Digital Evidence Database

Showing 111 to 120 of 120 results.
  • Prosecuting Computer Crimes

    Institution

    U.S. Department of Justice (USDOJ) (U.S. Office of Legal Education, Executive Office for United States Attorneys)

    Language

    English

    Reference link
    https://www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/01/14/ccmanual.pdf
    Purpose
    The manual aims to provide assistance in addressing the legal issues concerning the prosecution of computer crimes
    Description
    "This manual examines the federal laws that relate to computer crimes. Our focus is on those crimes that use or target computer networks, which we interchangeably refer to as “computer crime,” “cybercrime,” and “network crime.” Examples of computer crime include computer intrusions, denial of service attacks, viruses, and worms. We do not attempt to cover issues of state law and do not cover every type of crime related to computers, such as child pornography or phishing."
    Target group
    practitioners, legal professionals and legal researchers

  • Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations

    Institution

    U.S. Department of Justice (USDOJ) (U.S. Office of Legal Education, Executive Office for United States Attorneys)

    Language

    English

    Reference link
    https://www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/01/14/ssmanual2009.pdf
    Executive summary
    n/a
    Purpose
    The manual aims to provide assistance in addressing the legal issues concerning the collection of evidence in computers and the obtention of electronic evidence in criminal investigations.
    Description
    This is an updated manual covering the case law related to electronic vidence and related developments, includig procedures for warrants used to search and seize computers, the procedures for obtaining cell phone location information, the procedures for the compelled disclosure of electronic devices.
    Target group
    Practitioners, legal professionals, legal researchers

  • Field Guide for Civil Society Documentation of Serious Human Rights Violations

    Institution

    The Public International Law & Policy Group

    Language

    English

    Reference link
    https://static1.squarespace.com/static/5900b58e1b631bffa367167e/t/5acb525a8a922dc773d9f37f/1523274331296/PILPG+Field+Guide+for+Civil+Society+Documentation+of+Serious+Human+Rights+Violations_corrected+%28SC%29.pdf%C2%A0
    Executive summary
    n/a
    Purpose
    This guide is to assist relevant stakeholders to document serious human rights violations. It is a guide oriented towards ensuring that the documentation is only done, if undertaken properly, following the guide's instructions.
    Description
    This guide provides detailed and practical guidance on the documentation of serious human rights violations, it addresses practices regarding several evidence typologies, including digital evidence.
    Target group
    Civil society organizations and first responders

  • Guidelines of the Committee of Ministers of the Council of Europe on electronic evidence in civil and administrative proceedings

    Institution

    Council of Europe (European Union)

    Language

    English

    Publication date
    2019-01-30

    Reference link
    https://search.coe.int/cm/Pages/result_details.aspx?ObjectId=0900001680902e0c
    Executive summary
    n/a
    Purpose
    "The guidelines aim to facilitate the use and management of electronic evidence within legal systems and in court practices."
    Description
    The document includes a brief section on relevant definitions, including metadata, trust service, among others. It also sets out fundamental principles for the handling of electronic evidence in civil and administrative proceedings. The guidelines address the process of taking oral evidence by remote link; the use of electronic evidence; the collection, seizure and transmission of electronic evidence; relevance and reliability; storage, preservation and archiving. The document also includes a note on the importance of awareness-raising, review, training and education.
    Target group
    EU Member States, their judicial and dispute-resolution mechanisms.

  • Basic investigative Standards for First Responders to International Crimes

    Institution

    Global Rights Compliance (GRC)

    Language

    English

    Publication date
    2016-07-01

    Reference link
    https://www.globalrightscompliance.com/en/publications/basic-investigative-standards-bis-for-first-responders-to-international-crimes
    Executive summary
    n/a
    Purpose
    "These basic investigative standards (“BISs”) identify the minimum standards that a first responder to a suspected crime, which may amount to an international crime, should adhere to in collecting, handling and preserving information in order to facilitate the subsequent work of professional investigators and prosecutors. The BISs are aimed at non-lawyers and non-professional investigators, including those who work for non-governmental organisations (“NGOs”), attempting to collect, handle and preserve information concerning international humanitarian or criminal law violations. As well as being intended to optimise practical cooperation with the International Criminal Court (“ICC”) Prosecutor, they are designed to achieve the most effective and robust foundation for any subsequent investigation and adjudication at the domestic or international level."
    Description
    These guidelines provides an overview of the role of first responders and the International Criminal Court, the basic investigation principles, including minimum standards, basic substantive knowledge for IHL investigations, guidance on how to implement an organized system to record the investigation steps and the results obtained. It further obtains standards for the collection, handling and preservation of information/evidence. In the annexes, the guide provides an evidence envelope sample; examples of log files, and witness code sheet.
    Target group
    investigators and first responders

  • Fair Trials' Consultation Paper on E-Evidence

    Institution

    Fair Trials

    Language

    English

    Reference link
    https://www.fairtrials.org/sites/default/files/Fair-Trials-e-evidence-consultation-paper.pdf
    Executive summary
    Faced with increasing use of electronic evidence in the context of criminal investigations, both the US and the EU have expressed the willingness to modernise the tools enabling cross-border access to electronic data for law enforcement authorities, and to cooperate further in the exchange of electronic data. This is an opportunity for the EU and the US to set a gold standard for the world. It is proposed that the new form of cooperation would, effectively, enable law enforcement authorities directly to seek the preservation or production of electronic data held by private companies overseas. Given the impact of cooperation measures on human rights, it will be crucial for the fair long-term functioning of any future mechanism that it is underpinned by human rights protections. To date, this has been recognised by vague and uncertain principles, but any failure to ensure adequate human rights protections is likely to have a negative impact on the fairness, effectiveness and long-term sustainability of the new mechanism. We recognise the concerns expressed by other stakeholders about the rationale itself of the proposed new mechanism, but in view of the political pressure to make this happen, we would like to focus on four key safeguards required to preserve the fundamental fair trial protections for people accused of crime: Prior notification to the suspect: In criminal trials, where the prosecution has the machinery of the state behind it, the principle of equality of arms is an essential guarantee of an accused’s right to defend themselves. It ensures that the accused has a genuine opportunity to obtain evidence to support its defence, prepare and present their case, and contest evidence put before the court, on equal footing with the prosecution. However, this is threatened by (inter alia) the lack of notification about the gathering of data. Although we recognise that specific stages of some investigations may, exceptionally, require secrecy, notification is key to enable challenges to requests and ensure that evidence supporting a person’s innocence is preserved as is other evidence. Robust prior judicial authorisation procedure: In view of the implications of the new tools on privacy and other fundamental rights, the new tools must require that law enforcement authorities meet a sufficiently high threshold in terms of suspicion of criminality (and the severity of the offence) as well as the relevance and materiality of the evidence sought, before they can request or obtain and share electronic data. In addition, requests must be subject to prior meaningful judicial oversight to avoid overbroad and disproportionate requests being issued. Meaningful remedies in the event of a trial: A key check on the legality of evidence-gathering by law enforcement authorities occurs at trial (or shortly before, after the evidence has been gathered). This is the power for the accused to challenge the admissibility of evidence on which the state is seeking to rely to secure a conviction. The accused person must have the right to challenge the request and use of data at trial, and seek specified appropriate legal remedies where electronic data has been obtained illegally. And in order to be in a position to exercise the right to challenge, accused persons must be able to obtain disclosure of the sources of the electronic evidence. Effective and systemic oversight on the use of the measures by law enforcement authorities: If the new tools are used fairly and proportionately, they are more likely to maintain public trust in criminal justice systems and law enforcement authorities. Effective oversight mechanisms will ensure that we insulate against the risk of improper use, and help protect both the reputation of legitimate law enforcement activity and those who could become victims of abuse of the tools.
    Purpose
    The purpose of the guidelines is to take a note and evaluate trial safeguards, in light of the ongoing discussions on cloud-acts and relevant provisions, and esnure that the standards is high enough to ensure fair trial guarantees.
    Description
    The paper focuses on discussing four trial safeguards: notification to the suspect, prior judicial authorisation, remedies at trial, and systematic oversight. It further describes and discusses the required fairness safeguards, before concluding with a chart outlining the proposal on e-evidence.
    Target group
    Law agencies and criminal justice actors

  • Verification Handbook: An Ultimate Guideline on Digital Age Sourcing for Emergency Coverage

    Institution

    European Journalism Centre (EJC)

    Language

    English

    Reference link
    http://verificationhandbook.com/downloads/verification.handbook.pdf
    Executive summary
    Authored by leading journalists from the BBC, Storyful, ABC, Digital First Media and other verification experts, the Verification Handbook is a groundbreaking new resource for journalists and aid providers. It provides the tools, techniques and step-by-step guidelines for how to deal with user-generated content (UGC) during emergencies.
    Purpose
    The document seeks to provide actionable advice to facilitate disaster preparedness in newsrooms, and best practices for how to verify and use information, photos and videos provided by the crowd.
    Description
    The guidelines provide information on verification fundamentals (using social media as a police scanner), verification of user-generated content, verification of images and videos, and and guides as to how to prepare for disaster coverage and creating verification process and checklists. In the annex, the guide contains a field guide to enhancing the evidentiary value of video for human rights.
    Target group
    Journalists, aid providers, citizen reporter, relief responder, volunteer, journalism school student, emergency communication specialist, academics, social media investigators

  • Berkeley Protocol on Digital Open Source Investigations: A Practical Guide on the Effective Use of Digital Open Source Information in Investigating Violations of International Criminal, Human Rights and Humanitarian Law

    Institution

    Berkeley Centre for Human Rights

    Language

    English

    Publication date
    2020-12-01

    Reference link
    https://humanrights.berkeley.edu/programs-projects/tech-human-rights-program/berkeley-protocol-digital-open-source-investigations
    Executive summary
    Open source investigations are investigations that rely, in whole or in part, on publicly available information to conduct formal and systematic online inquiries into alleged wrongdoing. Today, large quantities of publicly available information are accessible through the Internet, where a quickly evolving digital landscape has led to new types and sources of information that could assist in the investigation of alleged human rights violations and serious international crimes. The ability to investigate such allegations is of particular value to investigators who cannot physically access crime scenes in a timely manner, which is often the case in international investigations. Open source information can provide leads, support intelligence outputs and serve as direct evidence in courts of law. However, in order for it to be used in formal investigation processes, including legal investigations, fact-finding missions and commissions of inquiry, investigators must employ consistent methods, which both strengthen the accuracy of their findings and allow judges and other fact-finders to better evaluate the quality of the investigation process itself. The Berkeley Protocol on Digital Open Source Investigations was developed to provide international standards and guidance for investigators in the fields of international criminal justice and human rights. Such investigators come from a range of institutions, including media outlets, civil society groups and non-governmental organizations, international organizations, courts, and national and international investigative agencies. The establishment of consistent and measurable standards to support this multidisciplinary arena is a means of professionalizing the practice of open source investigations. While guidelines and training on the use of specific tools and software are an essential part of improving the quality of digital open source investigations, the Berkeley Protocol does not focus on specific technologies, platforms, software or tools, but rather on the underlying principles and methodologies that can be consistently applied, even as the technology itself changes. These principles outline minimum legal and ethical standards for conducting effective open source investigations. By following the guidance in the Berkeley Protocol, investigators will help to ensure the quality of their work, while minimizing the physical, psychosocial and digital risks to themselves and others. The Berkeley Protocol is designed as a teaching tool and a reference guide for open source investigators. Following an introductory chapter, the subsequent three chapters are dedicated to overarching frameworks, including principles, legal considerations and security. The remaining chapters are focused on the investigation process itself. This section of the Berkeley Protocol begins with a chapter on preparation and strategic planning, followed by a chapter dedicated to the various investigatory steps required – namely, online inquiries, preliminary assessment, collection, preservation, verification and investigative analysis. It concludes with a chapter on the methodology and principles for reporting on the findings of an open source investigation.
    Purpose
    The protocol aims to respond to the new environment of open source and digital data, providing tools on dealing with the opportunities and challenges posed by this reality. Consequently, "[t]he Protocol is designed to standardise procedures and provide methodological guidance across disparate investigations, institutions and jurisdictions to assist open source investigators in understanding the importance of: (a) Tracing the provenance of online content and attributing it to its original source, where possible; (b) Evaluating the credibility and reliability of online sources; (c) Verifying online content and assessing its veracity and reliability; (d) Complying with legal requirements and ethical norms; (e) Minimising any risk of harm to themselves, their organisations and third parties; (f) Enhancing protection of the human rights of sources, including the right to privacy".
    Description
    The Berkeley Protocol on Digital Open Source Investigations aims to standardise procedures and provide methodological guidance concerning digital open source investigations. The document addresses the relevant principles in open source investigations from a professional, methodological and ethical standpoint. It also provides the legal framework applicable to these investigations, providing security considerations and relevant guidance for the preparation, the investigative process and the reporting on findings. The Protocol also contains a glossary and a series of annexes, including forms and templates to assist investigators.
    Target group
    investigators, lawyers, archivists, and analysts.

  • كيفية التحقق رقمياً من انتماء العناصر المسلحة في الصراعات في الشرق الاوسط

    Institution

    Bellingcat

    Language

    Arabic

    Publication date
    2018-07-19

    Reference link
    https://www.bellingcat.com/resources/how-tos/2018/07/19/%d9%83%d9%8a%d9%81%d9%8a%d8%a9-%d8%a7%d9%84%d8%aa%d8%ad%d9%82%d9%82-%d8%b1%d9%82%d9%85%d9%8a%d8%a7%d9%8b-%d9%85%d9%86-%d8%a7%d9%86%d8%aa%d9%85%d8%a7%d8%a1-%d8%a7%d9%84%d8%b9%d9%86%d8%a7%d8%b5%d8%b1/
    Executive summary
    n/a
    Purpose
    To assist the process of verification of videos and photos.
    Description
    The guide specifically covers how one can determine what side a combatant belongs to in photos or videos from Middle Eastern conflicts, a key step in verifying the authenticity of videos and photos from conflict zones in the region. It includes information about military uniforms, patches and insignia, and arms and equipment. The guide is useful in providing information on linkage evidence.
    Target group
    Open source investigators, analysts and journalists

  • Using the Internet and Social Media for Counter-Terrorism Investigations

    Institution

    United Nations Counter-Terrorism Centre (UNCCT)

    Publication date
    2019-07-11

    Reference link
    https://www.interpol.int/en/News-and-Events/News/2019/INTERPOL-and-UN-publish-joint-handbook-for-online-counter-terrorism-investigations
    Purpose
    Help investigators collect, analyse and share information found online, particularly on social media platforms.
    Description
    The handbook shares good practices and offers practical online tools to assist investigators in Understanding how terrorists have adapted the way they use the Internet and social media and continue to be active online; Good practices in conducting an online counter-terrorism investigation; Steps for requesting the preservation and collection of electronic evidence, including from service providers. NB: The handbook is not open-access, in order to receive a copy of the handbook, law enforcement officers should contact the INTERPOL National Central Bureau in their country.
    Target group
    Investigators and law enforcement officers

This is free software. Created with LinkAhead and Django. Licenced under AGPL version 3.0 (Sources).