The digital age, characterized by unprecedented technological advancements and
connectivity, has revolutionized the way individuals, businesses, and
governments operate. However, this transformation has also given rise to a new
and pervasive threat: cybercrime. Cybercrime encompasses a wide array of illegal
activities conducted through digital means, including identity theft, ransomware
attacks, hacking, online fraud, and cyberterrorism. As society becomes
increasingly reliant on digital infrastructure, the impact of cybercrime has
grown exponentially, posing significant challenges to economic stability,
national security, and personal privacy.
This paper explores the multifaceted role of cybercrime in the digital age,
examining its evolution, the various forms it takes, and its far-reaching
consequences. It delves into the economic and social impact of cybercrime,
highlighting the substantial financial losses and the erosion of public trust in
digital systems. Furthermore, the paper discusses the global nature of
cybercrime, emphasizing the difficulties in international law enforcement and
the need for cross-border cooperation.
In response to the growing threat, the
article also addresses the innovations in cyber-security that have been driven
by the need to protect against increasingly sophisticated cyberattacks. It
considers the delicate balance between cyber-security and privacy, and the role
of governments, organizations, and individuals in safeguarding digital
environments. Finally, the paper provides insights into the future of cybercrime,
exploring emerging trends and the ongoing efforts to mitigate the risks posed by
this ever-evolving threat.
By analyzing the role of cybercrime in the digital age, this study underscores
the critical importance of vigilance, innovation, and collaboration in the
ongoing battle to secure the digital world.
Introduction
Crime is close sibling of human society; both grew together in the backyard of
civilization and evolved progressively. They could never be able to ignore each
other. Digital crimes have become increasingly prevalent in our digital age.
These crimes involve the use of technology to commit unlawful acts, such as
stealing personal information, cyberbullying, hacking, phishing, and spreading
malware, among others. Digital crimes are constantly evolving and becoming more
sophisticated, making them more challenging to detect and prevent.
On the other hand, real crimes refer to traditional forms of criminal activity,
such as theft, fraud, and assault, which occur in the physical world. Unlike
digital crimes, real crimes have been around for centuries and have established
legal frameworks for investigation and prosecution. However, the line between
digital crimes and real crimes is becoming blurred, with many digital crimes
resulting in physical harm or financial loss. For instance, online harassment
can lead to depression and anxiety, while financial fraud can cause severe
financial hardship[1].
The world's first computer developed in the 1940s came with advanced digital
functionalities. However, as it was hardly accessible to a few people,
cyberattacking was almost impossible but with the rapid advancement in
digitalization and technology, countries are moving towards digitizing their
economies. For example, India has taken an initiative known as Digital India on
July 1st, 2015. This initiative's goal is to establish a knowledge economy and
digitally empowered society throughout the nation. Due to that, there has been
significant improvement in society, now the digital world can be explored even
on mobile devices. As a result, most of the population is enabled access to the
digital world.
These types of practices have transformed the state of society
from traditional towards an informational state during the time of the digital
economy, in which digital information occupies a fundamental cornerstone and
primary need for the digital society. Digital information relies upon extensive
use of the internet through computers, mobile phones, and other such tools in
society. It is aimed at providing fast, accurate, and safe communication and
data processing between various locations. The Digital India project has made
alternative uses of the latest modern tools, like BHIM, Telemedicine, and Digi
Locker, which become pretty necessary in building up the digital society[2].
The arrival of the digital age has provided human beings with a much more
efficient and easier way of living. With such features, the progress of the
number of illegal activities also rises and the most common criminal activity
associated with this field is cybercrime. Under the name of cybercrime, people
try to obtain sensitive data, disrupt services, frauds, forgeries, and many more
things that provide them either personal benefit or financial gain. As concluded
from most scenarios, the motive is inclined more towards financial gain; this is
achieved when sensitive information is obtained, financial data is gathered, or
even intellectual property is stolen, which, in turn, is sold in the dark market
to earn profit. Since digital world has ruled all sectors and all information
about any individual, all private entities as well as all government entities
are available online, the threat of cyberattack is very high.
Therefore, in the current scenario, cybercrime has become a serious risk to
every country's national security. According to NCRB data, the incidence of
cybercrimes has increased from 52,974 in 2021 to 65,893 in 2022, an upraise of
24.4 percent over the corresponding period of the previous year. Recent
statistics from NCRB show a sharp rise in cybercrimes in urban cities. Experts
attribute the same to fast-growing internet and mobile usage. Knowing the nature
of the cyber threat in its entirety is becoming essential for modern
governments, along with practical ways to safeguard information and data[3].
Therefore, it is crucial to recognize the severity and implications of digital
crimes and take them just as seriously as real crimes. Law enforcement agencies,
organizations, and individuals must take proactive steps to prevent digital
crimes from occurring, and ensure that the perpetrators are brought to justice.
While digital crimes and real crimes have different characteristics and legal
frameworks, it is essential to view them as interconnected and tackle them with
equal vigor. A comprehensive understanding of digital crimes and real crimes is
necessary to formulate effective strategies for prevention, investigation, and
prosecution of cybercrime.
Evolution Of Cyber-Crime:
Human civilization came a long way from abacus to modern high speed computers.
This transition is one of the crucial developments witnessed by humanity because
it has changed the ways of living and except select few remotely located people,
it has affected everybody's life. Although this transition took its time and it
was long enough to make evolution in cyber-crimes quite visible. Cyber criminals
evolved with time, they changed their strategies in consonance with advancement
in technology to commit cyber-crimes.
The technically skilled criminals prefer
to work in cyber space because there's not much physical exertion involved and
seemingly cyber-crimes yield maximum financial rewards with minimal risk of
being caught, given the anonymity factor involved in cyber-crimes. The cyber
criminals have made use of developing or developed nation's propaganda of
computerization as means for sustainable growth for the country. In past few
decades, there has been a continuous upsurge in recorded number cyber-crimes
across the world.
The more people are connected to the e-world networking, the
more are chances of victimization from malwares, viruses and phishing. There has
been very little work done at the international level to ascertain the country
trends of cyber-crimes[4].
The history of cyber-crime would be incomplete if the story of evolution of
cyber laws with be missed. Interestingly, when cyber-crimes were emerging and
causing unprecedented losses, legislation was stunned and silent to curb this
menace. Over time, legislation reformed/amended itself to incorporate new forms
of cyber-crimes but it was always a step behind emerging form of crime in cyber
space. It was not only the legislation was catching up with volatile nature of
cyber-crime evolution but even law enforcement was struggling to match up with
the pace of cyber criminals driven by technical knowledge. In an interesting
case of cyber-crime against government, police used an age old technique to
catch an advanced offender.
In 1986, Markus Hess a hacker from West Germany was
stealing military information from Lawrence Berkeley National Lab (LBNL) and
selling it to the KGB. On noticing irregularity in data by Clifford Stol, System
Administrator at LBNL, Stoll used 'honey pot tactic' to lure back hacker to
steal more data. Stoll tracked the hacker to its source and arrested Markus Hess
and his team from West Germany.
Seeing in upsurge in cases of hacking, the first hacking related Act was passed
in 1986 by the US Congress after a computer virus named Morris Worm, created by
a Cornell University Student by the name Robert Morris. The worm infected more
than 6000 computers and people lost Rupees 635 Crore. In recent times, there
were many such similar computer viruses that inflicted huge financial losses to
corporate houses, government or citizens across the globe.
Historically, the kind of computer usage also posed subsequent threats to
internet users. Briefly, looking at the past, 60's was the era when military and
scientific institutions used internet for efficiency enhancement and that made
sensitive data vulnerable to hackers. The time of 70's was an era of
cyber-crimes targeted towards illicit financial gains through hacking in
economic institutions (banks and industries).
During 80's and 90's, privacy and
security issues came to fore, such as child pornography and extremism took hold
of world's attention. Subsequently since 60's to 90's, computer viruses began to
evolve and break in new security firewalls from varied sources in order to
destabilize governance or maybe causing chaos/damage/losses.
Types Of Cyber-Crime:
- Hacking:
The term hacking is derived from the illegal practices performed by a hacker intending to take control or gain access to someone else's computer network system. The majority of the motivation for hacking is either to collect valuable data or damage the system. A person who has a profound knowledge of information computer systems can be termed a hacker. They have all the tools and software used in identifying and exploiting the vulnerabilities that may be used as an entrance into the computer. Mainly, vulnerabilities in the software used and security are employed in gaining access to other systems of computers.
There are two types of hacking: malicious and ethical. Malicious hacking is practiced with ill intent and under section 66 of the IT Act 2000, the punishment for ill-intent hacking can lead to imprisonment for up to three years and a fine of up to Rs 5 lakh, whereas ethical hacking is mainly used to test the vulnerabilities of an organization's information system and may or may not be exploited to gain access to an unauthorized system by an attacker. The government of India hires ethical hackers to keep its information systems safe.
- Cyberstalking:
Cyberstalking is the harassment or intimidation of anyone using the internet. Stalking means repeatedly following and watching someone over a long period, which constitutes a crime. Cyberstalking is the modern expression of online harassment within the social environment. Cyberstalking is a crime such as online harassment of a person. This is a version of in-person harassment online, commonly known as stalking. Most harassments take place via social media platforms. Women mostly become victims of cyberstalking. Life has become far more accessible for stalkers to pursue and trace their victims online as internet users have risen, and so has the propensity for people to put their personal and professional lives on social media.
The punishment for stalking is given under Section 78 of The Bhartiya Nyaya Sanhita, 2023 which is imprisonment of a maximum of three years, with fines; and, in the second conviction, imprisonment can be enhanced to a maximum term of five years, along with the possibility of fines. However, the punishment for cyberstalking is given under Section 67A of the IT Act, 2000 in which imprisonment is up to five years and a fine of up to five lakh rupees.
- Cyberterrorism:
Cyberterrorism can be described as fulfilling via conducting an act of terrorism through a medium of advanced technology and computer systems. Terrorism is one highly essential concern in the area of national security and that of humanity. It instills anxiety and creates uncertainty in the citizens of a nation. Since independence, India has been faced with a very relevant and grave problem. The term used to define this is cyberterrorism, that is, the deliberate employment of the internet for attacking information systems to create fear, incite violence, and massive social disruption. Cyber dangers are spiraling out of control all over the world. In 2019, Iran launched a series of cyberattacks against 50 US institutions, among them being the New York Stock Exchange. The punishment for Cyberterrorism is defined under Section 66F of the IT Act 2000, which may extend to imprisonment for life.
- Cyber pornography:
Cyber pornography, better known as internet pornography, is the production, distribution, and publishing of pornographic content using the internet. Due to technological development, pornographic materials are quickly produced and spread across all parts of the world. Based on the evaluation of Statista, 4% of websites in the world are porn sites.
Regrettably, the faithful and unfortunate aspect of the internet is that child pornography has been on the rise. However, Section 67 of the IT Act, 2000 prohibits the production and distribution of cyber pornography and it punishes the criminal with 3 years of imprisonment and a fine of up to 5 lakhs. In child pornography, children experience physical abuse in the process of manufacturing. The girls who are involved in such activities will undergo severe and long-lasting consequences which will hugely affect their lives as a whole.
On reading the 2021 report by the National Crime
Report Bureau, NCRB shows that the number of cases increased from 738 in 2020 to
969 in 2021. This number will continue to rise in AI porn i.e. Deepfake porn is
becoming increasingly common with the advancement of AI. Deepfake is available
on a large scale that permits the user to remove clothes from the picture and
add their face to the porn videos.
Regulatory Framework For Cybercrimes In India:
The Information Technology Act of 2000 was a milestone act in India about
cyber-security. It was passed by Parliament in India and is regulated by the
Computer Emergency Response Team (CERT-In), which formulates the grounds for
cyber-security regulations, data protection regulations, and the supervision and
control of cybercrimes within India. This act provides safety and security for
e-governance, e-banking, e-commerce, and the private sector.
However, there is
no integrated law on cyber-security in India. These regulations help establish a
legal framework for protecting vital information infrastructure in India.
Section 43A of the IT Act mandates that any corporation or organization in India
handling sensitive information establish and follow "reasonable security
practices and procedures" to secure such information from unauthorized access or
computer resource misuse.
Other than this, Section 72A of the IT Act prescribes
some other offenses regarding the disclosure of personal data without consent
(with malicious intent and causing harm) at the hands of an intermediary or any
person. The punishment may extend to imprisonment for a term that could reach
three years, a fine that may extend to Rs. 500,000, or both.
While late, October 2008's Information Technology Amendment Act, which came into
effect the year after, was in itself a great enhancement to the IT Act of 2000.
The changes removed deficiencies in the earlier legislation and represented a
significant step forward for India on its quest to graduate to a more rounded
cyber-security framework. The IT Act of 2008 implemented new and revised
definitions of cybercrime and the use of electronic signatures, with extended
coverage thereof.
Further, companies must be mandated to inculcate better data
protection and be made liable in case of data leakages. The IT Act of 2008
applies to all agencies, companies, or organizations using computer-related
resources, computer networks, or any other form of information technology in
India. It provides services to foreign and domestic web hosting, Internet,
network, and telecom service providers either having a presence in India and
providing services in India or otherwise operating in India.
The Information Technology Amendment Act 2008 is a very far-reaching piece of
legislation and constitutes of nine chapters and 117 sections. However, one of
the apprehensions of the IT Act 2008 has to be Subsection 69 since it empowers
the Indian government to intercept, monitor, decrypt, block, and destroy data at
its whims and fancies, thereby creating large-scale apprehensions about privacy.
IT Act violations are punishable with fines ranging from INR 2,00,000 to a
maximum of three years in jail. The more severe violations and cybercrimes are
punishable with imprisonment for up to 10 years. However, the above provision
doesn't uphold a framework for privacy that is founded on rights nor does it
safeguard against any information breach.
In the majority judgment of
Justice K. S. Puttaswamy (Retd.) Vs. Union of India,
2017[5], the Supreme Court said, "While, clearly and unequivocally, privacy is a
concomitant of right to life and personal liberty, it is an intention of the
Constitution to protect the right to privacy as an independent constitutional
right." This judgment not only gave birth to the fundamental right to privacy
but also elucidated the concept of privacy in the private domain, speaking about
privacy as a core value and setting out mandating the need for a new data
privacy law.
Combating Cyber-Crimes:
The Indian Constitution's Seventh Schedule designates "Police" and "Public
Order" as State topics. Therefore, the primary authorities for the prevention,
detection, investigation, and punishment of crimes, including cybercrime, are
the states and Union territories. To strengthen the capabilities of State
Governments, the Central Government supports and finances a number of creative
initiatives.
Some individual-level important tips which you should not hesitate to observe
toward protecting your computer and personal information against cybercrime
include: Keeping the operating system and other software updated due to the
availability of security patches within them. Ensuring the antivirus software is
installed and updated for easy and effective detection and removal of malware.
Use strong passwords or use a good password manager to generate strong
passwords.
Do not leave vulnerabilities for infections to occur by never opening
attachments or clicking links in spam messages or uncertified Websites. Supply
personal information only if you are convinced communication is safe, and verify
the authenticity of the requester by contacting the company through their
contact details on record. More carefully examine the URL of Web pages, and use
Internet service providing security features to make safe online transactions.
Monitor bank statements frequently and also report any doubtful activities to
the banks as quickly as possible. All of these would protect one's computer and
connected information from unwanted eyes hacking into computers.
The Ministry of Home Affairs has sanctioned monetary support to all States and
UTs under the scheme of CCPWC (Cyber Crime Prevention Against Women and
Children) for strengthening systems to deal with cybercrimes effectively. It can
also establish laboratories related to cyber forensics and training institutes,
undertake training programs, and provide junior cyber consultants with the help
of this funding.
The Indian Govt. has established the Indian Cyber Crime Coordination Centre, I4C
(Indian Crime Coordination). It allows for evolutionary documents of a
comprehensive and coordinated framework for the effective investigation of
cybercrime. It has set up seven 'Joint Cyber Co-ordination Teams' in Mewat,
Jamtara, Ahmedabad, Hyderabad, Chandigarh, Visakhapatnam, and Guwahati—places
with a high incidence of jurisdictional problems and cybercrime to bring all
States and UTs on board to create a robust coordination mechanism of LEAs[6].
Ethical Issues In Cyber-Security:
The data is often accessed with privileged access to secure the system by a
cyber-security expert, such as white hat hacking or ethical hacking. The term
penetration testing arises from the idea of breaking into secure systems by
applying hacking tools and techniques for reasons of testing security and
finding vulnerabilities.
The knowledge is utilized in building solid defences
against likely threats. However, ethical issues also arise in white hat hacking,
as professionals must keep covered information private. Although the profession
demands trust, security professionals sometimes have uncovered criminal
activities or public threats to law enforcement agencies. A well-rounded ethical
framework is essential to address cyber-security ethical issues such as invasion
of privacy, resource allocation, and the right to transparency.
It includes unlawful intrusion, identity theft, reputational injury, and
emotional distress. Privacy can be protected by cyber-security experts by
implementing security measures, detecting and rectifying deceptive designs,
ensuring compliance with security frameworks, and mitigating risks. Allocation
of resources is also another ethical challenge. Although the scale is tipped in
favour of the larger organizations because they can invest more in their
defences, sometimes knowledge and wherewithal to distribute the resources
effectively are important.
From a simple viewpoint, implementing a fix for a
crucial software vulnerability may take up a few million dollars or even a few
tens of millions of dollars and a few thousand man-hours. If it was not done,
then, maize millions of people due to a data breach. Transparency and disclosure
are very much needed where corporations need to inform immediately, or at least
need to inform as soon as they can, about the software vulnerabilities so that
the professionals can respond quickly to assaults and the customers can mitigate
the resulting risks[7].
Cyber-security professionals face a variety of ethical issues in their line of
work. They have to maintain the confidentiality of data, address privacy
concerns, and much more. They must be vigilant at all times and negate any
danger lurking in the corner immediately, unlike the ordinary user who might
ignore notifications. Security vs. economic interests again creates a dilemma
and mainly arise in cases where there are unethical actions within company
units. These kinds of issues may be possibly reported to supervisors or, if
unlawful, to the authorities or the media.
A set of rules and principles needs to be implemented while promoting ethical
activities because, in the virtual world, the line between protecting security
and maintaining privacy is often skinny. With updated knowledge about changing
cybercrimes, upgrading their skills, and higher education, professionals can
develop an understanding of ethical principles and implement successful
cyber-security measures. There are some ethical issues in cyber-security are as
follows;
- Privacy vs. Security:
- Scenario: Cyber-security professionals are often required to monitor network traffic to detect potential security threats. During this monitoring, they may inadvertently access sensitive personal data, such as emails, personal documents, or health records, which are unrelated to the threat they are investigating.
- Ethical Issue: The core ethical dilemma here is balancing the need to secure the organization against potential threats while respecting the privacy of individuals. Privacy is a fundamental human right, and unauthorized access to personal information, even in the name of security, can lead to significant ethical and legal concerns. Professionals must navigate this tension carefully, often requiring clear policies, transparency, and minimization strategies to avoid unnecessary privacy invasions.
- Data Breach Disclosure:
- Scenario: Imagine a situation where a company experiences a significant data breach, exposing sensitive customer information such as credit card details, social security numbers, or personal addresses. The company is aware of the breach but is concerned that publicly disclosing it could lead to reputational damage, loss of customers, and a drop in stock prices.
- Ethical Issue: The ethical dilemma here revolves around the responsibility to disclose the breach to affected customers promptly versus the potential harm that such disclosure could cause to the company. Ethically, the company has a duty to inform customers so they can take protective measures, such as changing passwords or monitoring their credit. Delaying disclosure, or failing to disclose the breach entirely, could expose customers to greater harm, including identity theft and financial loss. Ethical best practices often advocate for transparency and timely communication, even when it may negatively impact the company.
- White Hat Hacking (Ethical Hacking):
- Scenario: An ethical hacker (white hat) is hired by a company to test its systems for vulnerabilities. During the assessment, the hacker discovers a severe vulnerability that could allow an attacker to access sensitive data or take control of critical systems. The vulnerability is significant enough that it could be exploited to cause substantial harm if not addressed.
- Ethical Issue: The ethical hacker faces the dilemma of how to handle the vulnerability. Should they immediately disclose it to the organization, giving them time to fix it, or is there a broader obligation to disclose the vulnerability to the public, particularly if the organization does not act swiftly? The ethical issue is compounded if the vulnerability affects critical infrastructure or public safety, where the potential impact of an exploit could be catastrophic. The hacker must weigh their contractual obligations to the organization against the potential harm to the public if the vulnerability remains unaddressed.
- Resource Allocation and Equity:
- Scenario: Large corporations often have extensive resources to invest in cutting-edge cyber-security measures, including advanced threat detection systems, dedicated security teams, and regular security audits. In contrast, small and medium-sized enterprises (SMEs) may struggle to afford even basic cyber-security protections, leaving them vulnerable to attacks.
- Ethical Issue: The ethical dilemma here involves the disparity in cyber-security capabilities between large and small organizations. Should larger entities, which often benefit from economies of scale and greater market power, have an ethical responsibility to support smaller organizations in improving their cyber defenses? This could include sharing threat intelligence, providing affordable security solutions, or advocating for stronger industry-wide standards. The issue of equity in cyber-security is critical because vulnerabilities in smaller organizations can create entry points for attackers to target larger networks, posing a risk to the broader digital ecosystem.
- Employee Surveillance:
- Scenario: To prevent insider threats, a company decides to implement software that monitors employee activities, including emails, browsing history, and even keystrokes. The monitoring is done to detect any suspicious behaviour that might indicate malicious intent or a breach of company policy.
- Ethical Issue: The ethical issue here centres on the balance between the company's need to protect its assets and the privacy rights of employees. While monitoring can be justified from a security perspective, excessive surveillance can create a hostile work environment, erode trust, and infringe on employees' rights to privacy. The ethical challenge is to implement monitoring in a way that is transparent, proportionate, and respectful of employees' dignity, ensuring that surveillance is limited to what is necessary to achieve the security objective.
- Ethical Hacking and Unauthorized Disclosure:
- Scenario: An ethical hacker discovers a critical vulnerability in a popular software platform used by millions of people worldwide. The hacker responsibly reports the vulnerability to the software company, but the company either ignores the report or refuses to acknowledge the severity of the issue. The vulnerability remains unpatched, leaving users at risk.
- Ethical Issue: The hacker faces a tough ethical decision: should they respect the company's request for confidentiality and allow the vulnerability to remain unpatched, potentially putting users at risk, or should they disclose the vulnerability publicly to pressure the company into action? Public disclosure, while potentially protecting users by raising awareness, could also violate legal agreements, lead to unintended consequences, and expose users to immediate threats if the vulnerability is exploited before a patch is released. The ethical hacker must consider the broader implications of their actions, balancing the need for public safety with legal and professional responsibilities.
Conclusion
The more societies across the globe are getting transformed digitally through
programs like Digital India, the more this growing phenomenon of crimes in
cyberspace highlights the importance of solid cybersecurity solutions. The way
information was sought and contacts were communicated has been changed radically
due to conventional societies turning into digital ones. In that process,
vulnerabilities have been brought to the fore that a few unscrupulous elements
milk for their gain.
The growing cybercrimes, such as hacking, cyberstalking,
cyberterrorism, and cyber pornography, show the need for expansive enough
regulatory frameworks to curb such threats, like India's Information Technology
Act and amendments.
The ethical issues associated with cybersecurity, namely, privacy intrusion and
resource allocation, also explain why cybersecurity professionals must adhere to
exemplary ethical standards. Stakeholders can help counter the risks of
cybercrimes by establishing openness, the privacy of data, and awareness of
developing threats in such a way that shields digital economies across the world
as well as societies.
Bibliography:
- Case Laws:
- Justice K. S. Puttaswamy (Retd.) v. Union of India, (2017) 10 SCC
- Statutes:
- Information Technology Act, 2000.
- Books:
- Anirudh Rastogi, Cyber Law: The Law of the Internet and Information Technology (LexisNexis, 2019).
- Articles:
- Emergence of Cybercrime in Digital Societies Challenges, Regulations And Ethical Considerations.
- Websites:
- https://articles.manupatra.com/article-details/emergence-of-cybercrime-in-digital-societies-challenges-regulations-and-ethical-considerations
- https://pib.gov.in/PressReleaseIframePage.aspx?PRID=1949426
- End Notes:
- https://pib.gov.in/PressReleaseIframePage.aspx?PRID=1949426
- https://www.ibef.org/government-schemes/digital-india
- https://www.imf.org/external/pubs/ft/fandd/2021/03/global-cyber-threat-to-financial-systems-maurer.htm
- https://www.ibm.com/topics/cyber-attack
- Justice K. S. Puttaswamy (Retd.) v. Union of India, (2017) 10 SCC 1
- https://www.nationalcrimeagency.gov.uk/what-we-do/crime-threats/cyber-crime
- https://pib.gov.in/PressReleaseIframePage.aspx?PRID=1949426
- https://bsmedia.business-standard.com/_media/bs/data/general-file-upload/2015-07/Digital India Presentation on DeitY website.pdf
Please Drop Your Comments