Saturday, November 05, 2022


Cyberbullying, also known as electronic bullying or online social cruelty, is the intentional use of digital devices like smartphones, laptops, and tablets to harm another person. People can see, engage in, or share material by SMS, Text, applications, or online in social media, forums, or games. Basically, it refers to the act of transmitting, uploading or disseminating hurtful, erroneous, or nasty material about another person. Some of these behaviors may border on being illegal or criminal. According to one of the sources, the following locations saw the most cyberbullying:

  • Social Media, such as Facebook, Instagram, Snapchat, and Twitter
  • SMS (Short Message Service) also known as Text Messages sent through devices
  • Instant Message (via devices, email provider services, apps, and social media messaging features)
  • Email etc.


Cyberbullying can affect people of any age, although young adults have been identified as the most frequent victims. Where he uses technology to his advantage, the offenders are frequently unknown, allowing him to hide. The offender may be acting out of pure levity or for any other reason, such as egotism or slander. The most often committed crimes in relation to cyberbullying are impersonation, harassment, and flaming. Flaming is an example of online fighting where vulgar language is used, whereas harassment often involves the perpetrator sending the victim abusive, insulting, rude, and obscene messages.

How does Cyberbullying affect an individual?

An online bully victim could experience despair, anxiety, rage, shame, low self-esteem, subpar academic results, trust difficulties, etc. In any of these situations, it is more important for friends, parents, or guardians to assist the victim through social and psychological counseling. One can also engage in correct legal action with sufficient proof. Whatever the cause of cyberbullying, there are ways to combat it and, in many circumstances, avoid it.

What to do with bullying messages?

1. Examine the Message: Instead of freaking out, attempt to examine the bullying message you have got since, according to forensic analysis, each word or image has information that has shown how the message came to be on your computer. Look for those specific words, phrases, or usage of language. It could occasionally help you identify the perpetrator.

2. Don't reply or delete the message (or email), as the cyber forensic expert may need it in its entirety in the future. Additionally, avoid sending it to anybody else to spare yourself any extra emotional stress. Even if the communications are frequently anonymous, they may still be tracked out since the company that runs the website will store records and information about them. This information is not accessible to you or your parents, but it is available to the police as and when required.

3. Keeping the proof: If you receive offensive comments via instant message, print them out so you have the proof. As a general guideline, when reporting online bullying, copy the terms and conditions that have been violated and snap a picture of the offending comment or image as proof.

4. There is still work to be done: Block any contact with online bullies. Never distribute any remarks or messages that entail cyberbullying. Learn about the preventative measures and reporting of online bullying.

Preventive Measures:

1. A parent's responsibility is to ensure their children read privacy rules before giving them any personal information. Before providing any information, it is a good idea to make sure the website has a secure connection. 

2. Be aware of what's happening: Keep an eye out for any friends, classmates, or other people who are connected to you acting strangely. Every encounter leaves evidence, according to Locard's principle of exchange in forensic science, thus there will undoubtedly be some characteristics that the investigators check for frequently. 

3. Maintain an internet activity log: Your gadgets and most social networking sites have auto log recording summaries installed. You can, however, exercise caution if you see any routine activity or log into your account at any moment.

4. Adhere to the following internet safety advice: Unless absolutely necessary, never reveal your true identity to a stranger. Never provide sensitive information online to a stranger or someone you are just conversing with. Never meet someone you met in a chatroom alone; always go with a buddy, your parents, or another adult. They will be delighted to accomplish this if they are indeed who they claim to be. If someone makes offensive comments to you online or otherwise makes you feel uncomfortable, talk to a close friend or family member about it.

5. Recognize the warning indicators There are some indications that might be received from the individual on the other side of the computer screen. None of these might be 

If the individual insists that you reveal personal information such as your address or phone number, you should refuse. 

If the sender of an email or text message makes you feel uneasy 

If the guy assures you that he will keep your conversations private and not disclose them to anyone else, you may trust him. 

If the individual requests that you email or give them images of yourself or use a webcam in a manner that makes you feel uneasy, you should decline. 

If the individual discloses information with you and requests that you keep it confidential, you must keep the information to yourself. 

If the individual wants to meet you and asks you not to tell anybody, you should comply. 

If you observe any of these warning signals, it is imperative that you inform your parents or another responsible adult.

6. Machine learning can aid in the fight against online abusers: Today's offenders will not request data since they already know they can web scrape it from public social media postings in the amount they want. Therefore, our overarching objective should be to employ artificial intelligence at a certain level (device knowledge, app knowledge, etc.) to avoid cyber victimization. In such cases, we should attempt to identify and block, ban, or quarantine problematic users and accounts, or we should immediately delete (inactivate) content that algorithms predictably flag and label as abusive, or otherwise restrict the posting, sharing, or sending of messages that violate acceptable online conduct standards.


Dr. Bhoopesh Kumar Sharma, Forensic Expert and Professor,

Department of Forensic Sciences, SGT University Gurugram, India.

Monday, May 17, 2021

Forensic Science for Healthcare Professionals

 Healthcare practitioners are very likely to be confronted with forensic cases. However, due to a lack of awareness among healthcare professionals about these problems, these forensic cases are often skipped. The group of healthcare providers includes everybody who works in the hospital, from physicians to nurses, caregivers to administrative staff. Since there is no particular job description for forensic nurses in India and some other developing countries and hence, such shortcomings cause insufficiency in collection and preservation of evidence in forensic cases. It is very much required that the nurses, who manage the legal process in forensic cases, should receive training in forensic nursing in their training process and should be completely equipped with technical and legal knowledge to handle the crucial evidences in specific criminal cases. Any physical injuries caused by weapons, explosions, sharp objects, traffic incidents, fall occurrences, attack cases, intoxications, burn injuries, electric shocks, asphyxia, or any suicide attempts, murders, or suicides presented to emergency responders or health care providers are considered as police case and further subjected the forensic investigations. In such cases the legal process starts as soon as the patient gets in and received in the emergency rooms (ERs). The injuries along with the victim’s clothing may be critical in criminal investigations in order to locate the suspect, accused and/or victims. Apart from this, paediatric forensic cases are also observed as child abuses (physical abuse, sexual abuse, and emotional abuse). Nurses and other staff have tremendous responsibilities in managing the any sort of forensic cases. Healthcare professionals should know that those are forensic cases and should be informed about the relevant process. Furthermore, since emergency medical personnel are often the first to witness forensic cases, they are often associated with writing forensic reports. Healthcare practitioners and administrators who work in healthcare facilities that offer 24/7 healthcare services should be knowledgeable about the forensic case process, both to support the legal process and to protect public health. It has been observed by many researchers that most of the healthcare professionals, did not have adequate information regarding evidence protection. On many occasions, it becomes too difficult for doctors and nurses to report such cases efficiently in the court room with specific legal knowledge, liabilities, and consequences. Hence, the negative outcomes for both the victim and the assailant are possible when forensic cases are not treated properly. The healthcare professional must be informed on how to act in forensic cases, on the issues they should be careful while taking the medical history, and on the whole process. Given the frequency at which forensic cases present themselves in health facilities and the fact that healthcare professionals are constantly confronted with forensic cases, scheduling in-service trainings on a regular basis and notifying all healthcare professionals about process-related issues that must be addressed will help to avoid problems in forensic case management.

Sunday, April 18, 2021

Types of Documents in Forensic Examination (By Ms. Megha Walia, Assistant Prof. SGT University)

 Types of Document


Any writing surface containing invisible, partially visible or visible matter or writing strokes and convey certain meaning can be defined as document. 


·       Forensic documents can be classified into two categories i.e. 


(i)                      Disputed documents or questioned documents or     

suspected documents and


(ii)                     Standard documents.  


The disputed documents are the documents which are under scrutiny and are of unknown origin. 


The standard documents are the documents of known origin.  Standard documents can again be sub-divided into two categories.


(a)            Specimens or sample writings/signatures and are obtained by the I.O. from the suspect or accused in presence of witnesses or before the court


(b)           Admittedly genuine writings/signatures are normal writings written by the accused in routine course of business.


Questioned Documents are further included in the following classes:


Ø  Document with questioned signatures.

Ø  Document containing alleged fraudulent alterations.

Ø  Questioned Holograph documents

Ø  Disputed or Questioned age of dates in documents.

Ø  Question of materials from which documents are produced


·      Questioned Documents are further included in                                               

     Following classes:


Ø  Questioned Documents including typewriting’s (ascertaining source, date, alteration or substitution of pages)

Ø  Documents with questioned handwritings includes:


ü  Anonymous and suicidal notes/disputed letters.

ü  Superscriptions, registrations and other miscellaneous writings.

Ø  Genuine documents erroneously or fraudulently attacked.


1.     Document with questioned signatures.

ü  These are most common disputed documents may be commercial or legal papers such as cheques , note , receipt , draft  order , contract , agreement , assignment , will , deed etc.

ü  Signatures are generally obtained by tracing or simulating or copying process.

ü  Beside writing characteristics, ink examination is also very important. 


2.     Document containing alleged fraudulent alterations.

 Alterations are made by

ü  Erasures:- Chemical or mechanical

ü  Additions

ü  Interlineations or substitution 

ü  Sequence of strokes is also important to be examined in such cases.

3.     Questioned Holograph documents

ü  These may include rare stamps, valuable manuscripts, certificates, letter of introduction and recommendation, letters of credit, letters of famous people etc.

ü  Scrutiny includes examination of Paper & Watermarks 

         Ink, Writing, Seal impressions & Folds etc. 


4.     Disputed or Questioned age of dates in documents.

ü  These types of documents include which are purported to be ancient documents of great importance.

ü  Use of instrument for writing and origin of paper are most important for examination. 


5.     Question of materials from which documents are produced.

ü  A document dated many years before the paper was made comes under this category. (or when relative age of the document is required to be decided)


6.     Questioned Documents including typewriting (ascertaining source , date , alteration or substitution of pages)


7.     Documents with questioned handwritings include:

ü  Anonymous letters and disputed suicidal notes.

ü  Superscriptions , registrations and other miscellaneous writings.


         Beside examination of paper , writings or instrument used for writing Forensic Stylistics also plays an important role to identify the writer.


8.     Genuine documents erroneously or fraudulently attacked.

           Sometimes writer , at his command , writes more than one pattern of signature or some of the characters in writing in a document may be treated as questioned document erroneously.



Bank Documents

·      Drafts, cheques, gift cheques.

·      Account opening forms , specimen signature cards 

·      Share Certificates

·      Bank Securities 

·      Time Deposit / Fixed Deposit Receipts 


 Postal Documents

·      National Saving Certificates , Kisan Vikas Patra, Indira Vikas Patra 

·      Fixed Deposit / Time Deposit Receipts

·      Money Order forms & Cheques

·      Envelopes / Inland letters

·      Postal Stamps / Revenue stamps 


 Educational Documents

·      Degree / Diploma certificates

Marks sheets

Transfer certificates

Date of Birth Certificate

Question papers / Answer sheets of important competitive examinations

Registration / migration certificate


 Court Documents

Bail orders 

Release orders

 Judicial / Non-Judicial Stamp papers

Important Judgments of the apex courts


 Police Documents

Vehicle registration certificates

Driving licenses

Firearm licenses


Security Passes

 First Information Report formats

 Non-Cognizable Report formats


 Government Documents

Important agreements

Memorandum of understanding 

Reports / Inspection reports / Postmortem reports / expert reports


Service Books 

 ACR formats 

Cash books

Railway tickets / air tickets 

Insurance Policies