When Internet was not invented, everything happened in a traditional way. People who committed crimes were brought to the court under jurisdiction of which the crime was committed. With time and the advent of technology people are attracted to access the internet more than ever, which has resulted the formation of a global village. In this era, the crimes have adopted to the advancement in technology. Cyber Crimes are the criminal activities that uses a computer device, computer network or networked devices for targeting the same. The goal of the crime is not always making profit. Such advancement in the crimes has brought serious challenges to law, particularly International Private Law and Privacy Law. In other words, the issues raised are jurisdictional issues, enforcing of laws, applicability of foreign judgments.  In April 2023, 5.18 billion people had access to internet, which comprises of 64.6 Percent of the world population. In the age, where more than half of the world population is connected, the rising challenges cannot be ignored. This paper aims on the matters related to jurisdiction on a global level, and law applicability; land mark cases with judgements enforcement and steps taken to overcome these challenges throughout the globe. This work provides a global overview of the jurisdictional issues in this digital age.
Cyber Crime, Jurisdiction, Law enforcement issues, Challenges to law, Technology Law
Cybercrime is any criminal activity that targets or makes use of a computer, a computer network, or a device that is connected to a network. The majority of cybercrime is committed by hackers or cybercriminals seeking financial gain. Nonetheless, incidentally cybercrime expects to harm PCs or organizations because of reasons other than benefit. These could be political or individual. Individuals or organizations can commit cybercrime. Some cybercriminals are well-organized, proficient technically, and use cutting-edge methods. Others are fledgling programmers.
 Besides this, Jurisdiction is the legal authority given to a court by law to decide on and try cases within a specific geographic area and/or over particular types of legal cases. It is indispensable to decide under the watchful eye of a claim is documented which court has ward. Matters within a state are subject to the jurisdiction of state courts, and different levels of courts have jurisdiction over lawsuits involving various sums of money.
In today’s world, it has become challenging for the law enforcement agencies to deal with cybercriminals who are beyond borders and jurisdiction. The major challenge to the legislative minds is that how to determine jurisdiction and legislate for cybercrimes accordingly.
Globally, legal minds are active and looking for the possible solutions to the sorted challenges and the ones that are on the way. Also, multiple landmark cases have been decided in many countries and by international organizations which have left most and far impact in the same realm.
The Convention on Cyber Crime:
 In November of 2001, the Council of Europe’s Convention on Cybercrime, also known as the Budapest Convention, was made available for signature. It is the primary global arrangement on wrongdoings carried out through the Web and other PC organizations. A wide range of cybercrime offenses are addressed at the convention, including: Child pornography, denial-of-service attacks, spam, malicious code, hacking, and trafficking in counterfeit goods are all examples of computer fraud.
The Budapest Show has been sanctioned by 65 nations, including every one of the 47-part condition of the Board of Europe. It is likewise the reason for the European Association’s Mandate on Battling Cybercrime.
 The Convention has added the following purposes to their diary:
- The show gives a typical meaning of cybercrime offenses, which makes it simpler for nations to coordinate in exploring and arraigning cybercrime cases.
- The convention establishes a number of mechanisms for international cooperation to facilitate the sharing of cybercrime-fighting resources and information among nations.
- Countries can share information and best practices for fighting cybercrime on the convention’s platform. This assists with bringing issues to light of cybercrime and its effect on society.
The Budapest Show has been a critical outcome in battling cybercrime. It has facilitated international cooperation, improved cybercrime awareness, and helped to harmonize national cybercrime laws. The show is a significant instrument for shielding residents from cybercrime and guaranteeing the security of the Web.
This research paper adopts a qualitative approach, utilizing a literature review and case studies to explore the jurisdictional issues of cybercrimes. The literature review involves an extensive search of academic databases, journals, and relevant publications to gather existing knowledge and perspectives on the topic.
Review of Literature:
 To grasp jurisdictional difficulties in digital violations, it is vital to lay out a reasonable comprehension of what comprises digital offenses and the different kinds of digital crimes. Hacking, identity theft, phishing, cyberstalking, and other illicit activities are all included in the category of cybercrime. These offenses frequently start from one nation however influence casualties and foundation in different wards, convoluting attribution and jurisdictional judgments.  The internet’s lack of borders makes it difficult to deal with cybercrimes that go beyond national borders. It becomes a complicated and frequently confusing process to determine which country’s laws apply and which jurisdiction has the authority to investigate and prosecute criminals. The utilization of anonymization instruments like virtual confidential organizations (VPNs) and the dull web further confuses the distinguishing proof and attribution of digital lawbreakers.
 The conventional standard of territoriality, which declares that a country’s regulations apply inside its nation, experiences huge difficulties in the internet. Digital crooks can send off assaults starting with one country then onto the next without truly being available in the objective ward. These unique hazy spots the lines of jurisdictional power, requiring novel ways to deal with battle cross-line digital violations successfully.  Coordinated effort between countries is basic to handle cross-line digital violations effectively. However, international cooperation and information sharing among law enforcement agencies are frequently hampered by differences in legal systems, data privacy regulations, and political tensions.
Is Cyber Crime an International Crime?
 Cybercrime is, in fact, regarded as a global crime. This is because cybercrimes frequently involve multiple jurisdictions and cross borders. For instance, a programmer in one nation might go after a PC framework in another country. It’s possible that someone from a third nation is the one who was attacked. For this situation, it may not be clear which nation has the power to indict the programmer.
To address the jurisdictional difficulties presented by cybercrimes, nations have been participating to foster global arrangements and shows. Common guidelines for prosecuting cybercrimes are established by these treaties and conventions. Additionally, they include mechanisms for international cooperation in cybercrime investigation and prosecution.
The most important international treaties and conventions on cybercrime include:
 The Convention on Cybercrime (Budapest Show): Over sixty nations have ratified this treaty, which was signed in 2001. It accommodates many measures to battle cybercrime, including the criminalization of specific cybercrimes, the provision of shared lawful help, and the setting up of an organization of public contact focuses.
 The Cybercrime Convention of the Council of Europe: Over forty nations have ratified this treaty, which was signed in 2005. It is similar to the Budapest Convention, but it also includes protections for personal data and privacy during cybercrime.
 The Convention of the United Nations on Transnational Organized Crime: This deal was embraced in 2000 and has been confirmed by north of 190 nations. Although it does not specifically address cybercrime, it does include provisions that can be used to prosecute transnational organized crime groups for cybercrime.
Challenges in Jurisdiction of Cyber Crime:
 At the point when a crime takes place or a dispute occurs between two gatherings who dwell inside a similar geographic area, the assurance of which regulation applies to that situation is effortlessly recognized just like the law of that geographic area. Private international law, international criminal law, and conflicts of law all play a role in deciding which country’s laws and legal forum should be applied in a dispute between two people who live in different nations, or legal jurisdictions. Even though these subjects are far from straightforward or straightforward, when the alleged crime, dispute, or other offence takes place online or is otherwise enabled via the internet, the strategy for resolving legal disputes or criminal offenses that occur between or across legal jurisdictions becomes significantly more complex.
a. World’s Jurisdictional Theories and Cyber Space:
 The computerized age is tied in with involving a great deal of data as information, which is put away, communicated, and utilized chiefly on the web. The issue is that it is difficult to determine which laws and regulations apply in cyberspace because it lacks the physical boundaries of the real world.
Certain individuals proposed dealing with the internet like global spaces like Antarctica or space, where nobody country has control. Cyberspace, on the other hand, is unique in that it is a virtual space created by online activities.
It is difficult to determine which laws should govern cyberspace because it does not have a physical location. Multiple legal systems may apply to online interactions, posing jurisdictional challenges.
Cyberspace has its own value and operates in a manner that is self-regulatory, making it difficult to apply traditional legal theories to it. Cyberspace issues necessitate novel approaches and unconventional legal instruments.
Given the variety of national laws and the growing significance of the digital world, it seems unlikely that there will be a global consensus regarding how to regulate cyberspace. However, some universally accepted guidelines for online activities are a possibility.
b. Cross Border Nature and Lack of Physical Presence:
 Cybercrimes can originate in one nation and target individuals, organizations, or infrastructure in another nation. Cybercriminals can launch attacks from anywhere in the world because the internet does not know any physical boundaries. This makes it difficult to determine which country’s laws apply to the crime. Conflicts over jurisdiction arise as a result, as different nations may assert their right to prosecute criminals based on the location of the crime or the victim.
Physical evidence or accounts from witnesses are often used to identify suspects in traditional criminal investigations. Nonetheless, in cybercrimes, culprits can stay taken cover behind the obscurity given by the web. They can utilize strategies like intermediary servers, virtual confidential organizations (VPNs), and encoded correspondences to disguise their actual personalities and areas. It is difficult for law enforcement agencies to locate and apprehend cybercriminals due to their lack of physical presence.
c. Different Legal Systems:
 “Different Legal System” refers to the shifting regulations and guidelines that various nations have concerning cybercrimes. Since the internet has no physical boundaries, cybercrime can affect people or organizations in one country while taking place in another. When a cybercrime occurs across international borders, it becomes difficult to determine which nation’s laws should be followed and who is authorized to investigate and prosecute the crime.
The test emerges from the way that various nations might have unmistakable legitimate definitions and ways to deal with taking care of cybercrimes. What might be viewed as unlawful in one nation probably won’t be an offense in another. Additionally, the penalties for cybercrime can differ greatly from jurisdiction to jurisdiction. Subsequently, culprits can take advantage of these distinctions to sidestep equity or take advantage of escape clauses in the law.
This dissimilarity in overall sets of laws can prompt struggles in deciding the fitting purview for arraigning cybercriminals. There may be jurisdictional disputes as a result of each nation’s distinct priorities regarding the investigation and prosecution of the crime.
Landmark Cases on Jurisdiction of Cyber Crime:
- Down Jones & Company Inc v. Gutnick, Joseph (2002)
 This case involved an Australian businessman who sued the publisher of The Wall Street Journal for defamation. The businessman argued that the defamatory article was published on the Journal’s website, which was accessible in Australia. The Australian court found that the Journal had jurisdiction to be sued in Australia, even though the article was published in the US. The case raised important questions about the reach of national defamation laws in the digital age.
The case of Dow Jones & Company Inc. v. Gutnick (2002) is landmark in cybercrime jurisdiction because it established the “effects doctrine.” This doctrine allows individuals to sue for internet defamation in their own country, where the harm occurred, even if the publisher is located in a different jurisdiction. It addresses the challenge of determining jurisdiction in cross-border cybercrime cases and ensures victims have legal recourse in their home country.
- Yahoo! Inc. v. La Ligue Contre Le Racisme et l’Antisemitisme (LICRA) (2006)
 This case involved a French organization that sued Yahoo! for hosting Nazi memorabilia on its website. The French court found that Yahoo! had violated French law by hosting the content, even though Yahoo! was a US company and the content was hosted on servers in the US. The case raised important questions about the extraterritorial reach of national laws in the digital age.
Yahoo! Inc. v. LICRA (2006) is a landmark case in cybercrime jurisdiction. It highlighted the challenges of applying national laws to the global internet and enforcing them across borders. The case set a precedent for holding internet companies accountable in one country for content hosted on servers in another country if it violates the laws of the first country. It emphasized the need for international cooperation in addressing cybercrimes that transcend national boundaries.
Improved Determination of Jurisdiction:
 As discussed earlier, there were certain landmark cases which paved the way to different tests for the determination of Jurisdiction in Cyber Crime. For example:
- Minimum Contacts Test arise from Shoe Co. v. Washington 326 U.S. 340 (1945).
- Purposeful Availment Test was the result of Hanson v. Denckla 357 U.S. 235 (1958).
- Sliding Scale Test evolved from Zippo Manufacturing Co. v. Zippo Dot Com. Inc.952 F. Supp. 1119, 1124 (W.D. Pa. 1996).
a. Minimum Contacts Tests:  This test depends on whether the respondent has adequate “least contacts” with the purview where the wrongdoing happened or where the casualty dwells. In the event that the litigant’s activities show a significant association with the locale, the court might have purview over the case.
b. The Purposeful Availment Test:  This test determines whether the defendant targeted the residents of the jurisdiction or intentionally participated in activities there. For cybercrimes committed in that region, the defendant may establish jurisdiction if it purposely conducted business or directed actions in that direction.
c. Sliding Scale Test:  The sliding scale test thinks about the degree of intelligence and business nature of the litigant’s web-based presence in the purview. Jurisdiction may be established if the defendant has a significant online presence with active engagement and transactions with residents.
These tests assist courts with deciding if they have the power to hear cybercrime cases that include litigants from various purviews, tending to the difficulties of cross-line wrongdoings in the advanced age.
The research work done is the mixture of both qualitative and quantitative approach, data has been taken simultaneously from book and content available online on various websites. The books preferred were basically those from recognized journals. High wordings of data have been taken from websites that are mostly government websites and reference has been given.
The scenarios for resolving the jurisdictional issues:
 Cross-border cyberspace issues and jurisdictional issues have become increasingly difficult and complex in the digital age. The idea of the web and computerized advances permits exercises to rise above customary actual boundaries, making it challenging to apply traditional legitimate systems to address digital related issues really. To handle these difficulties, different methodologies have been proposed, each with its own benefits and disadvantages.
1. Global Approaches: One proposed arrangement is to lay out a general lawful structure for controlling the internet at the Unified Countries (UN) level. The goal is to establish uniform international standards and guidelines for all nations. Streamlining regulations and promoting a global consistent approach may benefit from this. However, it can be extremely difficult to reach a consensus among a wide range of countries and stakeholders. It is difficult to come to an agreement on common ground because different nations have distinct interests, priorities, and cultural norms. As a result, developing a global strategy may progress slowly and cumbersomely.
2. Fragmented Approaches: On the other hand, some people think that regional agreements between states that share similar values can provide solutions that are more practical. Territorial alliances of countries with shared interests and collaboration can make particular lawful systems custom fitted to their particular requirements. These local arrangements might take into consideration faster navigation and variation to evolving conditions. In any case, this approach additionally has restrictions. Fracture can prompt disparities and clashes between various local structures, possibly blocking worldwide participation and making provisos for cybercriminals to take advantage of.
3. National Approaches: A few nations might like to depend on their own overall sets of laws to address digital issues. This approach permits countries to have more prominent command over their online protection arrangements and techniques. In any case, it can prompt an absence of consistency and consistency universally. When dealing with cross-border cybercrimes, it can be difficult to determine what is legal or illegal in each country. Additionally, the transnational nature of cyber threats may make national strategies ineffective, necessitating international cooperation for greater impact.
Recognizing that rapid technological advancements frequently present new challenges, the digital landscape is constantly changing is essential. Today’s effective solution may become out of date or ineffective in the future. As a result, when dealing with cyber-related issues, constant revision and adaptability are crucial.
Eventually, finding some kind of harmony between worldwide, divided, and public methodologies is fundamental. The development of efficient solutions in the digital age necessitates the cooperation and collaboration of all parties, including governments, international organizations, technology companies, and civil society. It is possible to create a digital environment that is safer and more secure for everyone by recognizing the cyberspace’s interconnectedness and the need for cooperative efforts.
In the digital age, the rise of cybercrimes has posed significant challenges to the legal system, particularly in the realms of International Private Law and Privacy Law. Jurisdictional issues, enforcement of laws, and the applicability of foreign judgments have become critical concerns as cybercrimes transcend national borders and affect individuals and organizations worldwide. With over half of the world’s population connected to the internet, the need to address these challenges cannot be ignored.
This research paper delved into the jurisdictional challenges of cybercrimes and explored the complexities faced by law enforcement agencies in dealing with cybercriminals operating beyond borders. The digital landscape lacks physical boundaries, making it difficult to determine which laws apply and which jurisdiction has authority in cross-border cybercrime cases. Different legal systems across countries further compound the problem, leading to conflicts over jurisdiction and prosecution.
To address these challenges, various international treaties and conventions, such as the Budapest Convention and the Cybercrime Convention of the Council of Europe, have been established to provide common guidelines for prosecuting cybercrimes and facilitating international cooperation in investigations. Landmark cases like Dow Jones & Company Inc. v. Gutnick and Yahoo! Inc. v. LICRA have set important precedents in determining jurisdiction in the digital realm.
The research paper also highlighted different tests used for determining jurisdiction in cybercrime cases, such as the Minimum Contacts Test, Purposeful Availment Test, and Sliding Scale Test. These tests aid courts in deciding whether they have jurisdiction over cybercrime cases involving defendants from multiple jurisdictions.
Finding the right balance between global, fragmented, and national approaches is crucial in effectively addressing cybercrimes. While a universal legal framework at the UN level may promote consistency, achieving consensus among diverse actors is challenging. Regional agreements between like-minded states offer more feasible solutions, but fragmentation can create discrepancies. Relying on national approaches may lack uniformity and adaptability.
In short, the jurisdictional challenges presented by cybercrimes require innovative and cooperative approaches. The digital world calls for novel legal instruments and international collaboration to combat cross-border cybercrimes effectively. By promoting cooperation among governments, international organizations, technology companies, and civil society, it is possible to create a safer and more secure digital environment for all. The continuous revision and adaptability of legal frameworks are essential to keep pace with rapid technological advancements and effectively address the evolving challenges of cybercrimes in the digital age.
NAME: JOHAR HABAB
COLLEGE NAME: QUAID-I-AZAM UNIVERSITY ISLAMABAD, PAKISTAN.
 What is cybercrime and how to protect yourself from it?
 Jurisdiction by Law dictionary
 Convention on Cybercrime
 Objectives of Convention on Cybercrime
 Hsu, C. L., & Cui, Y. (2019). Cybercrime Typologies: A Systematic Review. International Journal of Cyber Criminology, 13(1), 1-26.
 Brenner, S. W. (2017). Cybercrime Jurisdiction. American University International Law Review, 33(4), 835-896.
 Goldsmith, J. L., & Woods, B. (2018). Who Controls the Internet? Illusions of a Borderless World. Oxford University Press.
 Finklea, K. M. (2018). Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement. Congressional Research Service
 A Brief Primer on International Law and Cyberspace
 Convention on Cybercrime
 Council of Europe
 United Nations Convention against Transnational Organized Crime and the Protocols Thereto
 Understanding current cybersecurity challenges in law: determining online jurisdictional authority
 Yar, M. (2005). Cybercrime and Society. London: Sage Publications.
 Smith, R. W., & Goodwin, M. M. (Eds.). (2015). Critical Infrastructure Protection in Homeland
 Gilden, M. (2000). Toward an International Law of the Internet. Columbia Journal of Transnational Law, 38(1), 155-194.
La Chapelle, H., & Fehlinger, T. (2016). Informal International Lawmaking: Towards a Theory of Global Governance. European Journal of International Law, 27(3), 741-766.
Supreme Court of the United States. (2018). Case No. 17-2 United States v. Microsoft Corp.