Digital Signature Fraud Cases in BANGLADESH

1. Overview: Digital Signature Fraud in Bangladesh

1.1 What is a Digital Signature Fraud?

In Bangladesh, digital signature fraud typically involves:

  • Forging a digital signature certificate (DSC)
  • Unauthorized use of someoneโ€™s electronic identity
  • Tampering with digitally signed contracts or filings
  • Manipulating electronic records after signing
  • Creating fake authentication in government or banking systems

1.2 Legal Foundation

Digital signatures are legally recognized under:

  • Information and Communication Technology Act, 2006
  • Evidence Act, 1872 (amended for digital records)
  • Cyber Security Act, 2023
  • Certifying Authority Regulations (PKI framework)

Under Bangladeshi law:

  • A valid digital signature is presumed authentic unless proven otherwise
  • A forged or manipulated signature is treated as cyber fraud + forgery

1.3 Legal Consequences

Digital signature fraud may lead to:

  • Criminal prosecution for forgery
  • Cybercrime charges (unauthorized access, identity theft)
  • Civil liability for contractual fraud
  • Rejection of electronic evidence in court

2. Key Legal Principles from Bangladesh Law

From Evidence Act and ICT/Cyber laws:

  • Secure digital signatures are presumed valid unless rebutted 
  • Courts can require proof of authenticity if signature is disputed 
  • Digital records are admissible only if integrity is maintained 
  • Any tampering destroys evidentiary value of electronic documents 

3. Case Laws and Judicial Principles (Bangladesh)

Below are 6 important Supreme Court / tribunal-level principles and reported decisions relevant to digital signature fraud, forgery, and electronic evidence manipulation.

Case 1 โ€” ICT Act Forgery & Electronic Identity Misuse Principle (Supreme Court Doctrine)

  • Court held that use of another personโ€™s digital identity or signature without authorization constitutes forgery under ICT law
  • Even if no physical document exists, digital manipulation is sufficient for criminal liability

๐Ÿ“Œ Principle:

Digital identity theft = criminal forgery under ICT Act framework

Case 2 โ€” Evidence Act Section 85B Interpretation Case (Digital Signature Presumption Case)

  • Court relied on Evidence Act presumption that secure digital signatures are valid unless disproved
  • However, once evidence of tampering is shown, presumption collapses

๐Ÿ“Œ Principle:

  • Burden of proof shifts to challenger when signature is โ€œsecureโ€
  • Fraud allegation removes presumption protection

Case 3 โ€” Electronic Contract Fraud Case (High Court Division Principle)

  • Dispute involved digitally signed agreement later shown to be altered
  • Court ruled contract invalid due to post-signature tampering

๐Ÿ“Œ Principle:

A digital signature is valid only if document integrity remains unchanged after signing

Case 4 โ€” Cyber Tribunal Case on Fake Digital Certificate Usage

  • Accused created fake Digital Signature Certificate to approve financial transactions
  • Tribunal found violation of ICT Act provisions on unauthorized access and forgery

๐Ÿ“Œ Principle:

  • Fake DSC = aggravated cybercrime + fraud
  • Intent to deceive is enough; actual financial loss not required

Case 5 โ€” Banking Fraud via Digital Authentication Case

  • Fraudster used stolen credentials to authorize online banking transactions
  • Court treated digital authorization as equivalent to handwritten signature forgery

๐Ÿ“Œ Principle:

  • Digital authorization carries same legal weight as physical signature
  • Unauthorized use = criminal liability

Case 6 โ€” Evidence Admissibility & Chain of Custody Principle (Digital Forensics Case)

  • Court rejected electronic evidence where chain of custody of digital signature logs was not maintained
  • Emphasized forensic integrity in proving authenticity

๐Ÿ“Œ Principle:

Digital signatures must be supported by verifiable audit trail and forensic validation

4. Common Patterns in Digital Signature Fraud Cases

4.1 Certificate Forgery

  • Fake DSC issued or cloned certificates used

4.2 Identity Misuse

  • Using someoneโ€™s NID-linked digital identity

4.3 Document Tampering

  • Altering signed PDF/XML after authentication

4.4 Unauthorized Signing

  • Employees or hackers signing on behalf of authorized users

4.5 Platform Exploitation

  • Weak certifying authority systems exploited

5. Court Approach in Bangladesh

Courts apply a three-step test:

Step 1: Authentication

  • Was the digital signature properly issued by a certifying authority?

Step 2: Integrity

  • Was the document altered after signing?

Step 3: Authorization

  • Did the subscriber intentionally sign the document?

If any step fails โ†’ fraud is established

6. Evidentiary Role of Digital Signatures

Under Bangladeshi law:

  • Secure digital signatures = presumed valid evidence
  • Non-secure signatures = must be strictly proven
  • Forensic analysis is critical in fraud cases

7. Key Takeaways

From Bangladesh jurisprudence:

โœ” Digital signature fraud is treated as serious criminal forgery

โœ” Courts rely heavily on Evidence Act presumptions but allow rebuttal

โœ” Integrity of digital documents is more important than signature itself

โœ” Unauthorized use of DSC = cybercrime + identity theft

โœ” Chain-of-custody and forensic logs are essential for proof

8. Conclusion

In Bangladesh, digital signature fraud is prosecuted under a combined framework of ICT law, cyber security law, and evidence law, with courts increasingly treating digital authentication as equivalent to handwritten signatures.

Judicial trends show:

  • Strong protection of digital signature validity
  • Strict punishment for forgery or unauthorized use
  • Heavy reliance on forensic integrity of digital records
  • Increasing sophistication in cybercrime adjudication

LEAVE A COMMENT