ELECTRONIC EVIDENCE, CYBER FORENSIC, AND INVESTIGATION PROCEDURE: A STUDY BY - MANISHA & DR. POOJA SOOD

ELECTRONIC EVIDENCE, CYBER FORENSIC, AND INVESTIGATION PROCEDURE: A STUDY
 
AUTHORED BY - MANISHA & DR. POOJA SOOD
 
 
Abstract
The rise of cybercrime has necessitated the integration of electronic evidence into legal and investigative frameworks. This article explores the role of electronic evidence in cyber forensics and its critical contribution to modern investigation procedures. It examines the collection, preservation, and analysis of digital data, emphasizing its admissibility in court. Key challenges, including data integrity, chain of custody, and evolving technological complexities, are discussed to highlight the importance of adhering to robust protocols and standards. Additionally, the article evaluates the role of specialized tools and expertise in uncovering cybercrimes, such as hacking, identity theft, and data breaches. By aligning technological advancements with legal principles, the study underscores the significance of cyber forensics in ensuring justice in the digital age. Recommendations for improving investigation procedures and addressing future challenges are also provided.
 
Keywords: electronic evidence, cyber forensics, investigation procedure, digital evidence, chain of custody, data integrity, cybercrime investigation
 
INTRODUCTION
The social, economic, and political lives of people have changed dramatically in the twenty-first century due to digital technology and new communication technologies, which has resulted in a constant growth in welfare and state monitoring. Cyberspace information is being misused through computer-related and computer-focused crimes as a result of society's growing reliance on interactive computer services. Older crimes have vanished, while the most recent wave of cybercrime has limited the legal scope of the entire world to include things like drug sales, sexual abuse, and anonymity,[1] sale of bitcoin/ cryptocurrency, sale of forged documents and counterfeit currency, sale of unlicensed firearms, hiring hit man[2], child pornography, gambling, hacking, hosting , mail, blogs, books, chat, directory, money laundering4 , insider trading, trade secrets, government secrets, celebrity sex pictures, corruption, proprietary source code, Industrial design like medicine or defense, zero day exploits, stolen database proof of tax evasion and military limited etc. . It is very important that the investigating agencies must comply with the legal procedure while collecting, preserving and analyzing evidence from computer, computer system and computer resources in order to ensure admissibility before the Court because of most of the documents, today, are either stored on or generated by computers, among which a variety of electronic data have been admitted in the Courtroom as evidence.[3] This includes contents of websites, e-mails, text messages, instant messages, digital photos, and enhanced images etc. On many occasions, the judiciary has been sceptical in admitting such evidence, expressing that there is a need of new standards to deal with the new evidence revolving such evidence. Under such circumstances, it would be appropriate to address the commonly raised issues by the Courts with regard to electronic evidence, such as, authentication, hearsay, and rule of best evidence etc. Unfortunately, the laws prior to the emergence of computer forensics are inadequate to assess the techniques used in computer systems.[4]
 
Therefore, the lack of adequate mechanism to appreciate the computer based evidence has resulted in poor admissibility of such evidence in the Court. The probative value of electronic evidence is a significant challenge in criminal investigation proceedings, from collection to production.[5] Electronic documents carry metadata, which is essential information about data, which may not be visible on the face or may be lost when converted to paper form. This metadata can be defined as information regarding document creation and modification or information created by the operating system or application about a file that allows it to be stored and retrieved at a later date. The transnational admissibility of electronic evidence is complicated by different positions of law on matters of evidence in different domestic jurisdictions. Electronic documents can be used as evidence to prove the truth of their contents or as real evidence to show the existence of the data or who had possession of the data. The cardinal rule of admissibility applies to both paper and electronic documents, requiring proof of relevance,[6] authenticity, and reliability. The issue of cybercrime is a global concern, with various online services such as Dropbox, Gmail, Google spreadsheet, AWS, and Flexi scale being used.[7] Outsourcing these services can lead to unauthorized access to data and third-party access, as well as the volatility of electronic data that can be altered, moved, or deleted within a short period. The major problems may be related to accessing computers and computer networks remotely, where criminal activity could be initiated in another country and result in consequences in some other countries. The Council of Europe Convention[8] provides measures for countries to empower their competent authorities to collect or record content data through technical means on their territory and compel service providers to do the same within their existing technical capability. The Strasbourg Convention aims to facilitate international cooperation and mutual assistance in investigating crime and tracking down, seizing, and confiscating proceeds from it.

G-7 members of the G7 countries emphasize the need for international cooperation and coordination to curb high-tech crimes and improve collaboration to increase the effectiveness of investigations and prosecutions of cybercrime. The G-8 conference in 2004 declared a unifying commitment to strengthen domestic laws to build up globally capacity to combat terrorist and criminal uses of the internet. A recent G-20 conference titled "Crime and Security in the Age of the Non-Fungible Token (NFT), Artificial Intelligence (AI) and Metaverse"[9] stated that no country or organization can combat cyber threats in isolation and that cooperation in the investigation of cross-border cyber crimes through joint efforts to build a "peaceful, secure, deterrent, and open" information and communication technology environment is extremely necessary today. In line with the United Nations Convention on the Criminal Use of Information and Communication Technology, speedy preservation, investigation, and co-ordination of evidences is essential. This chapter addresses the legal issues related to investigation, collection, preservation, and analysis of electronic evidence, as well as laws towards better institutional arrangements for effectively dealing with justice for those who are victimized in national and international jurisdictions.
CYBER FORENCIC: MEANING AND CONCEPT
The term forensics roots from the Latin word, ‘forensis’ which generally means ‘forum for discussion’ or find out the truth.[10] In modern days Forensic investigation uses various facets of Science coupled with Technology in the process of establishing facts in civil or criminal Courts of law. Forensic Science is the science that deals with analysis of physical evidence collected from all possible sources in which criminal and victim are associated with. The latest entrant in this field is cyber forensics. Cyber forensic, in narrow sense is a process of extracting information and data from computer storage media and guaranteeing its accuracy and reliability. It deals with analysis of electronic evidence that is distributed across the large computer, computer network, computer system and other electronic devices. Cyber forensic in broadest sense is the scientific examination and analysis of data held on computer storage media for the purposes of presentation in a Court of law, together with the study of the legal aspects of computer use and misuse. Computer documents, emails, text and instant messages, transactions, images and Internet histories are examples of information that can be gathered from electronic devices and used very effectively as evidence. Cyber forensics is a scientifically derived and proven method for preserving, collecting, validating, identifying, analyzing, interpreting, documenting, and presenting electronic evidence from digital sources.[11] It is used to facilitate or further the reconstruction of events found to be criminal or to anticipate unauthorized actions disruptive to planned operations. Cyber forensics involves the use of apt forensic tools and technical knowledge to recover electronic evidence within the contours of the rules of evidence, for it to be admissible before the Court of law. It is an electronic discovery technique used to determine and reveal technical criminal evidence, often involving electronic data storage extraction for legal purposes. In essence, cyber forensics is an archeological dig designed to uncover what happened on a specific hard drive, within a specific computer, during a specific period of time. It is the combination of law and science (computer science), focusing on real-time, online evidence gathering. Cyber forensics includes maintaining the integrity of data, continuity of data, secure collection of computer data, examination of data to determine details such as origin and content, collection and presentation of information about computer data and computer systems to courts of law, protection of computer data, and application of a country's laws to computer practice.
INVESTIGATION OF COMPUTER-RELATED CRIMES
In the digital age, computer-related crimes have become a growing concern, necessitating the development of advanced techniques and tools to investigate and handle electronic evidence effectively. Law enforcement agencies and digital forensic experts play a crucial role in tackling these crimes. Digital forensics involves the collection, analysis, and preservation of electronic evidence to support criminal investigations. Strict protocols are followed to ensure the integrity and admissibility of digital evidence in a court of law. Law enforcement agencies rely on skilled professionals specializing in computer forensics to extract valuable information from devices, trace online activities, and identify potential cybercriminals.
 
Cyber Forensics and Electronic Evidence: Cyber forensics is the systematic process of recovering, storing, analyzing, and presenting digital information. Electronic evidence, a product of this process[12], is crucial in criminal investigations due to the involvement of electronic devices and systems. It is generally admissible in many jurisdictions and is rooted in classic forensic principles. Cyber forensics is applied in both pure cybercrime cases and cyber facilitated incidents, as it is nearly impossible to encounter a crime without a digital dimension in today's information-technology-driven society. Electronic evidence is highly volatile and can be altered rapidly through computing-related activities. To ensure admissibility, courts must ensure the evidence conforms to established legal rules, is scientifically relevant, authentic, and reliable, and has been obtained legally. However, the fragility of electronic evidence, including the rapidly changing nature of technology, the fragility of the media on which data is stored, and the intangible nature of electronic data, make it vulnerable to claims of errors, accidental alteration, prejudicial interference, and fabrication. The Role of Cyber Forensics in Cybercrime Investigation: Cybercrime is increasing, leading to a need for cyber forensic experts in various industries and law enforcement agencies. These experts investigate encrypted data using various software and tools, using techniques based on the type of cybercrime. Tasks include recovering deleted files, cracking passwords, and identifying the source of security breaches[13]. The evidence is stored and translated for court or police examination. The aim is to preserve evidence in its original form for structured investigations. With the sophistication of crime, the judiciary has referred to the application of scientific techniques in crime investigations, as traditional physical evidence may not be sufficient to prove facts beyond reasonable doubt. . In Tomaso Bruno and Anr. v. State of Uttar Pradesh[14] , the Court observed that advancement of information technology and scientific temper must pervade the method of investigation. Electronic evidence was relevant to establish facts. Scientific and electronic evidence can be a great help to an investigating agency. In the case of Darshan T S v. State of Karnataka[15] while highlighting on crucial issues relating to police reforms, the High Court of Karnataka held as follows: “Investigating a criminal case is not an easy or an ordinary work. It requires thorough professionalism and professionalism can be achieved only through effective training. Many offences have become Hi-tech, in the sense that mobile phones and electronic devices are used to hatch conspiracy and messages are sent through SMS and e-mail[16]. Electronic evidence plays a vital role in many cases. Seizure of hard discs, collection of call details and such other digital materials require thorough knowledge of Digital Forensic Science. Proof of such digital evidence requires stricter evidence as per Sections 65A and 65B of The Indian Evidence Act, 1872[17], now section 62 and 63 of The Bhartiya Sakshya Adhiniyam 2023.[18]
 
LAW RELATING TO INVESTIGATION IN INDIA
Investigation has been defined as, “includes all proceedings under this code for the collection of evidence conducted by police officer or by any person (other than magistrate) who is authorized by a magistrate in this behalf.” Section 78 of the Information Technology Act, 2000 provides that: “Notwithstanding anything contained in The Bhartiya Nagrik Suraksha Sanhita, a police officer not below the rank of Inspector shall investigate any offence under this Act. Clause (3) of Section 80 of the Information Technology Act 2000[19]" clearly states that the provisions of the Code of Criminal Procedure, 1973 (2 of 1947),now The Bhartiya Nagrik Suraksha Sanhita  shall, subject to the provisions of this section, apply, so far as may be, in relation to any entry. search or arrest, made under this Section. Section 4(2) of Criminal Procedure Code, 1973,now in Bhartiya Nagrik Suraksha Sanhita, provides that offences under any other law shall also be investigated, inquired into tried or otherwise dealt according to the B.N.S.S. subject to any provisions applicable under special law. Now, the Information Technology Act, 2000 which is the special law provides that notwithstanding anything contained in the B.N.S.S, the offence punishable with imprisonment of three years and above shall be cognizable and the offence punishable with imprisonment of three years shall be bailable. Cognizable offences are that which a Police Officer can investigate without warrant. A Police Officer also has authority to arrest the suspect of any such offence without warrant. It is distinct from non-cognizable offence as investigation of which can take place only after a warrant from a Magistrate. A Police Officer can arrest to suspect of only after obtaining a warrant from a Magistrate. Similarly, bailable offence means any offence which is shown in First Schedule of B.N.S.S. which is bailable by any other law for the time being enforced. While a bail can be claimed as a matter of right in case of bailable offence, grant of bail in case of non bailable offence depends upon the discretion of the Court.
 
CBI (Crime) Manual, 2005:
The Central Bureau of Investigation (hereinafter referred as CBI), established in 1963 by the Ministry of Home Affairs, Government of India as a prime investigating agency of the country dealing with investigation of crimes in India, and assist the State Police Forces in carrying out investigation. As far as cybercrime is concerned, the CBI has the following specialized structure to handle crimes:
·         Cyber Crimes Research and Development Unit (CCRDU);
·         Cyber Crime Investigation Cell (CCIC);
·         Central Forensic Science Laboratory (CFSL); and
·         Network Monitoring Centre.
Apart from search and seizure, the Manual has given an elaborate procedure for investigation of cybercrime in terms of handling of electronic evidence and computer hardware.
a)      Cartridges or disk can be used for storage of copies of files from Computer, useful for investigation
b)      Labeling of Evidence- Label cables, where they are plug in, disks, the various  other parts of computer and to write /protect disks
c)      Dismantle the hardware with screwdrivers other tools for the purpose of  seizure
d)     Use of Gloves- Often latest prints can be taken from disks or other storage hardware or media
e)      Material needs for packing- Tapes, boxes, rubber bands, bubble wrap and if he does not have access to anti-static wrap then papers, bags can be used.
f)       Recording Equipment- to video graph and taking photographs of the crime  scene
g)      Custody of report sheets and other paper for inventories and seize evidence.
 
Cyber-crimes Investigation Cell (CCIC): The Cyber-crimes Investigation Cell (hereinafter referred as CCIC) was established in The CCIC was established in Sep. 1999, started functioning w.e.f. 3.3.2000. The CCIC has jurisdiction in all over the India. It acts as a part of division of economic offence. But it is also empowered to investigate all the cybercrimes under IT Act, 2000. CCIC also acts round the clock as Nodal point of contact Interpol to report cybercrimes in India.
 
Cybercrimes Research and Development Unit (CCRDU): It’s the responsibility of Cybercrimes Research and Development Unit (hereinafter referred as CCRDU) to track the development and changes, which take place in ever changing area. It has the following functions:
a.       To ensure cooperation and coordination with State Police forces.
b.      To collect and compile the data of reported cybercrime cases to Police for investigation.
c.       To coordinate with software experts in identification of areas, which require attention of State Police
d.      To obtain the information of cybercrime cases reported in other countries and prepare a monthly cybercrime digest.
 
The Central Forensic Science Laboratory (CFSL): The Cyber Forensic Laboratories (hereinafter referred to as the CFSL) are one of the primary wings to provide cyber investigation services in India. It is an autonomous institution of the Ministry of Home Affairs, Government of India. It was established in 1968 to provide scientific support to law enforcement agencies in criminal investigations and to deliver expert opinion on various matters related to forensicscience including cyber forensics, forensic data revival, and electronic evidence detection. CFL could analyze the forensic data and recover electronic evidence while maintaining the veracity of the electronic evidence for detection and trial. The basic functions of the CFL are
·         To find out and Scientific analysis of Digital Foot Print.
·         To provide scientific analysis in support of the Crimes Investigation by Law enforcement Agencies and CBI.
·         To assist on site for Computer seizure and search on request.
·         To provide consultation services for activities or investigations, where media analysis is probable as occurring.
·         To provide expert testimony.
·         Providing adequate Research and Development in Cyber Forensics.
To provide adequate research and development in cyber forensics. The information and analysis so collected can be used as evidence in Court of law.
 
Network Monitoring Centre of Cybercrime: The Network Monitoring Centre of cybercrime (hereinafter referred as NCCC) is an e-surveillance and cyber security project of Government of India. It has been classified to be a project of Indian government without a legal framework, which may be counterproductive as it may violate civil liberties and human rights.[20]
 
There were concerns that National Cyber Coordination Centre (NCCC) could possibly be abused for indulging in mass surveillance in India, privacy violation and civil liberty violations as agencies like NTRO (National Technical Research Organisation) and organisations like the National Security Council Secretariat are exempted from the applicability of any transparency law like Right to Information Act, 2000 Mass surveillance in India is not new as India already has e-surveillance projects like Central Monitoring System, NATGRID[21], and DRDO NETRA. Many, including legal experts, in India believe those intelligence agencies and their e surveillance projects require parliamentary oversight.
 
LEGAL REQUIREMENTS AND ASSESSMENT
Most jurisdictions have legal requirements that provide the grounds for admissibility of electronic evidence in legal proceedings.
(i) Legal Authorization: Assessing electronic evidence often requires legal authorization. Human rights, data protection and privacy impacts on accused parties and victims must be respected. Although there may be exceptions, the law generally provides safeguards for protecting the rights of individuals. Obtaining a legal authorization grants judicial legitimacy to the evidence in question; indeed, this may be the most important step in obtaining and handling electronic evidence. Search warrants are normally required to seize electronic devices and electronic evidence. Failure to obtain a legal authorization may undermine the best evidence rule and jeopardize the case.
 
(ii) Electronic evidence Relevance: Relevance is an important determinant of electronic evidence admissibility. In order for evidence to be admissible, it must be “sufficiently relevant” to the facts at issue. Evidence cannot be admissible if it is not deemed to be relevant. For a piece of evidence to be deemed relevant in legal proceedings, it must tend to prove or disprove a fact in the proceedings. Evidence that has probative value must prove the fact in question to be more or less probable than it would be without the evidence.
 
(iii) Electronic evidence Authenticity: Authenticity is another important criterion that impacts the reliability of evidence. Electronic evidence to be admitted in a Court of law, there must be adduced evidence that the evidence in question is indeed what it is purported to be. For example, for a digital record to be admissible, the Court would have to be convinced that the record was indeed generated by the individual who is purported to have authored the record.
 
(iv) Electronic evidence Integrity: Integrity refers to the ‘wholeness and soundness’ of electronic evidence. Integrity also implies that the evidence is complete, unaltered and unmodified. An assessment of evidence integrity is a primary requirement for electronic evidence admissibility and serves as the basis for determining the weight of evidence. Electronic evidence integrity is not an absolute condition but a state of relationships.
 
(v) Electronic evidence Reliability: In order for evidence to be admissible in Court, the evidence must establish that no aspect of the evidence is suspected. There must be nothing that casts doubt about how the evidence was collected and subsequently handled. In particular, this celebrated case specifies five criteria for evaluating the reliability and by extension, the admissibility of electronic evidence:
a)      whether the technique has been tested;
b)      whether the technique has undergone peer review;
c)      whether there is a known error rate associated with the technique;
d)     whether standards controlling its operations exist and were maintained; and
e)      whether the technique is generally accepted by the scientific community.
(vi) Hash value: A ‘hash value’ is an electronic fingerprint. The data within a file is represented through the cryptographic algorithm as that hash value”. Digital forensics professionals use hashing algorithms to generate hash values of the original files they use in the investigation. This ensures that the information isn’t altered during the course of the investigation since various tools and techniques are involved in data analysis and evidence collection that can affect the data’s integrity.
 
JUDICIAL STAND ON ADMISSIBILITY OF ELECTRONIC EVIDENCE
With the advancement of technology, the judiciary has also felt the need for giving recognition to use of tools and technology in the investigation of crimes. Through various pronouncements, the Courts have insisted on making the best use of technology in proving a case in accordance with The Indian Evidence Act, 1872. Upholding the importance of a proper investigation of computer related crimes, the judiciary has also recognized that a protocol in compliance with rules of evidence must be maintained by the law enforcement agencies throughout the process of identification, collection and preservation in order to avoid improper handling and collection of electronic evidence. Some of the judicial decisions relating to investigation of such crimes are discussed below to understand the challenges
 
In CBI v. Ashok Pal Panwar[22], the Delhi High Court emphasized that scientific evidence should not be overlooked casually and must be treated as correct and genuine unless contradicted by defense with convincing evidence. The court refused to accept electronic evidence due to its inappropriate handling and prejudicial nature. The court held that technology has advanced significantly, making it virtually a child's play to edit any electronic clip. It was therefore necessary to send such CD to a forensic laboratory to exclude any possibility of tampering. Electronic evidence is required to be handled with utmost care and caution, and there should not be any chance of prejudice to the accused due to inept handling of electronic evidence.
 
In Vijesh v. The State of Kerala[23], the Hon'ble Supreme Court provided clarity on the changing approach of the judiciary after notification. The court held that an examiner of electronic evidence need not prove their expertise in the said field in the Court of law. Once notified, the expertise of the institution is recognized and established. However, in other cases, the expert who had examined the electronic evidence will have to prove his expertise in the Court of law. Such interpretation leaves a question mark on the credibility of the evidence, even if it is made by an examiner of electronic evidence. The court observed that maintaining the evidential continuity and integrity of the evidence that is copied is of paramount importance. The process of copying and handling such evidence should be carried out to the highest possible standards. In Abdul Rahaman Kunji v. State of West Bengal[24], the court observed the need for competent officers in cyber police stations. With the rise in crimes involving electronic communications, a competent officer from the Cyber Police Station must be inducted mandatorily into the investigating team immediately such a case arises. This would ensure that the originator of the electronic communication is nabbed swiftly and appropriate evidence is collected and led to prove the e-mails, telephone calls, or electronic messages during the trial of the case.
 
CONCLUSION AND SUGGESTIONS
In conclusion, electronic evidence plays an essential role in modern investigations, especially in the field of cyber forensics. As cybercrime continues to evolve, effective handling of digital evidence is crucial to ensuring justice. The challenges faced in maintaining the integrity of electronic evidence, preserving the chain of custody, and addressing privacy concerns require a consistent, thorough approach to forensic investigations. The adoption of specialized tools and continuous advancements in technology are necessary to keep pace with sophisticated cybercrimes. To improve the effectiveness of cyber forensic investigations, it is suggested that international standards for evidence collection and analysis be established, ensuring uniformity across borders. Additionally, ongoing training for forensic experts is essential to stay updated on emerging technologies and methods. Legal frameworks should be revisited regularly to accommodate new technological developments and safeguard the admissibility of digital evidence in court. Finally, greater collaboration between law enforcement, legal authorities, and cybersecurity experts will strengthen investigative procedures and ensure more effective responses to cybercrime. By addressing these aspects, the reliability and efficiency of cyber forensics can be enhanced, contributing to a more secure and just digital environment
 
 
BIBLIOGRAPHY
BOOKS AND RESEARCH PAPERS
1)         Ahmad, T., & Shweta, S., "Relevancy and Admissibility of Digital Evidence: A Comparative Study," International Journal of Law Management & Humanities, 2018.
2)         Arshad, H., Jantan, A. B., & Abiodun, O. I., "Digital Forensics: Review of Issues in Scientific Validation of Digital Evidence," Journal of Information Processing Systems, KIPS, 2018.
3)         Assembly, P., "Council of Europe. Financing of Political Parties," Recommendation, 1516, 2001.[1] Jabotinsky, H. Y., "The Network Effects of International Crypto and DLT Regulation," Vanderbilt Journal of Transnational Law, 57(5), 2024.
4)         Britz, M., "Computer Forensics and Cyber Crime: An Introduction, 2/e," Pearson Education India, 2009.
5)         Cooper, J. E., & Cooper, M. E., "Application of Forensic Science to Wildlife Investigations," Wildlife Forensic Investigation, 142-155, 2013.
6)         Dwyer, D.,"The Judicial Assessment of Expert Evidence," Cambridge University Press, 2008.
7)         Galves, F., & Galves, C., "Ensuring the Admissibility of Electronic Forensic Evidence and Enhancing Its Probative Value at Trial," Crim. Just., 19, 37, 2004.
8)         Marcella Jr, A., & Menendez, D. (2010). Cyber forensics: a field manual for collecting, examining, and preserving evidence of computer crimes. Auerbach Publications.
9)         Minnaar, A. (2008). 'You've received a greeting e-card from...': the changing face of cybercrime e-mail spam scams. Acta Criminologica: African Journal of Criminology & Victimology2008(sed-2), 92-116.
10)     Mughal, A. A., "A Comprehensive Study of Practical Techniques and Methodologies in Incident-Based Approaches for Cyber Forensics," Tensorgate Journal of Sustainable Technology and Infrastructure for Developing Countries, 2(1), 1-18, 2019.
11)     Thomas, K., Li, F., Zand, A., Barrett, J., Ranieri, J., Invernizzi, L., ... & Bursztein, E., "Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials," Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, ACM, 2017.
 
 
 
STATUTES
1)      Information Technology Act 2000
2)      The Bhartiya Nagrik Suraksha Sanhita
3)      The Bhartiya Sakshya Adhiniyam 2023
4)      The Indian Evidence Act, 1872


[1] Anonymity describes situations where the acting is a person be non-identifiable, unreachable, or untrackable. It is seen as a technique, or a way of realizing, a certain other values, such as privacy, or liberty.
[2] A person (the accused) wants to kill another person and is looking for another person (the ‘hitman’) to murder the target in exchange for payment or reward.
[3] Dwyer, D.,"The Judicial Assessment of Expert Evidence," Cambridge University Press, 2008.
[4] Britz, M., "Computer Forensics and Cyber Crime: An Introduction, 2/e," Pearson Education India, 2009.
[5] Galves, F., & Galves, C., "Ensuring the Admissibility of Electronic Forensic Evidence and Enhancing Its Probative Value at Trial," Crim. Just., 19, 37, 2004.
[6] Ahmad, T., & Shweta, S., "Relevancy and Admissibility of Digital Evidence: A Comparative Study," International Journal of Law Management & Humanities, 2018.
[7] The issue of cybercrime is a global concern, with various online services such as Dropbox, Gmail, Google spreadsheet, AWS, and Flexi scale being used.
[8] Assembly, P., "Council of Europe. Financing of Political Parties," Recommendation, 1516, 2001.
[9] Jabotinsky, H. Y., "The Network Effects of International Crypto and DLT Regulation," Vanderbilt Journal of Transnational Law, 57(5), 2024.
[10] Cooper, J. E., & Cooper, M. E., "Application of Forensic Science to Wildlife Investigations," Wildlife Forensic Investigation, 142-155, 2013.
[11] Marcella Jr, A., & Menendez, D. (2010). Cyber forensics: a field manual for collecting, examining, and preserving evidence of computer crimes. Auerbach Publications.
[12] Arshad, H., Jantan, A. B., & Abiodun, O. I., "Digital Forensics: Review of Issues in Scientific Validation of Digital Evidence," Journal of Information Processing Systems, KIPS, 2018.
[13] Thomas, K., Li, F., Zand, A., Barrett, J., Ranieri, J., Invernizzi, L.,... & Bursztein, E., "Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials," Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, ACM, 2017.
[14] (2015) 7 SCC 178
[15]  (2015). SCC 7706
[16] Minnaar, A. (2008). 'You've received a greeting e-card from...': the changing face of cybercrime e-mail spam scams. Acta Criminologica: African Journal of Criminology & Victimology2008(sed-2), 92-116.
[17] The Indian Evidence Act, 1872
[18] The Bhartiya Sakshya Adhiniyam 2023.
[19] Information Technology Act 2000
[20] India’s cyber protection body pushes ahead”. Hindustan Times. January 29, 2019
[21]National Intelligence Grid (NATGRID) is the integrated intelligence master database structure for counterterrorism purpose connecting databases of various core security agencies under Government of India collecting comprehensive patterns procured from 21 different organizations that can be readily accessed by security agencies round the clock.
[22] 2013 CriLJ4832.
[23] (2015) SCC 543
[24] (2015) 1 Cal LT 318.