Professional Documents
Culture Documents
In the Indian context, cybercrime is a willful and voluntary act or omission that adversely affects a property or
person or computer system, which is made punishable by the Information Technology Act, 2000.
Characteristics of cyber Crimes
1. Low risk high rewarding ventures
• The most outstanding characteristic of cybercrime is that they are comparatively easy to
commit, difficult to detect and even harder to prove. The computer criminals with basic
computer knowledge and skill can easily destroy valuable database causing massive loss or
damage to the victims of the crime.
2. Physical presence not required
• The cybercrime can be committed even from a remote place without the requirement of its
doer’s physical presence at the scene of crime.
3. Lack of awareness among victims
• Most of the time, the cybercrime victim is unaware of the incident because of lack of
adequate skill and knowledge in operating the computer system.
4. Lack of hi-tech skills among investigating agencies
• The detection of cybercrimes requires technical skill which the investigators generally be
short of.
5. Victims refrain from reporting cases
• Generally the party or the organization victimized by the cybercrime refrain itself from
reporting it to the police for the fear of unfavorable publicity or possibility of the loss of
public trust in them. The unwillingness of the victims to come forward and file a police
complaint further aggravate the degree of the problem of cybercrime detection and control.
6. No violence is involved
• Unlike the conventional crime, the cybercrime does not involve any violence because it is an
outcome of greed, mischief and exploiting the weakness of the victim.
7. No territorial boundaries
• In most of the cases, the cyber criminals stay out of reach of law because of
the lack of territorial boundaries of internet. The lack of territorial
boundaries increases the complexity of the cyber crimes.
8. Anonymity and Openness
• The computer network used for information distribution has the feature of
anonymity and openness which make it easy and suitable for the criminal to
indulge in crime without being recognized or known to the computer user
who is a prey of his illegal activity
9. Paucity of authentic evidence
• The information over internet is exchanged in the form of electronic data,
therefore there remains no trace of data once it is wiped out and the damage
of this sole evidence enables the criminal to remain hidden and escape
criminal prosecution.
10. Wider ramifications
• The variety of cybercrime is wide enough that affect the socio-economic as
well as the legal rights of the people.
Questions
• There are two elements of crime namely, mens rea and actus reus with certain exceptions. For e.g. in the offence of
conspiracy only mens rea is enough for imposing criminal liability whereas in crimes against state like false
evidence, counterfeiting coin, white collar crime etc. only actus reus is sufficient to inflict criminal liability. The
universal rule of criminal law is that no person is to be convicted of a crime unless it is proved beyond all doubt by
the prosecution that the conduct (act or omission) is prohibited by criminal law and is liable for the same and that
had a defined state of mind in relation to the crime commission. Thus, actus reus without mens rea is not a crime.
• Actus reus + Mens rea = Crime
• Actus reus + No Mens rea = No Crime
• No Actus reus + Mens rea = No Crime
• According to J.C. Smith and B. Hogan actus reus is the result of human conduct as the law seeks to prevent. In the
case of cyber crime, it is very hard to prove both elements of crime.
Actus Reus & Mens Rea
Actus Reus
The actus reus of cyber crime is very dynamic. For e.g. when with a keyboard and mouse one start functioning with computer and
is attempting access to information on other’s computer without the permission or approval of the authorized person or is
attempting for hacking or flowing viruses to commit cyber crime and actually caused those acts etc. are human conduct or actus
reus in cyberspace which law seeks to prevent i.e. they are actus reus of cyber crimes.
Mens Rea
Another essential element of cyber crime is Mens rea. According to Smith and Hogan, for actus reus a person could be held liable
for any injury without proof of mens rea or guilty state of mind. In modern Common Law, this concept has changed and now
blameworthy mind is an essential element for commission of crime and imposition of penalty. The term ‘mens rea’ is not used and
defined in the Indian Penal Code, 1860. However, the words used like fraudulently, dishonestly, knowingly, recklessly,
intentionally etc. represent mens rea. For e.g. while committing hacking, the hackers have knowledge or intention of unauthorized
access and thereby commit cyber crime.
• Is mens rea necessary for cyber crime?
• Where?
Categories of Cyber Crimes
Cracking: Cracking is the gravest of cyber crimes known till date. The word “cracking” means trying to
obtain access into the computer systems in order to steal, corrupt, or illegitimately view data. It is a dreadful
feeling to know that someone has broken into your computer systems without your knowledge and
permission and has tampered with confidential data and information.
E-Mail Spoofing: An e-mail which misrepresents its origin. It is a forged mail which appears to have been
originated from someone or somewhere other than the actual source. It is a tactic which is used in phishing
and spam campaigns because people are more likely to open an email when they think it has been sent by a
legitimate source. The objective of email spoofing is to get recipients to open, and possibly even respond to,
a solicitation.
SMS Spoofing: SMS spoofing is a quite new technology that uses the short message service (SMS)
available on mobile phones. The message appears to come from by replacing the originating mobile
number (Sender ID) with alphanumeric text. Here the offender steals the identity of another in the
form of mobile phone number and sends SMS via internet and receiver gets the SMS from the mobile
phone number of the victim. It is very serious cyber crime against any individual.