Introduction to Case Management
Effective case management is the backbone of successful cyber crime investigation and prosecution. Given the volume of digital evidence, multiple data sources, and complex relationships between entities, systematic organization is essential. This part covers practical techniques for managing cyber crime cases from initiation to chargesheet.
Poor case management leads to lost evidence, missed connections, failed prosecutions, and wasted resources. Good case management ensures nothing falls through the cracks and presents a coherent narrative to the court.
Case File Organization
Digital Case File Structure
Maintain both physical and digital case files. Digital files should follow a consistent folder structure:
Physical Case File (Paper Dossier)
| Section | Contents |
|---|---|
| Part A - Case Information | FIR, complaint, complainant details, case diary index |
| Part B - Statements | All 161 and 164 statements in chronological order |
| Part C - Documentary Evidence | Bank records, CDR, platform data (printed), screenshots |
| Part D - Scientific/Forensic | Forensic reports, Section 63 BSA certificates |
| Part E - Seizure Records | Seizure memos, photos, chain of custody forms |
| Part F - Correspondence | Notices sent, responses received, court orders |
Timeline Reconstruction
Timeline reconstruction is crucial in cyber crime cases to establish the sequence of events, correlate different data sources, and present a coherent narrative.
Steps for Timeline Construction
Sample Timeline Format
Case Timeline - Financial Fraud Investigation
- Rapid money movement (within minutes) suggests organized operation
- ATM withdrawal location provides physical lead for investigation
- Multiple small transactions (under 50,000) suggest awareness of alert thresholds
- Call duration and transaction timing help establish coercion narrative
Link Analysis
Link analysis visually maps relationships between entities (people, phones, accounts, devices) to identify patterns and connections not obvious in raw data.
Types of Links in Cyber Crime Cases
Communication Links
Phone calls, SMS, chat messages, emails between parties. Direction, frequency, and timing matter.
Financial Links
Money transfers, shared accounts, payment patterns. Follow the money trail.
Social Links
Social media connections, common friends, group memberships, location overlaps.
Technical Links
Shared IP addresses, same device fingerprints, common network usage patterns.
Creating Link Charts
Link charts can be created using:
- Software Tools: i2 Analyst's Notebook, Maltego, Gephi (free), yEd (free)
- Manual Methods: Whiteboard diagrams, PowerPoint/Draw.io for simpler cases
- Spreadsheet Analysis: Pivot tables to identify common elements
Best Practices for Link Analysis
- Start with known entities (victim, suspect, reported numbers/accounts)
- Add links as you discover them from data
- Use consistent symbols for different entity types
- Label links with nature and strength of connection
- Look for nodes with many connections - these may be key actors
- Document the source of each link for court presentation
Investigation Report Writing
Final Investigation Report Structure
| Section | Contents |
|---|---|
| Executive Summary | Brief overview of case, key findings, accused identified, evidence summary |
| Background | FIR details, complaint summary, applicable sections, investigation history |
| Methodology | Investigation steps taken, data sources consulted, tools used, agencies contacted |
| Timeline of Events | Chronological reconstruction of the offense |
| Evidence Analysis | Detailed analysis of each evidence type - digital, documentary, forensic |
| Accused Identification | How accused was identified, linking evidence, prior records if any |
| Findings | Conclusions on offense, modus operandi, role of each accused |
| Recommendations | Chargesheet recommendation, additional investigation if needed |
| Annexures | Evidence list, witness list, document index, forensic reports |
Writing Tips for Court-Ready Reports
- Be Objective: Present facts, not opinions. Let evidence speak.
- Technical Clarity: Explain technical terms. Include a glossary if needed.
- Source Everything: Every fact should reference its evidence source.
- Logical Flow: Connect evidence to conclusions clearly.
- Completeness: Address all elements of the alleged offense.
- Professional Language: Formal, precise, avoiding jargon.
- Missing Section 63 BSA certificates for electronic evidence
- Incomplete chain of custody documentation
- Timezone confusion in timestamps
- Technical jargon without explanation
- Conclusions not supported by documented evidence
- Failure to address all applicable legal sections
Chargesheet Preparation
Chargesheet Components for Cyber Crime Cases
- Form (Police Report): Standard format as per BNSS
- List of Witnesses: With addresses, categorized by type
- List of Documents: With Section 63 certificates for electronic evidence
- List of Material Objects: Seized devices, documents
- Previous Conviction Record: If any
- Investigation Summary: Narrative of investigation and findings
Special Considerations for Cyber Crime Chargesheet
- Clearly establish digital identity of accused (not just physical identity)
- Connect devices/accounts to the accused person with evidence
- Include Section 63 BSA certificates for ALL electronic evidence
- Reference forensic reports and their findings
- Explain technical aspects in layman's terms
- Map evidence to each element of the offense charged
- Maintain organized digital and physical case files with consistent structure
- Timeline reconstruction is crucial - normalize timezones and correlate sources
- Link analysis reveals connections not obvious in raw data
- Document everything with source references for court presentation
- Investigation reports should be objective, well-sourced, and court-ready
- Section 63 BSA certificates are mandatory for all electronic evidence
- Chargesheet must connect digital identity to physical accused with evidence
- Explain technical concepts for non-technical court audience