Scroll Top

Cyber Grooming: A Malediction of Virtual World

Technology is an advanced creation of mankind. The advancement of the virtual world has formulated numerous contingencies that affect the psychic state and cultural well-being of youths. In today’s scenario, there are some very treacherous uncertainties in cyberspace which are Sexting,

INTRODUCTION

Technology is an advanced creation of mankind. The advancement of the virtual world has formulated numerous contingencies that affect the psychic state and cultural well-being of youths. In today’s scenario, there are some very treacherous uncertainties in cyberspace which are Sexting, Cyber-dating, Cyberbullying, Cyber Stalking and Online Grooming. This article reviews a framework on how technology could develop further to neutralise and alleviate the devastation produced by online perpetrators. Further, the focus would be on existing laws and suggestions to curve this type of attack in a precise manner. This involves an apprehension phase employing automated systems to recognise and analyse such attacks and exercising precautionary standards as a component of the response towards the enigma such as refining undesired interactions.

Cyber grooming is a very awful part of cyberspace[1]. The Internet has empowered people to socialise and trade intimate erudition online with a high standard of anonymity, mutually with deficiency of surveillance; this has assisted various kinds of anti-social acts towards weak people including teenagers. Most of the virtual harm consists of chat dialogues with sexual meaning, distributing photos or videos including intimate content, and virtual sex through a webcam. The victim gets confined in a series of abuse by the offenders who coerce them at regular intervals, intimidating them to disclose the material already interacted.

Minors and Sexting

When a person sends a venereal image or message to another person can be called “Sexting”. Earlier, people were using SMS to send sexually explicit messages and images, but due to the contemporary growth and use of social media and various image-based applications, sexting is now more generally correlated with social media applications. Sexting can be performed through any kind of electronic device[2]. It has become very widespread for adolescents and modern people because they contribute more extra time using the internet and are more expected to get attached and evolve online-based relations.

Drawbacks of Sexting

As sexting’s prevalence rises, related obstacles continue to substantiate themselves[3]. It is essential that anybody considering the distribution of specific images with different people is informed of the perils linked with sexting. Some of the possible perils correlated with sexting are:

  1. Screen capturing

When exporting pictures or messages of an intimate nature, it is necessary to memorise that the receiver could comfortably screenshot those pictures and messages. After that, it can be shared anywhere at any time, on any platform without consent. 

  1. Sextortion

Sextortion is a sort of intimate extortion where someone obtains passage to erotic photographs or messages and frightens to distribute them publicly unless the victim does additional sexual performances or performs money transfers[4].

  1. Unanticipated sexual encounters

If a juvenile gets into sexting, they may feel constrained or favoured to have sexual connections with people before they are bodily or intellectually ready. This could lead to sexual exploitation[5], educational difficulties, adolescent pregnancy or more detrimental.

OPERATION BLACKFACE: A Conspicuous initiative by the Cyber Wing of Maharashtra Police

Recently, the cybercrime prevention wing of the Maharashtra[6] police department has acquired software from Interpol to hunt down suspects of child obscenity and associated crimes. The mentioned software can identify nakedness accompanying the age of the person in the media through facial composition and other features. A special unit has been formed by the cyber unit which is known by the name of “Trace”.

Basically, The whole operation has been framed with goal to defend young children and restrict futuristic cyber crimes. During the process, the assigned unit recognises areas from where child obscenity correlated content has been transferred in the last few months. It is an action to restrain the increasing cases of child indecency. The assigned unit informed that a lot of wrongdoers are using substitute servers or Virtual Private Network to bypass Government limitations to obtain such content.

Safeguarding  Unwanted Communication

Computerized exposure of undesired communication has very newly been included within the domain of instrument learning, nevertheless, there has already been an adequate level of progress despite the technological hurdles. The character of the moderation procedure in position, detection is indispensable in the battle against virtual predators. It is needed to allow additional operations to separate the offence, hinder communication or quarantine content to help the possible digital criminological examination.  Furthermore, without the assistant of artificial intelligence and computer learning to separate virtual messages, apprehension could sink in many situations, as before-mentioned, a stable composite strategy could very well be the solution to the enigma. It is very crucial to have an effective tool to further shield the communication, our critical conversations and which can separate out or repudiate undesired signals and communications.

Indications OF Grooming

Each circumstance is distinct. Virtual groomers are remarkably skilled at misleading regarding who they are. This suggests it can be challenging to know if someone is an online companion[7]. In case the wrongdoer insisting you to share sexual images or to perform something sexual, they will definitely ask for these points:

  • The offender will convey many messages to the targeted person.
  • They may message on various platforms, for illustration through Facebook or any other messaging application.
  • The offender will definitely ask to keep the conversations secret.
  • To obtain more information pertaining to the victim the offender will dig up more; maybe use the method of stalking.
  • The wrongdoer may ask the victim not to tell anyone regarding their chat and to keep it confidential.
  • After some time, the offender will ask for more sensitive information.
  • Soon after that, they will try to blackmail the victim in all possible ways. They could warn to upload the images virtually or expose them to people you know if you don’t transfer them more.
  • After getting the emotional entrance into the mind of the victim, the wrongdoer will send obscene messages at regular intervals; they will also try to seduce the victim to get more close to the targeted person.

Indian Regulations Related to Child Grooming

There has been a huge hike in the number of cases during the lockdown. In most maximum cases, the sufferer already knows the offender[8]. With the expansion in the number of child exploitation cases, there has been a surge in child obscenity too. We do have numerous provisions dealing with this kind of heinous crimes which are: As per section 11(4)[9] of the POCSO Act 2012, a person is said to perpetrate sexual harassment upon a minor when such person with sexual purpose, frequently or invariably follows or watches or reaches a minor either undeviating or through technology, digital or any other means. Also, section 11(6) h provides that a person who tempts a child for obscene desires or enjoyment, with intimate intent is said to perform sexual harassment upon a minor. Section 67B[10] of IT Act 2000, executes the allurement of teenagers in a Virtual connection to publish or transmit material portraying children in the sexually specific act in computerised form.

SUGGESTIONS

Intended For Government

There is an unquestionable need to empower Indian regulations to shield children from online grooming. The nature of the provisions has to be more stringent and accurate. The government can work with all the applications and can draft suitable and convincing polices which can tackle cyber grooming and would be extremely helpful for the upcoming generations. Further, authorities can prepare a list of all the offenders who can be enduringly banned from using various websites. The provisions of Information technology are extremely vague due to the risk of subjective analysis of statutory provisions and the inadequacy of any lawful duty on intermediaries to defend children from online menaces. Therefore, it is very essential for the government to introduce a clear meaning of the word “Cyber Grooming” with all suitable punishments for this particular offence which will further help to avoid any incertitude in the definition of the term.

Intended For Parents

It is remarkably necessary to watch the children and the websites which they are using at regular intervals in order to prevent futuristic crimes and which will also help the parents to keep a record of their children. There should be a constant discussion with the children regarding the pros and cons of the internet and electronic media and devices. A different approach to counter virtual predators and cyber grooming is to control the websites the kids can use. Establishing boundaries and hindering vulnerable websites can go an extended way toward preserving your child.

CONCLUSION

In the current scenario, identifying such highly advanced cybercrimes with the help of conventional tools has become more difficult. It is high time to learn sophisticated skills and machine learning to tackle all kinds of virtual attacks. Furthermore, more R&D work can be carried out in the same field which would help to generate more restraint techniques for future attacks and learnings. The balance has to be maintained from both sides, including the government and parents in order to prevent the children from such kind of online attacks. This write-up has described all the recent techniques, provisions, suggestions which could be useful to block various risks.

Author(s) Name: Adnan Athar Quraishi

Co-Author: Ramish Ahmad Baig (Integral University, Lucknow)

References:

[1] Daniel Bennett, ‘What Is Cyber Grooming and How to Protect Children’ (Tech Acute, 23 March 2020) <https://techacute.com/what-is-cyber-grooming/> accessed 7 September 2022

[2] Haider M. Al-Khateeb & Gregory Epiphaniou, ‘How Technology can Mitigate and Counteract Cyber Stalking and Online Grooming’ (2016) 1 Computer Fraud and Security 16 <https://www.sciencedirect.com/science/article/abs/pii/S1361372316300082> accessed 7 September 2022

[3] ‘Sexting’ (The Cybersmile Foundation) <https://www.cybersmile.org/advice-help/category/sexting>  accessed 7 September 2022

[4] Roberts K, ‘The Impact of Media and Digital Technology on Children and Adolescents’ (The Royal Australian & New Zealand College of Psychiatrists, May 2018) <https://www.ranzcp.org/news-policy/policy-and-advocacy/position-statements/media-digital-technology-impact-on-children> accessed 7 September 2022

[5] Soumitra Bose, ‘Paedophiles ‘Cyber Grooming’ Children for Pornography’ (The Times of India, 28 May 2020) <https://timesofindia.indiatimes.com/city/nagpur/paedophiles-cyber-grooming-children-for-pornography/articleshow/76049729.cms>  accessed 7 September 2022

[6] ‘Operation Blackface : New Software to Help Track Child Porno Suspects’ (The Wonk, 9 December 2020) <https://thewonk.in/operation-blackface-new-software-to-help-track-child-porno-suspects/> accessed 7 September 2022

[7] Shuchi Nagpal, ‘Cyber Grooming : 3 Scary Secrets’ (Tech Law Blog, 21 July 2020) <https://www.asianlaws.org/blog/cyber-grooming-3-scary-secrets/> accessed 7 September 2022

[8] Devika Agarwal, ‘Child grooming: India must take measures to Protect Children from Online Sexual Abuse’ (First Post, 11 May 2017) <https://www.firstpost.com/india/child-grooming-india-must-take-measures-to-protect-children-from-online-sexual-abuse-3438528.html> accessed 7 September 2022

[9] POCSO Act 2012, s 11(4)

[10] Information Technology Act 2000, s 67B