scholarly journals Collecting Digital Evidence from Online Sources: Deficiencies in Current Polish Criminal Law

Author(s):  
Piotr Lewulis

AbstractThe importance of digital evidence, especially online content, is continuously increasing due to the proliferation of digital technologies in socio-economic life. However, the legal means of criminal evidence gathering in Polish legislation remain unchanged and do not take into account some contemporary challenges. In various countries, traditional rules of evidence gathering were created in the context of a physical world. These rules may be insufficient to safeguard the forensic soundness of evidence gathering methods. Inadequacies of current procedures may be especially visible in the context of transborder digital evidence gathering from online open sources. This article describes the practical shortcomings of Polish criminal evidence law in the context of digital evidence with particular attention to online open-source materials. Empirical data indicate that existing legal limitations are bypassed in practice to enable evidence collection. This unfortunately often happens at the expense of the forensic soundness of digital evidence.

Author(s):  
Vani Thangapandian

In this digital era, the usage of mobile phones in daily life has become inextricable due to the facilities and the level of sophistication it offers. Proportionately, the crimes and offenses involving the mobile devices are growing in rapid speed. Whenever a crime occurs in a spot, the forensic team will arrive there to identify and locate the evidence of the criminals. If the crime involves digital equipment like computers and laptop, then digital forensic team will investigate and analyze the devices for digital evidence collection. These days, mobile phones have the capability to offer any kind of information and services digitally on top of the palm of the user. Anything is available on the hands with a single touch on the screen of the mobile devices. It also offers to the adversaries many digital services which are harmful to the societies. The fast-paced advancement in the digital front paves the way for many digital crimes. Hence, a new field, mobile forensics, emerges out to trace the evidence, but it faces many challenges due to the dynamic nature of the digital technologies.


2020 ◽  
Vol 4 (2) ◽  
pp. 261-272
Author(s):  
Liladhar Pendse

The Portuguese Inquisition in the colonies of the Empire remains understudied due to a lack of primary source materials that are available the researchers and educators. The advances in digital technologies and the current drive to foster Open Access have allowed us to understand better the relations among the complex set of circumstances as well as the mechanisms that, in their totality, represent the Portuguese Inquisition. The present paper seeks to answer questions that vary from describing these resources to identifying the institutions that created them. Digitized resources serve as a surrogate of the originals, and we can leverage the access to these electronic surrogates and enhance our understanding of the mechanisms of inquisition through E-Inquisitional objects in pedagogy and research.


2020 ◽  
Vol 14 (2) ◽  
pp. 44-66
Author(s):  
José Ramón Lizárraga ◽  
Arturo Cortez

Researchers and practitioners have much to learn from drag queens, specifically Latinx queens, as they leverage everyday queerness and brownness in ways that contribute to pedagogy locally and globally, individually and collectively. Drawing on previous work examining the digital queer gestures of drag queen educators (Lizárraga & Cortez, 2019), this essay explores how non-dominant people that exist and fluctuate in the in-between of boundaries of gender, race, sexuality, the physical, and the virtual provide pedagogical overtures for imagining and organizing for new possible futures that are equitable and just. Further animated by Donna Haraway’s (2006) influential feminist post-humanist work, we interrogate how Latinx drag queens as cyborgs use digital technologies to enhance their craft and engage in powerful pedagogical moves. This essay draws from robust analyses of the digital presence of and interviews with two Latinx drag queens in the San Francisco Bay Area, as well as the online presence of a Xicanx doggie drag queen named RuPawl. Our participants actively drew on their liminality to provoke and mobilize communities around socio-political issues. In this regard, we see them engaging in transformative public cyborg jotería pedagogies that are made visible and historicized in the digital and physical world.


Author(s):  
Darryl K. Brown

Criminal disclosure rules in all common law jurisdictions are organized around the same sets of conflicting aims. Pre-trial evidence disclosure is essential to fair and accurate adjudication. Yet certain types of information, such as identities of undercover operatives and ongoing law enforcement surveillance, must be kept confidential. Beyond these tensions, disclosure practices face new challenges arising primarily from evolving technology and investigative tactics. This chapter describes divergent approaches across common law jurisdictions—especially among U.S. states—to these challenges and offers explanations for their differences. It also sketches the technology-based challenges that discovery schemes face and offers options, or tentative predictions about their resolution. Differences often turn on who decides whether to withhold information from the defense—judges or prosecutors—and when certain information must be disclosed. Broader disclosure regimes tend to put greater trust in judicial capacity to dictate or at least review hard questions about the costs, benefits, and timing of disclosure; narrower systems leave more power in prosecutors’ hands. Technology has multiplied challenges for disclosure policy by vastly increasing evidence-gathering tactics and thus the nature and volume of information. Disclosure rules adapted fairly easily to the rise much forensic lab analysis. But fast-growing forms of digital evidence is more problematic. Defendants may lack the time to examine volumes of video and technical resources to analyze other data; sometimes prosecutors do as well. The chapter identifies some possible solutions emerging through technology and law reform, as well as trend toward greater judicial management of pre-trial disclosure.


Author(s):  
Aubrey Bloomfield ◽  
Sean Jacobs

The Internet and social media increasingly are becoming sources about the African past and present in ways that will influence to some extent how history will be learnt and the form that methods of historical research will take. Social media have increasingly dislodged print journalism as “the first rough draft of history” and tended to democratize and hasten information sharing and communication. Historians are working through difficult debates about the Internet as a source archive, the usability of websites, and related matters. The debate over online resources and their use in historical and other studies on one level remains unresolved. Nevertheless, online sources add another rich layer to narratives, stories, and perspectives that are already being recorded or told, and in this regard they will add to the storehouse of empirical data to be crunched by future historians.


Electronics ◽  
2020 ◽  
Vol 9 (11) ◽  
pp. 1865
Author(s):  
Andrés Marín-López ◽  
Sergio Chica-Manjarrez ◽  
David Arroyo ◽  
Florina Almenares-Mendoza ◽  
Daniel Díaz-Sánchez

With the transformation in smart grids, power grid companies are becoming increasingly dependent on data networks. Data networks are used to transport information and commands for optimizing power grid operations: Planning, generation, transportation, and distribution. Performing periodic security audits is one of the required tasks for securing networks, and we proposed in a previous work autoauditor, a system to achieve automatic auditing. It was designed according to the specific requirements of power grid companies, such as scaling with the huge number of heterogeneous equipment in power grid companies. Though pentesting and security audits are required for continuous monitoring, collaboration is of utmost importance to fight cyber threats. In this paper we work on the accountability of audit results and explore how the list of audit result records can be included in a blockchain, since blockchains are by design resistant to data modification. Moreover, blockchains endowed with smart contracts functionality boost the automation of both digital evidence gathering, audit, and controlled information exchange. To our knowledge, no such system exists. We perform throughput evaluation to assess the feasibility of the system and show that the system is viable for adaptation to the inventory systems of electrical companies.


Sign in / Sign up

Export Citation Format

Share Document