SlideShare a Scribd company logo
1 of 3
Download to read offline
Transparency and Security with E-Signatures| DrySign
Signature Forgery - Enhancing Transparency and Security
with Digital Signatures - DrySign by Exela
Digital signatures have sparked a revolution since the development of the RSA algorithm (named
after its inventors – Ron Rivest, Adi Shamir, and Leonard Adleman) in 1977. RSA went on to
become the most common asymmetric algorithm in use, ensuring electronic messages and data
storage remain secret, secure, and accurate. This marked the dawn of various digital signature
schemes that began emerging soon after.
Besides saving time, paper, and a lot of effort, did you know that digital signatures could have also
averted several crimes and scandals in the past? Let’s look into a couple of interesting cases.
Digital signatures in courts
Back in 2013, a band of six cybercriminals forged release documents and had them signed by the
judge to facilitate a legitimate-looking prison break. Also, in 2012, a man in Pennsylvania forged
release papers to escape from his sentence for tax fraud. All these cases could have been easily
avoided using the traceability offered by digital signature solutions.
Search warrants are another area where digital signatures can make a significant difference. A
search warrant is a document signed by the magistrate that grants authority to law enforcement
officers to search a property. Search warrants contain sensitive information like names & social
security numbers of people and informants involved, along with evidence. The search warrant is
based on another document called an affidavit signed by a law enforcement officer, stating the
facts and the reasons to search the property.
With digital signature solutions in place, it is possible to speed up this process while adding a layer
of virtually impenetrable security. A quickly signed warrant can be the thin line separating a major
bust and an escaped felon in mission-critical situations.
Also Read: E-Signatures: The Impact on Workplace Productivity
Transparency and Security with E-Signatures| DrySign
Some recent cases of signature forgery
A resident of Chattanooga, Tennessee, named Robert Hallick, was arrested on account of forgery.
He allegedly used his real name for his initial application to carry a firearm. The Tennessee
Department of Safety and the Homeland Security Handgun Unite rejected his application due to
an active warrant in Michigan. He then applied for the second time using the name of the former
president Barack H. Obama and forged the signature of the Commander-In-Chief. Eventually, in
February 2021, he was caught and sent to prison.
A Canadian passenger from Stratford was arrested on 11th February, 2021 on account of forged
COVID-19 tests at the Pearson International Airport. After a thorough investigation, he was found
to test positive for COVID-19.
In November 2020, there was yet another case in New Jersey where a Hunterdon County resident
named Brian Shilling was arrested for forging a signature while casting a mail-in vote. He forged
another individual’s signature, certified it, and sent it to the Hunterdon County Board of Elections,
purporting the vote was cast by someone else. He was charged with tampering with public
records, falsifying records, and disorderly persons offense, among other charges.
Conclusion
The implications and consequences of such incidents are direly devastating. When we look at it in
retrospect, it is evident that these situations could have been easily averted using Digital
Signatures.
Unlike traditional, hand-written signatures that can be easily forged, digital signatures offer multiple
layers of protection. Even before a signer can access a document and sign, e-signatures can
verify the signer’s identity through various options such as email address, SMS, OTPs, ID
verification, and knowledge-based questions.
Then come the physical and platform security measures, including malware protection,
commercial-grade firewalls, strict access control, data encryption, multiple authentication, and
security certifications.
With all these fool-proof measures in place, do you think any of the above forgery cases would
have transpired? No chance.
Sources: https://www.nbcnews.com/news/us-news/six-charged-florida-prison-escape-
used-forged-documents-flna2d11778731
http://index-of.es/Hack/Scene%20of%20the%20Cybercrime%20-
%20Computer%20Forensics%20Handbook%20(Syngress).pdf
https://www.ktvu.com/news/tennessee-man-arrested-after-forging-former-president-
obamas-signature-on-handgun-permit-reports
https://www.nj.com/hunterdon/2020/11/nj-man-charged-with-voter-fraud-after-forging-
signature-on-mail-in-ballot-authorities-say.html
Transparency and Security with E-Signatures| DrySign
https://lfpress.com/news/local-news/stratford-man-charged-with-using-false-covid-19-
document-at-pearson
DISCLAIMER: The information on this site is for general information purposes only and is
not intended to serve as legal advice. Laws governing the subject matter may change
quickly, and Exela cannot guarantee that all the information on this site is current or
correct. Should you have specific legal questions about any of the information on this site,
you should consult with a licensed attorney in your area.
Sign UP

More Related Content

Similar to Signature Forgery - Enhancing Transparency and Security with Digital Signatures - DrySign

Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3
Gary Kazmer
 
The Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital SignaturesThe Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital Signatures
Tania Fuchs
 
504 Part II Criminal Procedure# 151053 Cust Cengage .docx
504   Part II Criminal Procedure# 151053   Cust Cengage  .docx504   Part II Criminal Procedure# 151053   Cust Cengage  .docx
504 Part II Criminal Procedure# 151053 Cust Cengage .docx
troutmanboris
 
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docxAccessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
nettletondevon
 
Identity Theft : A Serious Crime
Identity Theft : A Serious CrimeIdentity Theft : A Serious Crime
Identity Theft : A Serious Crime
Tanzim Rizwan
 
MindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no coverMindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no cover
PJStarr
 

Similar to Signature Forgery - Enhancing Transparency and Security with Digital Signatures - DrySign (18)

Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3
 
The Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital SignaturesThe Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital Signatures
 
The ultimate guide to digital signatures
The ultimate guide to digital signaturesThe ultimate guide to digital signatures
The ultimate guide to digital signatures
 
504 Part II Criminal Procedure# 151053 Cust Cengage .docx
504   Part II Criminal Procedure# 151053   Cust Cengage  .docx504   Part II Criminal Procedure# 151053   Cust Cengage  .docx
504 Part II Criminal Procedure# 151053 Cust Cengage .docx
 
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docxAccessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
 
The Importance of Electronic Identities in the Digital Era
The Importance of Electronic Identities in the Digital EraThe Importance of Electronic Identities in the Digital Era
The Importance of Electronic Identities in the Digital Era
 
Security in digital voting system
Security in digital voting systemSecurity in digital voting system
Security in digital voting system
 
CLE Webinar: eSignature, an overview of legal validity and case law
CLE Webinar: eSignature, an overview of legal validity and case lawCLE Webinar: eSignature, an overview of legal validity and case law
CLE Webinar: eSignature, an overview of legal validity and case law
 
Causes of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityCauses of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and Security
 
Legal Issues in Mobile Security Research
Legal Issues in Mobile Security ResearchLegal Issues in Mobile Security Research
Legal Issues in Mobile Security Research
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008
 
Identity Theft : A Serious Crime
Identity Theft : A Serious CrimeIdentity Theft : A Serious Crime
Identity Theft : A Serious Crime
 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalism
 
THE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFTTHE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFT
 
IT_Cutter_Publication
IT_Cutter_PublicationIT_Cutter_Publication
IT_Cutter_Publication
 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime Investigation
 
MindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no coverMindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no cover
 

More from Drysign By Exela

More from Drysign By Exela (20)

Electronic Signatures – The Right Move for Business Owners - DrySign USA.pdf
Electronic Signatures – The Right Move for Business Owners - DrySign USA.pdfElectronic Signatures – The Right Move for Business Owners - DrySign USA.pdf
Electronic Signatures – The Right Move for Business Owners - DrySign USA.pdf
 
Data-Driven Wins: How eSignatures Can Transform Your Business
Data-Driven Wins: How eSignatures Can Transform Your BusinessData-Driven Wins: How eSignatures Can Transform Your Business
Data-Driven Wins: How eSignatures Can Transform Your Business
 
Empowering Digital Transactions eSignatures and eIDentification in India - Dr...
Empowering Digital Transactions eSignatures and eIDentification in India - Dr...Empowering Digital Transactions eSignatures and eIDentification in India - Dr...
Empowering Digital Transactions eSignatures and eIDentification in India - Dr...
 
How eSignatures Offer Paperless Solutions for HR Departments - DrySign India
How eSignatures Offer Paperless Solutions for HR Departments - DrySign IndiaHow eSignatures Offer Paperless Solutions for HR Departments - DrySign India
How eSignatures Offer Paperless Solutions for HR Departments - DrySign India
 
Transforming Traditional Patient Intake Forms with eSignatures.pdf
Transforming Traditional Patient Intake Forms with eSignatures.pdfTransforming Traditional Patient Intake Forms with eSignatures.pdf
Transforming Traditional Patient Intake Forms with eSignatures.pdf
 
Securing Tomorrow Unveiling the Future of Digital Trust with PKI - DrySign
Securing Tomorrow Unveiling the Future of Digital Trust with PKI -  DrySignSecuring Tomorrow Unveiling the Future of Digital Trust with PKI -  DrySign
Securing Tomorrow Unveiling the Future of Digital Trust with PKI - DrySign
 
From Ink to Click HRs Paperless Revolution with eSignatures - DrySign.pdf
From Ink to Click HRs Paperless Revolution with eSignatures - DrySign.pdfFrom Ink to Click HRs Paperless Revolution with eSignatures - DrySign.pdf
From Ink to Click HRs Paperless Revolution with eSignatures - DrySign.pdf
 
How Digital Signature Software can Improve Patient and Staff Experience - DS USA
How Digital Signature Software can Improve Patient and Staff Experience - DS USAHow Digital Signature Software can Improve Patient and Staff Experience - DS USA
How Digital Signature Software can Improve Patient and Staff Experience - DS USA
 
Electronic Signatures – Streamlining Workflows in the Education Sector.pdf
Electronic Signatures – Streamlining Workflows in the Education Sector.pdfElectronic Signatures – Streamlining Workflows in the Education Sector.pdf
Electronic Signatures – Streamlining Workflows in the Education Sector.pdf
 
Electronic Signatures – Streamlining Workflows in the Education Sector.pdf
Electronic Signatures – Streamlining Workflows in the Education Sector.pdfElectronic Signatures – Streamlining Workflows in the Education Sector.pdf
Electronic Signatures – Streamlining Workflows in the Education Sector.pdf
 
New Trends of Electronic Signatures to Watch Out - DrySign India.pdf
New Trends of Electronic Signatures to Watch Out - DrySign India.pdfNew Trends of Electronic Signatures to Watch Out - DrySign India.pdf
New Trends of Electronic Signatures to Watch Out - DrySign India.pdf
 
eSignatures A Lifesaver for Streamlining Clinical Workflows
eSignatures A Lifesaver for Streamlining Clinical Workflows eSignatures A Lifesaver for Streamlining Clinical Workflows
eSignatures A Lifesaver for Streamlining Clinical Workflows
 
Electronic Signatures Trends Too Appealing to Ignore
Electronic Signatures Trends Too Appealing to IgnoreElectronic Signatures Trends Too Appealing to Ignore
Electronic Signatures Trends Too Appealing to Ignore
 
How eSignatures Untether Law Firms of Limitations - DrySign.pdf
How eSignatures Untether Law Firms of Limitations - DrySign.pdfHow eSignatures Untether Law Firms of Limitations - DrySign.pdf
How eSignatures Untether Law Firms of Limitations - DrySign.pdf
 
Hashing Functions & eSignatures Securing Tomorrows Data Today - DrySign
Hashing Functions & eSignatures Securing Tomorrows Data Today - DrySignHashing Functions & eSignatures Securing Tomorrows Data Today - DrySign
Hashing Functions & eSignatures Securing Tomorrows Data Today - DrySign
 
How eSignatures Streamline Healthcare Processes - DrySign india
How eSignatures Streamline Healthcare Processes - DrySign indiaHow eSignatures Streamline Healthcare Processes - DrySign india
How eSignatures Streamline Healthcare Processes - DrySign india
 
Electronic Signatures Helping Lawyers Work Faster & Smarter - DrySign
Electronic Signatures Helping Lawyers Work Faster & Smarter - DrySignElectronic Signatures Helping Lawyers Work Faster & Smarter - DrySign
Electronic Signatures Helping Lawyers Work Faster & Smarter - DrySign
 
Hashing Functions & Digital Signatures Preventing Data Theft - DrySign.pdf
Hashing Functions & Digital Signatures  Preventing Data Theft - DrySign.pdfHashing Functions & Digital Signatures  Preventing Data Theft - DrySign.pdf
Hashing Functions & Digital Signatures Preventing Data Theft - DrySign.pdf
 
E-signatures – Helping You Transform to a Paperless Office - DrySign USA.pdf
E-signatures – Helping You Transform to a Paperless Office - DrySign USA.pdfE-signatures – Helping You Transform to a Paperless Office - DrySign USA.pdf
E-signatures – Helping You Transform to a Paperless Office - DrySign USA.pdf
 
Esignatures for Freelancers A Gamechanger for the Gig Economy - DrySign.pdf
Esignatures for Freelancers A Gamechanger for the Gig Economy - DrySign.pdfEsignatures for Freelancers A Gamechanger for the Gig Economy - DrySign.pdf
Esignatures for Freelancers A Gamechanger for the Gig Economy - DrySign.pdf
 

Recently uploaded

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
Wonjun Hwang
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 

Recently uploaded (20)

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 

Signature Forgery - Enhancing Transparency and Security with Digital Signatures - DrySign

  • 1. Transparency and Security with E-Signatures| DrySign Signature Forgery - Enhancing Transparency and Security with Digital Signatures - DrySign by Exela Digital signatures have sparked a revolution since the development of the RSA algorithm (named after its inventors – Ron Rivest, Adi Shamir, and Leonard Adleman) in 1977. RSA went on to become the most common asymmetric algorithm in use, ensuring electronic messages and data storage remain secret, secure, and accurate. This marked the dawn of various digital signature schemes that began emerging soon after. Besides saving time, paper, and a lot of effort, did you know that digital signatures could have also averted several crimes and scandals in the past? Let’s look into a couple of interesting cases. Digital signatures in courts Back in 2013, a band of six cybercriminals forged release documents and had them signed by the judge to facilitate a legitimate-looking prison break. Also, in 2012, a man in Pennsylvania forged release papers to escape from his sentence for tax fraud. All these cases could have been easily avoided using the traceability offered by digital signature solutions. Search warrants are another area where digital signatures can make a significant difference. A search warrant is a document signed by the magistrate that grants authority to law enforcement officers to search a property. Search warrants contain sensitive information like names & social security numbers of people and informants involved, along with evidence. The search warrant is based on another document called an affidavit signed by a law enforcement officer, stating the facts and the reasons to search the property. With digital signature solutions in place, it is possible to speed up this process while adding a layer of virtually impenetrable security. A quickly signed warrant can be the thin line separating a major bust and an escaped felon in mission-critical situations. Also Read: E-Signatures: The Impact on Workplace Productivity
  • 2. Transparency and Security with E-Signatures| DrySign Some recent cases of signature forgery A resident of Chattanooga, Tennessee, named Robert Hallick, was arrested on account of forgery. He allegedly used his real name for his initial application to carry a firearm. The Tennessee Department of Safety and the Homeland Security Handgun Unite rejected his application due to an active warrant in Michigan. He then applied for the second time using the name of the former president Barack H. Obama and forged the signature of the Commander-In-Chief. Eventually, in February 2021, he was caught and sent to prison. A Canadian passenger from Stratford was arrested on 11th February, 2021 on account of forged COVID-19 tests at the Pearson International Airport. After a thorough investigation, he was found to test positive for COVID-19. In November 2020, there was yet another case in New Jersey where a Hunterdon County resident named Brian Shilling was arrested for forging a signature while casting a mail-in vote. He forged another individual’s signature, certified it, and sent it to the Hunterdon County Board of Elections, purporting the vote was cast by someone else. He was charged with tampering with public records, falsifying records, and disorderly persons offense, among other charges. Conclusion The implications and consequences of such incidents are direly devastating. When we look at it in retrospect, it is evident that these situations could have been easily averted using Digital Signatures. Unlike traditional, hand-written signatures that can be easily forged, digital signatures offer multiple layers of protection. Even before a signer can access a document and sign, e-signatures can verify the signer’s identity through various options such as email address, SMS, OTPs, ID verification, and knowledge-based questions. Then come the physical and platform security measures, including malware protection, commercial-grade firewalls, strict access control, data encryption, multiple authentication, and security certifications. With all these fool-proof measures in place, do you think any of the above forgery cases would have transpired? No chance. Sources: https://www.nbcnews.com/news/us-news/six-charged-florida-prison-escape- used-forged-documents-flna2d11778731 http://index-of.es/Hack/Scene%20of%20the%20Cybercrime%20- %20Computer%20Forensics%20Handbook%20(Syngress).pdf https://www.ktvu.com/news/tennessee-man-arrested-after-forging-former-president- obamas-signature-on-handgun-permit-reports https://www.nj.com/hunterdon/2020/11/nj-man-charged-with-voter-fraud-after-forging- signature-on-mail-in-ballot-authorities-say.html
  • 3. Transparency and Security with E-Signatures| DrySign https://lfpress.com/news/local-news/stratford-man-charged-with-using-false-covid-19- document-at-pearson DISCLAIMER: The information on this site is for general information purposes only and is not intended to serve as legal advice. Laws governing the subject matter may change quickly, and Exela cannot guarantee that all the information on this site is current or correct. Should you have specific legal questions about any of the information on this site, you should consult with a licensed attorney in your area. Sign UP