Digital Evidence Database
Showing 41 to 50 of 120 results.
-
Social Media - Guidelines on prosecuting cases involving communications sent via social media
- Institution
Crown Prosecution Service
- Language
English
- Publication date
- 2018-08-21
- Reference link
- https://www.cps.gov.uk/legal-guidance/social-media-guidelines-prosecuting-cases-involving-communications-sent-social-media
- Executive summary
- The document, as part of the Code of Crown Prosecutor's public documentation is issued by the Director of Public Prosecutions thatsets out the general principles under which the CPS should follow when they make decisions on cases.
- Purpose
- The purpose of the guide is to assist prosecutors and inform the general public on the work and legal standards with respect to the CPS.
- Description
- The document contains very specific information regarding social media and the scope of the legislative consideration when using communication through social media, and what usage can it be put at when investigating crimes under the UK criminal code. It describes the evidential standard, and the concept of public interest. It speaks of issues in Social media offending, including violence against women and girls, flagging, hate crime, and social media hate crime offences. It provides further guidelines on reporting an preventing abuse on social media.
- Target group
- Prosecutors
-
Как верифицировать принадлежность бойцов на Ближнем Востоке с помощью цифровых инструментов
- Institution
Bellingcat
- Language
Russian
- Publication date
- 2018-07-24
- Reference link
- https://ru.bellingcat.com/materialy/putevoditeli/2018/07/24/guide-uniforms-insignia/
- Executive summary
- n/a
- Purpose
- To assist the process of verification of videos and photos.
- Description
- The guide specifically covers how one can determine what side a combatant belongs to in photos or videos from Middle Eastern conflicts, a key step in verifying the authenticity of videos and photos from conflict zones in the region. It includes information about military uniforms, patches and insignia, and arms and equipment. The guide is useful in providing information on linkage evidence.
- Target group
- Open source investigators, analysts and journalists
-
كيفية التحقق رقمياً من انتماء العناصر المسلحة في الصراعات في الشرق الاوسط
- Institution
Bellingcat
- Language
Arabic
- Publication date
- 2018-07-19
- Reference link
- https://www.bellingcat.com/resources/how-tos/2018/07/19/%d9%83%d9%8a%d9%81%d9%8a%d8%a9-%d8%a7%d9%84%d8%aa%d8%ad%d9%82%d9%82-%d8%b1%d9%82%d9%85%d9%8a%d8%a7%d9%8b-%d9%85%d9%86-%d8%a7%d9%86%d8%aa%d9%85%d8%a7%d8%a1-%d8%a7%d9%84%d8%b9%d9%86%d8%a7%d8%b5%d8%b1/
- Executive summary
- n/a
- Purpose
- To assist the process of verification of videos and photos.
- Description
- The guide specifically covers how one can determine what side a combatant belongs to in photos or videos from Middle Eastern conflicts, a key step in verifying the authenticity of videos and photos from conflict zones in the region. It includes information about military uniforms, patches and insignia, and arms and equipment. The guide is useful in providing information on linkage evidence.
- Target group
- Open source investigators, analysts and journalists
-
How to Collect Sources from Syria If You Don’t Read Arabic
- Institution
Bellingcat
- Language
English
- Publication date
- 2018-07-10
- Reference link
- https://www.bellingcat.com/resources/how-tos/2018/07/10/how-to-collect-sources-from-syria-if-you-dont-read-arabic/
- Executive summary
- n/a
- Purpose
- To facilitate open source investigation and collection of sources from Syria to non-Arabic speakers.
- Description
- The guide introduces some free and easy to use tools to start researching groups and verifying content found online. It includes basic tools for Arabic research, and the usage of OCR. Lastly, it sets out limitations and recommendations.
- Target group
- Open source investigators and journalists
-
How to Digitally Verify Combatant Affiliation in Middle East Conflicts
- Institution
Bellingcat
- Language
English
- Publication date
- 2018-07-09
- Reference link
- https://www.bellingcat.com/resources/how-tos/2018/07/09/digitally-verify-middle-east-conflicts/
- Executive summary
- n/a
- Purpose
- To assist the process of verification of videos and photos.
- Description
- The guide specifically covers how one can determine what side a combatant belongs to in photos or videos from Middle Eastern conflicts, a key step in verifying the authenticity of videos and photos from conflict zones in the region. It includes information about military uniforms, patches and insignia, and arms and equipment. The guide is useful in providing information on linkage evidence.
- Target group
- Open source investigators, analysts and journalists
-
The New Forensics Using Open Source Information to investigate Grave Crimes
- Institution
Berkeley Centre for Human Rights
- Language
English
- Publication date
- 2018-07-01
- Reference link
- https://www.law.berkeley.edu/wp-content/uploads/2018/02/Bellagio_report_2018_7.pdf
- Purpose
- The document aims toprovide guidance for potential legal standards for open source investigations intended for use in legal procedings; identifying the principles that should underlie the development of legal standards; and, determining how best to mature this field of practice.
- Description
- The document highlights the discussion, conclusions, and recommendations from the workshop on evidence collection and legal accountability that the Human Rights Center hosted in Bellagio, Italy, from 2–6 October 2017. It addresses how online open source investigations can be strengthened to improve investigations and prosecutions by uncovering critical evidence of serious international crimes. It provides definitions, some standards and principles on open source investigation.
- Target group
- NGO investigators, international and national tribunal investigators, prosecutors, judges, defence attorneys, journalists, and academics
-
Best Practices Report
- Institution
European Commission (LIVE_FOR Project)
- Language
English
- Publication date
- 2018-05-23
- Reference link
- http://live-for.eu/wp-content/uploads/2019/04/D2.2_final.pdf
- Executive summary
- This document presents the best practices that are expected to be followed in cases when application of the EIO directive is applied. Besides the main instruction about application the document provides reasonable introduction to the main knowledge from relevant fields such as digital forensics and cross-border evidences collection from both aspects: technical and legal. This approach is understood by contacted experts to be most useful for the future professional in the respective organizations like prosecutors, judges etc. in cases when the EIO Directive will be applied. The first chapters define the technical part of this document. It is aimed to facilitate the knowledge needed to carry out a forensic analysis in both traditional computing and cloud environments. For that purpose, the first chapter is focused on defining basic general concepts such as the functioning of the Internet, the typical topologies of communication networks, how the information exchange process is carried out and which is the definition and use of metadata. The next two chapters are addressed to the techniques and principles of forensic digital science. They describe the principles of forensic computing, the basic legal requirements needed to carry out the information extraction process properly and the different types of information extraction methods, such as dead acquisition analysis and live forensics methods. Reverse engineering concept is explained and the most complete and well-known tools in this field are listed. This document also addresses and defines the characteristics of the technologies available behind the cloud environment, as well as carrying out an analysis of the risks and advantages associated with it, since every day more companies and entities migrate their information to the cloud. Some typical practical cases that can be used as a reference are also defined. One of the characteristics of cloud environments is the difference in terms of geographical location, so the data can be stored in multiple countries with different jurisdictions. This represents a challenge for the EU that needs to develop tools aimed to transfer digital evidences quickly and safely. For that reason, the tools that have been developed so far in this field are analysed. The legal part is defined in Chapter eight and is aimed to provide a reliable method and a series of best practices on gathering e-evidence abroad by using the EIO. Therefore, this part of the document can be used as a guide to complete properly each of the steps needed in the EIO. In the Annex, the international standards that can be followed by investigators to carry out a digital forensic analysis of evidence are defined. It is important that the agents involved in the scope of the Directive and the EIO increase their technical knowledge, their understanding of the main concepts regarding forensic environments in the cloud and enhance their knowledge on filling the EIO and the related procedures. This document is therefore intended to be used as a guide to allow the most effectiveness and appropriate adaptation to the current situation of the European environment.
- Purpose
- "Increase the technical knowledge, understanding of the main concepts regarding forensic environments in the cloud and enhance their knowledge on filling the EIO and the related procedures. This document is therefore intended to be used as a guide to allow the most effectiveness and appropriate adaptation to the current situation of the European environment."
- Description
- The document includes bes practices expected to follow when the European Investigation Order (EIO) is applied, particularly in connection to digital evidence and cross-border cooperation, from a legal and technical perspective. The document includes explanations on basic concepts such as server, log, metadata, etc. It also addresses digital forensics techniques and procedures, cloud forensics, and best practices on the collection of cross border evidence. As an annex, it includes relevant standards on digital evidence.
- Target group
- Agents involved in the application of the European Investigation Order (EIO).
-
Как архивировать материалы из открытых источников
- Institution
Bellingcat
- Language
Russian
- Publication date
- 2018-03-23
- Reference link
- https://ru.bellingcat.com/materialy/putevoditeli/2018/03/23/how-to-archive/
- Executive summary
- n/a
- Purpose
- To provide guidance on how to archive open source materials.
- Description
- The document provides guidance on how to collect, archive and preserve open source materials. It introduces tools like third-party archive platforms and testing them with social media platforms such as Facebook and Twitter. It also assists the collection of photographs and videos from websites like YouTube and Instagram.
- Target group
- Open source researchers and investigators
-
How to Archive Open Source Materials
- Institution
Bellingcat
- Language
English
- Publication date
- 2018-02-22
- Reference link
- https://www.bellingcat.com/resources/how-tos/2018/02/22/archive-open-source-materials/
- Executive summary
- n/a
- Purpose
- To provide guidance on how to archive open source materials.
- Description
- The document provides guidance on how to collect, archive and preserve open source materials. It introduces tools like third-party archive platforms and testing them with social media platforms such as Facebook and Twitter. It also assists the collection of photographs and videos from websites like YouTube and Instagram.
- Target group
- Open source researchers and investigators
-
Руководство по комплексному поиску видео в Интернете
- Institution
Bellingcat
- Language
Russian
- Publication date
- 2017-11-14
- Reference link
- https://ru.bellingcat.com/materialy/putevoditeli/2017/11/14/comprehensive-video-collection/
- Executive summary
- n/a
- Purpose
- To provide guidance on collection of videos.
- Description
- The guide provides advice and some tips on how to gather and collect as much video as possible on a particular event, whether it is videos from witnesses of a natural disaster or a terrorist attack. For most examples used in the guide, it is assumes that the event is a large protest or demonstration, but the same advice is applicable to other events. It includes a step-by-step description of the sets of searches: from searches through livestreams to day-specific filters on various platforms.
- Target group
- Open source investigators and journalists
This is free software. Created with LinkAhead
and Django. Licenced under AGPL version 3.0 (Sources).