📱 Part 3.5

Special Categories & Cross-Examination

"Each evidence type has unique rules, vulnerabilities, and attack points"

WhatsApp, emails, CCTV, CDR — the evidence you'll encounter most frequently in cyber crime cases. Master the specific admissibility requirements, authentication challenges, and cross-examination techniques for each type.

5.1

Social Media Evidence

📱 The Social Media Challenge

Social media evidence is ubiquitous in modern cases — from defamation (offensive posts) to serious crimes (conspiracy via WhatsApp). Yet it presents unique challenges: accounts can be spoofed, content can be deleted, and proving WHO actually typed a message is often the hardest part.

Golden Rule: Social media evidence almost always requires S.63 certificate because you're producing screenshots/printouts (secondary evidence), not the original server data.

💬
WhatsApp
S.63 cert from phone owner/operator
End-to-end encryption blocks server data
📘
Facebook
S.63 cert + account ownership proof
Server data requires US legal process
📸
Instagram
S.63 cert from viewer's device
Stories disappear in 24 hours
🐦
Twitter/X
S.63 cert + URL archiving recommended
Tweets can be deleted instantly
⚖️
Ambalal Sarabhai Enterprise v. KS Infraspace
(2020) SCC OnLine SC 915
"WhatsApp messages produced without certificate under Section 65B of the Evidence Act are not admissible in evidence... The mandatory requirement of certificate cannot be dispensed with."

WhatsApp Evidence — Deep Dive

📲 WhatsApp: Primary vs Secondary

Primary Evidence (No S.63 needed):

• Original phone produced in court with WhatsApp open for inspection

• Judge directly views messages on device

• Rare in practice — device usually needed for ongoing investigation

Secondary Evidence (S.63 mandatory):

• Screenshots of WhatsApp chats

• Printouts of exported chat history

• Forensic extraction reports

• This is 99% of cases — hence S.63 certificate almost always required

⚠️ WhatsApp Authentication Challenges

1. Account Spoofing: WhatsApp accounts require only a phone number. Numbers can be obtained via prepaid SIMs with fake KYC. Display names are user-chosen, not verified.

2. Device Access: Anyone with physical access to an unlocked phone can send messages. "Was the phone always in accused's exclusive possession?"

3. Web/Desktop WhatsApp: Once linked, another person can send messages from computer while owner has no idea.

4. Message Editing: WhatsApp allows editing sent messages. Edit history not always visible to recipient.

5. "Delete for Everyone": Messages can be deleted within time limit. Recipient sees "This message was deleted."

6. Backup Manipulation: Chat backups can be edited before restoration.

7. Deepfakes: Screenshots can be fabricated using editing tools or apps like "Fake Chat Conversations."

✅ WhatsApp Evidence Admissibility Checklist
  • S.63 certificate from person operating the phone
  • Phone ownership established (bill, purchase receipt, IMEI records)
  • Account linked to accused's number (CDR showing same number)
  • Hash value of forensic extraction
  • Chain of custody from seizure to court
  • Witness to identify parties in conversation
  • Context of conversation (reply chain shows continuity)
  • Corroborating evidence linking accused to messages
5.2

Email & CCTV Evidence

📧 Email Evidence

📧 Email Sources & Admissibility

Sources of Email Evidence:

• Sender's "Sent" folder (S.63 from sender)

• Recipient's Inbox (S.63 from recipient)

• Email server logs (S.63 from server administrator + S.91 BNSS notice)

• Forwarded copies (weakest — multiple handling)

Critical Requirement: Preserve complete email headers! Headers contain routing information that proves authenticity and is much harder to fake than the visible "From" address.

⚠️ Email Spoofing — The Hidden Danger

What Defence Will Argue:

The "From" field in emails is trivially easy to fake. Anyone with basic technical knowledge can send an email appearing to come from any address — even the Prime Minister's Office.

How to Counter:

Email Headers: Full headers show actual routing — hard to fake without server access

Server Logs: Obtain via S.91 BNSS notice to email provider

DKIM/SPF/DMARC: Modern email authentication protocols in headers

IP Address: Headers contain sender's IP — can be traced

Reply Chain: If accused replied, proves they received/sent from that account

✅ Email Evidence Checklist
  • S.63 certificate from computer operator who accessed email
  • Complete email with full headers preserved
  • Account ownership established (email provider records via S.91)
  • Header analysis by expert if spoofing alleged
  • Server logs if available (via S.91 BNSS notice)
  • Hash value of email file/printout
  • Reply chain showing accused's participation
  • Corroboration (other evidence linking accused to email)

📹 CCTV Evidence

📹 CCTV: Primary vs Secondary

Primary Evidence:

• Original DVR/NVR device produced in court

• Judge views footage directly on device

• No S.63 certificate required

• Practically difficult — DVR needed for ongoing security

Secondary Evidence (Common):

• Footage copied to CD/DVD/USB/Hard Drive

• S.63 certificate mandatory from DVR operator

• Who is "operator"? Security guard, manager, owner — whoever controls DVR

⚠️ CCTV Defence Attack Points

1. Time/Date Settings: "When was DVR time last synchronized? Could be hours/days off."

2. Continuity: "Is this footage continuous or have portions been edited out?"

3. Resolution: "Can you positively identify the person from this grainy footage?"

4. Camera Coverage: "What about blind spots? Could someone else have entered unseen?"

5. Tampering: "DVR was unseized for 3 days. Footage could have been altered."

6. Metadata: "Video file shows creation date after incident. Proves manipulation."

✅ CCTV Evidence Checklist
  • S.63 certificate from DVR operator (security officer/owner/manager)
  • DVR date/time settings verified and documented
  • Camera location and coverage area documented
  • Hash value of footage at time of copying
  • Footage is continuous, unedited (no jump cuts)
  • Witness to identify persons/events in footage
  • Chain of custody from DVR to court
  • Sealing of original DVR if preservation needed
5.3

Call Detail Records (CDR)

📞 What CDR Shows (and Doesn't Show)

CDR SHOWS:

• Calling number and called number

• Date and time of call

• Duration of call

• Cell tower location (approximate area, NOT GPS)

• IMEI of device used

• SMS details (number, time — not content)

CDR DOES NOT SHOW:

• Content of conversation (not a wiretap)

• WHO was actually using the phone

• Precise GPS location (only tower coverage area)

• Internet-based calls (WhatsApp, Skype)

⚖️
Tomaso Bruno v. State of U.P.
(2015) 7 SCC 178
"CDR, which is secondary evidence, cannot be proved merely by producing documents. The nodal officer of the service provider has to be examined and a proper certificate under Section 65B has to be filed."
⚠️ CDR Attribution Problem

The Fundamental Weakness: CDR proves the phone was used, not WHO used it.

Defence Arguments:

• "Phone could have been borrowed, stolen, or used by someone else"

• "SIM cards can be cloned"

• "Phone was in my possession but my friend made the call"

• "I lost my phone that day — lodged complaint" (check if true!)

Prosecution Response:

• Phone ownership + exclusive possession evidence

• Pattern of calls (regular contacts match accused's life)

• Cell tower location consistent with accused's known movements

• IMEI links to device seized from accused

• Voice sample comparison if call recording available

CDR ElementWhat It ProvesWhat It Doesn't Prove
Phone NumberWhich SIM was usedWho owned/used the SIM
Call TimeWhen call was madeWhat was discussed
DurationHow long call lastedWhether conversation was meaningful
Cell TowerApproximate area (1-5 km radius)Precise location (not GPS)
IMEIWhich device was usedWho was holding the device
✅ CDR Evidence Checklist
  • CDR obtained via S.91 BNSS from telecom company
  • S.63 certificate from telecom nodal officer
  • Nodal officer available for examination (Tomaso Bruno)
  • SIM ownership verified (CAF — Customer Acquisition Form)
  • IMEI linked to device seized from accused
  • Phone ownership/possession established
  • Cell tower locations mapped and correlated
  • Pattern analysis connecting calls to case facts
5.4

Cross-Examination Techniques

⚔️ The Art of Cross-Examination

Cross-examination of electronic evidence witnesses requires technical knowledge combined with legal strategy. Your goal: create reasonable doubt about Authentication, Integrity, or Attribution.

"The art of cross-examination is not the art of examining crossly." — Francis Wellman

🔍
Authentication
"Is this evidence genuine?"
• Spoofed accounts
• Fabricated screenshots
• Fake emails
• Deepfake videos
🔐
Integrity
"Has it been altered?"
• Hash mismatch
• Chain gaps
• Edited footage
• Deleted messages
👤
Attribution
"Can it be linked to accused?"
• Shared devices
• Borrowed phones
• Account hacking
• SIM cloning

💬 Cross-Examining WhatsApp Evidence

Q: "You have produced screenshots of WhatsApp messages. Who took these screenshots?" DEFENCE
Expected Answer

Witness will identify themselves or IO as the person who took screenshots.

Follow-up: "And the phone from which screenshots were taken — was it the accused's phone?"

If Yes: "So accused was not present when screenshots were taken. How do I know nothing was deleted or added before screenshots?"

If No: "So you're showing messages received by someone else. How do you prove accused sent them?"

💡 Strategy

Establish that screenshots are secondary evidence requiring S.63 certificate, and question the integrity of the device before screenshots were taken.

Q: "Can WhatsApp messages be deleted by the sender?" DEFENCE
Expected Answer

"Yes, WhatsApp has 'Delete for Everyone' feature."

Follow-up: "So we only see messages that weren't deleted. There could have been other messages — perhaps exculpatory — that were deleted?"

Purpose: Establish incomplete picture — selective presentation of evidence.

Q: "Can anyone create a WhatsApp account with any phone number?" DEFENCE
Expected Answer

"WhatsApp requires verification via OTP sent to phone number."

Follow-up: "But if someone had temporary access to my client's phone — even for 2 minutes — they could register WhatsApp on another device with his number?"

Follow-up 2: "And the display name on WhatsApp — can I set it to anything? Even 'Prime Minister Modi'?"

💡 Strategy

Establish that phone number doesn't guarantee identity. OTP can be intercepted with brief phone access. Display names mean nothing.

Q: "Who else had access to the phone from which these messages were allegedly sent?" DEFENCE
Expected Answer

Witness may not know.

Follow-up: "So you cannot rule out that a family member, friend, or colleague could have used the phone?"

Follow-up 2: "My client will testify his phone was frequently used by his teenage son for gaming. How do you prove my client — and not his son — typed these messages?"

📧 Cross-Examining Email Evidence

Q: "Is it possible to send an email that appears to come from someone else's address?" DEFENCE
Expected Answer

"Yes, email spoofing is possible."

Follow-up: "So the 'From' address showing my client's email doesn't necessarily mean my client sent it?"

If witness says "Headers can prove": "Did you examine the full headers? Were they preserved? What do they show?"

💡 Strategy

If headers weren't preserved or examined, the email's authenticity is questionable. Always ask for headers!

Q: "My client's email password was 'password123'. How many people do you think might know or guess such a password?" DEFENCE
Expected Answer

Witness may acknowledge weak passwords can be guessed or compromised.

Follow-up: "So someone could have accessed my client's email account without authorization and sent these emails?"

Purpose: Raise account compromise defense.

📞 Cross-Examining CDR Evidence

Q: "Does the CDR tell you WHO was holding the phone during these calls?" DEFENCE
Expected Answer

"No, CDR only shows the phone/SIM that made the call."

Follow-up: "So if I borrowed my friend's phone and made a threatening call, the CDR would show my friend's number, not mine?"

Answer will be "Yes" — establishing CDR ≠ user identity.

Q: "What is the radius covered by a single cell tower?" DEFENCE
Expected Answer

"In urban areas 1-3 km, in rural areas up to 30+ km."

Follow-up: "So when you say my client was 'near the crime scene' based on cell tower, he could have been anywhere within a 3 km radius — including thousands of other locations?"

Purpose: Show CDR location is imprecise, not GPS.

Q: "Can SIM cards be cloned?" DEFENCE
Expected Answer

"Technically possible, though difficult with modern SIMs."

Follow-up: "So it's at least possible that calls showing in CDR were made from a cloned SIM, not my client's original SIM?"
💡 Strategy

Use sparingly — only if evidence suggests SIM cloning is plausible. Otherwise sounds like desperate defense.

📹 Cross-Examining CCTV Evidence

Q: "When was the DVR's date and time setting last verified against standard time?" DEFENCE
Expected Answer

Witness may not know, or may say "at installation."

Follow-up: "So the timestamp on this footage showing 10:35 PM — could actually be 10:05 PM or 11:05 PM if the DVR clock was wrong?"

If crime has alibi for different time, this becomes critical.

Q: "Looking at this footage, can you clearly see the face of the person and positively identify them as the accused?" DEFENCE
Expected Answer

Depends on footage quality. Often grainy, low resolution.

Follow-up: "The person in the footage is wearing the same color shirt as thousands of people in this city. How do you specifically identify this as my client?"

Purpose: Challenge identification when face isn't clear.

Q: "Is this footage continuous, or have any portions been cut or edited?" DEFENCE
Expected Answer

Should be continuous if properly handled.

Follow-up: "I notice a jump at timestamp 10:42:15. Can you explain why there's a 3-minute gap?"

If no satisfactory explanation: "How do I know what happened during those 3 minutes? Perhaps exculpatory footage was removed?"

🎯 Universal Cross-Examination Questions (Any Electronic Evidence)

S.63 Certificate:

• "Where is the Section 63 certificate?"

• "Who signed this certificate? What is their designation?"

• "Were they the person 'in charge of' or 'responsible for' operating this computer/device?"

• "Is all the information required by S.63(4) present in this certificate?"

Chain of Custody:

• "When was this device seized? When did it reach the laboratory?"

• "Who had custody during this period? Where is the documentation?"

• "What is the hash value at seizure? What is the hash value at examination?"

• "The hash values are different — doesn't this prove the evidence was altered?"

Attribution:

• "Can you prove that the accused — and nobody else — was using this device/account at the relevant time?"

• "Who else had access to this device/password/location?"

• "Is it possible someone else used this device without the accused's knowledge?"

5.5

Practical Tips for Practitioners

👨‍⚖️ For Prosecution
  • Get S.63 certificate before trial — last-minute certificates look suspicious
  • Identify correct signatory — IT admin, not peon; nodal officer, not clerk
  • Complete all four S.63(4) requirements — partial certificates are defective
  • Document hash values at every stage — seizure, FSL, examination, court
  • Photograph seals at each transfer — visual proof of integrity
  • Preserve email headers, not just body — critical for spoofing defence
  • Ensure witnesses are available — certificate signer must be examinable
  • Corroborate electronic evidence — don't rely solely on digital proof
  • Anticipate attribution defence — gather evidence of exclusive possession
  • Apply for CDR early — telecom companies delete after ~2 years
  • Get cell tower location maps prepared — visual aids help court
  • Brief your expert witness on cross-examination tactics
👨‍💼 For Defence
  • Always check S.63 certificate first — missing = inadmissible (Anvar)
  • Verify signatory qualification — "in charge of computer"? Really?
  • Compare hash values — mismatch = integrity compromised
  • Examine chain of custody — gaps = tampering possibility
  • Question attribution — device found ≠ device used by accused
  • Explore alternative explanations — shared device, hacking, borrowed phone
  • Request forensic re-examination if doubts exist (S.45 BSA)
  • Check timestamps — system clocks can be wrong
  • Challenge CDR location — cell tower ≠ precise GPS
  • Ask about deleted data — incomplete picture suggests selective evidence
  • Verify CCTV continuity — edited footage = unreliable
  • Research witnesses — police informers aren't "independent"
✅ The Golden Checklist — Before Any Electronic Evidence Argument

1. Is S.63 certificate present? No certificate = Inadmissible

2. Is certificate complete? All 4 requirements of S.63(4) satisfied?

3. Is signatory qualified? Person "in charge of" or "responsible for" computer?

4. Is chain of custody documented? Seizure → FSL → Court with signatures?

5. Do hash values match? Seizure hash = Examination hash = Court hash?

6. Is attribution established? Proof that accused — not someone else — created/sent this?

7. Is there corroboration? Other evidence supporting electronic evidence?

🎯 Key Takeaways — Part 3.5

  • WhatsApp screenshots = secondary evidence requiring S.63 certificate (Ambalal Sarabhai)
  • WhatsApp challenges: spoofing, device access, editing, deletion, Web WhatsApp
  • Email "From" address easily spoofed — always preserve and examine full headers
  • CCTV footage needs S.63 from DVR operator; verify date/time settings
  • CDR requires S.63 certificate + nodal officer examination (Tomaso Bruno)
  • CDR shows phone activity, NOT who was using the phone
  • Cell tower location is approximate (1-30 km radius), not GPS precision
  • Three attack pillars: Authentication, Integrity, Attribution
  • Universal defence: "Who else had access?" (device, account, location)
  • Prosecution must establish attribution — evidence on device ≠ accused used device
  • Always check S.63 certificate first — missing or defective = inadmissible
  • Hash mismatch = evidence altered — strongest possible attack

📝 Assessment — Part 3.5 (10 Questions)

1. WhatsApp chat screenshots are:
Correct: A. Screenshots are copies (secondary evidence) requiring S.63 certificate from the phone operator. Ambalal Sarabhai confirms this.
2. According to Tomaso Bruno, CDR evidence requires:
Correct: C. "CDR cannot be proved merely by producing documents. Nodal officer has to be examined and proper S.65B certificate filed."
3. CDR evidence can prove:
Correct: B. CDR shows phone activity but NOT who used it, NOT call content, and NOT precise GPS (only approximate cell tower coverage).
4. The three pillars of attacking electronic evidence are:
Correct: D. Authentication (is it genuine?), Integrity (has it been altered?), Attribution (can it be linked to accused?).
5. CCTV footage S.63 certificate should be signed by:
Correct: A. S.63(4) requires certificate from person "in responsible official position in relation to operation of the computer" — for CCTV, that's the DVR operator/owner.
6. Email spoofing means:
Correct: B. Email spoofing = sending email with fake "From" address. It's trivially easy, which is why headers must be examined.
7. To counter WhatsApp attribution defence ("someone else used my phone"), prosecution should prove:
Correct: C. Prosecution must show accused had exclusive possession AND was using the device at the time messages were sent.
8. Cell tower location in CDR provides:
Correct: D. Cell towers cover 1-3 km in urban areas, up to 30+ km in rural areas. CDR shows tower, not precise location.
9. "Delete for Everyone" in WhatsApp means:
Correct: A. Defence can argue that deleted messages may have been exculpatory — we only see what wasn't deleted.
10. Best evidence to counter email spoofing allegation:
Correct: B. Email headers contain routing information that's much harder to fake than the "From" address. Server logs from provider via S.91 BNSS add further verification.