Part 5 of 7

Interview & Interrogation Techniques

🕑 90-120 minutes 📖 Practical Focus 📋 Module 5

Introduction to Digital Investigation Interviews

Interviewing in cyber crime cases requires unique skills that blend traditional investigation techniques with technical knowledge. Investigators must be prepared to discuss complex digital concepts while extracting relevant information from victims, witnesses, and suspects who may have varying levels of technical understanding.

📚 Interview vs. Interrogation

Interview: A conversation to gather information from victims, witnesses, or other persons who may have relevant knowledge. Generally non-confrontational.

Interrogation: A structured questioning session with a suspect to obtain admission or confession. More confrontational and subject to strict legal safeguards.

Section 161 BNSS (formerly Section 161 CrPC)

Governs examination of witnesses by police during investigation:

  • Any person acquainted with case facts can be examined
  • Person must answer all questions truthfully (except self-incriminating)
  • Statements to be reduced to writing if IO deems fit
  • Not required to be signed by witness
  • Cannot be used as substantive evidence - only for contradiction

Section 164 BNSS (formerly Section 164 CrPC)

Recording of confessions and statements by Magistrate:

  • Confession or statement recorded by Judicial Magistrate
  • Strict procedural safeguards must be followed
  • Must be voluntary - no inducement, threat, or promise
  • Accused must be informed of consequences
  • Can be used as substantive evidence in trial
Key Difference in BNSS

Under BNSS, Section 176 mandates audio-video recording of the process of arrest and search. While Section 164 statements before Magistrate have always been recorded formally, investigators should be prepared for increased documentation requirements across all investigation stages.

Aspect Section 161 Statement Section 164 Statement
Recorded By Police Officer (IO) Judicial Magistrate
Evidentiary Value For contradiction only Substantive evidence
Signature Required Not mandatory Mandatory
When Used During investigation Confession/Key statement
Safeguards Basic Extensive (voluntary, no inducement)

Interviewing Different Categories of Persons

1. Victim Interviews

Establish Rapport
Create a comfortable environment. Victims of cyber crimes often feel embarrassed or ashamed. Assure them they are not at fault and that such crimes are increasingly common.
Chronological Narrative
Let the victim narrate events in their own words without interruption. Then ask clarifying questions. Focus on timeline: when did they first receive the call/message? When did they realize it was fraud?
Technical Details
Ask about devices used, apps involved, screenshots taken, any recordings made. Don't assume victims don't have evidence - many preserve screenshots or call recordings.
Document Everything
Record exact amounts, account numbers, transaction IDs, phone numbers, email addresses, URLs - even if the victim mentions them casually.

Sample Questions for Fraud Victims

Initial Contact
"How did the accused first contact you? Was it a call, SMS, WhatsApp message, or email?"
Identifies the platform and potential evidence sources
Identity Claims
"What did the caller claim to be? Did they mention any organization name, employee ID, or reference number?"
Establishes the impersonation/deception element
Evidence Preservation
"Did you take any screenshots or recordings during or after the incident? Do you still have access to the messages or emails?"
Identifies available digital evidence
Transaction Details
"Please tell me the exact amounts transferred, to which account/UPI, and at what time. Do you have the transaction receipts or SMS confirmations?"
Gathers financial trail evidence

2. Technical Witness Interviews

Technical witnesses include IT administrators, service provider representatives, forensic experts, and other technical personnel.

💡 Approaching Technical Witnesses
  • Respect their expertise while maintaining control of the interview
  • Ask them to explain technical concepts in simple terms for court understanding
  • Document technical terms with their meanings
  • Get their qualifications and certifications on record
  • Ask for documentation (logs, certificates, reports) to support their statements

Sample Questions for Technical Witnesses

For IT Administrator
"Can you explain the access control mechanisms in place? Who had administrative access to the compromised system?"
For Bank IT Officer
"Please explain how a transaction from this account would be processed. What authentication steps are required?"
For Forensic Expert
"What methodology did you follow for image acquisition? Can you explain the hash verification process?"

3. Suspect Interrogation

Critical Safeguards
  • Inform suspect of grounds of arrest
  • Right to legal representation must be communicated
  • No torture, coercion, or inducement
  • Audio-video recording of arrest process (Section 176 BNSS)
  • Confession to police is not admissible (Section 25 BSA)
  • For confession to be admissible, must be before Magistrate (Section 164 BNSS)

Interrogation Strategy for Cyber Criminals

  1. Baseline Behavior: Start with neutral questions to establish normal behavior patterns
  2. Technical Knowledge Assessment: Gauge their technical proficiency through conversation
  3. Evidence Presentation: Strategically present digital evidence (IP logs, CDR, etc.) when appropriate
  4. Acknowledge Sophistication: Many cyber criminals pride themselves on their skills - this can be used strategically
  5. Financial Trail Focus: In fraud cases, focus on the money trail - accounts, beneficiaries, withdrawal patterns
  6. Network Exploration: Most cyber crimes involve networks - probe for co-accused and organized crime links

Recording Statements in Cyber Crime Cases

Essential Elements to Document

Category Details to Record
Personal Details Full name, address, occupation, contact numbers, email, social media handles
Technical Environment Devices used, operating systems, apps/browsers, internet connection type
Chronology Exact dates and times (with timezone), sequence of events, duration
Digital Identifiers Phone numbers, email addresses, usernames, URLs, IP addresses mentioned
Financial Data Amounts, account numbers, UPI IDs, transaction references, payment modes
Evidence Status What evidence witness has preserved, where it is stored, who has access

Statement Drafting Tips

  • Use the witness's own words as much as possible
  • Spell out technical terms and include brief explanations
  • Include full digital identifiers (complete phone numbers, full URLs)
  • Specify exact amounts in figures and words
  • Document the timestamp for each significant event
  • Note the source of each piece of information (direct knowledge, heard from someone, etc.)
  • If witness provides documents/screenshots, reference them in the statement

Handling Expert Witnesses for Court

Technical expert witnesses are crucial for cyber crime prosecution. Proper preparation ensures their testimony is effective.

Categories of Technical Expert Witnesses

💻

Forensic Examiner

Testifies on evidence acquisition, analysis methodology, findings from digital evidence examination.

🌐

Service Provider Representative

Authenticates CDR, IP logs, subscriber data. Explains how their systems work and data reliability.

💰

Banking/Financial Expert

Explains transaction processes, authentication mechanisms, and financial audit trails.

🔭

Subject Matter Expert

Explains specific technologies (blockchain, encryption, malware) relevant to the case.

Preparing Expert Witnesses

  1. Ensure their Section 63 BSA certificates are in order
  2. Review their methodology documentation
  3. Prepare them to explain technical concepts in layman's terms
  4. Discuss potential cross-examination questions
  5. Verify their qualifications and certifications are documented
  6. Ensure all tools used are legally acceptable and documented
💡 Pro Tip: Visual Aids

Encourage expert witnesses to prepare visual aids - flowcharts, diagrams, screenshots with annotations - that can help the court understand technical evidence. These can be submitted as exhibits.

Special Considerations in Cyber Crime Interviews

Language and Technical Literacy

  • Adjust technical vocabulary based on witness's understanding
  • Use analogies to explain complex concepts
  • Verify understanding by asking them to explain back
  • For non-English speakers, ensure accurate translation of technical terms

Child Victims/Witnesses

  • Follow child-friendly interview protocols
  • Presence of parent/guardian or support person
  • Use appropriate language for age group
  • Be aware of online safety education they may have received
  • For CSAM cases, follow POCSO Act special provisions

Corporate/Organizational Witnesses

  • Identify the appropriate authority to provide information
  • May need written authorization from organization
  • Technical staff may need approval to share system details
  • Document the witness's authority to speak for the organization
📚 Key Takeaways
  • Section 161 statements are for investigation; Section 164 before Magistrate has evidentiary value
  • Victim interviews require sensitivity - cyber crime victims often feel embarrassed
  • Document all digital identifiers: phone numbers, emails, URLs, transaction IDs
  • Technical witnesses should explain concepts in court-understandable language
  • Suspect interrogation must follow strict safeguards - confession to police is inadmissible
  • Expert witnesses need Section 63 BSA certificates for their evidence
  • Record exact timestamps and chronology for all events
  • Visual aids help courts understand technical evidence better