{"id":270,"date":"2023-08-09T06:04:22","date_gmt":"2023-08-09T06:04:22","guid":{"rendered":"https:\/\/projects-dev.itforchange.net\/online-violence-gender-and-law-guide\/?page_id=270"},"modified":"2024-10-29T12:09:59","modified_gmt":"2024-10-29T06:39:59","slug":"2-2-morphing-deepfakes","status":"publish","type":"page","link":"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/module-2-typologies-of-online-gender-based-offenses-in-law\/2-2-morphing-deepfakes\/","title":{"rendered":"2.2 Morphing\/Deepfakes"},"content":{"rendered":"<div id=\"pl-270\"  class=\"panel-layout\" ><div id=\"pg-270-0\"  class=\"panel-grid panel-has-style\" ><div id=\"module-breadcrumbs\" class=\"panel-row-style panel-row-style-for-270-0\" ><div id=\"pgc-270-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-270-0-0-0\" class=\"so-panel widget widget_bcn_widget widget_breadcrumb_navxt panel-first-child panel-last-child\" data-index=\"0\"><div class=\"panel-widget-style panel-widget-style-for-270-0-0-0\"><div class=\"breadcrumbs\" vocab=\"https:\/\/schema.org\/\" typeof=\"BreadcrumbList\">Navigate:<span property=\"itemListElement\" typeof=\"ListItem\"><a property=\"item\" typeof=\"WebPage\" title=\"Go to Online Gender-based Violence Judicial Resource Guide.\" href=\"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\" class=\"home\" aria-current=\"page\"><span property=\"name\">Online Gender-based Violence Judicial Resource Guide<\/span><\/a><meta property=\"position\" content=\"1\"><\/span><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"pg-270-1\"  class=\"panel-grid panel-has-style\" ><div id=\"module-heading\" class=\"panel-row-style panel-row-style-for-270-1\" ><div id=\"pgc-270-1-0\"  class=\"panel-grid-cell\" ><div id=\"panel-270-1-0-0\" class=\"so-panel widget widget_sow-headline panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-6593f681471d-270 so-widget-fittext-wrapper\"\n\t\t\t data-fit-text-compressor=\"0.85\"\n\t\t><div class=\"sow-headline-container \">\n\t\t\t\t\t\t\t<h1 class=\"sow-headline\">\n\t\t\t\t\t\t<img class=\"alignnone size-thumbnail\" style=\"margin-right: 10px\" src=\"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/wp-content\/uploads\/2023\/10\/6-150x150.png\" alt=\"\" width=\"60\" height=\"60\" \/> 2.2 Morphing\/Deepfakes\t\t\t\t\t\t<\/h1>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"decoration\">\n\t\t\t\t\t\t<div class=\"decoration-inside\"><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-270-2\"  class=\"panel-grid panel-has-style\" ><div id=\"module-content\" class=\"panel-row-style panel-row-style-for-270-2\" ><div id=\"pgc-270-2-0\"  class=\"panel-grid-cell\" ><div id=\"panel-270-2-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child\" data-index=\"2\" ><div id=\"m2-221\" class=\"panel-widget-style panel-widget-style-for-270-2-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t><h3 class=\"widget-title\">2.2.1 What is morphing?<\/h3>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p>Morphing is a very specific form of digital sexual violence involving transmogrifying or splicing photos or videos (for example, using deepfake applications to morph the head of a victim onto another image), and uploading them, including on pornographic websites.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"1\" data-mfn-post-scope=\"0000000000002ded0000000000000000_270\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002ded0000000000000000_270-1\">1<\/a><\/sup><span id=\"mfn-content-0000000000002ded0000000000000000_270-1\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"1\">UN Women. (2020). <em>Online Violence against Women In Asia: A Multicountry Study<\/em>. <a href=\"https:\/\/asiapacific.unwomen.org\/sites\/default\/files\/Field%20Office%20ESEAsia\/Docs\/Publications\/2020\/12\/ap-ICT-VAWG-report-7Dec20.pdf\">https:\/\/asiapacific.unwomen.org\/sites\/default\/files\/Field%20Office%20ESEAsia\/Docs\/Publications\/2020\/12\/ap-ICT-VAWG-report-7Dec20.pdf<\/a> <\/span> The digital morphing of an image, as a way of attacking women, is a relatively new form of gendered violence. Its prominence has increased as Artificial Intelligence (AI) capabilities have become more sophisticated and easily available to the general public. Through deepfake technology, a person\u2019s face can be superimposed onto the body of another, with eerily realistic and convincing results.<\/p>\n<p>Research carried out by Sensity AI on the use of deepfakes shows that an overwhelming majority are sexual in nature, featuring women who did not consent to appear in these videos.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"2\" data-mfn-post-scope=\"0000000000002ded0000000000000000_270\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002ded0000000000000000_270-2\">2<\/a><\/sup><span id=\"mfn-content-0000000000002ded0000000000000000_270-2\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"2\">Sensity. (2010). <em>Deepfake Detection For Forensic Analysis<\/em>.<a href=\"https:\/\/sensity.ai\/blog\/deepfake-detection\/deepfake-detection-forensic-analysis\/\"> https:\/\/sensity.ai\/blog\/deepfake-detection\/deepfake-detection-forensic-analysis\/<\/a><\/span> Although morphed images and other forms of synthetic media are used in many contexts, most notably to peddle false narratives in the field of politics, we limit our analysis here to the use of this technology as an instrument of gendered violence. Digitally morphed images that superimpose faces or other identifying features into pornographic media are frequently used to attack and shame women.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"3\" data-mfn-post-scope=\"0000000000002ded0000000000000000_270\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002ded0000000000000000_270-3\">3<\/a><\/sup><span id=\"mfn-content-0000000000002ded0000000000000000_270-3\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"3\">Ayubb, R. (2018). <em>I Was The Victim Of A Deepfake Porn Plot Intended To Silence Me.<\/em> Huffington Post. <a href=\"https:\/\/www.huffingtonpost.co.uk\/entry\/deepfake-porn_uk_5bf2c126e4b0f32bd58ba316\">https:\/\/www.huffingtonpost.co.uk\/entry\/deepfake-porn_uk_5bf2c126e4b0f32bd58ba316<\/a><\/span><\/p>\n<p>The offense tends to co-occur with doxxing, blackmail, and the creation of fake profiles or impersonation. It is also used as a weapon to target prominent women in the public sphere, including celebrities, journalists, and human rights defenders.<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"panel-270-2-0-1\" class=\"so-panel widget widget_sow-editor\" data-index=\"3\" ><div id=\"m2-222\" class=\"panel-widget-style panel-widget-style-for-270-2-0-1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t><h3 class=\"widget-title\">2.2.2 What is a gender-sensitive way to read a case of morphed images\/videos?<\/h3>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p>The creation of a morphed image or video results in a range of overlapping violations. Chief among them is the violation of the victim\u2019s right to privacy and bodily integrity. Another relates to issues of identity fraud and digital misrepresentation. Further, since these cases usually involve images being morphed into pornographic ones or the creation of sexual deepfakes, they raise the issue of dissemination of sexually explicit materials, which is punishable under Section 67A of the Information Technology (IT) Act, 2000 (IT Act).<\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"panel-270-2-0-2\" class=\"so-panel widget widget_sow-editor\" data-index=\"4\" ><div id=\"m2-223\" class=\"panel-widget-style panel-widget-style-for-270-2-0-2\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t><h3 class=\"widget-title\">2.2.3 Which laws are applicable?<\/h3>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p>Though there are no legal provisions in India that directly address the offense of morphing, existing provisions of the Indian Penal Code (IPC) and the IT Act could be interpreted in such a way as to cover the act of morphing and deal with the specific harms arising from it.<\/p>\n<p>Sections 463 and 465 of the IPC, which deal with the offense of forgery, could be invoked in cases of morphing, as it essentially involves the making of a false electronic record with the intent to cause damage or injury to a person. If the act of morphing is coupled with threats or intimidation, Sections 503 and 506, which punish acts of criminal intimidation, could be applied. Further, Sections 499 and 500 of the IPC relating to the offense of defamation would be applicable if the publication of morphed images injures the reputation of the affected women.<\/p>\n<p>Section 67A of the IT Act, which punishes the act of transmitting sexually explicit materials, would apply in the case of dissemination of sexually morphed images or sexual deepfakes. If the morphed image is used to cheat someone by impersonation, then Section 66D of the IT Act would apply.<\/p>\n<p>While Section 66E of the IT Act punishes violation of privacy by the non-consensual capture or dissemination of private images of a person, it does not specifically include cases where the photo of a person\u2019s face is transposed onto the nude body of another. Therefore, it is doubtful if the words of Section 66E allow it to be invoked in cases of morphing.<\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"panel-270-2-0-3\" class=\"so-panel widget widget_sow-accordion\" data-index=\"5\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-accordion so-widget-sow-accordion-default-08b99853d3df-270\"\n\t\t\t data-max-open-panels=\"0\" data-initial-scroll-panel=\"0\"\n\t\t><div>\n\t<div class=\"sow-accordion\">\n\t\t\t<div class=\"sow-accordion-panel\n\t\t\t\t\t\"\n\t\t\t\tdata-anchor-id=\"section-336-of-the-bharatiya-nyaya-sanhita-2023-forgery\">\n\t\t\t\t\t<div class=\"sow-accordion-panel-header-container\" role=\"heading\" aria-level=\"2\">\n\t\t\t\t\t<div class=\"sow-accordion-panel-header\" tabindex=\"0\" role=\"button\" id=\"accordion-label-section-336-of-the-bharatiya-nyaya-sanhita-2023-forgery\" aria-controls=\"accordion-content-section-336-of-the-bharatiya-nyaya-sanhita-2023-forgery\" aria-expanded=\"false\">\n\t\t\t\t\t\t<div class=\"sow-accordion-title sow-accordion-title-icon-left\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tSection 336 of the Bharatiya Nyaya Sanhita, 2023 (Forgery)\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"sow-accordion-open-close-button\">\n\t\t\t\t\t\t\t<div class=\"sow-accordion-open-button\">\n\t\t\t\t\t\t\t\t<span class=\"sow-icon-fontawesome sow-fas\" data-sow-icon=\"&#x2b;\"\n\t\t \n\t\taria-hidden=\"true\"><\/span>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"sow-accordion-close-button\">\n\t\t\t\t\t\t\t\t<span class=\"sow-icon-fontawesome sow-fas\" data-sow-icon=\"&#xf068;\"\n\t\t \n\t\taria-hidden=\"true\"><\/span>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t<div\n\t\t\t\tclass=\"sow-accordion-panel-content\"\n\t\t\t\trole=\"region\"\n\t\t\t\taria-labelledby=\"accordion-label-section-336-of-the-bharatiya-nyaya-sanhita-2023-forgery\"\n\t\t\t\tid=\"accordion-content-section-336-of-the-bharatiya-nyaya-sanhita-2023-forgery\"\n\t\t\t\tstyle=\"display: none;\"\t\t\t>\n\t\t\t\t<div class=\"sow-accordion-panel-border\">\n\t\t\t\t\t<p><span style=\"font-weight: 400;\">Under the IPC, the offense of forgery is defined under Section 436. However, in the BNS, it is an offense under Section 336. Section 336 of the BNS is more consolidated, and includes some aspects of the offense of cheating too, both in physical and electronic format. Forgery is the act of creating a false document or electronic record with the intent to cause harm, deceive others, or support fraudulent claims. It can involve manipulating documents to cause someone to part with property, enter into a contract, or damage someone's reputation. The intent behind forgery may include causing financial loss, gaining an illegitimate advantage, or misleading others for personal gain.<\/span><\/p>\n<p>&nbsp;<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t<div class=\"sow-accordion-panel\n\t\t\t\t\t\"\n\t\t\t\tdata-anchor-id=\"section-351-of-the-bharatiya-nyaya-sanhita-2023-criminal-intimidation\">\n\t\t\t\t\t<div class=\"sow-accordion-panel-header-container\" role=\"heading\" aria-level=\"2\">\n\t\t\t\t\t<div class=\"sow-accordion-panel-header\" tabindex=\"0\" role=\"button\" id=\"accordion-label-section-351-of-the-bharatiya-nyaya-sanhita-2023-criminal-intimidation\" aria-controls=\"accordion-content-section-351-of-the-bharatiya-nyaya-sanhita-2023-criminal-intimidation\" aria-expanded=\"false\">\n\t\t\t\t\t\t<div class=\"sow-accordion-title sow-accordion-title-icon-left\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tSection 351 of the Bharatiya Nyaya Sanhita, 2023 (Criminal Intimidation)\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"sow-accordion-open-close-button\">\n\t\t\t\t\t\t\t<div class=\"sow-accordion-open-button\">\n\t\t\t\t\t\t\t\t<span class=\"sow-icon-fontawesome sow-fas\" data-sow-icon=\"&#x2b;\"\n\t\t \n\t\taria-hidden=\"true\"><\/span>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"sow-accordion-close-button\">\n\t\t\t\t\t\t\t\t<span class=\"sow-icon-fontawesome sow-fas\" data-sow-icon=\"&#xf068;\"\n\t\t \n\t\taria-hidden=\"true\"><\/span>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t<div\n\t\t\t\tclass=\"sow-accordion-panel-content\"\n\t\t\t\trole=\"region\"\n\t\t\t\taria-labelledby=\"accordion-label-section-351-of-the-bharatiya-nyaya-sanhita-2023-criminal-intimidation\"\n\t\t\t\tid=\"accordion-content-section-351-of-the-bharatiya-nyaya-sanhita-2023-criminal-intimidation\"\n\t\t\t\tstyle=\"display: none;\"\t\t\t>\n\t\t\t\t<div class=\"sow-accordion-panel-border\">\n\t\t\t\t\t<p><span style=\"font-weight: 400;\">Under the IPC, the crime of criminal intimidation and its punishment are provided under Sections 503 and 506, respectively. Further, criminal intimidation through an anonymous source is punishable under Section 507. These sections are consolidated under the BNS into one provision, Section 351, and are dealt with under different sub-sections. Section 351(1) of the BNS corresponds to Section 503 of the IPC, Section 351 (2) of the BNS corresponds to Section 506 of the IPC and Section 351(3) of the BNS corresponds to Section 507 of the IPC. These Sections discuss the offense of criminal intimidation which occurs when someone threatens another with harm to their person, reputation, or property, intending to cause alarm or compel them to act against their legal rights or duties.<\/span><\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t<div class=\"sow-accordion-panel\n\t\t\t\t\t\"\n\t\t\t\tdata-anchor-id=\"section-356-of-the-bharatiya-nyaya-sanhita-2023-defamation\">\n\t\t\t\t\t<div class=\"sow-accordion-panel-header-container\" role=\"heading\" aria-level=\"2\">\n\t\t\t\t\t<div class=\"sow-accordion-panel-header\" tabindex=\"0\" role=\"button\" id=\"accordion-label-section-356-of-the-bharatiya-nyaya-sanhita-2023-defamation\" aria-controls=\"accordion-content-section-356-of-the-bharatiya-nyaya-sanhita-2023-defamation\" aria-expanded=\"false\">\n\t\t\t\t\t\t<div class=\"sow-accordion-title sow-accordion-title-icon-left\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tSection 356 of the Bharatiya Nyaya Sanhita, 2023 (Defamation)\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"sow-accordion-open-close-button\">\n\t\t\t\t\t\t\t<div class=\"sow-accordion-open-button\">\n\t\t\t\t\t\t\t\t<span class=\"sow-icon-fontawesome sow-fas\" data-sow-icon=\"&#x2b;\"\n\t\t \n\t\taria-hidden=\"true\"><\/span>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"sow-accordion-close-button\">\n\t\t\t\t\t\t\t\t<span class=\"sow-icon-fontawesome sow-fas\" data-sow-icon=\"&#xf068;\"\n\t\t \n\t\taria-hidden=\"true\"><\/span>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t<div\n\t\t\t\tclass=\"sow-accordion-panel-content\"\n\t\t\t\trole=\"region\"\n\t\t\t\taria-labelledby=\"accordion-label-section-356-of-the-bharatiya-nyaya-sanhita-2023-defamation\"\n\t\t\t\tid=\"accordion-content-section-356-of-the-bharatiya-nyaya-sanhita-2023-defamation\"\n\t\t\t\tstyle=\"display: none;\"\t\t\t>\n\t\t\t\t<div class=\"sow-accordion-panel-border\">\n\t\t\t\t\t<p><span style=\"font-weight: 400;\">Under the IPC, the definition of criminal defamation and its punishment are provided in Sections 499 and 500, respectively. However, in the BNS, these sections are consolidated into one provision:\u00a0 Section 356. The elements of the offense have not been changed in the BNS provision. The Section discusses the harm caused by publication, verbalization, or other forms of offensive material that is false, defamatory, and causes harm to the reputation of a person. The main difference between the two laws is that in the BNS, community service has been added as an alternative punishment along with imprisonment and fines.<\/span><\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t<div class=\"sow-accordion-panel\n\t\t\t\t\t\"\n\t\t\t\tdata-anchor-id=\"corresponding-bharatiya-nyaya-sanhita-2023-bns-provision\">\n\t\t\t\t\t<div class=\"sow-accordion-panel-header-container\" role=\"heading\" aria-level=\"2\">\n\t\t\t\t\t<div class=\"sow-accordion-panel-header\" tabindex=\"0\" role=\"button\" id=\"accordion-label-corresponding-bharatiya-nyaya-sanhita-2023-bns-provision\" aria-controls=\"accordion-content-corresponding-bharatiya-nyaya-sanhita-2023-bns-provision\" aria-expanded=\"false\">\n\t\t\t\t\t\t<div class=\"sow-accordion-title sow-accordion-title-icon-left\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tCorresponding Bharatiya Nyaya Sanhita, 2023 (BNS) Provision\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"sow-accordion-open-close-button\">\n\t\t\t\t\t\t\t<div class=\"sow-accordion-open-button\">\n\t\t\t\t\t\t\t\t<span class=\"sow-icon-fontawesome sow-fas\" data-sow-icon=\"&#x2b;\"\n\t\t \n\t\taria-hidden=\"true\"><\/span>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"sow-accordion-close-button\">\n\t\t\t\t\t\t\t\t<span class=\"sow-icon-fontawesome sow-fas\" data-sow-icon=\"&#xf068;\"\n\t\t \n\t\taria-hidden=\"true\"><\/span>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t<div\n\t\t\t\tclass=\"sow-accordion-panel-content\"\n\t\t\t\trole=\"region\"\n\t\t\t\taria-labelledby=\"accordion-label-corresponding-bharatiya-nyaya-sanhita-2023-bns-provision\"\n\t\t\t\tid=\"accordion-content-corresponding-bharatiya-nyaya-sanhita-2023-bns-provision\"\n\t\t\t\tstyle=\"display: none;\"\t\t\t>\n\t\t\t\t<div class=\"sow-accordion-panel-border\">\n\t\t\t\t\t<ol>\n<li><b>Section 336 of the BNS (Forgery):\u00a0 <\/b><span style=\"font-weight: 400;\">Under the IPC, the offense of forgery is defined under Section 436. However, in the BNS, it is an offense under Section 336. Section 336 of the BNS is more consolidated, and includes some aspects of the offense of cheating too, both in physical and electronic format. Forgery is the act of creating a false document or electronic record with the intent to cause harm, deceive others, or support fraudulent claims. It can involve manipulating documents to cause someone to part with property, enter into a contract, or damage someone's reputation. The intent behind forgery may include causing financial loss, gaining an illegitimate advantage, or misleading others for personal gain.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Section 351 of the BNS (Criminal Intimidation):<\/b><span style=\"font-weight: 400;\"> Under the IPC, the crime of criminal intimidation and its punishment are provided under Sections 503 and 506, respectively. Further, criminal intimidation through an anonymous source is punishable under Section 507. These sections are consolidated under the BNS into one provision, Section 351, and are dealt with under different sub-sections. Section 351(1) of the BNS corresponds to Section 503 of the IPC, Section 351 (2) of the BNS corresponds to Section 506 of the IPC and Section 351(3) of the BNS corresponds to Section 507 of the IPC. These Sections discuss the offense of criminal intimidation which occurs when someone threatens another with harm to their person, reputation, or property, intending to cause alarm or compel them to act against their legal rights or duties.<\/span><\/li>\n<li><b>Section 356 of the BNS (Defamation): <\/b><span style=\"font-weight: 400;\">Under the IPC, the definition of criminal defamation and its punishment are provided in Sections 499 and 500, respectively. However, in the BNS, these sections are consolidated into one provision:\u00a0 Section 356. The elements of the offense have not been changed in the BNS provision. The Section discusses the harm caused by publication, verbalization, or other forms of offensive material that is false, defamatory, and causes harm to the reputation of a person. The main difference between the two laws is that in the BNS, community service has been added as an alternative punishment along with imprisonment and fines.<\/span><\/li>\n<\/ol>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n<\/div>\n<\/div><\/div><div id=\"panel-270-2-0-4\" class=\"so-panel widget widget_sow-editor\" data-index=\"6\" ><div id=\"m2-224\" class=\"panel-widget-style panel-widget-style-for-270-2-0-4\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t><h3 class=\"widget-title\">2.2.4 How have courts dealt with cases of morphed images\/videos?<\/h3>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h4 id=\"m2_2.2.4.1\">2.2.4.1 <em>State v. Madachirayil Gopinathan Suni (2018)<\/em><sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop heading-footnote \" data-mfn=\"4\" data-mfn-post-scope=\"0000000000002ded0000000000000000_270\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002ded0000000000000000_270-4\">4<\/a><\/sup><span id=\"mfn-content-0000000000002ded0000000000000000_270-4\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"4\"><em>State v. <\/em>Madachirayil Gopinathan Suni, CNR no. DLCT02-000212-2005, judgment dated 31 August 2018, Delhi District Court, at para 28. <\/span><\/h4>\n<p>While courts have acknowledged the injury caused by morphed images and held perpetrators guilty, references to the modesty of the victim and reliance on obscenity provisions are all too common in the adjudication of such cases. In this Delhi District court case, the accused sent obscene and threatening emails to the victim along with a morphed image and demanded sexual favors and threatened to upload the images on pornographic websites. When she refused, he uploaded the morphed images to the homepage of a pornographic website, and the image was taken down by the owners of the website only much later.<\/p>\n<p>The court in its judgment referred to the offending email communication, which contained a morphed photograph along with threats of extortion, as follows:<\/p>\n<p>\u201cThe words and photographs mentioned in the emails were clearly intending that such words shall be read and the object\/photograph shall be seen by the complainant woman so as to insult her modesty. Such obscene and pornographic material, which had been suitably modified and morphed by superimposing her face on a pornographic picture, would be sufficient to make out an offense under section 509 IPC.\u201d<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"5\" data-mfn-post-scope=\"0000000000002ded0000000000000000_270\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002ded0000000000000000_270-5\">5<\/a><\/sup><span id=\"mfn-content-0000000000002ded0000000000000000_270-5\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"5\"><em>State v. Madachirayil Gopinathan Suni, <\/em>CNR no. DLCT02-000212-2005, judgment dated 31 August 2018, Delhi District Court, at para 28.<\/span><\/p>\n<p>The court also convicted the accused under Section 67 of the IT Act (transmission of obscene material) based on the following reasoning:<\/p>\n<p>\u201cIt is thus clear that the material in question is lascivious and appeals to the prurient interest which tends to deprave and corrupt the persons who are likely to read, see or hear the matter contained or embodied in it, which was published, transmitted or caused to be so published or transmitted in electronic form. The emails are certainly in electronic form. Any person reading the emails and looking at the morphed obscene picture of the complainant, would tend to deprave and corrupt.\u201d<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"6\" data-mfn-post-scope=\"0000000000002ded0000000000000000_270\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002ded0000000000000000_270-6\">6<\/a><\/sup><span id=\"mfn-content-0000000000002ded0000000000000000_270-6\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"6\"><em>State v. Madachirayil Gopinathan Suni, <\/em>CNR no. DLCT02-000212-2005, judgment dated 31 August 2018, Delhi District Court, at para 25<em>.<\/em><\/span><\/p>\n<p>The reliance on patriarchal notions of modesty and the framework of obscenity fundamentally misrecognizes the nature of the offense and the harm caused to the victim, and therefore, does not appreciate its gravity. Couched in the language of \u201coutraging modesty\u201d and \u201cinsulting\u201d women, the legal definitions of such crimes give the impression that they merely <i>offend<\/i> women, while diluting the harrowing experience of harassment as an act of <i>violation<\/i>. While invoking \u201coutraging the modesty of a woman\u201d under Section 509, courts should be cognizant that the narrative of womanly modesty is centered around anxieties surrounding a woman\u2019s sexuality. This, in turn, ends up promoting the idea of <i>regulating a woman\u2019s behavior<\/i> instead of upholding her rights.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"7\" data-mfn-post-scope=\"0000000000002ded0000000000000000_270\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002ded0000000000000000_270-7\">7<\/a><\/sup><span id=\"mfn-content-0000000000002ded0000000000000000_270-7\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"7\">Tewari, A. (2017). <em>My Modesty Is Not Outraged, I Am! Patriarchy In The Language Of Law.<\/em> Feminism in India. <a href=\"https:\/\/feminisminindia.com\/2017\/08\/28\/modesty-outraged-patriarchy-law\/\">https:\/\/feminisminindia.com\/2017\/08\/28\/modesty-outraged-patriarchy-law\/<\/a><\/span> While this Section has been applied in favor of the victim, as the following case will show, it can also be used by courts to pass moralistic statements about a woman\u2019s conduct and deny her remedy.<\/p>\n<p>The application of the obscenity clause also does not address the harm or rights violation suffered by the victim. The court in the above-mentioned case was more concerned with whether the morphed image would deprave or corrupt an individual viewing it as opposed to remedying the rights violation suffered by the victim. It neither acknowledged nor addressed the violation of the victim\u2019s privacy and bodily integrity or the digital misrepresentation or defamation that she may have faced due to the acts of the accused. Therefore, while the court\u2019s judgment may have convicted the accused, the reasons for the conviction did not uphold the rights of the victim but rather relied on regressive frameworks which seek to regulate and restrict women\u2019s behavior. Instead of Section 509 of the IPC and Section 67 of the IT Act, the court in this case could have used Sections 463 and 465 of the IPC for forgery with intent to cause damage or injury to a person.<\/p>\n<p>Another point to note in this case is that the creation of the morphed image co-occurred with blackmail, as the offender threatened to send the morphed photograph of the victim to her husband. Despite the court\u2019s reliance on the archaic modesty framework that does not recognize principles of privacy and dignity, there is one positive that can be gleaned from this judgment. It correctly recognized that this was a case of criminal intimidation (IPC 503), commonly known as blackmail, as the perpetrator threatened to send the offending image to the victim\u2019s husband.<\/p>\n<p>&nbsp;<\/p>\n<h4 id=\"m2_2.2.4.2\">2.2.4.2. <em>Vikas Dogra v. State of Himachal Pradesh (2015)<\/em><sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop heading-footnote \" data-mfn=\"8\" data-mfn-post-scope=\"0000000000002ded0000000000000000_270\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002ded0000000000000000_270-8\">8<\/a><\/sup><span id=\"mfn-content-0000000000002ded0000000000000000_270-8\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"8\"><em>Vikas Dogra v. State Of Himachal Pradesh,<\/em> Cr.M.P(M) No. 125 of 2015, judgment dated 5 February 2015, High Court of Himachal Pradesh, at para 10 <\/span><\/h4>\n<p>This was yet another case where the accused morphed the photograph of a woman\u2019s face onto a nude body. Highlighting the offline-online continuum of violence, the case also allegedly involved the commission of a rape. In its judgment, the court relied on various extraneous factors, such as the fact that the perpetrator and the victim were in a relationship in the past, and the intervening time between the commission of the offense and the victim choosing to approach the court, as mitigating factors to grant bail to the perpetrator. In a particularly regressive statement, the court said:<\/p>\n<p>\u201cIt is ultimately the woman herself who is the protector of her own body and therefore, her prime responsibility to ensure that in the relationship, [she] protects her own dignity and modesty. A woman is not expected to throw herself to a man and indulge him promiscuity thereby becoming a source of hilarity. It is for her to maintain her purity, chastity and virtues.\u201d<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"9\" data-mfn-post-scope=\"0000000000002ded0000000000000000_270\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002ded0000000000000000_270-9\">9<\/a><\/sup><span id=\"mfn-content-0000000000002ded0000000000000000_270-9\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"9\"><em>Vikas Dogra v. State Of Himachal Pradesh<\/em>,\u00a0 Cr.M.P(M) No. 125 of 2015, judgment dated 5 February 2015, High Court of Himachal Pradesh, at para 10.<\/span><\/p>\n<p>This observation highlights the fallout of using the <i>womanly modesty<\/i> framework, as it can lead to unwarranted scrutiny of the victim\u2019s conduct by the court. It is important for courts to guard against judicial stereotyping,<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"10\" data-mfn-post-scope=\"0000000000002ded0000000000000000_270\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002ded0000000000000000_270-10\">10<\/a><\/sup><span id=\"mfn-content-0000000000002ded0000000000000000_270-10\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"10\">Poddar, R. (2021). <em>Gender Stereotyping: Paternalism By Courts Erodes Trust in Judicial Institutions.<\/em> The Wire. <a href=\"https:\/\/thewire.in\/law\/gender-stereotyping-paternalism-by-courts-erodes-trust-in-judicial-institutions\">https:\/\/thewire.in\/law\/gender-stereotyping-paternalism-by-courts-erodes-trust-in-judicial-institutions<\/a><\/span> that either sees the woman as in need of protection or as an untrustworthy accomplice. The above observation also goes against the settled judicial position in India that the sexual history of a rape victim is irrelevant in the trial,<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"11\" data-mfn-post-scope=\"0000000000002ded0000000000000000_270\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002ded0000000000000000_270-11\">11<\/a><\/sup><span id=\"mfn-content-0000000000002ded0000000000000000_270-11\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"11\"><em>Lillu and ors v. State of Haryana, <\/em>CRIMINAL APPEAL NO. 1226 OF 2011, judgment dated 11 April 2013, Supreme Court of India. <\/span> and against the mandate of Section 53A of the Indian Evidence Act. Section 53A says in cases of sexual offenses, where the question of consent is in issue, evidence of the character of the victim or of such person's previous sexual experience with any person shall not be relevant in determining the issue.<\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"panel-270-2-0-5\" class=\"so-panel widget widget_sow-editor\" data-index=\"7\" ><div id=\"m2-225\" class=\"panel-widget-style panel-widget-style-for-270-2-0-5\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t><h3 class=\"widget-title\">2.2.5 How have other jurisdictions dealt with cases of morphed images?<\/h3>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p>The creation of morphed images and synthetic media is an area where the law has been playing catch-up with the rapid growth in technological possibilities. However, as morphed imagery and deepfake technology become more easily accessible, these are no longer fringe problems that can be dealt with in the future but are rather urgent and disturbing realities.<\/p>\n<p>In 2019, the United States Congress proposed the Defending Each and Every Person from False Appearances by Keeping Exploitation Subject to Accountability Act, 2019<i> (Deepfakes Accountability Act),<\/i> to impose civil and criminal liability upon people who create or share deepfakes without appropriate disclaimers. While concerns have been raised about overbreadth in the definition of offending content,<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"12\" data-mfn-post-scope=\"0000000000002ded0000000000000000_270\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002ded0000000000000000_270-12\">12<\/a><\/sup><span id=\"mfn-content-0000000000002ded0000000000000000_270-12\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"12\">Schapiro, Z. (2020). <em>Deepfakes Accountability Act: Overbroad and Ineffective. Boston College Intellectual Property and Technology Forum<\/em>. <a href=\"https:\/\/lira.bc.edu\/work\/ns\/73aa6d56-3d4b-4176-bf20-446281904b04\">https:\/\/lira.bc.edu\/work\/ns\/73aa6d56-3d4b-4176-bf20-446281904b04<\/a> <\/span> the proposed legislation signals a move towards recognizing the seriousness and pervasiveness of the offense.<\/p>\n<p>The Deepfakes Act also revises the criminal offense of fraud in connection with certain identification documents to include deepfakes.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"13\" data-mfn-post-scope=\"0000000000002ded0000000000000000_270\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002ded0000000000000000_270-13\">13<\/a><\/sup><span id=\"mfn-content-0000000000002ded0000000000000000_270-13\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"13\">DEEP FAKES Accountability Act of 2019. (United States).<\/span> Recognizing the gendered nature of the offense, the proposed law also provides for assistance to victims of deepfakes, explicitly mentioning \u201cthe impact of intimate and sexual deepfakes on women and marginalized communities\u201d.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"14\" data-mfn-post-scope=\"0000000000002ded0000000000000000_270\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002ded0000000000000000_270-14\">14<\/a><\/sup><span id=\"mfn-content-0000000000002ded0000000000000000_270-14\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"14\">DEEP FAKES Accountability Act of 2019. (United States).<\/span> It is crucial that any law governing morphed imagery takes into account issues of privacy, identity fraud, and digital misrepresentation, as well as the gendered nature of the offense.<\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"panel-270-2-0-6\" class=\"so-panel widget widget_sow-editor panel-last-child\" data-index=\"8\" ><div id=\"module-footnotes\" class=\"panel-widget-style panel-widget-style-for-270-2-0-6\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t><h3 class=\"widget-title\">Footnotes<\/h3>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<ul class=\"modern-footnotes-list \"><li><span>1<\/span><div>UN Women. (2020). <em>Online Violence against Women In Asia: A Multicountry Study<\/em>. <a href=\"https:\/\/asiapacific.unwomen.org\/sites\/default\/files\/Field%20Office%20ESEAsia\/Docs\/Publications\/2020\/12\/ap-ICT-VAWG-report-7Dec20.pdf\">https:\/\/asiapacific.unwomen.org\/sites\/default\/files\/Field%20Office%20ESEAsia\/Docs\/Publications\/2020\/12\/ap-ICT-VAWG-report-7Dec20.pdf<\/a> <\/div><\/li><li><span>2<\/span><div>Sensity. (2010). <em>Deepfake Detection For Forensic Analysis<\/em>.<a href=\"https:\/\/sensity.ai\/blog\/deepfake-detection\/deepfake-detection-forensic-analysis\/\"> https:\/\/sensity.ai\/blog\/deepfake-detection\/deepfake-detection-forensic-analysis\/<\/a><\/div><\/li><li><span>3<\/span><div>Ayubb, R. (2018). <em>I Was The Victim Of A Deepfake Porn Plot Intended To Silence Me.<\/em> Huffington Post. <a href=\"https:\/\/www.huffingtonpost.co.uk\/entry\/deepfake-porn_uk_5bf2c126e4b0f32bd58ba316\">https:\/\/www.huffingtonpost.co.uk\/entry\/deepfake-porn_uk_5bf2c126e4b0f32bd58ba316<\/a><\/div><\/li><li><span>4<\/span><div><em>State v. <\/em>Madachirayil Gopinathan Suni, CNR no. DLCT02-000212-2005, judgment dated 31 August 2018, Delhi District Court, at para 28. <\/div><\/li><li><span>5<\/span><div><em>State v. Madachirayil Gopinathan Suni, <\/em>CNR no. DLCT02-000212-2005, judgment dated 31 August 2018, Delhi District Court, at para 28.<\/div><\/li><li><span>6<\/span><div><em>State v. Madachirayil Gopinathan Suni, <\/em>CNR no. DLCT02-000212-2005, judgment dated 31 August 2018, Delhi District Court, at para 25<em>.<\/em><\/div><\/li><li><span>7<\/span><div>Tewari, A. (2017). <em>My Modesty Is Not Outraged, I Am! Patriarchy In The Language Of Law.<\/em> Feminism in India. <a href=\"https:\/\/feminisminindia.com\/2017\/08\/28\/modesty-outraged-patriarchy-law\/\">https:\/\/feminisminindia.com\/2017\/08\/28\/modesty-outraged-patriarchy-law\/<\/a><\/div><\/li><li><span>8<\/span><div><em>Vikas Dogra v. State Of Himachal Pradesh,<\/em> Cr.M.P(M) No. 125 of 2015, judgment dated 5 February 2015, High Court of Himachal Pradesh, at para 10 <\/div><\/li><li><span>9<\/span><div><em>Vikas Dogra v. State Of Himachal Pradesh<\/em>,\u00a0 Cr.M.P(M) No. 125 of 2015, judgment dated 5 February 2015, High Court of Himachal Pradesh, at para 10.<\/div><\/li><li><span>10<\/span><div>Poddar, R. (2021). <em>Gender Stereotyping: Paternalism By Courts Erodes Trust in Judicial Institutions.<\/em> The Wire. <a href=\"https:\/\/thewire.in\/law\/gender-stereotyping-paternalism-by-courts-erodes-trust-in-judicial-institutions\">https:\/\/thewire.in\/law\/gender-stereotyping-paternalism-by-courts-erodes-trust-in-judicial-institutions<\/a><\/div><\/li><li><span>11<\/span><div><em>Lillu and ors v. State of Haryana, <\/em>CRIMINAL APPEAL NO. 1226 OF 2011, judgment dated 11 April 2013, Supreme Court of India. <\/div><\/li><li><span>12<\/span><div>Schapiro, Z. (2020). <em>Deepfakes Accountability Act: Overbroad and Ineffective. Boston College Intellectual Property and Technology Forum<\/em>. <a href=\"https:\/\/lira.bc.edu\/work\/ns\/73aa6d56-3d4b-4176-bf20-446281904b04\">https:\/\/lira.bc.edu\/work\/ns\/73aa6d56-3d4b-4176-bf20-446281904b04<\/a> <\/div><\/li><li><span>13<\/span><div>DEEP FAKES Accountability Act of 2019. (United States).<\/div><\/li><li><span>14<\/span><div>DEEP FAKES Accountability Act of 2019. (United States).<\/div><\/li><\/ul>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pgc-270-2-1\"  class=\"panel-grid-cell\" ><div id=\"panel-270-2-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child\" data-index=\"9\" ><div id=\"module-page-nav\" class=\"panel-widget-style panel-widget-style-for-270-2-1-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><strong>Sub-sections on this page:<\/strong><\/p>\n<ul>\n<li><a href=\"#m2-221\">2.2.1 What is morphing?<\/a><\/li>\n<li><a href=\"#m2-222\">2.2.2 What is a gender-sensitive way to read a case of morphed images\/videos?<\/a><\/li>\n<li><a href=\"#m2-223\">2.2.3 Which laws are applicable?<\/a><\/li>\n<li><a href=\"#m2-224\">2.2.4 How have courts dealt with cases of morphed images\/videos?<\/a><\/li>\n<li><a href=\"#m2-225\">2.2.5 How have other jurisdictions dealt with cases of morphed images?<\/a><\/li>\n<li><a href=\"#module-footnotes\">Footnotes<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div><\/div><\/div><div id=\"panel-270-2-1-1\" class=\"so-panel widget widget_so-multi-button panel-last-child\" data-index=\"10\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-so-multi-button so-widget-so-multi-button-base\"\n\t\t\t\n\t\t><div class=\"sp-btn-parent\" id=\"multi-0aae0a99\">\n  <a class=\"sp-btn sp-floating-btn\" data-toggle='sow-modal' href=\"#module-page-nav-mobile\" data-popup=\"module-content\"><span class=\"fa fa-bars\"><\/span> Sections<\/a>\n<\/div>\n\n<style media=\"screen\">\n  #multi-0aae0a99 a[href].sp-btn{\n    border: 1px solid #000000;\n    color: #ffffff;\n    background: #000000;\n  }\n  #multi-0aae0a99 a[href].sp-btn:hover{\n    border-color: #000000;\n    background: #ffffff;\n    color: #000000;\n  }\n\n  #multi-0aae0a99 a[href].sp-floating-btn{\n    background: #000000;\n    color: #ffffff;\n  }\n\n  #multi-0aae0a99 a[href].sp-floating-btn:hover{\n    border-color: #000000;\n    background: #ffffff;\n    color: #000000;\n  }\n<\/style>\n\n<!-- MODALS FROM THE INLINE POSTS -->\n    <div id=\"module-page-nav-mobile\" class=\"inline-modal\" data-behaviour=\"inline-modal\">\n  \t\t<div class=\"inline-overlay\"><\/div>\n  \t\t<button type=\"button\" class=\"close\">&times;<\/button>\n  \t\t<div class=\"inline-modal-dialog\" style=\"max-width:90%\" role=\"document\"><div id=\"pl-wmodule-page-nav-mobile\"  class=\"panel-layout\" ><div id=\"pg-wmodule-page-nav-mobile-0\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-wmodule-page-nav-mobile-0\" ><div id=\"pgc-wmodule-page-nav-mobile-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-wmodule-page-nav-mobile-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"0\" ><div id=\"module-page-nav\" class=\"panel-widget-style panel-widget-style-for-wmodule-page-nav-mobile-0-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><strong>Sub-sections on this page:<\/strong><\/p>\n<ul>\n<li><a href=\"#m2-221\">2.2.1 What is morphing?<\/a><\/li>\n<li><a href=\"#m2-222\">2.2.2 What is a gender-sensitive way to read a case of morphed images\/videos?<\/a><\/li>\n<li><a href=\"#m2-223\">2.2.3 Which laws are applicable?<\/a><\/li>\n<li><a href=\"#m2-224\">2.2.4 How have courts dealt with cases of morphed images\/videos?<\/a><\/li>\n<li><a href=\"#m2-225\">2.2.5 How have other jurisdictions dealt with cases of morphed images?<\/a><\/li>\n<li><a href=\"#module-footnotes\">Footnotes<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n  \t<\/div>\n    <!-- END OF MODALS -->\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-270-3\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-270-3\" ><div id=\"pgc-270-3-0\"  class=\"panel-grid-cell\" ><div id=\"panel-270-3-0-0\" class=\"so-panel widget widget_siteorigin-panels-builder panel-first-child panel-last-child\" data-index=\"11\" ><div id=\"pl-w64e1ebb859caa\"  class=\"panel-layout\" ><div id=\"pg-w64e1ebb859caa-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-w64e1ebb859caa-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-w64e1ebb859caa-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-w64e1ebb859caa-0-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><strong>PREVIOUS SECTION<\/strong><\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"panel-w64e1ebb859caa-0-0-1\" class=\"so-panel widget widget_sow-headline panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-852507278c70\"\n\t\t\t\n\t\t><div class=\"sow-headline-container \">\n\t\t\t\t\t\t\t<h2 class=\"sow-headline\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/module-2-typologies-of-online-gender-based-offenses-in-law\/2-1-non-consensual-intimate-image-distribution\/\" >\n\t\t\t\t\t\t\t\t2.1 Non-Consensual Intimate Image Distribution<\/a>\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"pgc-270-3-1\"  class=\"panel-grid-cell\" ><div id=\"panel-270-3-1-0\" class=\"so-panel widget widget_siteorigin-panels-builder panel-first-child panel-last-child\" data-index=\"12\" ><div id=\"pl-w64e1ebb859e30\"  class=\"panel-layout\" ><div id=\"pg-w64e1ebb859e30-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-w64e1ebb859e30-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-w64e1ebb859e30-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-w64e1ebb859e30-0-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><strong>NEXT SECTION<\/strong><\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"panel-w64e1ebb859e30-0-0-1\" class=\"so-panel widget widget_sow-headline panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-852507278c70\"\n\t\t\t\n\t\t><div class=\"sow-headline-container \">\n\t\t\t\t\t\t\t<h2 class=\"sow-headline\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/module-2-typologies-of-online-gender-based-offenses-in-law\/2-3-digital-voyeurism\/\" >\n\t\t\t\t\t\t\t\t2.3 Digital Voyeurism <\/a>\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"pg-270-4\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-270-4\" ><div id=\"pgc-270-4-0\"  class=\"panel-grid-cell\" ><div id=\"panel-270-4-0-0\" class=\"so-panel widget widget_siteorigin-panels-builder panel-first-child panel-last-child\" data-index=\"13\" ><div id=\"pl-w64eb9a9f93ed8\"  class=\"panel-layout\" ><div id=\"pg-w64eb9a9f93ed8-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-w64eb9a9f93ed8-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-w64eb9a9f93ed8-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-w64eb9a9f93ed8-0-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><strong>PREVIOUS MODULE<\/strong><\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"panel-w64eb9a9f93ed8-0-0-1\" class=\"so-panel widget widget_siteorigin-panels-builder panel-last-child\" data-index=\"1\" ><div class=\"module-footer-nav panel-widget-style panel-widget-style-for-w64eb9a9f93ed8-0-0-1\" ><div id=\"pl-w64eb9a9f93ee5\"  class=\"panel-layout\" ><div id=\"pg-w64eb9a9f93ee5-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-w64eb9a9f93ee5-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-w64eb9a9f93ee5-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-w64eb9a9f93ee5-0-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><span class=\"module-title module-title-red\" style=\"padding: 10px 25px;\">1<\/span><\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"panel-w64eb9a9f93ee5-0-0-1\" class=\"so-panel widget widget_sow-editor panel-last-child\" data-index=\"1\" ><div class=\"panel-widget-style panel-widget-style-for-w64eb9a9f93ee5-0-0-1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><span class=\"module-title module-title-red\" style=\"padding: 8px 18px;\">1<\/span><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pgc-w64eb9a9f93ee5-0-1\"  class=\"panel-grid-cell\" ><div id=\"panel-w64eb9a9f93ee5-0-1-0\" class=\"so-panel widget widget_sow-headline panel-first-child panel-last-child\" data-index=\"2\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-852507278c70\"\n\t\t\t\n\t\t><div class=\"sow-headline-container \">\n\t\t\t\t\t\t\t<h2 class=\"sow-headline\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/1-case-studies\/\" >\n\t\t\t\t\t\t\t\tCase Studies<\/a>\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><a href=\"\/online-violence-gender-and-law-guide\/1-case-studies\/\" class=\"so-premium-link-overlay\">&nbsp;<\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"pgc-270-4-1\"  class=\"panel-grid-cell\" ><div id=\"panel-270-4-1-0\" class=\"so-panel widget widget_siteorigin-panels-builder panel-first-child panel-last-child\" data-index=\"14\" ><div id=\"pl-w64e1ebb859fcc\"  class=\"panel-layout\" ><div id=\"pg-w64e1ebb859fcc-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-w64e1ebb859fcc-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-w64e1ebb859fcc-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-w64e1ebb859fcc-0-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><strong>NEXT MODULE<\/strong><\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"panel-w64e1ebb859fcc-0-0-1\" class=\"so-panel widget widget_siteorigin-panels-builder panel-last-child\" data-index=\"1\" ><div class=\"module-footer-nav panel-widget-style panel-widget-style-for-w64e1ebb859fcc-0-0-1\" ><div id=\"pl-w64e1ebb859fda\"  class=\"panel-layout\" ><div id=\"pg-w64e1ebb859fda-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-w64e1ebb859fda-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-w64e1ebb859fda-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-w64e1ebb859fda-0-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><span class=\"module-title module-title-orange\">3<\/span><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pgc-w64e1ebb859fda-0-1\"  class=\"panel-grid-cell\" ><div id=\"panel-w64e1ebb859fda-0-1-0\" class=\"so-panel widget widget_sow-headline panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-852507278c70\"\n\t\t\t\n\t\t><div class=\"sow-headline-container \">\n\t\t\t\t\t\t\t<h2 class=\"sow-headline\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/module-3-access-to-justice\/\" >\n\t\t\t\t\t\t\t\tAccess to Justice<\/a>\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><a href=\"\/online-violence-gender-and-law-guide\/module-3-access-to-justice\/\" class=\"so-premium-link-overlay\">&nbsp;<\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><ul class=\"modern-footnotes-list modern-footnotes-list--show-only-for-print\"><li><span>1<\/span><div>UN Women. (2020). <em>Online Violence against Women In Asia: A Multicountry Study<\/em>. <a href=\"https:\/\/asiapacific.unwomen.org\/sites\/default\/files\/Field%20Office%20ESEAsia\/Docs\/Publications\/2020\/12\/ap-ICT-VAWG-report-7Dec20.pdf\">https:\/\/asiapacific.unwomen.org\/sites\/default\/files\/Field%20Office%20ESEAsia\/Docs\/Publications\/2020\/12\/ap-ICT-VAWG-report-7Dec20.pdf<\/a> <\/div><\/li><li><span>2<\/span><div>Sensity. (2010). <em>Deepfake Detection For Forensic Analysis<\/em>.<a href=\"https:\/\/sensity.ai\/blog\/deepfake-detection\/deepfake-detection-forensic-analysis\/\"> https:\/\/sensity.ai\/blog\/deepfake-detection\/deepfake-detection-forensic-analysis\/<\/a><\/div><\/li><li><span>3<\/span><div>Ayubb, R. (2018). <em>I Was The Victim Of A Deepfake Porn Plot Intended To Silence Me.<\/em> Huffington Post. <a href=\"https:\/\/www.huffingtonpost.co.uk\/entry\/deepfake-porn_uk_5bf2c126e4b0f32bd58ba316\">https:\/\/www.huffingtonpost.co.uk\/entry\/deepfake-porn_uk_5bf2c126e4b0f32bd58ba316<\/a><\/div><\/li><li><span>4<\/span><div><em>State v. <\/em>Madachirayil Gopinathan Suni, CNR no. DLCT02-000212-2005, judgment dated 31 August 2018, Delhi District Court, at para 28. <\/div><\/li><li><span>5<\/span><div><em>State v. Madachirayil Gopinathan Suni, <\/em>CNR no. DLCT02-000212-2005, judgment dated 31 August 2018, Delhi District Court, at para 28.<\/div><\/li><li><span>6<\/span><div><em>State v. Madachirayil Gopinathan Suni, <\/em>CNR no. DLCT02-000212-2005, judgment dated 31 August 2018, Delhi District Court, at para 25<em>.<\/em><\/div><\/li><li><span>7<\/span><div>Tewari, A. (2017). <em>My Modesty Is Not Outraged, I Am! Patriarchy In The Language Of Law.<\/em> Feminism in India. <a href=\"https:\/\/feminisminindia.com\/2017\/08\/28\/modesty-outraged-patriarchy-law\/\">https:\/\/feminisminindia.com\/2017\/08\/28\/modesty-outraged-patriarchy-law\/<\/a><\/div><\/li><li><span>8<\/span><div><em>Vikas Dogra v. State Of Himachal Pradesh,<\/em> Cr.M.P(M) No. 125 of 2015, judgment dated 5 February 2015, High Court of Himachal Pradesh, at para 10 <\/div><\/li><li><span>9<\/span><div><em>Vikas Dogra v. State Of Himachal Pradesh<\/em>,\u00a0 Cr.M.P(M) No. 125 of 2015, judgment dated 5 February 2015, High Court of Himachal Pradesh, at para 10.<\/div><\/li><li><span>10<\/span><div>Poddar, R. (2021). <em>Gender Stereotyping: Paternalism By Courts Erodes Trust in Judicial Institutions.<\/em> The Wire. <a href=\"https:\/\/thewire.in\/law\/gender-stereotyping-paternalism-by-courts-erodes-trust-in-judicial-institutions\">https:\/\/thewire.in\/law\/gender-stereotyping-paternalism-by-courts-erodes-trust-in-judicial-institutions<\/a><\/div><\/li><li><span>11<\/span><div><em>Lillu and ors v. State of Haryana, <\/em>CRIMINAL APPEAL NO. 1226 OF 2011, judgment dated 11 April 2013, Supreme Court of India. <\/div><\/li><li><span>12<\/span><div>Schapiro, Z. (2020). <em>Deepfakes Accountability Act: Overbroad and Ineffective. Boston College Intellectual Property and Technology Forum<\/em>. <a href=\"https:\/\/lira.bc.edu\/work\/ns\/73aa6d56-3d4b-4176-bf20-446281904b04\">https:\/\/lira.bc.edu\/work\/ns\/73aa6d56-3d4b-4176-bf20-446281904b04<\/a> <\/div><\/li><li><span>13<\/span><div>DEEP FAKES Accountability Act of 2019. (United States).<\/div><\/li><li><span>14<\/span><div>DEEP FAKES Accountability Act of 2019. (United States).<\/div><\/li><\/ul>","protected":false},"excerpt":{"rendered":"<p>Navigate:Online Gender-based Violence Judicial Resource Guide 2.2 Morphing\/Deepfakes 2.2.1 What is morphing? Morphing is a very specific form of digital sexual violence involving transmogrifying or splicing photos or videos (for example, using deepfake applications to morph the head of a victim onto another image), and uploading them, including on pornographic websites.1UN Women. (2020). Online Violence [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":248,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/wp-json\/wp\/v2\/pages\/270"}],"collection":[{"href":"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/wp-json\/wp\/v2\/comments?post=270"}],"version-history":[{"count":12,"href":"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/wp-json\/wp\/v2\/pages\/270\/revisions"}],"predecessor-version":[{"id":2147,"href":"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/wp-json\/wp\/v2\/pages\/270\/revisions\/2147"}],"up":[{"embeddable":true,"href":"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/wp-json\/wp\/v2\/pages\/248"}],"wp:attachment":[{"href":"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/wp-json\/wp\/v2\/media?parent=270"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}