Bharatiya Sakshya Adhiniyam 2023 or BSA does not provide a standard operating procedure SOP for forensic imaging of devices. At the time of seizure, if a device is seized without a proper write blocker, the metadata changes instantly, potentially rendering the primary evidence inadmissible or contestable.
According to Sreya Chakraborty Assistant Professor at the Techo India Legal Sciences department "The Bharatiya Sakshya Adhiniyam or BSA 2023, even the earlier evidence act, do not prescribe potential SOPs for forensic imaging at the statute level. So what they rely on? General principles of evidence, authenticity, integrity, chain of custody, expert testimony, guidelines issued by forensic labs or investigative agencies, which may vary state to state, because each state has their own forensic agency. So write blocker matters because no data is altered in the original storage device. Metadata remains intact, and forensic image is true, verifiable copy. So, what can be done? Without this, the last access time stamps can be changed, triggered background OS writes, and also modify logs or hidden systems. So that directly undermines the forensic principles of preservation in original state. "
"The integrity of the evidence can be questioned. The defense can argue that the data was contaminated, the data was tampered with, or even planted, contaminated, the data was tampered with or even planted. Chain of custody becomes weak, of course, and admissibility is not there. So, expert validation, which I told earlier, that expert validation for forensic labs, forensic labs, science labs, case-wise split scrutiny, and also many agencies do follow the SOPs. But these are always not properly codified in law," she added.
Courts operating under the BSA 2023 framework follow a systematic evaluation process that begins with the initial submission and classification of electronic evidence. The judicial evaluation framework requires courts to first determine whether the evidence being presented constitutes primary or secondary evidence, a determination that has significant implications for the subsequent authentication requirements. When the original electronic device containing the evidence is physically produced in court, courts can treat the evidence as primary evidence, potentially eliminating the need for the Section 63(4) certificate that is mandatory for secondary evidence. This distinction requires courts to carefully examine the nature of the evidence presentation and make informed decisions about the appropriate evidentiary classification.
The certificate verification process under Section 63(4) represents one of the most critical aspects of the judicial evaluation framework, requiring courts to scrutinize both the administrative and technical components of the dual-signature requirement. Courts must verify that Part A of the certificate, completed by the responsible person, contains comprehensive details about the electronic device or record source, including technical specifications and ownership information. Simultaneously, courts must evaluate Part B of the certificate, completed by an expert, to ensure that the technical verification meets the required standards for hash value calculation and integrity assessment. This dual verification process places significant responsibility on courts to assess the credibility and qualifications of both the responsible person and the technical expert.
WhatsApp messages and social media communications present unique challenges for courts due to their ubiquitous nature and the ease with which they can be manipulated or taken out of context. Courts have developed specific protocols for evaluating WhatsApp evidence that focus on both technical authentication and contextual verification. The judicial approach to WhatsApp evidence requires courts to examine not only the technical aspects of message extraction and preservation but also the communicative context that gives meaning to the digital exchanges. Recent judicial decisions have emphasized that WhatsApp conversations cannot be admitted as evidence without proper certification under Section 63(4), reinforcing the mandatory nature of technical authentication even for seemingly straightforward digital communications.
The authentication process for WhatsApp evidence requires courts to evaluate multiple layers of verification, including device ownership, message integrity, and the reliability of extraction methods. Courts must assess whether the messages were obtained through legitimate means, such as chat exports or forensically sound device imaging, rather than potentially unreliable methods like screenshots that can be easily manipulated. The blue tick feature in WhatsApp can serve as additional corroborative evidence of message delivery and reading, but courts must be careful not to overstate its probative value or treat it as conclusive proof of communication authenticity. The judicial evaluation also extends to examining the broader context of the conversation, including the identity verification of participants and the chronological consistency of the message exchange.
CCTV footage represents one of the most technically complex forms of electronic evidence that courts regularly encounter, requiring judicial evaluation of both technical and evidential aspects. Courts must apply a multi-factor analysis that examines the quality of the footage, the reliability of the recording system, and the chain of custody from the moment of recording to presentation in court. The judicial approach to CCTV evidence has evolved to recognize that while perfect image quality is not always achievable, the footage must be of sufficient clarity to support the inferences being drawn from it. Courts have established that CCTV footage can serve as the sole basis for conviction in appropriate cases, provided that the technical authentication requirements are met and the footage clearly depicts the relevant events.
The authentication requirements for CCTV footage under BSA 2023 require courts to scrutinize both the technical specifications of the recording system and the operational procedures followed during the relevant time period. Courts must verify that the CCTV system was functioning properly during the material time, that the footage has not been altered or tampered with, and that the extraction and preservation methods maintain the integrity of the original recording. The mandatory Section 63(4) certificate for CCTV footage must include detailed technical information about the recording equipment, storage systems, and the manner in which the footage was extracted for presentation. Courts have emphasized that failure to produce this certificate renders CCTV footage inadmissible, highlighting the critical importance of proper procedural compliance.
Digital photographs and images require courts to apply sophisticated authentication standards that address both the technical integrity of the image files and the reliability of the capture process. The judicial approach to digital photography has evolved to incorporate a comprehensive six-factor test that examines the reliability of the recording equipment, the qualifications of the operators, the proper implementation of input/output procedures, the reliability of the software utilized, the correct programming and operation of the equipment, and the proper identification of the output. This multi-factor analysis requires courts to engage with technical details that may be beyond the traditional scope of judicial expertise, necessitating greater reliance on expert testimony and technical verification.
The hash value requirements introduced by BSA 2023 have particular significance for digital photography authentication, as they provide courts with a reliable mechanism for detecting tampering or alteration. Courts must verify that the hash values calculated at the time of evidence collection match those presented at trial, with any discrepancy indicating potential manipulation that could render the evidence inadmissible. The authentication process also requires courts to examine metadata associated with digital images, including EXIF data that can provide crucial information about the camera settings, date and time of capture, and potentially the geographic location where the photograph was taken. However, courts must also be aware that metadata can be manipulated, requiring additional verification through expert analysis and technical authentication.
The BSA 2023's introduction of mandatory expert authentication represents a significant enhancement in the judicial evaluation of electronic evidence, requiring courts to carefully assess the qualifications and credibility of technical experts. Courts must evaluate whether the proposed expert possesses the necessary technical knowledge and experience to provide reliable testimony about the specific type of electronic evidence being presented. The dual-signature requirement under Section 63(4) places particular emphasis on the expert's role in verifying technical aspects such as hash value calculation, file integrity assessment, and the detection of potential tampering or alteration. This enhanced reliance on expert testimony requires courts to develop greater sophistication in evaluating technical evidence and understanding the limitations and capabilities of various authentication methods.
The judicial assessment of expert qualifications has become increasingly important as the complexity of electronic evidence continues to evolve. Courts must determine whether an expert's background in areas such as digital forensics, computer science, or specific technical domains qualifies them to provide reliable testimony about particular types of electronic evidence. The expert authentication process also requires courts to evaluate the methodologies employed by experts in their analysis, ensuring that the technical procedures followed meet accepted standards for digital evidence examination. Courts have recognized that the rapidly evolving nature of digital technology may require ongoing education and adaptation of expert qualification standards.
Courts face significant practical challenges in implementing the enhanced electronic evidence framework under BSA 2023, particularly in terms of technical infrastructure and judicial training. The requirement for hash value verification and technical authentication places new demands on court systems that may lack the necessary technological resources or technical expertise. Courts must develop procedures for handling and verifying electronic evidence that ensure both security and accessibility, while also maintaining the traditional requirements of judicial transparency and public access. The implementation challenges are particularly acute in smaller jurisdictions where technical resources and expert witnesses may be limited.
The volume and complexity of electronic evidence present additional challenges for court management and case processing. Digital devices can contain vast amounts of data, requiring courts to develop efficient procedures for reviewing and evaluating relevant evidence while avoiding unnecessary delays. Courts must also address privacy concerns that arise when electronic evidence contains personal information beyond what is directly relevant to the case. The judicial system's adaptation to these challenges requires ongoing collaboration between the legal and technical communities to develop best practices that serve the interests of justice while respecting individual rights and maintaining procedural efficiency.
