International Perspective of Cyber Crime: Chapter-V
International Perspective of Cyber Crime: Chapter-V
Cyber crime is not a national problem but it is a problem found all over the
world. The international access to information and mobility of data is one of the most
important functions of world economic system. One of the peculiar characters of the
cyber crime is that its impact is very wider than the conventional crime .A criminal
act committed in one part of the world may cause impact at some other part of the
world. In view of reach of the cyber crime, entire world has virtually turned in to a
small village. Another feature is that the criminalization increase in the cyber crime is
uniform all around the world. The basic problem in the implementations of the cyber
crime in the global perspective is that the act is crime in one country and not crime in
another country , that create the basic problem, the same problem was faced in the
famous case of ‘love bug” case where in the citizen of the Philippines cannot be
convicted. Now the enactment of the cyber law has resolve the said problem, now any
126
person who committee crime anywhere and damage the computer of any counters, he
can be held liable to the offence.
Since impact of cyber crime is unbounded, any effort made at national level
have to meet international coverage of sake of effective containment of cyber crime
and protecting the interest of the society. Such situation necessitates understanding of
global legal response relating to the cyber crime. The discoveries and the inventions
both constructive and destructive are very rapid all around the world. In absence of
international cooperation, it will not be possible for any country to know the recent
advances in the other country. A country victim of any kind of latest cyber crime
shall have the opportunity to intimate other countries in time so that it may plan its
defense well in advance83.Therefore the international communication and cooperation
for the effective cyber law is necessary, for effective operation against cyber crime.
Considering the nature of cyber crime, international community has tried to bring the
international cooperation in the implementation of cyber law’s various convention
takes place to deals with the cyber crime.
The legal responses to the cyber crime of various countries of the world are
varied. Such laws are still under its gestation period. There is not even a single law
83
Laws on Cyber Crime: P .K. Singh, (2007) Book Enclave, Jaipur, Page 178.
127
that can state to contain all necessary attributes of modern cyber legislation. For
example, unsolicited calls by telemarketers and others are supposed to be an
infringement upon the right of privacy and liberty of a person, but no provision for
such act is available under the IT Act and rules. However, USA has implemented
special laws for the purpose about 13 years ago and several European countries
follows the model to provide the safeguard to consumer from being harassed by cell
phone companies and telemarketers. Due to immediate need to control the cyber
crime, various countries have enacted the laws as following.
United Kingdom is world’s first country, which initiate the legislation in the
field of Cyber world. The United Kingdom has enacted ‘The Computer Misuse Act,
1990 which content the penal provisions for cyber crimes. The country thereafter
enacted ‘Regulation of Investigatory powers Act 2000’ Austria thereafter took steps
in the field and amended its existing law through the enactment of ‘Cyber Crime Act
2001’ to check cyber crimes. Belgium also amended existing law in November 2000
and made computer forgery, sabotage, computer fraud and hacking criminal offences.
China also enacted ‘Computer Information Network and Internet Security Protection
and Management Regulation, 1997’ to regulate internet activities, but major stress
was on the national security rather than prevention of cyber crimes. Criminal code of
Estonia contains certain provisions governing cyber crimes.
1) USA
128
going to use for commercial purpose, but it is going to misuse for the other purposes.
In Twenty First century, the criminals rely on the internet and advanced technology,
to extent their criminal activities, these criminals can easily use the internet to carry
out traditional crimes such as distributing illicit drugs and sex trafficking. In addition,
they exploit the digital world to facilitate crimes that are often technology driven,
including identity theft, payment card fraud, and intellectual property theft.
Cybercrimes have economic, public health, and national security implications, among
others. For over three decades, Congress has been concerned about cybercrime and its
related threats. Today, these concerns often arise among a larger discussion
surrounding the federal government’s role in ensuring US cyber security.84
US legal system has enacted various laws regarding cyber crime, because
more than 60 % of the sites on the World Wide Web are located in the USA. To curb
the menace of hacking the US Government has enacted various stringent legislations.
The Wire Fraud statute being the first law used to prosecute computer criminals in
USA. It was seen that the communication wires were used in international commerce
to commit fraud.
The Computer Fraud and Abuse Act, deals with the issue of unauthorized
access in the U S legal system. The legislation was first enacted in 1984, revised in
85
1994, and last amended made in late 1996. Thus, USA has passed several
enactments, which cover various aspect of cyber crime. The States of USA also pass
various federal laws for the protection of cyber crime. These Federal Acts, however
either are to introduced or amend existing provisions in U.S. Federal Code. The
major provisions of U.S. codes governing criminal activities can broadly discussed in
the following heads:
a) Copyright Offences
c) Trademark offences
84
Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement. Kristin M. Finklea
Specialist in Domestic Security. January 9, 2013
85
Cyber Crimes: Law and Policy perspective: Dr.K.S.Manikyam (2009) Hind Law House, Pune. Edi
Page 56.
129
d) Bootlegging offences
3. Cyber Stalking
The United States does not have a national strategy exclusively focused on
combating Cyber crime. Rather, there are other, broader strategies that have cyber
crime components, Policy makers may question whether there Should be a distinct
strategy for combating cybercrime or whether efforts to control these crimes are best
addressed through more wide-ranging strategies such as those targeting cyber security
or transnational organized crime. Congress may also question whether these broader
strategies provide specific cybercrime-related objectives and clear means to achieve
these goals.
130
Comprehensive data on cyber crime incidents and their impact are not
available, and without exact numbers on the current scope and prevalence of
cybercrime, it is difficult to evaluate the magnitude of the threats posed by cyber
criminals. There are a number of issues that have prevented the accurate measurement
and tracking of cybercrime. For one, the lack of a clear sense of what constitutes
cybercrime presents a barrier to tracking inclusive cybercrime data. Additionally,
much of the available data on cyber crime are self-reported, and individuals or
organizations may not realize a cyber crime has taken place or may elect for a host of
reasons not to report it. Policymakers may debate whether to direct a thorough
evaluation of the threats posed by cyber criminals.
The Counterfeit Access Device and Computer Fraud and Abuse Act of 1984
prohibits various attacks on federal computer systems and on those used by banks and
in interstate and foreign commerce.
The Paperwork Reduction Act of 1995 gave the Office of Management and
Budget (OMB) responsibility for developing cyber security policies. The Clinger-
Cohen Act of 1996 made agency heads responsible for ensuring the adequacy of
agency information-security policies and procedures, established the chief
information officer (CIO) position in agencies, and gave the Secretary of Commerce
authority to make promulgated security standards mandatory.
131
The Homeland Security Act of 2002 (HSA) gave the Department of Homeland
Security (DHS) some cyber security responsibilities in addition to those implied by its
general responsibilities for homeland security and critical infrastructure. The Cyber
Security Research and Development Act, also enacted in 2002, established research
responsibilities in cyber security for the National Science Foundation (NSF) and
NIST. The E-Government Act of 2002 serves as the primary legislative vehicle to
guide federal IT management and initiatives to make information and services
available online, and includes various cyber security requirements.
The Federal Information Security Management Act of 2002 (FISMA) clarified
and strengthened NIST and agency cyber security responsibilities, established a
central federal incident center, and made OMB, rather than the Secretary of
Commerce, responsible for promulgating federal cyber security standards. More than
40 other laws identified by CRS also have provisions relating to cyber security.
Revisions too many of those laws have been proposed. Many cyber security bills and
resolutions have been introduced in the last three Congresses, more than a dozen in
the 113th Congress, over 40 in the 112th, and more than 60 in the 111th. Several have
proposed revisions to current laws, and several received committee or floor action, but
none have become law. In fact, no comprehensive cyber security legislation has been
enacted since 2002.
Being a developed country in the world and mostly creator of 60% percent
world wide web USA has enacted a effective cyber law and the protection of
computer and data is going to protected in effective manner in USA. Due to the
development and experts, the USA has guiding the various countries in the world
regarding the cyber crime and its investigation.
Anti Spam Laws
United States has a specific CAN-Spam Act 2003, which came into force in
January 2004. Major provisions are:
132
Penalties include fine up to USD 11000 and also imprisonment in specific
circumstances.86
2) U.K.
United Kingdom has passed various legislations to deals with cyber crimes
and to regulate the transactions on cyber space. Until the Computer Misuse Act, 1990
was passed, offenders would have been charged under Section 13 of the Theft Act
which deals with, stealing electricity. However, the execution of this Act while
dealing with cyber crime was not possible. Therefore the special Act was passed in
1990 which deals with the computer and its misuse, along with this Regulation of
Investigatory Power Act, 2000 was also passed by U.K.87
The Computer Misuse Act 1990, 'an Act to make provision for securing
computer material against unauthorized access or modification; and for connected
purposes', set out three computer misuse offences.
The maximum prison sentences specified by the act for each offence were six
months and five years respectively (Amendments to the Computer Misuse Act,
introduced in the Police and Justice Act 2006, are discussed below).
86
Curbing Cyber Crime: A Critique of Information technology Act 2000 and IT Act Amendment 2008,
Sanjay Pandey
87
http://securelist.com/analysis/publications/36253/cybercrime-and-the-law-a-review-of-uk-computer-
crime-legislation/ last access on dated 27/01/16 at 6.00 pm
133
The first prosecution of an individual for distributing a computer virus came in
1995. Christopher Pile, aka 'the Black Baron' pleaded guilty to eleven charges under
sections 2 and 3 of the Computer Misuse Act and received the 18 months prison
sentence. Pile created the viruses Pathogen and Queeg, both pieces of malware
implemented his SMEG (Simulated Metamorphic Encryption Generator) polymorphic
engine, making them hard to detect, and both were designed to trash substantial
portions of a victim's hard drive. He planted the viruses on bulletin boards disguised
as games and, in one case, as an anti-virus program. It was estimated that the viruses
caused damage amounting to £1 million (The Independent, 16 November 1995).
Another significant conviction under the act was that of Simon Vallor. He
pleaded guilty to creating and distributing the mass-mailing worms Gokar, Redesi and
Admirer, offences covered by section 3 of the Computer Misuse Act. In January 2003
he received a two year prison sentence. It was estimated that his worms spread to
27,000 computers in 42 countries88
The British Police and Justice (2006) bill was granted Royal Assent this week
with some interesting changes being introduced to the Computer Misuse Act (1990)
under Part 5 (Miscellaneous) which could have serious implications for those on the
murkier side of computing. The Computer Misuse Act obviously needed updating, as
most of the threats in existence today were not possible 16 years ago.
88
Cybercrime and the law: a review of UK computer crime legislation By David Emm
134
An interesting insertion is section 3 A, “Making, supplying or obtaining
articles for use in offence under section 1 or 3”.
(2) A person is guilty of an offence if he obtains any article with a view to its
being supplied for use to commit, or to assist in the commission of, an offence
under section 1 or 3.
(3) In this section “article” includes any program or data held in electronic form.
Therefore, those supplying the means by which to carry out any malicious
attack will also be liable although the maximum term for doing so is 2 years
rather than 10. It will be interesting to see how these new laws are enforced
will soon be able to have vendors supplying mod-chips convicted.89
3) Australia
Australia has enacted the cyber Crime Act, 2001 with a view to amend the
existing law of land relating to computer offences. The Act which were amended by
cyber crime Act are : Australian Security Intelligence Act Organization Act, 1979,
Crimes Act 1914, Criminal code Act 1995, Education Services for the Overseas
students Act 2000, and Telecommunications (Interception) Act 1997, The Act of 2001
has repealed the part VI of the crimes Act 1994 in order to add computer offences in
its schedule. According to the provision of the schedule, the term “access to data of a
computer”, means
(i) the display of the data by the computer or by any other output of the data from
the computer;
(ii) the coping or moving of data to any other place in the computer or top the
data storage devices;
89
http://www.techrepublic.com/blog/data-center/uk-cyber-crime-laws-updated/ last access on dated
5/02/2016 at 8.30 am.
135
(iii) the execution of the program.
The offences as like authorized access with intent to commit any serious
offence is made punishable up to the life imprisonment. 90
Australia's new cybercrime law, which came into force on 1 March 2013,
establishes the legislative framework for Australia's accession to the Council of
Europe Convention on Cybercrime (Convention). The cybercrime law has been
effected by the amendment of a number of existing Commonwealth statutes, including
the Mutual Assistance in Criminal Matters Act 1987, the Criminal Code Act 1995, the
Telecommunications (Interception and Access) Act 1979 and the
Telecommunications Act 1997 .
90
Law on cyber crime: P.K.Singh (2007) Book Enclave,Jaipur Page 84.
91
http://www.minterellison.com/publications/cybercrime-privacy-update-201305 last access on dated
18/09/15 at 9.30 am.
136
Australia with organizations, public agencies and corporations in protecting their
online safety while respecting the privacy of other online users. Furthermore, the
Statement also lays stress on the international cooperation in cracking down and
controlling transnational cybercrimes with Australia’s vigorous participation.
a) “for all Australians to know about the security threats to our computers, to
know how to secure our computers, and to know how to help protect our
identities, privacy and finances online”;
c) “for the Australian government to make sure its computer systems are secure
and resilient” (Attorney-General’s Department, 2013a).
137
Cybercrime. As stipulated in the Act, when foreign agencies are requesting the
cooperation from the Australian Federal Police in accordance with the sections, “the
Australian Federal Police must give the carrier concerned a written notice (a foreign
preservation notice) which requires the carrier to preserve all stored communications
related” (Australian Government Com Law, 2013c). Furthermore, greater authority
has been given to federal or state authorities in their access to stored communications.
Some particular authorities or the Australian Federal Police are permitted to represent
some foreign countries in accessing the information required. And the access could be
granted even before a lawful warrant is approved. As it usually takes a rather long
time to obtain the approved warrant, the information and data critical to the
investigation and prosecution might have been destroyed. These new provisions in
the Cybercrime Legislation Amendment Act 2012 help preserve the necessary and
important evidence before the warrant is granted to the agencies concerned.92
4) Belgium
Belgium is another country, which has, prepared the effective cyber crime, in
the year 2000. The Belgium Parliament enacted new provisions in Criminal Code in
November 2000 in order to make computer forgery, computer fraud and sabotage
criminal offences. The section 550 (b) of the criminal Code specify the computer
crime as, “Any person, who is unauthorized to make an access or maintains his
access to a computer system, may be sentenced to a term of three months to one year
imprisonment and fine”.93.This section provide sub clauses (a) to (g) and different
punishments are provided in the said section.
The section contended that when the offence is committed with intention to
defraud, the term of imprisonment be extended up to 2 years. Thus, the small country
like Belgium has enacted the cyber law.
92
Australia’s Policies and Practices in Combating Cybercrime Submitted by Jiang Lin and Hu Zi, May,
2013.
93
Law on cyber crime: P.K.Singh(2007) Book Enclave,Jaipur Page 86.
138
Comparison with the UK Data Protection Act:
The comparison between the law of developed countries and Indian law gives
a clear picture that the Indian laws need to be analyzed and reviewed in order to
maintain law and regulations. It is clear that UK has its Data Protection Act of 1998
wherein the Act is designed to provide protection and privacy to the personal data of
the individuals residing in UK.
According to the Data Protection Act, the people and Organizations involved
in storing personal data should register with the information commissioner, who is
been appointed by the government as an official of the government in order to keep a
check on the rules and regulations provided by the Act. The Act has certain restriction
in the collection of personal data. Any personal data can be demanded only for one or
more lawful purposes and cannot be further processed or used apart from the
task/tasks that it was needed for. The personal data should not be excessive and
should be relevant and correct and adequate for the purpose/purposes it is needed and
to be processed.
It is quite evident that the European Union and U.S try to protect the Personal
data of their citizens as the Data Protection Act is much sophisticated and moreover
they keep on trying to enhance their system. Though US has a different methodology
from what the European Union follows for the Data Protection and Privacy.
94
112206-7474 IJECS-IJENS © December 2011 IJENS
139
5.2 Comparison of cyber crime in India and USA
Every year, cyber crime in India is going up by 50 per cent and during the last
five years, around 9,000 Indian websites including those of various government
departments were hacked. Many government websites, some of them carrying
sensitive information have become victims of cross-border hacking, mainly from
Pakistan, Bangladesh, Nepal and China. As per IC3’s annual report 2012, India,
ranked among the top five nations for the maximum complaint of cyber crime and it
ranked 6th in terms of complainant loss to the tune of $3,740,736.53. Information and
Cyber insecurity has been ranked at third position in India Risk Survey 2013 to which
companies are most vulnerable. According to Norton cyber crime report 2012, a
global financial loss of up to $110 billion occurred due to cyber crime. The report also
reveals that 66 per cent of Indian online adults have been victims of cyber crime in
their lifetime. In the past 12 months, 56 per cent of online adults in India have
experienced it (a little over 115,000 daily victims or 80 per minute). In India, one in
three online adults (32 per cent) has been a victim of either social or mobile cyber
crime in last 12 months, and 51 per cent of social network users have been victims of
social cyber crime. The report says most internet users take basic steps to protect
themselves and their personal information. These include deleting suspicious emails
and being careful with their personal details online. However, other core precautions
are being ignored. For instance, 25 per cent don't use complex passwords or change
their passwords frequently. And, 38 per cent do not check for the padlock symbol in
the browser before entering sensitive personal information, such as banking details,
online. Well over half of online adults in India report having been notified to change
their password for a compromised email account. Close to 42 million people in India
were hit by cyber crime attacks in the past 12 months, causing an approximate loss of
$8 billion (INR 44,500 Crore). The average direct financial cost per victim is $192, up
18 per cent over 2011 ($163).
In India, Cybercrime cases are registered under Indian Penal Code (IPC) and
under Information Technology Act (IT-Act). The IT Act was enacted in year 2000
and later amended in 2008. During year 2005, 302 persons were booked under IPC
and 179 under IT Act, while in year 2012, 2876 persons were charged under IT Act
and 601 persons were charged under IPC. It shows awareness of IT Act among police
personnel. It is also observed that in year 2012, a total of 2064 persons were arrested
140
in Cybercrime cases and out of these, 1176 arrested persons were between age group
of 18-30 year. In year 2011, a total of 1630 persons were arrested, out of these, 883
persons were of age group 18-30 year of age. A graphical representation of the
statistics is shown in Figure-1 and Figure-2.
141
(Figure-1)
142
(Figure-2)
143
5.2.1 Comparative analysis of Specific Cyber Crimes
Every develop country in the world has prepare the cyber law to regulate the
cyber space and the cyber crime. There are certain cyber crimes, which are common
in every corner of the world, though the territorial aspect in cyber crime offences has
recognized as a transnational, but the similar or rather same cyber crime treated
differently in different two countries, this make difficult to buildup cooperation
among the Nations at international level. As the world is global village, then use of
the computer and internet is quite similar specially for committing the crime. Though
the manner and modes to misuse the computer is different, but the object and main
aim is similar.
The similarity in the object is there because the offences in cyber world are
rather offences against the property or against the privacy. Every legal system has
recognized the right of privacy in their respective countries. As well as the right of
property is also recognized inherited rights of the human being in the world, and it is
internationally recognized in every country. The various cyber crimes which are know
by different names are nothing but similar act against right of privacy and against the
property. The pits and pills of information stored in cyberspace come up as a new
wealth targeted by the cyber crime criminals. The cyber criminals has a lust for the
data storage and use all illegal ways to either temper with it, or to destroy it
completely which give new dimension to the traditional crime of mischief.95 This new
dimension of conventional crime is going to commit by using new technology. This
new techniques bring new cluster to which is unheard up to it. It is only new
dimension, but the base of the crime is same.
The cyber world recognized two kinds of offences, which is known as pure
cyber crime. That is vandalizing digital information and security related offences.
These two offences are nothing but against the property and the privacy. In the
vandalizing digital information means hacking or viruses, worms. These acts destroy
or damage the intellectual property or the important data. The Security related crime
means violating individual privacy as like the cyber defamation. The cyber law of
different countries deals differently with this act. Hacking, stalking, cyber defamation
or tampering with the computer sources are the common offences, which are going to,
95
Cybercrime : Talat Fatima (2011), Eastern Boo Company Lucknow, Page 192.
144
committed in every corner of the world. All legal system has enacted the different
laws to prohibit these offences.
There are various offences, which are common and prohibited in almost all the
legal system. However, the different Laws and policies are recognized in every
country. Therefore, it makes a great impact on the execution of the cyber laws. For
example, information vandalism is the common problem in the cyber world, and
various countries laws deals with problem as following:
So far, the vandalism is concern, these three legal systems of USA, UK and
India has provided different legal attitude. The first legal response comes from the US
congress, by passing the Computer Fraud and Abuse Act in 1986, it attempt to
prohibit and penalized the culprit. The object of this statute is to protect the Federal
Government as well as financial and medical institute computer. The data in such
institutes computers are important and is property of governments and the concern
institute. Thought the main object is to protect the data, impliedly it is protection of
the intellectual property of the Federal Government and medical institute. Section 130
(a) (5) (A) of the Said Act prohibits the transmission of, “a program, information,
code or command to a computer or computer system’ with intent to damage, or cause
145
damage to or to withhold or deny the use of computer, a computer service or network,
information data or program. Such transmission is also prohibited if done with
reckless disregard of a substantial and unjustifiable risk of the same effects.”
Thus, the wording of this section provides that the act intentionally is an
offence. The word recklessness is use in the said section. The section provides that
when any program or transmit any program which destroy the data. The Section not
use the particular name of the virus and that is necessary because there are various
programs or kinds of viruses, and it is not statistics, it changes with the time. So any
program that is virus or worms, which destroy the program or any data in the
computer, is offence and made punishable according to this Act. US is the country,
which is facing the problem of virus and vandalism due to which huge economic loss
is sustain in commercial institute of country. Therefore, the US legal system firstly
prohibit such kind of act by enacting the Law in such matter.
UK has recently enacted a special statute relating to this, but before the
specific cyber law regarding the vandalism, the conventional criminal law of UK is
dealing with such kind of act successfully. The Criminal Damage Act, 1972 deals
with offences and penalties regarding the damages to the tangible property, but the
same Act successfully interpreted in case of unauthorized deletion and modification
of computer-based information. In the year 1986,in one of the landmark judgment
,”Cox v. Riley” 96 where the accuse, an employee deleted program from a Plastic
Circuit card that was required to operate a computerizes saw and the court regarding it
as a damage to the value and usefulness of the card, held the accuse liable. But while
dealing with such offences the technical problem arose, because this Act deals with
damage to the tangible property. The court rightly interpreted that the property though
require tangible, not the loss is to be tangible. Considering this technical aspect the
legal system pass a special Act dealing with such kind of issue, that is known as The
Computer Misuse Act 1990.
Computer Misuse Act, 1990 content special provisions to deal with the
menace of the viruses and worms, Section 3 deals with the situation under the name
of, “unauthorized modification” of computer material. It is recognized as a substantial
offence it contents as:
96
(1986) 83 Cri. App..R 54
146
Sec.3(1): A person is guilty of an offence if,
(a) He does any act which cause an authorised modification of the content
of the computer ;and
(b) At the time when he does the act he has the require intent and the
requisite knowledge.
Thus, the special provision in UK deals with the vandalism. The Act comes in
to existence to prevent the huge loss due to virus distribution. The present law is very
much suitable to protect from such kind of vandalism in the UK. This act and
specially Section 3 deals with the offence of mischief, only the nature of the property
has differently recognized in the said Act. Prior to the said enactment the law never
make different between the tenable and intangible though the previous law use the
word tangible. To resolve the dispute of the kinds of the property the special law is
enacted by the UK government but the object of the law is one and same as like the
conventional laws dealing with the offences regarding property and mischief of it.
The Indian legal system also facing the same problem due to development in
the information technology, being a developing nation computer and internet is
important part of various transactions and the official working. Therefore, while
passing the Information Technology Act, 2000, Section 43 of the Act specially deals
with the virus. The IT Act section 43 deals with vandalism but in comparison with the
U K and USA, the Indian law is much lenient because it merely impose the pecuniary
liability on the person responsible to vandalism. Section 43(c) of the IT Acts says,
Thus, the different three countries and the different Cyber laws deals
differently with the vandalism. The Indian legal systems conventional law that is
97
Information Technology Act, 2000
147
Indian Penal Code deals with the vandalism. It is nothing but offence of mischief as
define in section 425 of the IPC. The offence of mischief as defined in section 425
IPC corresponds to what is designated under the English law as the malicious injury
to the property, in which malice is presumed by the nature of the act and its illegality.
The section is based on the principle enumerated in the maxim, ‘Sin uter tuo ut
allenum no leads’ namely use your own property so as not to injure your neighbor’s
property.98 This offence of mischief is having same ingredients and therefore before
the specific cyber laws, it is perfectly applicable to the offence of any kind of
vandalism.
Vandalism is not only destruction of the cyber or related property but any
change in the said property which reduce its value is also include the same offence.
The offence of mischief is also same. To constitute mischief it is necessary not only
that wrongful loss or damage to the public, or to any person be intended or be likely,
but also that any property be destroyed or any such change should occur in any
property or in the situation thereof that destroys or diminishes its value or utility or
affect it injuriously. Thus the vandalism and mischief is same and the different
countries provides different laws and punishments and fine differently.
98
Indian Penal Code, K.D. Gaur (2011), Universal Law Publication Co. New Delhi. Page 287
148