Digital Evidence Database

Showing 41 to 50 of 120 results.
  • Managing Digital Evidence in Courts

    Institution

    Joint Technology Committee (JTC)

    Language

    English

    Publication date
    2016-02-17

    Reference link
    https://www.ncsc.org/__data/assets/pdf_file/0017/18521/digital-evidence-3-14-2016-final.pdf
    Executive summary
    Court management systems are not currently designed to manage large quantities of digital evidence, which means that courts and industry must find creative ways to deal immediately with the dramatically increasing volume of digital evidence, while planning for and developing new capabilities. Key considerations: Storage This is one of the most significant issues. Courts must estimate the storage that will be required, evaluate whether to invest in storage hardware or cloud storage, and consider business continuity and disaster recovery requirements. Preservation and Disposition Because appellate proceedings may continue for a lengthy period of time and digital evidence may take large amounts of storage, courts will need to consider how long and how to retain digital evidence. Courts should consider “active archive” solutions that allow the court to maintain the evidence in a less available state that is still retained. Discuss preservation and disposition policies with law enforcement and prosecutors. Centralization vs Decentralization Regardless of the state’s unique court structure, states should consider whether to build a statewide repository of digital evidence or to have localized repositories. Formats and Conversion Courts may approach the complicated issue of file format by choosing to accept only a limited range of formats. However, there are significant issues with converting digital evidence or requiring that digital evidence be submitted with the native format player. Courts may face technical difficulties displaying evidence correctly; computer speeds and display resolutions can distort digital evidence. Infrastructure Cost and performance issues will dictate the best solution in the tradeoff between local storage and the use of networks to transfer digital evidence. However, some technical strategies may not be options because of policies that specify who can store the original files and whether streaming live in a courtroom from a remote location is permissible. Chain of Custody The chain of custody protocol may be different in an electronic digital evidence environment. Courts must secure electronically stored digital evidence to ensure there is no possibility of tampering. Readiness The state of the technical infrastructure, the process for receiving digital video evidence, and how such evidence is played, stored, retained, and accessed are aspects of readiness that each court must evaluate. Access Courts must decide whether digital evidence introduced into the court record will be treated as a court filing or an exhibit, determine whether the evidence becomes subject to open records statutes and/or rules, and provide a mechanism for the public to access information guaranteed under public access policies or open records provisions. Privacy Digital video regularly records individuals and their property that are not a party to the case at hand. Prior to a video being entered into evidence, the faces and license plates of bystanders can be redacted or blurred out. Local practices will determine if a court needs to establish a court rule or policy, bearing in mind that redaction is very time-intensive. Vendor Management Ensure vendor contracts take into account security, auditing provisions, ownership of evidence, access, and other court-specific issues. Expectations Management Courts must manage the expectations of both the public and the judges and other courtroom stakeholders. A “CSI” effect may create very unrealistic expectations about what courts can reasonably do.
    Purpose
    The report identifies potentiall challenges and recommends steps that the court should follow concerning the increase in evidence collected by smart phones and body-worn cameras. The report addresses the court's capacity to receive, evaluate, protect, and present digital evidence.
    Description
    The report is the result of a focus group facilitated by the National Center for State Courts (NCSC) and held by Joint Technology Committee (JTC) in Denver on October 5-6, 2015. This report summarizes the information gathered in that focus group, and provides information on the potential challenges courts may face with digital evidence, and makes recommendations for state court consideration.
    Target group
    The court - and court's participants

  • Social Media - Guidelines on prosecuting cases involving communications sent via social media

    Institution

    Crown Prosecution Service

    Language

    English

    Publication date
    2018-08-21

    Reference link
    https://www.cps.gov.uk/legal-guidance/social-media-guidelines-prosecuting-cases-involving-communications-sent-social-media
    Executive summary
    The document, as part of the Code of Crown Prosecutor's public documentation is issued by the Director of Public Prosecutions thatsets out the general principles under which the CPS should follow when they make decisions on cases.
    Purpose
    The purpose of the guide is to assist prosecutors and inform the general public on the work and legal standards with respect to the CPS.
    Description
    The document contains very specific information regarding social media and the scope of the legislative consideration when using communication through social media, and what usage can it be put at when investigating crimes under the UK criminal code. It describes the evidential standard, and the concept of public interest. It speaks of issues in Social media offending, including violence against women and girls, flagging, hate crime, and social media hate crime offences. It provides further guidelines on reporting an preventing abuse on social media.
    Target group
    Prosecutors

  • How to: Use Google Translate When Working in a Foreign Language

    Institution

    Citizen Evidence Lab - Amnesty International

    Language

    English

    Publication date
    2020-02-27

    Reference link
    https://citizenevidence.org/2020/02/27/how-to-use-google-translate-when-working-in-a-foreign-language/
    Executive summary
    n/a
    Purpose
    To provide assistance on the usage of 'google tranlsate' when working in a foreign language.
    Description
    The guide provides an instruction to the targetted audience on the usage of 'google translate' when working in a foreign language. It highlights the limitations as well as points of careful consideration when using the application, as an add on.
    Target group
    Human rights investigators and defenders

  • How to: Use Reverse Image Search for Human Rights Investigations

    Institution

    Citizen Evidence Lab - Amnesty International

    Language

    English

    Publication date
    2020-01-29

    Reference link
    https://citizenevidence.org/2020/01/29/how-to-use-reverse-image-search-for-human-rights-investigations/
    Executive summary
    n/a
    Purpose
    It provides guidance on how to use the reverse image search function.
    Description
    It provides guidance on how to use reverse image search for human rights investigations.
    Target group
    Human rights investigators and defenders

  • Verification Handbook: An Ultimate Guideline on Digital Age Sourcing for Emergency Coverage

    Institution

    European Journalism Centre (EJC)

    Language

    English

    Reference link
    http://verificationhandbook.com/downloads/verification.handbook.pdf
    Executive summary
    Authored by leading journalists from the BBC, Storyful, ABC, Digital First Media and other verification experts, the Verification Handbook is a groundbreaking new resource for journalists and aid providers. It provides the tools, techniques and step-by-step guidelines for how to deal with user-generated content (UGC) during emergencies.
    Purpose
    The document seeks to provide actionable advice to facilitate disaster preparedness in newsrooms, and best practices for how to verify and use information, photos and videos provided by the crowd.
    Description
    The guidelines provide information on verification fundamentals (using social media as a police scanner), verification of user-generated content, verification of images and videos, and and guides as to how to prepare for disaster coverage and creating verification process and checklists. In the annex, the guide contains a field guide to enhancing the evidentiary value of video for human rights.
    Target group
    Journalists, aid providers, citizen reporter, relief responder, volunteer, journalism school student, emergency communication specialist, academics, social media investigators

  • Verification Handbook: A guide to Online Search and Research Techniques for Using UGC and Open Source Information in Investigation

    Institution

    European Journalism Centre (EJC)

    Language

    English

    Reference link
    http://verificationhandbook.com/book2/
    Executive summary
    n/a
    Purpose
    The document seeks to provide step-by-step guidance to apply research, fact-checking, and data journalism techniques.
    Description
    The guide describes the opportunities for using open source information and user-generated content in investigative work; using online research methods to investigate the who, where and when of a person, identifies research tools and investigative techniques, and verifying data quality, chapter on using UGC in human rights and war crimes investigations, and applying ethical principles to digital age investigation. The guide also contains useful case studies.
    Target group
    Journalists, aid providers, citizen reporter, relief responder, volunteer, journalism school student, emergency communication specialist, academics, social media investigators

  • Verification Handbook for Disinformation and Media Manipulation

    Institution

    European Journalism Centre (EJC)

    Language

    English

    Reference link
    https://datajournalism.com/read/handbook/verification-3
    Executive summary
    n/a
    Purpose
    It aims to equip journalists with the knowledge to investigate social media accounts, bots, private messaging apps, information operations, deep fakes, as well as other forms of misinformation and media manipulation
    Description
    This guideincludes information on misinformation and media manipulation, describing the lifecycle of media manipulation, and focused on investigating actors and content. It describes various investigating social media accounts, techniques on spotting bots, cyborgs, and inauthentic activity. The guide also offers further tips on monitoring for fakes and information operations during breaking news. Further, and building on the previous versions, the guide offers guidelines on verifying and questioning images. Further chapters include: analyzing ads on social networks, tracking actors across platforms, network analysis and attribution. The guide is presented in a practical manner, focusing primarily on case studies.
    Target group
    Journalists, aid providers, citizen reporter, relief responder, volunteer, journalism school student, emergency communication specialist, academics, social media investigators

  • Annex 1: Technical protocol for the provision of evidence, material witness and victims information in electronic form for their presentation during the Trial

    Institution

    International Criminal Court (ICC)

    Language

    English

    Reference link
    https://www.legal-tools.org/doc/f17274
    Purpose
    This protocol is designed to ensure that all the necessary information is available electronically during the proceedings to the Court. It provides a standard-setting for the court-participants.
    Description
    The document is an annex to the decision of the Court in the case of The Prosecutor v. Thomas Lubanga Dyilo.
    Target group
    lawyers and practitioners, especially practicing before the court

  • How To Tell Stories: A Beginner’s Guide For Open Source Researchers

    Institution

    Bellingcat

    Language

    English

    Publication date
    2019-07-12

    Reference link
    https://www.bellingcat.com/resources/2019/07/12/how-to-tell-stories-a-beginners-guide-for-open-source-researchers/
    Executive summary
    n/a
    Purpose
    Assist open source researches on the presentation of their findings.
    Description
    Provides advice to open source researchers about how to present their findings. It includes practical advice, such as identifying the target audience, planning the narrative,setting the right tone, and organizing and presenting the information efficiently. I also refers to a video/case study of Bellingcat's investigation regarding the latest MH17 Report.
    Target group
    Open source researchers and investigators

  • How to Prevent, Identify and Address Vicarious Trauma — While Conducting Open Source Investigations in the Middle East

    Institution

    Bellingcat

    Language

    English

    Publication date
    2018-10-18

    Reference link
    https://www.bellingcat.com/resources/how-tos/2018/10/18/prevent-identify-address-vicarious-trauma-conducting-open-source-investigations-middle-east/
    Executive summary
    n/a
    Purpose
    The guide is intended to serve as an educational tool for those working in the open source investigative field on how to prevent, identify and address vicarious trauma.
    Description
    The document focuses on open source investigations in the Middle East, but can be adapted to other geographic areas. Considering the graphic scenes that open source investigators face, the document includes practical advice on preventing, identifying and addressing secondary trauma. The document focus on upholding the investigator's well-being.
    Target group
    Open source researchers and investigators

This is free software. Created with LinkAhead and Django. Licenced under AGPL version 3.0 (Sources).