21.07.2013 Views

Dr. Justice V.S. Malimath Report First pages - Ministry of Home Affairs

Dr. Justice V.S. Malimath Report First pages - Ministry of Home Affairs

Dr. Justice V.S. Malimath Report First pages - Ministry of Home Affairs

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

238<br />

These are gradually increasing in our Country too and include counterfeit, stolen as<br />

well as cards which were not received, taking over <strong>of</strong> credit card accounts, mail<br />

order and transactions on the internet.<br />

20.10 Health care frauds: The frauds in this area include inflated bills,<br />

false claims and frauds in the purchase and use <strong>of</strong> pharmaceuticals and equipment.<br />

These would be both in government and the private sector.<br />

20.11 Telecommunications: Fraud in this sector is well over four billion<br />

dollars an year. The main fraud here is in subscription or identity fraud as stolen<br />

Ids or credit cards can be used for free service in anonymity and with impunity.<br />

This includes telemarketing frauds. This kind <strong>of</strong> fraud is endemic and will increase.<br />

20.12 Identity theft: This new type <strong>of</strong> <strong>of</strong>fence consists <strong>of</strong> stealing <strong>of</strong><br />

identity nformatin and using it to obtain credit, hide from the law or live as a local<br />

resident, without being entitled to. Fraud may be perpetrated against financial<br />

institutions, government departments or other private companies or individuals,<br />

using identity theft.<br />

20.13 Intellectual Property and cyber crime: IP theft (copyright,<br />

trademark) industrial/commercial secrets, cyber squatting etc., the cost <strong>of</strong> which<br />

runs to a few hundred billion dollars every year in the US alone.<br />

20.14 Computer Crime: Yet another new type <strong>of</strong> <strong>of</strong>fence which covers<br />

illegal access to information contained in a computer – whether privately or<br />

publicly owned in which either fraud is committed using computers or used for<br />

sending threatening messages. These could be used for activities threatening a<br />

Country’s security.<br />

20.15 Technology and crime: With increasing e-commerce, there is<br />

increase in cyber economic crime. For every economic crime, there is a cyber<br />

version with much more potential, larger pr<strong>of</strong>its and lesser risks. While the ecommerce,<br />

as a system is speedy and efficient, its very speed and efficiency are<br />

creating problems. The Internet has made all borders and legal jurisdictions<br />

obsolete. Criminals can remain in one jurisdiction and commit crimes elsewhere<br />

and avoid prosecution. Therefore, a high degree <strong>of</strong> co-ordination to prevent crime<br />

and co-operation to prosecute and punish crime become essential especially as the<br />

proceeds <strong>of</strong> these crime go into further crimes including drugs and arms.<br />

20.16 Pornography (including child pornography):<br />

These <strong>of</strong>fences involve violence against women and children.<br />

These <strong>of</strong>fences would cover manufacture, possession and commercial

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!