Introduction to Service Provider Cooperation
Digital evidence often resides with service providers - telecom companies, Internet Service Providers (ISPs), email providers, social media platforms, and cloud services. Effective cyber crime investigation requires understanding the legal mechanisms for obtaining this data and building relationships with these entities.
Telecom Service Providers
Call Detail Records (CDR), subscriber information, cell tower data, SMS records, mobile internet usage logs.
Internet Service Providers
IP allocation logs, subscriber details, connection timestamps, bandwidth usage, DNS query logs.
Email & Cloud Providers
Email headers, login records, IP logs, account activity, stored content (with proper authorization).
Social Media Platforms
Account information, IP logs, content posted, direct messages, friend lists, activity logs.
Legal Framework for Data Requests
Section 94 BNSS (formerly Section 91 CrPC)
Section 94 of BNSS empowers a court or officer in charge of a police station to issue a written order requiring any person to produce a document or electronic record that is necessary for investigation or trial.
Key Points of Section 94 BNSS:
- Can be issued during investigation or trial
- Must specify the document/record required
- Production can be ordered in person or by post/electronic means
- Non-compliance is punishable
- Special provisions for electronic records and documents in custody of banks
IT Act Provisions
| Section | Purpose | Authority |
|---|---|---|
| Section 69 | Interception, monitoring, decryption of information | Central/State Govt (Secretary level) |
| Section 69A | Blocking of public access to information | Central Govt |
| Section 69B | Monitoring and collection of traffic data | Central Govt |
| Section 79 | Intermediary liability and due diligence | - |
IT Interception Rules, 2009
The Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009 provide the framework for lawful interception:
- Competent Authority: Secretary in the Ministry of Home Affairs (Central) or Secretary in charge of Home Department (State)
- Emergency Provision: Joint Secretary level officer can authorize in emergencies, subject to confirmation within 3 days
- Duration: Initial order valid for 60 days, renewable up to 180 days total
- Review: Orders must be placed before Review Committee within 7 days
- Record Keeping: Intercepted records to be destroyed within 6 months unless required for court
Regular police officers cannot directly order interception under Section 69. They must route requests through appropriate channels. However, officers can directly request CDR, subscriber information, and IP logs under Section 94 BNSS or through administrative procedures established by service providers.
Types of Data from Service Providers
Subscriber Information (Non-Content Data)
- Name and address of subscriber
- Identity verification documents submitted
- Account creation date and method
- Payment information (for verification, not financial details)
- Contact phone numbers and email addresses
Transactional/Traffic Data
- CDR (Call Detail Records): Caller/called numbers, duration, timestamps, cell tower IDs
- IP Logs: IP addresses assigned, connection timestamps, duration
- Login Records: IP addresses from which account accessed, timestamps
- IPDR (IP Detail Records): Similar to CDR for internet communications
Content Data (Requires Higher Authorization)
- Email body and attachments
- Chat messages and media files
- Stored files in cloud services
- Recorded voice calls (where legally recorded)
- Subscriber Information: Section 94 BNSS notice from IO
- CDR/IP Logs: Section 94 BNSS or administrative request
- Content Interception: Section 69 IT Act (requires Secretary-level authorization)
Working with Indian Telecom Providers
Major Providers and Nodal Points
Each TSP has a designated Nodal Officer for law enforcement cooperation. Contact through:
- Dedicated Law Enforcement Portal (LEA Portal)
- Written request to Circle Nodal Officer
- Emergency requests via designated hotline
Typical Response Time: 3-7 days for regular requests, 24-48 hours for emergencies
Information Typically Available from Telecom Providers
| Data Type | Retention Period | Request Mechanism |
|---|---|---|
| CDR (Call Detail Records) | 1-2 years | Section 94 BNSS / LEA Portal |
| Subscriber Details | Lifetime of account | Section 94 BNSS / LEA Portal |
| Cell Tower Dumps | 1-2 years | Section 94 BNSS (requires justification) |
| IPDR (Internet Data) | 90 days to 1 year | Section 94 BNSS / LEA Portal |
| SMS Content | Generally NOT stored | Not available post-delivery |
| Recharge/Payment History | 1-2 years | Section 94 BNSS |
Working with Internet Service Providers
Types of ISPs
- Category A ISPs: National level (e.g., Reliance Jio, Airtel, BSNL)
- Category B ISPs: Regional/state level
- Category C ISPs: District/city level
- Public WiFi Providers: Hotels, cafes, airports
Key Data Points from ISPs
- IP Assignment Logs: Which subscriber was assigned which IP at what time
- MAC Address Mapping: Device identification for WiFi connections
- Connection Logs: Session start/end times
- Subscriber KYC: Identity documents, address proof
- Obtain IP address from email header, website log, or platform data
- Identify ISP using WHOIS lookup
- Send Section 94 notice to ISP with exact timestamp (in IST)
- ISP provides subscriber details assigned that IP at that time
- Note: Dynamic IPs change frequently - exact timestamp is critical
Sample Legal Notice Format
Section 94 BNSS Notice to Service Provider
Notice for IP Address Details
Common Challenges and Solutions
Data Retention Periods
Challenge: Data may be deleted after retention period expires. Solution: Send preservation requests immediately upon FIR registration.
Delayed Response
Challenge: Providers take weeks to respond. Solution: Mark urgent, follow up via phone, escalate to senior nodal officer.
Foreign Service Providers
Challenge: MLAT process is slow for foreign providers. Solution: Use law enforcement request portals, explore emergency disclosure procedures.
Encrypted Communications
Challenge: End-to-end encrypted content unavailable. Solution: Focus on metadata, device seizure, and other investigative leads.
- Always include exact timestamps in IST
- Reference FIR number and relevant legal sections
- Request Section 63 BSA certificate with the data
- Send preservation request immediately, detailed request later
- Maintain communication log with providers
- Build relationships with nodal officers for faster response
- Section 94 BNSS is the primary mechanism for requesting data from service providers
- Content interception requires Section 69 IT Act authorization at Secretary level
- Data retention periods vary - send preservation requests immediately
- Always specify exact timestamps in IST for IP-related requests
- Include FIR reference and request Section 63 BSA certificate
- Indian telecom providers have established LEA portals for efficient processing
- Foreign provider requests may require MLAT or platform-specific law enforcement channels
- Build relationships with nodal officers for faster emergency response