Read Full Article at :- http://www.neerajaarora.com/forums/topic/tmc-vs-cpm-morphed-photo-row-a-picture-worth-a-thousand-words/
Each picture is a story and each story is a part of big picture and the morphed photograph released by the TMC showing Union Minister, Shri Rajnath Singh offering sweets to former CPM Secretary Prakash Karat also indicate some hidden agenda behind the episode. Pictures are powerful and the adage that “a picture is worth a thousand words” is the main drive of various social networking platforms on the internet. People respond to picture, initiate a dialogue and share them.
The morphing of photograph on the internet has become rampant as photographs sharing contain an idea of visual narrative which speaks by itself or initiate transmission. Whatever may be the objective, stalking, defrauding, deceptive, the morphing has assumed an alarming proportion due to the ease with which it can be done and availability of the contents on the internet. The ubiquity of digital photography has changed, what it means to capture photos. No longer do we capture, then post them on Face-book or WhatsApp and leave them to be commented and circulated through the network and thus generating the easy contents for morphing for the cyber criminals.
In the present case, the original picture showing Shri Rajnath Singh offering sweets to the Prime Minister Shri Narender Modi has been morphed owing to the availability of photograph on the internet media. The complaint was filed by the CPM with the Cyber Cell of Economic Offences Wing of Delhi Police and BJP also files the complaints with Kolkata Police. Upon filing of the complaints, the morphed photo was immediately removed from the websites of TMC.
The biggest challenge is the difficulty of establishing the morphing in such cases and advancement of technology has led to the rampant morphing for ulterior purpose with different objectives. The morphing of photograph is an offence of identity theft U/s 66C of IT Act 2000 which makes use of unique identification picture of any other person as cognizable offence and provides the punishment of imprisonment upto three years.
An effective remedy for morphing is provided under the amended definition of forgery U/s 463/464 IPC where the only transmission of forged electronic record is a complete offence and for attracting forgery, it is not required to prove that the accused has morphed the photograph and merely connecting the accused with the transmission is sufficient to prove the forgery on the part of accused. Thus, keeping in view the complexity of fabrication in the digital world, the legislature has put the burden on the accused to prove his defence once it is a established that the accused has transmitted the morphed photograph. Thus, in the cases of morphing in the photograph, the accused can be prosecuted U/s 469 of IPC which is also a cognizable offence and more effective and compare to Section 66C of IT Act.
However, otherwise proving the morphing of photograph has its own challenges as if the digital media on which the morphing has been done, is recovered, it can be forensically proved that the morphing has been done. But if the original media is not recovered, it is very difficult to prove morphing from the copy of the morphed photograph. If the morphed photograph itself has been deleted, the prosecution may not be able to prove the morphing at all. Thus, in all the cases where digital photographs or CCTV footage is being filed as an evidence, it involves inherent risk of manipulation and if the copies are filed even alongwith certificate u/s 65B, the inherent risk is not eliminated but instead it get augmented.
The filing of the copies of digital photographs or CCTV footage alongwith certificate u/s 65B creates a false impression of authenticity of evidence which infact does not exist and generates an error of likelihood of forged evidence to be treated as genuine one. The Section 65B evidence act only allows the admissibility but not authenticity and infact, authenticity is a bigger challenge. In the case of Anvar P.V. Vs P.K. Basheer [MANU/SC/0834/2014] as well as Kundan Singh Vs. The State [MANU/DE/3674/2015], the court has held that the genuineness of the secondary electronic documents has to be looked into by the court upon its admissibility U/s 65B.
Neeraj Aarora
CISSP, CISA, CFCE, FCMA, CFE
Right to be forgotten in Blockchain: Is GDPR redundant?
Blockchain has become pervasive in all segments and its impact is being felt across the industries. The effective date of the EU’s General Data Protection Regulation (GDPR) is fast approaching (May 25 th, 2018) and efforts are being made globally to comply with it.Intercepted Mobile Evidence on CD: Infringement of Constitutional Right of Defence
Electronic Interception of Telephonic Communication, also known as “Wiretapping” always clouded with various controversies as to illegality or breach of privacy however, an important concern as to what standard of evidence, the prosecution needs to establish the Admissibility, Authenticity, Veracity and Reliability of such recordings in the court.SHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence Cases
SHA-1 Official Dead: Authenticity Challenge in Electronic Evidence Cases