2.10 Impersonation

2.10.1 What is impersonation?

Impersonation is a common form of gendered abuse that women face online, and often accompanies or facilitates other offenses such as cyberstalking, doxxing, intimidation and threats, and morphing.1Kimble, M.R. (2016). Online Gendered Harassment and Violence Naming the Harm and Punishing the Behavior. University of Michigan. https://deepblue.lib.umich.edu/bitstream/handle/2027.42/134723/madeleik.pdf?sequence=1 Impersonation refers to the act of pretending to be someone else or falsifying the identity of a person “with the intention of harming, defrauding, intimidating or threatening anyone”.2Panwar, K., & Sihag, V. K. (2020). Changing forms of Cyber Violence against Women and Girls. The Indian Police Journal, 111. p. 116. https://bprd.nic.in/WriteReadData/userfiles/file/202104200330035982091ipj1.pdf#page=117. The internet, by giving users the option to remain anonymous and create multiple identities, makes impersonation easy and its detection difficult.3Ajmani, N. (2011). Rethinking the Rangel Standard in the Age of the Internet. Cyberstalking and Free Speech. https://scholarsbank.uoregon.edu/xmlui/bitstream/handle/1794/11760/Ajmani.pdf?sequence=1&isAllowed=y

Women face harm from impersonation in two ways. One, the perpetrator may impersonate the identity of someone with whom the woman is close or is likely to establish contact. This is a common means adopted by cyberstalkers to get a woman to disclose personal details or share personal images, which can be used to commit further offenses such as doxxing, intimidation, and non-consensual intimate image distribution (NCIID).4Kimble, M.R. (2016). Online Gendered Harassment and Violence Naming the Harm and Punishing the Behavior. University of Michigan. https://deepblue.lib.umich.edu/bitstream/handle/2027.42/134723/madeleik.pdf?sequence=1. This is commonly referred to as catfishing.

The second way in which women face harm from impersonation is when the perpetrator masquerades as the woman to her friends, family, other public connections, and on online sites, usually with an intention to damage her reputation or credibility.5Kimble, M.R. (2016). Online Gendered Harassment and Violence Naming the Harm and Punishing the Behavior. University of Michigan. https://deepblue.lib.umich.edu/bitstream/handle/2027.42/134723/madeleik.pdf?sequence=1. By faking the identity of the woman, the perpetrator may send offensive messages and post lewd or inflammatory content online, which could, in turn, invite harsh responses, equally offensive and lewd comments, and threats from the recipients of such messages.6Kimble, M.R. (2016). Online Gendered Harassment and Violence Naming the Harm and Punishing the Behavior. University of Michigan. https://deepblue.lib.umich.edu/bitstream/handle/2027.42/134723/madeleik.pdf?sequence=1. This can worsen the woman’s relationship with her contacts, invite social ridicule, damage her reputation and credibility, and even lead to offline harm.7Kimble, M.R. (2016). Online Gendered Harassment and Violence Naming the Harm and Punishing the Behavior. University of Michigan. https://deepblue.lib.umich.edu/bitstream/handle/2027.42/134723/madeleik.pdf?sequence=1. Some cases of online appropriation of a woman's identity also involve posting morphed pictures on fake social media accounts created in her name in order to tarnish her reputation in the eyes of her network, and to invite unwanted attention and harm from others.8Sambashivam, N., et al. (2019). “They Don’t Leave Us Alone Anywhere We Go”: Gender and Digital Abuse in South Asia, pp. 7-8. Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. https://dl.acm.org/doi/abs/10.1145/3290605.3300232. Such acts of impersonation can force women to limit their online presence, including by deactivating their social media accounts.9Sambashivam, N., et al. (2019). “They Don’t Leave Us Alone Anywhere We Go”: Gender and Digital Abuse in South Asia, pp. 7-8. Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. https://dl.acm.org/doi/abs/10.1145/3290605.3300232.

2.10.2 What is a gender-sensitive way to read a case of impersonation?

Impersonation is primarily an act of cheating and fraud. However, when women are targeted through impersonation, the gendered nature and impact of the fraud on women’s rights and their online participation should be duly considered by the court.

Further, when impersonation is accompanied by offenses such as stalking, NCIID, morphing, doxxing, etc., the harm to the privacy, bodily integrity, and reputation of the affected woman should be given primacy instead of framing the offense as one concerned with outraging modesty or publishing obscene or sexually explicit materials.

2.10.3 Which laws are applicable?

Since impersonation is primarily an issue of cheating and identity theft, charges can be brought under Section 415 of the Indian Penal Code (IPC), which defines cheating, and Section 417, which prescribes the punishment for cheating. Further, Section 416 makes cheating by impersonation a specific offense. In certain cases, Section 66D of the Information Technology (IT) Act, 2000 (IT Act), which penalizes cheating by impersonation done using a computer device or resource, may also apply.

2.10.4 How have courts dealt with cases of impersonation?

Most impersonation cases that have come up before courts in India so far have involved creating fake social media profiles in the name of the complainant women and uploading their nude or morphed pictures through such accounts. Even when courts have correctly recognized the infringement of privacy and loss of reputation that women suffer as a result of such acts, they have tended to treat these as cases of dissemination of obscene or sexually explicit materials under Sections 67 and 67A of IT Act, and not of cheating by impersonation and identity theft.

2.10.4.1. Kalandi Charan Lenka v. State Of Odisha (2017)10Kalandi Charan Lenka v. State Of Odisha, BLAPL No.7596 of 2016, judgment dated 16 January 2017, Odisha High Court.

The accused in the case sent obscene and vulgar text messages to the victim, and also created a fake Facebook account in her name and uploaded her morphed images to the profile as public posts. The court correctly recognized that the acts of the accused, especially the creation of a fake Facebook account, were intended to intimidate the complainant, and that these acts had caused mental shock and suffering to the victim. However, while determining the guilt of the accused, the court deemed that the act of uploading morphed photos through a fake Facebook account in her name as an offense of transmission of sexually explicit or obscene images under Section 67 and 67A of the IT Act. As mentioned earlier, conviction under these Sections does not address the violation of privacy and bodily integrity of the victim, and the loss of reputation resulting from the act of impersonation coupled with morphing.

In other cases, courts have tended to pass patronizing remarks such as “no prudent woman would post her nude photographs in social media”11Mohammad Nasar v. The State Of Andhra Pradesh, Criminal Petition No.3125 OF 2020, judgment dated 24 August 2020, Andhra Pradesh High Court. while establishing the guilt of the accused for impersonating the complainant and posting her morphed images. Such remarks arise due to misidentification of the harm caused by impersonation, particularly, the harm caused to women against whom the offense is committed.

2.10.4.2 Subhranshu Rout @ Gugul v. State Of Odisha (2020)12Subhranshu Rout @ Gugul v. State Of Odisha, BLAPL No.4592 OF 2020, judgment dated 23 November 2020, Odisha High Court.

This is an example of a case in which the court took note of the infringement of privacy resulting from the act of impersonation and uploading of the morphed images of the victim. Most importantly, the court desisted from considering the issue as one of dissemination of obscene or sexually explicit materials.

2.10.5 How have other jurisdictions dealt with impersonation?

Different jurisdictions have started recognizing the menace of online impersonation, particularly against women and girls. Some countries deal with it using existing statutory provisions, especially criminal law provisions related to cheating, identity theft, fraud, intimidation, stalking, etc. For example, the US uses a slew of legislation such as the federal Identity Theft and Assumption Deterrence Act, 1998; the Communications Act, 1934; the federal Interstate Stalking Punishment and Prevention Act, 1996; and the Computer Fraud and Abuse Act, 1986, to deal with online impersonation. Similarly, in the UK online impersonation against women is dealt with under the Malicious Communication Act, 1998, and the Protection from Harassment Act, 1997, as a form of harassment.

On the other hand, a few regions have enacted specific laws to deal with the offense. The state of Oklahoma in the US enacted the Catfishing Liability Act, 2016. This statute imposes liability on “any person who knowingly uses another’s name, voice, signature, photograph or likeness through social media to create a false identity without such person’s consent […] for the purposes[s] of harming, intimidating, threatening or defrauding”.13Catfishing Liability Act of 2016, Okla. Stat. tit. 12 § 1450, B. (Oklahoma, United States). This is a civil provision and allows the impersonated person to seek an injunction and monetary damages, in addition to a minimum award of USD 500.14Catfishing Liability Act of 2016, Okla. Stat. tit. 12 § 1450, B. (Oklahoma, United States). In Australia, Section 474.25C, inserted in the Criminal Code Act, made it an offense to use telecommunication service to impersonate one’s age and gender and commit any act to prepare or plan to cause harm to, engage in sexual activity with, or procure for sexual activity, persons under the age of 16.

Footnotes

PREVIOUS MODULE

NEXT MODULE