Sunday, April 11, 2021
Home News State Bhima Koregaon violence case | Digital forensic analysis debunks electronic evidence against...

Bhima Koregaon violence case | Digital forensic analysis debunks electronic evidence against jailed activist Rona Wilson

Report says hacker controlled and planted documents in the computer of Mr. Wilson, arrested with 15 others in the Bhima Koregaon case.

A report by Arsenal Consulting, a digital forensic analyst from Chelsea, U.S., has debunked the electronic evidence gathered by the investigating agency against 42-year-old Rona Wilson and 15 others arrested in the Bhima Koregaon violence case, including Surendra Gadling, Mahesh Raut, Shoma Sen, Sudhir Dhawale, Arun Ferriera, Vernon Gonslaves, Sudha Bharadwaj and P. Varavara Rao.

Arsenal Consulting, which was roped in by the American Bar Association to examine the clone copy of the hard disc of Mr. Wilson’s computer, has stated that a hacker controlled his computer for a period of 22 months to plant documents, which led to an investigation that supposedly unravelled a Communist Party of India (Maoist) conspiracy to eliminate Prime Minister Narendra Modi “in another Rajiv Gandhi type incident”. A copy of the report is with The Hindu.

The report is a part of the writ petition filed by Mr. Wilson before the Bombay High Court that explains how a hacker exploited the IP addresses provided by one ‘Host Sailor’ and used proxy servers to plant a “trojan horse NetWire”. This initially subjected Mr. Wilson to surveillance, and later on, remotely through the malware, delivered various files, including the incriminating correspondence with other accused.

The same were stored in a folder which was set to a “hidden mode”, and over a period of 22 months, from time-to-time, various letters and material came to be planted on Mr. Wilson’s system without his knowledge, mentions the plea seeking the quashing of the FIR and chargesheet against him.

The report further states that the folders and documents were never opened by Mr. Wilson or anyone else and their existence was unknown to him. The hacker also synchronised these documents in such a way that they would get planted in any external memory device connected to the laptop.

ADGP Parambir Singh shows during a press conference in Mumbai on August 31, 2018 a copy of a print out showing catalogue of arms and ammunition allegedly recovered from activist Rona Wilson’s computer.

ADGP Parambir Singh shows during a press conference in Mumbai on August 31, 2018 a copy of a print out showing catalogue of arms and ammunition allegedly recovered from activist Rona Wilson’s computer.  
| Photo Credit: Vivek Bendre


Arsenal Consulting’s report demonstrates that Mr. Wilson’s computer was compromised through a mail sent to his email account, which carried an attachment in the form of a document (“another victory.rar”). Since it appeared to be innocuous, Mr. Wilson tried opening it but did not succeed in opening it. But because he had clicked on the attachment, it helped the attacker install the malware in his laptop. It is stated in the report that the attachment was enveloped in a decoy file, namely “another victory.rar”, and clicking the same resulted in a chain of events that led to the installation of the malware on his device.

The report shows how the attacker had retained access to Mr. Wilson’s computer for over 22 months, starting June 13, 2016, and used a remote access facility for planting the incriminating letters, while conducting the surveillance on his activities without Mr. Wilson getting a hint of it.

The report also explains that the hacker created a folder namely “kbackup” on November 3, 2016 at 00:10:07, which then was renamed as “Rbackup” and was set to hidden mode. The folder was last modified on April 16, 2018 @16:50:41, that is, a day prior to the raid, search and seizure at Mr. Wilson’s residence on April 17, 2018, weeks before he was arrested on June 6, 2018. It was in this way that incriminating documents were planted and certain genuine documents also copied in the folder, the report says.

It is clear that the hacker used the “Windows volume” on Mr. Wilson’s computer as a “staging area to synchronise data with the computer and the external memory equipment/pen drives”, and stored the same in the “System Volume Information folder” of such memory. Although the pen drive/thumb drive are not kept connected to the computer, as and when they are so connected, material gets synchronised due to the malware, the report says.

It is also pertinent to observe that though it was necessary for the prosecution to provide a clone copy of the hard disc seized from him and his co-accused along with chargesheet itself, the same was purposefully avoided, Mr. Wilson’s writ petition alleges. Instead, the Investigating Officer submitted one disc in which he had stored selected incriminating data and termed it the “Annexure Hard Disc”, it says.

The report concludes that 10 crucial documents, along with various others used to incriminate all the accused in the case, were planted through malware on Mr. Wilson’s device by an unknown person.

You have reached your limit for free articles this month.

Subscription Benefits Include

Today’s Paper

Find mobile-friendly version of articles from the day’s newspaper in one easy-to-read list.

Unlimited Access

Enjoy reading as many articles as you wish without any limitations.

Personalised recommendations

A select list of articles that match your interests and tastes.

Faster pages

Move smoothly between articles as our pages load instantly.


A one-stop-shop for seeing the latest updates, and managing your preferences.


We brief you on the latest and most important developments, three times a day.

Support Quality Journalism.

*Our Digital Subscription plans do not currently include the e-paper, crossword and print.

Learn More

FilmyTantrik is your news, entertainment, music fashion website. We provide you with the latest breaking news and videos straight from the entertainment industry.


Please enter your comment!
Please enter your name here

Most Popular

Recent Comments