HIGH PROFILE CASES OF WHITE COLLAR CRIMES IN INDIA
- Admin

- Feb 18
- 24 min read
Updated: 2 days ago
Author- Mansi Shekhawat

ABSTRACT
White-collar crimes in India have transformed from conventional embezzlement to sophisticated, technology-driven financial frauds that pose a serious threat to the nation's economic stability. The paper throws light on a few prominent cases-the Harshad Mehta Securities Fraud, the Satyam Accounting Scandal, and the Punjab National Bank (PNB) Fraud-that attempt to analyse the systemic weaknesses that were successfully exploited by persons of high social and professional standing. Landmark cases give examples of a set pattern of stock manipulation, falsification of accounts, and misuse of banking instruments such as Letters of Undertaking (LoUs).
The study underlines that such crimes have now gradually entered the electronic era, having challenges like cyber-forensic evidence and money laundering via cryptocurrency for the enforcement agencies like ED and SFIO. Besides the modernized legal frameworks such as Bharatiya Nyaya Sanhita (BNS) and more stringent SEBI regulations, prosecution is still limited with judicial delays and complexities introduced by digital evidence. The study thus identifies combating of white-collar crime as being essentially multiagency in nature, supplemented by heightened corporate governance and AI-driven auditing for the restoration of public confidence and integrity of India’s financial markets.
The development of white-collar delinquency in India has marked a shift from "paper-based" fraud to "code-based" fraud. While the Harshad Mehta scandal brought to light the weaknesses of physical bank documents and the Satyam scam revealed the dangers of "creative accounting," the PNB-Nirav Modi scam showed how the SWIFT messaging system could be used to exploit the vulnerabilities of traditional banking instruments such as Letters of Undertaking (LoUs). This shift to the digital world calls for a complete reset of the "fraud triangle" of opportunity, pressure, and rationalization in the light of the Bharatiya Nyaya Sanhita (BNS). The battle lines for organizations such as the Enforcement Directorate (ED) and the SFIO have moved from the physical ledger to the encrypted blockchain and the offshore server. As a result, the remedy for economic crimes is no longer the sole domain of punitive laws but the use of RegTech (Regulatory Technology) and the strategic incorporation of AI forensics to fill the gap between high-tech crime and judicial delivery.
Keywords: White-Collar Crime, Corporate Fraud, Financial Scams, Securities Fraud, Money Laundering, Economic Offenses, Systemic Vulnerabilities, Corporate Governance, Enforcement Directorate (ED), SEBI (Securities and Exchange Board of India), Forensic Auditing, Bharatiya Nyaya Sanhita (BNS), Cyber-Forensics, Letters of Undertaking (LoU), Public Sector Banking.
INTRODUCTION
The scenario that pertains to the economy of India has seen a tremendous change since the liberalization periods of the 1990s and has witnessed unprecedented growth amidst a sophisticated rise of white-collar crime. Unlike other crimes that involve the use of physical force, white-collar crime in India can be described as fraud, deception, and a lack of trust that occurs when the culprit holds a position of prestige and great social status. As the country moves towards the realization of a global economic giant, the rise of financial malpractices, ranging from sophisticated tax evasion to banking frauds, has come up as a major hindrance to this goal. These are no ordinary acts of avarice; they are a symptom of the gaps that are being noticed in the corporate structure.[1]
Historically, the development of white-collar crimes in the Indian environment can be traced through a series of high-profile crimes that fundamentally shifted the public's understanding of business ethics. From the Harshad Mehta scam, which laid bare the flaws in the banking-securities interface, to the collapse of the Satyam Computers scam, referred to as "India's Enron," there have been numerous instances of how auditors and external scrutiny can be [2]misled with creative accounting ploys. In recent times, there appears to be a growing trend within white-collar crimes in terms of high-stakes defaults in banks, and the fraudulent use of international instruments for trade, [3]exemplified in the Nirav Modi and Vijay Mallya scams. Such crimes have brought to light a worrisome trend within the offenders, who notwithstanding their close ties with power and financial expertise, seem to systematically deflect the scrutiny of the authorities with corresponding massive losses to the public sector banks, and the taxpayer in general.
The digital metamorphosis of economic offenses has introduced a layer of "jurisdictional opacity" that traditional investigative protocols struggle to pierce. As financial transactions migrate to decentralized ledgers and encrypted networks, the digital footprint of a white-collar criminal becomes increasingly fragmented across global tax havens and anonymous crypto-wallets. This technological obfuscation creates a significant "intelligence gap" for agencies like the Serious Fraud Investigation Office (SFIO) and the Central Bureau of Investigation (CBI), where the speed of asset dissipation often outpaces the issuance of judicial warrants.
In the modern technology era, the complexity of these crimes can be further multiplied due to the involvement of technology, which makes it even harder to track and investigate these crimes and punish the culprits. Cyber-financial crimes, the use of tax havens, and the use of cryptocurrencies to launder money pose challenges to the existing mechanisms of investigation and prosecution agencies such as the Serious Fraud Investigation Office (SFIO) and the Central Bureau of Investigation (CBI). Now that the country is entering an even tighter legal framework with the enactment of the Bharatiya Nyaya Sanhita (BNS)[4] and the intensified PMLA provisions, it is the need of the hour to critically discuss these high-level crimes and see whether the existing legal reforms are adequate to treat the high-level offenders and restore the integrity of the country’s institutions related to the economy.
DEFINING THE TERM AT THE EARLIEST ERA
White-collar crime as a major sociological and legal category came into being through the pioneering work of Edwin H. Sutherland in 1939[5]. Sutherland opposed the dominant view that crime was a lower-class phenomenon when he introduced the term "white-collar crime" and defined it as offenses committed by persons of respectability and high social status in the course of their occupation. The emphasis he gave to class and social position highlighted the criminality that had remained hidden within the elite strata in society, who often are immune from the stigma or legal action that accompanies street crimes. Sutherland underscored the idea that criminal acts by professionals, businessmen, and corporate leaders may be socially damaging, just like conventional crimes. In this way, Sutherland redirected criminological inquiry toward understanding how power, privilege, and opportunity Mold criminal behaviour. In India, this analytical framework is particularly germane for understanding the case of the Harshad Mehta securities scam, in which social prestige and occupational credibility played key roles in perpetrating financial manipulation at the systemic level.
As criminological thought developed, scholars like Herbert Edelhertz furthered Sutherland's framework to overcome its deficiencies. For Edelhertz, white-collar crime need not be restricted to the high social echelons of society but should, instead, be defined by the nature of an act-of the way in which fraud, concealment, or violation of trust is employed without the threat of violence for financial or personal gain.[6] Such a recasting of the definition from offender-based to act-based permitted a broader, more inclusive understanding of non-violent economic crimes. By concentrating on modus operandi-means such as fraud, embezzlement, insider trading, and cybercrime-Edel hertz’s definition takes into account that persons from different occupational levels can commit white-collar illegalities.
In an Indian perspective, this kind of approach brings about a modern understanding of crimes such as online financial scams, tax evasion, and misuse of digital corporate systems[7]; it highlights how technology and access to sensitive monetary information have opened avenues for advanced economic offenses to the democratic majority. Building on these foundations, the scholarship of Marshall Clinard, Richard Quinney, and Gilbert Geis furthered this analysis by focusing on how institutional and corporate structures facilitate such crimes. [8]Their differentiation between occupational crime-offenses committed by individuals for personal benefit-and corporate crime-offenses committed by executives or agents to benefit the organization-assisted in crystallizing the complex relationship between individual motivation and institutional policy. [9]This organizational perspective underlines how corporate entities can function as vehicles for systemic malfeasance, often muddling the line between personal enrichment and corporate interests. A fruitful example in this respect is the Satyam Computer Services fraud in India, where forged accounting records were used to maintain stock prices at artificially high levels and boost corporate reputation, eventually demonstrating how institutional authority and structural opportunities can perpetuate white-collar criminality. [10]Thus, the development of white-collar crime theory-from Sutherland's emphasis on the elite offender to more recent approaches that focus attention on the deceptive mechanisms and organizational locations of such crimes-reflects a tendency toward a more complete understanding of the way power, opportunity, and deception interlink in the domain of economic and corporate crime.
NATURE & SCOPE
White-collar crime in India is of the highest sophistication and involves greater reliance on intellectual skills rather than physical force. Unlike other conventional crimes, the methods employed in these crimes involve cheating, deceit, breach of trust, and use of power and authority in various forms.[11] The principal characteristic of these crimes is their non-violent yet exploitative features. What matters in the commission of these crimes is the use of the ‘pen' and ‘computer' instead of guns and force. It is more challenging to investigate and secure convictions in these types of crimes, as they are likely to be concealed behind the shield of legitimate business or professional activity. In the Satyam case, the misrepresentation of ‘accounts' had hidden the truth of financial deceit, in a professional and expert manner, rather than the truth.
Yet, another factor that defines the nature of white-collar crime is the breach of the trust relationship, otherwise known as the violation of the fiduciary relationship. White-collar offenders, such as company officers, bank officers, professionals, and government officers, exercise their trust relationship to get ahead personally or professionally[12]. The violation of the trust relationship, such that the CEO is deceiving shareholders through misinformation or the government officer is involved in corrupt procurement, erodes the bedrock of integrity of business and government, respectively. [13]It is the subtlety that makes white-collar crimes particularly problematic, since they lack the subtlety involved, such that the use of fronts, forgery, or electronic hiding makes the crimes look respectable, yet the respectability is clouded from the auditors themselves. Also, the intangible damage that is incurred not only contributes to the complexity of the problem but the damage that is incurred, such that the general public, workers, or shareholders, may not directly know that they have lost something to the white-collar crime, thereby producing the misplaced confidence that white-collar crimes are “victimless.”
White-collar crime in India has seen a broad escalation with the country's integration with the global economy and technological advancement in the country. Financial and banking crime has increasingly seen cases of money laundering and other forms of financial misconduct by company executives and financial professionals in the country. [14]Examples of company scams like that of Nirav Modi and the PNB scam illustrate how complex collusion by corporate and financial executives can result in the loss of billions of dollars to financial institutions that provide them with services and financial backup that is required by their vast business networks and investments at home and abroad[15].
Crimes in the corporate world like insider trading, financial statement scams, and what is known as “tunnelling” of firm money into personal pockets of individuals have increasingly seen a rise within this field of crime in India. Crimes in this sector largely illustrate the greed and moral deterioration of a firm and its executives that put money far ahead of moral business practices and behaviours in the conduct of their financial and organizational business at home and abroad in a rapidly changing and competitive world market and economy of today. [16]Medical and crime practices that were largely viewed as moral and professional in India by professionals and citizens of India in their past history and traditions of moral and professional conduct in the country have increasingly seen incidents of deviant professional behaviour of practices in this country based on greed and financial rewards of individuals in this business field of medicine and crime in India today. [17]
In the modern age, the digital revolution has opened up a new dimension in white-collar crime by virtue of cyber-enabled crimes. These include various frauds committed on the Internet, phishing, data manipulation, identity frauds, and money laundering through cryptocurrencies. With the pace that India has embraced the use of financial technology, or FinTech, in the country, there has been an unprecedented rise in opportunities and also corresponding sources of exploitation. [18]These patterns indicate that the future of white-collar crime, as a phenomenon that occurred in the form of isolated acts of fraud related to financial matters, would be transforming itself into a systemic and multi-sector challenge that would not only adversely affect the economy of the country by sabotaging its integrity. Rather, it would also impact the social structure that India as a democratic and developing nation requires to maintain.
CAUSES AND NEED FOR PROTECTION
Factors underlying the occurrence of white-collar crimes in India are diverse, complex, and interconnected, spanning various dimensions of the psychology of human nature, economic factors, and the weaknesses of the legislation and the governance structure in the country. [19]Factors contributing to the commission of the crime in general often get analysed by criminologists, including three critical components of the crime, namely, "pressure or motive to perpetrate the offense, the opportunity afforded by the victims' or other parties' weaknesses, and rationalization to justify the perpetrators' behaviour to themselves." [20]In the case of India, the increased pace of economic expansion, the rise of corporate organizations, and the use of technological advancements have contributed to an increase in each side of the Fraud Triangle, thus facilitating the entry of the respectable professional into economic crime from the legal side.
1. PERSONAL AND PSYCHOLOGICAL ASPECTS
a. Greed and Materialism: On the individual level, many white-collar crimes occur not out of compensating need but from a never-ending craving for greater levels of status, luxury, and power. [21]Rather, the end result of acquisition could easily become boundless, and this is especially how the pressure part of the Fraud Triangle emerges within a contemporary Indian context, where individuals [22](such as business executives or professionals) use their accounts to manipulate finances or take money solely for the purpose of living up to their personal levels of desired material ambition.
b. Rationalization: Psychological Rationalization is absolutely vital because white-collar perpetrators tend to view themselves as "respectable" rather than "criminal," meaning they require an excuse to justify their actions. Typical excuses include “It's only borrowing and I will pay it back,” “It's no loss to the business,” or “We all do business like this in the industry,” which erase feelings of guilt to permit illegal activities to go unchecked for long periods of time. It is in this manner that Rationalization will complete another side of the Fraud Triangle because instead of looking at illegal actions in business as clearly unethical, they can be tolerated in a success-driven culture that ignores ethics.[23]
c. Lack of Moral Fiber: The loss of moral fibre is another subtle reason that results from the assimilation of low ethical norms in educational and professional socialization, which instils individuals with the notion that "success is achieved by any means." The endeavour of professional studies, business training, and organizational settings that centres primarily on performance, profits, and expansion with ethics made merely ceremonial results in people believing that legal and ethical norms could be bent if there is outstanding performance. The lack [24]of moral fibre enables one to easily give in when under pressure when faced with fraud options, as there won't be much strength in resisting when pressured to cross the line.[25]
2. SOCIO-ECONOMIC FACTORS
a. High Competition: A rapidly growing economy is characterized by high levels of competition and competitiveness, which leads to pressure on the organization and management, resulting in demands from shareholders for continuous and unrealistic growth, particularly in such economies where the share of the market and extremely favourable market growth are perceived [26]as potential threats and risks against which management must establish itself by reporting unrealistic growth, resulting in cases such as Satyam, where misleading or interpreted statements of profit and deferral of losses became attractive, as loss of market or loss of investor confidence becomes a threat or risk faced by such management. [27]
b. Peer Pressure and Corporate Culture: Corporate culture can either prevent or promote white-collar crime, and in many Indian companies, there is support for ‘minor’ violations in pursuit of their targets. Newcomers learn delinquent norms through senior members openly justifying ‘-standard industry practice’ activities like ‘false billing, cash payments, or avoidance of regulation.’ Eventually, peer pressure and acceptance by society lead to compliance with group norms, and white-collar crime emerges as ‘socially transmitted behaviour.’ Sutherland's "Differential Association" theory by which newcomers learn delinquent norms by seniors.
c. Social Status and Impunity: Social stratification also makes its contribution to the problem by instilling in people of high social status the conviction that they are somehow “above the law.” Industrialists, bureaucrats, or people connected to politicians may be convinced that their social stature, contacts, or the simple fact that they can hire robust legal teams will save them [28]from the negative consequences of their actions, thereby minimizing the risk element of the cost-benefit calculation when it comes to what they perceive to be “manageable risks” to liberty and reputation, that is, sophisticated economic crimes.
3. SYSTEMIC AND LEGAL FACTORS
a. Lack of Tough Legislation and Enforcement:[29] On the structural side, the failure to close regional loopholes in legislation to reflect new financial and technological realities has in the past presented temptations to take advantage. These relate to electronic signatures, international money transfers, intricately structured corporations, and opaque beneficial ownership that allows wrong-doers to conceal behind layers, but poor cohesion in enforcing the laws that have created the perception that the risk of detection and prosecution has been low compared to the potential reward. Thus, the opportunity aspect in the Fraud Triangle has been created.
b. Delayed Justice and Economic Offenses: Furthermore, the protracted nature of investigation and trial of economic crimes erodes the deterrent effect, encouraging and rewarding complexity and dilatory approaches. [30]If sufficiently lengthy, trials may result in offenders continuing to reap the reward of crime, moving their money, or rebuilding their image in society, as the community and the aggrieved may lose interest. As a result, the cost of committing an economic crime, namely actual punishment, seems far off and manageable, thus encouraging offenders and would-be offenders.
c. Technological Advancement: The rapid development of online banking, payment systems, and FinTech solutions has leapfrogged technology opportunities for fraudsters who continue to outpace efforts by regulators to keep abreast of developments. Perpetrators of these crimes today employ encryption capabilities, anonymization devices, shell companies, and multi-step transactions to make tracing the proceeds of fraud very difficult, in contrast to fraud schemes conducted physically. In this scenario, again, there are simply opportunities for fraud because of a lack of expertise within institutions to adequately respond to these threats.
d. Inadequate Auditing: Last but certainly not the last, the lapses in internal controls and external audits provide a critical enabling factor in preventing the early discovery of any fraud. Poor segregation of duties, absence of surprise audits, and half-hearted audits enable record tampering, cases [31]of transaction with a party known to be closely associated with the enterprise, and ghost or spurious transactions to fly below the radar for many a long year, such as has happened in some high-profile cases of corporate fraud in India. Negligent, overworked, and at times complicit auditors mean the guard is down, and this sends out a message to wrongdoers about the ineffectiveness of expert-level chicanery.
TYPES OF WHITE-COLLAR CRIMES
White-collar crimes can be comprehended in terms of categories, which can include different types such as fraud, insider trade, Ponzi scheme, cybercrime, embezzlement, counterfeiting, money laundering, and espionage[32], each with its own mechanism and purpose. These different types have some significant concepts, which reveal that non-violent and fraud-based crimes can have different applications in relation to financial markets, organizational environments, virtual or cyberspace, and even security environments.
1. Fraud
The fraud is quite comprehensive, as it encompasses various fraud schemes whereby the target is deceitfully persuaded to pay money or hand over property on the strength of some false information or promise or implication of giving something of greater value, such as “10,000” in exchange for a fee, but once the fee is sent, the person making such payments is never sent the “10,000,” as cited in the case example, which is otherwise known as the advance fee fraud, which may otherwise take the guise of lottery fraud, prize fraud, phishing messages, or investment fraud, all of which depend on deceit and abuse of trust or credulity.[33]
2. Insider Trading
Insider trading happens when a person engages in a securities transaction based upon material non-public information to which he or she has had actual or constructive access through his or her relationship to a corporation or its personnel. As described in the case study, when this occurs: "In equity markets a brokerage firm employee is aware of a merger and acquisition before it is announced and acquires/shares a stock of a takeover target firm to realize illicit gains once its price is expected to skyrocket when announced to the general public.” This violates principles of fair and honest financial markets when financial decisions rest on non-public information of a firm and [34]when such information is exploited for gain instead of on equal information principles of honest and fair financial markets when financial decisions rest on non-public information of a firm and when such information is exploited for gain instead of on equal information.
3: Ponzi Scheme
A Ponzi Scheme is a type of investment scam, wherein the gains from the earlier investors come from the money supplied by the newer investors rather than from any business activity that makes money. The concept has been derived from the last name of Charles Ponzi, and such schemes usually give their investors very high guaranteed returns that give the investors a false feeling that the scheme is very successful, hence motivating new investors to join the pool. When the scheme slows down due to a lack of new investors and the business does not actually make money, the Ponzi Scheme crashes like a "house of cards," leaving all but the founders financially shattered while the founders and very few others could possibly have made money.
4. Identity Theft and Other Crimes Online
Identity theft refers to the illegal acquisition and use of another person’s private information like name, Social Security/ID, [35]financial information, or login info for committing financial fraud and other crimes. It is increasingly done through hacking, phishing scams, deceptive websites, or data compromises, which helps the perpetrator create new accounts, take payments, and even withdraw money in another person's name, leading to financial losses, as well as long-term damage to one's reputation, through these actions. Other white-collar crimes facilitated by cyber technology include breaching computer [36]systems for stealing info, modifying records, carrying out unauthorized transactions, or operating an online phishing campaign on a large scale, which uses computers rather than force.
5. Embezzlement
Embezzlement can be described as a type of theft in which a person, authorized to handle funds or assets lawfully, uses them for their own gain. From a simple cashier pocketing money from the cash register to a high-ranking member of a company siphoning [37]huge amounts of cash from company accounts to a separate account for their own gain, embezzlement can be a simple act of greed or a highly sophisticated process. The common feature of embezzlement, however, is the abuse of trust. The perpetrator of embezzlement has access to the assets but uses them for their own gain, pretending they belong to them, usually maintaining a cover of legitimacy of transfer through creating false accounting statements.
6. Counterfeiting:
By counterfeiting, what is generally meant is the illegal production of fake money that looks sufficiently similar to the real money that the recipient will be misled to believe it is real. Rather recently, the advent of improved [38]printing, scanning, and imaging technology has enabled counterfeiters to create ever-more-plausible fake notes, some of which have fooled sufficiently well-adept countermeasures that they have circulated extensively before being discovered, eroding the confidence that the system is supposed to inspire regarding the money that passes through it, and prompting redesigns that the counterfeiter then tries to emulate, thereby calling constantly for upgrades to technology to stay ahead of this problem, one that is likely to continue to recur regardless of what measures stop it this time around.
7. Money Launder [39]
Money laundering is defined as the process by which criminals attempt to make the proceeds of crimes look as if they are from reliable, legal sources. Usually, this is achieved through one of two methods, involving either two parties or two transactions, although it is always carried out in a manner that is rather elaborate, involving what is known as placement, layering, and integration. The placement refers to putting the "dirty money" into the system, while the layering is where it is pushed through different accounts in an attempt to disguise its origins, with integration representing the [40]return of this money into society in a manner that is considered legal when it is actually invested in "laundry" businesses. In essence, it is by combining this "dirty money" with "clean" money, making it rather difficult for it to be traced as it is enjoyed by its criminals.
8. Espionage:
Espionage can be perceived in the perspective of spying in the commercial and security-related states. Espionage can similarly be recognized in the aspect of white-collar crimes for which the actions involve secretly obtaining[41] confidential business and technology information. In the above scenario, a foreign party appears to be collecting proprietary technology from companies such as Apple Inc. using bribed or induced delivery of sensitive information to gain payment to the extent of obtaining trade information. Such issues can be devastating to the business and can significantly threaten the business position in the industry, innovation, and national security of a nation, particularly with critical technology.
SCAMS IN INDIA
1. Harshad Mehta Securities Scam (1990)[42]
Harshad Mehta, stockbroker, is known to have executed one of India’s first big market manipulations in terms of exploiting weak regulation in the Inter-Bank Securities Market and banking practices in the early 1990s. He did this through allegedly fake Bank Receipts (BR) floated in collaboration with the National Housing Bank to fake transactions and thereafter worked out ‘Ready Forward’ (RF) transactions, which are short-term repo transactions between banks, to drain in excess of ₹4,000 crores of funds from the banking system to stock market manipulation. This artificially drove ‘select shares of “Mehta Group Companies”’ prices to stratospheric peaks to create a “speculative bubble” in retail and institutional investments, to result in a Sensex collapse of over 40% and Bank Losses of in excess of ₹1,000 crores once [43]the ‘BR’ scam came to light with a whistleblower’s audit revealing massive irregularities. This market scam revealed fundamental linkages between banking and security sectors’ huge flaws and brought about radical changes through “Janakiraman Committee’s Recommendations, creation of ‘National Stock Exchange’ with ‘screen-based trading,’ and ‘SEBI’s empowerment to oversee stockbrokers and limit circular trading,” which are already transforming India’s capital markets.
2. Satyam Computer Services Scam (2009)[44]
B. Ramalinga Raju, the founder and chairman of Satyam, a major IT company listed on BSE and NYSE, admitted in a confession to the board the year before, in a last-minute letter before a board meeting on acquisitions, to a seven-year fraud involving the reporting of ₹7,136 crores of cash, revenue, and profit to support the appearance of strong growth in the face of fierce competition in the outsourcing sector through the use of fabricated bank statements, inflated accounts receivable, "ghost" employees, and the use of 600+ groomed suppliers, including those conflicted and controlled by insiders, to fool the auditors, the market, and regulators to obtain illegal loans and business, while concealing growing losses. As a consequence of his revelation prior to the board of acquisitions, Satyam stock crashed by 78% in one session, followed by a loss of customers, teetering on the edge of collapse, eroding the reputation of the entire Indian IT industry abroad[45], as well as PricewaterhouseCoopers' complicity in ignoring warnings. In the aftermath, there was a forced acquisition by the Tech Mahindra group through a collaborative effort by the Government, NFRA-assigned peer review of auditors, Clause 49 strictures, and the CEOs' and CFOs' liability in certifying the financials as in the Company Act, a turning point in corporate accountability.
3. Nirav Modi-Punjab National Bank Scam (2018)
Nirav Modi, an Indian jeweler, conspired with his uncle Mehul Choksi and PNB deputy manager Gokulnath Shetty, and defrauded the second-largest public bank of the country of ₹14,356 crores through 1,500+ fraud Letters of Undertaking (LoUs) sent through SWIFT messages without reporting these LoUs on the core banking system (CBS). These hidden LoUs were used by Modi’s businesses to obtain ‘buyer’s [46]credit’ from overseas branches of Indian banks, which were actually sent to personal foreign, UAE, and shell company foreign accounts and hard assets instead of imports, owing to the lack of SWIFT’s CBS connectivity, which changed in 2018. The incidence emerged through the renewal of Modi’s LoU by January 2018, after which Modi escaped overseas, PNB made heavy provisioning, and RBI made it compulsory throughout the country, making SWIFT’s CBS connectivity, and ED marked ₹6,000+ crores of Modi’s assets under PMLA, declaring Nirav Modi and Fugitive Economic Offender under Fugitive Economic Offenders Act of 2018, the first offender of the act.
4. 2G Spectrum Allocation Scam (2008)[47]
Former Telecom Minister A. Raja is alleged to have made a flawed allocation of 122 unified access service licenses by bringing forward the cut-off date, irrespective of eligibility testing, and a dodgy first-come-first-served (FCFS) allocation at the price of ₹2001, though the market rate jumped to ₹40,000+ crore per MHz in 2007, causing a presumptive loss of ₹1.76 lakh crore from 2G bandwidth allotted to Raja’s pet companies such as Unitech Wireless (P) Ltd and Swan Telecom Pvt. Ltd, estimated by the CAG in the 2010 expose setting off India Against Corruption street gatherings. The Sup. Ct. set aside all licences in 2012 for their arbitrariness, directing internet and phone service providers to pay ₹80,000 crore in Auction, and acquitted Raja of corruption charges in 2017 CBI trial for lack of proof of bribery, [48]but this corruption has finalized the model of Auction of 2G and 3G bandwidth for ₹1.1 lakh crore sales, and guidelines of National Democratic Communication Policy for exp. of Natural Resources, and further for role of CBI and Special Court in corruption cases at policy levels.
CONCLUSION
In the context of white-collar crime, a study of the situation through the prism of high-profile scams such as the Harshad Mehta securities fraud, the Satyam accounting scandal, the Nirav Modi and PNB fraud, and the 2G Spectrum scam illustrates the existence of a pattern of sophisticated fraud. It is pertinent to note that these high-profile scams, which include a wide range of activities such as stock market manipulation and corporate accounting fraud, bank fraud, and the misuse of public resources, have cumulatively resulted in trillions of rupees of actual and potential losses to the exchequer and the public.
Starting from the "ready forward" deals exemplified by Harshad Mehta, passing through the balance sheet frauds of Satyam, and culminating in the "off-book" letters of undertaking issued by Nirav Modi and the arbitrary allocation of 2G spectrum licenses by the then-serving Telecom Minister, each example illustrates a deadly convergence of personal greed and institutional failure. These crimes were successfully carried out because of a mix of inefficient audit processes, judicial inefficiency, technological limitations, and the excessive use of discretionary powers. The development of these crimes illustrates how systemic weaknesses are often discovered and exploited by individuals of high social and professional status, who use institutional safeguards for personal gain.
The development in criminological thought, from Sutherland's theories centered on the nature of the criminal to act-related theories developed by Edelhertz, and the institutional theories developed by Clinard and Quinney, is evident in these Indian examples. These theories enable a more detailed examination of peaceful but extremely damaging crimes in banking, corporate governance, and cyber-finance. In order to combat this threat effectively, there is a need for a holistic strategy that ensures the safety of legal frameworks such as the Bharatiya Nyaya Sanhita (BNS), the PMLA, and the SEBI rules, alongside efforts to enhance enforcement tools such as specialized courts and forensic units. It is also necessary to ensure that best practices in internal controls, ethics, and continuous technological surveillance are adopted. Additionally, there is a need to bring about a shift in the corporate culture, which should be achieved through strong whistleblower policies and a zero-tolerance policy in the highest echelons of management. The recent developments, including the SWIFT-CBS interface, NFRA regulatory oversight, and the Fugitive Economic Offenders Act, provide a solid foundation, but challenges such as cyber fraud and international money laundering remain key obstacles in the Indian digital economy.
Finally, the fight against white-collar crime must move beyond the punitive measures and towards more proactive state policies that emphasize the importance of transparency, accountability, and the principles of best professional practices. This is necessary to ensure that the economy works for the country and not just for a select few.
[1]N.V. Paranjape, Criminology, Penology with Victimology 152 (Central Law Publications, Allahabad, 17th edn., 2017).
[2]Rajesh Ahuja, "How Nirav Modi and Mehul Choksi Pulled Off India's Biggest Bank Fraud", Hindustan Times, Feb. 15, 2018.
[3]Shantanu Guha Ray, The Target: The Inside Story of the NSEL Scam 88 (Times Group Books, New Delhi, 2014).
[4]The Bharatiya Nyaya Sanhita, 2023 (Act 45 of 2023).
[5]Edwin H. Sutherland, White Collar Crime: The Uncut Version 45 (Yale University Press, New Haven, 1983).
[6]Madan Lal Bhasin, “Corporate Accounting Fraud: A Case Study of Satyam Computers” 7(2) Int’l J. Contemporary Bus. Stud. 25 at 28 (2016).
[7]L.C. Gupta, “Stock Market Regulation in India” 27(20) Econ. & Pol. Wkly. 1047 (1992).
[8]B. Ramaswamy, “Corporate Governance and Forensic Accounting: A Case Study of Satyam” 12(4) Chartered Accountant 556 at 560 (2009).
[9]Arvind P. Datar, “White Collar Crimes and the Law” 4 SCC (Jour) 1 (2001).
[10]Marshall B. Clinard and Richard Quinney, Criminal Behavior Systems: A Typology 188 (Holt, Rinehart and Winston, New York, 2nd edn., 1973).
[11]Gilbert Geis, On White-Collar Crime 67 (Lexington Books, Lexington, 1982).
[12]Serious Fraud Investigation Office v. Nirav Modi, (2018) 145 SCL 32 (Bom)
[13]Umakanth Varottil, “A Comparison of Insider Trading Fraud in India and the United States” 32(1) Transnat'l Law. 1 at 5 (2019).
[14]Official Liquidator v. P.A. Tendolkar, (1973) 1 SCC 602
[15]J.S. Verma, “White Collar Crimes in India” 3(1) J. Indian L. Inst. 12 at 14 (1998).
[16]Law Commission of India, 221st Report on Need for Speedy Justice – Some Suggestions 14 (April, 2009).
[17]V.V.L.N. Sastry, White Collar Crimes: A Review of Indian Corporate Sector 42 (Concept Publishing Company, New Delhi, 2005).
[18]Ministry of Corporate Affairs, Report of the Task Force on Forensic Audit (Government of India, 2010).
[19]Donald R. Cressey, Other People's Money: A Study in the Social Psychology of Embezzlement 30 (Free Press, Glencoe, 1953).
[20] Samiran Nundy, “The Corruption of Indian Medicine” 348 Brit. Med. J. 3183 (2014).
[21]Internet and Mobile Association of India v. Reserve Bank of India (2020) 10 SCC 274.
[22]Medical Council of India v. Christian Medical College (2016) 4 SCC 342.
[23]The Information Technology Act, 2000 (Act 21 of 2000).
[24]Karnika Seth, Computers, Internet and New Technology Laws 215 (LexisNexis, Gurugram, 2013).
[25]State v. B. Ramalinga Raju, (2015) 162 SCL 1
[26]Edwin H. Sutherland, Principles of Criminology 77-79 (Lippincott, Philadelphia, 4th edn., 1947) (discussing the theory of differential association).
[27](Supra)See Cressey, supra note 5 at 30.
[28]Braithwaite, “White-Collar Crime” 11 Ann. Rev. Soc. 1 at 14 (1985).
[29]Geis and Shover, “White-Collar Crime and Corporate Deviance” 26 Crime & Just. 1 at 5 (2011).
[30]The Institute of Chartered Accountants of India v. Satyam Computer Services Ltd. (2018) 144 SCL 112.
[31]Vakul Sharma, Information Technology Law and Practice 142 (Universal Law Publishing, New Delhi, 6th edn., 2017).
[32]Ministry of Finance, White Paper on Black Money 34 (Government of India, May 2012).
[33]Securities and Exchange Board of India (Prohibition of Insider Trading) Regulations, 2015, reg. 3.
[34]P.S. Narayan, Cyber Laws and IT Protection 89 (Asia Law House, Hyderabad, 2011).
[35]See also Law Commission of India, supra note 10 at 22 (discussing the erosion of deterrence due to trial delays).
[36]See N.V. Paranjape, Criminology, Penology with Victimology 158 (Central Law Publications, Allahabad, 17th edn., 2017) (analyzing the impact of social status on conviction rates in India).
[37]See Donald R. Cressey, Other People's Money: A Study in the Social Psychology of Embezzlement 30 (Free Press, Glencoe, 1953).
[38]Indian Penal Code, 1860 (Act 45 of 1860), s. 489A.
[39]See Guy Stessens, Money Laundering: A New International Law Enforcement Model 82-85 (Cambridge University Press, Cambridge, 2000).
[40]The Prevention of Money-Laundering Act, 2002 (Act 15 of 2003), s. 3 (defining the stages of placement, layering, and integration)
[41]See Economic Espionage Act of 1996, 18 U.S.C. ss. 1831–1839 (for the global standard on trade secret theft).
[42]Harshad S. Mehta v. State of Maharashtra (2001) 8 SCC 257.
[43]Janakiraman Committee, Report of the Committee to Enquire into the Securities Transactions of the Banks and Financial Institutions (Reserve Bank of India, 1992).
[44]State v. B. Ramalinga Raju (2015) 162 SCL 1.
[45]See The Companies Act, 2013 (Act 18 of 2013), s. 211 (referencing the establishment of the SFIO following the Satyam collapse).
[46]Reserve Bank of India, Notification on Discontinuation of Letters of Undertaking (LoUs) and Letters of Comfort (LoCs) for Trade Credits, RBI/2017-18/139 (Mar. 13, 2018).
[47]Centre for Public Interest Litigation v. Union of India (2012) 3 SCC 1 (the "2G Case" cancelling the 122 licenses).
[48]Comptroller and Auditor General of India, Performance Audit Report on the Issue of Licences and Allocation of 2G Spectrum (Report No. 19, 2010).
Note - The information contained in this blog is for general information purposes only. We endeavour to keep all the information up to date and try our level best to avoid any misinformation or any kind of objectionable content. If you found any misinformation or objectionable contents in this website please report us at editors.ilw@gmail.com




Comments