ABT-L
Evidence
Chained custody transition records. Role-scoped tier access from collecting officer through court. Tamper-evident across the pipeline.
Filed · Patent pending
Sid Ratnam
ABT methodology family · variant ABT-L · counsel memorandum

Five hands, one unbroken chain

A worked example of hash-chained custody authentication, tier-scoped access per custodian, and structural Brady disclosure in the legal evidence custody variant of the ABT methodology family.

U.S. Provisional Patent 64/056,353 · Filed May 4, 2026 · Foundational specification: ABT envelope-tier architecture
Abstract

The ABT-L variant applies the foundational envelope-tier architecture to physical evidence custody, with a five-hand criminal case chain as the canonical scenario. The variant-specific architectural elements are: per-custodian tier keys, such that each hand in the custody chain — collecting officer, forensic lab, prosecution, defense, court — holds a cryptographic key that decrypts only the tier projection authored for that custodian's institutional function; hash-chained transfer events, in which each handoff produces a registry entry that extends the chain, making any unrecorded transfer immediately detectable; and structural Brady disclosure, in which the defense tier is constructed at collection time and addressed directly to defense counsel's key — sealed against modification by the prosecution from the moment of collection. This memorandum follows evidence item EV-2024-0441 across five custody hands, identifying the legal significance of each architectural property.

I. Collection — five tiers constructed at the scene

Detective Guerrero collects EV-2024-0441 — five tiers sealed in parallel

At the moment of collection, the ABT-L envelope is constructed with five independent tier projections: one for each hand in the anticipated custody chain. Each tier is sealed to the key of its intended custodian. The collection event is recorded in the registry as h_0.

CustodianTier accessFunction
Det. Ines Guerrero
Collecting officer · first hand
Officer tier key — collection circumstances, scene notesCollects item; constructs envelope; signs at scene
Regional Forensic Laboratory
Analysis custodian · second hand
Lab tier key — analysis instructions, findingsReceives item; decrypts lab tier; performs and records analysis
District Attorney's Office
Prosecution · third hand
Prosecution tier key — evidentiary summary, case referenceReceives item; reviews prosecution tier; manages trial preparation
Defense Counsel
Defense · fourth hand
Defense tier key — same evidentiary content as prosecution tier; sealed at collectionReceives tier via registry direct; cannot have been modified by prosecution
Trial Court
Court · fifth hand
Court tier key — chain summary; all prior hash chain entries authenticatedReceives item; verifies complete chain; rules on admissibility
II. Brady disclosure — structural, not discretionary

Defense receives its tier from the collection event — prosecution cannot have altered it

The defense tier was constructed at collection time by Detective Guerrero's device and sealed to the defense counsel key. The prosecution held the evidence between h_1 (lab) and h_2 (prosecution) — but the defense tier remained sealed to the prosecution's key throughout. Defense counsel receives the tier as it was recorded at h_0.

Traditional Brady disclosure requires the prosecution to identify, evaluate, and voluntarily produce material exculpatory evidence. This creates a structural accountability gap: the prosecution holds a monopoly over the initial identification of what is Brady material. ABT-L addresses this gap at the architecture level. The defense tier is constructed at collection time from the same underlying evidence record as the prosecution tier. Its contents are determined by the evidence record — not by the prosecution's disclosure decision.

The prosecution cannot suppress Brady material by omitting it from the defense tier — because the defense tier is not authored by the prosecution. It is authored at the scene by the collecting officer's envelope construction, addressed to the defense counsel key. Prosecution is not in the authoring path for the defense tier.

III. Chain integrity — admissibility foundation

The court verifies five hash entries — no gaps, no forgeries

At trial, the court receives EV-2024-0441 with the complete hash chain. Each entry in the chain is verified against its predecessor. A single unrecorded transfer or alteration produces a verification failure.

chain_verification · CR-2024-8841: h_0: collection · Det. Guerrero · 2024-11-03T14:22:07Z ✓ h_1: lab receipt · Forensic Lab · 2024-11-03T16:45:00Z ✓ h_2: prosecution receipt · DA Office ✓ h_3: defense disclosure · Defense Counsel ✓ h_4: court submission · Trial Court ✓ breaks_detected: 0 gaps_detected: 0 all_tiers_authenticated: true FRE_901_b_9_foundation: established
Architectural note. A defense motion to exclude evidence based on chain of custody typically requires a showing that the evidence was tampered with or that its integrity was compromised between collection and trial. Under ABT-L, the burden of showing a chain gap is borne by the party asserting tampering — who must identify which hash entry fails verification. The affirmative integrity record shifts the baseline assumption in admissibility hearings: the item is presumptively authenticated by the chain; a challenge requires a specific hash verification failure.
IV. Structural analysis — what each tier holds and what it cannot compel

Compelled production analysis — per custodian

CustodianHoldsCannot produceLegal significance
Det. GuerreroOfficer tier: scene notes, collection circumstancesLab findings, prosecution notes, defense tierSubpoena for "all evidence records" yields officer tier only; cannot compel production of tiers not held
Forensic LabLab tier: analysis findings, DNA/fingerprint resultsCollection scene notes, prosecution notesLab cannot produce collection circumstances from officer tier — it does not hold them
ProsecutionProsecution tier: evidentiary summary, case referenceDefense tier (sealed to defense key at collection)Prosecution cannot produce the defense tier; it was never addressable to prosecution key
Defense CounselDefense tier: evidentiary summary (same content as prosecution tier, sealed at collection)Prosecution's work product in prosecution tierDefense demonstrates receipt of unmodified tier from registry chain
RegistryHash chain entries: transfer timestamps, chain hashes — no case contentAny tier content — registry holds only hash proofsRegistry subpoena yields tamper-evident log of transfers; no PII, no evidentiary content
ABT methodology family · ABT-L legal evidence custody variant · counsel reference document · US Provisional Patent 64/056,353 · Filed May 4, 2026
sidratnam.com