Legal Basis:
* Information Technology Act, 2000 (IT Act)
* IPC Section 499-502 (Defamation, contempt)
* BNS Sections for applicable crimes
* Punishment: 3-10 years depending on severity
* Category: Mostly cognizable
* Mandatory Forensic: YES (for serious cyber crimes)
INVESTIGATION CHECKLIST:
STEP 1: RECEIVE COMPLAINT (BNSS Section 173)
* Register FIR immediately
* Record exact details of cyber crime
* Record date and time of incident
* Record description of cybercriminal
* Record platform used (social media, email, website, etc.)
* Record screenshots/evidence provided
* Record victim’s account details
* Document financial loss (if any)
STEP 2: PRESERVE DIGITAL EVIDENCE
CRITICAL – Must do immediately:
* Ask complainant NOT to delete anything
* Take screenshots of all offensive content
* Save URLs of problematic websites
* Screenshot offender’s social media profiles
* Save emails/messages (do not forward)
* Note date, time, and source of all evidence
* Request platform provider to preserve data (send formal request)
STEP 3: IDENTIFY THE CYBERCRIMINAL
* Trace social media account
* Check account creation date
* Review profile information for clues
* Look for IP address information
* Request platform for user information
* Check for pattern of similar crimes
* Prepare suspect profile
STEP 4: REQUEST DIGITAL DATA FROM PLATFORMS
Send official letter to platform (Google, Facebook, etc.):
* Request user account information
* Request IP address logs
* Request location data (if available)
* Request email address verified with account
* Request payment information (if applicable)
* Request metadata of posts/messages
* Request all communications
STEP 5: TRACE IP ADDRESS & LOCATION
* Obtain IP address of offender
* Trace IP to internet service provider (ISP)
* Contact ISP with legal notice
* Get location details from ISP
* Identify city/area of offender
* Get subscriber information from ISP
STEP 6: ARREST CYBERCRIMINAL
When offender identified:
* Prepare arrest warrant
* Raid suspect’s location
* Seize all devices (computer, laptop, phone, tablet)
* Seize internet router
* Look for backup storage devices
* Seize all electronic equipment
* Document all seized items
STEP 7: DIGITAL FORENSIC EXAMINATION (BNSS Section 176)
* Call digital forensics expert (MANDATORY)
* Examine suspect’s devices for:
* Evidence of crime on hard drive
* Deleted files (can be recovered)
* Browser history
* Email accounts accessed
* Social media accounts accessed
* Photos and videos stored
* Communication records
* Financial transactions
* Prepare detailed forensic report
STEP 8: DEVICES TO SEIZE
Seize all digital devices:
* Desktop computers
* Laptops
* Mobile phones/smartphones
* Tablets
* USB drives
* Memory cards
* External hard drives
* Internet routers
* Webcams
* Printers with hard drives
STEP 9: CHAIN OF CUSTODY FOR DIGITAL EVIDENCE
* Document all devices seized
* Seal devices in evidence bags
* Take photographs of seized items
* Create hashes of digital devices (unique digital fingerprint)
* Maintain custody record
* Keep devices in secure location
* Do NOT plug devices to internet
STEP 10: WITNESS STATEMENTS (BNSS Section 180)
Record statements of:
* Victim of cyber crime
* Person who filed complaint
* Witnesses who saw offensive content
* Family members of victim
* Any others affected
* Cybersecurity experts (if consulted by victim)
STEP 11: FINANCIAL INVESTIGATION
If cyber fraud involved:
* Trace bank accounts used
* Identify banks and branches
* Get transaction records
* Identify beneficiary accounts
* Trace flow of money
* Contact banks for account holder information
* Prepare financial timeline
* Identify accomplices if any
STEP 12: EVIDENCE COLLECTION
Collect:
* Screenshots of offensive content
* URLs of problematic websites
* Emails/messages
* Social media conversations
* Transaction records
* Account access logs
* IP address records
* Device forensic report
STEP 13: INVESTIGATION DIARY (BNSS Section 192)
Maintain detailed record:
* Date/time of complaint
* All actions taken
* All digital evidence collected
* All statements recorded
* All forensic findings
* Timeline of events
* Identification of suspect
* Devices seized and examined
STEP 14: CHARGESHEET (BNSS Section 193)
* Complete investigation
* Prepare detailed chargesheet
* Include all screenshots/evidence
* Include forensic report
* Include witness statements
* Include platform data
* Include financial trail (if applicable)
* Submit within 60 days
TYPES OF CYBER CRIMES TO INVESTIGATE:
* Online Defamation: False posts damaging reputation
* Cyber Harassment: Threatening messages/posts
* Cyber Fraud: Fake websites, phishing, scams
* Identity Theft: Using someone else’s personal information
* Online Sexual Abuse: Explicit content, grooming
* Hacking: Unauthorized access to accounts
* Malware Distribution: Spreading viruses
* Extortion: Demanding money online
CRITICAL PROCEDURES:
✓ Preserve all digital evidence IMMEDIATELY
✓ Do NOT alter or forward evidence
✓ Request platform data officially
✓ Trace IP address to location
✓ Seize ALL digital devices
✓ Maintain chain of custody
✓ Use digital forensics expert
✓ Do NOT plug seized devices to internet




