Disclaimer

By clicking, "I Accept" below, you accept and acknowledge the following:

The purpose of this website is to provide general information and insights about TLH, Advocates & Solicitors, and not to advertise or solicit work in any manner whatsoever.

Please note that as per the Bar Council of India Rules, advocates in India are prohibited from advertising or soliciting work in any form or manner. You acknowledge that you are visiting this website at your discretion and that there has been no solicitation, invitation, or inducement of any sort whatsoever from TLH, Advocates & Solicitors or any of its professionals in relation to this website.

The content available on this website does not constitute legal or other professional advice and should not be substituted for advice relevant to particular circumstances.

The access and use of this website does not establish any fiduciary or other relationship between you and TLH, Advocates & Solicitors or any of its advocates.

Please read the ‘Terms of Use’ and our ‘Privacy Policy’ before accessing this website.

Blog default background
Blog
Corporate Law

Darknet & Indian Laws

Authors:
Ranjani Ramesh
August 14, 2020
5 min read
Share this post
Copied!

The darknet is an overlay network within the internet that can be accessed with specific software, configurations, or authorisation[1] and has been in use for over five decades to share encrypted data. This article aims to analyse the effectiveness of the Indian laws, viz., the Information Technology Act, 2000 (“IT Act”), the Indian Telegraph Act, 1885 (“Telegraph Act”), and the Code of Criminal Procedure, 1972 (“CrPC”) in addressing cybercrimes committed over the darknet. 

Brief Background

Darknet’s originations can be traced back to the American military’s desire to protect its telecommunications, leading to invention of public-key encryption in the late 1960s. The anonymity offered by the darknet  is an assurance to whistle-blowers seeking to share information on illegal activities, human rights activists and journalists reporting from countries with oppressive regimes, etc. However, darknet is also susceptible to abuse.  In India, cybercrimes on the darknet emerged on the law enforcement agencies’ (“LEA”) radar only in the recent past, such as trade in illicit media files and contraband drugs, heists, and leaking of personal identification documents stolen from organisations’ databases. Given the shortage of reported judicial precedents on abuse of the darknet, it becomes imperative to analyse the effectiveness of existingIndian laws in this regard.

Analysis of Indian Laws The two ways in which an individual’s illicit activities on the internet may be traced are through the (a) individual’s computing devices and online trails like mailing address; and  (b) servers of the individual’s Internet Service Providers (“ISP”).

Under Section 5 of the Telegraph Act, Central and State Governments are empowered to take temporary possession of a licenced telegraph in circumstances of public emergency or in the interest of public safety, and such telegraph may be intercepted pursuant to a written order by the appropriate authority. While the Telegraph Act does not go into further details, the licence granted to ISPs under  the Telegraph Act casts specific obligations on ISPs. Under a licence agreement, an ISP is expected to, inter alia, make its facilities available for inspection and monitoring by the Government, and provide the identity of its subscriber including his/her geographical location at any given time.

Similarly, under section 69 of the IT Act, the Central and State Governments, pursuant to an order in writing by the appropriate authority, have the right to intercept, monitor, or decrypt or cause to be intercepted or monitored or decrypted any information generated, transmitted, received or stored in any computer resource. Section 69B enables the Government to monitor and collect traffic data or information generated, transmitted, received, or stored in any computer resource. It further requires, inter alia, ISPs to provide technical assistance and extend all facilities to the Government as and when required.

The CrPC confers wide powers to a police officer to summon witnesses (section 160), interrogate (section 161) and compel production of things (section 91). An ISP may be summoned under section 91 of the CrPC, by way of a written order, by a court or a police officer, to produce details regarding a computer suspected to have been used to commit an offence, and its non-compliance would invite charges under the Indian Penal Code.

IP Address, Hidden Exchanges and the Darknet

In their seminal article, Daniel Moore and Thomas Rid (2016)[2] describe the architecture of the darknet as consisting of five fundamental properties: privacy, authentication, anonymity, cryptographic payments, and hidden exchanges. While the first four properties are common features on the internet, it is ‘hidden exchanges’ which is the hallmark characteristic of the darknet.

Hidden exchanges mean that the identity including the Internet Protocol (“IP”) address of (i) an individual either simply browsing through a website on the darknet or buying something in exchange of cryptocurrency, (ii) the individual owning the website and/or selling their goods or services, and often (iii) the server, is untraceable. This is done by ensuring that the websites on the darknet do not correspond to any IP address. In the words of Daniel Moore and Thomas Rid (supra), “this allows circumvention of all known forms of content restrictions or surveillance. Neither the Internet Service Providers (ISPs) that route the traffic, nor law-enforcement agencies, (…) have visibility into the hosted service’s location, or the identity of its operator.” At this juncture, it is necessary to understand the role of an IP address. An IP address is a numeric label, a set of numbers, that is assigned to every device participating on the internet.[3] It serves two functions (a) identification of host or network; and (b) location addressing. The IP address trail is what the LEA rely on while trying to locate a computer. The aforementioned provisions of the Telegraph Act, the IT Act and the CrPC essentially empower the Government/LEA, to obtain a computer’s IP address from an ISP, basis which the agencies may intercept, monitor, collect, and decrypt digital data. However, without an IP address, it is impossible to locate a computer. This is where the problem arises for a crime on the darknet.

Conclusion

By its very nature, the darknet hides the IP address of its users. The powers of the Government/LEA under the Telegraph Act, the IT Act and section 91 of the CrPC are rendered ineffective, as the IP address for a cybercrime is untraceable.

There appears to be no ambiguity in other provisions under the CrPC on jurisdiction and power of criminal courts. Offences will be inquired and tried by the court in whose local jurisdiction suc offences were committed. For example, if the database of an organization in Hyderabad is hacked and its data is released on the darknet, there is no doubt that the first point of contact would be the Telangana Police, and a Magistrate in Hyderabad would take cognizance of the offence.

The need is to expand the existing laws and develop tools to find a way around the IP address. The Bureau of Police Research and Development has recently invited private entities to help develop tools to monitor the darknet for cybercrimes.[4] At the same time, it will be interesting to see how this issue is addressed without stifling the freedom of those who use the darknet for legitimate reasons. Since use of cryptocurrencies is common on the darknet, parallels may be drawn with how restrictions on the use of cryptocurrencies was considered by the Indian Supreme Court which held, inter alia, that measures introduced to control cryptocurrencies must adhere to the doctrine of proportionality[5]. Similarly, any means to address the regulatory vacuum on the darknet must be proportionate to the ends sought to be achieved.

It appears that the settled principles of law under the CrPC do not pose an issue when it comes to cybercrimes on the darknet. However, the  concern is the dependence of the Government/LEA on IP addresses to investigate cybercrimes. In the absence of laws and tools to plug this lacuna, cybercrimes on the darknet will continue to pose a  challenge in India.

The views and opinions expressed in this article belong solely to the author and do not reflect the position of Tatva Legal, Hyderabad.

[1] Gayard, Laurent, Darknet: Geopolitics and Uses Hoboken, page 158, (1st edition, 2018).

[2]Daniel Moore & Thomas Rid (2016) Cryptopolitik and the Darknet, Survival, 58:1, 7-38, DOI: 10.1080/00396338.2016.1142085

[3]Iyengar, Prashant, Online Privacy: IP Addresses and Expeditious Disclosure of Identity in India (2011). http://dx.doi.org/10.2139/ssrn.1875659

[4] F. No. M-12014(02)/1/2019-PSO (E) – Part 2 dated 29.05.2020 issued by the Bureau of Police Research and Development, Ministry of Home Affairs

[5] Internet and Mobile Association of India vs. Reserve Bank of India Writ Petition (2020) SCC Online SC 275

No items found.
cybercrime, darknet, hidden exchanges, IT Act, Telegraph act

Footnotes

Share this post
Copied!

Latest posts

Corporate Law
June 14, 2025
The Finfluencer Effect: Unravelling Market Manipulation
Recently, the Indian stock market regulator, Securities and Exchange Board of India (SEBI) published a discussion paper addressing the growing concern pertaining to financial influencers, or finfluencers, providing financial advice. These influencers often lack the requisite qualifications and accountability for their recommendations.
Read more
Arrow Right
Employment Law
June 14, 2025
Contract Labour Deployment in India - Demystifying the Future Conceived by the Code on Occupational Safety, Health & Working Conditions, 2020
The business of human resource deployment by contractors for their clients has grown and evolved globally. In India, the contractor-sourced industrial workforce grew by about 293% between 2002-03 and 2021-22.[1] Recently, India has unfurled four labour codes that revamp its existing labour laws to meet the needs of the Indian workforce such as contract labour deployment.
Read more
Arrow Right
Corporate Law
June 14, 2025
Exploring Unchartered Territory? Laws for the Void
What can the Indian space sector learn from the Avengers? Besides, the incredible budget and scale, the key takeaway would be - bringing experts together to achieve phenomenal results. We all remember the fascinating back stories, the strength of and the role each member plays to fill an essential need under the able guidance of a strong leader.
Read more
Arrow Right
Corporate Law
June 14, 2025
The 100% FDI Debate: Insurance for All or a Market for Few?
While the Union Budget for Financial Year 2025-26 (���2025 Budget�۝) was successful in drawing attention of the whole nation through the personal tax exemption on incomes up to ��_12 lakh under the new tax regime [1], a critical announcement pertaining to the insurance sector was eclipsed. The 2025 Budget also introduced a key reform to reshape the ownership structure of the Indian insurance industry.
Read more
Arrow Right
Dispute Resolution
June 14, 2025
Right to Speedy Trial and its Application in Cases Involving Economic Offences
This article examines the judicial precedents that paved the way in recognising and upholding the right to a speedy trial as a fundamental right and the recent developments in cases involving economic offences in India wherein bails were granted to accused persons on the ground of the right to a speedy trial.
Read more
Arrow Right
Corporate Law
June 12, 2025
Liability Shift: The Impact of RBI’s Directive on PE/VC Appointed Observers in the Board of NBFCs
The article explores the regulatory implications of RBI's recent directive and its potential impact on private equity and venture capital-appointed board observers in NBFCs — a timely and significant development for the financial sector.
Read more
Arrow Right
View All Blogs
Arrow Right