The Study By Manikant Singh
Search

Addressing New age Technological Governance challenges

  • 0
  • 3023
Font size:
Print

Addressing New age Technological Governance challenges

Context:

The Bharatiya Nyaya Sanhita (BNS ) largely retains the Indian Penal Code (IPC), adding only 19 offences, all drawn from existing legislation. The BNSS and Bhartiya Sakshya Adhiniyam (BSA) introduce minimal new sections, with few changes reflecting societal and technological evolution.

  • In a 21st-century world driven by technology, the internet, and AI, where geopolitical borders are fading and the digital realm is integral to daily life, the BNS falls short.
  • It fails to address critical New Age crimes, leaving gaps in protecting against threats in our increasingly “phygital” (physical plus digital) environment.

 

About New-Age crime:

  • Cyberbullying and Online Harassment: Involves using digital platforms to harass or embarrass others, causing psychological harm. 
    •  The Blue Whale Challenge in 2017 highlighted the dangers of online manipulation, leading to several deaths.
  • Cyberstalking: The use of technology to harass, intimidate, or monitor someone without their consent, including social media stalking, GPS tracking, and catfishing. 
  • Sexting and Non-Consensual Pornography: The sharing of explicit content without consent, often leading to harassment and blackmail. Morphing, altering images to create non-consensual pornographic content, is a severe violation of privacy.
  • Email Phishing and Hacking: Fraudulent emails trick recipients into revealing sensitive information, leading to identity theft and financial fraud. Email hacking involves unauthorised access to accounts, enabling further criminal activities.
  • Online Fraud and Scams: Digital platforms are used for job fraud, matrimonial fraud, and online gambling, where perpetrators manipulate victims to steal money or personal information.
  • Online Trafficking and Deep Fakes: The internet facilitates human trafficking through social media and the dark web. Deep fakes, created using AI, are misused for revenge porn, fraud, and political manipulation.Ethical dimensions involved in new age cyber crimes:
  • Privacy and Data Protection: Cyber crimes violate personal privacy, leading to identity theft and financial fraud. The ethical challenge is balancing technological advancement with individuals’ right to control their personal data.
    • The massive data breach at Equifax in 2017 exposed the personal information of over 147 million people, including names, social security numbers, and credit card details.
    • The $100 million fraud at the Bangladesh Central Bank involved a technological breach of its computer system, with the stolen funds rapidly laundered through the banking system to foreign banks.
  • Consent and Non-Consensual Actions: Non-consensual sharing of intimate images or information, such as in sexting or morphing, raises ethical issues about respecting autonomy and the psychological harm caused to victims.

The Collingridge dilemma, introduced by David Collingridge in his 1980 book The Social Control of Technology, addresses the challenges of regulating emerging technologies. 

  • The dilemma states that it’s difficult to predict the impacts of new technology early in its development, but by the time these impacts become clear, the technology is often too entrenched to be easily changed or controlled.Specifically, the dilemma posits that:
    • Early Regulation: Easier to implement but risks stifling innovation due to incomplete understanding of the technology’s potential.
    • Late Regulation:More informed but challenging to enforce effectively, as the technology may already be deeply integrated into society and the economy.
  • The Trust Deficit in Technology Development
    • The Collingridge dilemma highlights the growing trust gap between technology and society. 
    • A lack of collaboration and communication among developers, policymakers, and stakeholders leads to isolated decision-making, which undermines trust. 
    • Building a more open, collaborative approach could bridge this gap, fostering technology that is accountable, transparent, equitable, and aligned with collective societal interest
  • Examples:
    • Social media: Initial development didn’t anticipate issues like privacy concerns and misinformation spread.
    • Blockchain technology, including cryptocurrencies, has rapidly evolved over the past decade. However, governance and regulation of blockchain have lagged behind due to the initial lack of comprehensive understanding of the technology.
    • Artificial Intelligence:The book life 3.0 presents various future scenarios, ranging from positive outcomes where AI enhances human life to negative possibilities where misaligned AI goals could lead to catastrophic consequences.

  • Accountability and Responsibility: The anonymity of the internet complicates accountability in cyber crimes, raising ethical questions about justice and the effectiveness of legal frameworks in holding perpetrators responsible.
    • In 2019, a hacker known as “John Wick” breached the servers of several Indian government websites, exposing sensitive data.
  • Technological Duality: Technology enables both positive communication and criminal activities. Ethical dilemmas involve the responsibility of tech companies to create secure systems and prevent the misuse of their platforms.
    • WhatsApp’s end-to-end encryption feature, while protecting user privacy, has also been exploited by criminals to spread misinformation and incite violence. 
  • Manipulation and Misinformation: The spread of deep fakes and misinformation undermines public trust and manipulates opinions, posing ethical challenges for content creators and platforms to ensure information accuracy.
    • In 2020, a deep fake video of Prime Minister Narendra Modi endorsing a cryptocurrency scam went viral, causing confusion and eroding public trust.
    • AI-generated fake vocals of well-known singers like Drake and the misuse of deepfake technology to create false voices of celebrities such as Amitabh Bachchan or videos resembling Rashmika Mandanna represent the cutting-edge crimes of our time.
  • Ethical Concerns in Cybercrime Legislation: Addressing Ambiguities and Preventing Misuse
    • When drafting penal laws for cybercrimes, clarity and precision are essential to prevent confusion and misuse. 
    • Provisions in laws like UAPA and BNS introduce terms like “terrorism” and “economic offences” without the protections of their original contexts. 
    • This ambiguity allows for broad discretion by law enforcement, particularly regarding undefined terms like “economic security,” increasing the risk of arbitrary application. Robust safeguards are necessary to protect legitimate business activities and prevent abuse by local authorities.
  • International Cooperation and Governance: Cyber crimes often cross borders, necessitating international cooperation. The ethical challenge is balancing global security efforts with respecting national sovereignty and individual rights.
    • In 2021, a global ransomware attack known as “WannaCry” affected thousands of organisations across 150 countries, including India.

 

Indian legal system to address new-age crimes:

Information Technology Act, 2000

  • Cyber Crimes: The Act defines various cyber crimes, including hacking (Section 66), data theft, and identity theft.
    • Anyone found guilty of hacking may face imprisonment for up to three years, a fine of up to two lakh rupees, or both.
  • Tampering with Computer Source Documents: Section 65 penalises the intentional alteration or destruction of computer source documents, with penalties including imprisonment for up to three years and fines.
  • Data Protection and Privacy: While the IT Act lays the groundwork for data protection, it has been criticised for lacking comprehensive provisions. The upcoming Personal Data Protection Bill aims to address these gaps by establishing robust data protection norms.
  • Key Provisions on Cyber Crimes in the Bharatiya Nyay Sanhita (BNS), 2023
    • Section 303 – Cyber Theft: Addresses theft involving mobile phones, data, or computer hardware/software, providing legal recourse for victims of digital property theft.
    • Section 77 – Voyeurism: Penalises the unauthorised capture or publication of images of a woman’s private parts, emphasising consent and privacy.
    • Section 317 – Possession of Stolen Digital Property: Punishes possession of stolen digital goods, discouraging the market for such items.
    • Section 318 – Cyber Fraud: Targets various forms of online fraud, including password theft and bogus websites, with penalties based on the severity of the offence.
    • Section 336 – Email Spoofing and Online Forgery: Imposes penalties for email spoofing and online forgery, particularly when aimed at damaging reputations.

 

Other Steps taken by Government:

  • Institutional Mechanisms:
    • Indian Computer Emergency Response Team (CERT-In): National agency for cybersecurity incident response
    • Indian Cyber Crime Coordination Centre (I4C) under MHA, coordinating with regulatory bodies like Reserve Bank of India and fintech companies to address cyber frauds. 
    • Cyber Swachhta Kendra: Cyber Swachhta Kendra (CSK) is an initiative launched by the Ministry of Electronics and Information Technology (MeitY) as part of its Digital India program 
      • Key Aspects include Botnet cleaning and Reporting and malware detection and Removal.
  • Specialised Units:
    • Cyber Crime Cells in police departments across states.
    • National Cyber Crime Reporting Portal recognises new-age crimes such as cyberbullying, stalking, sexting, etc., and is designed for citizens to report cybercrimes online

Key Global Efforts in Combating Cybercrime:

  • International Telecommunications Union (ITU):
    • Global Cybersecurity Agenda (GCA): ITU’s GCA promotes international cooperation and helps member states develop effective legal frameworks to combat cybercrime.
  • Budapest Convention on Cybercrime: (India is not a signatory)
    • The Budapest Convention is a criminal justice treaty that aids states in (i) criminalising specific cyberattacks, (ii) providing procedural tools for more effective cybercrime investigations and securing electronic evidence with legal safeguards, and (iii) promoting international police and judicial cooperation on cybercrime and electronic evidence.
  • UNESCO’s Global AI Ethics and Governance Observatory serves as a resource for policymakers, regulators, academics, the private sector, and civil society to address challenges posed by AI. 
    • It highlights countries’ readiness to adopt AI ethically and responsibly and includes an AI Ethics and Governance Lab that collects research, toolkits, and best practices on AI ethics, governance, responsible innovation, and related issues.

Print
Apply What You've Learned.
Prev Post Promote Caste Equality
Next Post SpaceX Falcon 9 Rocket Launches Historic Private Spacewalk Mission