We use cookies to enhance your experience on our website. By continuing to use our website, you are agreeing to our use of cookies. You can change your cookie settings at any time.
Find out more
Jump to Content
Jump to Main Navigation
User Account
Personal Profile
See all online law products
More
About
Subscriber Services
Guided Tour
FAQs
Help
Contact Us
Search
Browse all
Content type
Case reports
International court decisions
Domestic court decisions
European court cases
Arbitral cases
Commentary and analysis
Book content
Encyclopedia entries
Notes
International instruments and materials
Treaties
Supporting instruments
Institutional rules
Resolutions
Declarations
Model laws
Subject
Air law and law of outer space
Diplomacy and consular relations
European Union
History of international law
Human rights
Immunities
Individuals and non-state actors
International co-operation
International criminal law
International economic law
International environmental law
International humanitarian law
International law and international relations
International organizations
International procedural law
International responsibility
Law of the sea
Law of treaties
Relationship between international and domestic law
Settlement of disputes
Sources, foundations and principles of international law
Statehood, jurisdiction of states, organs of states
Territory
Theory of international law
Use of force, war, peace and neutrality
Author
Geographic region
Geographic Regions
Africa
Americas
Asia
Europe
Oceania
Organization
Organizations/Institutions
American Organizations/Institutions
African Organizations/Institutions
Asian Organizations/Institutions
European Organizations/Institutions
International Organizations/Institutions
Middle Eastern Organizations/Institutions
Pacific Rim Organizations/Institutions
My Content
(0)
Recently viewed
(0)
Save Entry
My Searches
(0)
Recently viewed
(0)
Save Search
Print
Save
Cite
Email this content
Share Link
Copy this link, or click below to email it to a friend
Email this content
or copy the link directly:
https://opil.ouplaw.com/abstract/10.1093/law/9780198836063.001.0001/law-9780198836063-miscMatter-8
The link was not copied. Your current browser may not support copying via this button.
Link copied successfully
Copy link
Sign in
You could not be signed in, please check and try again.
Username
Please enter your Username
Password
Please enter your Password
Forgot password?
Don't have an account?
Sign in via your Institution
You could not be signed in, please check and try again.
Sign in with your library card
Please enter your library card number
View translated passages only
Oxford Law Citator
Contents
Expand All
Collapse All
Preliminary Material
Dedication
Foreword
Acknowledgements
Table of Contents
Table of Cases
International
European Court of Human Rights
Inter-American Court of Human Rights
International Criminal Court
International Criminal Tribunal for Former Yugoslavia
International Criminal Tribunal for Rwanda
National Courts
Canada
United States
Table of Legislation
Table of Statutes
Other Legislation
United States
Table of International Instruments
List of Contributors
Main Text
Part I
Introduction: The Emergence of Digital Witnesses
Preliminary Material
1 The Rise of Open Source Information
2 Definitions
2.1 Open Source Information
2.2 Online open source information
2.3 Open source investigation
2.4 Open source intelligence
2.5 Open source acquisition
2.6 Open source evidence
2.7 Authentication
2.8 Verification
3 A Guide to This Volume
1 Open Source Investigation for Human Rights Reporting: A Brief History
1 Introduction
2 Human Rights Investigations in the Digital Age: Four Key Developments
2.1 Satellite Imagery
2.2 Camera-enabled Phones
2.3 Digital Social Networks
2.4 Increase in Publicly Accessible Data
3 A Brief History of Human Rights-related Digital Open Source Research
3.1 Commercial Satellite Imagery
3.2 Cameras Everywhere
3.3 The Institutionalization of Using Open Source Digital Information in Human Rights Documentation
4 Case Studies
4.1 Rakhine State, Myanmar (2016 and 2017)
4.2 Torture in Cameroon (2017)
4.3 Libya (2017)
4.4 Democratic Republic of Congo (2018)
4.5 Niger Delta, Nigeria (2018)
5 Conclusion
2 Open Source Evidence and Human Rights Cases: A Modern Social History
1 Ethan Hampton, Kelly Matheson, Brad Samuels, and the Al-Mahdi Case
2 The Al-Werfalli Case
3 Civil Cases and Human Rights Courts
4 The Future of Open Source Evidence
5 Conclusion
3 Prosecuting Atrocity Crimes with Open Source Evidence: Lessons from the International Criminal Court
1 Introduction
2 Open Source Investigations in the Digital Age
3 Open Source Evidence at the ICC
3.1 The Changing Nature of ICC Evidence
3.2 The Evolution of ICC Case Law
3.2.1 The Initial Cases
3.2.2 The Turning Point
3.2.3 The New Digital Era
4 The Value of Open Sources in Atrocity Crime Cases
4.1 Understanding the Broader Context
4.2 Establishing the Court’s Jurisdiction
4.3 Proving Contextual and Specific Elements
4.4 Ascertaining the Accused’s Mental State
4.5 Linking the Perpetrator to the Crime
5 Challenges to Using Open Source Information as Evidence
5.1 Authenticating Open Source Material
5.2 Evaluating Online Sources
5.3 Verifying Digital Content
6 Conclusion
4 Open Source Investigations and the Technology-driven Knowledge Controversy in Human Rights Fact-finding
1 Established Human Rights Practices Disrupted by the Knowledge Controversy
2 New Actors in Human Rights Fact-finding and the Struggle for Interpretive Authority
3 The Knowledge Controversy around Open Source Investigations and Its Implications for Pluralism
4 Conclusion
5 Open Source Investigations for Human Rights: Current and Future Challenges
1 Introduction
2 Background
3 Challenges in the Process of Discovery
3.1 Context
3.2 Discovery and Search Criteria
3.2.1 Discovery by ‘Who’ or ‘What’
3.2.2 Discovery by ‘Where’
3.2.3 Discovery by ‘When’
3.3 The Tension of Discovery Breadth
3.4 Biases in Discovery
3.4.1 Implications of Inequity in Digital Connectivity
3.4.2 Semi-closed Networks and Social Messaging
4 The Impermanence of Material
4.1 Context
4.2 Risk to Evidence
4.3 Preservation Methods and Management
5 Verification
5.1 Context
5.2 Triangulation and Method Transparency
5.3 Misinformation and Adaptation
5.4 Precision and Uncertainty
6 The Future
6.1 Discovery
6.2 Preservation
6.3 Verification
Part II
6 How to Conduct Discovery Using Open Source Methods
1 Searching for Relevant Webpages
2 Treasure Hunting
3 Keywords Are Your Currency
4 Search Syntax
5 Specifying the Sites You Need in Your Search Results
6 Adding Flexibility with an OR
7 Advanced Searches
8 Extra Tools
9 Getting what You Searched for
9.1 Word Order
10 Time Travel Online
11 Visual Evidence Augments Text-based Evidence
12 Website and Webpage Archives
13 Search Engine Caches
14 People Research
15 Key Identifiers
16 Name
17 Date of Birth
18 Gender
19 Friends, Family, Co-workers and Other Associates
20 Connected Places
21 Career and Employment Details
22 Photographs
23 Hobbies, Interests, Political Views and Other Passions
24 Email Addresses
25 Usernames
26 Phone numbers
27 Searching Social Networks
28 Searching Twitter
29 Searching Instagram
30 Searching Facebook
31 Finding People in Facebook
32 Relationship Analysis
33 Investigating with Images
34 Reverse Image Searching
35 Searching for videos
36 Specialist Databases and Tools
37 Finding Domain Name Owners
38 Business and Government Databases
39 Conclusion
7 How to Preserve Open Source Information Effectively
1 The Risks to Open Source Information
2 What Is Digital Preservation?
3 The Basic Components of Digital Preservation
4 The Process of Digital Preservation: Ingest
4.1 Understanding Intended Users and Uses
4.2 Significant Properties
4.3 Ingest Policies
4.4 Ingest Procedures
5 The Process of Digital Preservation: Archival Storage
5.1 Storage Media Degradation
5.2 Back-up and Recovery
5.3 Storage Media Obsolescence
5.4 Storage Media Refreshment
5.5 Cloud Storage
5.6 Maintaining Authenticity
6 The Process of Digital Preservation: Data Management
6.1 Types of Metadata
6.2 Metadata Standards
6.3 Creating and Maintaining Data
6.4 Developing and Documenting Metadata Schema
7 The Process of Digital Preservation: Access
7.1 Access Copies
8 The Process of Digital Preservation: Preservation Planning
8.1 Monitoring Technology and the Designated Community
8.2 Making Progress over Time
9 Conclusion
8 Targeted Mass Archiving of Open Source Information: A Case Study
1 Targeted Mass Archiving
2 Approaches to Archiving
2.1 Investigative Archiving
2.2 Platform Archiving
2.3 Targeted Mass Archiving
3 Advantages and Disadvantages of the Targeted Mass Archiving Approach
3.1 Documentation Efforts
3.2 Legal Efforts
3.3 Drawbacks of Mass Archiving
4 Considerations for Implementing a Mass Archive
4.1 Documentation Tools and Strategies
4.2 Ingesting Content
4.3 Sources
4.4 Content Mediums
4.5 Automated Collection
5 Designing a Data Model
5.1 Unit
5.2 Original Context
5.3 Processing
5.4 Archival Context
6 Conclusion
9 How to Verify and Authenticate User-generated Content
1 Why Verify?
2 Misinformation v Disinformation
3 Verification Technique: Determining Provenance
3.1 Interpreting Video Upload Time
3.2 Image Manipulation
4 Recycled Content
5 Verification Technique: Geolocation
5.1 Reference Materials: Street-level Imagery
5.2 Reference Materials: Satellite Imagery
6 Verification Technique: Determining Time
6.1 Time Determination: Weather
6.2 Time Determination: Temporary Details
6.3 Time Determination: Shadows
7 Holistic Verification Regime
8 Index of Tools
Mapping Services
Reverse Search and Image Verification
10 The Role and Use of Satellite Imagery for Human Rights Investigations
1 History of Satellites
2 Satellite Imagery Applications
3 Importance in Human Rights Research
3.1 Spatial Resolution
3.2 Spectral Resolution
3.3 Temporal Resolution
4 Case Studies
5 New Advances in Remote Sensing
6 How to Access Satellite Imagery and Remote Sensing Tools
Part III
11 Ethics in Open Source Investigations
1 The Purpose of an Investigation
1.1 The Mission and the Methods
1.2 Investigation and Responsibility
2 The Human Infrastructure of an Investigation
2.1 The Hidden Labour of Investigations
2.2 If Everyone Can Contribute, Why Aren’t They?
2.3 Risk and Safety
2.4 Gamification of Investigations
3 The Built Infrastructure of an Investigation
3.1 Information Asymmetry
3.2 Tools for Investigations
3.3 (In)visible Social Media Data
4 Data Processes
4.1 Discovery
4.2 Verification
4.3 Preservation
4.4 Publication
5 Future Challenges
6 Conclusion
12 Digital Human Rights Investigations: Vicarious Trauma, PTSD, and Tactics for Resilience
1 Introduction
2 PTSD: Criteria, Symptoms, and Risk Factors
2.1 PTSD Criteria and Symptoms
2.2 PTSD Research on Human Rights Advocates
2.3 PTSD and Viewing Photos and Video
2.4 General PTSD Risk and Protective Factors
3 Digital and Open Source Investigations and the Risk of PTSD
4 Strategies for Preventing, Mitigating, and Responding to PTSD
4.1 Awareness and Monitoring
4.2 What to Do If You Think You Have Been Affected—General Suggestions
4.3 Repeat Exposure: The Potential Personal Perils of the Verification Process
4.4 The Distress of Surprise
4.4.1 Tips for Avoiding Cross-contamination
4.5 The Special Impact of Audio Tracks of Human Suffering
4.6 The Risks of Personal Associations with Content
4.7 Coping with a Distressing Sense of Impotence in the Face of Human Rights Atrocities
5 What Human Rights Organizations Can Do to Promote Well-being among Researchers
5.1 Technology and Building Trauma-conscious Workflows
6 Conclusion
13 Open Source Investigations: Understanding Digital Threats, Risks, and Harms
1 Introduction
1.1 Overview
1.2 (Re)Introducing Dual Use
2 Surveillance, Monitoring, and Intrusion
2.1 Digital Volunteer Networks as Intelligence Assets
2.2 Means and Methods
2.2.1 Intrusion-based Surveillance
2.2.2 Non Intrusion-based Surveillance
2.3 Implications
3 Weaponization of Information
3.1 Digital Volunteer Networks as Political Targets
3.2 Means and Methods
3.2.1 Disinformation Campaigns
3.2.2 Online Harassment, Social Cyber-attacks, and Incendiary Rhetoric
3.3 Implications
4 Unintended Harm
4.1 Digital Volunteer Networks as Threat Vectors
4.2 Means and Methods
4.2.1 Inadvertent Disclosure
4.2.2 Privacy Violations and the ‘Consent Paradox’
4.2.3 Harmful Effects of Data Experimentation
4.3 Implications
5 Conclusion
5.1 Common Vulnerabilities
5.1.1 Leveraging Students and Volunteers for This Work Poses Unique Challenges
5.1.2 Unsafe Data Practices
5.1.2.1 Limited Awareness and Skills for Safe and Secure Data Practices
5.1.2.2 Variation in Workflows
5.1.2.3 Reliance on Personal and Shared Devices and Accounts
5.1.3 Forced Reliance on Third Party Platforms
5.1.4 Tensions between Visibility and Anonymity
5.2 Closing Remarks
Part IV
14 Open Source InformationPart of the Puzzle
1 The Investigator’s Toolbox
1.1 On-the-ground Investigations
1.2 Remote Sensing
1.3 Data Analysis
1.4 Open Source Information
1.4.1 Opportunities Offered by Open Source Information
1.4.2 Varied Sources of Information
1.4.3 Communicating with Victims and Witnesses: Voice, Access, and Retraumatization
1.4.4 Safety and Access
1.4.5 Collaborative Methods
1.4.6 Presenting the Case
2 Potential Challenges with Open Source Information
2.1 Maintaining Perspective on the Value of Open Source Information
2.2 The Future of Fakes
2.3 Security Risks
3 Conclusion
15 Open Source Investigations for Legal Accountability: Challenges and Best Practices
2 Big Picture Considerations
2.1 Underlying Principles of Using Open Sources in Legal Investigations
2.1.1 Security
2.1.2 Impartiality
2.1.3 Independence
2.1.4 Accountability
2.1.5 Legality
2.1.6 Preservation of Evidence
2.1.7 Equality
2.1.8 Ethics
2.2 Investigative Processes
2.2.1 Preparation
2.2.2 Discovery
2.2.3 Acquisition and Preservation
2.2.4 Analysis
2.2.5 Presentation
3 The Future—What Comes Next
4 Conclusion
Further Material
Select Bibliography
Index
Sign up for alerts
Table of Cases
Sam Dubberley, Alexa Koenig, Daragh Murray
From:
Digital Witness: Using Open Source Information for Human Rights Investigation, Documentation, and Accountability
Edited By: Sam Dubberley, Alexa Koenig, Daragh Murray
Content type:
Book content
Product:
Oxford Scholarly Authorities on International Law [OSAIL]
Published in print:
19 December 2019
ISBN:
9780198836063
Prev
|
Next
[18.206.48.243]
18.206.48.243