classification, and spillage of information by mediator, internet business fakes generally known as Phishing, fraud and hostile messages through correspondence administrations.

In Yogesh Prabhu v. State of Maharashtra[3], a woman at first conversed with Yogesh Prabhu on the web. When he made an engagement proposition to her, she turned it down. From that point she quit reacting to his messages as she discovered his conduct suspicious. She additionally expelled him from her companions’ rundown. However, Prabhu kept on watching out for her profile and her whereabouts, and stalked her through the web. A few months after this, she got sends from an obscure email account, containing indecent pictures and video cuts. She at first overlooked them, yet when the incoming data did not stop, she held up a police grievance, and the Cyber Crime Investigation Cell assumed control over the examination. Internet Protocol (IP) address of the PC was marked out to be a Vashi firm where Yogesh Prabhu worked. The court indicted Prabhu under S. 509 IPC (words, signals or acts expected to affront the humility of a lady) and S. 66E of the Information Technology Act, 2008 (discipline for infringement of security).

In the case of Shreya Singhal v. Association of India (UOI)[4], Section 66A of the Information Technology Act, 2000, which managed discipline for sending hostile messages through correspondence administration, etc. was struck down not on the grounds that it is outside the domain of Article 19(1)(a) of Constitution of India alone but due to the bad habit of ambiguity and the utilization of free language. None of the terms in Section 66Aof ITA are even endeavoured to be characterized and can’t be characterized, the outcome being that honest people are reserved in just as the individuals who are most certainly not. Such people are not told obviously on which side of the line they fall; and it is available to the experts to be as discretionary and offbeat as they like in booking such people under the said Section. Indeed, an extensive number of guiltless people have been reserved and numerous occurrences have been given as a note to the Court. The implementation of the said Section would truly be a slippery type of restriction which disables a guiding principle contained in Article 19(1)(a).

‘Police’ and ‘Public’ are the State subjects according to the Constitution of India and States are fundamentally in charge of avoidance, recognition and examination of various wrongdoings or fraudulent activities through their law implementation mechanisms. The Law Enforcement Agencies make legitimate move according to the appropriate Sections of the Indian Penal Code and the Information Technology Act, 2000 against the cyber law-breaker. Information recommends that every second, one woman in India is deceived to be a casualty of cyber wrongdoings. The online stage has now turned into a road where a woman’s poise, protection and security is progressively being tested each minute.

The initiative propelled by Ministry of Home Affairs, enables residents of India to hold up protests on questionable online substance identified with tyke pornography, child sexual maltreatment material and explicitly express material, for example, abduction and molestation without unveiling their character. The gateway enables the complainants to transfer offensive material and URL to aid the examination by State Police. National Crime Records Bureau (NCRB) will proactively distinguish such questionable substance on getting complainants and take it up with delegates for its expulsion from the online stages. The Cyber Crime Reporting Portal is an activity of the Ministry of Home Affairs under the National Mission for the security of women to encourage exploited people/complainants to report cybercrime grumblings on the web.

Rs. 93.12 crores have been given to the States and Union Territories for setting up Cyber Criminological exercising research centres in each State/Union Territories, limit building and exercising. Further, after ways have been made for compelling usage of the plan:

  1. Central Cybercrime Reporting Portal ( propelled on 20th September 2018 to report protests relating to Child Pornography (CP)/Child Sexual Abuse Material (CSAM) or explicitly unequivocal substance.
  2. Initiating training programs arranged for Law Enforcement Agencies (LEAs), public investigators and judges.
  3. Four workshops led for limit working of Law Enforcement Agencies (LEAs) and authorities of Ministry of Women and Child Development (WCD) under CCPWC (Cybercrime Prevention Against Women And Children) conspire.
  4. Handbook on Cyber Safety for Adolescents/Students has been commuted.
  5. Digital Dost Twitter Handle (@CyberDost) and radio crusade the nation over propelled for spreading mindfulness against cybercrimes.
Also Read  Gender Injustice and Harassment in Film Industry: Constraints and Remedies

The subtleties of protests got in National Commission for Women and shut under classification of Cybercrime against ladies amid most recent four years are as follows: in the year 2014 there were 209 cases received out of which 53 cases were solved, whereas, in 2015, 86 cases were closed out the 226 cases which were received. Similarly, in 2016, 119 cases were solved out of the 311 cases which were filed. In 2017, 370 cases were filed of which 250 cases were closed. As per this, the cyber-crimes against women have been increasing of which very few cases have been solved.

The NCRB (National Crime Records Bureau) Report, 2016 states that in 2016 there has been 48,31,515 occurrences of wrongdoing in India under Indian Penal Code just as Special and Local Laws (SLLs), which is 2.9% more than the wrongdoing occurrences of 2015. Of these entire violations, the quantity of cyber wrongdoings is 12317 which structure 0.25% of the complete wrongdoings. This is comprehensive of cyber violations against women. The cyber wrongdoing rates have expanded at a rate of 6.3% amid 2015-16 and 20.5% amid 2014-15. The quantity of cyber violations in India in 2014 and 2015 have been 9622 and 11592 respectively.

Cyber violations structure an irrelevant level of complete wrongdoings in India, however, the cases enlisted have expanded quick. It demonstrates either there are not satisfactory laws to cover all frequencies or there is absence of attention to what comprises cyber wrongdoing and looking for the assistance of law. The position turns out to be increasingly basic with regards to cyber violations against women. The vast majority of the cyber violations against women are incorporated in violations under Information Technology Act, 2000.

Cyber violations revealing in India is still in its early stage, however, cyber brutality is growing at a rapid pace. Cyber stalking is regular yet except if some progressively extreme infringement like assault risk or revenge pornography happen in cyber stalking which isn’t taken as a genuine grumbling and the complainant is frequently approached to obstruct the stalker in various web-based social networking stages. The laws should be changed to make them cyber delicate just as sexual orientation sensitive. Words like lustful and licentious ought to be dropped from the concerned Act to improve them to secure women uniformity and poise. The viewpoint of the laws ought to be to guarantee the poise of women and not being in a paternalistic job. Laws are as yet deficient and the Information Technology Act should be revised to make it very much planned with the Indian Penal Code.

More Indian Penal Code provisions should be changed to make them cyber amicable. There ought to be a single complete law covering all parts of digital crimes against women. The police, the legal executive and the organizations must be cyber generous and be prepared to deal with confirmations sensibly. Cyber wrongdoings against women need an all-encompassing methodology with change in laws, change in methodology of authorities and progressively extreme sharpening efforts including diverse sections of society.

The issue of online brutally focused against women is to a great extent under accentuated. The negligence to women is profoundly established in the Indian man-centric culture and it has pursued this convention on each road including that of the internet. Regardless of how many instruments to check digital wrongdoings are built up, a definitive answer for this issue similar to some other lays in our general public. Anyway new activities have been under taken by various associations to acquire a distinction the current circumstance. Various NGOs have been approaching, understanding the need to give importance to these aspects. Likewise, in 2016, the Home Ministry reported that they intend to dispatch an entrance by March, 2018 named “Cyber Crime Prevention against Women and Children” (CCPWC) that would permit Indian women to report grievances about online provocation. In the coming long time, with the purposeful endeavours of the lawful society, other administrative and non-legislative associations, the general public digital wrongdoings would be an account of the past.

In spite of the fact that not all individuals are exploited people to digital wrongdoings, they are still in danger. Violations by personal computers or laptops or other gadgets change, and they don’t generally happen behind the personal computers or laptops or other gadgets, however they are executed by personal computers or laptops or etc. The programmer’s personality is gone between twelve years youthful to sixty-seven years old. The programmer could live miles away from its injured individual, and they wouldn’t realize they were being hacked. Wrongdoings done behind the personal computers, laptops and other gadgets are the twenty first century’s concern. With the innovation expanding, crooks don’t need to loot banks, nor do they need to be outside so as to carry out any wrongdoing. They have all that they need on their lap. Their weapons aren’t firearms any longer; they assault with mouse cursors and passwords.

[1] Dr. L. Prakash v. Superintendent, (2008) 3 MLJ (Crl) 578

[2] State of Tamil Nadu v. SuhasKatti

[3] YogeshPrabhu v. State of Maharashtra 2006 (3) MhLj 691.

[4] Shreya Singhal v. Association of India (UOI) (2013) 12 S.C.C. 73.