Digital Evidence Database
Showing 11 to 20 of 120 results.
-
Verification Handbook: A guide to Online Search and Research Techniques for Using UGC and Open Source Information in Investigation
- Institution
European Journalism Centre (EJC)
- Language
English
- Reference link
- http://verificationhandbook.com/book2/
- Executive summary
- n/a
- Purpose
- The document seeks to provide step-by-step guidance to apply research, fact-checking, and data journalism techniques.
- Description
- The guide describes the opportunities for using open source information and user-generated content in investigative work; using online research methods to investigate the who, where and when of a person, identifies research tools and investigative techniques, and verifying data quality, chapter on using UGC in human rights and war crimes investigations, and applying ethical principles to digital age investigation. The guide also contains useful case studies.
- Target group
- Journalists, aid providers, citizen reporter, relief responder, volunteer, journalism school student, emergency communication specialist, academics, social media investigators
-
Verification Handbook for Disinformation and Media Manipulation
- Institution
European Journalism Centre (EJC)
- Language
English
- Reference link
- https://datajournalism.com/read/handbook/verification-3
- Executive summary
- n/a
- Purpose
- It aims to equip journalists with the knowledge to investigate social media accounts, bots, private messaging apps, information operations, deep fakes, as well as other forms of misinformation and media manipulation
- Description
- This guideincludes information on misinformation and media manipulation, describing the lifecycle of media manipulation, and focused on investigating actors and content. It describes various investigating social media accounts, techniques on spotting bots, cyborgs, and inauthentic activity. The guide also offers further tips on monitoring for fakes and information operations during breaking news. Further, and building on the previous versions, the guide offers guidelines on verifying and questioning images. Further chapters include: analyzing ads on social networks, tracking actors across platforms, network analysis and attribution. The guide is presented in a practical manner, focusing primarily on case studies.
- Target group
- Journalists, aid providers, citizen reporter, relief responder, volunteer, journalism school student, emergency communication specialist, academics, social media investigators
-
Annex 1: Technical protocol for the provision of evidence, material witness and victims information in electronic form for their presentation during the Trial
- Institution
International Criminal Court (ICC)
- Language
English
- Reference link
- https://www.legal-tools.org/doc/f17274
- Purpose
- This protocol is designed to ensure that all the necessary information is available electronically during the proceedings to the Court. It provides a standard-setting for the court-participants.
- Description
- The document is an annex to the decision of the Court in the case of The Prosecutor v. Thomas Lubanga Dyilo.
- Target group
- lawyers and practitioners, especially practicing before the court
-
Prosecuting Computer Crimes
- Institution
U.S. Department of Justice (USDOJ) (U.S. Office of Legal Education, Executive Office for United States Attorneys)
- Language
English
- Reference link
- https://www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/01/14/ccmanual.pdf
- Purpose
- The manual aims to provide assistance in addressing the legal issues concerning the prosecution of computer crimes
- Description
- "This manual examines the federal laws that relate to computer crimes. Our focus is on those crimes that use or target computer networks, which we interchangeably refer to as “computer crime,” “cybercrime,” and “network crime.” Examples of computer crime include computer intrusions, denial of service attacks, viruses, and worms. We do not attempt to cover issues of state law and do not cover every type of crime related to computers, such as child pornography or phishing."
- Target group
- practitioners, legal professionals and legal researchers
-
Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations
- Institution
U.S. Department of Justice (USDOJ) (U.S. Office of Legal Education, Executive Office for United States Attorneys)
- Language
English
- Reference link
- https://www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/01/14/ssmanual2009.pdf
- Executive summary
- n/a
- Purpose
- The manual aims to provide assistance in addressing the legal issues concerning the collection of evidence in computers and the obtention of electronic evidence in criminal investigations.
- Description
- This is an updated manual covering the case law related to electronic vidence and related developments, includig procedures for warrants used to search and seize computers, the procedures for obtaining cell phone location information, the procedures for the compelled disclosure of electronic devices.
- Target group
- Practitioners, legal professionals, legal researchers
-
Field Guide for Civil Society Documentation of Serious Human Rights Violations
- Institution
The Public International Law & Policy Group
- Language
English
- Reference link
- https://static1.squarespace.com/static/5900b58e1b631bffa367167e/t/5acb525a8a922dc773d9f37f/1523274331296/PILPG+Field+Guide+for+Civil+Society+Documentation+of+Serious+Human+Rights+Violations_corrected+%28SC%29.pdf%C2%A0
- Executive summary
- n/a
- Purpose
- This guide is to assist relevant stakeholders to document serious human rights violations. It is a guide oriented towards ensuring that the documentation is only done, if undertaken properly, following the guide's instructions.
- Description
- This guide provides detailed and practical guidance on the documentation of serious human rights violations, it addresses practices regarding several evidence typologies, including digital evidence.
- Target group
- Civil society organizations and first responders
-
Fair Trials' Consultation Paper on E-Evidence
- Institution
Fair Trials
- Language
English
- Reference link
- https://www.fairtrials.org/sites/default/files/Fair-Trials-e-evidence-consultation-paper.pdf
- Executive summary
- Faced with increasing use of electronic evidence in the context of criminal investigations, both the US and the EU have expressed the willingness to modernise the tools enabling cross-border access to electronic data for law enforcement authorities, and to cooperate further in the exchange of electronic data. This is an opportunity for the EU and the US to set a gold standard for the world. It is proposed that the new form of cooperation would, effectively, enable law enforcement authorities directly to seek the preservation or production of electronic data held by private companies overseas. Given the impact of cooperation measures on human rights, it will be crucial for the fair long-term functioning of any future mechanism that it is underpinned by human rights protections. To date, this has been recognised by vague and uncertain principles, but any failure to ensure adequate human rights protections is likely to have a negative impact on the fairness, effectiveness and long-term sustainability of the new mechanism. We recognise the concerns expressed by other stakeholders about the rationale itself of the proposed new mechanism, but in view of the political pressure to make this happen, we would like to focus on four key safeguards required to preserve the fundamental fair trial protections for people accused of crime: Prior notification to the suspect: In criminal trials, where the prosecution has the machinery of the state behind it, the principle of equality of arms is an essential guarantee of an accused’s right to defend themselves. It ensures that the accused has a genuine opportunity to obtain evidence to support its defence, prepare and present their case, and contest evidence put before the court, on equal footing with the prosecution. However, this is threatened by (inter alia) the lack of notification about the gathering of data. Although we recognise that specific stages of some investigations may, exceptionally, require secrecy, notification is key to enable challenges to requests and ensure that evidence supporting a person’s innocence is preserved as is other evidence. Robust prior judicial authorisation procedure: In view of the implications of the new tools on privacy and other fundamental rights, the new tools must require that law enforcement authorities meet a sufficiently high threshold in terms of suspicion of criminality (and the severity of the offence) as well as the relevance and materiality of the evidence sought, before they can request or obtain and share electronic data. In addition, requests must be subject to prior meaningful judicial oversight to avoid overbroad and disproportionate requests being issued. Meaningful remedies in the event of a trial: A key check on the legality of evidence-gathering by law enforcement authorities occurs at trial (or shortly before, after the evidence has been gathered). This is the power for the accused to challenge the admissibility of evidence on which the state is seeking to rely to secure a conviction. The accused person must have the right to challenge the request and use of data at trial, and seek specified appropriate legal remedies where electronic data has been obtained illegally. And in order to be in a position to exercise the right to challenge, accused persons must be able to obtain disclosure of the sources of the electronic evidence. Effective and systemic oversight on the use of the measures by law enforcement authorities: If the new tools are used fairly and proportionately, they are more likely to maintain public trust in criminal justice systems and law enforcement authorities. Effective oversight mechanisms will ensure that we insulate against the risk of improper use, and help protect both the reputation of legitimate law enforcement activity and those who could become victims of abuse of the tools.
- Purpose
- The purpose of the guidelines is to take a note and evaluate trial safeguards, in light of the ongoing discussions on cloud-acts and relevant provisions, and esnure that the standards is high enough to ensure fair trial guarantees.
- Description
- The paper focuses on discussing four trial safeguards: notification to the suspect, prior judicial authorisation, remedies at trial, and systematic oversight. It further describes and discusses the required fairness safeguards, before concluding with a chart outlining the proposal on e-evidence.
- Target group
- Law agencies and criminal justice actors
-
Verification Handbook: An Ultimate Guideline on Digital Age Sourcing for Emergency Coverage
- Institution
European Journalism Centre (EJC)
- Language
English
- Reference link
- http://verificationhandbook.com/downloads/verification.handbook.pdf
- Executive summary
- Authored by leading journalists from the BBC, Storyful, ABC, Digital First Media and other verification experts, the Verification Handbook is a groundbreaking new resource for journalists and aid providers. It provides the tools, techniques and step-by-step guidelines for how to deal with user-generated content (UGC) during emergencies.
- Purpose
- The document seeks to provide actionable advice to facilitate disaster preparedness in newsrooms, and best practices for how to verify and use information, photos and videos provided by the crowd.
- Description
- The guidelines provide information on verification fundamentals (using social media as a police scanner), verification of user-generated content, verification of images and videos, and and guides as to how to prepare for disaster coverage and creating verification process and checklists. In the annex, the guide contains a field guide to enhancing the evidentiary value of video for human rights.
- Target group
- Journalists, aid providers, citizen reporter, relief responder, volunteer, journalism school student, emergency communication specialist, academics, social media investigators
-
ACPO Good Practice Guide for Computer based Electronic Evidence
- Institution
Association of Chief Police Officers (ACPO)
- Language
English
- Publication date
- 2003-10-01
- Reference link
- https://cryptome.org/acpo-guide.htm
- Purpose
- "Details in this guide are designed to ensure good practice when collecting computer based electronic evidence; guidelines are not intended for use when dealing with evidence produced by witnesses from third party computer systems."
- Description
- The guide is not intended as a definitive manual of every operation during the investigation of a high tech crime or recovery of computer based electronic evidence. It provides guidance on the most common circumstances when computer-based and mobile phones evidence is involved. The document includes the principles of computer-based electronic evidence, guidance concerning the handling, retrieval and transport. It also sets out practices concerning the investigating personnel, interviews, retention, storage, evidence recovery and disclosure. Lastly, it addresses on welfare and health and safety considerations. The document also includes a glossary.
- Target group
- Personnel attending crime scenes or making initial contact with a victim; Investigators; Evidence recovery staff; External consulting witnesses
-
Forensic Examination of Digital Evidence: A Guide for Law Enforcement
- Institution
Office of Justice Programs, National Institute of Justice (NIJ) (US Department of Justice)
- Language
English
- Publication date
- 2004-04-01
- Reference link
- https://www.ncjrs.gov/pdffiles1/nij/199408.pdf
- Purpose
- The report assists agencies in developing their own policies and procedures.
- Description
- The guide is not all-inclusive, but it rather deals with common situations encountered during examination of digital evidence. The main contents of the guide relate to what it includes as steps of the examination process: 1. policy and procedure development; 2. evidence assessment; 3. evidence acquisition; 4. evidence examination; and, 5. documenting of digital evidence. It further includes case examples.
- Target group
- Law enforcement officers and other members of the law enforcement community who are responsible for the examination of digital evidence
This is free software. Created with LinkAhead
and Django. Licenced under AGPL version 3.0 (Sources).