Professional Documents
Culture Documents
CYBER LAW
Final Draft
‘INTERNET – A PLATFORM FOR WHITE-COLLAR
CRIMES’
7th SEMESTER
1|Page
ACKNOWLEDGEMENT
Roll no. 17
2|Page
TABLE OF CONTENT
Introduction ................................................................................................................................ 4
Preventive measures................................................................................................................. 15
Conclusion ............................................................................................................................... 16
Bibiliography ........................................................................................................................... 17
3|Page
INTRODUCTION
A generic definition of a crime would be an act that is in violation of the applicable
laws. Generally, the victims of these generic crimes are the individuals. But of late the concept
of White-Collar Crimes has taken boom. It somewhat relates to the crimes against the society
at large.
For the first time, this thought evolved to the famous Criminologist and Sociologist Edwin H.
Sutherland, in the year 1939, who popularised the term “white collar crimes”.
Sutherland point out that besides the traditional crimes such as assault, robbery, dacoity,
murder, rape, kidnapping and other acts involving violence, there are certain anti-social
activities which the persons of upper strata carry on in course of their occupation or business.
These activities for a long time were accepted as a part of usual business tactics necessary for
a shrewd professional or business. Thus, any complaint against such tactics often went
unheeded and unpunished.
These white-collar crimes by their very nature are such that the injury or damage caused as a
result of them is so widely diffused in the large body of society that their gravity in regard to
individual victim is almost negligible. It is probably for this reason that till late these crimes
did not attract much attention as they do not carry with them any loss of social status of the
4|Page
offender even if he is caught or detected. There is yet another reason for white collar criminals
escaping prosecution1.
Lord Acton once said, that “power tends to corrupt and absolute power tends to corrupt
absolutely”.
The main motive behind these white-collar crimes is personal gain. Individuals or groups may
use and abuse their positions within a company to hide or steal money. White-collar crime can
be committed by one individual or it can involve a number of individuals in a large corporation
who deceive investors2.
1
Akshat Khare- Doctrinal Report On “White Collar Crimes”,
2
G. Nagarajan; Dr. J. Khaja Sheriff, - White Collar Crimes In India, International Journal Of Social Science &
Interdisciplinary Research Vol.1 Issue 9, September 2012
5|Page
for white collar criminals by administrative agencies on the ground that it would protect the
offender from the stigma of criminal prosecution.
Another criticism quite often advanced Sutherland’s definition of white-collar crime is that it
includes even those violations of law which are not committed in course of occupation or
profession and these violations do not necessarily belong to upper strata of society or the so-
called ‘prestigious groups. For example, tax evasion is not committed by persons belonging to
middle or even lower strata of society.
6|Page
TYPES OF WHITE-COLLAR CRIMES
The following are the types of white-collar crimes that have been classified over a period of
time3:
3
Sanjay S. Bang – “A Critical Study of White Collar Crimes in India”
4
ibid
7|Page
• While ordinary crimes cause some inconvenience to the victims and serious crimes
cause general community disturbance, white-collar crimes spread feelings of distress,
lower public morale, and produce social disorganization.
• Though a very large number of white-collar crimes are committed in society yet only a
few white-collar offenders are prosecuted and punished. A large number go Scott free
because of their economic and social influence. Even the criminal courts are lenient
towards persons accused of white-collar crimes.
• Protection to society against white-collar crime is too meagre because efforts to make
the criminal law more effective in dealing with white-collar crime are often blocked by
vested interests.
• Absence of adequate knowledge regarding white-collar crime contributes to a distortion
of the criminological theories of causation since criminologists to a great extent have
restricted their data to cases dealt with in criminal courts and prisons.
The internet in India is growing rapidly. It has given rise to new opportunities in every field
we can think of – be it entertainment, business, sports or education. There are two sides to a
coin. Internet also has its own disadvantages. One of the major disadvantages is Cybercrime –
illegal activity committed on the internet. There has been unprecedented growth of a new
8|Page
variety of computer dominated white collar crimes which are commonly called as cybercrimes.
The internet, along with its advantages, has also exposed us to security risks that come with
connecting to a large network. Computers today are being misused for illegal activities like e-
mail espionage, spams, software piracy and so on, which invade our privacy and offend our
senses.
There is a saying that "The modern thief can steal more with a computer than with a gun.
Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb".
These cybercrimes have become a matter of global concern and a challenge for the law
enforcement agencies in the new millennium. Because of the specific nature of these crimes,
they can be committed anonymously and far away from the victims without physical presence.
The term “cyber-crime” is a broad term that is usually applied to a broad range of crimes in
which computers are, in some manner, involved. This term, however, is vague and actually
refers to a collection of dissimilar forms of criminal conduct that are powered by different
motives.
Every computer system is threatened by the large number of crimes which we usually call cyber
crimes, but every computer system does not face an equal risk of being victimized by all of
those crimes.
Any criminal activity that uses a computer either as an instrumentality, target or a means for
perpetuating further crimes comes within the ambit of cyber crime.
As Internet usage continues to rise throughout the world, the threat of cyber crime also grows.
While some of these crimes are relatively harmless and commonplace, others are very serious
and carry with them felony charges.
These white-collar crimes and cybercrimes in the present generation go hand in hand. So, in
this present world, it is difficult for the law enforcement agencies to differentiate between white
collar crimes and cybercrimes.
Generally, when a crime is done, then there is a direct association of the crime & victim. But
in case of cyber offences, the victim need not be associated with the crime scene. They may
not realise that the offence has been committed on them.
9|Page
Cyber-criminals have a major advantage compared to other criminals who have committed
traditional crimes. Criminals under cyber law can use computer technology to inflict damage
without the risk of being apprehended or caught.
It has been predicted that there would be simultaneous increase in cybercrimes with the
increase in new internet web sites. The areas affected by cybercrimes are banking and financial
institutions, energy and telecommunication services, transportation, business, industries etc.
This financial cost of white-collar crime is probably several times greater than that of all the
crimes taken together. In a recent study is has been concluded that the financial loss to society
from white collar crime is far greater than the financial loss from the predatory crimes
committed by persons of lower socio-economic status. It has been further concluded that the
average loss per burglary is less than ten thousand rupees and a burglary which yields as much
as one lakh of rupees is exceedingly rare. On the other hand, there may be several crores rupees
embezzlements reported in one year. Notably, these embezzlements are nothing as compared
with the large-scale crimes committed by corporations, investment trusts and public utility
concerns. It can, therefore, be inferred that white-collar criminals violate trust and create
distrust which lowers social morale and results into social disorganization to a large extent
while other crimes produce relatively little effect on social institutions.
Those who become white collar criminals generally start their career in good neighbourhoods
and good homes, well-educated with some idealism and get into peculiar business situations in
which criminality is practically a routine way of life. Another explanation for white collar
criminality is to be found in the process of social disorganization in the community.
10 | P a g e
DIFFERENT TYPES OF CYBER CRIMES5
1. Computer Viruses6
2. Phishing7
3. Spoofing8
4. Phone Phishing9
5. Internet Pharming10
6. Investment Newsletter11
5
http://www.legalservicesindia.com/article/article/white-collar-crimes-cyber-crimes-255-1.html, visited on
27/10/2013.
6
Viruses are used by Hackers to infect the user’s computer and damage data saved on the computer by use of
“payload” in viruses which carries damaging code. Person would be liable under I.T Act only when the consent
of the owner is not taken before inserting virus in his system. The contradiction here is that though certain viruses
causes temporary interruption by showing messages on the screen of the user but still it’s not punishable under
Information Technology Act 2000 as it doesn’t cause tangible damage. But it must be made punishable as it would
fall under the ambit of ‘unauthorised access’ though doesn’t cause any damage. This ambiguity needs
reconsideration.
7
It is an act in which the hackers, by using e-mail messages which completely resembles the original ones ask for
the verification of certain personal information, like account numbers or passwords etc. Here the customer might
get deceived by the originality of that message, which may lead to huge financial losses if the information is used
for fraudulent acts like withdrawing money from customers account without him having knowledge of it.
8
This is carried on by use of deceiving Websites or e-mails. These sources mimic the original websites so well
by use of logos, names, graphics and even the code of real bank’s site.
9
It is done by use of in-voice messages by the hackers where the customers are asked to reveal their account
identification, and passwords to file a complaint for any problems regarding their accounts with banks etc.
10
Hacker here aims at redirecting the website used by the customer to another bogus website by hijacking the
victim’s DNS server and changing his I.P address to fake website by manipulating DNS server. This redirects
user’s original website to a false misleading website to gain unauthorized information.
11
We usually get newsletter providing us free information recommending that investment in which field would
be profitable. These may sometimes be a fraud and may cause us huge loss if relied upon. False information can
be spread by this method about any company and can cause huge inconvenience or loss through junk mails online.
12
Huge loss may cause to the victim due to this kind of fraud. This is done by publishing false digital signatures.
Most of the people lose credit cards on the way of delivery to the recipient or its damaged or defective,
misrepresented etc.
13
The most common type of cybercrime is spam. While email spam laws are fairly new, there have been laws on
the books regarding "unsolicited electronic communications" for many years.
14
Credit fraud is another common form of cybercrime. Certain computer viruses can log keystrokes on your
keyboard and send them to hackers, who can then take your Social Security number, credit card number and home
address. This information will be used by the hacker for his own means.
15
Cyber terrorism may be defined to be “ the premeditated use of disruptive activities, or the threat thereof, in
cyber space, with the intention to further social, ideological, religious, political or similar objectives, or to
11 | P a g e
REASONS FOR CYBERCRIMES:
Hart16 has said ‘human beings are vulnerable so rule of law is required to protect them’.
Applying this to the cyberspace we may say that computers are vulnerable so rule of law is
required to protect and safeguard them against cybercrime. The reasons for the vulnerability of
computers may be said to be:
intimidate any person in furtherance of such objectives”. Another definition may be attempted to cover within its
ambit every act of cyber terrorism.
16
In his book “The Concept of Law”
17
Sec.43 of the Information Technology Act, 2000
18
Sec.66 of the Information Technology Act, 2000
19
Sec.67 of the Information Technology Act, 2000
20
Sec.68 of the Information Technology Act, 2000
21
Sec.70 of the Information Technology Act, 2000
22
Sec.72 of the Information Technology Act, 2000
23
Sec.73 of the Information Technology Act, 2000
12 | P a g e
• Publication of Digital Signatures for fraudulent purpose. Imprisonment for the term of
2 years and fine for 1 lakh rupees24.
The IT Act, 2000 has not tackled several vital issues pertaining to e-commerce sphere like
privacy and content regulation.
Another grey area of the IT Act is that the same does not touch upon any anti- trust issues. The
most serious concern about the Indian Cyber law relates to its implementation.
The IT Act, 2000 does not lay down parameters for its implementation. It seems that the
Parliament would be required to amend the IT Act, 2000 to remove the grey areas mentioned
above.
24
Sec.74 of the Information Technology Act, 2000
13 | P a g e
MEASURES TO CURB THE CYBER CRIME
Though by passage of time and improvement in technology to provide easier and user friendly
methods to the consumer for make up their daily activities, it has led to harsh world of security
threats at the same time by agencies like hackers, crackers etc. various Information technology
methods have been introduced to curb such destructive activities to achieve the main objects
of the technology to provide some sense of security to the users. Few basic prominent measures
used to curb cybercrimes are as follows:
a. Encryption: This is considered as an important tool for protecting data in transit. Plain
text (readable) can be converted to cipher text (coded language) by this method and the
recipient of the data can decrypt it by converting it into plain text again by using private
key. This way except for the recipient whose possessor of private key to decrypt the
data, no one can gain access to the sensitive information.
b. Synchronized Passwords: These passwords are schemes, used to change the
password at user’s and host token. The password on synchronized card changes every
30-60 seconds which only makes it valid for one-time log-on session. Other useful
methods introduced are signature, voice, fingerprint identification or retinal and
biometric recognition etc. to impute passwords and pass phrases
c. Firewalls: It creates wall between the system and possible intruders to protect the
classified documents from being leaked or accessed. It would only let the data to flow
in the computer which is recognized and verified by one’s system. It only permits access
to the system to ones already registered with the computer.
d. Digital Signature: These are created by using means of cryptography by applying
algorithms. This has its prominent use in the business of banking where customer’s
signature is identified by using this method before banks enter into huge transactions.
14 | P a g e
PREVENTIVE MEASURES
Prevention is always better than cure. So, it is always better to take precautions while operating
the net. Precaution, Prevention, Protection, Preservation and Perseverance are the main
recourse of preventing cybercrimes with regard to white collar crimes. "Taking security
seriously," is the foremost basic essential thing in protecting data25. "If you protect your
customer's data, your employee's privacy and your own company, then you are doing your job
in the grander scheme of things to regulate and enforce rules on the Net through our
community." A citizen should keep in mind the following things-
1. To prevent cyber stalking, avoid disclosing any information pertaining to one self.
2. Always avoid sending photographs online particularly to strangers and chat friends
as there have been incidents of misuse of the photographs.
3. Always use latest and up-to-date anti-virus software to guard against virus attacks.
4. Always keep back up volumes so that one may not suffer data loss in case of virus
contamination
5. Never send your credit card number to any site that is not secured, to guard against
frauds.
6. Always keep a watch on the sites that your children are accessing to prevent any
kind of harassment or depravation in children.
7. It is better to use a security programme that gives control over the cookies and send
information back to the site as leaving the cookies unguarded might prove fatal.
8. The web site owners should watch traffic and check any irregularity on the site.
Putting host-based intrusion detection devices on servers may do this.
9. Use of firewalls may be beneficial.
10. Web servers running public sites must be physically separate and protected from
internal corporate network.
25
Vinay Kumar D.- Cyber Crime Prevention, International Journal of Information Dissemination and
Technology, 3(3), 222-224.
15 | P a g e
CONCLUSION
Capacity of human mind is unfathomable. It is not possible to eliminate cybercrime from the
cyber space. It is quite possible to check them. History is the witness that no legislation has
succeeded in totally eliminating crime from the globe. The only possible step is to make people
aware of their rights and duties and further making the application of the laws more stringent
to check crime. Undoubtedly the Act is a historical step in the cyber world. Further I all together
do not deny that there is a need to bring changes in the Information Technology Act to make it
more effective to combat cybercrime. Crucial aspect of problem faced in combating crime is
that, most of the countries lack enforcement agencies to combat crime relating to internet and
bring some level of confidence in users.
So, it is clear that with the advent of technology, that the white-collar crimes in the society are
becoming more & more. So as already stated prevention is better than cure & so to, we should
be careful with the information we have. So effective steps shall be initiated in protecting the
data.
16 | P a g e
BIBILIOGRAPHY
17 | P a g e