Digital Evidence Database

Showing 11 to 20 of 120 results.
  • Verification Handbook: A guide to Online Search and Research Techniques for Using UGC and Open Source Information in Investigation

    Institution

    European Journalism Centre (EJC)

    Language

    English

    Reference link
    http://verificationhandbook.com/book2/
    Executive summary
    n/a
    Purpose
    The document seeks to provide step-by-step guidance to apply research, fact-checking, and data journalism techniques.
    Description
    The guide describes the opportunities for using open source information and user-generated content in investigative work; using online research methods to investigate the who, where and when of a person, identifies research tools and investigative techniques, and verifying data quality, chapter on using UGC in human rights and war crimes investigations, and applying ethical principles to digital age investigation. The guide also contains useful case studies.
    Target group
    Journalists, aid providers, citizen reporter, relief responder, volunteer, journalism school student, emergency communication specialist, academics, social media investigators

  • Verification Handbook for Disinformation and Media Manipulation

    Institution

    European Journalism Centre (EJC)

    Language

    English

    Reference link
    https://datajournalism.com/read/handbook/verification-3
    Executive summary
    n/a
    Purpose
    It aims to equip journalists with the knowledge to investigate social media accounts, bots, private messaging apps, information operations, deep fakes, as well as other forms of misinformation and media manipulation
    Description
    This guideincludes information on misinformation and media manipulation, describing the lifecycle of media manipulation, and focused on investigating actors and content. It describes various investigating social media accounts, techniques on spotting bots, cyborgs, and inauthentic activity. The guide also offers further tips on monitoring for fakes and information operations during breaking news. Further, and building on the previous versions, the guide offers guidelines on verifying and questioning images. Further chapters include: analyzing ads on social networks, tracking actors across platforms, network analysis and attribution. The guide is presented in a practical manner, focusing primarily on case studies.
    Target group
    Journalists, aid providers, citizen reporter, relief responder, volunteer, journalism school student, emergency communication specialist, academics, social media investigators

  • Annex 1: Technical protocol for the provision of evidence, material witness and victims information in electronic form for their presentation during the Trial

    Institution

    International Criminal Court (ICC)

    Language

    English

    Reference link
    https://www.legal-tools.org/doc/f17274
    Purpose
    This protocol is designed to ensure that all the necessary information is available electronically during the proceedings to the Court. It provides a standard-setting for the court-participants.
    Description
    The document is an annex to the decision of the Court in the case of The Prosecutor v. Thomas Lubanga Dyilo.
    Target group
    lawyers and practitioners, especially practicing before the court

  • Prosecuting Computer Crimes

    Institution

    U.S. Department of Justice (USDOJ) (U.S. Office of Legal Education, Executive Office for United States Attorneys)

    Language

    English

    Reference link
    https://www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/01/14/ccmanual.pdf
    Purpose
    The manual aims to provide assistance in addressing the legal issues concerning the prosecution of computer crimes
    Description
    "This manual examines the federal laws that relate to computer crimes. Our focus is on those crimes that use or target computer networks, which we interchangeably refer to as “computer crime,” “cybercrime,” and “network crime.” Examples of computer crime include computer intrusions, denial of service attacks, viruses, and worms. We do not attempt to cover issues of state law and do not cover every type of crime related to computers, such as child pornography or phishing."
    Target group
    practitioners, legal professionals and legal researchers

  • Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations

    Institution

    U.S. Department of Justice (USDOJ) (U.S. Office of Legal Education, Executive Office for United States Attorneys)

    Language

    English

    Reference link
    https://www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/01/14/ssmanual2009.pdf
    Executive summary
    n/a
    Purpose
    The manual aims to provide assistance in addressing the legal issues concerning the collection of evidence in computers and the obtention of electronic evidence in criminal investigations.
    Description
    This is an updated manual covering the case law related to electronic vidence and related developments, includig procedures for warrants used to search and seize computers, the procedures for obtaining cell phone location information, the procedures for the compelled disclosure of electronic devices.
    Target group
    Practitioners, legal professionals, legal researchers

  • Field Guide for Civil Society Documentation of Serious Human Rights Violations

    Institution

    The Public International Law & Policy Group

    Language

    English

    Reference link
    https://static1.squarespace.com/static/5900b58e1b631bffa367167e/t/5acb525a8a922dc773d9f37f/1523274331296/PILPG+Field+Guide+for+Civil+Society+Documentation+of+Serious+Human+Rights+Violations_corrected+%28SC%29.pdf%C2%A0
    Executive summary
    n/a
    Purpose
    This guide is to assist relevant stakeholders to document serious human rights violations. It is a guide oriented towards ensuring that the documentation is only done, if undertaken properly, following the guide's instructions.
    Description
    This guide provides detailed and practical guidance on the documentation of serious human rights violations, it addresses practices regarding several evidence typologies, including digital evidence.
    Target group
    Civil society organizations and first responders

  • Fair Trials' Consultation Paper on E-Evidence

    Institution

    Fair Trials

    Language

    English

    Reference link
    https://www.fairtrials.org/sites/default/files/Fair-Trials-e-evidence-consultation-paper.pdf
    Executive summary
    Faced with increasing use of electronic evidence in the context of criminal investigations, both the US and the EU have expressed the willingness to modernise the tools enabling cross-border access to electronic data for law enforcement authorities, and to cooperate further in the exchange of electronic data. This is an opportunity for the EU and the US to set a gold standard for the world. It is proposed that the new form of cooperation would, effectively, enable law enforcement authorities directly to seek the preservation or production of electronic data held by private companies overseas. Given the impact of cooperation measures on human rights, it will be crucial for the fair long-term functioning of any future mechanism that it is underpinned by human rights protections. To date, this has been recognised by vague and uncertain principles, but any failure to ensure adequate human rights protections is likely to have a negative impact on the fairness, effectiveness and long-term sustainability of the new mechanism. We recognise the concerns expressed by other stakeholders about the rationale itself of the proposed new mechanism, but in view of the political pressure to make this happen, we would like to focus on four key safeguards required to preserve the fundamental fair trial protections for people accused of crime: Prior notification to the suspect: In criminal trials, where the prosecution has the machinery of the state behind it, the principle of equality of arms is an essential guarantee of an accused’s right to defend themselves. It ensures that the accused has a genuine opportunity to obtain evidence to support its defence, prepare and present their case, and contest evidence put before the court, on equal footing with the prosecution. However, this is threatened by (inter alia) the lack of notification about the gathering of data. Although we recognise that specific stages of some investigations may, exceptionally, require secrecy, notification is key to enable challenges to requests and ensure that evidence supporting a person’s innocence is preserved as is other evidence. Robust prior judicial authorisation procedure: In view of the implications of the new tools on privacy and other fundamental rights, the new tools must require that law enforcement authorities meet a sufficiently high threshold in terms of suspicion of criminality (and the severity of the offence) as well as the relevance and materiality of the evidence sought, before they can request or obtain and share electronic data. In addition, requests must be subject to prior meaningful judicial oversight to avoid overbroad and disproportionate requests being issued. Meaningful remedies in the event of a trial: A key check on the legality of evidence-gathering by law enforcement authorities occurs at trial (or shortly before, after the evidence has been gathered). This is the power for the accused to challenge the admissibility of evidence on which the state is seeking to rely to secure a conviction. The accused person must have the right to challenge the request and use of data at trial, and seek specified appropriate legal remedies where electronic data has been obtained illegally. And in order to be in a position to exercise the right to challenge, accused persons must be able to obtain disclosure of the sources of the electronic evidence. Effective and systemic oversight on the use of the measures by law enforcement authorities: If the new tools are used fairly and proportionately, they are more likely to maintain public trust in criminal justice systems and law enforcement authorities. Effective oversight mechanisms will ensure that we insulate against the risk of improper use, and help protect both the reputation of legitimate law enforcement activity and those who could become victims of abuse of the tools.
    Purpose
    The purpose of the guidelines is to take a note and evaluate trial safeguards, in light of the ongoing discussions on cloud-acts and relevant provisions, and esnure that the standards is high enough to ensure fair trial guarantees.
    Description
    The paper focuses on discussing four trial safeguards: notification to the suspect, prior judicial authorisation, remedies at trial, and systematic oversight. It further describes and discusses the required fairness safeguards, before concluding with a chart outlining the proposal on e-evidence.
    Target group
    Law agencies and criminal justice actors

  • Verification Handbook: An Ultimate Guideline on Digital Age Sourcing for Emergency Coverage

    Institution

    European Journalism Centre (EJC)

    Language

    English

    Reference link
    http://verificationhandbook.com/downloads/verification.handbook.pdf
    Executive summary
    Authored by leading journalists from the BBC, Storyful, ABC, Digital First Media and other verification experts, the Verification Handbook is a groundbreaking new resource for journalists and aid providers. It provides the tools, techniques and step-by-step guidelines for how to deal with user-generated content (UGC) during emergencies.
    Purpose
    The document seeks to provide actionable advice to facilitate disaster preparedness in newsrooms, and best practices for how to verify and use information, photos and videos provided by the crowd.
    Description
    The guidelines provide information on verification fundamentals (using social media as a police scanner), verification of user-generated content, verification of images and videos, and and guides as to how to prepare for disaster coverage and creating verification process and checklists. In the annex, the guide contains a field guide to enhancing the evidentiary value of video for human rights.
    Target group
    Journalists, aid providers, citizen reporter, relief responder, volunteer, journalism school student, emergency communication specialist, academics, social media investigators

  • ACPO Good Practice Guide for Computer based Electronic Evidence

    Institution

    Association of Chief Police Officers (ACPO)

    Language

    English

    Publication date
    2003-10-01

    Reference link
    https://cryptome.org/acpo-guide.htm
    Purpose
    "Details in this guide are designed to ensure good practice when collecting computer based electronic evidence; guidelines are not intended for use when dealing with evidence produced by witnesses from third party computer systems."
    Description
    The guide is not intended as a definitive manual of every operation during the investigation of a high tech crime or recovery of computer based electronic evidence. It provides guidance on the most common circumstances when computer-based and mobile phones evidence is involved. The document includes the principles of computer-based electronic evidence, guidance concerning the handling, retrieval and transport. It also sets out practices concerning the investigating personnel, interviews, retention, storage, evidence recovery and disclosure. Lastly, it addresses on welfare and health and safety considerations. The document also includes a glossary.
    Target group
    Personnel attending crime scenes or making initial contact with a victim; Investigators; Evidence recovery staff; External consulting witnesses

  • Forensic Examination of Digital Evidence: A Guide for Law Enforcement

    Institution

    Office of Justice Programs, National Institute of Justice (NIJ) (US Department of Justice)

    Language

    English

    Publication date
    2004-04-01

    Reference link
    https://www.ncjrs.gov/pdffiles1/nij/199408.pdf
    Purpose
    The report assists agencies in developing their own policies and procedures.
    Description
    The guide is not all-inclusive, but it rather deals with common situations encountered during examination of digital evidence. The main contents of the guide relate to what it includes as steps of the examination process: 1. policy and procedure development; 2. evidence assessment; 3. evidence acquisition; 4. evidence examination; and, 5. documenting of digital evidence. It further includes case examples.
    Target group
    Law enforcement officers and other members of the law enforcement community who are responsible for the examination of digital evidence

This is free software. Created with LinkAhead and Django. Licenced under AGPL version 3.0 (Sources).