Skip to main content

2016 | OriginalPaper | Buchkapitel

18. Following the Breadcrumbs: Using Open Source Intelligence as Evidence in Criminal Proceedings

verfasst von : Fraser Sampson

Erschienen in: Open Source Intelligence Investigation

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Intelligence and evidence are fundamentally different and while evidence can always provide some degree of intelligence the reverse is not the case. If intelligence is to be relied on evidentially it will need to meet the same forensic standards and clear the same legal hurdles as any other form of evidence. Therefore LEAs need to be aware of these standards and hurdles at the outset and to ensure—so far as practicable—that they are in a position to address them. This chapter addresses some of the legal issues that arise if OSINT material is to be used in legal proceedings, particularly within countries that are signatories to the European Convention on Human Rights (ECHR).

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
4
See for example ss. 17–19 of the Regulation of Investigatory Powers Act 2000.
 
5
see e.g. R v Blastland (1986) AC 41.
 
6
see “Opinion on the status of illegally obtained evidence in criminal procedures in the Member States of the European Union’ 30 Nov 2003—Reference: CFR-CDF. opinion 3-2003.
 
7
Funke v. France, 44/1997/828/1034; see also O'Halloran and Francis v. the United Kingdom (2007) ECHR 545; Saunders v. the United Kingdom (1997) 23 EHRR 313.
 
8
Note that there is a ‘civil limb’ to the ECHR – see Art 6(1) and Guide to Article 6 and the Right to a Fair Trial’ Council of Europe www.​echr.​coe.​int (Case-law – Case-law analysis – Case-law guides). Accessed 12 April 2016.
 
9
Schenk v. Switzerland (1988) ECHR 17; Heglas v. the Czech Republic (2007) ECHR 5564.
 
10
Rowe and Davis v. the United Kingdom (2000) ECHR 91.
 
11
such as the Criminal Procedure and Investigations Act 1996 in England and Wales.
 
12
see Law Society Gazette 11 April 2016, pp 13—15 London.
 
13
For the general approach of the court in England and Wales see Noor-Mohamed v R [1949] ac 182.
 
14
s.114 (1) Criminal Justice Act 2003.
 
15
The Criminal Justice Act 2003.
 
16
e.g., SMS messages—R v Leonard (2009) EWCA Crim 1251) but cf R v Twist [2011] EWCA Crim 1143.
 
17
Huseyn and Others v. Azerbaijan (application nos. 35485/05, 45553/05, 35680/05 and 36085/05); OAO Neftyanaya Kompaniya Yukos v. Russia (2014) ECHR 906.
 
18
Mayzit v. Russia application no. 42502/06; Moiseyev v. Russia (2011) 53 EHRR 9.
 
19
Rasmussen v. Poland (application no. 38886/05).
 
20
Questions are whether these entitlements will ever extend to being able to access relevant materials via the Internet, where the hard or downloaded copies are incomplete or insufficiently verifiable by the defendant?
 
21
Bucknor v R (2010) EWCA Crim 1152.
 
23
see s. 33 Criminal Justice and Courts Act 2015.
 
24
Attorney General v. Davey [2013] EWHC 2317 (Admin).
 
25
loc cit at 6.
 
26
T v R (2012) EWCA Crim 2358.
 
27
Khudobin v. Russia (application no. 59696/00); Texieira v Portugal (application 44/1997/828/1034).
 
28
See s. 1(1) of the Computer Misuse Act 1990 in England and Wales; DPP v. Bignell (1998) 1 Cr App R 1 and R v. Bow Street Metropolitan Stipendiary Magistrate ex parte United States (No.2) (2000) 2 AC 216).
 
29
El Haski v. Belgium (Application no. 649/08) Gäfgen v. Germany (2010) ECHR 759.
 
Literatur
Zurück zum Zitat Akhgar B, Saathoff G, Arabnia H, Hill R, Staniforth A, Bayerl PS (2013) Application of big data for national security: a practitioner’s guide to emerging technologies. Elsevier, Waltham MA USA Akhgar B, Saathoff G, Arabnia H, Hill R, Staniforth A, Bayerl PS (2013) Application of big data for national security: a practitioner’s guide to emerging technologies. Elsevier, Waltham MA USA
Zurück zum Zitat Armstrong T, Zuckerberg M, Page L, Rottenberg E, Smith B, Costelo, D (2013) An Open Letter to Washington, 9 December Armstrong T, Zuckerberg M, Page L, Rottenberg E, Smith B, Costelo, D (2013) An Open Letter to Washington, 9 December
Zurück zum Zitat Beguerisse-Díaz M, Garduno-Hernandez G, Vangelov B, Yaliraki S, Barahona M. (2014) Interest communities and flow roles in directed networks: the Twitter network of the UK riots, Cornell University Library http://arxiv.org/abs/1311.6785 Beguerisse-Díaz M, Garduno-Hernandez G, Vangelov B, Yaliraki S, Barahona M. (2014) Interest communities and flow roles in directed networks: the Twitter network of the UK riots, Cornell University Library http://​arxiv.​org/​abs/​1311.​6785
Zurück zum Zitat Blackman J (2008) Omniveillance, Google, Privacy in Public, and the Right to Your Digital Identity: a Tort for Recording and Disseminating an Individual’s Image over the Internet, 49 Santa Clara L. Rev. 313 Blackman J (2008) Omniveillance, Google, Privacy in Public, and the Right to Your Digital Identity: a Tort for Recording and Disseminating an Individual’s Image over the Internet, 49 Santa Clara L. Rev. 313
Zurück zum Zitat Bruns A, Burgess J (2012) #qldfloods and @QPSMedia: Crisis Communication on Twitter in the 2011 South-East Queensland Floods. Queensland University of Technology, ARC Centre of Excellence for Creative Industries and Innovation, Brisbane, Australia Bruns A, Burgess J (2012) #qldfloods and @QPSMedia: Crisis Communication on Twitter in the 2011 South-East Queensland Floods. Queensland University of Technology, ARC Centre of Excellence for Creative Industries and Innovation, Brisbane, Australia
Zurück zum Zitat Casilli A, Tubaro P (2012) Social media censorship in times of political unrest—a social simulation experiment with the UK riots. Bulletin de Methodologie Sociologique 115:5–20CrossRef Casilli A, Tubaro P (2012) Social media censorship in times of political unrest—a social simulation experiment with the UK riots. Bulletin de Methodologie Sociologique 115:5–20CrossRef
Zurück zum Zitat Copitch G, Fox C (2010) Using social media as a means of improving public confidence. Safer Communities 9(2):42–48CrossRef Copitch G, Fox C (2010) Using social media as a means of improving public confidence. Safer Communities 9(2):42–48CrossRef
Zurück zum Zitat Crowe A (2011) The social media manifesto: a comprehensive review of the impact of social media on emergency management. J Bus Continuity Emerg Planning 5(1):409–420 Crowe A (2011) The social media manifesto: a comprehensive review of the impact of social media on emergency management. J Bus Continuity Emerg Planning 5(1):409–420
Zurück zum Zitat Crump J (2011) What are the police doing on Twitter? Social media, the police and the public. Policy Internet 3(4):1–27CrossRef Crump J (2011) What are the police doing on Twitter? Social media, the police and the public. Policy Internet 3(4):1–27CrossRef
Zurück zum Zitat Denef S, Kaptein N, Bayerl PS, Ramirez L (2012) Best practice in police social media adaptation. Composite project Denef S, Kaptein N, Bayerl PS, Ramirez L (2012) Best practice in police social media adaptation. Composite project
Zurück zum Zitat Earl J, Hurwitz H, Mesinas A, Tolan M, Arlotti A (2013) This protest will be Tweeted. Inform Commun Soc 16(4):459–478CrossRef Earl J, Hurwitz H, Mesinas A, Tolan M, Arlotti A (2013) This protest will be Tweeted. Inform Commun Soc 16(4):459–478CrossRef
Zurück zum Zitat Kaplan A, Haenlein M (2010) Users of the world, unite! the challenges and opportunities of social media. Bus Horiz 53(1):59–68CrossRef Kaplan A, Haenlein M (2010) Users of the world, unite! the challenges and opportunities of social media. Bus Horiz 53(1):59–68CrossRef
Zurück zum Zitat Kavanaugh AL, Yang S, Li L, Sheetz S, Fox E (2011) Microblogging in crisis situations: Mass protests in Iran, Tunisia, Egypt. CHI2011, Vancouver, Canada, May 7–12 2011 Kavanaugh AL, Yang S, Li L, Sheetz S, Fox E (2011) Microblogging in crisis situations: Mass protests in Iran, Tunisia, Egypt. CHI2011, Vancouver, Canada, May 7–12 2011
Zurück zum Zitat Kokott J, Sobotta C (2013) The Distinction between Privacy and Data Protection in the Jurisprudence of the CJEU and the ECtHR. Int Data Privacy Law 3(4):222–228CrossRef Kokott J, Sobotta C (2013) The Distinction between Privacy and Data Protection in the Jurisprudence of the CJEU and the ECtHR. Int Data Privacy Law 3(4):222–228CrossRef
Zurück zum Zitat Kotronaki L, Seferiades S (2012) Along the pathways of rage: the space-time of an uprising. In: Seferiades S, Johnston H (eds) Violent protest, contentious politics, and the neoliberal state. Ashgate, Surrey, pp 159–170 Kotronaki L, Seferiades S (2012) Along the pathways of rage: the space-time of an uprising. In: Seferiades S, Johnston H (eds) Violent protest, contentious politics, and the neoliberal state. Ashgate, Surrey, pp 159–170
Zurück zum Zitat Lanier J (2013) Who Owns the Future?. Simon and Schuster NY USA Lanier J (2013) Who Owns the Future?. Simon and Schuster NY USA
Zurück zum Zitat Lin D (1998) Extracting Collocations from Text Corpora. First workshop on computational terminology. Montreal, Canada, pp 57–63 Lin D (1998) Extracting Collocations from Text Corpora. First workshop on computational terminology. Montreal, Canada, pp 57–63
Zurück zum Zitat McSeveny K, Waddington D (2011) Up close and personal: the interplay between information technology and human agency in the policing of the 2011 Sheffield Anti-Lib Dem Protest. In: Akhgar B, Yates S (eds) Intelligence management: knowledge driven frameworks for combating terrorism and organized crime. Springer, New York, pp 199–212CrossRef McSeveny K, Waddington D (2011) Up close and personal: the interplay between information technology and human agency in the policing of the 2011 Sheffield Anti-Lib Dem Protest. In: Akhgar B, Yates S (eds) Intelligence management: knowledge driven frameworks for combating terrorism and organized crime. Springer, New York, pp 199–212CrossRef
Zurück zum Zitat NPIA (2010) Engage: digital and social media for the police service. National Policing Improvement Agency, London NPIA (2010) Engage: digital and social media for the police service. National Policing Improvement Agency, London
Zurück zum Zitat Poell T, Borra E (2011) Twitter, YouTube, and Flickr as Platforms of Alternative Journalism: The Social Media Account of the 2010 Toronto G20 protests. Journalism 13(6):695–713CrossRef Poell T, Borra E (2011) Twitter, YouTube, and Flickr as Platforms of Alternative Journalism: The Social Media Account of the 2010 Toronto G20 protests. Journalism 13(6):695–713CrossRef
Zurück zum Zitat Procter R, Crump J, Karstedt S, Voss A, Cantijoch M (2013) Reading the riots: what were the police doing on Twitter? Policing Soc: An Int J Res Policy 23(4):413–436CrossRef Procter R, Crump J, Karstedt S, Voss A, Cantijoch M (2013) Reading the riots: what were the police doing on Twitter? Policing Soc: An Int J Res Policy 23(4):413–436CrossRef
Zurück zum Zitat Russell A (2007) Digital communication networks and the journalistic field: the 2005 French Riots. Critical Stud Media Commu 24(4):285–302CrossRef Russell A (2007) Digital communication networks and the journalistic field: the 2005 French Riots. Critical Stud Media Commu 24(4):285–302CrossRef
Zurück zum Zitat Sampson F (2015) Cybercrime presentation Project Courage and CAMINO Cyber Security Workshop, Montpellier, France 9 April Sampson F (2015) Cybercrime presentation Project Courage and CAMINO Cyber Security Workshop, Montpellier, France 9 April
Zurück zum Zitat Searls D (2012) The intention economy: when customers take charge. Harvard University Press Cambridge, USA Searls D (2012) The intention economy: when customers take charge. Harvard University Press Cambridge, USA
Zurück zum Zitat Seretan V, Nerima L, Wehrli E (2003) Extraction of multi-word collocations using syntactic bigram composition. Proceedings of International Conference on recent advances in NLP Issue: Harris 51. Publisher, Citeseer, pp 424–431 Seretan V, Nerima L, Wehrli E (2003) Extraction of multi-word collocations using syntactic bigram composition. Proceedings of International Conference on recent advances in NLP Issue: Harris 51. Publisher, Citeseer, pp 424–431
Zurück zum Zitat Smadja F (1993) Retrieving collocations from text: xtract. Computational Linguistics 19(1):143–177 Smadja F (1993) Retrieving collocations from text: xtract. Computational Linguistics 19(1):143–177
Zurück zum Zitat Vieweg S, Palen L, Liu S, Hughes A, Sutton J (2008) Collective intelligence in disaster: an examination of the phenomenon in the aftermath of the 2007 virginia tech shootings. In: Proceedings of the information systems for crisis response and management conference (ISCRAM 2008) Vieweg S, Palen L, Liu S, Hughes A, Sutton J (2008) Collective intelligence in disaster: an examination of the phenomenon in the aftermath of the 2007 virginia tech shootings. In: Proceedings of the information systems for crisis response and management conference (ISCRAM 2008)
Zurück zum Zitat Xiguang L, Jing W (2010) Web-based public diplomacy: the role of social media in the Iranian and Xinjiang Riots. J Int Commu 16(1):7–22CrossRef Xiguang L, Jing W (2010) Web-based public diplomacy: the role of social media in the Iranian and Xinjiang Riots. J Int Commu 16(1):7–22CrossRef
Metadaten
Titel
Following the Breadcrumbs: Using Open Source Intelligence as Evidence in Criminal Proceedings
verfasst von
Fraser Sampson
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-47671-1_18