Digital Evidence Database
Showing 41 to 50 of 120 results.
-
Managing Digital Evidence in Courts
- Institution
Joint Technology Committee (JTC)
- Language
English
- Publication date
- 2016-02-17
- Reference link
- https://www.ncsc.org/__data/assets/pdf_file/0017/18521/digital-evidence-3-14-2016-final.pdf
- Executive summary
- Court management systems are not currently designed to manage large quantities of digital evidence, which means that courts and industry must find creative ways to deal immediately with the dramatically increasing volume of digital evidence, while planning for and developing new capabilities. Key considerations: Storage This is one of the most significant issues. Courts must estimate the storage that will be required, evaluate whether to invest in storage hardware or cloud storage, and consider business continuity and disaster recovery requirements. Preservation and Disposition Because appellate proceedings may continue for a lengthy period of time and digital evidence may take large amounts of storage, courts will need to consider how long and how to retain digital evidence. Courts should consider “active archive” solutions that allow the court to maintain the evidence in a less available state that is still retained. Discuss preservation and disposition policies with law enforcement and prosecutors. Centralization vs Decentralization Regardless of the state’s unique court structure, states should consider whether to build a statewide repository of digital evidence or to have localized repositories. Formats and Conversion Courts may approach the complicated issue of file format by choosing to accept only a limited range of formats. However, there are significant issues with converting digital evidence or requiring that digital evidence be submitted with the native format player. Courts may face technical difficulties displaying evidence correctly; computer speeds and display resolutions can distort digital evidence. Infrastructure Cost and performance issues will dictate the best solution in the tradeoff between local storage and the use of networks to transfer digital evidence. However, some technical strategies may not be options because of policies that specify who can store the original files and whether streaming live in a courtroom from a remote location is permissible. Chain of Custody The chain of custody protocol may be different in an electronic digital evidence environment. Courts must secure electronically stored digital evidence to ensure there is no possibility of tampering. Readiness The state of the technical infrastructure, the process for receiving digital video evidence, and how such evidence is played, stored, retained, and accessed are aspects of readiness that each court must evaluate. Access Courts must decide whether digital evidence introduced into the court record will be treated as a court filing or an exhibit, determine whether the evidence becomes subject to open records statutes and/or rules, and provide a mechanism for the public to access information guaranteed under public access policies or open records provisions. Privacy Digital video regularly records individuals and their property that are not a party to the case at hand. Prior to a video being entered into evidence, the faces and license plates of bystanders can be redacted or blurred out. Local practices will determine if a court needs to establish a court rule or policy, bearing in mind that redaction is very time-intensive. Vendor Management Ensure vendor contracts take into account security, auditing provisions, ownership of evidence, access, and other court-specific issues. Expectations Management Courts must manage the expectations of both the public and the judges and other courtroom stakeholders. A “CSI” effect may create very unrealistic expectations about what courts can reasonably do.
- Purpose
- The report identifies potentiall challenges and recommends steps that the court should follow concerning the increase in evidence collected by smart phones and body-worn cameras. The report addresses the court's capacity to receive, evaluate, protect, and present digital evidence.
- Description
- The report is the result of a focus group facilitated by the National Center for State Courts (NCSC) and held by Joint Technology Committee (JTC) in Denver on October 5-6, 2015. This report summarizes the information gathered in that focus group, and provides information on the potential challenges courts may face with digital evidence, and makes recommendations for state court consideration.
- Target group
- The court - and court's participants
-
Social Media - Guidelines on prosecuting cases involving communications sent via social media
- Institution
Crown Prosecution Service
- Language
English
- Publication date
- 2018-08-21
- Reference link
- https://www.cps.gov.uk/legal-guidance/social-media-guidelines-prosecuting-cases-involving-communications-sent-social-media
- Executive summary
- The document, as part of the Code of Crown Prosecutor's public documentation is issued by the Director of Public Prosecutions thatsets out the general principles under which the CPS should follow when they make decisions on cases.
- Purpose
- The purpose of the guide is to assist prosecutors and inform the general public on the work and legal standards with respect to the CPS.
- Description
- The document contains very specific information regarding social media and the scope of the legislative consideration when using communication through social media, and what usage can it be put at when investigating crimes under the UK criminal code. It describes the evidential standard, and the concept of public interest. It speaks of issues in Social media offending, including violence against women and girls, flagging, hate crime, and social media hate crime offences. It provides further guidelines on reporting an preventing abuse on social media.
- Target group
- Prosecutors
-
How to: Use Google Translate When Working in a Foreign Language
- Institution
Citizen Evidence Lab - Amnesty International
- Language
English
- Publication date
- 2020-02-27
- Reference link
- https://citizenevidence.org/2020/02/27/how-to-use-google-translate-when-working-in-a-foreign-language/
- Executive summary
- n/a
- Purpose
- To provide assistance on the usage of 'google tranlsate' when working in a foreign language.
- Description
- The guide provides an instruction to the targetted audience on the usage of 'google translate' when working in a foreign language. It highlights the limitations as well as points of careful consideration when using the application, as an add on.
- Target group
- Human rights investigators and defenders
-
How to: Use Reverse Image Search for Human Rights Investigations
- Institution
Citizen Evidence Lab - Amnesty International
- Language
English
- Publication date
- 2020-01-29
- Reference link
- https://citizenevidence.org/2020/01/29/how-to-use-reverse-image-search-for-human-rights-investigations/
- Executive summary
- n/a
- Purpose
- It provides guidance on how to use the reverse image search function.
- Description
- It provides guidance on how to use reverse image search for human rights investigations.
- Target group
- Human rights investigators and defenders
-
Verification Handbook: An Ultimate Guideline on Digital Age Sourcing for Emergency Coverage
- Institution
European Journalism Centre (EJC)
- Language
English
- Reference link
- http://verificationhandbook.com/downloads/verification.handbook.pdf
- Executive summary
- Authored by leading journalists from the BBC, Storyful, ABC, Digital First Media and other verification experts, the Verification Handbook is a groundbreaking new resource for journalists and aid providers. It provides the tools, techniques and step-by-step guidelines for how to deal with user-generated content (UGC) during emergencies.
- Purpose
- The document seeks to provide actionable advice to facilitate disaster preparedness in newsrooms, and best practices for how to verify and use information, photos and videos provided by the crowd.
- Description
- The guidelines provide information on verification fundamentals (using social media as a police scanner), verification of user-generated content, verification of images and videos, and and guides as to how to prepare for disaster coverage and creating verification process and checklists. In the annex, the guide contains a field guide to enhancing the evidentiary value of video for human rights.
- Target group
- Journalists, aid providers, citizen reporter, relief responder, volunteer, journalism school student, emergency communication specialist, academics, social media investigators
-
Verification Handbook: A guide to Online Search and Research Techniques for Using UGC and Open Source Information in Investigation
- Institution
European Journalism Centre (EJC)
- Language
English
- Reference link
- http://verificationhandbook.com/book2/
- Executive summary
- n/a
- Purpose
- The document seeks to provide step-by-step guidance to apply research, fact-checking, and data journalism techniques.
- Description
- The guide describes the opportunities for using open source information and user-generated content in investigative work; using online research methods to investigate the who, where and when of a person, identifies research tools and investigative techniques, and verifying data quality, chapter on using UGC in human rights and war crimes investigations, and applying ethical principles to digital age investigation. The guide also contains useful case studies.
- Target group
- Journalists, aid providers, citizen reporter, relief responder, volunteer, journalism school student, emergency communication specialist, academics, social media investigators
-
Verification Handbook for Disinformation and Media Manipulation
- Institution
European Journalism Centre (EJC)
- Language
English
- Reference link
- https://datajournalism.com/read/handbook/verification-3
- Executive summary
- n/a
- Purpose
- It aims to equip journalists with the knowledge to investigate social media accounts, bots, private messaging apps, information operations, deep fakes, as well as other forms of misinformation and media manipulation
- Description
- This guideincludes information on misinformation and media manipulation, describing the lifecycle of media manipulation, and focused on investigating actors and content. It describes various investigating social media accounts, techniques on spotting bots, cyborgs, and inauthentic activity. The guide also offers further tips on monitoring for fakes and information operations during breaking news. Further, and building on the previous versions, the guide offers guidelines on verifying and questioning images. Further chapters include: analyzing ads on social networks, tracking actors across platforms, network analysis and attribution. The guide is presented in a practical manner, focusing primarily on case studies.
- Target group
- Journalists, aid providers, citizen reporter, relief responder, volunteer, journalism school student, emergency communication specialist, academics, social media investigators
-
Annex 1: Technical protocol for the provision of evidence, material witness and victims information in electronic form for their presentation during the Trial
- Institution
International Criminal Court (ICC)
- Language
English
- Reference link
- https://www.legal-tools.org/doc/f17274
- Purpose
- This protocol is designed to ensure that all the necessary information is available electronically during the proceedings to the Court. It provides a standard-setting for the court-participants.
- Description
- The document is an annex to the decision of the Court in the case of The Prosecutor v. Thomas Lubanga Dyilo.
- Target group
- lawyers and practitioners, especially practicing before the court
-
How To Tell Stories: A Beginner’s Guide For Open Source Researchers
- Institution
Bellingcat
- Language
English
- Publication date
- 2019-07-12
- Reference link
- https://www.bellingcat.com/resources/2019/07/12/how-to-tell-stories-a-beginners-guide-for-open-source-researchers/
- Executive summary
- n/a
- Purpose
- Assist open source researches on the presentation of their findings.
- Description
- Provides advice to open source researchers about how to present their findings. It includes practical advice, such as identifying the target audience, planning the narrative,setting the right tone, and organizing and presenting the information efficiently. I also refers to a video/case study of Bellingcat's investigation regarding the latest MH17 Report.
- Target group
- Open source researchers and investigators
-
How to Prevent, Identify and Address Vicarious Trauma — While Conducting Open Source Investigations in the Middle East
- Institution
Bellingcat
- Language
English
- Publication date
- 2018-10-18
- Reference link
- https://www.bellingcat.com/resources/how-tos/2018/10/18/prevent-identify-address-vicarious-trauma-conducting-open-source-investigations-middle-east/
- Executive summary
- n/a
- Purpose
- The guide is intended to serve as an educational tool for those working in the open source investigative field on how to prevent, identify and address vicarious trauma.
- Description
- The document focuses on open source investigations in the Middle East, but can be adapted to other geographic areas. Considering the graphic scenes that open source investigators face, the document includes practical advice on preventing, identifying and addressing secondary trauma. The document focus on upholding the investigator's well-being.
- Target group
- Open source researchers and investigators
This is free software. Created with LinkAhead
and Django. Licenced under AGPL version 3.0 (Sources).