ANALOGOUS OFFENSES VS. DIGITAL DELINQUENCY: EXPLORING CONVENTIONAL CRIMES AND CYBER CRIME
AUTHORED BY - DR. BHAVANA SHARMA[1]
ABSTRACT: As society becomes increasingly digitized, the landscape of criminal behaviour evolves in tandem. This paper delves into the comparative analysis between traditional, or analogous offenses, and the emerging realm of digital delinquency, commonly known as cybercrime. By examining parallels, distinctions, and intersections between these two spheres of criminal activity, this study seeks to elucidate the complex dynamics shaping modern criminality. Through a multidisciplinary approach, encompassing criminology, sociology, and technology studies, we explore the motivations, methods, and consequences associated with both conventional crimes and cyber offenses. Furthermore, this research aims to highlight the challenges faced by law enforcement agencies, policymakers, and legal systems in adapting to the shifting landscape of criminal behaviour. By fostering a deeper understanding of the relationship between analogous offenses and digital delinquency, this study endeavours to inform strategies for prevention, intervention, and prosecution in an increasingly digital world.
Furthermore, this paper investigates the challenges and opportunities presented by digital delinquency in terms of law enforcement, judicial systems, and societal responses. By elucidating the similarities and differences between analogous offenses and cybercrimes, this research aims to inform policymakers, law enforcement agencies, and the public about the multifaceted nature of contemporary criminal activity, thus facilitating more effective strategies for prevention, detection, and intervention.
INTRODUCTION: In today's technologically driven society, the landscape of crime has expanded to include not only conventional offenses but also a myriad of cybercrimes. This paper delves into the parallels between traditional criminal activities and their digital counterparts, analysing similarities, disparities, and the evolving nature of criminal behavior in the digital age.
Drawing upon interdisciplinary research from criminology, sociology, and computer science, this study examines how analogue and digital offenses intersect and diverge. Through a comparative analysis, we explore the underlying motivations, methods, and consequences of both types of crime, shedding light on the intricate dynamics shaping criminal behavior across different mediums.
In an increasingly digitized world, the landscape of criminal activity has undergone a profound transformation. Traditional forms of crime, such as theft, fraud, and vandalism, have found new avenues of expression in the digital realm. This shift has given rise to a new category of offenses known as cybercrime. As society grapples with the complexities of this emerging threat, it becomes imperative to understand the parallels between conventional crimes and their digital counterparts.
The study of analogous offenses versus digital delinquency provides a lens through which to examine the interconnectedness of criminal behavior across physical and virtual domains. By exploring the similarities and differences between traditional crimes and cybercrime, we can gain valuable insights into the underlying motivations, methods, and impacts of illicit activities in both contexts.
By elucidating the parallels and distinctions between analogue and digital forms of delinquency, we hope to foster a deeper understanding of the challenges posed by cybercrime and inform strategies for prevention, detection, and mitigation. In doing so, we endeavour to contribute to the on-going discourse surrounding the intersection of technology and criminal justice, ultimately striving towards a safer and more secure digital future.
UNDERSTANDING CONVENTIONAL CRIMES: Conventional crimes, also known as traditional or common crimes, refer to offenses that have been established and codified in law for a significant period. These are typically the types of crimes that people are most familiar with, as they often involve tangible harm or threat to individuals or property. Here are some key points to understand conventional crimes:
LEGAL DEFINITION: Conventional crimes are defined by laws enacted by legislative bodies within a particular jurisdiction. These laws outline specific behaviours that are prohibited and the corresponding penalties for those who engage in them.
CATEGORIES OF CONVENTIONAL CRIMES: Conventional crimes can be broadly categorized into several types, including:
Understanding Cyber Crimes: Cyber-crimes refer to criminal activities carried out using computers, networks, or digital devices as either tools or targets. These crimes can range from relatively simple activities like spreading viruses to complex schemes like hacking into government databases or financial institutions. Understanding cyber-crimes involves recognizing various types and their implications:
Understanding cyber-crimes also involves recognizing the importance of cyber security measures to prevent and mitigate such threats. This includes implementing robust security protocols, educating users about online safety practices, regularly updating software and systems, and fostering international cooperation to combat cybercrime effectively. Additionally, laws and regulations must continually evolve to address emerging cyber threats and hold perpetrators accountable.
Motivations for Cybercrime:
Impact of Cybercrime:
Evolution of Cyber Crimes: The evolution of cyber-crimes has been a dynamic and complex process closely intertwined with the advancement of technology. Here's a brief overview of how cyber-crimes have evolved over time:
In the early days of computing, cyber-crimes were relatively simple and often involved hacking into computer systems for curiosity or personal gain. Malicious activities included unauthorized access to networks, data theft, and spreading viruses via floppy disks. The motivations were often thrill-seeking, experimentation, or financial gain.
Overall, the evolution of cyber-crimes reflects the ever-changing landscape of technology and the constant battle between cyber criminals and cyber security professionals to stay ahead of emerging threats. As technology continues to advance, cyber-crime is likely to remain a persistent and evolving threat. Definition and examples of cyber crimes
Comparing Analogous Offenses and Digital Delinquency: Analogous offenses and digital delinquency may share similarities in terms of their nature and impact, but they also have distinct characteristics due to the unique environments in which they occur.
Analogous offenses typically refer to traditional forms of criminal behavior that occur in physical spaces, such as theft, vandalism, assault, and fraud. These offenses have been prevalent throughout history and are often governed by established legal frameworks.
Digital delinquency, on the other hand, involves criminal behavior that occurs in digital spaces, primarily facilitated by the internet and digital technologies. This can include cyber bullying, hacking, identity theft, online fraud, and distribution of illegal content such as child pornography or pirated material.
Comparing the two:
Difference between Conventional Crime and Cybercrime[2]:
Basis |
Cybercrime |
Conventional crime |
Methods used to commit the crime |
These crimes basically involve the use of computers, the internet, or other digital devices to commit a crime. Examples of cybercrimes include malware attacks, identity theft, and online fraud. |
Conventional crime typically involves physical force or the threat of physical force to commit the crime. Examples of conventional crimes include theft, assault, and burglary. |
Duration of detection |
Remain undetected for a long period as there is no physical presence and no on-ground evidence. |
Get detected immediately because it leaves physical traces of the crime. |
Types of victims targeted |
Cybercrime targets online interconnected systems, digital assets, and sensitive personal information or health information. |
Conventional crime tends to target individuals or physical assets such as offices, relatives, and homes. |
Scale of crime |
Cybercrimes are committed on a large scale because in such a crime physical proximity to the victim is not required. e.g.- A single computer can hack thousands of bank websites. and loot them at a single instance. |
on a limited scale as conventional crime comes in physical proximity to the victim. e.g.- A robber can rob one or two banks in a single day only. |
Types of Consequences |
Victims of cybercrime experience damage to their digital reputation or loss of sensitive personal information that can be used for identity theft. |
Conventional crime can have physical, emotional, and financial consequences for victims. |
Examples |
Spamming, Phishing, Hacking, Cyberbullying, Cyberstalking, Malware, and many more. |
Murder, Extortion, Bullying, and many more. |
In summary, while there are similarities between analogous offenses and digital delinquency, they also have distinct characteristics that require tailored approaches to prevention, investigation, and enforcement. As society becomes increasingly digital, addressing digital delinquency effectively is becoming increasingly important.
Impact: Both types of offenses can have significant emotional, financial, and physical impacts on victims.
Analogous offenses may result in immediate physical harm or loss of property, while digital delinquency can lead to identity theft, financial fraud, data breaches, and other forms of cyber harm.
Legal and Regulatory Frameworks: Analogous offenses are typically governed by traditional legal systems and regulations. Digital delinquency poses unique challenges for lawmakers and law enforcement due to the borderless nature of the internet and the rapid evolution of technology. New laws and regulations are continually being developed to address cybercrime.
Overall, while analogous offenses and digital delinquency share some commonalities in terms of intent and impact, their modus operandi and the way they affect individuals and society differ significantly due to the distinct characteristics of the physical and digital worlds.
IT Act:
Digital Signature and Electronic Signature- Digital signature means authentication of any electronic record by means of an electronic method or procedure as provided under Sec 3 of the Act. A subscriber can authenticate any electronic record or identification by electronic signature or electronic authentication. An Amendment to the IT Act in 2008 introduced the term electronic signatures[3].
E-Governance- Electronic Governance is dealt with under Sections 4 to 10A of the IT Act, 2000. It provides for legal recognition of electronic records and Electronic signature and also provides for legal recognition of contracts formed through electronic means. Filing of any form, application, issue or grant of any license or payment in Government offices and its agencies may be done through the means of electronic form[4].
Regulation of Certifying Authorities- The IT Act provides for the Controller of Certifying Authorities (CCA) to provide license and regulate Certifying Authorities. The Certifying Authorities (CAs) issue digital signature certificates for electronic authentication of subscribers. The CCA certifies the public keys of CAs using its own private key, which enables users in the cyberspace to verify that a given certificate is issued by a licensed CA[5].
Duties of Subscribers- Duties of subscribers are mentioned in Chapter VIII under Sections 40-42. Subscriber means a person in whose name the electronic signature certificate is issued. A subscriber is in a way a customer or a buyer. Duties of subscribers are as followed[6]:
Sec 40: The subscriber has to generate public key pair by applying the security procedure when any Digital Signature Certificate has been accepted by a subscriber, the public key of which (Digital Signature Certificate) corresponds to the private key the subscriber which is to be listed in the Digital Signature Certificate.
Sec 41(1): He shall demonstrate acceptance of the digital signature certificate generated by the certifying authority- to one or more persons, in a repository or otherwise.
Sec 41(2): He shall provide correct information.
Sec 42(1): He shall take reasonable care to retain control of the private key corresponding to the public key listed in his Digital Signature Certificate and shall prevent its disclosure.
Sec 42(2): If the private key corresponding to the public key listed in the Digital Signature Certificate has been compromised, then, the subscriber shall communicate the same without any delay to the Certifying Authority.
He shall use the certificate only for the authorized purposes as specified in the certifying authority’s CPS.
He shall notify any changes in the information without any delay[7].
He shall terminate the use of the certificate if the information in the certificate is found to be incorrect and misleading.
Penalties and Adjudications: Penalties and adjudication are provided under Chapter IX from Sec 43-47.
Penalties:
Section 43: If any person without the permission of the owner or any other person who is in charge of a computer, computer system or computer network causes damage to it, then he shall be liable to pay damages by way of compensation to the person so affected.
Section 43A: Where a body corporate fails to protect any personal data which it possess or deals with in its computer resource, thereby causing wrongful loss or wrongful gain to any person, such body corporate shall be liable to pay damages by way of compensation to the person so affected.
Section 44: (a) If any person fails to furnish any document, return, report to the controller, or certifying authority fails to furnish the same, he shall be liable to a penalty not exceeding one lakh and fifty thousand rupees for each such failure;
(b) If any person fails to file any return or furnish any information, books or other documents within the time specified in the regulations, he shall be liable to a penalty not exceeding five thousand rupees for every day during which such failure continues
(c) If any person fails to maintain books of accounts or records, he shall be liable to a penalty not exceeding ten thousand rupees for every day during which the failure continues.
Section 45: If any person contravenes any rules or regulations made under this Act, for which no penalty has been separately provided, then he shall be liable to pay a compensation not exceeding twenty-five thousand rupees to the person affected by such contravention or a penalty not exceeding twenty-five thousand rupees[8].
Case studies illustrating analogous offenses and digital delinquency: Analogous offenses and digital delinquency often intersect in legal contexts, drawing comparisons and contrasts based on the underlying principles rather than the medium of the offense. Here's a comparison between analogous offenses (traditional crimes) and digital delinquency (cybercrimes), along with some relevant case laws:
Fraud:
Analogous offense: Fraud committed through deception or misrepresentation, such as wire fraud or mail fraud.
Digital delinquency: Cyber fraud involving online scams, phishing, identity theft, or financial fraud through digital platforms.
Case law example: United States v. Mitnick[9] involving computer and wire fraud committed by Kevin Mitnick, a notorious hacker.
Indian Case Law: The Information Technology Act, 2000, and its amendments deal with cyber fraud cases. Notable cases include the State of Maharashtra v. Vijay Vishwanath Patil[10], which involved fraudulent emails to siphon off funds.
Theft:
Analogous offense: Theft of physical property, such as burglary, robbery, or shoplifting.
Digital delinquency: Cyber theft, including hacking into systems to steal data, intellectual property, or financial assets.
Case law example: Sony Pictures Entertainment Inc. v. George Hotz (2011), a case involving the hacking of Sony's PlayStation Network and subsequent theft of personal data.
Indian Case Law: Sections 378 to 382 of the IPC cover theft-related offenses. Notable cyber theft cases include the State of Tamil Nadu v. Suhas Katti[11], involving the theft of intellectual property through hacking.
Defamation:
Analogous Offense: Defamation involves harming someone's reputation through false statements.
Digital Delinquency: Online defamation occurs through social media posts, blog articles, or comments that tarnish someone's reputation.
Indian Case Law: The Indian Penal Code (IPC) and the IT Act address online defamation. Case law includes Subramanian Swamy v. Union of India[12], where the Supreme Court upheld the constitutionality of criminal defamation laws.
Harassment:
Analogous offense: Stalking, bullying, or harassment through physical means or telecommunications.
Digital delinquency: Cyber bullying, online harassment, or stalking using digital platforms like social media or messaging apps.
Case law example: Elonis v. United States[13] , a Supreme Court case addressing threats made on Facebook and whether they constituted true threats or protected speech under the First Amendment.
Indian Case Law: The IPC and the IT Act address cyber harassment. The case of Sharat Babu Digumarti v. Government of NCT of Delhi[14] dealt with online harassment and stalking.
Copyright Infringement:
Analogous offense: Unauthorized reproduction, distribution, or use of copyrighted material.
Digital delinquency: Online piracy, file sharing, or distribution of copyrighted content without permission.
Case law example: MGM Studios, Inc. v. Grokster, Ltd.[15], a landmark case involving the liability of file-sharing services for copyright infringement committed by their users.
Cyber bullying:
Analogous offense: Harassment or bullying in physical environments like schools or workplaces.
Digital delinquency: Bullying or harassment carried out through digital means, often targeting individuals online.
Case law example: Ravi v. State (2016), a case involving cyber bullying and invasion of privacy charges related to the suicide of Tyler Clementi, a college student.
These comparisons highlight how traditional legal concepts apply in the digital realm and how courts interpret and adapt existing laws to address emerging cybercrimes.
Legal and Ethical Considerations: When comparing analogous offenses to digital delinquency, it's essential to navigate legal and ethical considerations carefully. Here's a breakdown:
ii. Ethical Considerations:
a. Analogous Offenses: Ethical considerations in dealing with analogous offenses involve issues like fairness, justice, and the protection of individuals' rights. For instance, ensuring that the punishment fits the crime and that the accused receives a fair trial are critical ethical principles.
b. Digital Delinquency: Ethical considerations in digital delinquency extend to concerns about privacy, consent, freedom of expression, and the responsible use of technology. Ethical frameworks may include principles like respecting individuals' online identities, safeguarding personal data, and promoting digital citizenship.
Intersection of Legal and Ethical Considerations:
a. Balancing Rights and Responsibilities: Both legal and ethical considerations require a delicate balance between protecting individuals' rights and holding perpetrators accountable for their actions.
b. Adapting Laws to the Digital Age: With the rapid evolution of technology, lawmakers face the challenge of updating legal frameworks to address new forms of digital delinquency while upholding ethical standards.
c. Global Cooperation: Given the borderless nature of the internet, addressing digital delinquency often requires international cooperation and coordination among legal authorities and ethical guidelines to ensure consistency and fairness across jurisdictions.
In summary, navigating the legal and ethical landscape of analogous offenses versus digital delinquency requires a nuanced understanding of existing laws, emerging technologies, and ethical principles to ensure a just and equitable approach to addressing digital crimes and misbehaviours.
Challenges in prosecuting cyber-crimes: Prosecuting cyber-crimes presents a range of challenges due to the nature of digital offenses and the global landscape of the internet. Here are some key challenges:
Addressing these challenges requires a multi-faceted approach involving international cooperation, investment in technology and training, legal reforms to enhance jurisdictional cooperation, and collaboration between the public and private sectors to combat cyber-crime effectively.
Future Trends and Challenges: Cybercrimes are continually evolving as technology advances, presenting new challenges for law enforcement and cyber security professionals. Here are some future trends and challenges in cybercrime:
Addressing these future trends and challenges in cybercrime requires collaboration between governments, law enforcement agencies, cyber security professionals, technology companies, and other stakeholders to develop proactive strategies, share threat intelligence, and implement robust cyber security measures.
Conclusion: Cybercrimes are a multifaceted challenge that continues to evolve alongside technological advancements. As we conclude, it's evident that combating cybercrimes requires a multifaceted approach involving collaboration between governments, law enforcement agencies, cyber security experts, tech companies, and individuals. Here are some key points:
In conclusion, while cybercrimes present significant challenges, addressing them requires a concerted effort from all stakeholders. By raising awareness, implementing robust laws and regulations, investing in cyber security measures, fostering collaboration, and considering ethical considerations, we can mitigate the risks posed by cyber threats and create a safer digital environment for all.
[1] Assistant Professor, School of Legal Studies, Himachal Pradesh University Regional Centre, Dharamshala, HP.
[2] Difference Between Conventional Crime and Cybercrime, https://www.geeksforgeeks.org/difference-between-conventional-crime-and-cybercrime/ (browsed on 25.12.2021)
[3] Shambhavi Tripathi, Regulatory Framework for Cyber Crimes : Facts to know about, https://blog.ipleaders.in/regulatory-framework-for-cyber-crimes/ (browsed on 25.12.2021)
[4] Ibid.
[5] Supranote 3.
[6] Ibid.
[7] Supranote 3.
[8] Supranote 3.
[9] 1999.
[10] WRIT PETITION No. 56/2003.
[11] CC No. 4680 0f 2004.
[12] (2016) 7 SCC 221
[13] 575 U.S. 723(2015).
[14] Criminal Appeal No. 1222 of 2016.
[15] 545 U.S. 913(2005).
Authors: DR. BHAVANA SHARMA
Registration ID: 102759 | Published Paper ID: 2759
Year : Sep -2022 | Volume: 2 | Issue: 16
Approved ISSN : 2581-8503 | Country : Delhi, India
Page No : 22
Doi Link :