Users without a subscription are not able to see the full
content. Please,
subscribe
or
login
to access all content.
Contents
- Preliminary Material
- Main Text
- Part I
- Introduction: The Emergence of Digital Witnesses
- 1 Open Source Investigation for Human Rights Reporting: A Brief History
- 2 Open Source Evidence and Human Rights Cases: A Modern Social History
- 3 Prosecuting Atrocity Crimes with Open Source Evidence: Lessons from the International Criminal Court
- 4 Open Source Investigations and the Technology-driven Knowledge Controversy in Human Rights Fact-finding
- 5 Open Source Investigations for Human Rights: Current and Future Challenges
- Part II
- 6 How to Conduct Discovery Using Open Source Methods
- 1 Searching for Relevant Webpages
- 2 Treasure Hunting
- 3 Keywords Are Your Currency
- 4 Search Syntax
- 5 Specifying the Sites You Need in Your Search Results
- 6 Adding Flexibility with an OR
- 7 Advanced Searches
- 8 Extra Tools
- 9 Getting what You Searched for
- 10 Time Travel Online
- 11 Visual Evidence Augments Text-based Evidence
- 12 Website and Webpage Archives
- 13 Search Engine Caches
- 14 People Research
- 15 Key Identifiers
- 16 Name
- 17 Date of Birth
- 18 Gender
- 19 Friends, Family, Co-workers and Other Associates
- 20 Connected Places
- 21 Career and Employment Details
- 22 Photographs
- 23 Hobbies, Interests, Political Views and Other Passions
- 24 Email Addresses
- 25 Usernames
- 26 Phone numbers
- 27 Searching Social Networks
- 28 Searching Twitter
- 29 Searching Instagram
- 30 Searching Facebook
- 31 Finding People in Facebook
- 32 Relationship Analysis
- 33 Investigating with Images
- 34 Reverse Image Searching
- 35 Searching for videos
- 36 Specialist Databases and Tools
- 37 Finding Domain Name Owners
- 38 Business and Government Databases
- 39 Conclusion
- 7 How to Preserve Open Source Information Effectively
- 1 The Risks to Open Source Information
- 2 What Is Digital Preservation?
- 3 The Basic Components of Digital Preservation
- 4 The Process of Digital Preservation: Ingest
- 5 The Process of Digital Preservation: Archival Storage
- 6 The Process of Digital Preservation: Data Management
- 7 The Process of Digital Preservation: Access
- 8 The Process of Digital Preservation: Preservation Planning
- 9 Conclusion
- 8 Targeted Mass Archiving of Open Source Information: A Case Study
- 9 How to Verify and Authenticate User-generated Content
- 10 The Role and Use of Satellite Imagery for Human Rights Investigations
- 6 How to Conduct Discovery Using Open Source Methods
- Part III
- 11 Ethics in Open Source Investigations
- 12 Digital Human Rights Investigations: Vicarious Trauma, PTSD, and Tactics for Resilience
- 1 Introduction
- 2 PTSD: Criteria, Symptoms, and Risk Factors
- 3 Digital and Open Source Investigations and the Risk of PTSD
- 4 Strategies for Preventing, Mitigating, and Responding to PTSD
- 4.1 Awareness and Monitoring
- 4.2 What to Do If You Think You Have Been Affected—General Suggestions
- 4.3 Repeat Exposure: The Potential Personal Perils of the Verification Process
- 4.4 The Distress of Surprise
- 4.5 The Special Impact of Audio Tracks of Human Suffering
- 4.6 The Risks of Personal Associations with Content
- 4.7 Coping with a Distressing Sense of Impotence in the Face of Human Rights Atrocities
- 5 What Human Rights Organizations Can Do to Promote Well-being among Researchers
- 6 Conclusion
- 13 Open Source Investigations: Understanding Digital Threats, Risks, and Harms
- 1 Introduction
- 2 Surveillance, Monitoring, and Intrusion
- 3 Weaponization of Information
- 4 Unintended Harm
- 5 Conclusion
- Part IV
- 14 Open Source InformationPart of the Puzzle
- 15 Open Source Investigations for Legal Accountability: Challenges and Best Practices
- Part I
- Further Material