Professional Documents
Culture Documents
The arrest of famous store room owner at Ghaziabad for allegedly planting secret camera to
make clippings of the female customer while using the trial room has shown adverse impact
upon our concept of privacy. The peeping cameras are becoming technologically advanced,
tiny and easily available at cheaper prices. They can be planted secretly with ease and its
pervasive application has contributed to the growing fascination for younger generation
obsession with voyeurism. The Ghaziabad incident is not an unprecedented act and various
newspapers have reported similar incidents of surreptitiously concealed peeping toms prying
into locker rooms, changing rooms of malls, swimming pools in prurient attempts to film
unsuspecting victims while in various state of undress. The said newspaper reports are
alarming being a very invasive and intimidating crime which also poses a fundamental
challenge to individual privacy.
A new phenomenon of video voyeurism also known as “cyber peeping” has emerged in
recent times where images of private area of subject mostly females are captured without her
knowledge and then transmitted widely without her consent thus violating privacy rights.
Video Voyeurism is the act of secretly or discreetly photographing certain parts of the body
mostly unclothed without the person’s consent. Video voyeurism typically refers to “up-skirt”
or “down-blouse” images taken of women without their consent. We have seen the rise in the
cases of video voyeurism, where the victims have been clicked without ever knowing that
they have been clicked revealing their private parts. The phenomenal growth of the internet
and its user, mostly of the younger age has given rise to this “up-skirt and down-blouse
photography” which one can view easily at host of video voyeurism websites. The voyeurs
who are psychopath to satisfy their lust see surreptitious video surveillance as a form of high-
tech hunting and take pride in showcasing their talent in various video voyeurism Web sites
which has mushroomed at the World Wide Web and mostly go free taking shelter under the
current gap in the law. The Acts of video voyeurism are not only an invasion of a person’s
privacy, but are also a serious threat to the liberties of a free society as we know and also
against our high moral & cultural values or ethos. These criminal activities undermine the
most basic levels of privacy to which every citizen is entitled.
1
Do we have law to deal with menace of Video Voyeurism?
Realizing the ever growing menace of the Video Voyeurism, the USA, passed federal
legislation known as the Video Voyeurism Prevention Act of 2004, which prohibits
knowingly capturing an image of private area of an individual by video tape, photograph,
film, or any means or broadcast without that individual’s consent and under circumstances in
which the individual has a reasonable expectation of privacy. (See relevant Section 1801 of
Video Voyeurism Prevention Act of 2004) Thus the said law, make it a crime to secretly
record or distribute images of people in places where they have a reasonable expectation of
privacy, such as bathrooms, dressing rooms, locker rooms, hotel rooms and mall etc. The law
defines a “private area” as the naked or undergarment clad genitals, pubic area, buttocks, or
female breast of an individual. The law however makes an exception and does not apply to
people engaged in lawful law enforcement or intelligence activities.
In India also, we have seen increasing incidents of video voyeurism due to advance
technology that has made today’s hidden cameras tiny, sleek and adapted for WiFi
connections to make transfer of the captured film or movie clip to the web easier and faster.
Internet is a product of US Technology, so issues relating to Internet are heavily flavoured by
US Constitutional and Legal doctrines. The legislature was aware of this problem and there
was no stringent law to specifically deal with the menace of video voyeurism which was
rampant due to modern technology. The amendment proposed to the IT Act, inserted a new
Section 66E which specifically addresses video voyeurism which is inspired by the Video
Voyeurism Prevention Act of 2004 of US. The wordings of proposed Section 66E which
makes this sort of “cyber peeping” a felony is as under:
2
(a) “transmit” means to electronically send a visual image with the intent that it be viewed
by a person or persons;
(b) “capture”, with respect to an image, means to videotape, photograph, film or record by
any means;
(c) “private area” means the naked or undergarment clad genitals, pubic area, buttocks or
female breast;
(d) “publishes” means reproduction in the printed or electronic form and making it available
for public;
(e) “under circumstances violating privacy” means circumstances in which a person can
have a reasonable expectation that–
(i) he or she could disrobe in privacy, without being concerned that an image of his private
area was being captured; or
(ii) any part of his or her private area would not be visible to the public, regardless of
whether that person is in a public or private place.
Why the Ghaziabad Police have invoked the Indian Penal Code and not the aforesaid
provision of IT Amendment Act?
In the reported cases of similar nature the police have invoked Section 294 IPC (obscene
acts) and Section 509 IPC (insult to modesty of Women) both of which are bailable as per the
1st Schedule to the Code of Criminal Procedure, 1973. The 1 st Schedule to the Cr.P.C.
categorizes the offences as Cognizable/non cognizable or Bailable/non-bailable. The IT
Amendment Act has yet not been notified by the Government and therefore, the offender
cannot be booked under newly inserted Section 66E of the IT Amendment, in view of the
clear mandate of Article20 (1) of the Constitution of India which says that, “No person shall
be convicted of any offence except for violation of the law in force at the time of the
commission of the act charged as an offence….”. However, it would be pertinent to mention
here that aforesaid Section 66E is bailable offence as per the scheme of the yet to be notified
Act and if it would have been invoked had the amendment act been notified, would not have
3
much difference for it would not have any deterrent effect on the offender as he can walk out
freely, the offence being bailable.
Nevertheless, the police should have invoked the provisions of Section 67 IT Act, 2000
(which deals with publication or transmission of obscene information in electronic form)
which is stringent penal provision of the IT Act, 2000 as the same is cognizable and non-
bailable offence and attracts imprisonment of upto five years and fine upto one lakh rupees in
case of first conviction. However, it has been seen that the police in similar cases including
the present one have not resorted to Section 67 IT Act, 2000 for the reasons best known to
them only. The provisions of Section 67 IT Act, 2000 is clearly attracted as there has been
publication or transmission of clippings of female client in various state of undress and same
has been transmitted, generated or received stored in electronic/computer equipment which is
magnetic, optical or similar device. Thus, the offence is complete in view of Section 67 IT
Act read with Section 2 (r) IT Act(defines “Electronic Form”). The provision of Section 67
IT Act, 2000 and Section 2 (r) IT Act is reproduced below:
“Section 2 (r) “electronic form” with reference to information means any information
generated, sent, received or stored in media, magnetic, optical, computer memory, micro
film, computer generated micro fiche or similar device.”
Thus, not invoking the provisions of Section 67 IT Act, 2000 which has a deterrent effect on
the offenders as well as which would deter the prospective offenders to commit the crime, in
a way amounts to shielding the criminal from the criminal process of law and would
4
encourage them to commit the crime with impunity without any fear of law as they know that
they can walk out freely, in view of bailable sections slapped on them by the police.
Definition
Although there is no universally accepted definition, however, some definitions of
Identity theft is given below:-
Identity theft and identity fraud are terms used to refer to all types of crime in which someone
wrongfully obtains and uses another person’s personal data in some way that involves fraud or
deception, typically for economic gain .
Identity Theft is a crime in which an impostor obtains key pieces of personal identifying
information (PII) such as Social Security numbers and driver’s license numbers and uses them for
their own personal gain. This is called ID Theft. It can start with lost or stolen wallets, pilfered
mail, a data breach, computer virus, phishing, a scam, or paper documents thrown out by you or a
business (dumpster diving). This crime varies widely, and can include check fraud, credit card
fraud, financial identity theft, criminal identity theft, governmental identity theft, and identity
fraud.
5
Stages of Identity Theft
There are three stages of identity theft. Any identity theft case may include one or all of these
stages:
Acquisition of the identity: It involves the acquisition of the identity through theft, hacking,
redirecting or intercepting mail or by purchasing identifying information on the internet.
Υ se of the identity: After the acquisition of the identity, the fraudster may use the identity
to commit another crime resulting in financial gain to him like misuse of the credit card
information to make online purchase, opening new accounts, sell the identities to others
who commit fraud. Sometime the stolen information may be used to harass the victim, like
posting of pornography or obscene material by fraudster posing himself as the victim.
Discovery of the theft: Many cases of misuse of credit cards are discovered quickly, however
in some cases the victim of an identity theft may not even know how or when their identity
was stolen and theft may take 6 months to several years to come to the notice of the
victim. Study reveals that the longer it takes to discover the theft, the greater the loss
incurred by the victim.
6
information from unsuspecting Internet users who are gullible enough to respond to these
solicitations.
Theft by past & present employees: Perpetrators can also obtain personal information by
bribing employees who have access to personal records, data bases or confidential information.
Skimming: Skimming can occur when a criminal attaches a small skimmer gadget to an ATM
which records the magnetic stripe details of the ATM card and the camera films the personal
identification number filed by the user.
Shoulder Surfing: The fraudster can also obtain your personal data without breaking into your
homes. In public places, some people loiter around ATM & Telephone Booths who watch your enter
your secret PIN Number or simply looking over your shoulder on a public telephone or just by
eavesdropping if you are giving your credit card information over the phone.
Dumpster Diving: It is a method perpetrators use by going through a victims garbage, dustbins
or trash bins. They obtain copies of cheques, credit card statements, bank statements, receipts,
and carbons and search for anything bearing your name, address, telephone number, and credit
card number.
7
or deletion of their accounts. The e-mail provided a link to a phishing site, in an illegal attempt to
collect personal and account information
Nigerian 419 Scam or Advance Fee Fraud:
There has been number of cases reported where the perpetrators of the fraud send mail to the
victim e-mail id, requesting the help of the victim for retrieving blocked funds and offer a healthy
percentage of these funds as commission. The victim believing the fraudster in lure of receiving
huge funds pass on his credit card information, bank account details to fraudster.
Defamation or posting of porn or obscene material on social networking sites
There has been also spurt of cases in which the victim have reported that their profile and
personal information has been stolen and a fake & vulgar profile in his or her name containing
pornography & obscene material along with the victims contact details like phone numbers &
address has been posted on the social networking site like ORKUT.
8
Section 67 IT Act: When the fraudster uses the stolen information like profile, personal details &
contact details of the victim to create & post obscene profile in the name of the
victim on the social networking site.
SMS Spoofing occurs when a fraudster manipulates address information in order to impersonate a
user that has roamed onto a foreign network and is submitting messages to the home network.
Frequently, these messages are addressed to destinations outside the home network – with the
home SMSC essentially being “hijacked†to send messages into other networks.
1. The home network can incur termination charges caused by the delivery of these messages to
interconnect partners. This is a quantifiable revenue leakage.
2. These messages can be of concern to interconnect partners. Their customers may complain
about being spammed, or the content of the messages may be politically sensitive. Interconnect
partners may threaten to cut off the home network unless a remedy is implemented. Home
subscribers will be unable to send messages into these networks.
3. While fraudsters normally used spoofed-identities to send messages, there is a risk that these
identities may match those of real home subscribers. The risk therefore emerges, that genuine
subscribers may be billed for roaming messages they did not send. If this situation occurs, the
integrity of the home operator’s billing process may be compromised, with potentially huge
impact on the brand. This is a major churn risk.
An SMS Spoofing attack is often first detected by an increase in the number of SMS errors
encountered during a bill-run. These errors are caused by the spoofed subscriber identities.
Operators can respond by blocking different source addresses in their Gateway-MSCs, but
fraudsters can change addresses easily to by-pass these measures. If fraudsters move to using
source addresses at a major interconnect partner, it may become unfeasible to block these
addresses, due to the potential impact on normal interconnect services.