Digital Evidence Database

Showing 101 to 110 of 120 results.
  • How To Use Google Earth’s Three Dimensional View: Feat. Syria, Yemen, Sudan

    Institution

    Bellingcat

    Language

    English

    Publication date
    2019-03-05

    Reference link
    https://www.bellingcat.com/resources/how-tos/2019/03/05/how-to-use-google-earths-three-dimensional-view-feat-syria-yemen-sudan/
    Executive summary
    n/a
    Purpose
    Provides guidance on how to use varying angles of satellite imagery to get a three-dimensional understanding of an area.
    Description
    The document provides a practical approach on using varying angles of satellite imagery to get a three-dimensional understanding of an area through Google Earth. It assists the identification of the sides of a building, the true features of landforms and the shadows of objects. It uses examples from investigations in Syria, Yemen and Sudan.
    Target group
    Open source researchers and investigators

  • Bellingcat’s Invitation Is Waiting For Your Response: An Investigative Guide To LinkedIn

    Institution

    Bellingcat

    Language

    English

    Publication date
    2019-03-21

    Reference link
    https://www.bellingcat.com/resources/how-tos/2019/03/21/bellingcats-invitation-is-waiting-for-your-response-an-investigative-guide-to-linkedin/
    Executive summary
    n/a
    Purpose
    "This guide aims to provide helpful tools and techniques for identifying LinkedIn profiles and for extracting information that will then allow you to pivot to other social media profiles belonging to the target."
    Description
    The guide provides tools and techniques for identifying LinkedIn profiles and extracting relevant information, such as biographical detailes, personal and work contact information, approximate location, photos, username, website, and social networks. It includes preparatory security measures and information on how to use LinkedIn tools as part of open source investigations.
    Target group
    Open source researchers and investigators

  • Разбираемся с трехмерным видом в Google Earth на примере Сирии, Йемена и Судана

    Institution

    Bellingcat

    Language

    Russian

    Publication date
    2019-03-25

    Reference link
    https://ru.bellingcat.com/materialy/putevoditeli/2019/03/25/google-earth-terrain-view/
    Executive summary
    n/a
    Purpose
    Provides guidance on how to use varying angles of satellite imagery to get a three-dimensional understanding of an area.
    Description
    The document provides a practical approach on using varying angles of satellite imagery to get a three-dimensional understanding of an area through Google Earth. It assists the identification of the sides of a building, the true features of landforms and the shadows of objects. It uses examples from investigations in Syria, Yemen and Sudan.
    Target group
    Open source researchers and investigators

  • How To Track Illegal Funding Campaigns Via Cryptocurrency

    Institution

    Bellingcat

    Language

    English

    Publication date
    2019-03-26

    Reference link
    https://www.bellingcat.com/resources/how-tos/2019/03/26/how-to-track-illegal-funding-campaigns-via-cryptocurrency/
    Executive summary
    n/a
    Purpose
    To provide a tutorial on how to track bitcoin transactions
    Description
    The guide follows up on the tutorial 'Tracking Illicit Transactions With Blockchain: A Guide, Featuring Mueller' from February 2019. It uses Izz ad-Din al-Qassam Brigades’ bitcoin funding campaign as a case study.
    Target group
    Open source researchers and investigators

  • Using Phone Contact Book Apps For Digital Research

    Institution

    Bellingcat

    Language

    English

    Publication date
    2019-04-08

    Reference link
    https://www.bellingcat.com/resources/how-tos/2019/04/08/using-phone-contact-book-apps-for-digital-research/
    Executive summary
    n/a
    Purpose
    This guide shows how to use phone contact book apps in a relatively safe context — either through an Android virtual machine or on a “burner phone” not connected to a researcher’s actual email accounts or phone number.
    Description
    The guide provides guidance on how to use phone contact book apps for digital research in a relatively safe manner. It includes guidance on how to prepare the research device; and summaries of how to use the most common phone contact book apps, such as TrueCaller and CallApp.
    Target group
    Open source researchers and investigators

  • Как использовать приложения-телефонные справочники для исследований

    Institution

    Bellingcat

    Language

    Russian

    Publication date
    2019-04-17

    Reference link
    https://ru.bellingcat.com/materialy/putevoditeli/2019/04/17/telephone-contact-apps/
    Executive summary
    n/a
    Purpose
    This guide shows how to use phone contact book apps in a relatively safe context — either through an Android virtual machine or on a “burner phone” not connected to a researcher’s actual email accounts or phone number.
    Description
    The guide provides guidance on how to use phone contact book apps for digital research in a relatively safe manner. It includes guidance on how to prepare the research device; and summaries of how to use the most common phone contact book apps, such as TrueCaller and CallApp.
    Target group
    Open source researchers and investigators

  • Global Guidelines for Digital Forensics Laboratories

    Institution

    International Criminal Police Organization (INTERPOL) (Global Complex for Innovation)

    Language

    English

    Publication date
    2019-05-13

    Reference link
    https://www.interpol.int/content/download/13501/file/INTERPOL_DFL_GlobalGuidelinesDigitalForensicsLaboratory.pdf
    Executive summary
    n/a
    Purpose
    The purpose of this guideline is to outline the procedures for establishing and managing a Digital Forensics Laboratory (DFL) and provide technical guidelines for managing and processing electronic evidence. These guidelines should be used as a template by countries considering developing their digital forensics capability. The advice given is intended to be used at both the strategic and tactical levels, in accordance with national legislation, practice, and procedures. Additionally, it aims to ensure that electronic evidence produced by the DFL is admissible in member countries’ courts of law as well as in the international criminal justice systems.
    Description
    The document includes facts and principles on electronic evidence, management of a digital forensic laboratory with description of roles and responsibilites of staff, case management procedures, laboratory analysis procedure; criteria for the admissibility of electronic evidence; accreditation for Interpol's Innovation Centre’s Digital Forensics Lab (DFL).
    Target group
    INTERPOL member countries (digital forensics strategists and managers and technical staff)

  • The Most Comprehensive TweetDeck Research Guide In Existence (Probably)

    Institution

    Bellingcat

    Language

    English

    Publication date
    2019-06-21

    Reference link
    https://www.bellingcat.com/resources/how-tos/2019/06/21/the-most-comprehensive-tweetdeck-research-guide-in-existence-probably/
    Executive summary
    n/a
    Purpose
    To show how TweetDeck can vastly simplify and organize the research while allowing the collection of a greater amount of information with less time and effort.
    Description
    The guide presents guidance on how to use TweetDeck as a more efficient and quick tool for open source investigators. It addresses basic concepts, such as search columns and filters; twitter lists; search by location; searching other platforms; and a combination of research methods.
    Target group
    Open source researchers and investigators

  • Common challenges in combating cybercrime (as identified by Eurojust and Europol)

    Institution

    EuropolEurojust

    Language

    English

    Publication date
    2019-06-30

    Reference link
    https://www.eurojust.europa.eu/sites/default/files/Publications/Reports/2019-06_Joint-Eurojust-Europol-report_Common-challenges-in-combating-cybercrime_EN.PDF
    Executive summary
    n/a
    Purpose
    "The objective of this document is to identify and categorise the common challenges in combating cybercrime1 from both a law enforcement and a judicial perspective. Eurojust and Europol’s European Cybercrime Centre (EC3) have identified the challenges based on and informed by operational and practical experience, joint deliberations and expert input. Other sources used include final reports of several thematic and strategic meetings with national experts and relevant stakeholders, strategic reports and assessments such as Europol’s EC3’s Internet Organised Crime Threat Assessment (IOCTA), as well as various open sources. Despite the availability of information, both in- and external, on the obstacles, the discussion can certainly benefit from more extensive (and broader) research and a closer comparison of existing legislation at national and international levels. The challenges identified fall into five main areas (see also Figure 1 below):  loss of data;  loss of location;  challenges associated with national legal frameworks;  obstacles to international cooperation; and  challenges of public-private partnerships. This document further examines some of the practical implications of these challenges. In addition, this document lists some of the most relevant ongoing activities and open issues regarding each of the challenges identified. For this purpose, a short overview is given at the end of each chapter. Additional information on some of the ongoing activities as well as some of the open issues can be found in the Annex."
    Description
    The document focuses on summarizing the main challenges related to combating cybercrimes. It specificall focuses on explaning these challenges with respect to: a) loss of data, b) loss of location; c) challenges associated with national legal frameworks; d) obstacles to international cooperation and e) challenges to public private partnership. It also concludes with an annex of additional information on ongoing activities and open issues.
    Target group
    Actors on both law enforcement and judicial levels

  • Using the Internet and Social Media for Counter-Terrorism Investigations

    Institution

    United Nations Counter-Terrorism Centre (UNCCT)

    Publication date
    2019-07-11

    Reference link
    https://www.interpol.int/en/News-and-Events/News/2019/INTERPOL-and-UN-publish-joint-handbook-for-online-counter-terrorism-investigations
    Purpose
    Help investigators collect, analyse and share information found online, particularly on social media platforms.
    Description
    The handbook shares good practices and offers practical online tools to assist investigators in Understanding how terrorists have adapted the way they use the Internet and social media and continue to be active online; Good practices in conducting an online counter-terrorism investigation; Steps for requesting the preservation and collection of electronic evidence, including from service providers. NB: The handbook is not open-access, in order to receive a copy of the handbook, law enforcement officers should contact the INTERPOL National Central Bureau in their country.
    Target group
    Investigators and law enforcement officers

This is free software. Created with LinkAhead and Django. Licenced under AGPL version 3.0 (Sources).