Dr. Justice V.S. Malimath Report First pages - Ministry of Home Affairs
Dr. Justice V.S. Malimath Report First pages - Ministry of Home Affairs
Dr. Justice V.S. Malimath Report First pages - Ministry of Home Affairs
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
238<br />
These are gradually increasing in our Country too and include counterfeit, stolen as<br />
well as cards which were not received, taking over <strong>of</strong> credit card accounts, mail<br />
order and transactions on the internet.<br />
20.10 Health care frauds: The frauds in this area include inflated bills,<br />
false claims and frauds in the purchase and use <strong>of</strong> pharmaceuticals and equipment.<br />
These would be both in government and the private sector.<br />
20.11 Telecommunications: Fraud in this sector is well over four billion<br />
dollars an year. The main fraud here is in subscription or identity fraud as stolen<br />
Ids or credit cards can be used for free service in anonymity and with impunity.<br />
This includes telemarketing frauds. This kind <strong>of</strong> fraud is endemic and will increase.<br />
20.12 Identity theft: This new type <strong>of</strong> <strong>of</strong>fence consists <strong>of</strong> stealing <strong>of</strong><br />
identity nformatin and using it to obtain credit, hide from the law or live as a local<br />
resident, without being entitled to. Fraud may be perpetrated against financial<br />
institutions, government departments or other private companies or individuals,<br />
using identity theft.<br />
20.13 Intellectual Property and cyber crime: IP theft (copyright,<br />
trademark) industrial/commercial secrets, cyber squatting etc., the cost <strong>of</strong> which<br />
runs to a few hundred billion dollars every year in the US alone.<br />
20.14 Computer Crime: Yet another new type <strong>of</strong> <strong>of</strong>fence which covers<br />
illegal access to information contained in a computer – whether privately or<br />
publicly owned in which either fraud is committed using computers or used for<br />
sending threatening messages. These could be used for activities threatening a<br />
Country’s security.<br />
20.15 Technology and crime: With increasing e-commerce, there is<br />
increase in cyber economic crime. For every economic crime, there is a cyber<br />
version with much more potential, larger pr<strong>of</strong>its and lesser risks. While the ecommerce,<br />
as a system is speedy and efficient, its very speed and efficiency are<br />
creating problems. The Internet has made all borders and legal jurisdictions<br />
obsolete. Criminals can remain in one jurisdiction and commit crimes elsewhere<br />
and avoid prosecution. Therefore, a high degree <strong>of</strong> co-ordination to prevent crime<br />
and co-operation to prosecute and punish crime become essential especially as the<br />
proceeds <strong>of</strong> these crime go into further crimes including drugs and arms.<br />
20.16 Pornography (including child pornography):<br />
These <strong>of</strong>fences involve violence against women and children.<br />
These <strong>of</strong>fences would cover manufacture, possession and commercial