⚖️
CyberLaw
Academy
📝 Module 5 Assessment
Cyber Trial, Cross-Examination & Court Craft
50 Questions • 60 Minutes • 70% Passing
50
Questions
60
Minutes
70%
Passing
5
Parts
Part 5.1 — Framing of Charges
1
Charge framing in Sessions Court:
BNSS S.173
BNSS S.230
IT Act S.66
BSA S.63
BNSS S.230 governs charge framing in Sessions Court.
2
Prima facie standard:
Beyond doubt
Preponderance
Ground for presuming
Confession
Prima facie = "ground for presuming" — sift, don't weigh.
3
UPI fraud charges:
S.66C, 66D IT + S.318, 319 BNS
S.67 IT only
BNS only
S.66A
IT Act (identity/personation) + BNS (cheating) combination.
4
Discharge application:
S.223
S.230
S.482
S.227 BNSS
S.227 BNSS provides for discharge.
5
Bazee.com defence:
Jurisdiction
S.79 intermediary safe harbor
Alibi
Insanity
S.79 safe harbor — CEO not liable without knowledge.
6
Valid charge includes:
Section only
Name only
Offence, section, time, place, manner, victim, role
Judgment
All elements for accused to prepare defence.
7
IT+BNS combined because:
IT lower punishment, BNS higher
IT unconstitutional
BNS cyber only
Required
IT for cyber elements; BNS for higher punishment.
8
At charge stage court:
Delivers judgment
Weighs evidence
Dismisses
Sifts, doesn't weigh
Court sifts at charge stage — if material, proceed.
9
Ransomware critical infra:
S.67 only
S.66, 66F IT + S.308 BNS
Defamation
Copyright
S.66 hacking + S.66F cyber terrorism + S.308 extortion.
10
Defence challenges if:
Strong evidence
Witnesses
S.63 missing, hash gap, identity gap
Confession
Technical deficiencies are valid discharge grounds.
Part 5.2 — Cross-Examining IOs
11
Effective IO cross uses:
"Why" questions
Aggressive tone
Factual questions (what, when, where)
Long speeches
Factual questions trap; "why" lets IO explain.
12
Hash at seizure proves:
Owner
No alteration seizure-FSL
IT Act required
Jurisdiction
Hash is fingerprint — matching proves no tampering.
13
S.63 certificate by:
Person in charge of computer
IO always
Prosecutor
FSL
S.63 requires person in charge to sign.
14
Chain break matters:
Longer trial
Proves guilt
Ignored
Creates tampering doubt
Gap = tampering opportunity = doubt.
15
Device ON — IO should:
Switch OFF
Capture volatile data, RAM
Give to accused
Ignore
Live system has volatile data lost on shutdown.
16
Police witness problem:
Cannot read
Corrupt
BNSS needs independent witnesses
Cannot sign
BNSS S.105-106 requires independent witnesses.
17
IP alone proves:
Connection used, not who
Accused committed
Owns computer
Server location
IP identifies connection, not individual.
18
Arjun Panditrao held:
S.65B optional
File with FIR
Unconstitutional
Mandatory, producible at trial
SC: certificate mandatory, can produce at trial.
19
Long seizure-FSL gap:
Speedy trial
Tampering opportunity
Double jeopardy
Jurisdiction
Extended custody = tampering opportunity.
20
Best cross strategy:
20+ points
Let IO explain
Focus 2-3 devastating failures
Avoid technical
Surgical focus on few critical points.
Part 5.3 — Technical Witnesses
21
Forensic expert challenged:
IT S.66
BSA S.45 special knowledge
BNSS S.173
BNS S.318
BSA S.45 requires special knowledge.
22
CDR proves:
Who called
Content
SIM activity, not user
GPS
CDR shows SIM activity; anyone can use SIM.
23
Social media IP retained:
~90 days
5 years
Forever
1 week
Most platforms ~90 days retention.
24
Key bank question:
Profit
Branches
CEO
OTP to registered or different number?
Different number = SIM swap indicator.
25
Dynamic IP means:
Never changes
Same IP different users
Exact location
Encrypted
Dynamic IP reassigned to different users.
26
Cell tower proves:
Exact GPS
Who called
General area (km radius)
Content
Tower coverage often several km.
27
Forensics standard:
ISO 27037, NIST 800-86
ISO 9001
IEEE 802.11
RFC 2616
ISO 27037 evidence; NIST 800-86 forensics.
28
Email verification proves:
Creator identity
Guilt
Authenticity
Email access only
Email verification = access, not identity.
29
Malware check rules out:
Faster
Remote access/planted files
RBI
Less work
Malware check rules out remote planting.
30
Bank delay relevant:
Proves innocence
IT required
RBI mandates quick — shows negligence
Not relevant
RBI quick action — delay = negligence.
Part 5.4 — Argument Structure
31
Opening should:
All evidence detail
Set narrative, preview simply
Cross-examine
Request judgment
Opening sets stage and previews evidence.
32
Hash analogy for judge:
Password
Email
Digital fingerprint
Phone
Hash = fingerprint, unique, changes completely if altered.
33
Evidence starts with:
Complainant
Forensic
IO
Accused
Start complainant — establish crime occurred.
34
Defence closing emphasizes:
Prosecution strong
Confession
Convict
Burden, doubt, alternatives
Defence: burden, doubt, unexplored alternatives.
35
Best fraud visual:
Abstract
Money flow diagram
Screenshots
Text
Money flow shows account movement visually.
36
IP analogy:
Name
Bank account
Postal address for internet
Mobile
IP = postal address, identifies connection.
37
After evidence, prosecution:
Address and rebut defence
Ignore
Request bail
Call witnesses
Prosecution addresses defence arguments.
38
Technical simplification:
Judges stupid
Law requires
Wastes time
Judges not technical — aids understanding
Judges legal experts — translation aids justice.
39
Defence opening:
Admit guilt
Plant doubt, highlight assumptions
All evidence
Convict
Defence opening plants doubt.
40
Documents should be:
Secret
Random
Numbered, indexed, ready
Left at office
Organization shows preparation.
Part 5.5 — Judgments & Literature
41
Arjun Panditrao S.65B:
Mandatory, producible at trial
Optional
With FIR
Unconstitutional
Mandatory but producible at trial.
42
Shreya Singhal struck:
S.65B
S.69A
S.66A IT Act
Entire IT
S.66A struck — vague, overbroad.
43
ISO 27037 covers:
Banking
Digital evidence handling
WiFi
Email
ISO 27037 = digital evidence handling.
44
Expert opinion under:
IT S.66
BNSS S.173
BNS S.318
BSA S.45
BSA S.45 governs expert opinion.
45
Puttaswamy established:
Privacy fundamental Art.21
S.66A valid
S.65B optional
Police powers
9-judge: privacy fundamental under Art.21.
46
NIST 800-86 for:
Banking
Blocking
Forensic methodology
FIR
NIST 800-86 = forensic techniques.
47
Private expert needs:
Law only
Certified (EnCE, CCE)
Police
None
Certifications establish expertise.
48
Bazee.com established:
S.66A valid
Hash required
FIR
S.79 intermediary safe harbor
S.79 safe harbor — CEO not liable without knowledge.
49
Foreign judgments:
Persuasive for novel issues
Binding
No value
Mandatory
Persuasive for novel cyber issues.
50
RFC 3227 covers:
Banking
Websites
Evidence collection, volatile data
Encryption
RFC 3227 = evidence collection, volatile data.
Submit Quiz
0%
Calculating...
Part 5.1
0/10
Part 5.2
0/10
Part 5.3
0/10
Part 5.4
0/10
Part 5.5
0/10
🔒 Protected