Cybercrime and the indispensable need for International Cooperation
As we step towards an intricately interconnected world of technology and AI, cybercrime has been on the constant rise as well, becoming one of the most transnational or cross border criminal activities in recent times. The widespread illicit inter-jurisdictional activities have crippled economies worldwide. The most pervasive criminal markets operate from sanctuaries beyond the reach of the law enforcement. Online servers are scattered across multiple jurisdictions. Unlike traditional offences, cybercrime transcends borders. The digital world has no territorial limit, enabling criminals to exploit this borderless nature.
Irrespective of a nation’s technological advancement, such threats cannot be solely addressed by any nation alone. To effectively combat these crimes, a growing need for resilient international cooperation is vital.
The Jurisdictional Dilemma of Cross Border Crimes
Dealing with cyber offences on an international level, the territorial sovereignty is nuanced.
While the foundation of application of criminal or civil law is jurisdiction, dealing with
cybercrimes the term- ‘jurisdiction’ becomes deeply contested. A cyber-attack may originate in one country, network through servers, and affect victims located elsewhere. The paradox arises when the crime is to be investigated- which country has the right to investigate? The country where the crime originated? Or the country with the casualties? The culprits, on purpose choose transnational pathways to shield themselves from being detected. Furthermore, different countries have varied rules and definitions while dealing with cyber offences. While some activities may be considered a serious crime in one nation, it may be legal in the other. Beyond that, things like encryption, the dark web, and anonymity tools, further intensify and obscure the origins of attack. Even if a suspect is identified, procuring evidence becomes a hassle, as more than often data is stored in foreign servers, or managed by companies operating under different obligations. This allows the offenders to escape accountability; a dilemma that has seen a vigorous rise in recent times, a predicament nonetheless.
Current Prevailing Multilateral Mechanisms and Frameworks for Legal Cooperation
The International community has recognized the crucial need for statutory frameworks to counter these challenges. The most conspicuous amongst all the established cooperation mechanisms is the Budapest Convention on Cybercrime, 2001. It is the first internationally binding treaty on crimes committed on the Internet and other computer networks, dealing particularly with infringements of copyright, computer related fraud, child pornography and violations of network security. The Preamble, of The Council of Europe-Convention of Cybercrime, states that they recognize the need to cooperate with other parties to the convention, and must pursue a common criminal policy aimed at the protection of society against cybercrime, by adopting appropriate legislation and fostering international cooperation. Additionally, The Second Additional Protocol to the Budapest Convention, 2022 intended to improve the operational effectiveness of the Convention by providing a legal basis to enhance the speed of sharing digital evidence and to
deepen cooperation on trans-border investigations for all internet-enabled crimes.
The ASEAN and African Union have established cyber security strategies focusing on capacity building and developing regional frameworks. The African Union Convention on Cyber Security and Personal Data Protection, is a strategic framework for delivering on Africa’s goal for inclusive and legally binding approach to cybercrime. ASEAN’s approach to dealing with cyber offences is characterized by a comprehensive structure with concrete initiatives and support to advance cyber readiness, build trust, and develop regional capacity. The ASEAN Cyber security Cooperation Strategy (2017-2020) was written to provide a roadmap for regional cooperation to achieve the objective of a safe and secure ASEAN cyberspace. Countries now enter into MLATs- Mutual Legal Assistance Treaty(ies). They are formal investigation requests made by states for access of data located in another country for the sake of investigation.
A total of 42 countries have signed an MLAT with India. However India is not a member or a signatory of the Budapest Convention of Cybercrime, declining to participate citing concerns about national sovereignty and data privacy.
Inadequacies of the current framework
Despite the existence of multiple international mechanisms, various gaps linger. Countries often lack compatibility in preserving digital evidences, making it inadmissible to the courts. In spite of numerous multilateral agreements, the process of sharing the evidence is extremely slow and tedious. These delays, often extending across months or years, render the evidence unusable. Additionally, adoption of these frameworks is not uniform across different countries, limiting cooperation amongst nations and creating vulnerable systemic loopholes that can be exploited.
Moreover, geopolitical tensions significantly affect cooperation. More often than not, the suspected perpetrators are located in regions that refuse to cooperate with the investigation or deny their participation. Finally, the differing views of different countries on privacy, surveillance, etc. builds tension between countries. These weaknesses and inadequacies collectively create an environment of minimal risk for cybercriminals to function as they fit.
Case Studies
A Russian hacker hacked a U.S bank in 1994, making it possibly the first online bank robbery. Customers of the bank discovered a total of $400,000 missing from their accounts. A total of 40 illegal transactions were identified, adding up to a whopping $10 million.
In December 2024, Cyber-attacks on Indian government entities increased by 138% between 2019 and 2023, rising from 85,797 incidents in 2019 to 2,04,844 in 2023, according to the Indian Ministry of Electronics and IT.
In February 2025, North Korean hackers stole $1.5 billion in Ethereum from the Dubai-based exchange “ByBit”. Attackers exploited a vulnerability in third-party wallet software during a fund transfer, laundering at least $160 million within the first 48 hours of the attack. It is the largest cryptocurrency heist to date.
The total value lost to cybercrime yearly is now comparable to the gross domestic product of major economies. As this financial impact continues to grow exponentially, with projected costs expected to more than double in just a few years, the resulting parallel economy funds further criminal innovation and attracts more participants to these illicit activities. It comes as no surprise that as digital technologies become increasingly embedded in our daily lives, the traditional boundaries between cybercrime and conventional criminal activity continue to disappear. Even crimes once considered purely physical now incorporate cyber elements.
Roadmaps towards an effective International Cooperation
First and foremost, countries must work toward harmonizing cybercrime laws, ensuring consistent definitions and penalties for cyber offences.
Uniformity reduces uncertainty and conflicts. A joint taskforce and strengthened cooperation is a necessity.
Timely information exchange is important to detect and mitigate crimes.
Capacity building is essential as many countries lack proper resources. Nations while ensuring international cooperation must simultaneously ensure the privacy and rights of their citizens.
Effective cooperation must protect civil liberties and nations must maintain accountability.
Conclusion
Cross border Cybercrimes have presented an unprecedented challenge for all the countries. Combating these evolving threats Continue to pose significant challenges for law enforcement agencies worldwide. Criminals hide behind layers of anonymity and mask their identities, thus hindering investigation. Detecting and mitigating cybercrimes requires a coordinated effort and action. A collaborative ecosystem and a harmonized global approach are the only sustainable methods to ensure security and safety in the digital realm.