💻 Part 6.4

Custodial Interrogation vs Digital Evidence

"When custody serves no purpose — argue for liberty"

In cyber cases, evidence is digital, not physical. Learn when custody is genuinely needed versus when it's mere formality, and how to argue against custodial remand.

4.1

Purpose of Police Custody

📋 Legitimate Purposes of Custody

Recovery of evidence: Weapons, stolen property, documents

Discovery of co-accused: Interrogation may reveal accomplices

Confession/disclosure: Leading to discovery under S.27 BSA

Complex conspiracy: Understanding modus operandi

4.2

Why Custody Often Unnecessary in Cyber Cases

Traditional Crime

Physical evidence — weapons, drugs, documents

Eyewitnesses — need to identify

Location-based — scene reconstruction

Physical recoveries needed

Cyber Crime

Digital evidence — already on seized devices

Electronic trail — IP logs, transactions

Remote — location often irrelevant

Devices seized = evidence preserved

🎯 Key Arguments Against Custody

1. All digital evidence is on seized devices — custody won't yield more

2. Bank records, IP logs obtained from third parties — not from accused

3. Passwords can be provided voluntarily — no custody needed

4. Accused willing to cooperate — answer questions without custody

5. No physical recovery pointed out by prosecution

4.3

When Custody May Be Justified

⚠️ Situations Where Custody Argument Weakens

Large criminal network: Need to trace co-conspirators

Cryptocurrency/hidden assets: Location of wallets, keys

Ongoing operation: Need to stop continuing harm

Server locations: Discovery of infrastructure

Strategy: Even here, argue for limited custody (1-2 days), not full remand

🎯 Key Takeaways — Part 6.4

  • Custody purpose: Recovery, discovery of co-accused, confession leading to evidence
  • Cyber crimes: Evidence is digital — on seized devices, third-party records
  • Key argument: All evidence already seized; custody won't advance investigation
  • Passwords can be provided voluntarily; no physical recovery needed
  • Accused willing to cooperate — appear before IO without custody
  • If custody granted, argue for minimum days (1-2) not full remand
  • Cite: Arnesh Kumar — custody not routine, must be necessary
  • Article 21: Personal liberty — custody must be proportionate to need

📝 Assessment — Part 6.4 (6 Questions)

1. Key argument against custody in cyber cases:
Digital evidence is preserved when devices seized — custody won't yield more.
2. IP logs and bank records are obtained from:
These records come from service providers — custody of accused is unnecessary for them.
3. When custody may be justified in cyber case:
Complex conspiracies or hidden assets may require some custodial interrogation.
4. Best defence strategy when custody seems likely:
Even if custody granted, argue for limited period proportionate to actual need.
5. Password provision in cyber cases:
Passwords can be provided voluntarily under cooperation — custody not required.
6. Article 21 relevance to custody:
Article 21 right to personal liberty requires custody be proportionate to investigative need.