• About Us
    • Our team
    • Code of Conduct
    • Disclaimer Policy
  • Policy
    • Privacy
    • Copyright
    • Refund Policy
    • Terms & Condition
  • Submit Post
    • Guideline
    • Submit/Article/Blog
    • Submit-Event/Job/Internship
  • Join Us
    • Intership
    • Campus Ambassador
  • Media Partnership
  • Advertise
    • Magazine
    • Website
  • Contact us
Friday, October 3, 2025
  • Login
  • Register
law Jurist
Advertisement
  • Home
  • Articles
    • Articles
  • CASE LAWS
    • CRPC
    • IPR
    • Constitution
    • International Law
    • Contract Laws
    • IBC
    • Evidence Act
    • CPC
    • Property Law
    • Companies Act
    • CRPC
    • AI and law
    • Banking Law
    • Contact Laws
    • Criminal Laws
  • Law Notes
    • CPC Notes
    • Contract Laws Notes
    • Bharatiya Nyaya Sanhita
    • International Law Notes
    • Constitution Notes
    • Companies Act Notes
    • Banking Law Notes
    • Evidence Act Notes
  • Opportunities
    • Internship
    • Moot Court
    • Seminar
  • Careers
    • Law School Update
    • Judiciary
    • CLAT
  • JOURNAL
  • Legal Documents
  • Bare Act
  • Lawyers corner
No Result
View All Result
  • Home
  • Articles
    • Articles
  • CASE LAWS
    • CRPC
    • IPR
    • Constitution
    • International Law
    • Contract Laws
    • IBC
    • Evidence Act
    • CPC
    • Property Law
    • Companies Act
    • CRPC
    • AI and law
    • Banking Law
    • Contact Laws
    • Criminal Laws
  • Law Notes
    • CPC Notes
    • Contract Laws Notes
    • Bharatiya Nyaya Sanhita
    • International Law Notes
    • Constitution Notes
    • Companies Act Notes
    • Banking Law Notes
    • Evidence Act Notes
  • Opportunities
    • Internship
    • Moot Court
    • Seminar
  • Careers
    • Law School Update
    • Judiciary
    • CLAT
  • JOURNAL
  • Legal Documents
  • Bare Act
  • Lawyers corner
No Result
View All Result
law Jurist
No Result
View All Result
Home Articles

Cyber-Crime: Prevention And Prosecution

Law Jurist by Law Jurist
16 July 2025
in Articles
0
0 0
Read Time:30 Minute, 8 Second

Author: Akshaya Praveen; student of BBA.LLB from RV University, Bangalore 

Abstract

The swift development of cyberspace has revolutionized the very nature of crime, giving rise to new types of criminal activity that cut across conventional territorial borders. Cybercrimes, with their hallmark of anonymity, technicality, and worldwide reach, have revealed gaping loopholes in current criminal procedural systems, especially in the Indian legal system. This paper critically reviews jurisdictional and procedural issues that arise in the prosecution of cybercrime in accordance with Indian law, specifically touching upon matters relating to territoriality, attribution, and digital evidence. It presents a comparative insight through the evaluation of methods embraced by jurisdictions including the United States and the European Union, and also identifies the international cooperation potential through tools like the Budapest Convention and mutual legal assistance treaties (MLATs). Lastly, the paper suggests reforms to the Indian procedural system, highlighting specialized investigative capability, legal upgradation, greater cross-border cooperation, and strong data protection mechanisms in order to keep pace with the complex requirements of cybercrime prosecution in the digital environment. 

  1. Introduction

Cybercrime refers to unlawful activities in which a computer is used either as an instrument, a target, or both. In the Indian context, cybercrime encompasses unauthorized access to computer systems without the consent of the legitimate owner, as well as offenses committed through digital means. These crimes range from online hacking and phishing to denial of service (DoS) attacks, credit card and online transaction frauds, cyber defamation, and child pornography.

In India, cyber laws primarily fall under the Information Technology Act, 2000 (IT Act). This act, enacted by the Indian Parliament, provides a legal framework for cybercrime and electronic commerce. Additionally the Bhartiya Suraksha Sanhita, Digital Personal Data Protection Act, 2023 and the National Cyber Security Policy are other legislations that govern certain aspects of cyber crime in India. 

  • How do you report a Cyber- Crime?

In a theoretical sense the reporting of cyber-crime is supposed to be a smooth, efficient process through the National Cyber Crime Reporting Portal, this portal ensures that anyone with  internet access can report cyber-crimes and it is swiftly routed to relevant authorities, to speed up the resolution process and minimize delays. 

To initiate the process of reporting a cybercrime, an individual must first register on the official cybercrime reporting portal managed by the Government of India. Once registered, the complainant is required to select the relevant category under which the offense falls. These categories typically include crimes against women and children (such as cyberstalking, cyberbullying, or child exploitation), financial frauds (including credit card scams, phishing, and online transaction fraud), and other cyber offenses such as identity theft, data breaches, or hacking.

After selecting the appropriate category, the complainant must fill in all mandatory information. This includes a detailed description of the incident, the date and time of occurrence, and any known details of the alleged offender, if available. Additionally, the complainant must upload a valid government-issued identity proof to verify their credentials and submit any supporting documents or digital evidence, such as screenshots, transaction records, email communications, or chat logs, which can aid in the investigation. The portal streamlines the complaint submission process, ensuring that victims of cybercrime can seek redressal in a systematic, accessible, and efficient manner.

This paper aims to critically examine the mechanisms through which the Indian legal and enforcement systems address cybercrime, the processes involved in prosecuting such offenses, and the evolving nature of legal frameworks in response to the dynamic and complex challenges posed by the cyberspace.

  1. Relevance under Indian criminal law

As with the exponential increase in cybercrimes in India, the legal system has had to evolve to cope with the threats of the age of cyberspace. Among the cornerstone legislations is the Information Technology Act, 2000, enacted to accord legal recognition to electronic transactions and fight crimes under cyberspace. The Act assumes a central position in regulating matters concerning e-commerce, cybercrime, and digital communications. It enunciates the principle of

electronic signatures, enacts provisions for data protection, and sets up certifying authorities to facilitate authenticity in digital communication. But in cases where the IT Act fails to fully address a certain cyber-crime, the provisions of the Indian Penal Code, 1860 (currently the Bharatiya Nyaya Sanhita, 2023) are used to fill in the gaps in the law. A few IPC provisions have particularly been found useful in charging cybercrimes.

For instance, Section 292 makes it an offense to distribute or transmit obscene materials, which can be applied in the case of electronic transmission of sexually explicit material, especially those involving children.

Likewise, Section 354D addresses stalking, including its cyber form. It criminalizes the act of repeatedly pursuing or trying to reach out to a woman through online means—emails, social networking sites, or other online channels of communication—despite her obvious lack of consent. This provision is an important protection against cyberstalking.

Another relevant section is Section 379, which deals with the crime of theft. In cybercrime, this is usually applied when there is an unauthorized taking of information or hijacking of electronic devices for malicious intent. Further, Section 463 relates to forgery and is applicable in cases where there is falsification of electronic documents or records. This covers acts such as email spoofing where an individual sends misleading emails by pretending to be another person or entity.

Together, the IT Act and certain provisions of the IPC constitute a twin legal framework which enables proper prosecution of a plethora of cyber-crimes, although the dynamic nature of technology continues to necessitate periodic legal revisions and clarifications. 

III. Prosecution of Cybercrimes under the Bharatiya Nagarik Suraksha Sanhita [BNSS ]

Cyberterrorists and cybercriminals everywhere appear unfazed by the threat of prosecution or arrest as they hang about on the Net posing an ubiquitous threat to the financial well-being of companies, to the customers’ trust in them and as a growing danger to the countries’ security.

Cybercrimes, which are the harmful deeds perpetrated from or against a computer or network, are distinct from most crimes committed on earth in four respects: (a) They are simple to master, (b) they take few resources compared to the damage they can cause, (c) they can be perpetrated in a jurisdiction state without being physically there and (d) they are frequently not clearly unlawful. The other issue which goes against punishing the cybercrimes is that most countries’ laws do not specify that it is illegal to commit a cybercrime.

The adjudication of cyber-crimes in India now functions at the sophisticated nexus of various legislations, most notably the Information Technology Act, 2000, the Bharatiya Nagarik Suraksha Sanhita, 202, and the Bharatiya Nyaya Sanhita, 2023. The IT Act, being the main legislation specifically dealing with cyber offences, makes some categorizations as to the nature of offences, most notably their compoundability, cognizability, and bailability. Section 77A of the IT Act  makes it clear that, except in certain cases, all offences under the Act punishable with imprisonment for a term of three years or less are compoundable offences, subject to the operation of Sections 265B and 265C of the former Code of Criminal Procedure, 1973, which have now been largely adopted and adapted under the BNSS regime.At the same time, Section 77B of the IT Act  makes it clear that, in spite of anything contained in the CrPC, offences punishable with imprisonment of three years or more are cognizable, while those punishable with imprisonment of three years or less are bailable. These provisions form a basic framework for classifying offences under the IT Act, but upon closer examination, there are many nuances when these provisions are implemented in practice, particularly when offences under the Indian Penal Code, 1860 or presently the Bharatiya Nyaya Sanhita also enter into the equation.

Under the IT Act, the majority of cyber offences such as hacking, identity theft cheating by personation using a computer resource and sending offensive messages attract punishments of three years or less, and thus are, in principle, both bailable and compoundable. Nonetheless, certain aggravated offences under the IT Act, such as publishing obscene material in electronic form (Section 67), transmitting sexually explicit content (Section 67A), publishing or transmitting material depicting children in sexually explicit acts (Section 67B), and cyber terrorism (Section 66F), attract imprisonment exceeding three years, rendering them cognizable and non-bailable.¹ Furthermore, while most offences relating to defamation, obscenity, or mischief in cyberspace fall under the minor category, cyber terrorism represents an entirely distinct threat paradigm involving national security, thereby warranting the most stringent classification under the criminal law framework.

Parallel to the IT Act, cybercrimes frequently overlap with traditional offences under the IPC (and now under the BNS), particularly in areas like cheating and  forgery. These offences, by contrast, are generally non-bailable and, with the exception of certain offences like theft, are non-compoundable. This divergence creates several practical challenges in prosecution. 

For example, while hacking under Section 66 of the IT Act is a bailable and compoundable offence, theft of data could simultaneously attract charges under Section 378 of the IPC, which is non-bailable. Similarly, receipt of stolen property electronically falls under Section 66B of the IT Act (bailable) but also under Section 411 of the IPC (non-bailable). This dissonance between the two statutes often leads to procedural anomalies and judicial confusion.

The Bombay High Court addressed these inconsistencies in Gagan Harsh Sharma v. The State of Maharashtra, where it grappled with a situation involving overlapping charges under the IT Act and the IPC. The Court emphasized that in such cases, the more serious provisions (i.e., those under the IPC) could not be diluted simply because the same transaction also attracted milder IT Act offences. Consequently, offences like criminal breach of trust and cheating by use of computer systems, when also invoking Sections 408 and 420 of the IPC, would not automatically become bailable or compoundable merely due to the corresponding IT Act offences being so.⁶ This pragmatic approach preserves the seriousness of traditional property offences even in their cyber manifestations.

The transition from the CrPC to the BNSS marks another pivotal development in cybercrime prosecution. The BNSS, which came into force to modernize and simplify criminal procedure, explicitly accommodates technological realities. Cyber-crimes, given their inherently digital nature and cross-jurisdictional character, are procedurally governed by the BNSS alongside the substantive provisions of the IT Act and the BNS. Cognizability and bailability under the BNSS are primarily determined by the quantum of punishment: offences punishable with imprisonment of three years or more are cognizable, allowing police officers to arrest without warrant and investigate without prior approval of a Magistrate; offences punishable with lesser terms remain non-cognizable, necessitating prior permission under Section 175 of the BNSS. 

Moreover, BNSS Section 173 has modernized the filing of First Information Reports (“FIRs”) by explicitly allowing electronic registration, a revolutionary step for cyber-crime cases where the complainant and the perpetrator may be located in different parts of India, or even across international boundaries. Electronic FIRs enhance accessibility, facilitate timely recording of evidence, and remove geographical barriers, thus giving procedural teeth to cyber-crime prosecution.

Investigation procedures under BNSS, particularly Sections 185 (Search and Seizure) and 197 (Jurisdiction), reflect a deliberate attempt to address the digital age’s realities. Search and seizure powers now specifically include electronic devices, ensuring that digital evidence such as emails, server logs, and encrypted files can be lawfully secured. Preservation orders directed at Internet Service Providers (ISPs) and intermediaries ensure that ephemeral data, which could be critical evidence, is not lost. Furthermore, BNSS Section 197 clarifies that offences may be tried at any place where any part of the cause of action arose, recognizing the “borderless” nature of cyber-crimes.

Perhaps most crucially, BNSS Section 336 lays down the admissibility rules for electronic evidence, harmonizing earlier standards under Section 65B of the Indian Evidence Act. Under the new regime, digital records, audio-visual footage, and email correspondences are admissible provided they are properly authenticated and certified. This ensures that technological evidence so central to cyber-crime cases  is not discarded on procedural technicalities but is critically evaluated for reliability and relevance.

The arrest and bail procedures under BNSS further reflect this calibrated approach. Section 35 provides for arrest without warrant in cognizable cases, subject to safeguards protecting constitutional rights, including immediate communication of arrest and access to legal counsel. Bail provisions under Sections 479 to 482 maintain a balance between the gravity of the offence and the rights of the accused. Minor cyber offences, particularly first-time instances without aggravated factors, generally attract bail as a matter of right. However, grave offences like cyber terrorism (Section 113 of the BNS) are treated as serious threats to national security, with bail being highly discretionary.

Compounding of offences, which refers to the amicable settlement between victim and accused, is addressed under BNSS Section 359. While certain minor cyber offences can be compounded with or without court permission, serious offences, especially those with significant public interest ramifications like cyber terrorism, child pornography, or online financial fraud remain non-compoundable. This nuanced system ensures that while individual grievances may be resolved expeditiously, broader societal interests are not compromised.

In conclusion, the prosecution of cyber-crimes in India today requires the synchronized application of the BNSS, the BNS, and the IT Act. While the IT Act defines and penalizes cyber-specific offences, and the BNS addresses overlapping traditional crimes in a digital context, the BNSS provides a modern, flexible, and technologically savvy procedural framework for investigation, trial, and sentencing. Nonetheless, challenges remain particularly with jurisdictional issues, evidence authentication, and harmonizing overlapping offences. Effective cyber-crime prosecution will depend not merely on the letter of these statutes but on their purposive and coherent interpretation by courts, guided by technological expertise and constitutional safeguards. As India navigates the complexities of the digital revolution, its legal framework must remain dynamic, adaptive, and rights-sensitive, ensuring that both security and liberty are robustly protected.

  • Investigation of Cybercrimes

The investigation process in cybercrime cases presents unique challenges and necessitates a highly specialized approach by law enforcement agencies. The powers of the police to investigate cybercrimes are grounded in the general framework of criminal procedure law as laid down in the Bharatiya Nagarik Suraksha Sanhita, 2023 (BNSS), but they are also supplemented by specific provisions within the Information Technology Act, 2000 (IT Act). The police possess the authority to initiate investigations into cognizable cyber offenses without prior permission from a Magistrate under Section 175 of the BNSS, whereas, for non-cognizable offenses, prior sanction remains necessary.¹ Furthermore, Section 185 of the BNSS empowers police officers to conduct search and seizure operations of digital devices or cloud-based data without a warrant in urgent cases, provided that they record the reasons for such action in writing. Such provisions recognize the ephemeral nature of electronic evidence, which can be swiftly altered or destroyed, necessitating swift action. In addition, the IT Act under Sections 67C and 69 obliges intermediaries, including Internet Service Providers (ISPs), social media platforms, and web-hosting services, to assist law enforcement by preserving and furnishing data relevant to criminal investigations. Thus, the powers of the police have been thoughtfully extended into the digital domain to meet the challenges posed by cyber-enabled criminality.

The collection of digital evidence occupies a central position within the broader investigative framework and demands strict adherence to procedural legality. Section 91 of the BNSS authorizes police officers to summon any person to produce documents or electronic records deemed necessary for an investigation.¹ The Bharatiya Sakshya Adhiniyam, 2023, under Sections 61 and 63, categorically recognizes electronic records as documentary evidence and prescribes the conditions for their admissibility in court. Particularly, Section 63 mandates the furnishing of a certificate authenticating the electronic record, analogous to the earlier requirement under Section 65B of the Indian Evidence Act, 1872. The importance of such compliance was emphatically underlined by the Supreme Court in Anvar P.V. v. P.K. Basheer, where the Court held that electronic evidence without requisite certification would be inadmissible.⁴ The emphasis on maintaining the integrity, originality, and authenticity of digital evidence throughout the investigative process cannot be overstated. Any lapse, including improper seizure, storage, or documentation, could compromise the evidentiary value and potentially lead to acquittals despite the substantive guilt of the accused.

Cyber forensic units play an indispensable role in supporting cybercrime investigations. Specialized bodies such as the Indian Computer Emergency Response Team (CERT-In) and the National Cyber Forensics Laboratory (NCFL) deploy state-of-the-art technological methods to extract, analyze, and interpret digital evidence. These forensic units engage in practices such as creating forensic images of hard drives, retrieving metadata, tracing blockchain transactions, and conducting deep web investigations. Given the volatile and complex nature of digital evidence, forensic examiners ensure that the chain of custody is meticulously maintained and that the processes employed are forensically sound and legally defensible. Their expert reports and court

testimonies frequently bridge the technological knowledge gap for judges and jurors, playing a critical role in the evidentiary assessment at trial.

III. Role of Magistrates and Trial Process

Once an investigation concludes, the role of the judiciary assumes critical importance in the cybercrime prosecution process. Under Section 210 of the BNSS, a Magistrate may take cognizance of an offense based on a complaint, a police report, or information otherwise received. Cognizance implies that the Magistrate, upon applying judicial mind, concludes that the facts disclosed warrant further proceedings. In cybercrime cases, where much of the material involves complex technological data, Magistrates must exercise enhanced scrutiny to ensure that cognizance is not mechanical but based on a sound appreciation of the evidence presented. Given the technical nuances involved, Magistrates are often called upon to assess the veracity of digital evidence, forensic reports, and technical certifications even at the threshold stage.

Judicial oversight in cybercrime cases extends significantly into the domain of evidentiary evaluation. Under Section 336 of the BNSS, electronic records are admissible subject to proper authentication and certification requirements.Courts must verify whether the electronic evidence was collected legally, whether appropriate certificates under Section 63 of the Bharatiya Sakshya Adhiniyam were produced, and whether the integrity of the evidence remains intact. Judicial precedents such as State (NCT of Delhi) v. Navjot Sandhu have underscored the necessity for courts to rigorously scrutinize the authenticity and reliability of electronic evidence, emphasizing that digital records cannot be treated on par with traditional documentary evidence without such examination. The Supreme Court has consistently advocated for a careful, context-specific evaluation of electronic evidence, recognizing both its evidentiary power and its susceptibility to manipulation.

The nature of the trial procedure in cybercrime cases further reflects the seriousness accorded to electronic evidence. Cybercrimes punishable by imprisonment of up to three years, such as certain forms of online defamation or transmission of obscene material, are typically triable under the summary procedure prescribed by Section 283 of the BNSS. Summary trials are designed for speed and efficiency, allowing for an abridged recording of evidence and quicker judgments. However, for graver cybercrimes such as cyber terrorism, identity theft involving substantial harm, or large-scale data breaches  warrant case procedures under Section 269 of the BNSS become applicable. Warrant trials involve formal framing of charges, comprehensive examination and cross-examination of witnesses, and detailed argumentation. Considering the technical complexity and voluminous nature of evidence in serious cybercrime cases, warrant trials offer a more appropriate procedural safeguard, ensuring thorough adjudication and fair opportunity for defense.

Thus, from the preliminary stages of cognizance to the final stages of trial, judicial involvement in cybercrime litigation is marked by heightened responsibility and specialized legal standards. Ensuring the fairness of the trial process while maintaining the evidentiary integrity of complex digital material remains the cornerstone of effective cybercrime adjudication.

  • Jurisdictional and Procedural Challenges in Cybercrime Prosecution

The prosecution of cybercrimes presents not only technological hurdles but also significant jurisdictional and procedural challenges. The inherent characteristics of cyberspace  its borderless expanse, anonymized communications, and technical complexity disrupt traditional legal notions of territoriality, attribution, and evidence management. In India, while the Bharatiya Nagarik Suraksha Sanhita, 2023 (BNSS) and the Bharatiya Sakshya Adhiniyam, 2023 attempt to provide a

structured legal response, the adjudication of cybercrime cases often grapples with foundational difficulties related to determining jurisdiction, identifying perpetrators, and establishing the admissibility of digital evidence. This section explores these interconnected challenges, underscoring the need for nuanced judicial interpretation and international cooperation to effectively combat cybercrime.

  • Determining Jurisdiction in Cybercrime Cases

Jurisdiction constitutes the very foundation of any criminal trial, and its proper determination is crucial to the validity of legal proceedings. Traditionally, Sections 177 to 179 of the BNSS (corresponding to Sections 177–179 of the earlier Criminal Procedure Code, 1973) govern territorial jurisdiction, providing that offenses must ordinarily be inquired into and tried by a court within whose local jurisdiction the offense was committed. However, in the realm of cybercrime, the borderless nature of digital communications fundamentally complicates this framework. Cyber offenses, such as hacking, phishing, or defamatory postings, can originate in one jurisdiction, cause harm in another, and involve servers located in entirely different territories. The application of traditional territorial principles, therefore, often proves inadequate.

Section 179 of the BNSS offers some flexibility by permitting jurisdiction where the consequence of an act ensues.¹ This principle, known as “consequence-based jurisdiction,” has been judicially recognized to extend courts’ authority over offenses where the harm is suffered within their territorial limits, even if the wrongful act occurred elsewhere. Yet, in cybercrime cases, determining where the “harm” occurred whether at the server location, the victim’s location, or the broader internet space remains an open and often contentious question. This challenge was brought to the forefront in Swami Ramdev v. Facebook, Inc., where the Delhi High Court addressed issues of extraterritorial injunctive relief against defamatory content posted online. The Court asserted that Indian courts could exercise jurisdiction if the impact of the online offense was felt within India, notwithstanding the foreign location of servers or intermediary platforms. Thus, judicial innovation has expanded the interpretation of territoriality, but the lack of explicit statutory guidance continues to leave jurisdictional determinations vulnerable to dispute.

Moreover, cross-border complications exacerbate the problem. Investigations often require access to data held by foreign entities, necessitating mutual legal assistance treaties (MLATs) or international cooperation mechanisms, which are notoriously slow and bureaucratic. The absence of comprehensive multilateral cybercrime treaties further impedes seamless cross-jurisdictional enforcement. Consequently, even when Indian courts assert jurisdiction, effective investigation and prosecution may be stymied by practical enforcement difficulties abroad.

III. Issues of Anonymity and Attribution

An equally formidable obstacle in cybercrime prosecution is the problem of anonymity and attribution. Unlike traditional crimes where perpetrators are physically present and can be directly identified through witnesses or forensic evidence, cyber offenses are often perpetrated behind layers of digital obfuscation. Criminal actors routinely exploit technologies such as Virtual Private Networks (VPNs), proxy servers, encrypted messaging applications, and dark web platforms to conceal their identities and locations. These tools allow offenders to mask their IP addresses, reroute their communications through multiple servers, and encrypt their data flows, thereby frustrating attribution efforts by law enforcement.

The principle of criminal law that guilt must be established beyond reasonable doubt is rendered particularly onerous in such circumstances. Investigators must rely on sophisticated digital forensic techniques, such as metadata analysis, MAC address tracking, blockchain analysis, and sometimes even social engineering methods, to attribute the offense to specific individuals. However, the reliability of such attribution is often challenged in court, especially when multiple users may have access to a device, when devices are compromised by malware, or when evidentiary trails are incomplete.

Furthermore, cybercriminals increasingly operate through decentralized networks and use techniques such as “spoofing” (forging digital identities) or deploying “botnets” (networks of infected devices controlled remotely), further complicating the establishment of direct culpability. The lack of user authentication requirements on many online platforms, combined with the global dispersal of servers, amplifies these difficulties. Consequently, anonymity significantly undermines the effectiveness of prosecution, frequently resulting in cases being dropped or ending in acquittals due to insufficient evidence of identity.

  • Evidentiary Concerns in Cybercrime Cases

The evidentiary challenges associated with cybercrime cases are perhaps the most significant procedural hurdles confronting prosecutors and courts. The admissibility of digital evidence is governed primarily by the Bharatiya Sakshya Adhiniyam, 2023, which mirrors the earlier provisions of Section 65B of the Indian Evidence Act, 1872. Section 63 of the new Adhiniyam mandates that electronic records must be accompanied by a certificate specifying the manner of their production, the particulars of the device involved, and affirming the authenticity of the record. Without strict compliance with these requirements, electronic evidence is rendered inadmissible.

This strict procedural prerequisite was emphatically reaffirmed by the Supreme Court in Anvar P.V. v. P.K. Basheer, where the Court ruled that secondary electronic evidence (such as printouts, CDs, or pen drives containing data) is not admissible unless accompanied by a certificate under Section 65B. The Court rejected earlier practices allowing oral testimony to substitute for formal certification, emphasizing the high standards necessary to guard against manipulation and fabrication of digital evidence. Subsequently, the Supreme Court in Arjun Panditrao Khotkar v. Kailash Kushanrao Gorantyal reiterated the mandatory nature of the Section 65B certificate, clarifying that courts have no discretion to dispense with the requirement, except where the original electronic device itself is produced.

Chain of custody  the continuous documentation of evidence handling  represents another critical evidentiary concern in cybercrime prosecutions. Given the ease with which electronic data can be altered without leaving visible traces, any gaps or inconsistencies in the chain of custody may fatally undermine the probative value of the evidence. Law enforcement agencies must therefore ensure that digital evidence is collected, preserved, stored, and transferred in a manner that demonstrably maintains its originality and integrity. Techniques such as cryptographic hashing (generating a digital fingerprint of data) are increasingly employed to demonstrate that electronic evidence remains unaltered. Nonetheless, judicial scrutiny of chain of custody documentation is often intense, and failures in evidentiary preservation frequently lead to acquittals or the exclusion of critical evidence from trial.

Thus, the evidentiary regime for cybercrime cases demands meticulous procedural compliance and technological sophistication from investigators, prosecutors, and defense attorneys alike. Courts, too, must possess the necessary technical understanding to assess the reliability and authenticity of electronic evidence in an informed and judicious manner. The prosecution of cybercrimes in India operates against a backdrop of complex jurisdictional and procedural challenges that strain traditional legal frameworks. Determining territorial jurisdiction in a borderless digital environment necessitates innovative judicial interpretation and, increasingly, international collaboration. Attribution of cyber offenses to specific individuals is often impeded by sophisticated anonymization technologies and decentralized criminal networks. Meanwhile, the evidentiary standards applicable to digital evidence impose strict procedural requirements that must be scrupulously observed to ensure admissibility and uphold the fairness of criminal trials. Addressing these multifaceted challenges demands not merely incremental legislative reform but also significant investment in cyber forensics capacity, judicial training, and international legal harmonization. Only through such comprehensive efforts can the Indian criminal justice system effectively adapt to the evolving threats posed by cybercrime.

  • Comparative Perspectives

The unique challenges posed by cybercrime have necessitated distinct prosecutorial and legislative responses across different jurisdictions. Comparative analysis reveals that while India continues to grapple with foundational issues of jurisdiction, attribution, and evidentiary admissibility, other jurisdictions, notably the United States and the European Union, have developed more specialized legal and institutional mechanisms to tackle cyber offenses.

In the United States, cybercrime prosecution is governed by a robust combination of federal statutes, including the Computer Fraud and Abuse Act, 1986 (CFAA) and the Electronic Communications Privacy Act, 1986 (ECPA).These laws criminalize unauthorized access to computer systems, identity theft, and electronic surveillance violations. Federal investigative agencies such as the Federal Bureau of Investigation (FBI) and specialized cybercrime task forces possess advanced technological capabilities for detecting, investigating, and prosecuting cyber offenses. The United States also adopts a “long-arm jurisdiction” approach, enabling its courts to assert jurisdiction over offenses with even minimal effects on U.S. territory or citizens. This expansive approach has facilitated the prosecution of foreign actors involved in cyber attacks against American interests, although it has also generated international friction regarding extraterritorial overreach.

The European Union, through instruments such as the General Data Protection Regulation (GDPR) and the Directive on Attacks Against Information Systems (2013/40/EU), has sought to harmonize cybercrime laws across member states while emphasizing strong data protection norms. The European Union Agency for Cybersecurity (ENISA) plays a critical role in supporting member states’ cybersecurity strategies and fostering cross-border coordination. Notably, the European approach places a strong emphasis on fundamental rights, ensuring that measures against cybercrime do not unduly infringe upon privacy and data protection rights.

International cooperation constitutes a vital pillar in global cybercrime prosecution efforts. The Budapest Convention on Cybercrime, 2001, represents the foremost international treaty in this domain, establishing common standards for substantive criminal law, procedural law, and mechanisms of international cooperation.India, although an observer to the Budapest Convention, has not ratified the treaty, citing concerns over its Eurocentric origins and the lack of sufficient

consultation with non-European countries during its drafting. Nonetheless, India’s growing engagement with multilateral cybercrime initiatives reflects an implicit recognition of the necessity for global cooperation. Additionally, Mutual Legal Assistance Treaties (MLATs) serve as crucial tools for transnational evidence gathering, although they are often criticized for their bureaucratic inefficiency and delays, rendering them ill-suited for the fast-paced nature of cyber investigations.

Thus, a comparative perspective underscores that effective cybercrime prosecution demands specialized legal frameworks, technological sophistication, and streamlined international cooperation areas where India must continue to evolve if it is to meet the escalating threat landscape.

VII. Suggestions and Way Forward

Recognizing the gravity and complexity of cybercrime, it is imperative that India undertakes comprehensive reforms to its criminal procedural framework and institutional capacities. First and foremost, the Bharatiya Nagarik Suraksha Sanhita (BNSS) should be amended to include provisions specific to cyber offenses. The current reliance on general procedural rules is ill-equipped to address the technical nuances of cybercrime investigations, such as the need for expedited preservation orders for volatile digital evidence, real-time interception capabilities, and clear guidelines for cross-border data requests. Procedural innovations, including specialized cyber investigation warrants and streamlined jurisdictional provisions, would greatly enhance the efficiency and efficacy of cybercrime prosecution.

Parallelly, it is critical to invest in improving police training and technical expertise. Cybercrime investigations demand a high degree of technical proficiency in areas such as digital forensics, blockchain analysis, dark web investigations, and decryption methodologies. Establishing dedicated cybercrime units at the district, state, and national levels, staffed with trained cyber experts and supported by cutting-edge forensic laboratories, would significantly bolster investigative capabilities. Furthermore, regular training programs for judicial officers are essential to ensure that courts possess the requisite understanding to evaluate digital evidence accurately and to manage complex cybercrime trials effectively.

Strengthening data privacy and protection laws also constitutes an indispensable component of a robust cybercrime framework. The pending enactment of comprehensive data protection legislation, building upon the draft Digital Personal Data Protection Bill, 2023, would not only safeguard individual rights but also enhance public trust in digital governance and facilitate international cooperation, particularly with jurisdictions like the EU that mandate adequacy standards for cross-border data flows. Robust privacy protections serve to legitimize and balance state powers of surveillance and investigation, ensuring that anti-cybercrime measures do not become tools of arbitrary intrusion.

Finally, enhancing cross-border legal cooperation mechanisms is vital. India must accelerate the negotiation of bilateral and multilateral agreements that facilitate real-time information sharing, joint investigations, and evidence collection. Streamlining MLAT processes, joining emerging international frameworks such as the Second Additional Protocol to the Budapest Convention, and actively participating in global cyber diplomacy forums would position India as a proactive and responsible actor in the global fight against cybercrime.

In sum, a holistic approach that combines procedural reform, capacity building, legislative modernization, and international collaboration is indispensable for equipping India’s criminal justice system to meet the demands of the digital age.

Conclusion

The criminal jurisprudence has changed dramatically due to the revolution in cybercrime, which made the conventional lines of investigation, prosecution, and judiciary undergo an entire overhaul of principles. In this paper, it has been clear that although the Indian criminal procedure system, indirectly controlled by the Code of Criminal Procedure, 1973 (CrPC), provides a basic framework for handling offenses, it was not initially suited for the highly technical, borderless, and complex nature of cybercrimes. The investigation process, though facilitated by certain provisions of the law, still encounters significant obstacles in successfully obtaining digital evidence, identifying cyberattacks with specific attackers, and ensuring the integrity of the forensic process. The magistrates’ role in exercising the judicial checks, especially regarding cognizance of offenses under Section 190 CrPC and admissibility of electronic evidence under Section 65B of the Indian Evidence Act, 1872, is critical but requires a greater level of technical appreciation and responsiveness to novel evidentiary models.

Jurisdictional hurdles, driven by the borderless nature of cybercrime, additionally put pressure on the efficacy of the current procedural machinery. The territorial jurisdiction principles under Sections 177 to 179 CrPC, while being theoretically elastic, tend to lack in practice when faced with offenses emanating from foreign jurisdictions or anonymized players acting through virtual private networks, encrypted platforms, and darknet markets. Attribution is a challenging task, being made more difficult by the simplicity with which perpetrators can hide their identities and locations. Moreover, the challenges of evidence linked to gathering, authenticating, and admissibility of digital evidence in courts reflect vital gaps in investigation training, forensic facilities, and judicial sensitization.

Comparative lessons from countries like the United States and the European Union highlight the value of specialized legislation, specialized cybercrime task forces, robust data protection mechanisms, and efficient international cooperation channels. Tools such as the Budapest Convention and Mutual Legal Assistance Treaties (MLATs) illustrate the crucial role of multilateral cooperation in addressing cross-border cyber crimes. India’s tentative approach to these frameworks indicates recognition of the international nature of cyber threats, but also points towards a need for more active and systematic involvement in global legal processes.

In the future, there is a pressing need to overhaul the Indian criminal procedure system to render it sensitive to the dynamics of cybercrime. This involves passing specific procedural provisions that are digital investigation-specific, improving the technical skills of judicial and law enforcement officers, allocating funds for advanced cyber forensic laboratories, and making data privacy laws compatible with international standards to establish trust and collaboration. At the same time, strengthening cross-border judicial cooperation, facilitating MLAT process, and fostering indigenous capacity to attribute and respond to cyber involves are essential in protecting India’s digital sovereignty.

Finally, the successful prosecution of cybercrime requires nothing short of a paradigm shift away from conventional territorial mindsets towards a technologically savvy, globally integrated, and rights-oriented system of criminal procedure. It is only through wide-ranging legal, institutional, and diplomatic changes that India can hope to confront the profound challenges of cybercrime, maintain the rule of law in cyberspace, and deliver justice for victims in a more digitized world.

Referances: 

Bharatiya Nagarik Suraksha Sanhita, No. 45 of 2023, §§ 175, 185, 210, 269, 283, 336 (India).

Information Technology Act, No. 21 of 2000, §§ 67C, 69 (India).

 Bharatiya Sakshya Adhiniyam, No. 46 of 2023, §§ 61, 63 (India).

See Indian Computer Emergency Response Team (CERT-In), Ministry of Electronics and Information Technology, Government of India.

Bharatiya Nagarik Suraksha Sanhita, No. 45 of 2023, §§ 175, 185, 210, 269, 283, 336 (India)

State (NCT of Delhi) v. Navjot Sandhu, (2005) 11 S.C.C. 600 (India).

 Bharatiya Nagarik Suraksha Sanhita, No. 45 of 2023, §§ 177–179 (India).

See generally, National Crime Records Bureau (NCRB), Cyber Crime Report 2022, Ministry of Home Affairs, Government of India.

Convention on Cybercrime, Nov. 23, 2001, E.T.S. No. 185 (Budapest Convention).

Computer Fraud and Abuse Act, 18 U.S.C. § 1030 (United States); Electronic Communications Privacy Act, 18 U.S.C. § 2510 (United States).

Share

Facebook
Twitter
Pinterest
LinkedIn

About Post Author

Law Jurist

lawjurist23@gmail.com
http://lawjurist.com
Happy
Happy
0 0 %
Sad
Sad
0 0 %
Excited
Excited
0 0 %
Sleepy
Sleepy
0 0 %
Angry
Angry
0 0 %
Surprise
Surprise
0 0 %

Recent Posts

  • Regulating Artificial Intelligence in India: Legal Challenges, Developments, And the Way Forward
  • Invisible Harassment of Woman Advocates in India: How Does the Posh Act Fails to Address It?
  • Restitution of Conjugal Rights; A Constitutional Dillema and the Gendered Shadows of Inequality
  • The Bharatiya Nyaya Sanhita, 2023: Transforming Indian Criminal Justice Or Reinventing Old Bottles.
  • The Governor: Between Constitutional Morality and Political Maneuvering

Recent Comments

  1. бнанс зареструватися on (no title)
  2. Binance注册 on (no title)
  3. registro da binance on (no title)
  4. crea un account binance on (no title)
  5. binance anm"alningsbonus on (no title)

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024

Categories

  • About Us
  • Articles
  • Articles
  • Bare Acts
  • Bharatiya Nyaya Sanhita
  • Careers
  • CASE LAWS
  • Companies Act
  • Constitution
  • Constitution Notes
  • Contact Laws
  • Contract Laws
  • Criminal Laws
  • CRPC
  • IBC
  • Internship
  • IPR
  • Law Notes
  • Moot Court
  • Property Law
  • Seminar

Description

Law Jurist is dedicated to transforming legal education and practice. With a vision for change, they foster an inclusive community for law students, lawyers, and advocates. Their mission is to provide tailored resources and guidance, redefining standards through innovation and collaboration. With integrity and transparency, Law Jurist aims to be a trusted partner in every legal journey, committed to continuous improvement. Together, they shape a future where legal minds thrive and redefine impact.

Contact US

Gmail : lawjurist23@gmail.com

Phone : +91 6360756930

Categories

  • About Us
  • Articles
  • Articles
  • Bare Acts
  • Bharatiya Nyaya Sanhita
  • Careers
  • CASE LAWS
  • Companies Act
  • Constitution
  • Constitution Notes
  • Contact Laws
  • Contract Laws
  • Criminal Laws
  • CRPC
  • IBC
  • Internship
  • IPR
  • Law Notes
  • Moot Court
  • Property Law
  • Seminar

Search

No Result
View All Result
  • About Us
  • Bare Act
  • Code of Conduct
  • Contact us
  • Disclaimer Policy
  • Home 1
  • Join Us
  • Legal Documents
  • Our team
  • Policy
  • Privacy
  • Submit Post
  • Website
  • About Us
  • Refund Policy
  • Terms & Condition
  • Policy
  • Submit Post
  • Join Us
  • Media Partnership
  • Advertise
  • Contact us
  • Articles
  • CASE LAWS
  • About Us

Made with ❤ in India. © 2025 -- Law Jurist, All Rights Reserved.

No Result
View All Result
  • About Us
  • Bare Act
  • Code of Conduct
  • Contact us
  • Disclaimer Policy
  • Home 1
  • Join Us
  • Legal Documents
  • Our team
  • Policy
  • Privacy
  • Submit Post
    • Submit-Event/Job/Internship
  • Website
  • About Us
    • Our team
    • Code of Conduct
    • Disclaimer Policy
  • Refund Policy
  • Terms & Condition
  • Policy
    • Privacy
    • Copyright
  • Submit Post
  • Join Us
    • Internship
    • Campus Ambassador
  • Media Partnership
  • Advertise
  • Contact us
  • Articles
  • CASE LAWS
  • About Us

Made with ❤ in India. © 2025 -- Law Jurist, All Rights Reserved.

Welcome Back!

Sign In with Google
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
OR

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In