Digital Evidence In Cyberstalking And Harassment Cases
I. Overview: Digital Evidence in Cyberstalking and Harassment
1. Definition and Legal Basis
Cyberstalking and online harassment involve the use of digital technologies — such as social media, emails, messaging apps, GPS tracking, or spyware — to threaten, intimidate, or harass a victim.
Cyberstalking: Repeated, targeted conduct using electronic communication that causes fear or distress.
Cyberharassment: Broader term, includes abusive or threatening messages, doxxing, and online defamation.
2. Common Legal Frameworks
U.S. Federal Law:
18 U.S.C. § 2261A: Interstate stalking (including electronic communications).
18 U.S.C. § 875(c): Threats made via electronic communication.
U.K. Law:
Protection from Harassment Act 1997 (amended 2012 to include cyberstalking).
India:
Section 354D (stalking) and Section 66E, 67, 67A of the IT Act, 2000 (electronic harassment and privacy violations).
II. Importance of Digital Evidence
Digital Evidence Includes:
Metadata (timestamps, IP addresses, geolocation data)
Social Media Logs (Facebook, Twitter, Instagram posts, DMs)
Email Headers and Content (proving authorship and timing)
Chat Logs and Text Messages (from WhatsApp, Telegram, etc.)
Digital Forensics (device examination, deleted file recovery, cloud data)
Courts require authenticity, reliability, and chain of custody to admit digital evidence. It must be shown that the data was not altered and originated from the accused’s device or account.
III. Case Law Examples
1. United States v. Sayer, 748 F.3d 425 (1st Cir. 2014)
Jurisdiction: United States (Federal)
Facts:
The defendant, Sayer, engaged in a prolonged cyberstalking campaign against his ex-girlfriend. He posted her personal details and intimate photos online, created fake social media and dating profiles in her name, and directed men to her home.
Digital Evidence Used:
IP logs and timestamps from multiple websites traced to Sayer’s home network.
Emails linking his personal account to fake profiles.
Forensic analysis of his computer showed drafts of the fake posts.
Holding:
The First Circuit upheld the conviction under 18 U.S.C. § 2261A, ruling that the electronic trail of IP and metadata provided overwhelming evidence of his identity and intent to harass.
Significance:
Set a major precedent for using IP tracking, digital forensics, and social media logs to prove intent and authorship in cyberstalking cases.
2. U.S. v. Osinger, 753 F.3d 939 (9th Cir. 2014)
Jurisdiction: United States (Federal, Ninth Circuit)
Facts:
Osinger posted sexually explicit photos of his ex-girlfriend online without her consent, emailed them to her coworkers, and created fake profiles under her name.
Digital Evidence Used:
Server logs from Google and Facebook showing his account activity.
Copies of emails and posts with embedded metadata confirming the time and sender.
Forensic analysis linking his home IP address to the uploads.
Holding:
Conviction under 18 U.S.C. § 2261A was upheld. The court rejected his First Amendment defense, finding that harassment and intimidation are not protected speech.
Significance:
Clarified that digital publication of private images with intent to harass constitutes cyberstalking and can be proven through metadata and cloud-service records.
3. R v. Nimmo and Sorley [2014] (U.K. Crown Court)
Jurisdiction: United Kingdom
Facts:
After feminist campaigner Caroline Criado-Perez advocated for women’s representation on British currency, the defendants sent hundreds of abusive and threatening tweets.
Digital Evidence Used:
Twitter’s server data identifying the accounts’ IP addresses.
Screenshots and archived tweets authenticated by Twitter’s legal team.
Mobile phone data confirming account logins.
Holding:
Both defendants pled guilty to harassment under the Protection from Harassment Act 1997 and were sentenced to imprisonment.
Significance:
One of the first major U.K. cyberstalking cases using Twitter data as digital evidence, emphasizing the accountability of online speech and the importance of platform cooperation.
4. State of Maharashtra v. Vijendra Singh, 2016 SCC OnLine Bom 8427 (India)
Jurisdiction: India (Bombay High Court)
Facts:
The accused repeatedly sent obscene and threatening messages to a woman via Facebook and WhatsApp, even after she blocked him.
Digital Evidence Used:
Certified printouts of chat messages under Section 65B of the Indian Evidence Act.
Mobile device seizure reports linking the accused’s SIM card and account.
Cyber cell report authenticating message timestamps and sender identity.
Holding:
The Bombay High Court held that the Section 65B certificate and forensic authenticity made the digital evidence admissible, convicting the accused under Sections 354D IPC and 67 of the IT Act.
Significance:
Illustrates the Indian judiciary’s acceptance of electronic evidence (with proper certification) in cyberstalking and online harassment cases.
5. People v. Bollaert, 241 Cal. App. 4th 947 (Cal. Ct. App. 2015)
Jurisdiction: California, U.S.
Facts:
Kevin Bollaert operated “UGotPosted,” a “revenge porn” website where users uploaded nude photos of others without consent. He also ran a linked “takedown” site that charged victims to remove the photos.
Digital Evidence Used:
Server logs and payment records showing Bollaert’s administration of both sites.
Email communications between victims and the defendant.
Domain registration data confirming ownership.
Holding:
The California Court of Appeal upheld his conviction for identity theft and extortion, ruling that the website’s operation was a deliberate act of harassment.
Significance:
Showed how server data, domain ownership, and transaction logs serve as digital proof of intent and identity in cyberharassment enterprises.
IV. Summary Table
| Case | Jurisdiction | Key Digital Evidence | Outcome | Significance |
|---|---|---|---|---|
| U.S. v. Sayer (2014) | U.S. | IP logs, email metadata | Conviction upheld | Established role of IP tracing |
| U.S. v. Osinger (2014) | U.S. | Social media logs, emails | Conviction upheld | Defined limits of free speech in online harassment |
| R v. Nimmo & Sorley (2014) | U.K. | Twitter server data | Guilty plea | First major Twitter harassment prosecution |
| State of Maharashtra v. Vijendra Singh (2016) | India | WhatsApp/Facebook messages | Conviction | Validated electronic evidence under §65B |
| People v. Bollaert (2015) | U.S. (CA) | Server logs, domain data | Conviction upheld | Precedent for revenge porn and digital extortion cases |
V. Key Legal Takeaways
Digital evidence must be authenticated — via forensic reports, metadata, or legal certifications (e.g., Section 65B in India).
Metadata and IP logs are crucial to proving authorship and intent.
Social media cooperation (Twitter, Facebook, Google) plays a pivotal role in evidence collection.
Courts increasingly recognize cyberstalking and harassment as serious, traceable crimes, not anonymous online behavior.

0 comments