🔗 Part 3.3

Chain of Custody & Seizure Procedures

"Integrity from crime scene to courtroom — where evidence battles are won or lost"

Electronic evidence is uniquely vulnerable to alteration without visible trace. The chain of custody and hash verification are your twin safeguards. A single gap can render the most incriminating evidence inadmissible.

3.1

Chain of Custody — The Concept

🔗 What is Chain of Custody?

Definition: Chain of custody is the chronological documentation showing the seizure, custody, control, transfer, analysis, and disposition of physical or electronic evidence from collection to court presentation.

Purpose: To demonstrate beyond reasonable doubt that the evidence presented is the SAME evidence seized, UNALTERED and UNTAMPERED.

Legal Foundation: While no specific section mandates chain of custody, it derives from general principles requiring authentication — reinforced by S.63 BSA's requirement that electronic records "correctly reproduce" the original.

The Six Links of the Chain

1
📍 Seizure / Collection
Evidence identified and seized at crime scene. Documented with photos, video, witness signatures, and seizure memo.
Who: IO + 2 independent witnesses | What: Complete description | When: Exact date/time
2
📦 Packaging & Sealing
Device placed in tamper-evident packaging. Unique ID assigned. Hash value calculated if equipment available.
Seal bears signatures of IO + witnesses + accused/representative
3
🚗 Transportation
Transported to forensic lab or storage. Each handover documented with date, time, purpose, signatures.
No stops without documentation | Environmental protection for digital media
4
🏛️ Storage
Stored in secure malkhana/evidence room. Access log maintained. Environmental controls for digital media.
Every access recorded: who, when, why, for how long
5
🔬 Examination
Forensic examination on WORK COPY, not original. Hash verification before and after. All procedures documented.
Original NEVER touched | Work copy hash must match original
6
⚖️ Court Production
Evidence produced with complete chain documentation. Each person may testify. Hash verification if challenged.
Seal intact | Chain register complete | All witnesses available
⚠️ Why Chain Matters

Gap in chain = Possibility of tampering, substitution, or contamination

Broken chain = Defence argument that evidence unreliable, should be excluded

Missing documentation = Court may exclude evidence or reduce weight

Electronic evidence is particularly vulnerable — can be altered without visible trace. Chain + hash verification are the twin safeguards.

💡 Philosophical Foundation

As the ancient Roman maxim states: "Ei incumbit probatio qui dicit, non qui negat" — the burden lies on the one who asserts, not the one who denies.

Prosecution must positively establish authenticity. Defence merely needs to raise reasonable doubt. This asymmetry makes thorough documentation critical.

3.2

Hash Values — The Digital Fingerprint

🔐 What is a Hash Value?

Definition: A hash value is a fixed-length alphanumeric string generated by a mathematical algorithm from any digital data. Like a fingerprint, it's unique to that specific data.

Key Property: Even a single bit change produces a completely different hash. Perfect for verifying data integrity.

One-Way: You can generate hash from data, but cannot reverse-engineer data from hash.

MD5 Hash Example: "CyberLaw Academy"
a7b9c2d4e6f8a1b3c5d7e9f0a2b4c6d8
32 hex characters (128 bits) — Fast but weak
SHA-256 Hash: "CyberLaw Academy"
3a7bd3e2c8f1a4b6d9e0c2f5a8b1d4e7f0a3c6b9d2e5f8a1b4c7d0e3f6a9b2c5
64 hex characters (256 bits) — Industry standard
Same Text, ONE Letter Changed: "CyberLaw academy" (lowercase 'a')
f9e8d7c6b5a4f3e2d1c0b9a8f7e6d5c4b3a2f1e0d9c8b7a6f5e4d3c2b1a0f9e8
Completely different! This "avalanche effect" proves integrity.

Algorithm Comparison

AlgorithmOutputSecurityEvidence Use
MD5128-bit (32 hex)Weak — collisions possibleLegacy; supplement with SHA
SHA-1160-bit (40 hex)Deprecated — broken 2017Avoid for new evidence
SHA-256256-bit (64 hex)Strong — recommendedIndustry standard
SHA-512512-bit (128 hex)Very StrongHigh-security cases
✅ Hash Verification Protocol

At Seizure: Calculate hash using write-blocker. Record in seizure memo with algorithm.

Before Examination: Verify forensic image hash matches seizure hash.

After Examination: Recalculate hash — must match original.

At Court: Exhibit hash should match seizure hash. Defence can request verification.

Matching hashes at all stages = Evidence integrity mathematically proven ✓

3.3

Seizure Procedures under BNSS

📜 Key BNSS Provisions

S.105 BNSS: Search of place — requires two independent witnesses from locality

S.106 BNSS: Search of person

S.107 BNSS: Search warrant requirements

S.108 BNSS: Search without warrant in urgent cases

IT Act S.80: Police (not below Inspector) can enter, search, arrest without warrant for cyber offences

Seizure Checklist

StepRequirementCommon Defects
WitnessesTwo independent from locality (S.105)Police personnel; not present throughout
Seizure MemoDetailed description of all itemsVague ("one laptop"); no serial numbers
Device StateDocument ON/OFF, password protectedNot documented; turned off incorrectly
Hash ValueCalculate at scene if possibleNo hash; calculated days later
SealingTamper-evident with signaturesOrdinary seal; no signatures
Photos/VideoDevice, screen, serial, seal, locationNo photos; don't match device
⚠️ Device State — Critical Decision Point

Device ON: Contains volatile data in RAM (encryption keys, sessions). Capture live data first if possible. Photograph screen. Don't just unplug!

Device OFF: Do NOT turn on — may trigger password lock, wipe, encryption. Send for forensic imaging directly.

Common Mistake: Turning device on "to check" — destroys volatile evidence, triggers encryption, enables spoliation allegations.

🔌 Network-Connected Devices

Risk: Remote wipe can erase device instantly (phones, corporate laptops)

Solution: Enable airplane mode OR place in Faraday bag to block signals

Document: Network state at seizure — WiFi/data on? Pending sync?

3.4

Documentation Requirements

📋 Seizure Memo — Essential Contents

The seizure memo (panchnama) is your foundation. Gaps here haunt you throughout trial.

MODEL SEIZURE MEMO FOR ELECTRONIC EVIDENCE

Case: FIR No. [____] dated [____] | P.S. [____] | U/S [BNS/IT Act sections]

Seizure: Date: [DD/MM/YYYY] Time: [HH:MM] | Place: [Full address]

Item: Type: [Laptop/Mobile/etc] | Make: [____] Model: [____]

Serial: [____] | IMEI: [if mobile] | Color: [____]

Condition: [Working/Damaged] | Power: [ON/OFF] | Password: [Yes/No/Unknown]

Hash: Algorithm: [SHA-256] Value: [____]

[If hash not calculated: "To be calculated at FSL upon forensic imaging"]

Sealing: Sealed in [tamper-evident bag] with signatures of IO, Witnesses, Accused

Witnesses: 1. [Name, S/o, Age, Address] | 2. [Name, S/o, Age, Address]

✅ Chain Register Requirements

Each transfer documents: Who (names + designation of both parties) | What (item ID, seal condition) | When (exact date/time) | Why (purpose) | Signatures (both parties)

⚠️ Storage Requirements

Temperature: 15-25°C | Humidity: 40-60% | Magnetic Fields: Keep away from magnets, speakers

Access: Limited personnel, mandatory log | Backup: Verified forensic copy in separate location

3.5

Attack & Defence Strategies

⚖️ Burden of Proof

Prosecution: Must positively establish unbroken chain and authenticity

Defence: Only needs to raise reasonable doubt about integrity

This asymmetry makes thorough documentation essential. Even minor gaps can be exploited.

⚔️ Defence Attack Points
  • Gap in Chain: "Evidence was with IO until Jan 5, FSL received Jan 10. Who had custody for 5 days?"
  • Improper Sealing: "Ordinary cloth seal, not tamper-evident. Anyone could open and reseal."
  • Hash Mismatch: "Seizure hash X, examination hash Y. Mathematical proof of alteration."
  • Delayed Hashing: "Hash calculated 3 weeks after seizure. What happened during that time?"
  • Witness Issues: "Both witnesses are police informers. Not independent as required."
  • Device Manipulation: "Device was ON at scene, arrived at FSL powered OFF. What else was done?"
  • No Write-Blocker: "Without write-blocker, any access could have altered data."
🛡️ Prosecution Response
  • Complete Documentation: Chain register with signatures at every transfer
  • Hash Verification: Matching hashes at seizure, FSL receipt, examination, court
  • Seal Photos: Photographs of sealed evidence at each stage
  • Witness Testimony: Each person in chain testifies to their handling
  • Expert Evidence: Forensic expert explains integrity protocols followed
  • Corroboration: Other evidence supporting electronic evidence reduces chain impact
💡 Practical Wisdom

For Prosecution: Assume every gap will be exploited. Document obsessively. Use SHA-256. Photograph seals at every stage.

For Defence: Request complete chain register immediately. Compare all hash values. Check witness credentials. Examine time gaps.

🎯 Key Takeaways — Part 3.3

  • Chain of custody: 6 links from Seizure → Packaging → Transport → Storage → Examination → Court
  • Hash values are digital fingerprints — even one bit change = completely different hash
  • SHA-256 is recommended standard; MD5 alone is weak and attackable
  • BNSS S.105 requires two independent witnesses from locality
  • Document device state (ON/OFF) — don't turn off running device without capturing volatile data
  • Seizure memo must have: date/time/place, witnesses, device details, hash, sealing method
  • Every transfer needs: who, what, when, why, signatures of both parties
  • Defence attacks: gaps, hash mismatch, improper sealing, witness issues, no write-blocker
  • Prosecution counters: complete documentation, hash verification, expert testimony
  • Minor chain breaks can create reasonable doubt — obsessive documentation essential

📝 Quick Assessment — Part 3.3

1. The recommended hash algorithm for digital evidence is:
Correct: B. SHA-256 is the industry standard. MD5 is weak (collision attacks demonstrated).
2. BNSS S.105 requires presence of:
Correct: C. "Two or more independent and respectable inhabitants of the locality."
3. Hash mismatch between seizure and examination indicates:
Correct: A. Hash mismatch is mathematical proof data changed. Even one bit = different hash.
4. When seizing a powered-ON computer, first step is:
Correct: D. Running devices have volatile data in RAM. Capture first, photograph screen, then proper shutdown.
5. Chain of custody can be attacked by showing:
Correct: B. Defence attacks gaps (who had custody?), hash mismatches, improper sealing, witness issues.