1521180877E Text DigitalEvidence
1521180877E Text DigitalEvidence
1
MODULE 31 : DIGITAL EVIDENCE
Description of Module
Subject Name Criminology
Paper Name Cyber Criminology and Cyber Forensics
Module No. 31
Module Name/Title Digital Evidence
Pre-requisites Criminal justice administration, data extraction, digital
footprint
2
Table of Contents
1. Introduction
2. Admissibility of digital evidence
3. How to get the digital evidence
4. Legal Stand on Digital Evidence in India
5. Summary and Conclusion
Learning Outcomes
After the completion of this module, you will be able to:
1. To understand what is digital evidence
2. To know whether digital evidence is admissible in law in India.
3. To understand how to get digital evidence without breaking the chain of custody
4. To know the responsibilities of the police to protect the digital evidence
5. To understand how the victim of cyber crime may produce digital evidence
3
Digital Evidence
1. Introduction
It has been seen that cyber crimes may either be committed with the aid of the
computer or computer system or computer system networks, or through the computer,
computer system, computer networks etc. The classic examples of the earlier can be cyber
assisted murders, bank robberies or simple robberies, sextortion, shadowing and stalking etc.
For the later, classic example can be attacking the government websites and defacing them,
unauthorized access to personal data or public data, misusing the same, revenge porn,
phishing, job scam, cyber terrorism, cyber stalking, voyeurism etc. in both the cases, various
electronic devices or computers may be used; for example, desktop or laptop computers,
smart phones etc. With the advent of technology, several other devices like the Google glass
(It is a wearable device prepared by Google which is attached with android app and also a
camera), are also being used to penetrate privacy of individuals.
Whenever any computer or computer device is used for committing any crime, it
becomes essential to get the digital evidence for prosecution. Unlike real life physical crimes
where evidences may be collected by way of finger prints, blood stains or any other
mechanism, in cases of cyber crimes, collection of evidences is not easy. It needs trained
police officers to collect the digital evidences and also to analyze the same for getting the
correct track. Often it has been seen that digital evidences may lead to geo-location of the
offender, time of committing the crime and target victims, but it may not be able to get the
actual persons as the evidences may show only the person who owns the device and not the
persons who may have used it for the purpose of committing the crime. In such cases, it
becomes a Herculean task for establishing the identity of the perpetrator. Further, it may also
be seen that the police may ask the victim (in case it an attack on the individual) to collect the
evidences. The victim may never know what evidences may be collected and how. There
have been several cases where the device like the desk top or laptop computer or the smart
phone may have been ceased by the police for some offences, but no accused could have been
arrested due to jurisdictional issues. Information technology Act, 2000 brought in several
changes in related laws including the Indian evidence Act which even though was drafted
almost a century ago, was amended to suit the needs of digital crimes.
4
Source: https://image.slidesharecdn.com/electornicevidencecollection-101122053538-
phpapp02/95/electornic-evidence-collection-14-638.jpg?cb=1422636700.
5
in the typewritten or printed form, then, notwithstanding anything contained in such law, such
requirement shall be deemed to have been satisfied if such information or matter is (a)
rendered or made available in an electronic form; and (b) accessible so as to be usable for a
subsequent reference.”
The admissibility of digital record or evidence is dealt with S.65B of the Indian
evidence Act which states as follows:
(a) the computer output containing the information was produced by the
computer during the period over which the computer was used regularly to store
or process information for the purposes of any activities regularly carried on over
that period by the person having lawful control over the use of the computer;
(b) during the said period, information of the kind contained in the electronic
record or of the kind from which the information so contained is derived was
regularly fed into the computer in the ordinary course of the said activities;
(c) throughout the materiel part of the said period, the computer was operating
properly or, if not, then in respect of any period in which it was not operating
properly or was out of operation during that part of the period, was not such as to
affect the electronic record or the accuracy of its contents; and
6
(d) the information contained in the electronic record reproduces or is derived
from such information fed into the computer in the ordinary course of the said
activities.
(3) Where over any period, the functions of storing or processing information for
the purposes of any activities of any regularly carried on over that period as
mentioned in clause (a) of sub-section (2) was regularly performed by computer,
whether-
(d) in any other manner involving the successive operation over that period, in
whatever order, of one or more computers and one or more combinations of
computers.
all the computers used for that purpose during that period shall be treated for the
purposes of this section as constituting a single computer; and references in this
section to a computer shall be construed accordingly.
(a) identifying the electronic record containing the statement and describing the
manner in which it was produced;
(b) giving such particulars of any device involved in the production of that
electronic record as may be appropriate for the purpose of showing that the
electronic record was produced by a computer;
7
(c) dealing with any of the matters to which the conditions mentioned in sub-
section (2) relate, and purporting to be signed by a person occupying a
responsible official position in relation to the operation of the relevant device or
the management of the relevant activities (whichever is appropriate) shall be
evidence of any matter stated in the certificate; and for the purpose of this sub-
section it shall be sufficient for a matter to be stated to the best of the knowledge
and belief of the person stating it.
8
Source: http://www.cyberblogindia.in/wp-content/uploads/2015/01/Untitled-Infographic-
4.png
9
3. How to get digital evidence
As has been discussed above, there are two ways to get the digital evidence: to cease
the device as a whole and put it to forensic lab for extracting the digital evidence in case the
investigating officer is not well versed with the computer and does not know how to handle
the digital evidences; and to take record the call logs, emails with headers, links of the
particular website page etc where the offensive post has been seen. The second way may be
adopted by the victim or the viewer him/herself if he/she is aware how to record or store such
links/documents. In this regard the following guidelines may be followed by the victims:
1. Victims must not delete the message/content/mail. Rather they must save the copy of
the same along with the link that may appear in the header bar.
2. Victims must refrain from answering/sharing the offensive content.
3. If the content looks like a malicious link or virus, the victims must not open the same.
But they may take a screen shot of the link and store /save it for further investigation.
For example, let us take the example of a mail received by an individual from an
account which may be suspicious. The receiver may take a screen shot of the sender’s
link without opening the mail. This can be like as below:
4. Next, the receiver may find out the real address of the sender by simply putting the
curser on the sender’s initiations’, i.e., IH. In this case, the information below
surfaced when the curser was placed on the initials. It needs to be noted that the
receiver need not press the open the link. It may automatically open the information
once put on the initials.
Nicolae Sandu
[email protected]
NRG
5. As may be seen, this is a spoofed mail sent by spammers to possibly spread virus in
the computer or for phishing. Even though certain email service providers like the
Gmail etc have provided reporting mechanism for phishing, in case the victim had
10
unfortunately clicked in the mail and has become victimized, he/she may consider
taking the following steps to save the evidences.
6. The other important mechanism to record the evidence is to save the header of the
mail which may provide the path, the link and the original sender’s email id and IP
address. For example, Support Google provides a guideline for getting the header for
gmail which is as below:
Log in to Gmail
Open the message you'd like to view headers for.
Click the down arrow next to Reply, at the top of the message pane.
Select Show Original.
The full headers will appear in a new window (Google, n.d.).
7. In case of social media contents, the victim may follow quite the same mechanism to
store the digital evidence of the offensive content. For example, if it is a facebook
content, the victim may not only save the screen shot of the offending content, he/she
may also copy the link of the page where it was published.
8. For the police, especially investigating officers, the way of collection of evidence
may differ with the expertise of the same;
Source: http://www.dynotech.com/articles/images/crimescene.jpg
11
original recording etc is preserved well. The old rule of admissibility of tape recorded voice
u/s.63 of the Evidence Act still accepted. Identification of voice etc must be followed (Simran
Pal Singh vs State of Himachal Pradesh, 2012). The four conditions of S.65B of the evidence
Act needs to be fulfilled:
(i) The electronic record containing the information should have been produced
by the computer during the period over which the same was regularly used to
store or process information for the purpose of any activity regularly carried on
over that period by the person having lawful control over the use of that
computer;
(ii) The information of the kind contained in electronic record or of the kind from
which the information is derived was regularly fed into the computer in the
ordinary course of the said activity;
(iii) During the material part of the said period, the computer was operating
properly and that even if it was not operating properly for some time, the break or
breaks had not affected either the record or the accuracy of its contents; and
(iv) The information contained in the record should be a reproduction or
derivation from the information fed into the computer in the ordinary course of
the said activity.
Source: https://images-na.ssl-images-amazon.com/images/G/01/books/stech-ems/Digital-
Evidence-and-Computer-Crime-3E-image-9780123742681._V154965471_.jpg
12
It should be noted that recorded voices are different from call logs. In the Parliament
attack case, the Supreme Court concluded that a cross examination of the competent witness
(expert) acquainted with the functioning of the computer during the relevant time and the
manner in which the printouts of the call records were taken was sufficient to prove the call
records. Section 4 of the Information Technology Act: if the document in electronic form i.e.
CD/DVD etc., is (a) rendered or made available in an electronic form; and (b) accessible so as
to be usable for a subsequent reference, then it would be sufficient compliance. Contents in
CD/Pen drives are ‘electronic record’ & electronic evidences. As per 65B(4) of the Evidence
Act, if it is desired to give a statement in any proceedings pertaining to an electronic record, it
is permissible provided the following conditions are satisfied :
(a) There must be a certificate which identifies the electronic record containing
the statement;
(b) The certificate must describe the manner in which the electronic record was
produced;
(c) The certificate must furnish the particulars of the device involved
in the production of that record;
(d) The certificate must deal with the applicable conditions mentioned
under Section 65B(2) of the Evidence Act; and
(e) The certificate must be signed by a person occupying a responsible
official position in relation to the operation of the relevant device.
Who can give certificate u/s/65B(4)? The certificate must be signed by a person
occupying a responsible official position in relation to the operation of the relevant device
(Ark Shipping Co. Ltd. Vs. GRT Shipmanagement Pvt. Ltd. 2007(5) ALLMR). What about
CCTV images of violence? They are crucial evidence, needs to follow 65b(4) procedure and
must be preserved well.
According to S. 2T of Information Technology Act, 2000, a photograph taken from a
digital camera is an electronic record. Procedures of section 65B of the Indian Evidence Act
must be followed. With regard to Email/messages Section 88 speaks:
Presumption as to telegraphic messages.—The Court may presume that a
message, forwarded from a telegraph office to the person to whom such message
purports to be addressed, corresponds with a message delivered for transmission
at the office from which the message purports to be sent; but the Court shall not
make any presumption as to the person by whom such message was delivered for
transmission.
13
S.88A Presumption as to electronic messages.—The Court may presume that an
electronic message, forwarded by the originator through an electronic mail server
to the addressee to whom the message purports to be addressed corresponds with
the message as fed into his computer for transmission; but the Court shall not
make any presumption as to the person by whom such message was sent.
Presumption as to the person by whom such message was sent." Explanation.—
For the purposes of this section, the expressions “addressee” and “originator”
shall have the same meanings respectively assigned to them in clauses (b) and
(za) of sub-section(1) of section 2 of the Information Technology Act, 2000.
References
Casey, E. (2004). Digital Evidence and Computer Crime, Second Edition. Elsevier. ISBN 0-
12-163104-4.
Google (n.d.). Message headers. Retrieved from
https://support.google.com/mail/answer/22454?hl=en.
Mali, P. (2015). Electronic evidence/digital evidence & cyber law in India. Retrieved from
https://www.linkedin.com/pulse/electronic-evidence-digital-cyber-law-india-adv-
prashant-mali-.
14
15