Grappling with Electronic Evidence in Journalist's murder Case

(The discussions made here are purely for academic and educational purpose. Objections if any may kindly be sent to naavi@vsnl.com  and if found reasonable, this article will be withdrawn.)

.

 

In an unexpected but significant development, the investigations in the celebrated Shivani Bhatnagar murder case in Delhi has now become a subject matter of interest to the Cyber Law and Cyber Crime observers in India. 

The investigations are now zeroing in  its focus  on the way Electronic Evidence is handled in law and practice and irrespective of the legal developments in the actual case, there will be several learning points that would enlighten the Cyber Law community and the Cyber crime investigators.

As per the recent report in Hindustan Times, the Delhi Police were banking on the record of Mobile Phone activities between the alleged conspirators to prove the conspiracy. However it is now learnt that the mobile company has selectively removed both the primary record and the backup records from its computers. The Police are now left with only the print outs of the records obtained earlier. It would be interesting to look at the implications of this development from the angle of Cyber Evidence management.

The issues to be discussed here are

1. What provisions of Information technology Act-2000 (ITA-2000) apply to this incident?

2.What are the responsibilities of the Cell Phone operator in preserving the mobile phone activity record?

3. How good is the Print outs presently available with the Police for the purpose of the Court?

Applicability of Information Technology Act:

The first thought in many minds would be how ITA-2000 becomes relevant in a murder case. When ITA-2000 became a law and even after two years since then, many legal professionals are still not convinced that the law is relevant to them unless they are dealing with Computer Companies. This case has highlighted how ITA-2000 has universal application and can be invoked in a totally non Cyber Crime scenario.

In the present case, even though the offence is a "Murder" the conspiracy involves exchange of conversations over the telephone. The conversations are presently not available to the Police as records but the mobile phone activity is captured in an electronic file at the mobile company systems. These systems log the numbers called and the time and duration of the call. Being electronic documents, they come under the definition of an "Electronic record" as per section 2 (t) of the ITA-2000. These records are therefore a subject matter of ITA-2000 and the consequential amendments made to the Indian Evidence Act for acceptance of Cyber Evidence.

ITA-2000 therefore becomes applicable to determine not only the acceptability of the electronic records in a court of law but also in determining the liability of the intermediaries involved in handling this Cyber evidence such as the mobile phone company.

Responsibilities of the Mobile Phone Company:

According to section 65 of the ITA-2000,

Whoever knowingly or intentionally conceals, destroys, or alters or intentionally or knowingly causes another to conceal, destroy or alter any computer source code used for a computer, computer programme, computer system, or computer network, when the source code is required to be kept or maintained by law for the time being in force, shall be punishable with imprisonment up to 3 years or with fine that may extend up to Rs 2 lakh rupees or with both.

Explanation: For the purpose of this section, "Computer source code" means the listing of programmes, computer commands, design and layout and programme analysis of computer resource in any form.

This section recognizes the importance of technical intermediaries in Cyber Evidence usage by the law enforcement authorities and defines their responsibilities. The provisions of this section would be applicable to a network manager in a Company, the ISP or any other person or organization who handle electronic documents.

The use of the word "Computer Source Code" has unfortunately introduced an element of doubt on the applicability of this section to all electronic documents as opposed to what are defined as "Computer Source Codes".

The normal definition of a "Computer Source Code" is restricted to the programme instructions and if the term is used in that restrictive sense, the section cannot be applied to all electronic documents. In such a case, one has to go back to the CrPC and the Indian Evidence Act to determine the responsibilities of third parties who come to possess evidence relevant to a criminal investigation.

However, a careful reading of the explanation under the section extends the definition of the word Computer source code to "programme analysis of computer resource in any form.". In the instant case, the call management programme monitors the calls made from one mobile number and its analysis is captured in the form of a statement. We can therefore conclude that the call statement can be brought under the definition of "Computer Source Code".

In view of the well developed meaning available to the word "Source Code" in the IT industry, there will be some hesitation to extend its definition to the outputs arising out of the programme functioning amongst the computer specialists. However, considering the fact that ITA-2000 has also re-defined the term "Hacking" as understood by the industry and given it a legal meaning of its own (equivalent to "Cracking"), it is conceivable that the ITA-2000 can also give an extended legal meaning to "Computer Source Code" to cover the outputs of a programme.

There is therefore a strong case for invoking section 65 to define the accountability of the mobile phone company for having knowingly and intentionally destroyed evidence relevant to the investigations of a major crime. The company is therefore liable under the section and its officials will by virtue of section 85 of the ITA-2000 liable for imprisonment upto 3 years.

Obviously the defense will also draw attention to the fact that the section applies only when the source code is required to be kept or maintained by law for the time being in force and there appears to be no specific laws applicable to the mobile phone records.

naavi.org has raised this issue several times in the past in respect of e-mail records and urged for a suitable rule or notice to the ISPs specifying the time for which various kinds of data has to be preserved. Unfortunately no action has been taken in this regard which could be a loophole that can be exploited by many.

In the instant case since the investigations are well publicised and the Police have already obtained a print out of the transactions, it may be concluded that there was sufficient notice to the mobile company that the evidence was of legal importance and tampering with them is an act of grave negligence bordering on "Co-Conspiracy" to destroy incriminating evidence.

The Status of the Print Out:

In the absence of the electronic records which the Police can still try to recover through forensic methods by seizing the computers and analysing the erased data, the print outs with the Police become the primary evidence for the Police.

According to the second schedule to the ITA-2000 which amends section 65 of the Indian Evidence Act, 1872 and introduces a new subsection 65 B, the print out can also be considered as an "Electronic Document". However there are a series of certifications required to make this print out acceptable as evidence in the court of law and it is most unlikely that these formalities would have been completed at this stage. The Police will therefore do well to cover up as much ground as possible in this direction before it is too late.

Summary

To summarise, the mobile phone activity record maintained by the Mobile Phone company qualifies to be called an "Electronic Document" under ITA-2000 and tampering with this may constitute violation under Section 65 of the ITA-2000. Further the Police will have to work hard to make its print out stick as evidence in the court of law.

Naavi

September 12, 2002

Related Article in Hindustan Times

 

Your Views can be sent here



For Structured Online Courses in Cyber laws, Visit Cyber Law College.com

.

Back To Naavi.org