Working Paper an Overview of the Use of Digital Evidence in International Criminal Courts
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Chain of Custody
BY KEITH G. CHVAL Chain of Custody Recent incidents have shown how important it is for colleges and universities to preserve evidence — including digital evidence — that may be required in a legal investigation. ey Jon, I need the “ chain of custody.” H “The what?” Your general counsel has just stopped by your office and dropped that bombshell on you as you were drinking your morning cup of coffee. “Remember all those e-mails and other electronic files you gave us in connection with that internal investigation of Smith last summer? Well, the case is going to trial, and we need the chain of custody to prove that Smith really wrote all those things. Without the chain of custody, the judge won’t admit any of that information, and we’ll get killed at trial.” While chain of custody is a legal is challenging the authenticity of If “chain of custody” is a new or term of art — meaning it has a evidence — particularly where digital vague concept to you, you’re not alone. specific meaning in the law and can evidence is involved — I’ve found that AEL HENDERSON AEL In simplest terms, a proper chain have legal consequences — it has there are very few who adequately L of custody establishes the integrity significant practical implications for account for the chain of custody, let of a piece of evidence, showing that IT managers and other professionals. alone appreciate its importance,” it wasn’t tampered with or otherwise “Although it plays a critical function observes Scott Carlson, a partner in altered since it was first collected. -
19-Cr-00008-NR Document 2581 Filed 12/21/20 Page 1 of 3
Case 2:19-cr-00008-NR Document 2581 Filed 12/21/20 Page 1 of 3 IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF PENNSYLVANIA UNITED STATES OF AMERICA ) ) v. ) 2:19-cr-8-NR ) OMARI PATTON, ) ) ) Defendant. ) MEMORANDUM ORDER Omari Patton and 47 co-defendants are charged with engaging in a large-scale conspiracy to traffic a variety of Schedule I, II, and III controlled substances, including heroin, cocaine, fentanyl, and synthetic cannabinoids. Mr. Patton has requested leave to file a motion to suppress certain laboratory test results and other items that the Federal Bureau of Prisons seized, including card stock and other paper that was believed to have been soaked in controlled substances. ECF 1774; ECF 1810. After carefully considering the parties’ submissions, the Court will grant Mr. Patton leave to file his motion to suppress, but will deny the motion without prejudice to Mr. Patton reasserting his objections at or around the time of trial. Mr. Patton’s primary argument is that “the Government failed to properly preserve” the cards and paper seized and later lab tested because of “numerous and serious errors in the chain of custody.” ECF 1810, ¶¶ 4-6. Mr. Patton claims that “[p]hysical evidence must be authenticated before being admitted into evidence.” Id. at ¶ 7. He also claims that the substantial “break” in the chain of custody here makes this authentication impossible. Id. at ¶ 31. The government, however, correctly points out that “[a]uthentication objections, like other trial objections, are assessed according to the applicable Federal Rules of Evidence, including Rules 104(a) and 901(a),” and there is “no requirement that the proponent [of evidence] do so before the evidence is presented at trial[.]” ECF 1879, at ¶ 22. -
Chain of Custody Specimen Collection Instructions
DEPARTMENT OF PATHOLOGY AND LABORATORY MEDICINE CHAIN OF CUSTODY SPECIMEN COLLECTION INSTRUCTIONS Chain of custody specimens can be used as evidence in court as the specimen is collected in the presence of a witness, sealed to prevent tampering and all handling/possession of specimen is recorded on the form from collection to testing. Testing Available Drugs of Abuse Microbiology Drugs of Abuse Screen 5, CoC, Meconium, LAB7379 Chlamydia trachomatis and Neisseria gonorrhea PCR (CTNG PCR), Urine, LAB7166 Confirmed Drug Abuse Panel 9, CoC, Urine, LAB8020 Rapid Plasma Reagin w/ Reflex Titer (RPR), Blood, LAB7452 All Specimen Types 1. Place appropriate Chain of Custody test order in Epic 2. Microbiology samples can be ordered with or without Chain of Custody. Compete the following items in Epic when ordering testing for Chain of Custody: • Chain of Custody? Mark box “Yes” 3. Obtain Chain of Custody kit from the Laboratory: Anschutz Campus – 720-777-6711 North Campus – 720-478-5250 South Campus – 720-478-6711; 303-201-0155 (after-hours pager) Receive Chain of Custody Kit. Ensure all required items are included. Meconium Kit: Urine Kit: Blood Kit: • Chain of custody bag • Chain of custody bag • Chain of custody bag • Stool specimen container • Plastic cup • Red top vacutainer tube • Security label • 60-mL bottle • Security label • Chain of custody form • Security tape • Chain of custody form • Temperature slip • Chain of custody form 4. Complete Chain of Custody Form 5. Identify witness and obtain witness signature 6. Collect specimen: Meconium: Urine: Blood: • Place 1.0 to 5.0 • Collect specimen in provided cup or pediatric bag • Venipuncture or grams meconium in • Pour specimen into 60-mL transport bottle. -
Case: 4:11-Cv-00454-DCN Doc #: 40 Filed: 03/28/14 1 of 46. Pageid
Case: 4:11-cv-00454-DCN Doc #: 40 Filed: 03/28/14 1 of 46. PageID #: <pageID> UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF OHIO EASTERN DIVISION JOHN E. WOLFF, JR., ) CASE NO. 4:11-cv-0454 ) Petitioner, ) JUDGE NUGENT ) v. ) MAGISTRATE JUDGE VECCHIARELLI ) TERRY TIBBALS, ) ) REPORT AND RECOMMENDATION Respondent. ) This matter is before the magistrate judge pursuant to Local Rule 72.2(b)(2). Before the court is the petition of John E. Wolff, Jr., (“Petitioner”) for a writ of habeas corpus filed pursuant to 28 U.S.C. § 2254. Petitioner is in the custody of the Ohio Department of Rehabilitation and Correction pursuant to journal entry of sentence in the case of State of Ohio vs. Wolff, Case No. 06-CR-978 (Mahoning County Aug. 29, 2007). (Doc. No. 23-10.) For the reasons set forth below, it is recommended that the petition be dismissed with prejudice. I. Relevant Factual Background The state appellate court that reviewed Petitioner’s conviction and sentence recited the following facts: On September 14, 2006, Wolff was indicted on ten counts of rape, in violation of R.C. 2907.02(A)(1)(b)(B), special felony (Counts 1-10); three counts of rape, in violation of R.C. 2907.02(A)(2)(B), 1st degree felony (Counts 11-13); five counts of gross sexual imposition, in violation of R.C. 2907.05(A)(4)(B), 3rd degree felony (Counts 14-18); and two counts of gross sexual imposition, in violation of R.C. Case: 4:11-cv-00454-DCN Doc #: 40 Filed: 03/28/14 2 of 46. -
Evidence History, the New Trace Evidence, and Rumblings in the Future of Proof Robert P
University of North Carolina School of Law Carolina Law Scholarship Repository Faculty Publications Faculty Scholarship 2006 Evidence History, the New Trace Evidence, and Rumblings in the Future of Proof Robert P. Mosteller University of North Carolina School of Law, [email protected] Follow this and additional works at: http://scholarship.law.unc.edu/faculty_publications Part of the Law Commons Publication: Ohio State Journal of Criminal Law This Article is brought to you for free and open access by the Faculty Scholarship at Carolina Law Scholarship Repository. It has been accepted for inclusion in Faculty Publications by an authorized administrator of Carolina Law Scholarship Repository. For more information, please contact [email protected]. Evidence History, the New Trace Evidence, and Rumblings in the Future of Proof Robert P. Mosteller* I. INTRODUCTION This paper is in two parts. The first part is about developments in the rules of evidence and particularly about developments in the Federal Rules of Evidence, which have had a major impact on evidence rules in many states. This part turns out to be largely about the past because my sense is that the impact of changes in the formal rules of evidence, which were substantial, are largely historic. In one area, however, significant future changes in the formal rules seem possible: those that may be made as a result of the Supreme Court’s decision in Crawford v. Washington,1 which dramatically changed confrontation and may unleash hearsay reformulation. The second part deals with my sense that technological and scientific advances may have a dramatic impact in altering the way cases, particularly criminal cases, are proved and evaluated in the future. -
GUIDE to NEW YORK EVIDENCE ARTICLE 11 REAL and DEMONSTRATIVE EVIDENCE TABLE of CONTENTS 11.01 Real Evidence 11.03 Demonstrative
GUIDE TO NEW YORK EVIDENCE ARTICLE 11 REAL AND DEMONSTRATIVE EVIDENCE TABLE OF CONTENTS 11.01 Real Evidence 11.03 Demonstrative Evidence 11.05 Anatomically Correct Dolls 11.07 Childs Age 11.09 Demonstrations and Experiments 11.11 Personal Appearance & Capability 11.13 Photographs 11.15 Viewing of Premises 11.17 Exhibits to the Jury 11.01. Real Evidence (1) Definition. Real Evidence refers to any tangible object or sound recording of a conversation that is offered in evidence. (2) Admissibility. Real evidence is admissible upon a showing that it is relevant to an issue in the proceeding, is what it purports to be, and has not been tampered with. Proof that an object has not been tampered with and is what it purports to be depends on the nature of the object and, in particular, whether the object is patently identifiable, or fungible. (a) Patently identifiable evidence. When real evidence possesses unique or distinctive characteristics or markings and is not subject to material alteration that is not readily apparent, evidence identifying the object normally will constitute the requisite proof. (b) Fungible evidence. When real evidence is fungible, capable of being altered, contaminated, or replaced, or is a sound recording, in addition to testimony identifying the object, proof that the proffered evidence has not been tampered with is required and may be satisfied by: (i) a chain of custody (i.e. testimony of those persons who handled the object or recording from the time it was obtained or recorded to the time it is presented in court to identify the object or recording and attest to its unchanged condition); or (ii) proof of circumstances that provide reasonable assurances of the identity and unchanged condition of the object or recording. -
Sylvestre MUDACUMURA
Le Bureau du Procureur The Office of the Prosecutor FACTSHEET Situation in the Democratic Republic of the Congo Sylvestre MUDACUMURA 14 May 2012 1 / 5 PROFILE – Sylvestre MUDACUMURA génocidaires re-grouped within refugee camps in the DRC, organized themselves and launched attacks in Rwanda, with the goal of removing its then new Government by force. The FDLR was involved in the two Congo wars, from 1996 until 2003, that caused, directly or indirectly, an estimated 4 million 1 victims. This is the largest single number of conflict-related civilian deaths since the Name: MUDACUMURA, Sylvestre Second World War. Also know as: “Bernard Mupenzi”, Since 2002, the FDLR has been committing “Mpezi”, “Commandant Pharaon” or crimes against civilians. The Security Council has consistently characterized the “Pharaoh”, “Mudac”, “Mukanda” or FDLR as a threat to the peace and security of “Radja” the Great Lakes region, a cause of regional Sex: Male insecurity and instability and a threat to the Year of Birth: 1954 local civilian population. Location of Birth: Gatumba sector, Sylvestre MUDACUMURA is a member of Gisenyi prefecture, Rwanda the FDLR’s Steering Committee and head of Nationality: Rwandan the FDLR military wing. As Supreme Current Position: Supreme Commander Commander of the Army and President of its of the Army and President of the High High Command, MUDACUMURA is the Command of the Forces Démocratiques highest-ranking military commander in the pour la Libération du Rwanda – Forces FDLR. He is subject to UN and EU sanctions. Combattantes Abacunguzi (FDLR – FOCA) Relevant Background Information Mr. Sylvestre MUDACUMURA is the supreme commander of the FDLR. -
WHO Background Paper Obstacles to Women Accessing Forensic Medical Exams in Cases of Sexual Violence by A. Widney Brown, Advocac
WHO Background Paper Obstacles to Women Accessing Forensic Medical Exams in Cases of Sexual Violence By A. Widney Brown, Advocacy Director, Women’s Rights Division, Human Rights Watch Final Version Introduction The international community awoke to the realization that “women’s rights are human rights” when women’s rights activists from all over the world took center stage at the World Conference on Human Rights held in Vienna in 1993. They seized the initiative at the conference by focusing on violence against women and the failure of states to provide redress for the violence suffered. At a tribunal held at the NGO parallel conference, women from numerous countries stepped forward to describe their experiences as victims of sexual and gender based violence. They also described the failure of the state to condemn the violence, to protect women from further violence and to provide redress through the criminal justice system. The pervasiveness of violence against women is breathtaking in developing and developed countries alike.1 The litany of harms inflicted is long: female genital mutilation, forced marriages, trafficking into forced labor, domestic violence, so-called honor killings, acid burning, dowry deaths, and finally, in every culture, rape and other crimes of sexual violence. The U.N. Convention on the Elimination of all forms of Discrimination against Women adopted in 1979, called on States to “take in all fields appropriate measures, including legislation, to ensure the full development and advancement of women, for the purpose -
Proving the Integrity of Digital Evidence with Time Chet Hosmer, President & CEO Wetstone Technologies, Inc
International Journal of Digital Evidence Spring 2002 Volume 1, Issue 1 Proving the Integrity of Digital Evidence with Time Chet Hosmer, President & CEO WetStone Technologies, Inc. Background During the latter half of the 20th century, a dramatic move from paper to bits occurred. Our use of digital communication methods such as the world-wide-web and e-mail have dramatically increased the amount of information that is routinely stored in only a digital form. On October 1, 2000 the Electronic Signatures in National and Global Commerce Act was enacted, allowing transactions signed electronically to be enforceable in a court of law. (Longley) The dramatic move from paper to bits combined with the ability and necessity to bring digital data to court, however, creates a critical question. How do we prove the integrity of this new form of information known as “digital evidence”? Digital evidence originates from a multitude of sources including seized computer hard-drives and backup media, real-time e-mail messages, chat-room logs, ISP records, web-pages, digital network traffic, local and virtual databases, digital directories, wireless devices, memory cards, and digital cameras. The trust worthiness of this digital data is a critical question that digital forensic examiners must consider. Many vendors provide technology solutions to extract this digital data from these devices and networks. Once the extraction of the digital evidence has been accomplished, protecting the digital integrity becomes of paramount concern for investigators, prosecutors and those accused. The ease with which digital evidence can be altered, destroyed, or manufactured in a convincing way – by even novice computer users – is alarming. -
Accountability for Sexual and Gender-Based Crimes at the ICC: an Analysis of Prosecutor Bensouda’S Legacy
ACCOUNTABILITY FOR SEXUAL AND GENDER-BASED CRIMES AT THE ICC: AN ANALYSIS OF PROSECUTOR BENSOUDA’s LEGACY June 2021 / N° 772a Cover picture : ICC Prosecutor Fatou Bensouda and representatives of her Office at a hearing in an ICC Courtroom, 2 September 2015 © ICC-CPI Table of Contents Preface ...................................................................................................................................................4 I. Introduction ........................................................................................................................................5 II. Prosecutor Bensouda’s Strategy to Address Sexual and Gender-Based Crimes ...........................6 III. The SGBC Policy in Practice – Progress and Setbacks .................................................................8 3.1. Preliminary Examinations and Investigations .................................................................................... 8 a) Preliminary Examinations ................................................................................................................... 9 b) Investigations ......................................................................................................................................... 9 3.2. Charges for Sexual and Gender-Based Crimes .................................................................................. 9 3.3. Progress - Recent Achievements in Cases .......................................................................................... 11 3.4. Setbacks - Establishing -
Job Title – Department Senior Consultant Forensics and Technology
Job title here Job title – Department Senior Consultant Forensics and Technology Control Risks is a specialist risk consultancy that helps to create secure, compliant and resilient organisations in an age of ever-changing risk. Working across disciplines, technologies and geographies, everything we do is based on our belief that taking risks is essential to our clients’ success. We provide our clients with the insight to focus resources and ensure they are prepared to resolve the issues and crises that occur in any ambitious global organisation. We go beyond problem-solving and give our clients the insight and intelligence they need to realise opportunities and grow. From the boardroom to the remotest location, we have developed an unparalleled ability to bring order to chaos and reassurance to anxiety. Our people Working with our clients our people are given direct responsibility, career development and the opportunity to work collaboratively on fascinating projects in a rewarding and inclusive global environment. Location Shanghai Engagement Full-time Department Regional Technology (F&T) Manager Principal, Regional Technology To drive & manage the continued development of our digital forensic technology Job purpose capabilities in China Tasks Project Work and responsibilities Lead in the development and management of the team’s forensic technologies service offerings and capabilities. Play a supporting role in the management of complex fraud and corruption investigations, particularly those involving the use of forensic technologies. Consult and understand the requirements of clients in relation to computer forensics. Perform computer forensics activities including digital evidence preservation, analysis, data recovery, tape recovery, electronic mail extraction, and database examination. -
Manual on Best Practices for Authenticating Digital Evidence
BEST PRACTICES FOR AUTHENTICATING DIGITAL EVIDENCE HON. PAUL W. GRIMM United States District Judge for the District of Maryland former member of the Judicial Conference Advisory Committee on Civil Rules GREGORY P. JOSEPH, ESQ. Partner, Joseph Hage Aaronson, New York City former member of the Judicial Conference Advisory Committee on Evidence Rules DANIEL J. CAPRA Reed Professor of Law, Fordham Law School Reporter to the Judicial Conference Advisory Committee on Evidence Rules The publisher is not engaged in rendering legal or other professional advice, and this publication is not a substitute for the advice of an attorney. If you require legal or other expert advice, you should seek the services of a competent attorney or other professional. © 2016 LEG, Inc. d/b/a West Academic 444 Cedar Street, Suite 700 St. Paul, MN 55101 1-877-888-1330 Printed in the United States of America ISBN: 978-1-68328-471-0 [No claim of copyright is made for official U.S. government statutes, rules or regulations.] TABLE OF CONTENTS Best Practices for Authenticating Digital Evidence ..................... 1 I. Introduction ........................................................................................ 1 II. An Introduction to the Principles of Authentication for Electronic Evidence: The Relationship Between Rule 104(a) and 104(b) ........ 2 III. Relevant Factors for Authenticating Digital Evidence ................... 6 A. Emails ......................................................................................... 7 B. Text Messages .........................................................................