Technology, Crime and Its Changing Patterns: Precedent
Technology, Crime and Its Changing Patterns: Precedent
Leena Pawar
Abstract
In today’s fast growing world we need the help of technological in almost every field.
Technology is emerging at a faster pace. Technology which is for the help of humanity is
used against humanity by the criminals. It is always said everything which has a positive
impact also has a negative impact, has a dark side also. Technology negative impact is its
major contribution in growing crime as when it reaches the hands of criminal minded person
they use it to fulfil their criminal instinct. With the development of technology a number of
cybercrimes are reported day by day, which has posed a major risk on the privacy of people.
Today online social networking sites like online dating, facebook, online gaming etc. have
become the opened source of getting one’s personal knowledge which is used by criminal
minded person to commit crimes like online fraud, hacking cyber stalking etc. Cyber
terrorism, a new scope of terrorism in which computer is used for ‘Net War' as malicious
software can be installed in the computer even without the approval of the user and leads to
derailing of trains etc. Many thinkers argue that networking makes people isolated, decline
in social association and increase in aggression and depression. Cyber space is a place, that
does not discriminate against race, gender, colour, religion, socio-economic status even in
age, that is why every child online is at more risk. Technology is neither good nor bad, it is
neutral but its use make it good or bad as the cyber crime is the product of technological
development. The purpose of writing this paper is to analysis the changing pattern of
technology and crime. The use of technology by criminals, results in evolution of new types
of crimes.
Introduction
In every society for the better development of humanity certain social norms are well defined,
which defined to the society what well-being is and what is harmful for the society. As, the
society develop, so the crime develops. Conventionally crimes are those traditional illegal
behavior and crimes such as assault, robbery, dacoits, murder, rape, kidnapping and other act
involving violence which are committed with the intention of harming other. Since the
beginning of human civilization man has always move towards the progress. This motivation
of making progress led to the technological advancement. As a result, today, we are in the
technology age progresses new methods of crime are coming to the fore.
Technology
Technology is the use of science in industry, engineering etc. to invent useful things or to
solve problems and a machine, piece of equipment, method etc. that is created by
technology.2
1
Noel Cox, Technology and Legal Systems 63 (1st ed. Routledge, 2006).
2
Merriam_Webser Learner’s Dictionoary, Merriam-Webster, An Encyclopedia Britannica Company,
(2017)
Crime
Crime as defined by John L. Gillin is an act that is socially harmful or that is believed to be
socially harmful by a group that has the power to enforce its beliefs and that places such act
The word crime was originally taken from a Latin term ‘Crimen’ which means to charge and
the ‘Krimos’a Greek word, which is synonymous to a Sanskrit word ‘Karma’ which means a
social order, thus the word crime is applied to those acts that go against social order and are
Change is the law of nature and today’s fast growing world and man’s instinct for
dramatically changed the way of living, communication. Now most of human activities are
carried with the aid of modern technology as a result we become more dependent of it. The
last century has a witness the maximum advancement in the field of technology leading to
dependency of every governmental affair, business activity and masses around the world on
technology.5
With these developments criminals also go advanced; they create new and different methods
of creating crime and as a result crimes in the society also increase and new ways of
committing crime arises. Now, criminals take the help of advance technology while
committing crime. Earlier crimes are limited only to local areas but now with the influence
and uses of science and technology national and international crime arise and becomes a
common phenomenon.
3
Hugh J. Klare, Changing Concepts of Crime and Its Treatment 38, (ed., 1969)
4
Glory Nirmala K. and Serkaddis Zegeye, The Concept Of Crime, Abyssinia Law, (Mar., 2012),
https:///www.abyssinialaw.com
5
B. R. Suri and T. N. Chhabra, Cyber Crimes, 41, (Ist ed. 2002)
Technological advancement has created a new opportunities in crime for criminal minded
person as any information is just a click away by the internet development. Criminals take
the advantage of technological advancement and modified their area of criminal operation.
They take the advantage of information available on the internet and commit the crime like
cyber hacking, cyber stalking etc. As the internet provide the cyberspace to criminals for
emerging new types of crime known as cyber crime. By the use of internet criminal in fact
cyber criminals hack websites, implant viruses, access sensitive information, commit online
fraud etc.
These types of crime become a matter of concerns for nations. As everything in today’s world
depend on software. All the information can be easily access from the internet. Man through
the use of social sites put their personal information on these sites and these are access by
the criminals for committing the crimes like cyber stalking, cyber harassment. Online
electronic transfer technology has given the rise to online fraud. Now even the area of
committing the crime has enlarged. As traditionally it confined to local area now it shifts
from national to international. A person sitting in one country commits the crime in another
country.
The nature of crime has gone through a great change by the advancement of technology.
Technology not only facilitates the commission of many existing forms of illegal conduct but
also presents a target for some new forms of illegality which are directed at technological
products and services themselves.6 Crimes committed by the use of computer can be split
into two groups- the first group is one that targets computer networks, includes: malware,
viruses, code, hacking, spam and vandalism, while the second group of crimes is that who
uses the computer networks and devices to participate in criminal activity and it includes:
6
Adam Graycar & Peter Grabosky, The Cambridge Handbook of Australian Criminology 25 (ed. 2002)
identity theft, internet scams, cyber stalking, fraud, harassment, drug trafficking, cyber
terrorism, copyright infringement, child pornography and the disposal of stolen goods.
Hacking
injuriously by any means with intent to cause or knowing that he is likely to cause wrongful
loss of damage to the public or any person, person is said to have committed an offence of
Cyber Pornography
Cyber pornography is the act of using cyberspace to create, display, distribute, import or
in sexual acts with adults and is a criminal offense classified as causing harm to persons.8
Pornography on the internet is available on a different layout it ranges from picture and
short animated movies, to sound files, users used cyberspace to creates sex, sex life, sex act
and arrange sexual activities from computer and the focus is on children and teenagers.9
Cyber pornographer’s uses cyberspace for ease dissemination and distribution to sell their
7
Farooq Ahmad, Cyber Law In India (Law On Internet), 397 (3rd ed., 2008)
8
Cyberpornography, Your Dictionary, (November 19, 2019), https://www.yourdictionary.com
9
Mu’azhe Legal Framework, 3(2), Global Journal of Politics & Law Research 45-56, (Apr. 2015)
10
Ibid
Cyber Stalking
individual exhibits towards other. When an individual uses cyberspace for stalking, it is
known as cyber stalking. It is on line course of conduct of a person by which the targeted
is using technology to stalk or repeatedly harass another person. It can be used in making
Cyber Harassment
Cyber harassment refers to online harassment. It is the use of email, instant messaging and
attacks.12It is the use of information and communication technology (ICT) to harass, control,
manipulate or habitually disparage a child, adult, business or group without direct or implied
threat of physical harm includes the verbal sexual, emotional or social abuse of a person,
group organization in which primary goal of cyber harasser’s is to exert power and control
Cyber Terrorism
The intentional use of computer, networks and public internet to cause destruction and harm
for personal objectives is cyber terrorism, its objectives may be political or ideological since
11
Australian Government, What is cyberstalking?, eSafetyWomen, Office of the eSafety Commissioner
(November 19, 2019), https://www.esafety.gov.au
12
USLegal, Cyber Harassment Law and Legal Definition, (November 19, 2019,
https://definitions.uslegal.com
13
Nuccitelli, M., Cyber Harassment Internet defamation and Internet troils, IPREDATOR INC (2019),
http://www.ipredator.co
this is a form of terrorism.14 The cyber- terrorist is a criminal who uses computer technology
and the internet, especially to cause fear and disruption.15 It includes internet bomb threats,
governments and organizations.16 It is the intentional use of computer, networks, and public
internet to cause destruction and harm for personal objectives and these objectives may be
Email Phishing
One of the easiest forms of cyber attack for a criminal to carry out is phishing that uses
deceptive e-mails and websites and the goal is to trick the email recipient into believing that
the message is something they want or need e.g. a request from bank, and to click a link or
download an attachment.18
Internet Fraud
Internet fraud refers to any type of fraud scheme that uses email, web sites, chat rooms or
financial institutions or to others connected with the scheme.19It is the use of internet
14
Nosrati, M., Hariri, M. & Shakarbeygi, A., Computers and Internet: From a Criminological View,
International Journal of Economy, Vol. 2 (4), Management and Social Sciences, 104-107 (2013)
15
Vocabulary.com dictionary; https://www.vocabulary.com
16
Curran, P., Cyber Terrorism: How real Is The Threat?, Checkmarx, (2016)
17
Masoud Nosrari, Mehdi Hariru , et. al., Computers and Internet: From a Criminological View, 2(4),
International Journal of Economy, Management and Social Sciences, 104-107 (Apr. 2013).
18
Josh Fruhlinger, What is phishing? How This Cyber Attack Works and How This Cyber Attack
works and How to Prevent It, CSO, (Feb., 2019).
19
Australian Federal Police, Internet Fraud, (November 19, 2019), https://police.act.gov.au.
instances of internet fraud include business fraud, credit card fraud, internet auction fraud,
Password Trafficking
For the users of computerized information system the most common control mechanism id
the use of password. The developments of technology have made passwords vulnerable to
successful attacks of the intruders. Password trafficking refers to the act of sharing, selling
or buying stolen passwords which can be used by criminals to gain access to the victim’s
bank account on his personal records.21 It is acquiring someone’s password and posting it on
Malware
Malware is short for malicious software, is a blanket term for viruses, worms, torjans and
other harmful access to sensitive information.23 These are the programs that can attack
computers, phones, tablets or any other such digital devices. It is a software programs which
access to the computer or by using privilege escalation to gain remote administrator access.24
These malware can infect the computer by different ways like:-worm- that reproduces itself,
virus- that spreads through normal programs and slows down the device. Trojan- that cannot
reproduce itself but masquerades as something the user wants and tricks them into
20
FBI, Internet Fraud, Scams and Safety, U.S. Department of Justice, U.S.
21
Rock Gassmann, Password Trafficking, Prezis, (November 19, 2019), https://prezi.com
22
Lewis, J. A. & Baird, Z., Cyber Security: Turning National Solutions Into International Cooperation,
25 (4), Significant Issues Series, 62 (2003) .
23
Josh Fruhlinger, What is Malware? How to Prevent, Detect and Recover from it, CSO, (Jan., 2019).
24
Ibid
activating it so it can do its damage and spread.25 Spyware is a software that installs itself on
Cases
The Bank NSP case is the one where a management trainee of the bank was engaged to be
married. The couple exchanged many emails using the company computers. After sometime
the two broke up and the girl created fraudulent email ids such as “Indian bar associations”
and sent emails to the boy’s foreign clients. She used the banks computer to do this. The
boy’s company lost a large number of clients and took the bank to court. The bank was held
In U.S. v. Joseph C. Bledesoe27 the defendant was convicted for knowingly publishing a
notice over the internet offering to exchange child pornography in violation of 18 U.S.C. §
2251(d)., the defendant appeal this conviction and sentence. The U.S. Court of Appeal for the
In the month of February, 2017 the Special Task Force of Uttar Pradesh Police busted one of
the biggest internet frauds, and arrested the trio of Anubhav Mittal, Sridhar Prasad and
Mahesh Dayal from Sector 63 and seized nearly Rs. 500 crore. The accused used to run a
portal ‘socialtrade biz’ under which an investor had to pay anything between Rs. 5750 to Rs.
57,500 in the company account to become the member and earn Rs. 5 per click.29
25
Ibid
26
Talwant Singh, Cyber Law & Information Technology, (November 19, 2019),
https://delhidistriccourts.nic.in
27
U.S. v. Joseph C. Bledesoe 04/4276, 177 Fed. Appx. 311
28
Vakul Sharma, Information technology: Law And Practice, 217 (3rd ed. Reprint 2012)
29
Ians, Uttar Pradesh police bust online fraud of Rs. 3,700 crore, The Economic Times, Feb. 02, 2017
economictimes.indiatimes.com
A British teenager arrested in FBI sting over internet bomb threats sent to US schools,
universities and airports. FBI linked him to a series of bomb hoaxes on Twitter that led to
The State of Tamil Nadu v. Suhas Kutti31 case is related to the posting of obscene,
defamatory and annoying message about a divorcee woman in Yahoo Messenger Group. In
this case emails were sent to the victim through a false email account opened by accused in
name of the victim asking for information. This resulted in annoying phone calls to the lady.
The accused was a well known family friend and was interested in marrying her but she
married another person and this marriage ended with a divorce. The accused started
contacting her once again, on her refusal to marry him; the accused harass her through the
internet. In this case 18 witnesses and 34 documents and material objects were examined.
The Court needed the expert’s advice of NAAVI and other evidences including Cyber Cafe
Owners. The accused was found guilty u/s 469, 509 of IPC and 67 of IT Act and was convicted
and sentenced for rigorous imprisonment for 2 years u/s 469 of IPC and also to pay a fine of
Rs. 4000.
Conclusion
Everything that has a positive impact also has a negative impact or dark side. Technological
advancement that is for the benefit of humanity is used against the humanity by the criminal
minded person. Due to the better and developed communication technology criminals in the
modern era are more organized and are continually adopting new techniques and their
network goes beyond the national boundaries. Dr. A.P.J. Abdul Kalam, former President of
India, a technocrat also had stated that, technology is definitely an essential element of
change in all spheres of life. The human element involved also is an important factor. If
30
James Tozer, The Daily Mail, MailOnline, June 26, 2015, www.dailymail.co.uk
31
State of Tamil Nadu v. Suhas Kutti 4680 of 2004 Criminal Complaint.
technology is properly used, it can bring about tremendous changes for the betterment of
life. Any change we contemplate is for speedy justice delivery mechanism keeping in focus
32
Avul Pakir Jainulabdeen Abdul Kalam, Address during the launch of computerization of courts in
National University of Advanced Legal Studies, (July 9, 2007).