Showing posts with label cyberlaw. Show all posts
Showing posts with label cyberlaw. Show all posts

Wednesday, October 13, 2021

Data theft during festivals post pandemic: why we need to be aware by Dr.Debarati Halder

CYBER CRIME AGAINST WOMEN BY DEBARATI HALDER


Image courtesy : Internet 

2021 October promises to be different than October 2020. The difference is being felt already and it is not because of the increase in the number of vaccinated people who may win over pandemic, but because of the ever growing percentage of cyber-crimes, especially cyber monetary crimes. Several researches have shown that pandemic related lockdown has pushed people to go on a buying spree. Given the situation, people have invested more on online shopping. The festival periods are the chosen periods for pumping up sale. In 2020, people could not invest more in the festival related shopping which includes paying for vacations, apparels and accessories.  2021 sees the graph slowly rising. Governments have eased restrictions and this has further encouraged people to venture out from their homes, visit more shops physically as well as virtually. But people have understood the value of plastic money better than before.  Ecommerce platforms are booming with offers and consumers are buying heartfull. Most of the ecommerce platforms have offered their own applications to be downloaded in Android phones so that the consumers do not venture out to other links. There is unique blending of application of social engineering, artificial intelligence, business analytical skills and most importantly data polling which makes the e commerce platforms unique in their own spheres.

The e-commerce platforms are the chosen platforms for consumer data theft.

Why do our phones showcase us our secret plans?

Many have asked me why and how their devices “secretly spy” on their buying plans and how the social media platforms, popup ads show exactly the staff that these consumers/customers are looking for. The answer is: NO! The devices are inanimate objects and they cannot spy on our plans unless there is a human made mechanism to share our plans. Here we need to look into the consumer behavior on the cyber space: time and again the internet companies have tried to shred off liability of breaching the privacy of their subscribers/customers. If we look into the consumer behavior on the cyber space, we may be able to understand that the internet companies are not completely wrong. One cannot have the search engines activated unless the said person is using some personally identifiable unique identification data which may include the phone number or the email id. Most of us do not log out of our email ids after we have finished our “search”.  We neither log off from our social media accounts when we are doing a virtual window shopping. Not to forget that social media companies are deeply connected with the e-commerce platforms: they are even more deeply connected with the search engines as well. This makes the entire search- history of the respective consumers reflect on the digital platforms that are being used by the said consumers.

The banking data leak?

Quite in the same way consumers/customers leave their banking digital footprints on the e-commerce platforms. When we use any online payment modes, the e-commerce platforms record the said mode for future commercial transaction purposes. The card/payment app etc., that may have been used by the consumers/customers may also be recorded by the e commerce platforms. But if seen minutely, the customers are ‘asked’ to consent for ‘remembering’ the payment systems. Such payments through cards or net-banking or through any other digital payment mode further goes through other payment gateways which will also remember the amount paid, the unique customer id that the banking card displays and other related sensitive personal financial data of the customer/consumers.

 

Several researches and cyber-crime analysis have shown that the festival times may be considered as the peak times for  monetary crimes on the cyber space because  there may be heavy flow of commercial transactions on e-commerce platforms and there may be almost nil ‘monitoring’ in this regard. Added with this, it has also been noticed by some that personal details of women customers may become the highest ‘valued’ data in this regard. The profile of the female customer along with the banking details and the stuff that she chooses to purchase may all be linked for an entirely different and unethical business that would add profit for some in the deep dark net world.  Unfortunately it may become a herculean task to detect the mastermind of the entire data theft as the crime detection agency may need to investigate through multiple layers of virtual platforms, majority of which may deny their liability siting the negligence of the customer.

The legal recourse?  

We need to look into EU General Data Protection Regulation (EU GDPR) for understanding the universal rules in this regard. Chapter 3 of the EU GDPR discusses in detail about the rights of the data subjects and clearly mentions that there should be restrictions in sharing personal data of the data owner with multiple stakeholders when the data owner has not given any explicit permission for the same. Interpreting this, it may be understood that social engineering is never permitted under the EU GDPR even if the consumer/customer has ‘voluntarily’ consented for recording of his/her online payment mode by the e-commerce platforms. India still does not have any dedicated data privacy protection laws. Resultant, we need to look at scattered laws and rules mentioned in different statutes and legal provisions. The Consumer Protection Act, 2019 does not specifically protect consumer’s rights against such kinds of data privacy infringements. Information Technology Act, 2000(amended in 2008) very loosely touches upon the issue of consumer data privacy under S.72A which states as follows:

Save as otherwise provided in this Act or any other law for the time being in force, any person including an intermediary who, while providing services under the terms of lawful contract, has secured access to any material containing personal information about another person, with the intent to cause or knowing that he is likely to cause wrongful loss or wrongful gain discloses, without the consent of the person concerned, or in breach of a lawful contract, such material to any other person, shall be punished with imprisonment for a term which may extend to three years, or with fine which may extend to five lakh rupees, or with both.

But again, we must understand that the scope of this provision to prevent sharing of the banking/financial and sensitive personal data by the internet companies becomes extremely limited especially when they come up with strong plea of no liability towards willful causing of loss and ignorance of the behavior of the consumers in spite of giving the later opportunities to protect their data and profiles through different privacy control mechanisms. However, this doesn’t mean that the victim does not have legal recourse. The internet companies may need to clearly establish that they were absolutely ignorant of the probable loss that may be caused to the victim due to recording the banking details, consumer habits of the later. They must also establish that their data processing and recording mechanisms are secured and cannot be infringed by perpetrators. This claim of the internet companies must also be adhering to the principles set in S.43A of the Information Technology Act, 2000(amended in 2008) which speaks about the responsibilities of the body corporates.  Otherwise, they may need to undergo the legal recourses that the present Indian legal system offers for penalizing the internet companies.

It is hoped that India enacts a full-fledged data privacy law which will protect the rights of the general individuals including the consumers. But till then, we the general users of the information and digital communication technology need to be aware of the risks and rights available to us.

 Please note: Please  do not violate the copyright of this writeup. Please site it as Halder Debarati ( October, 2021) "Data theft during festivals post pandemic: why we need to be aware." Available @https://debaraticyberspace.blogspot.com/2021/10/data-theft-during-festivals-post.html 

 

  

 

 


Sunday, September 1, 2019

3 ways how Artificial Intelligence may make women land in trouble

CYBER CRIME AGAINST WOMEN BY DEBARATI HALDER

Image result for artificial intelligence free images
Image curtsy : Google 

Information communication technology and digital communication technology have opened up new vistas for human relationships. The innovative technology with the help of Artifical Intelligence (AI) can now read minds,[1] predict illness,[2] predict crime occurrence,[3] enhance the professional and social network, and help in better analytical understanding of subjects. But it can also leave devastating impacts on human life. It can alter the data (including personal data), harm social reputation and can even instigate victims to take extreme steps like committing suicide.[4] All these may be done by positive and negative usage   of artificial intelligence which plays the base role for empowering Apps which in turn may be used for positive and negative usages.  Artificial Intelligence (AI) has been used by web companies like Facebook for facial recognition of users earlier. AI has also been used for companies (other than web companies) for processing employee data. In short, AI has been used to access private information of individuals either consensually or without consent. Here are three ways as how AI may create an uncomfortable situation for women specifically in India :
1.    Facial Recognition Apps and harassment of women: Remember the time when Facebook suddenly started asking for nude photos individuals for upgrading their own safety system apparently for providing safety mechanisms for subscribers?[5] This project was intended to build up a safety mechanism against revenge porn with the help of Artificial Intelligence. Facebook wanted to empower their subscribers, especially women to report revenge porn. But before that, the company wanted to ensure that the revenge porn content showcased the image that belonged to the victim specifically. The facial recognition app, the skin texture, hair color, biometric recognition technology would be matching both the images (the nude picture of the victim and the revenge porn content created by the perpetrator) and would be identifying the revenge porn content as illegal. But this project received stern objections because there were more possibilities of misuse of nude photos than positive use of the same. Facebook -Cambridge analytica case did prove that nothing is impossible when it comes to preservation of data by body-corporates and data of individuals is always profitable and the security of the  same is vulnerable. But this may not seem to be as dangerous as misuse of Face App may seem to be . FaceApp is basically used to change the face structure of the person whose photograph would be used in this App. It can change the texture of the skin and density of hair including facial hair.  In July, 2019, FaceApp became the center of concern for Indian cyber security stakeholders especially when several celebrities started using FaceApp and started showcasing their changed faces on Instagram.   While FaceApp was basically being used for fun purposes, it may also throw challenges for data safety and security of person concerned. FaceApp helps to change the structure of faces. But we should not forget that the altered facial image can be saved in devices and cloud of different individuals. This altered image may be used for several illegal activities. Predators may unauthorizedly access the social media profiles and change facial images of the victims to create fake profiles; they may also use such images to create a completely new impersonating profile to harass women. Altered facial images of women may also be used for revenge purposes especially when the victim is looking for opportunities in the entertainment or advertisement sector where her appearance may be considered as her biggest asset. Apart from this, FaceApp may be used to attract bullies and trolls to intensify victimization of women.
2.    Bringing back the memory: No one, but the web companies clearly remember what we posted in last summer. Every day social media companies would show what was posted by the user a year back or a couple of years back and would gently remind the user that he/she can share the said post as a memory. How does it happen? The web companies look for algorithm and the highest likes and comments for posts on daily or even hourly basis. When the posts earn more likes and comments, the AI decides to bring it forth. In certain situations, such refreshing of memories might not be ‘wanted’ at all especially when the victim might had a bitter ending of the relationship with persons in the said image or the text in question may no longer evoke good memories, but rather traumatize the victim more. But machine intelligence does not fail the company: it is a matter of consent and choice after all. But consider if the account is unauthorizedly accessed: the hacker may get to know something from the past which the victim may never wanted the hacker to know.
3.    Reminding the user about best low prices : AI runs over the internet like blood vessels carrying oxygen all over the body. When a user decides to compare prices of any product or services, AI helps to share the same almost always on any platform the user would be visiting. It might be extremely embarrassing for any woman if such searches start showing results when she is surfing the social media or even the search engine with a friend or another individual. Nothing is left by the AI from prices of lipsticks, hotels at cheaper rate, flight details to last watched videos on how to conceive. This might also make women face discrimination, office bullying and harassment due to several reasons.
These are but some of the many ways as how AI may make women to land in trouble. AI is necessarily connected with data privacy protection policies of web companies. The EU General Data Protection Regulation, 2018 provides that personal data may not be processed without the consent of the owner of the data.[6] But in this case, there can be legal tangles as web companies may  claim that they do not breach the data confidentiality or transfer the data to any other jurisdiction, neither they process the data without proper authorization. Here, multiple stakeholders may be involved which may include the original owner of the content or the picture which may have been processed for the purpose of harassment : the perpetrator, who may have carried out changes on the data using the AI supported Apps, perpetrators who may have unauthorizedly  stored the altered contents, picture or information or may have used the altered information, picture for creating impersonating profile etc. As per Indian legal understanding, altering, modifying etc of contents/ information/ image /images without proper authorization of the original owner of the  information etc may attract penal provisions under the Information Technology Act, 2000 (amended in 2008): these provisions may include Ss 43 (Penalty and compensation for damage to computer, computer system etc, ), 66 (computer related offences, 66C (punishment for identity theft) and 66D (punishment by cheating by impersonation by using computer resource etc. This may also attract penal provisions for Copy Right violation as well. Further, the web companies may be narrowly be liable for protecting data properly under several provisions including S.43A which speaks about body corporates liability to protect data. But irrespective of existing provisions, web companies may always escape the clutches of law due to due diligence clause and on the question of consent expressly or impliedly provided by the woman victim concerned. In the EU, courts are becoming more and more concerned about policy violations by web companies to fool the users. In India too, the courts must throw light on the web companies responsibility as data repository. Regulations like Data protection Bill, 2018 must be considered with utmost care. These may have the key to solve problems of online victimization of women.
Also, women users need to be extremely cautious about machine intelligence. Awareness must be spread about how the hidden ‘safety valves’ of the web companies (which may actually make the web companies more powerful against claims of lack of due diligence) may be used properly.  
 Please do not violate the copy right of this blog. If you need to use this blog for your writeup/assignment/project , then please cite it as Halder Debarati(2019) 3 ways how Artificial Intelligence may make women land in trouble. Published in in http://debaraticyberspace.blogspot.com

2019






[1] For example, see Nosta John (2019) A.I. Can Now Read Your Thoughts—And Turn Them Into Words and Images. Published @ https://fortune.com/2019/05/07/artificial-intelligence-mind-reading-technology/ on May 7, 2019
[2] For example, see PTI (2019), These AI tools can predict early death risk due to chronic diseases
Published @//economictimes.indiatimes.com/articleshow/68611835.cms?from=mdr&utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst on March 28, 2019
[4] Halder D., & Jaishankar, K (2016.) Cyber crimes against women in India.
New Delhi: SAGE Publications. ISBN: 9789385985775
[5] See for example Solon Olivia (2017) Facebook asks users for nude photos in project to combat 'revenge porn'. Published in https://www.theguardian.com/technology/2017/nov/07/facebook-revenge-porn-nude-photos  on November 7, 2017
[6] For more, see S.7 of the EU GDPR . URL: https://gdpr-info.eu/art-7-gdpr/ Accessed on 17-08-2019


Monday, April 29, 2019

WhatsApp reporting of women and child abuse videos: The common understanding versus the reality

CYBER CRIME AGAINST WOMEN BY DEBARATI HALDER
Image credit : Google

Couple of days ago my friend shared an alarming news with me on Facebook about WhatsApp. It says that several cyber security think tanks including Cyber Peace Foundation are now finding out how WhatsApp groups are circulating child sexual abuse videos and how these contents are growing viral.[1] This is not an uncommon incident now. In 2015 from Centre for Cyber Victim Counselling, we had done an empirical research titled “Harassment via WhatsApp in Urban and Rural India: A Baseline Survey Report (2015).[2] This research was conducted in three cities namely Tirunelveli, Kolkata and Delhi with responders from the age group of 19-40. Even though this research did not include survey on WhatsApp groups , but it did emphasize on personal harassment or receiving of the sexually explicit images, harassing videos of others etc. Some of the findings of this report are as follows:
Ø 32.8% stated that they are aware of the safety tools in WhatsApp and 42.7% said they feel it is safer than other internet communication services. 41.2% stated that they were not aware of the safety tools and 13.7% stated that they don’t feel that WhatsApp is safer than other internet communication services. 1.5% did not want to tell about their knowledge of awareness regarding safety tools in WhatsApp and 11.5% did not want to tell about their feelings whether WhatsApp is safer than other internet communication services. 24.4% stated that they have heard about the safety tools in WhatsApp but have no direct knowledge about it. 32.1% stated that they have heard about other internet communication services, but they do not have direct knowledge, whether WhatsApp is safer because they do not use other services.
Ø In answer to the question whether they had received any sexually explicit or obscene images including videos/images of rape, sexual abuse of women or children or men or LGBT people etc, among the 131 respondents, 11.5% stated that they had received sexually explicit or obscene images, 51.9% stated they did not receive such images and 2.3% did not want to answer. 34.4% stated that they are not aware of being targeted with such images because they do not use WhatsApp or have stopped using the services.[3]

This suggests that WhatsApp had been a “chosen platform” by predators since long.
 But why WhatsApp has become more dearer to predators than other social media websites like Facebook or Instagram especially for those including pedophiliacs or persons who  create and circulate abusive videos including sexual abuse videos of women  ?  Let’s have a reality check about WhatsApp here:
Ø What is WhatsApp and how it works: As we had mentioned in the research report, WhatsApp messenger was started approximately in 2009 in the US by Jan Koumand Brian Action as a “better SMS alternative” (WhatsApp, 2014) and it is available for iPhone, Blackberry, Android, Windows phone, Nokia etc. This app uses the user’s phone number as the basic verification mode and it does not support calls via VoIP (Schrittwieser,Fr¨uhwirt, Kieseberg, Leithner, Mulazzani, Huber, & Weippl, 2014). Some of the basic features of WhatsApp include status update, profile picture update, uploading of address book (Schrittwieser, et. al., 2014), options to create/join groups (Terpstra, 2013), updates about location, uploading and circulating photos and videos and voice recordings. Typically WhatsApp verification may include a three stage procedure which involves (i) logging on to the download page of WhatsApp @ https://www.whatsapp.com/download/ and clicking on the chosen device icon and start downloading; (ii) the server then sends a 4-digit PIN number by SMS to the prospective user’s phone by SMS for verification and authentication (Schrittwieser, et. al., 2014), (iii) the user copies the code to the WhatsApp’s application graphical user interface (GUI) and after cross checking by the WhatsApp server the app gets activated on the phone of the user (Schrittwieser, et. al., 2014). Once connected with WhatsApp, the user can get the information about other WhatsApp users by simply checking his/her phone address book or call log history or Gmail address book. This is because WhatsApp may access the user’s contact list or address book to keep track of other mobile phone numbers who use the WhatsApp services and may store this information on the server (WhatsApp, 2014, see sub- para B in Para 3) to get people connected instantly, profile pictures of other users and one WhatsApp user may get instantly connected to others through the server.[4]
Ø How do users create network on WhatsApp and how the groups may be busted?
After downloading the app and activating the same, the user may get connected to his friends or like minded people by doing a simple search in his phone address book. Other numbers with WhatsApp applications may show up. Users may choose to circulate their messages in several ways through WhatsApp :
ü By using broadcasting feature whereby a single text/audio visual  message may be conveyed to a batch of people : The Boradcasting list may be created as below:
Image source : WhatsApp
ü By forwarding the message to maximum five recipients at one time. Now, this “forwarding” may reach a wider recipient list if it is done in a group.  WhatsApp group can be created  by any individual by going to the chat tab and creating a new group. 
Image source: WhatsApp
Interestingly, WhatsApp groups can be private or be public as well. Most of the groups who circulate images /contents of sexual abuse including  for self-gratification or group gratification, may keep their group private so that the group may not be disturbed by any 3rd party monitoring authority including the police. These group members generally may have a mutual understanding and trust whereby the contents shared by them would not be reported outside.  The members may necessarily download /save the sexual abuse/harassment videos/contents in their own devices  for individual gratification or for unethical gaining by further circulation as well. The end to end encryption by WhatsApp may make it more favorable for such group members to widely discuss and circulate such contents.
Public groups on the other hand are more open groups where people may join for discussions and it may not necessarily private for those whom the admin/s have invited or made them join. Unlike the private groups, public groups may be monitored if any  third party monitoring authority joins the discussion in disguise or any other group member decides to bring in the police or other monitoring stakeholders. In both these cases, admin’s responsibilities have been scrutinized by courts in India. The recent report suggests that the courts have held  responsible for allowing to spread seditious, inciting messages.[5]  WhatsApp group members and admins have also been booked for creating /circulating child sexual abuse materials for sexual gratification.[6]
Ø What if the group admin is an underage user?
It is important to know the age barrier about WhatsApp users. There are infact not two, but three options given by WhatsApp. Lets check it:
1.     The minimum age criterion for European region including European Union countries is 16.
2.     For other countries the, the minimum age criteria is 13 unless the domestic laws of the said countries have fixed a higher age for using of WhatsApp.[7]
3.     Overlooking both, a child can use the WhatsApp services of the parents if the parent allows the child to use the services under his/her monitoring.
This in fact shows that a child may use WhatsApp, may create his/her own profile and may create contents him/herself for private or public sharing on WhatsApp with whoever he/she wants. 
Ø What happens to the producer/distributor of the offensive contents?
In broader understanding, the child is legally permitted to create content  which he/she thinks can be circulated. Now, this has been a question for several courts : when a child is creating a sexting content and circulating the same with fellow children (including his/her boy/girl friend ),  how the courts (and the laws )would treat him/her ? Is he the perpetrator? Is he the victim? Or is he a ‘child’ with no liabilities?[8] S.67B of the Information technology Act, 2000(amended in 2008), Ss. 13 and 14 of the Protection of children from sexual offences Act, 2012 clearly mention that “whoever’ creates, circulates, produces etc  contents depicting children in sexually contents may be penalized. These cane be considered non-baliable, which would suggest that the punishment can be heavier.  Similarly, Ss. 67 and 67A of the Information Technology Act, 2000(amended in 2008) also penalizes ‘anyone’ who creates, distributes etc  sexually explicit and obscene materials. S. 354C of the Indian Penal Code also touches upon penalizing men who  private images of woman who would not consent for sharing such contents with third parties . S.375 and 376 of the Indian penal Code also touches upon capturing rape videos and storing or circulating the same. These offences can also be non-bailable and can have heavier punishments.
The contents that the children would have created also carries significance: if a child creates a sexting video or sexual abuse video or a non consensual porn image/content or  even a revenge porn content and sends it to his friend/s, the recipient may decide not to receive the content if from the look at the content or the text attached with it, the recipient feels that it should not be opened or should not be further circulated because it contains ‘bad stuff’.  WhatsApp is smart enough to have created limited policy guideline and security feature whereby one can report his/her child who may be using WhatsApp without parental guidance  and the parents feel that the child may be doing /victimized due to illegal /risky contents and connections.  It says
“If your underage child created a WhatsApp account, you can show them how to delete their account. You can learn how to delete an account in our Help Center.If you'd like to report an account belonging to someone underage, please send us an email. In your email, please provide the following documentation and redact or hide any unrelated personal information:
Proof of ownership of the WhatsApp number (e.g., copy of government-issued identification card and phone bill with the same name)
Proof of parental authority (e.g., copy of birth or adoption certificate for the underage child)
Proof of child's date of birth (e.g., copy of birth or adoption certificate for the underage child)
We'll promptly disable the WhatsApp account if it's reasonably verifiable that the account belongs to your underage child. You won't receive confirmation of this action. Our ability to review and take appropriate action on a report significantly improves with the completeness of the information requested above.[9]
Removal /deactivating of the said account is however at the discretion of WhatsApp especially when they would not be reasonably convinced .
But in case the reporting individual is not the parent of the child who may be doing illegal stuff  or who may be a potential victim, WhatsApp suggests to contact the parents of the child.
For adult wrong doers, WhatsApp has a typical formula which is followed by almost all social media companies : they would suggest to block the number so that the user of that particular number would not be able to contact the blocker  unless the earlier is being unblocked . Here is what WhatsApp suggests regarding how to block a number:
Image source: WhatsApp
Ø The producer/distributor of the offensive content has been arrested. What about the offensive image?
The above information would not serve much purpose for blocking /reporting of the content unless the same is considered as an offending  subject through a police report. In such case, the said content may be made disabled from their own server, but they would rather work like email or SMS and would not access individual devices to dig out the offensive content to block and disable it. In such case, even if the persons (owning the WhatsApp numbers and profiles) may be blocked, the contents may keep on circulating unless these have been ‘ordered ‘ to be disabled from the server.  This is how the objectionable contents float from one device to another and reach out to millions after the original sender may have deleted from his device to save himself or he may have been arrested by the police.
Nothing but a police report or a court order about the said content therefore could be the best answer for blocking the content from being further circulated. But a few things can not be ignored when this is suggested: the police must act accordingly to make WhatsApp delete the content from its server and block the circulation whenever it appears on WhatsApp from which ever device. But this may become a herculean task especially when the police and the courts  may feel  challenged due to lack of infrastructure and proper laws. As long as this does not take place, WhatsApp users have to be responsible enough to not to circulate such contents even if they receive it from known or unknown numbers. Not to be forgotten, the police may arrest individuals who may store child sexual harassment videos /images unknowingly as well. But the unfortunate fact is this may not be the same for adult sexual abuse cases. But if the users use WhatsApp responsibly, the problem may definitely be address.

Please note : Do not violate copyright of this blog. If you would like to use information provided in this blog for your own assignment/writeup/project/blog/article, please cite it as “Halder D. (2019), " WhatsApp reporting of women and child abuse videos:  The common understanding vs the reality”  29th April, 2019 , published in http://debaraticyberspace.blogspot.com




[1] Cuthbertson Anthony (2019). WHATSAPP IS HOTBED FOR CHILD SEX ABUSE VIDEOS IN INDIA, STUDY FINDS. Published in https://www.independent.co.uk/life-style/gadgets-and-tech/news/whatsapp-child-sex-abuse-videos-groups-india-a8885811.html?fbclid=IwAR251ajPe20Y7zcXtD2o1s0w--86-Pr5UrKHVgv7IF_7swAH_dvEGQTzcZQ on 26th April, 2019. Retrieved on 26th April, 2019
[2] Halder, D., & Jaishankar, K. (2015). Harassment via WhatsApp in Urban
and Rural India: A Baseline Survey Report (2015). Tirunelveli, India:
Centre for Cyber Victim Counselling. Available @ https://www.cybervictims.org/CCVCresearchreport2015.pdf Retrieved on 27.04.2019
[3] Ibid
[4] See pp 2 in ibid
[5] See WhatsApp ‘admin’ spends five months in an Indian jail. Published in https://www.bbc.com/news/technology-44925166 Accessed on 22.04.2019
[6] See Sandhya Nair (2018) WhatsApp group sharing child porn busted, 5 held
[7] For more information see https://faq.whatsapp.com/en/general/26000151/?category=5245250
[8] Halder, D., & Jaishankar. (2013). Revenge Porn by Teens in the United
States and India: A Socio-legal Analysis. International Annals of
Criminology, 51(1-2), 85-111. ISSN: 00034452 (UGC Listed Journal)

[9] See https://faq.whatsapp.com/en/general/26000151/?category=5245250

Tuesday, January 15, 2019

Trolling on Instagram photos: Should women restrain from uploading personal pictures?

CYBER CRIME AGAINST WOMEN BY DEBARATI HALDER
Image curtsy : Google


Off-late I have been getting to see many incidences of trolling on personal pictures of individuals, especially women on Instagram. These photos may include photos of young women and girls in trendy clothes, showing more skin than expected by orthodox societies. Such pictures may attract the attention of self-acclaimed moral police trolls who wish to condemn women for their choice of outfits; these trolls use extremely harsh words which may even go to the extent of threatening women for their choices. They may even broaden their harassment pattern by sharing the target pictures through different profiles to defame the victims, threat the victims and create many more morphed images of the victims and this may go on till the victims reach a stage to withdraw from the social media. This indeed generates various levels of criminal liability, some of which have been addressed by laws in India. Apart from self-acclaimed moral police trolls, several women have also complained of fashion police trolls who intentionally data mine and troll women, whose fashion sense according to the trolls is not upto the mark. Unlike the moral police trolls, the fashion police trolls  may not create security or life risking threats, but they may definitely target the reputation of the victims and  their self-esteem. 


Now let us see what sorts of harm or damage can be done by both types of trolls:

trolling can creation of threat, intimidation

trolls necessarily create posts which are defamatory; these can be teasing remarks  and extremely  insulting comments

trolling can result in reputation damage, violation of privacy, unauthorised access to data, copyright violation (in certain cases)


Trolls are necessarily bullies. But bullying and trolling are not the same. Trolling can be more vicious than bullying. Trolling infact attracts more perpetrators and more victims in the same thread. These victims and perpetrators may not be known to  each other  previously; resultant, the new “victims” who may have joined the thread to support or disagree with the primary victim  may finally put all blames to the primary victim for the victimisation by way of trolling. Trolling is more public than bullying. As such the effects of trolling may be more traumatising than bullying. Trolling can not only damage reputation of the primary victims, trolls may go a long way to harass cyber bystanders or commenters who may support or disagree with the victims as well as with the trolls. The situation worsens if these bystanders or commenters are women; trolls may threaten these secondary victims with legal consequences (for aggravating the issues) which may force the latter to withdraw from social media just like the primary victims.

This may adversely affect women’s usage of Instagram : Instagram unlike Facebook may instantly help the user to get connected with people/group with common interest especially when the user uses the hashtags. The pictures/videos armed with hashtags may help the user to reach a wider audience. Several people including women aspiring to showcase their creativity in fashion industry, upcoming models, actors singers, anchors, performers etc, who use the platform for getting connected with the industry people, mentors and a wider audience, may suffer hugely if trolls attack them on Instagram. Victims may not only feel completely withdrawn, they may also be pulled into unnecessary legal tangles especially if the trolls misuse their pictures which may have been uploaded by the victims for promoting certain brands (which in turn may not appreciate such negative publicity of their product).

        But this in no way should mean that women should restrain from uploading pictures on Instagram. There are several ways to protect the privacy, reputation and the copyright of the pictures of the users :

1.  Women and girls should always opt for privacy options in Instagram. This may reduce the responsibility of the users and increase that of the website. The victims may directly charge the websites for not applying due diligence and  neglecting the security features which should have restricted unwanted people from infringing the privacy and copyrights. Further, in case the women wish to make the profiles open for public and had been harassed/trolled/stalked/unauthorisedly accessed etc, the victims must report the matter to the websites. The websites would not be letting the victim know the about the original identity of the harasser in case the profile is that of unknown person/s; but they would be duty bound to repair the damage, i.e. , restrict the unauthorised circulation of the image of the victim and generating anymore message that may harm the reputation of the victims. S.79(3) of the Information technology Act, 2000(amended in 2008) (exceptions to exemption from liability of intermediary in certain cases)  may be applied in such cases.

2.  Indian laws do not recognise online trolling and bullying as separate offences. This definitely had created problems for proper justice delivery to the victims. However, basing on the modus operandi for trolling several penal provisions may be applied; for instance, S.509 (punishment for harming the modesty of women), 507 (criminal intimidation by anonymous person), 499 and 500 (defamation and punishment for the same), 354D (punishment for stalking including cyber stalking) of the IPC may be used for posting intimidating, insulting, defamatory comments, stalking, creating threats etc.

3.  If trolling results in creation of Fake avatars especially sexually explicit contents, obscene contents etc, and if this involves unauthorised access to data, manipulation of data etc, the police may also apply provisions including Ss. 43(unauthorized access to the computer, data etc) 66 (punishment for computer related offences), 66C (punishment for fraudulently using password, unique identification features etc of any other person), 66D (punishment for cheating by impersonation), 66E (violation of privacy)(incase the picture has been used to create morphed pictures/images), 67 (punishment for creating sexually explicit contents), 67A (punishment for creating obscene contents ) of the Information technology Act, 2000(amended in 2008), S.354C IPC(punishment for voyeurism) etc. Police may also necessarily apply provisions from Indecent representation of women (prohibition )Act, 1986 for indicting the accused for indecent representation of the victim online.

Some of the above mentioned laws are non bailable and cognizable. This means that trolling may not be considered as a simple offence especially if it results in heavy offences including creation of sexually explicit contents ( the contents include not only the images, but the texts as well) etc. As such, women should not refrain from using Instagram fearing trolling. But they must be aware of their rights against trolling and the duties of the websites.

Let us unite against misogynist trolling. Let us spread the message that trolling, its modus operandi and its consequences should not be taken lightly and the criminal justice machinery must emphasise with the victims of trolling.

  
 Please Note: Do not violate copyright of this blog. If you would like to use informations provided in this blog for your own assignment/writeup/project/blog/article, please cite it as “Halder D. (2018), " Trolling on Instagram photos: should women restrain from uploading personal pictures?” 15th January, 2019, published in http://debaraticyberspace.blogspot.com