Shafhi Mohammad Judgement encourages Face Book Crime… Calling the attention of the Chief Justice of India

The January 30, 2018 order of the two member bench of the Supreme Court consisting of  Justices A.K.Goel and U.U.Lalit, in the case of Shafhi Mohammad Vs State of Himachal Pradesh dated 30th January 2018 (SPECIAL LEAVE PETITION (CRL.)  was discussed in these columns earlier. While commenting on the order, it was pointed out that it would unleash “Judicial Anarchy” in India as it would encourage lower Courts to pass judgements against the higher Courts by way of “Clarification” and also because this judgement having the banner of Supreme Court could put the lower courts in a state of confusion on how to address the Section 65B (IEA) certification. The final judgement of 3rd April 2018 as a final order on the SLP has indicated that the Court has not made any attempt to set right its erroneous interim order.

The Judgement was also called a “Tragedy” since it indicated the inability of the Supreme Court to understand technology and an attempt to find short cuts to some imaginary problems.

It was pointed out that the erroneous judgement would give a thrust to mischievous criminals who would fabricate evidence to harass innocent persons.

Unfortunately, the speculation that this Supreme Court judgement would spur Cyber Crimes appears to be coming true sooner than expected.

The essence of the objections raised is as follows.

  1. Under Section 65B of Indian Evidence Act,(IEA), an electronic document is admissible in a Court without the production of the original if it is properly certified as required under the section.
  2. There is some confusion in the Judiciary as well as some legal practitioners as to why certain procedures mentioned in the section are relevant and how they should be interpreted. This includes who has to issue the certificate and how the certificate has to be constructed etc. These have been explained in detail in the columns of www.naavi.org and www.ceac.in
  3. The Supreme Court itself in the celebrated case of P.K.Basheer has explained at length why Section 65B certificate is mandatory under Section 65B and it has been so since 17th October 2000 though different Courts were unable to understand the section and allowed its violation from time to time. This was a three member bench of the Supreme Court and the Shafhi Mohammad bench had no authority to amend the judgement with a “Clarification”.

During our earlier discussions on the Shafhi Mohammad judgement, we have clearly pointed out that it gives a free license to falsify evidence and it could be mis-used.

Now one such case has been reported from Bangalore and is an indication that more such cases will surface in the coming days.

Further, we predict that the Police themselves under the influence of the politicians will falsify evidence and create human rights issues in future. At that time the same Supreme Court will harp on “Freedom of Speech”, “Right of Privacy” and other fundamental rights to criticise the Police. Politicians will then direct the criticism against the Modi Government. The rebellious judges of the Supreme Court and the activist lawyers like Dushyant Dave, Kapil Sibal etc will enjoy the predicament of the Government.

The complaint I am referring to is an incident where a suspected student of an educational institution posted a message in the time line of the Dean, took a screen shot, distributed it in WhatsApp groups, deleted the time line post. After this, a police complaint has been filed either by the same person or some body at his instance that the Dean had made the objectionable posting and has since removed it.

It is clear that such insertion of objectionable posts on the time line in Facebook can be done wherever the owner of the Face Book account has enabled postings on his time line by the public or Friends.

While we advise every reader to check their Privacy Settings in their Face Book account to ensure that such postings on the time line are limited to “Me Only”, we proceed to discuss here how the Shafhi Mohammad judgement creates a problem for the innocent victims of such crimes.

According to the Shafhi Mohammad judgement, since Face Book account of the Dean is not under the control of the complainant, there is no need for him to submit the Section 65B certificate along with the print out of the screen shot allegedly containing the objectionable post. It would be admissible and the trial would begin with the Dean trying to defend that he did not either post the content or delete it subsequently.

The only person who can come to the assistance of the Dean is Face Book which must have the log records including the IP address of the person who made the objectionable post. But getting the evidence out of Facebook is impossible for an ordinary mortal unless the Police move quickly which in most cases is not possible.

(Ed: we have earlier pointed out how the Cyber Crime Police Station of Mumbai-BKC botched up a complaint by refusing to issue a simple request to Google for an IP address resolution possibly in pursuance of some illegal gratification and the higher officials of the Mumbai Police did nothing to correct the situation even when it was brought to their attention. Refer here)

If Section 65B certificate is considered mandatory, then the complainant would have to file the certificate. It could have been filed by the complainant himself in which case the Court could have the option to reject it as not credible since it is a “Self Serving evidence.”

If it is submitted  by a trusted third party, such a person would have to view the objectionable post himself and certify its existence with some additional information and also be ready to face the charge of “perjury” if it really did not exist on the time line.

Since Section 65B certificate is a matter of fact certification, the certifier  would not be able to forensically certify the genuineness of the posting but he would have given some additional material information for investigation to proceed. This would have created one hurdle for the complainant to first find a suitable accomplice to provide the certification and then to convince him that the request is genuine. Then the credibility of the certifier could have acted as an additional check against provision of the false evidence.

Unfortunately, if Shafhi Mohammad judgement is to be applied, there would be no need for a Section 65B certification and it is left to the wisdom of the Court to accept the evidence as presented and proceed with the trial.

By God’s grace, we can say that the  “Clarification” provided by the SLP order is by a two member bench and hence should be ignored. But we strongly feel that this tendency of the lower bench to pass an order over turning the larger bench view and terming it as “Clarification” needs to be corrected by the intervention of the CJI.

In the meantime, we urge the Bangalore Cyber Crime police to prove that they are not like the Cyber Crime Police of BKC, Mumbai and would ensure that Facebook would be made to provide the evidence and resolve the complaint appropriately. If during the investigation it is found that the posting was done by the complainant himself, he should be punished for hacking into the Face Book account of the Dean with a dishonest intention and take action under Section 66 of ITA 2008 along with other provisions of IPC.

In case, like the BKC Cyber Crime Police Station, Bangalore Cyber Crime PS also dithers, then innocent victims will keep cursing the Shafhi Mohammad judgement until it is corrected.

Naavi

Posted in Cyber Law | Tagged , , , , | 4 Comments

Section 79A .. Notification of some Labs as “Digital Evidence Examiner

Here is an article from Mr S.Balu, in Section 79A and accreditation of labs as Digital Evidence Examiner. This article was published in the magazine Kakin Pakkam, of the TN police.

Mr Balu was formerly , the DySP in charge of Chennai Cyber Crime cell and was the person responsible for the successful first conviction under ITA 2000 in the case of State of Tamil Nadu vs Suhas Katti.

Presently Mr Balu is the President of Cyber Society of India, Chennai and is a consultant who works with an NGO in Chennai.

Here is the article

Naavi

Posted in Cyber Law | Leave a comment

Is Media guilty of Tampering with the voter’s minds?

There is one section of the media commenting on Cambridge Analytica which is strongly critical of the developments in the Cambridge Analytica incident that Digital marketing agencies are manipulating public opinion through campaigns designed by profiling the voters. In the context of the forthcoming election in Karnataka, it is being stated that some Digital marketing companies are engaged in an unethical activity of trying to change the mindset of the voters.

In these discussions, the media has been completely hypocritical and their bluff needs to be called. Every marketing activity in the world is changing the decision of the target audience to take a favourable decision about a product. Marketing per-se is therefore a legitimate activity. In Marketing or Advertising  however we make a distinction between “Ethical” and “Unethical” communication.

If the Advertiser is making false propositions through his advertisement, it is unethical and fraudulent and needs to be condemned. But if the advertiser is using a creative communication to make the target audience believe that the product being marketed is beneficial to him because it has some features , X,Y, Z, then it is perfectly legitimate.

Similarly, in the election advertising, what we the citizens as well as the Election commission has to see is whether the message used in the advertisement is true, false or utterly false and misleading.

As regards profiling, it is for the marketing agencies to use their own analysis of the data available to them to decide what communication is good for a given audience. If this is called “Profiling”, it is nothing but “Market Segmentation”.

Hence the objections to the profiling activities of Digital marketing Companies is misplaced since the same objections can be placed on every other advertisement including the advertisement for a chocolate or for IPL.

Another major objection I have for media talking about “Trying to manipulate the voter’s mind” through advertising by digital media marketers is to ask a question to these media gurus whether journalism is nothing but creating “opinions” and “Changing opinions”?.

Every media article is written with the objective of conveying an opinion. The days of “Factual Reporting” which was happening in Government controlled AIR and DD in the past is no longer there.

Most TV news today is about “Debates” in which different political parties speak to support their own political agenda and the Anchors provide opportunities for spokespersons to speak lies after lies in the interest of “Balancing” the debate. Depending on the Anchor’s own prejudice, they add to the lies. The entire debate is therefore only directed towards forming a public opinion and there is no ethics in TV journalism today.

In the Karnataka election, Rahul Gandhi speaks of “Being against Corruption” and “Being Religious”. Is there a greater joke than such statements?. The journalists of all hue and cry talk as if these statements deserve to be publicised in TV and not censored straight away by the anchor at the debate table.

If journalists want to complain about Digital Marketing and “Tampering with the voter’s mind” then they should first stop the false campaigns they make on TV debates with the hope that some of the audience will get converted.

But what these journalists donot understand is that public are intelligent and they can see through the statements of the politicians immediately. Most debates therefore are a waste of time and audience are either not listening or listen selectively.

I therefore urge that media should think of changing their debate style and eliminate all political spokespersons from the debate and stick to discussion of issues by professionals who can comment on the issue irrespective of whether it is advantageous to one political party or the other.

The election commission should see how they can regulate these debates in which false statements are made  deliberately and maliciously. These are worse than advertisements and should be stopped on ground of “Ethics” as well as “Fraud” on the voters.

Will the election commission be fair  Will the Journalists be honest in this respect?

Naavi

Posted in Cyber Law | Leave a comment

Workshop on Information Security at Jaipur


Workshop on

“Information & Cyber Security

for Industry Leaders”

0900 hrs : 27 April 2018 : Hotel Clarks Amer,Jaipur

Confederation of Indian Industry-Rajasthan is organising the One Day Workshop on Information & Cyber Security for Industry Leaders onFriday, 27 April 2018 at Hotel Clarks AmerJLN Marg, Jaipur.

Overview

As you are aware managing an Industry no longer ends with Marketing, Technical Financial and Managerial aspects. There is an important ingredient of Information Technology in everything we do.

Along with the convenience that comes with the use of Information Technology, comes the risks of Cyber Crimes, Cyber Terrorism, Cyber WarsViruses, Trojans, Ransomware disturb our sleepHacking and Phishing can cause nightmares. Denial of Access can bring down our dream projects when we most want our systems to be in good shape.

In this scenario, disruptive changes all around us, it has become necessary for leaders of the Organisations to understand what are the risks that we encounter when we use Information Technology to drive our business and how we manage the Information risks that arise out the emerging digital industry scenario.

Objective

This workshop aims to address the need of Organisation to understand the “Information Security Risks” and how the CEOs need to brace themselves to meet the Risks as a part of their responsibilities on managerial perspective of Information Security.

Topics to be Covered

   -Development of a Framework for Digital Security for SMEs on a collaborative model.

-Managing the challenge of motivating the employees towards building a better Information Security Culture

– Over view of the emerging Industry 4.0 scenario

-Overview of the Cyber Crimes, Cyber Terrorism and Cyber Wars that affect the industrial management.

-Frauds in Banking

-Export-Import

-Phishing

-Virtual Impersonation

-Overview of Management of Digital Properties like Domain Names and Intellectual Property Rights in Digital Properties.

-Concept of Cyber Security in industrial environment and the multiple dimensions of information security namely the Technical, Legal and Behavioural aspects.

-Cyber Laws as applicable in India and the need for ITA 2008 compliance as part of the Corporate Governance.

 -Concept of Digital Signatures, Encryption and Cyber Insurance as tools of Information Security.

 -Any other matter of relevance to Information Security in the managerial context.

Topics will be supported by Case study presentation, Group activity, Video presentation & power point presentations

Faculty

The workshop will be conducted by Na Vijayashankar, (Naavi) Information Assurance Expert from Bengaluru and a pioneer in Cyber Laws in India, in India

 [Contact Mr Tushar Shroff, CII, Jaipur for more information]

Naavi

Posted in Cyber Law | Tagged , , , | Leave a comment

Will emerging Privacy Laws be a threat to the society?

The “Privacy laws” as they are emerging in the world are more intended to protect the community of those who want to hide their identity and commit crimes against the society than protect the honest citizens from Governmental surveillance or spamming by commercial advertisers.

The risk in Government surveillance is not so much from the fact that the Government of the day knows too much about its citizens in a Privacy Un-protected world but some political elements would misuse the information for personal gain and for harassing the honest citizens.

If in US we are against Donald Trump, we would not like the US Government to know what is my political affiliation and what underground work I am doing to ensure that Mr Trump does not win the next election. In India, if I am Black Money holder, I would like to do everything to ensure that Aadhaar is not linked to my Bank accounts and argue that such an attempt is privacy invasion. If Congress was in power, I would have been comfortable since I could hold any amount of black money as long as I take care of the politicians.

Most privacy activists may take a public stand as if they are the guardians of democracy but beneath their desire for absolute Privacy Protection, there is an ulterior motive to being able to continue their activities which the society may not like.

We need to give up this hypocrisy and admit that what we need is a protection against misuse of information by politicians for which checks and balances should be built rather than preventing Big Data Processing for profiling of certain activities.

Now with the advent of “Right To Erasure”, GDPR holds out a great threat to the society by erasing vital information that is actually intelligence about potential terrorist activities.

I donot foresee any possibility of a terrorist to give consent in any form to let his activities be monitored either by Google or Face Book or the law enforcement. Whether a terrorist has made a recce trip to survey his target or is trying to campaign for radicalization of innocent friends on the Face Book etc become unavailable for intelligence gathering. Terror sleeper cells will therefore consider 25th May 2018 as a day of “Freedom from Oppression from Counter terrorist activities”.

It is to be expected that terror organizations operating from the EU zone will have an umbrella of protection from surveillance. Some of their activities may be directed towards the non EU countries and hence EU may become a haven for terrorists from which global terror activities would be planned and executed.

However, in due course, as terrorists take shelter in EU, it would be the EU countries themselves which would be affected most and in the coming two decades we can see EU countries being radicalized one by one.

I am not sure that EU regulators have taken adequate precautions in the direction of making GDPR immune from being misused by terrorists. Though National Security is a ground under which security agencies can cut free from GDPR regulations, in practice the restrictions would severely affect the capability of the security agencies to identify potential threats.

This sentiment has also been expressed by US homeland security officials I hope Indian authorities also flag this issue and ensure that Indian interests are fully protected in the context of EU countries becoming too rigid in the implementation of GDPR.

Indian Context

In case any citizen of EU is acting in a manner which could be detrimental to the interests of India, we need to assert that ITA 2008 provides the legal power to ensure that “Data Retention” norms and power of “Interception”, “Right to demand Traffic Data” etc may be exercised by the Indian authorities.

I therefore urge the Indian Government to issue an advisory that all Companies having an establishment in India or engaged in the monitoring of any activities in India are required to be compliant with ITA 2000/8 whether they are compliant with other regulations or not.

In order to ensure that business interests of outsourced operations is not affected, a system of “Special Data Processing Zones” on the lines of STPI are set up so that data entering into such zones are insulated and adequate protection measures are available to ensure that there is no mix up of “International Data Flow” with the “Local Data Flow”.

Government may consider a “Special EU Data Processing Zone” which is GDPR compliant but ensure that data flow in and out happens through a special gateway which can be secured as per the provisions of GDPR but also protecting the Indian interests.

Probably this concept needs further exploration but there is need for Privacy and Security Professionals in India to sit together and find a proper means of working that does not allow Privacy laws of EU or US or Singapore or Australia does not hurt Indian interests.

Naavi

Also Refer

Europe’s data protection law may have severe implications for India’s IT industry

Posted in Cyber Law | Leave a comment

Last Date For submission of Public Comments on DISHA 2018

DISHA 2018 is the proposed law for India applicable to the Privacy and Data Protection related to the Health Care sector in India.

The IT industry is in the midst of discussion on GDPR and how it will impact Indian Companies. At the same time, the Srikrishna Panel is also due to submit its recommendations on the General  Data Protection law in India.

Behind all these developments, there is already ITA 2000/8 which defines Personal Data, Sensitive Personal Data, the responsibilities of protecting the Confidentiality, Integrity and Availability of “Data”, “Personal Data” and “Sensitive Personal Data”, defines penalties, the dispute resolution mechanism etc.

Unfortunately each Ministry of the Government wants to have a separate law for itself addressing Data Protection in its own domain.  This multiplicity of laws is unlikely to benefit the people and will increase the cost of Administration enormously.

Today is the last day for submission of comments by the Public on DISHA 2018 or the “Digital Information Security in Health care Act 2018”. Public comments are expected to be provided before April 21, 2018 to be sent to egov-mohfw@nic.in .

In order to enable stake holders to form their views and forward to the ministry, Naavi  has provided his own immediate views on the proposed 45 section draft legislation in the form of the following articles.

  1. DISHA 2018- Proposed Health Information Security Act in India
  2. Consequences of Health Data Breach under DISHA 2018
  3. Data is a Property owned by the Data subject under DISHA 2018
  4. New Regulatory Agencies under DISHA 2018

There are also some articles posted on www.privacy.ind.in on GDPR and Srikrishna Panel 

Readers may peruse these articles and send their own comments to the Health Ministry on DISHA 2018.

It is our firm belief that “Data Protection” requires a comprehensive regulation for multiple sectors and there has to be an “Umbrella Law” that is supported by “Sectoral Security Standards”. ITA 2000/8 already has the concept of “Reasonable Security Practice” with flexibility for sectoral regulators to define their own standards.

It is therefore redundant to have multiple Data Protection Legislations leading to multiple Data Protection Authorities, Officers, Committees, Chairpersons etc. Such sectoral laws will be unproductive and create conflicts.

If Mr Modi Government believes in Minimal Governance and Best use of technology, there is a need to complete re-think on the approach to such sectoral laws, sectoral CERTs etc. These suggestions are created by Bureaucrats who think all legislations are for the benefit of creating new organizations and bloating up the Government expenditure and the law is only an excuse.

Public donot relish such approach. These laws only increase the cost of administration and also create corruption centers in the country. They donot bring proportionate benefit to the public.

I look forward to the right thinking persons in the Modi Government to give a thought to the above comment and proceed with such duplicate legislations.

At a time Mr Modi is considering the National Health Mission which is a huge political and financial investment, having an efficient organization to back it up in terms of legislation and authorities is considered necessary. But what we need to consider is whether “Medical Data” is also “Data” which is already addressed by the ITA 2000/8 and Data Protection Act (Srikrishna panel) and whether we can merge these proposed legislations into one existing legislation which should ideally be the “Information Technology Act 2000 as amended in 2008 and to be further amended in 2018”.

We can then have  one State level Adjudication Authority, One Central Level Adjudication Authority for Data in general and one Data Protection Authority supported by sectoral standard committees and sectoral CERTs.

If this basic concept is accepted, we may have to re work on DISHA 2018 and substitute it with one chapter on Health Data Security in ITA 2000/8 (with some changes in Adjudication and Appellate Tribunal aspects of ITA 2008 which could be as suggested under DISHA 2018).

I hope a reasonable thought is given in this direction also.

Naavi

 

Posted in Cyber Law | Tagged | Leave a comment