You are on page 1of 49

INTERNSHIP REPORT

By
NAZNEEN SALIM
21FRSB65
"V' SEMESTER, 'B' SEC
AT
CLUE4 EVIDENCE FORENSIC LAB
S-505, SOUTH BLOCK, MANIPAL CENTRE,
DIKENSON ROAD, BENGALURU- 560042

SUBMITTED TO
DEPARTMENT OF FORENSIC SCIENCE
KRISTU JAYANTI COLLEGE, AUTONOMOS
BENGALURU
CERTIFICATE

This is to certify that the report of the Internship “at Clue4 Evidence Forensic Lab” submitted
to The Department of Forensic Science, Kristu Jayanti College (Autonomous), in partial
fulfillment of the requirements for the award of the degree of the Bachelor of Science is a record
of original work done by MS NAZNEEN SALIM during june 2023 – July 2023 of her study in
the Department of Forensic Science, Kristu Jayanti College (Autonomous), and it has not
formed the basis for the award of any degree/ diploma / associateship / fellowship or other
similar title to any candidate of any College / University.

Countersigned
Coordinator Ms. Annapoorni Ammal
Department of Forensic Science Internship Co-ordinator
DECLARATION

I NAZNEEN SALIM hereby declare that the report of the internship “ at Clue4 Evidence
Forensic Lab” submitted to The Department of Forensic Science, Kristu Jayanti College
(Autonomous), in partial fulfillment of the requirements for the award of the degree of the
Bachelor of Science is a record of original work done by me during june 2023 and july 2023
under the guidance of Mr. Phaneendar, CEO at The Clue4evidence Forensic Lab.

Signature of the Student


Register Number
AKNOWLEDGEMENT

A special thanks to Mr. Don Caeiro, Head of the Department, Kristu Jayanti College, for his
constructive criticism throughout my internship.

A special thanks to the Clue4evidence foundation for providing us with the environment to
learn and acquire experience. The duration of my internship was warm, welcoming with
plenty of knowledge to capture.

I am extremely thankful to the management, Kristu Jayanti College, for their support
throughout.

I am highly indebted to Mr. Harsha, Internship Co-Ordinator, for guiding us interns over the
course of our internship. Without you, I don't think it would be possible to acquire so much
knowledge in such short amount of time.

Im using this opportunity to express my deepest gratitude to Mr. Phaneendar, CEO of The
Clue4evidence Foundation, for being a wise person who doesn't shy away from sharing
knowledge with us interns.

I am extremely great full to my friends and family for their constant support and guidance.
CONTENT

INTRODUCTION ............................................................................................................................................... 1
DAY WISE REPORT ............................................................................................................................................ 2
OUTCOME OF THE INTERNSHIP ...................................................................................................................... 41
CONCLUSION ................................................................................................................................................. 42
REFERENCE .................................................................................................................................................... 43
INTRODUCTION

I undertook an internship course in forensic science At Clue4evidence Forensic Lab for


General Forensics , which provided me with valuable insights and practical experiences in
various forensic disciplines. The internship aimed to expose me to the real-world applications
of forensic science and enhance my understanding of the investigative process.

Clue4 Evidence Forensic Investigations Private Limited (Clue4 Evidence Forensic Lab) is a
dedicated corporate entity and has been recognized as the competent Forensic Laboratory in
the field of testing and investigations. Incorporated in the year 2009, Clue4 Evidence
Forensic Lab is now the most preferred Forensic partner for various high profile cases which
are being investigated by Police and special investigation agencies across the Country.
Having the corporate office at Bangalore, Clue4 Evidence Forensic Lab has been efficient in
delivering various Forensic services to several clients across India and across the globe. The
company has also been successful to offer Forensics as a tool to prevent the frauds and not
just to investigate and has earned the clients from various sectors including banking, finance,
insurance, housing development corporations, law enforcement (police and courts),
educational institutions, corporate and individuals across the globe.

In the past several years of experience, the company has contributed to educate the people
through numerous Workshops, Seminars and Certifications. The reports submitted by Clue4
Evidence has been a key evidence in passing judgement in several cases. Today, Clue4
Evidence Forensic Lab is known for its credibility and efficiency and as an organisation, we
strive to offer the forensic needs of this society with the same spirit.

MISSION

“To be the provider of comprehensive & integrated forensic service with a reputation for
ENTHUSISASTIC service, EFFECTIVE quality, EFFICIENT reporting and timely EXPERT
advice”

1
VISION

To be the ultimate experts in the field of forensics and to offer fraud and risk management
services and be the source for justice”

DAY WISE REPORT

19 JUNE 2023

Today marked the beginning of my internship at clue4evidence. It was an exciting and


productive first day as I familiarized myself with the organisation, underwent an orientation
session, participated in ice-breaking activities, and engaged in a quiz. The orientation session
was conducted by MR. Harsha NR (internship co-ordinator ). Sir provided us with
organisations mission, vision, and core values. We also learned about organizational structure,
various departments, and the roles and responsibilities of each department. Furthermore, they
highlighted the code of conduct, and the importance of professionalism in the workplace.
This session laid the foundation for a clear understanding of the operations and goals. To
assess our knowledge and test our basics in forensics, a quiz was conducted after orientation.
The quiz included questions about crime scene management, history of forensic science and
etc . It served as an opportunity for us to test our knowledge and identify areas where we
could enhance our knowledge. Additionally, the quiz sparked healthy competition among the
interns with a interactive atmosphere.

2
20 JUNE 2023

On the second day we learned about-

1) Introduction to forensic science-

Forensic science is the use of scientific methods or expertise to investigate crimes or


examine evidence that might be presented in a court of law.

2) Elements of crime-

A) There are 2 essential elements required for criminal liability:

a) Actus Reus (Criminal Act)


b) Mens Rea (Guilty Mind or Criminal Intent)
• Purpose
• Knowledge
• Negligence
• Recklessness

B. Exceptions: "Strict Liability Laws"- can be guilty without mens rea. Usually involve
endangering the public in some way.

1. Laws and Principles of Forensic Science-


• Law of Individuality.
• Principle of Exchange.
• Law of Progressive Change.
3
• Principle of Comparison.
• Principle of Analysis.
• Law of Probability.
• Law Of Circumstantial Facts.

2. CASE STUDY-

DHANANJOY CHATARJEE VS THE STATE OF WEST BENGAL

About the case- The present case, i.e, Dhananjoy Chatterjee Alias Dhana v. State of West
Bengal is a historic case related to the aspect of Death Penalty or Capital Punishment in
India. It is an evident fact that Dhananjoy Chatterjee was the first person who was lawfully
executed in India in the 21st century for a crime which was not related to terrorism. The
execution by hanging took place in Alipore Central Correctional Home, Kolkata, on 14
August 2004. He was charged with the crimes of rape and murder of Hetal Parekh, a 14-year-
old school-girl. The execution encouraged public discussions and fascinated huge attention
from media houses. Dhananjoy was imprisoned and hanged. This was the first hanging in
West Bengal since 21 August 1991 at Alipore Jail.

My opinion-

The judgment provided in the case became is a topic of much discussion and have been
criticized by many serving to the allegations and the thought of how good does the death
penalty serves to the society. Human rights organization protested that the penalty was too
harsh in the India’s judicial system since the poor were hanged and the rich got away. The last
words of Dhananjoy was itself that’\ I am innocent’. This case becomes one of the important
cases under which circumstantial evidence plays a pivotal role in criminal case.

4
Circumstantial evidence” which helped prosecution nail in various landmark cases mentioned
above was heavily based on circumstantial evidence. A popular misconception is that
circumstantial evidence is less valid or less important than direct evidence. This is only partly
true: direct evidence is generally considered more powerful, but successful criminal
prosecutions often rely largely on circumstantial evidence, and civil charges are frequently
based on circumstantial or indirect evidence.

21 JUNE 2023

Report of the work carried out-

Today we started with the basics of Introduction to handwriting

Handwriting is a skill that is learned over time and involves a sophisticated interplay of
sensory and motor processes, often described as a intricate neuromuscular activity. It is a
form of communication involving visual signs or marks accepted by individuals or groups
within a community

Principle of handwriting

a) Each individual's handwriting is unique and personal to them, especially as they


mature.
b) It is not possible for someone to replicate exactly what they have written before.
Natural variations exist within the writing of the same person.
c) Building upon the previous point, it is a certainty that no two signatures from the
same person can be exactly identical. If two signatures appear identical, it's a clear
indicator that one of them is likely forged.

3) Characteristics of handwriting

5
Class Characteristics are those writing features common to a group i.e. the common pattern of
handwriting, letters, their shape which are limited to a group, age or language. In simple
words , it is nothing but copy book format i.e a model which is taught to us when we learn the
writing process which is almost similar to a class of people (kids in school of a particular
region. )

A) Movement – Motion of writing instrument with the action of hand on the writing
surface. Writer may use Finger, wrist, elbow or shoulder movement and their
combinations.
a) Finger movement – Hold pen with thumb, index finger, middle finger or sometimes
ring finger and the motion comes from these fingers. The hands rests in air and
inferior quality of writing is produced.

Features of Finger Movement Writing

The writer constantly readjusts his or her hand when writing across the page. This constant
adjustment can be seen in abrupt turns and breaks in the letters. – Irregular Connections. It is
primarily used by unskilled writers/ illiterates/ toddlers and indicates unfamiliarity with the
writing process. The writing will show frequent stops and pauses, Vertical Writing, Lack of
clear cut stroke and Lack of Rhythm.

b) Wrist Movement – Motion comes from the wrist as it rests on the writing surface.

Features of Wrist Movement Writing- Inclined Writing, Angular and Less space between the
letters, More degree of freedom and Fast.

Forearm Movement – Arm of the writer rests on the writing surface and the action comes
from the elbow.

Features of Forearm / Elbow Movement Writing- Good quality, Rapid writing, Gives more
command and lateral freedom, Smooth Clear cut strokes.

6
c) Shoulder Movement / Full arm Movement

Motion comes from shoulder. Mostly detached way of writing . Whole arm writing is used to
write on large surfaces like blackboards.

• Pen Pressure – weight or pressure unconsciously applied to the writing instrument


during the act of writing. Writing produced with a nib pen will clearly show the
effect of applying different amount of pressure to the writing instrument as it passes
along the paper. The more pressure applied by the fingers and hand, the greater the
tips of the nib will separate.
• Speed – The amount of time it takes a writer to execute a handwriting. Speed can be
fast, medium, slow and deliberate.

Characteristics of Fast Writing- Simplified Letter forms, Smooth Strokes, Proper


Connections, I dots are jabbed and carelessly placed, T crossings are tapered or may be joined
with the other word and Endings are abrupt.

Characteristics of Slow Writing- Laborious, T bars are carefully placed, I dots are rounded
and close to the stem, Vertical Slant, Pressure is often monotonous.

a) Skill – Skill is the ability/ expertise to do something. The act of writing is a skill
learned through repetition until it becomes a habit. . The more an individual practices
writing, the better the skill. Skill in handwriting can be categorized as, Poor, Medium/
Normal and Superior/ Good.
• High Skill – Rhythmic, fluid, artistic, embellished and pleasing to eyes
• Low Skill- Laborious, Slow, not rhythmic

b) Speed – The number of words one can write in a minute. Speed is directly
proportional to Skill which is proportional to movement Higher the movement ,
higher the speed, higher the skill.

7
c) Slant/ Slope – Slope is the inclination of the axes of letters relative to the
perpendicular to the baseline of the writing. Slant can be Vertical / Straight,
Left/Backward, Right/ Forward
d) Shading – Shading is the conscious or voluntary act of applying pressure to the pen
while completing certain strokes. When a nib pen is used, pen strokes executed with
heavy pressure will be wider than strokes written with less pressure. It is mostly seen
in downward strokes.
e) Spacing – Spacing refers to the amount of space between letters, words and lines of
writing. The rules of writing dictates one to two letter space between words.
Sufficient space must be left between lines to prevent intermingling of upper and
lower loops.

Spacing is categorized into two –

• Inter word (between)


• intra word (Within)

There are several aspects of spacing within writing that become habitual with the individual
and of value in the identification process. These include the wide, narrow, mixed, or uniform
spacing between letters, words, and between lines on un ruled sheets sometimes referred to as
interlinear spacing.

Habits of some significance also develop in the spacing between capital letters and lowercase
or small letters in the same words.

f) Alignment – The baseline is the imaginary line or actual lines on which writing sits.
Some writers stay above the baseline, some stay on the line and some goes below it.
• Descending
• Ascending
• Uneven

8
g) Line Quality – Line Quality is defines as the smoothness, evenness, continuity ,
directness of strokes. Line Quality is the most important features in handwriting
examination. Good line quality is smooth, even, without tremors and written with
speed.
h) Poor Line Quality is the result of slow writing which may indicate forgery or
deliberate change in writing. When forging, a person tries to draws the signature
instead of writing. The art of drawing is slow and laborious process, resulting in
tremulous stroke.

Individual characteristics, on the other hand, occur when a letter departs from its usual
copybook form. These elements of writing constitute the basis of all handwriting
identifications. Those particular aspects or features of writing that are peculiar to a specific
writer.

22 JUNE 2023

Today we learned about Individual characteristics-

It can be categorized as
1. Consciously acquired habits
2. Subconscious acquisitions.

Consciously acquired habits are those the writer cultivates in his or her writing. Consciously
developed habits are easier to modify, although a writer may forget to do so when attempting
to disguise his or her handwriting.

The most obvious consciously developed deviations are unusual letter designs, slant, speed of
writing, and skill level achieved by the writer. Writers will practice penmanship until satisfied
with their development. Writers often make adjustments without thinking about them. The
subconscious habits creep into handwriting without conscious awareness. Because the writer
is not aware of these subconscious characteristics, they cannot be changed or deleted from his

9
or her handwriting. Subconscious developments are more subtle. Most writers are not aware
that these elements exist in their writing.

Hooks and ticks may creep into their letter forms. Pressure patterns develop without
awareness. The more subconscious the habit, the stronger the identifying factor because of
the writer’s difficulty in changing these subconscious characteristics.

• Form – Form is not limited to the shape of the letters but includes the method of
constructing and connecting the letters, including the initial and terminal strokes.
• Letter Designs – The writing strokes consist of lines and curves in various directions,
forming individual letter shapes. Lines can be vertical, horizontal, or diagonal. Curves
are loops, circles, or parts of circles. Letter designs are the most easily identifiable
feature of handwriting. Forgers copy letter designs while disregarding other
characteristics of the writing.
• Method of Construction – Forgers will imitate letter forms, but they fail to follow the
same method of construction of letters and words when they do so. Writers develop
consistent habits regarding the construction of letter forms. They start their letters in
approximately the same place whether on the baseline, above or below it.
• Initial Strokes – Initial strokes are found at the beginning of letters and words. They
may be straight, curved or hooked, long or short.
• Terminal Strokes – Terminal strokes are ending strokes on letters and words. They
also may be straight, curved, or hooked, long or short and are consistent with writers.
These are also overlooked by forgers unless the terminal stroke is very distinctive.
• Medial Strokes – Medial strokes are found between the initial and terminal strokes.
They include the letter forms and the strokes used to connect the letters in a word in
cursive writing.
• Connecting Strokes- Connecting strokes join the letters in words. They are also called
ligatures. Letters in a word may be connected or disconnected. Connectors can consist
of arches, garlands, angles, or thread connections.
• Embellishments – extra strokes added to letters to improve their appearance. These
flourishes are curved and wavy lines added to the beginning or ending of letters.
Hooks are little strokes made with an immediate change of direction, executed

10
subconsciously by a writer. Hooks may be found at the beginning or ending of words,
although some will appear in the middle.
• Grammar – Spelling and punctuation are important elements in handwriting
identification, along with the rules of grammar. Spelling and punctuation cannot be
used exclusively to identify handwriting, but they can aid in identification.

All characteristics that make up an individual’s handwriting represent the range of the writer.
This includes class characteristics as well as individual characteristics. All deviations from
the method taught and all idiosyncrasies of the writer are part of the range of writing. This is
the master pattern of the writer.

23 JUNE 2023

The day was started with Criminal profiling –

Criminal profiling is an investigative tool that has been around for hundreds of years in
various incarnations, used by professionals from multiple disciplines.

It is a collection of inferences about the qualities of the person responsible for committing a
crime or a series of crimes which involves making inferences about the physical, habitual,
emotional, psychological, and even vocational characteristics of criminals. However, there
are many different methods of criminal profiling, and all vary with respect to the soundness
of underlying theory, logic, and insight. Some methods are abstract, general, and trait
predictive; others are concrete, specific, and state descriptive. Some rely on offender group
statistics; some rely solely on experience; and some rely on examining case-specific behavior
evidence.

There are two operating words in criminal profiling: Modus Operandi (method of operation)
and Signature (Behaviour).

11
MODUS OPERANDI AND SIGNATURE

In criminology, modus operandi is a distinct pattern or mode of working that becomes linked
with a specific offender. Criminologists have discovered that a professional criminal,
regardless of his specialty burglary, auto theft, or embezzlement -is very likely to stick to his
own method of operation.

It can change and evolve through time. It can be fine-tuned as the offender gains experience,
sophistication, and confidence. It can also grow less competent and skilled over time,
decompensating when an offender's mental condition deteriorates or their usage of controlled
substances increases.

The term "signature" is used to characterise criminals' more distinct activities that fit their
psychological and emotional need. Criminal profilers can correlate instances and establish an
understanding of an offender's reason for crime by analysing and interpreting a specific
offender's distinctive behaviours in combination with other components such as modus
operandi and victimology.

Security features of currency note-

To ensure that counterfeiting may not happen in a routine manner, Reserve Bank of India has
incorporated some security features to differentiate a genuine bank note from the counterfeit
one. Before discussing about the security features of a note it seems very important to learn to
hold a Bank Note in order to observe the security features easily. The front side is where the
denomination is printed is known as the “Obverse Side” and the vice versa is known as the
“Reverse Side”. It is further to mention that all the security features discussed hereunder are
in reference of the Obverse Side.

12
Plate1.1- obverse side of currency note
Obverse side:

1. See through denomination value


2. Latent image of the denomination
3. Value of the denomination in Devagiri
4. Portrait of Mahatma Gandhi
5. Security thread
6. Promissory note from the Reserve bank of India along with the signature of the
governor and seal of the RBI
7. Watermark window that could be visus ized using transmitted light
8. Number panel in an increasing size order from left to Right
9. Denomination value of the currency note
10. National Emblem of India
11. Identification symbol on top of the National emblem which are unique to each value
of Currency
12. Bleed lines for the visually umpaired which denotes the value of the currency.

13
Plate 1.2- reverse side of currency notes
Reverse side:
1. Year of Issue of the currency note
2. Swachh Bharat logo along with the slogan
3. Language panel
4. Heritage site of India (here, it is The Red Fort)
5. Denomination value written in Devagiri
6. Microscopic and UV examination of the currency note:

26 JUNE 2023

Introduction to forgery

Forgery may be defined as the creation of any false written document or alteration of a
genuine one, with the intent to defraud. Forgery may consist the filling up a blank on a
document containing a genuine signature or materially altering or erasing instrument. Modes
of forgery may include bills of exchange, bills of lading, promissory notes, checks, bonds,
receipts, order for money or goods, mortgages, discharges of mortgages, deeds, bonds,
records, account books and certain kind of tickets or passes for transportation or events etc.

Laws-

The Essential Elements Of Forgery As Defined Under Section 463 Are As Follows.

14
Essential Ingredients Of Forgery:

The essential elements of forgery as defined under Section 463 are as follows:

1 The making of a false person document or electronic record or part of it.


2 Such making should be with intention to:
a Cause damage or injury to the public or to any person, or
b Cause any to part with any property, or
c Enter into any express or implied contract, or
d Commit fraud or that fraud may be committed

Making of a false document:


Forgery is committed by way of making false document. Section .464 of IPC provides
following three forms of creating a false document:
i Making, signing, sealing or executing a document with the intention of causing it to be
believed that such document was made by the authority of a person by whom the maker
knows that it was not made; or
ii Dishonest or fraudulent cancellation or alteration of a document without lawful authority;
or
iii Act of causing another person to execute or alter a document with the knowledge that the
maker thereof does not know the contents of the document or the nature of alteration.

Punishment for Forgery:

According to Section 465 of IPC whoever commits forgery shall be punished with
imprisonment of either description for a term which may extend to two years or with fine or
with both.

27 JUNE 2023

We started the session with Types of forgery-

15
For the purpose of the subject of identification and comparison of signature and writing,
forgeries may be classified as-

1) Freehand, simulated or copied forgery

n this type of forgery, the forger selects a model signature or writing and tries to copy the
design of letters and other broad features depending upon his skill, practice and
competency. Such an attempt in most of the cases results in a crude forgery, however, in some
cases the forger is competent enough to make a simulation which at first sight may appear to
be genuine and may be passed as genuine by those who compare only the general
outline of letters and gives little importance to the line quality and other minute details Traced
forgery

One of the most common methods used by forger is to make an outline of genuine
signature on a paper by the use of a carbon paper. The tracing is done with the help of a
pointed instrument to make a carbon outline on the paper. The indentation so produced serve
as guidelines which are then filled in with ink with writing instrument to complete the forgery

2. Forgery by memory

Forgery by memory refers to the signature or writing prepared from the mental
impression of the form of letters of the signature or writing of the actual writer and without
any model signature before the forger at the time of forgery, such forgeries are usually the
combinations of the normal handwriting of the forger and letter bearing some resemblance
with the signature or writing of the actual writer. .

3. Forgery without model or forgery by impersonation

When a person merely writes/signs the name of another person in his own handwriting in
normal manner or in some modified manner, representing himself to be that person with some
ulterior motive such as signature is a forgery . In this type of forgery, the forger may just

16
write the name/signature of other person in his own handwriting without even knowing
the style of writing of that person. In such case, it may be possible to trace out the forger
by comparison of the spurious signature with adequate specimen signature of the suspect.

Different methods of forgery detection

It include examination, authentication and verification. Multiple methods of detection may be


used to correctly identify a single forgery.

Forgery detection by examination involves looking closely at an object to determine if it is


valid. Forgery detection by authentication will use tests to conclude if an item is real.
Authentication must be carried out with a measurable test.

Forgery detection through verification involves obtaining confirmation and locating evidence
to conclusively determine if forgery has occurred. Verification is often used to detect forged
e-mails for job scams; the receiver of the e-mail may simply look up the information of the
company or call a representative of the company to confirm whether the e-mail is real.

28 JUNE 2023

Report overview of the following day-

1) Introduction to signature-

Signature examination is the most common examination performed by any document


examiner. A signature may be written by hand, printed, stamped, typewritten, photographed

17
or cut from one document and then attached to another. Signatures on wills, deeds, notes,
contracts and cheques are forged more frequently than the signatures to other documents, but
signature forgery can occur in various classes of documents. As a result of technological
changes, new methods to forge signatures are commonly being used. Disputes arise over the
reproductions of signatures produced by colour photocopying, inkjet printing, and rubber
stamps.

Class characteristics are those aspects, elements, or qualities of writing that situate a person
within a group of writers, or that give a written communication a group identity. Class
characteristic includes following points:

1) Slant or Slope - It is the angle or inclination of the axes of letters relative to the
perpendicular to the baseline of the writing.
2) Spacing -There are several aspects of spacing within writing that become habitual with the
individual and of value in the identification process.
3) Alignment-This concerns the relation of successive letters of a word, signature, or line of
writing to an actual or imaginary baseline.
4) Line quality -Line quality is the degree of regularity (i.e., smoothness and/or gradation) to
the written stroke as may be judged from the consistency of its nature and of its path in a
prescribed direction. It varies from smooth and controlled to tremulous and erratic.
5) Writing Movement- Writing movement to refer to the various patterns of motion of the
writing instrument, but not necessarily the dominant pattern.
6) Speed- Writing speed cannot be measured precisely from the finished handwriting but can
be judged from quality of the strokes or it can be interpreted in broad terms slow, moderate or
rapid.
7) Rhythm- rhythm is indicated by the flow of writings, correct line quality and punctuation
and proportionate formation of letters and figures.

18
Individual characteristics are defined as those discriminating elements that serve to
differentiate between members within any or all groups. Individual characteristic includes
points:

1) Continuous writing or movement interrupted at intervals by either stops or actual pen lift.
2) The rhythmic or jerky pattern of writing
3) The shading and pen emphasis on particular strokes, as well as the overall writing pressure
4) The position of the pen
5) The speed of execution.
6) The smoothly rounded, sharply curving or elliptical, or angular connecting strokes between
letters.
7) The starting of the initial writing movement before or after the pen makes contact with the
paper and the corresponding condition at the termination of the word or at interruption within
words.
8) Habitual re-touching of specific letters.

30 JUNE 2023

Report on different signature samples

We compared and worked on different known and disputed signature samples from real time
cases on the basis of their class and individual characters and gave our opinion based on that .
Signatures capture a large number of parameters that can then be used to compare the
signature.

The features included in particular:


a) Pressure strength
b) Pressure curve
c) Approach and paragraph points of the pen
d) Writing direction
e) Writing Speed
f) Angles and vibrations

19
g) Time

03 JULY 2023

Shraddha Walker, a 27-year-old woman, was strangled and chopped brutally by her live-in
partner, Aftab Poonawalla, and was thrown off into the Mehrauli jungle in the national
capital, Delhi. He killed her on May 18, 2022, and the case came to public attention on
November 11.

Aftab and Shraddha met each other on a dating app called Bumble; both of them are from
Maharashtra, and after getting into a relationship, they shifted to Delhi in 2022. Shraddha's
parents were against this relationship between Shraddha and Aftab since both of them
belonged to different religions. Shraddha and Aftab had a toxic relationship from the start,
and he used to physically abuse her.

Shraddha wanted to leave Aftab but was not able to do so. On May 18th they shifted into the
rented apartment in Mehrauli, and three days later, she was killed. Shraddha's friend noticed
her missing due to the lack of contact and informed her father. Her father filed a missing
person complaint on October 6th.

The police launched an inquiry into her live-in partner Aftab, and he claimed that Shraddha
had left the house after an argument in May. He was still using Shraddha's Instagram handle
even after her death, and he was also active on other dating apps. There is also a record of
transferring money from Shraddha's account to Aftab's. On November 8th, following further
investigation, Aftab allegedly broke down and confessed.

Aftab revealed that he strangled her to death and then chopped her into 35 pieces and kept it
in polyethylene bags. He bought a 300-li-tre fridge to store her body parts and disposed of
them in the Meh-rauli forest in several days. While analysing his transaction details, it was
seen that he spent a lot of money to buy room fresheners and incense sticks to mask the

20
stench of the rotting body. Aftab told the police that he was a trained chef and disposed of her
liver and intestine by mincing them.

Until now, 10 to 13 bones have been recovered from the forest.

The blood samples obtained from Aftab's kitchen have been sent to the forensic lab for
examination and have been confirmed to belong to Shraddha. The DNA (Deoxyribonucleic
acid) sample of Shraddha's father was taken for reference. Police are searching for CCTV
(Closed-Circuit Television) footage in order to check whether Aftab received any help from
outside and to corroborate his statements. Shraddha's phone, her skull, and the murder
weapon are yet to be found. Forensic analysis of the bones found so far revealed that they
belonged to Shraddha. The clothes worn by Shraddha and Aftab were thrown in the civil
garbage and are yet to be found. The forensic science laboratory in Rohini submitted Aftab's
narco-analysis test report where he confessed that it was a pre-planned murder. The autopsy
report reveals that she was dismembered using a saw.

Even though the case is only 80% complete to date, justice should be served to Shraddha
Walker. According to the reports, Aftab is lodged at Tihar jail number 4 and is kept in a
separate cell for security reasons which will be monitored 24 hours through CCTV cameras.

Psychological Aspects

Childhood trauma can significantly alter how you perceive and interact with the world.
People like Shraddha may become exceedingly susceptible and prone to entering an abusive
relationship, later becoming victims. For others, like Aftab, it can block down emotions and
make them into nasty people who take delight in the suffering of others. These individuals
adopt the freeze reaction and anger suppression as a coping strategy. When anger is
repressed, it builds up inside the person, making them anxious to let it out. A person may
become overloaded and explode at any surprising degree, including murder, with even the
slightest disproportionate trigger.

21
Many people would question Shradha why she did not leave Aftab if she was so unhappy or
abused. Since the abuser has been quite crafty in how they have portrayed this over time, the
victim is actually in a very confusing situation. There was a lack of understanding regarding
the complexity of abuse and the abusers’ capacity to mislead and control her purposely.

04 JULY 2023

Lecture on cyber forensics-

Cyber forensics is a process of extracting data as proof for a crime (that involves electronic
devices) while following proper investigation rules to nab the culprit by presenting the
evidence to the court. Cyber forensics is also known as computer forensics. The main aim of
cyber forensics is to maintain the thread of evidence and documentation to find out who did
the crime digitally.

in todays technology driven generation, the importance of cyber forensics is immense.


Below are the points depicting the importance of cyber forensics:

• Cyber forensics helps in collecting important digital evidence to trace the criminal.
• Electronic equipment stores massive amounts of data that a normal person fails to see. For
example: in a smart house, for every word we speak, actions performed by smart devices,
collect huge data which is crucial in cyber forensics.
• It is also helpful for innocent people to prove their innocence via the evidence collected
online.
• It is not only used to solve digital crimes but also used to solve real-world crimes like theft
cases, murder, etc.

22
• Businesses are equally benefitted from cyber forensics in tracking system breaches and
finding the attackers.

The Process Involved in Cyber Forensics

1 Obtaining a digital copy of the system that is being or is required to be inspected.


2 Authenticating and verifying the reproduction.
3 Recovering deleted files (using Autopsy Tool).
4 Using keywords to find the information you need.
5 Establishing a technical report.

FTK Imager-

FTK Imager can create perfect copies, or forensic images of computer data without making
changes to the original evidence. The forensic image is identical in every way to the original,
including file slack and unallocated space or drive free space. This allows you to store the
original media away, safe from harm while the investigation proceeds using the image.

In addition to creating images of hard drives, CDs and USB devices, FTK Imager also
features data preview capabilities. This can be used to preview both files/folders and the
contents residing in those files. FTK Imager also supports image mounting, which enhances
its portability. The tool is one of very few that can create multiple file formats: EO1, SMART,
or DD raw. You can also easily track activities through its basic text log file.
While creating copies of original disk drives, a critical aspect is to check file integrity. FTK
Imager also assists in this area, with support for creating MD5 and SHA1 hashes.
Furthermore, you can generate hash reports that can be archived for later use. For instance, if
you want to check whether an image has been changed since its acquisition.

Once you’ve created images of disk drives using FTK Imager, you can then move on to a
more thorough investigation of the case with FTK.

23
06 JULY 2023

Introduction to Fingerprints

The palmer surface of the hand has a corrugated skin which helps in the firmer grip and
friction. The elevated part is called as ‘ridges’ and the part between two elevated ridges
(depression) is called as ‘furrows’.

Fingerprint is a reproduction on a smooth surface of the pattern or design formed by the


ridges of the first joints of the phalange of the fingers. The scientific study of the fingerprints
is called as ‘Dactyloscopy’.

There are three types of fingerprints that can be found:

1 Latent
2 Patent
3 Plastic

Latent fingerprints are made of the sweat and oil on the skin’s surface. This type of
fingerprint is invisible to the naked eye and requires additional processing in order to be seen.
Patent fingerprints, on the other hand, can be made by blood, grease, ink, or dirt. This type of
fingerprint is easily visible to the human eye. Plastic fingerprints are three-dimensional
impressions and can be made by pressing your fingers in fresh paint, wax, soap, or tar. Just
like patent fingerprints, plastic fingerprints are easily seen by the human eye and do not
require additional processing for visibility purposes.

The three principles of fingerprints are:


1 Individual characteristic - No two fingers have the same pattern.

24
2 Remain unchanged - A fingerprint will not change during an individual's lifetime.
3 Unique patterns - Fingerprints have general patterns which make it possible to classify
them as "arch, loop, or whorl."

The Polygraph Test is commonly known as a “lie detector test.” It is a procedure that detects
several physiological indicators, including pulse, blood pressure, respiration, and skin
conductivity, which indicate if a person is being untruthful when asked a series of questions.
The principle behind the polygraph test is that any untruthful responses produce different
physiological responses than those associated with non-deceptive answers.

Depending on the purpose, subject, and examiners, a polygraph test can take several hours.
Examinations are usually split into :

• Pretest interview: Where information about the interview is provided to the subject,
physiological and phycological circumstances are addressed, and consent procedures are
initiated. Measuring devices, including pneumographs (to measure respiratory behaviors),
sphygmomanometer (blood pressure monitor), and electrodes (for heart rate monitoring) are
placed on the subject.

• Question procedure: Before questions are asked, baseline values for heart rate, respiratory
rate, and blood pressure rates are taken. Four kinds of questions can be asked:
• Questions relevant to the investigation
• Control questions compare the subject’s reactions and responses
• Irrelevant questions for baseline value comparison
• Concealed information questions

Limitations

The polygraph test only records responses that the subject thinks are true and does not
determine fact. It does not actually detect lying but detects physiological responses that are

25
often associated with lying. The accuracy
of the polygraph test can be affected by
the competence of the examiner.

07 JULY 2023

Fingerprint developing techniques –

Rolled impressions. Rolled impressions are made by rolling the finger or thumb from nail
edge to nail edge. They are made to show the entire friction surface of the finger or thumb,
from the tip to one quarter inch below the first joint. The larger surface of the fully rolled
impression not only allows accurate classification but it also gives more points for
comparison.

Plain impressions are made on the card by simply pressing the four fingers on it at a slight
angle. They should be showing the tips to one-quarter inch below the first joint. Thumbs are
then printed by simply re-inking and pressing them on the block next to the plain finger
impressions. The purpose of plain impressions is to verify the order of the rolled impressions
and to show certain characteristics that are sometimes distorted in the rolled prints.

Plate 2.1 – fingerprint collected on a FBI fingerprint slip

26
The black fingerprint powder can be used in all light color surfaces to provide greater
contrast and visibility of fingerprint ridges on the surface after development. Graphite,
charcoal, lampblack, photocopier toners, and anthracene are all common constituents used in
black powder.

Plate 2.2 – collection of latent print from non porous surface using black powder

Wear the gloved in hand and locate the fingerprint on the surface by using different light
sources. All the powders described above can be applied to the surface suspected of bearing
the prints as per the nature and color of the background surface. It is done by simply loading
the brush with a specific powder. Camel hairbrush is the best choice of all fingerprint experts
for development by black powder. Fiberglass brushes are also being suitably used to get the
purpose achieved.

Now dusting of fingerprint powder is to be done to the area suspected for fingerprint by
simple and gentle tapping or by simply twirling the brush by rotating back and forth (in a
clockwise and counterclockwise manner). This causes the bristles of the brush to flare out by
following the ridge outlines which makes the powder to get deposited there and makes the

27
latent impression visible. Once dusting of powder is done it should be gently blown off to
remove the excess powder from the surface so that a clean and clear print can be observed.

The next step is to lift the fingerprint from the surface for which you can use a clean and clear
piece of transparent tape. Put the sticky side of the tape on the surface where the fingerprint
got developed by leaving at least 1 cm distance from the fingerprint area and then stick the
whole piece of tape on the developed fingerprint. The size of the tape must be larger as
compared with the size of the fingerprint. After that, the tape should be lifted from the surface
and now what you have to do is to paste this tape which has fingerprint ridges on its sticky
side on another clean piece of paper or fingerprint card. Now, this is ready for level 1 and
lever 2 analysis of fingerprint patterns.

Iodine fuming is one of the earliest forensic techniques for detecting latent fingerprints, as
well as one of the most straightforward. We learned how to produce invisible fingerprints on
a piece of white paper by fuming iodine crystals . Iodine crystals give out vapor’s
(sublimation) that attach physically to the oily substances of a fingerprint while developing
latent prints with iodine, a long-used process. The iodine-developed brown prints are not
permanent until they are repaired. Benzoflavone darkens and fixes the print. Both porous and
non-porous surfaces can be treated with iodine fuming. It's great for new prints (usually no
more than a few days old). Iodine vapors are poisonous and highly corrosive. Other
procedures can be employed after the iodine fuming approach because it is non-destructive in
concept.

Plate2.3- collection of latent f.prints on porous surface using ioding fuming technique

28
10 JULY 2023

Fingerprint comparison and identification are essential processes in forensic science and law
enforcement, enabling the identification of individuals based on their unique ridge patterns.
This lecture note provides an in-depth understanding of the principles, methods, and
significance of fingerprint comparison and identification.

I. Fingerprint Comparison: A. Definition:

• Fingerprint comparison involves the systematic examination and analysis of two or more
fingerprints to determine if they originate from the same individual.
B. Purpose and Significance:
• Fingerprint comparison is crucial in criminal investigations to link suspects to crime scenes
or establish connections between different incidents.
• It helps identify potential matches between latent fingerprints collected from crime scenes
and known fingerprints in databases.
• The process aids in corroborating or refuting the involvement of an individual in a particular
event.
Ridge Tracing: A. Definition:
Ridge tracing refers to the process of following and delineating the path of the ridges within a
fingerprint.
B. Purpose and Significance:
Ridge tracing helps in visualizing and understanding the ridge patterns present in a
fingerprint.
It aids in identifying various types of ridge patterns, such as loops, whorls, and arches, which
are crucial for fingerprint classification.
Ridge tracing facilitates the identification and comparison of fingerprints, especially when
analyzing latent prints obtained from crime scenes.

C. Methodology:

29
Ridge tracing is performed using specialized tools such as magnifying lenses, fingerprint
brushes, and latent print powders or dyes.

The process involves carefully following the ridges from their starting point (core or delta) to
the endpoint, considering their flow, shape, and continuity.

Tracing the ridges includes recording the overall pattern and noting any deviations,
bifurcations, or ridge characteristics along the way.

D. Types of Ridge Patterns:

Loops: These patterns possess one or more ridges that enter, recurve, and exit the pattern
area.
Whorls: These patterns consist of concentric circles, spirals, or oval-shaped ridges.
Arches: These patterns form a wave-like structure, with ridges entering on one side and
exiting on the other, without recurving. II. Ridge Counting: A. Definition:
Ridge counting involves determining the number of ridges present within a specific area of a
fingerprint, usually within a defined ridge count square or a designated region.

B. Purpose and Significance:

Ridge counting aids in differentiating between different types of ridge patterns, particularly
loops and whorls.
It helps classify fingerprints based on their ridge count, contributing to the overall
identification and comparison process.
Ridge count comparisons can assist in establishing relationships between fingerprints and
identifying potential matches.

C. Methodology:

30
Ridge counting is performed by selecting a standardized area, such as a square or rectangle,
on a fingerprint.
The ridges within the designated area are then counted systematically, starting from a
reference point and moving along the ridge paths.
It is crucial to establish consistent counting criteria, considering factors such as the presence
of core or delta points, ridge deviations, and incomplete or broken ridges.

D. Ridge Counting for Loop and Whorl Patterns:

Loop Patterns: The ridge count is taken from the core point of a loop to the first recurving
ridge (delta), within a specific counting square.

Whorl Patterns: Ridge counting in whorls involves determining the total number of ridges
encircling an imaginary center point, usually within a defined circular region.

11 JULY 2023

Kali Linux: An operating system is the software that directly manages a system's hardware
and resources, like CPU, memory, and storage. Linux can be defined as an opensource
operating system. Kali Linux is one such Linux distribution that is designed for digital
forensics and penetration testing.

For The Kali Linux Platform to run, the windows subsystem for Linux must also be enabled
and the following are the steps to enable it.
Run the Windows PowerShell terminal with Administrator access
The following command is entered into the PowerShell terminal and restart the system when
asked in the system. Enable-WindowsOptionalFeature - Online - FeatureName Microsoft-
Windows-Subsystem- Linus
The Kali Linux platform is installed from the Microsoft store and is run as administrator.

12 JULY 2023

31
Kali Linux password setup and accessing Kali Linux desktop.

Kali Linux was run as administrator and the following order of commands were given in
order to set a new password.

1) sudo su <enters>
2) apt install xrdp-y <enter>
3) service xrdp start <enter>
4) ip add <enter>: (Under the eth0, copy the IP address given and paste it onto the
remote
5) desktop)
6) sudo apt install dbus-x11 -y <enter>
7) Enter the suitable password for the Kali Linux desktop access

13 JULY 2023

Network mapping was performed with the help of Kali Linux. Nmap is a tool that is used to

study networking i.e., the flow of data, see what kind of ports are open and how the devices
are operating. It is widely used by penetration testers for network discovery and system
security audits.

17 JULY 2023

Report on different questioned signature samples


We compared and worked on different known and disputed signature samples from real time
cases on the basis of their class and individual characters and gave our opinion based on that .

32
Signatures capture a large number of parameters that can then be used to compare the
signature.

The features included in particular:


a) Pressure strength
b) Pressure curve
c) Approach and paragraph points of the pen
d) Writing direction
e) Writing Speed

18 JULY 2023

Selvi VS State of Karnataka case study

Introduction

In this critical case analysis, we would be analyzing the famous judgment of Selvi v. State of
Karnataka, as this case was based on the fact that humans can be better than the technology.
The judgment that was given by the Chief Justice along with companion said that the practice
of narco analysis, brain mapping, fMRI, and the polygraph test we are unconstitutional. This
case discusses a new unexplored area of privacy and the guarantee against self-incrimination,
which is protected under the Article 20(3) of the Constitution. When the CJI pronounced this
judgment, it was further regarded as the Landmark judgment.

The above-stated techniques are a great asset provided by the modern sciences, which are
followed and used to tap vital information out a person that could further be used in a court as
evidence. The evidence collector is bound to adhere to the rules set by the Constitution, but
the methods as mentioned earlier easy are against such calibre and can be deemed as
unconstitutional

33
Case Information

Brief facts

In the year of 2004, Selvi(petitioner), along with others, filed a criminal appeal, which we are
followed by more appeals in 2005,06,07 and 2010; all were taken up by the Supreme court of
India in accordance of a special leave petition(SLP) on May 2010.

The appeals in this case raise objections against the instances where the accused person,
suspect, or witness have been exposed to various tests without their will or consent. These
methods were defended by the opposition for being an extraordinary method to find evidence
in the case where it becomes hard to gather any evidence, they also said that using these
procedures used does not cause any harm to the body and the information obtained from
these are only used to make the investigation more successful and used as a piece of evidence
at a trial. These would help increase the rate at which an individual is prosecuted as well as
acquitted and also would be softer & humane methods that are better than currently used
"third-degree method."

Legal Terms used & their history of use;-

Privacy

Privacy as an aspect is a relatively newly contested topic, and first, of the times it has been
used, but this concept whose purpose has regularly been defeated in the history of the
Constitution. Directly related provisions for privacy have not been available in the Indian
Constitution, but it is mostly considered to be Embedded inside Article 21 of the Constitution
of India.

Due Process

34
To ensure that the due process had been followed with fairness, we should judge the process
through which it was obtained. The first way to ensure that is the accused not coerced and
made to make an involuntary confession'. Using a hidden camera to watch over a person for a
long time is also not considered a correct process. The due process guarantees that an
individual's personal privacy will not be breached as it is a fundamental right.? Oppressive
and arbitrary regulation must not be used by the police.3 In short, the police, during a due
process, cannot act outside its powers other than those sanctioned by the Constitution.4

Self-Incrimination

Any self-incriminating act done by the accused, which is non-volatile, would be called
compulsion under article 20(3) of the Constitution of India.5 In the case of M.P.

Sharma v. Satish Chandra and others, the question arose that whether the seizure and search
order court give under section 94 CrPC violated the right of guarantee provided by Article
20(3) of Indian Constitution.

Legal Issues addressed: -


Is narcoanalysis, brain mapping, polygraph test, etc. justified methods for gaining evidence
under the constitutional ambit.
• Whether the methods used for gathering new evidence result in weakening of the
constitutional rights such for example, the right barring self-incrimination mentioned in the
article 20(3) of the Constitution & according to Section 161(2) in the CrPC, 1973.
If the procedure does or does not violate the due process
Whether the use of anyone of the techniques is not justified entry inside the mental sphere of
a person involved in the case.
Whether -an accused, witness or a victim allowed to take these tests in order to get justice,
keeping in mind that all safeguards are provided.

CASE ANALYSIS

35
The chief justice on India, K.G. Balakrishnan, Gave most of the judgment in this case.
He majorly puts light on self-incrimination under Article 20(3) of the Constitution.
The minority aspect of this, which is privacy and due process, was not given much
importance in the judgment even though it is an integral part of this case. Effective methods
for interrogation have been researched upon for very long as it is needed that the information
is obtained from a source that is not co-operating. When the analysis was done of the
investigation conducted by the police, it was found that physical coercion has been used
many times instead of painstaking and time-consuming ways as it has proved a better way to
get results quickly. The criminology field has grown many-fold in recent years, and demand
has arisen for searching a method that is efficient as well as detecting deception, which has to
lead to an increase in concomitantly.

In the judgment, we can see the aspects such as the due process and privacy has not been
given much importance. The judge agrees upon and gives his consent to the contentions of
the ways to reach a rational, but a little bit more clarity on this aspect of privacy would have
been helpful in understanding the reason behind it.

The judgment in the beginning deals which the breach of privacy when these tests tend to
violate, but in the end, the judgment shifts towards the idea of self-incrimination.

The reason is that the articles 20(3) 's interpretation has repeatedly been challenged at various
levels of Court, and the grounds of privacy has been established as well.

The undermined aspect of privacy


The second aspect that can be understood with the help of many precedents is whether some
rights under article 21 are not complied with when such tests are administered.
During any ongoing administrative proceedings or any civil proceedings, the
individual who may be asked to undergo specific tests in order to determine liability
cannot protect himself with the right against self-incrimination. It can also be
imagined that a person may not face any liability even if he/she is asked to undergo
the tests forcefully. The article 20(3) cannot be invoked where the individual faces
civil-consequences after the outcome of the test comes for the crimes like harassment,

36
abuse during custody, etc. in order to understand these; we need to see that whether
the forceful usage of such tests are in agreement with "substantive due process" as it is
a base whether all the processes used for examination by the government we are valid
or not.
In the case of Maneka Gandhi vs. VOLto, it was said that individual personal liberty
means that the person is free from all the restrictions and rules, even if those are
imposed on them by an external factor, therefore making the right to privacy an
essential component of it. Right to a fair trial, rights against inhuman treatment are
also some of the other rights whose violations have been discussed in the above case
There are many precedents through we can understand this-.
In the case of PUCL vs. UOI," it was held that wiretapping of an individual's
telephone by the police was an infringement of the right to privacy. However, it was
not mentioned in the case that the crime investigating officials were barred from
using this method as it might be necessary in some cases during an investigation
to prevent or catch any criminal activities. Hence, the regulated use of such
methods was mandated.
IN the case of Rochin v California12, it was said that breaking into the mental sphere
and trying to extract information from the individual forcibly was offensive
towards the hardened sensibilities. Also, using drugged methods to record
responses from the person can be called as a breach of privacy of the individual. A
person's behaviour or answers will change if he/she knows that they will be
subjected to such methods. On the other hand, the behaviours of the investigators
might also get influenced by the results generated. They may subject the people to
harassment, leak their recording of them during the test, etc. as there have been many cases
regarding the same. Such things may affect the mental state and also cause a social stigma
against them.

In the case of D. K. Basu vs. the State of West Bengal, the Court says that it is crucial to
prevent the torturous treatment of any individual who has been detained by the authorities.
But the police and the law enforcement authorities, to some extent, can apply such forceful
methods in order to ensure that the required information is obtained. The right to personal
liberty does give an individual perfect rights, i.e., some restrictions are always placed on an

37
individual, and they are evaluated regularly on various criteria such as reasonableness,
fairness, etc.

The Supreme Court of Israel, in a case, had said that when they are interrogating terrorist
suspects, they cannot use the torturous methods such as Sleep deprivation, electric shocks,
etc. which are also banned Geneva conventions.13

Adverse effects of the test concerning privacy:


1. In the polygraph test, there are many drawbacks due to which errors are frequently made.
The answers that are given by the suspected individuals are mostly due to fear, nervousness,
etc. Which may be taken in a wrong sense, I.e., it may look like the person is lying.
The accused, witnessed, or the victim needs to be in a healthy state of mind because, if the
person is depressed or hyperactive, he/she is more likely to give a false answer, which would
further confuse the interrogator/ examiner.
Since there is always a possibility that the person interrogated is not in a healthy state of mind
or hypnotic, he/ she may tell or disclose imaginary facts that may have never happened.
Sometimes the subject may have created a false version of an incident. This generally
happens due to PTSD or when they are asked to recollect information about traumatic events.
In such a situation the subject cannot be said to be lying as they may not be aware of it; hence
it leads to the creation of errors.
The various types of tests are not successful at all times. Statistics show that most of the
responses during drug tests are hardly relevant to the case, and many, at times, the individual
may reveal information about his private life.
6. The interrogators are needed to be highly qualified and skillful so that during interrogation,
he/ she should be able to identify which information is necessary.
This is so because many people who are being tested are still able to deceive in the drugged
state and that the investigators may ask such questions, which are specially aimed at framing
that individual.
7. There are some cases in which an individual might suffer a memory loss in the time
between which the crime/ incident took place, and when the following tests were conducted.
There, in this case, the result would not be of any use as the induvial is not aware of the truth.
We can now say that the judgment given by the Supreme Court, in this case, has cleared all
the doubts and the questions that arose regarding the validity of various tests(narco analysis,

38
polygraph test, etc.) by holding that forceful usage are prohibited as these are inhuman and
torturous treatment. An individual (accused/ witnessed/suspect is given the right to self-
incrimination at all stages of the trail.
Many foreign judgments were used in this case due to the unavailability of landmark
judgments, which helped us have an excellent idea about whether these tests/ scientific
techniques were valid or not.
A few things that the Supreme Court has left to the discretion of the authorities is when and at
what times can the use of such tests can be brought into use. It has mostly left the scope of
these tests to be used only when one wants to do it voluntarily. There may be cases where an
individual is forcefully asked to undergo due to some coercion, therefore resulting in a
mockery of the judgment.
Some judgments after the case of Selvi vs. State of Karnataka in which these tests
were used to gain evidence to reach an outcome.
1. K.M. Seema Azad vs. State of Uttar Pradesh14: This case is also commonly known as the
Shashi murder case. In this case, the CJM allowed the police to conduct a narco analysis test
in order to gain more evidence on the murderer. After the test was conducted in this case that
the Co-accused, in this case, had asked the accused to call the victim at a lonely place and
strangle the victim to death. Based on the statement recorded, the accused were sent to jail
and continues to be in prison.

2. Nupur Talwar vs. CBI and Another15: This case does not need an introduction as it is one
of the most famous murder cases of all time.

Since there was very little evidence for moving forward in the investigation. A narco analysis
test was done on Nupur as well as Rajesh Talwar. However, even after the tests, there was not
any outcome as they both knew nothing different about the murder. After this case, the
importance of increasing the quality of the forensic science in the justice system was
highlighted as the officials currently present in the country were not highly trained, which
further put the justice system in it is backfoot.
From the above two cases, we understand that to date, the scope of using the tests that were
kept open by the Supreme court in the selvi case remains open. The necessity of these tests is
still determined on a case to case basis.

39
Case conclusion

It has always been witnessed in the Indian legal system that no matter how much judgment is
well written, it is always faced by criticism. The same theory applies to the case of Selviv.
State of Karnataka. This case was set as a landmark judgment and set a procedure, but still, it
is countered with criticism. When we talk about a judicial decision, a scope for criticism is
always present to provide their views. The above-given judgment is one of the best examples
of how a neutral judgment can be provided.

40
OUTCOME OF THE INTERNSHIP

Internship is all about practical knowledge, experience and learning. I got all these
experiences throughout my internship. Being my first internship experience, it was great one
for me.

I learned about various terminologies, which were all synonyms for me before coming

My internship covered various areas and did not confine to any particular topic. We discussed
law and other things exhaustively and shared our views on various other things my Internship
provided valuable hands-on experience in a real-world work environment. This experience
can help apply theoretical knowledge gained in the classroom to practical situations.

It helped me acquire new skills and improve existing ones during the internship.

It also boosted my confidence in their abilities and career choices. Gaining real-world
experience helped me feel more prepared for future career

Also it lead to my personal growth as intern and face new challenges, learn to adapt to
different work cultures, and gain a deeper understanding of themselves and their career
aspirations.

41
CONCLUSION

The Forensic Internship Program at clue4evidence provided us with in-depth knowledge


about forensic science . This training aims to bridge the gap between theoretical knowledge
and real-world application by offering interns hands-on training, mentorship, and the
opportunity to work on real time forensic cases, encouraging us to continuously learn and
improve. The internship reaffirmed my passion for forensic science and motivated me to
pursue further studies and training in this field. Overall, it set a positive tone for the rest of
the internship, and I look forward to the upcoming opportunities for professional growth and
development

42
REFERENCE

1. ALBERT.S. ORBORN (1910), QUESTIONED DOCUMENTS


2. Kwok, R. Fake finger reveals the secrets of touch. Nature
(2009)https://doi.org/10.1038/news.2009.68.
3. Exploring the hacker tools of Mr. Robot (2015) Kali
Linuxhttps://hackertarget.com/hacker-tools-mr-robot/
4. Cornell Law School: Polygraph
https://www.law.cornell.edu/wex/polygraph#:~text=According%20to%20the%20Am
erican%20Psychological,actually%20test%20for%20honesty%2C%20however.

43

You might also like