Cross-Examining Investigating Officers
"The IO built the case — now expose its cracks"
The Investigating Officer is often the prosecution's star witness. They collected evidence, seized devices, and prepared the charge sheet. Your job: find gaps in procedure, technical failures, and chain of custody breaks that create reasonable doubt.
Understanding the IO's Role
Investigation Process: How FIR was registered, what steps were taken
Evidence Collection: What was seized, when, where, from whom
Witness Statements: Who was examined under S.161 BNSS
Technical Evidence: Device seizure, FSL referral, reports received
Accused Connection: How accused was identified and linked to crime
Documentation: Seizure memos, panchnamas, certificates prepared
Never ask "why" questions — they let IO explain and justify.
Ask "what," "when," "where," "who" — factual questions that trap.
Use documents — confront IO with their own records showing inconsistencies.
Be surgical — focus on 2-3 devastating points, not 20 minor ones.
Questioning on Seizure Procedure
• Witnesses are police personnel — not "independent" as required
• Seizure memo prepared later at police station, not on spot
• Device was ON but no volatile data captured
• No photographs of device in original state
• Multiple devices but vague description — which specific device?
Hash Value Verification
Definition: A unique digital fingerprint of data. SHA-256 or MD5 algorithms convert any file/drive into fixed-length string.
Purpose: Proves data hasn't been altered. Same input = same hash. Any change = completely different hash.
Legal Importance: Hash at seizure must match hash at analysis. Mismatch = tampering possibility.
Chain of Custody
Definition: Documented chronological history of evidence — who had it, when, where, for what purpose.
Purpose: Proves evidence presented in court is same as seized, without tampering opportunity.
Break = Doubt: Any unexplained gap in custody creates reasonable doubt about integrity.
• No sealing or seal not mentioned in seizure memo
• Long gap between seizure and FSL submission (weeks/months)
• Multiple handlers without documentation
• Storage in unsecured location
• Device accessed before FSL examination without documentation
• Seal broken with no record of when/why/by whom
S.63 BSA Certificate Issues
- Is certificate signed by person in charge of computer (not just IO)?
- Does it identify the specific electronic record?
- Does it describe manner of production (software, method)?
- Does it give particulars of device (make, model, serial)?
- Does it state computer was operating properly?
- Was it produced contemporaneously or created for trial?
- Is original device available for verification?
Complete Mock Cross-Examination Script
Facts: Complainant received call from "bank executive," shared OTP, lost ₹5 lakhs. IP traced to accused's residence. Laptop seized. FSL found complainant's bank details in browser history.
IO: Inspector Sharma, Cyber Cell. Investigated for 3 months. Filed charge sheet under S.66C, 66D IT Act + S.318, 319 BNS.
🎯 Key Takeaways — Part 5.2
- IO is prosecution's key witness — cross-examination can create reasonable doubt
- Focus on procedural gaps: seizure procedure, hash values, chain of custody, S.63 certificate
- Ask factual questions (what, when, where, who) — never ask "why" which allows explanation
- No hash at seizure = no proof data wasn't altered before FSL
- Police witnesses are not "independent" — challenge witness composition
- Long gap between seizure and FSL = tampering opportunity
- S.63 certificate must be from person in charge of computer — IO signing for accused's device is problematic
- IP address only proves connection, not individual user
- Expose technical ignorance — many IOs don't understand hash, IP, forensics
- End with summary question crystallizing all procedural failures