{"id":4522,"date":"2023-02-13T04:47:03","date_gmt":"2023-02-13T03:47:03","guid":{"rendered":"https:\/\/michaelgkarnavas.net\/blog\/?p=4522"},"modified":"2024-04-26T17:10:25","modified_gmt":"2024-04-26T15:10:25","slug":"defending-in-the-age-of-open-source","status":"publish","type":"post","link":"https:\/\/michaelgkarnavas.net\/blog\/2023\/02\/13\/defending-in-the-age-of-open-source\/","title":{"rendered":"Defending in the age of open source digital user-generated evidence"},"content":{"rendered":"<p style=\"text-align: justify;\"><div id=\"google_language_translator\" class=\"default-language-en\"><\/div><\/p>\n<p><em>By <a href=\"https:\/\/michaelgkarnavas.net\/\" target=\"_blank\" rel=\"noopener\">Michael G. Karnavas<\/a> and <a href=\"https:\/\/www.linkedin.com\/in\/noah-al-malt\/\" target=\"_blank\" rel=\"noopener\">Noah Al-Malt<\/a><\/em><\/p>\n<p style=\"text-align: justify;\">Recently we had the opportunity to attend a panel discussion at the Leiden University Grotius Center for International Legal Studies on <a href=\"https:\/\/www.universiteitleiden.nl\/en\/events\/2022\/12\/filling-an-accountability-gap-how-a-standing-un-investigative-mechanism-would-further-international-criminal-justice\" target=\"_blank\" rel=\"noopener\"><em>Filling an Accountability Gap? How a Standing UN Investigative Mechanism Would Further International Justice<\/em><\/a>. Bluntly, it seemed more like a promotional event for the International Commission of Jurists\u2019 (\u201cICJ\u201d) concept of establishing a Standing Independent Mechanism (\u201cSIIM\u201d) as set out in its September 2022 report: \u201c<a href=\"https:\/\/icj2.wpenginepowered.com\/wp-content\/uploads\/2022\/09\/Options-for-the-establishment-of-a-Standing-Independent-Investigative-Mechanism-SIIM-26-September-2022-1.pdf\" target=\"_blank\" rel=\"noopener\"><em>Options for the establishment of a Standing Independent Investigative Mechanism (SIIM)<\/em><\/a><em>.<\/em>\u201d<\/p>\n<p style=\"text-align: justify;\">The panelists (but for one appearing remotely) were all in The Hague for the International Criminal Court (\u201cICC\u201d) Assembly of State Parties, which, with all the side events, has turned into an annual convention for networking and promotion \u2013 a regular law-fest. Kudos to the Grotius Center for taking advantage of the presence of the panelists and organizing the discussion on the benefits, needs, and presumptions associated with establishing a SIIM. Noteworthy, the proponents for a SIIM did not argue that the either the <a href=\"https:\/\/iiim.un.org\/\" target=\"_blank\" rel=\"noopener\">International, Impartial and Independent Mechanism for Syria<\/a> (\u201cIIIM\u201d) or <a href=\"https:\/\/iimm.un.org\/\" target=\"_blank\" rel=\"noopener\">Independent Investigative Mechanism for Myanmar<\/a> (\u201cIIMM\u201d) \u2013 both of whom heavily rely on digital evidence of all sorts \u2013 were underperforming because of the lack of a SIIM.<\/p>\n<p style=\"text-align: justify;\">Maybe there is merit in establishing a SIIM to support the work of other accountability mandates (we think not, for a host of reasons). But isn\u2019t the real elephant in the room how to ensure quality control of open source digital user-generated evidence, from collection to preservation to admission to assessment to reliance. As practitioners, we think so.<!--more--><\/p>\n<p style=\"text-align: justify;\">Gathering evidence from the net is the easy part (thanks to Google, YouTube, Facebook, Instagram, Twitter, and other search engines and social media outlets). The conundrum is in figuring out what is real and what is fake, what is accurate and what is misleading, what is legitimate information and what is misinformation (or even disinformation).<\/p>\n<p style=\"text-align: justify;\">A trial, stripped to its essence, can be reduced to two basic precepts: getting good evidence admitted and preventing bad evidence from being admitted. Of course, strategic thinking, case preparation, investigation, skillful examination of witnesses, astute motion practice, and proficiency in rhetoric and the art of persuasion, are also involved. Intrinsically, they tie in to the two fundamental precepts of what a trial is about \u2013 whether prosecuting or defending or judging. Recognizing that there are a host of issues to consider when it comes to the admissibility and use of open source digital user-generated evidence in court, we take this opportunity to share our thoughts. Spoiler \u2013 much of what we have to say applies to pretty much all evidence: it all comes down to <em>foundations<\/em>.<\/p>\n<p style=\"text-align: justify;\"><strong><em>Open source digital user-generated evidence <\/em><\/strong><strong><em>in a nutshell \u00a0<\/em><\/strong><\/p>\n<p style=\"text-align: justify;\">Open source investigation is the practice of collecting and analyzing information gathered from publicly available sources \u2013 including print media, internet sources such as social media websites and blogs, public government data, professional and academic publications, commercial data, and so on \u2013 to produce actionable information or evidence.((European Commission, <a href=\"https:\/\/data.europa.eu\/en\/publications\/datastories\/open-source-intelligence\" target=\"_blank\" rel=\"noopener\"><em>Open-Source Intelligence<\/em><\/a>, 2 May 2022.)) Digital open source information (<em>i.e<\/em>., public information in digital format) includes both \u201cmachine-generated\u201d and \u201cuser-generated\u201d data.((Berkley Protocol on Digital Open Source Investigations, para. 1.)) <a href=\"http:\/\/www.monash.com\/curtbio.html\" target=\"_blank\" rel=\"noopener\">Curt Monash<\/a>, a leading analyst and strategic advisor to the software industry, defines machine-generated data as \u201cdata that was produced entirely by machines <em>or<\/em> data that is more about observing humans than recording their choices,\u201d such as network logs, satellite imagery, location data such as GPS, and call data records.((Curt Monash, <a href=\"http:\/\/www.dbms2.com\/2010\/12\/30\/examples-and-definition-of-machine-generated-data\/\" target=\"_blank\" rel=\"noopener\">Examples and Definition of Machine-Generated Data<\/a> (italics in original) (last visited 8 February 2023). )) Digital user-generated evidence, by contrast, is \u201cinformation recorded by an ordinary citizen,\u201d such as photographs, video, and text (such as social media posts) uploaded to the internet for the purpose of helping achieve legal accountability for crimes.((Trust in User-Generated Evidence, <a href=\"https:\/\/www.trueproject.co.uk\/\" target=\"_blank\" rel=\"noopener\">Analysing the Impact of Deepfakes on Accountability Processes for Human Rights Violations<\/a> (last visited 8 February 2023); Rebecca Hamilton, <em>User Generated Evidence<\/em>, 57 Columbia J. Transitional L. 1, 3 (2018). ))<\/p>\n<p style=\"text-align: justify;\">With the proliferation of smartphones with audio-visual recording capabilities, the current debate on open source investigations has primarily focused on digital user-generated evidence (for example, see <a href=\"http:\/\/opiniojuris.org\/2021\/01\/26\/open-source-digital-evidence-in-international-criminal-cases-a-way-forward-in-ensuring-accountability-for-core-crimes\/\" target=\"_blank\" rel=\"noopener\">here<\/a>, <a href=\"http:\/\/opiniojuris.org\/2022\/03\/14\/user-generated-evidence-a-helping-hand-for-the-icc-investigation-into-the-situation-in-ukraine\/\" target=\"_blank\" rel=\"noopener\">here<\/a>, and <a href=\"http:\/\/opiniojuris.org\/2019\/12\/19\/digital-accountability-symposium-whose-stories-get-told-and-by-whom-representativeness-in-open-source-human-rights-investigations\/\" target=\"_blank\" rel=\"noopener\">here<\/a>). Now, millions of people around the globe carry these devices, uploading photographs and video footage of crimes being committed onto the internet. Simply type \u201cSyria,\u201d \u201cUkraine,\u201d \u201cMyanmar,\u201d \u201cIran,\u201d or \u201cSyria\u201d into Google\u2019s image search bar and you will find a seemingly immeasurable catalogue of images showing acts worthy of criminal prosecution.<\/p>\n<p style=\"text-align: justify;\">Civil society organizations, such as eyeWitness to Atrocities, have created apps where ordinary citizens can upload information such as photographs and images.((<a href=\"https:\/\/www.eyewitness.global\/FAQS\" target=\"_blank\" rel=\"noopener\">eyeWitness, FAQs<\/a> (last visited 8 February 2023) )) eyeWitness\u2019s app will automatically collect GPS coordinates, date and time indicators, and encrypt the information so that it cannot be edited or altered in any way. Users of the eyeWitness app also have the option to remain anonymous or provide their contact details.\u00a0The hope or expectation, perhaps, is that user-generated evidence collected through the app will be admissible in international criminal trials without having to identify the user or have him or her testify in court.((Rebecca Hamilton, <em>User Generated Evidence<\/em>, 57 Columbia J. Transitional L. 1, 4 (2018). )) This would significantly impact on the fair trial rights of suspects and accused, potentially turning trials into a parody, a charade, a pretense.<\/p>\n<p style=\"text-align: justify;\">Open source digital user-generated evidence is a reality. Indeed, it is virtually inescapable in mass atrocity trials \u2013 despite its inherent, though not necessarily fatally flawed, characteristics. Chambers will be reluctant to outright dismiss this type of evidence, so accept the fact that it will be admitted. But so what? The real issue is not the admission of this evidence, but the weight accorded to it. And here is where evidentiary foundations come in.<\/p>\n<p style=\"text-align: justify;\"><strong><em>Evidentiary foundations <\/em><\/strong><\/p>\n<p style=\"text-align: justify;\">Evidentiary rules and principles assist a Trial Chamber in admitting and assessing the evidence, and, invariably, in making findings of facts to which the applicable law is applied in reaching legal conclusions. Simply put, evidentiary rules and principles inform the Trial Chamber what evidence should be admitted, what evidence should be excluded, and how much weight if any should be given to the evidence that is admitted.<\/p>\n<p style=\"text-align: justify;\">International(ized) criminal courts and tribunals generally apply the \u201cprinciple of free evaluation of evidence,\u201d which favors the admissibility of evidence.((International Criminal Tribunal for the former Yugoslavia Rules of Procedure and Evidence (\u201cICTY RPE\u201d), Rule 89; International Criminal Tribunal for Rwanda (\u201cICTR\u201d) RPE, Rule 89; ICC RPE, Rule 63(3); Extraordinary Chambers in the Courts of Cambodia (\u201cECCC\u201d) Internal Rules, Rule 87; Special Tribunal for Lebanon (\u201cSTL\u201d) RPE, Rule 149(C); <em>Prosecutor v. Staki\u0107<\/em>, IT-97-24-PT, Provisional Order on the Standards Governing the Admission of Evidence and Identification, 25 February 2002, p. 4. )) The Rules of Procedure and Evidence of these courts and tribunals do not regulate the admissibility of evidence in detail, but rather contain general principles of evidence. Normally, the Trial Chambers will adopt guidelines that specify and govern the admissibility of evidence.((<em>See e.g.<\/em>, <em>Prosecutor v. Gicheru<\/em>, ICC-01\/09-01\/20-189, Directions on the Conduct of Proceedings, 7 October 2021.)) Under the ICC\u2019s statutory regime, the Trial Chambers are free to adopt whatever procedure they feel is most suited for the expeditiousness of the proceedings.((Rome Statute, Art. 64; ICC RPE, Rule 64.)) Some Trial Chambers opt for a more common law approach where evidence is screened up front as it is being introduced (albeit loosely and seemingly with a presumption for admission).((<em>Prosecutor v. Katanga and Ngudjolo<\/em>, ICC-01\/04-01\/07-2635, Decision on the Prosecution\u2019s Bar Table Motions, ICC-01\/04-01\/07-2635, 17 December 2010, para. 13.)) \u00a0Other Trial Chambers prefer the civil law approach where the screening of the evidence and its assessment for relevance, authenticity, reliability, and probative value are made after hearing all of the evidence.((<em>Prosecutor v. Bemba,<\/em> ICC-01\/05-01\/08-1022, Decision on the admission into evidence of materials contained in the Prosecution\u2019s list of evidence, 19 November 2010, para. 35.))<\/p>\n<p style=\"text-align: justify;\">Given that the triers of facts at the international(ized) criminal courts and tribunals are \u201cprofessional judges\u201d and not lay persons, the expectation is that the judges will scrupulously analyze the facts and unaffectedly apply the evidentiary rules and principles. Effectively, it matters not which approach a Trial Chamber takes to admitting the evidence. What does matter, however, is that before any evidence is introduced with a view to its eventual reliance in determining facts or matters relevant to the outcome of the case, foundational evidence is introduced. This is especially important when dealing with digital user-generated evidence. This preliminary (predicate) evidence is necessary to show that the material evidence is authentic, reliable, accurate, trustworthy, and relevant. The type of preliminary evidence necessary to lay the proper foundation depends on the form and type of material evidence offered. An objection is likely to be made if the proper foundation is lacking.<\/p>\n<p style=\"text-align: justify;\">Generally, a foundation must be established to show that the evidence is:<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul style=\"text-align: justify;\">\n<li><strong>Relevant<\/strong> \u2013 it has a tendency to make the existence of a fact or consequence more probable or less probable than without the evidence;((<em>Prosecutor v. Katanga and Ngudjolo<\/em>, ICC-01\/04-01\/07-2635, Decision on the Prosecution\u2019s Bar Table Motions, ICC-01\/04-01\/07-2635, 17 December 2010, para. 16; ICC Statute, Art. 69(4), ICC RPE, Rule 64(3). <em>See also <\/em>ICTY RPE, Rule 89(C); ICTR RPE, Rule 89(C); STL RPE, Rule 149(C). ))<\/li>\n<li><strong>Authentic<\/strong> \u2013 the matter or thing in question is exactly what it is claimed to be (for example, a knife, a gun, a video, etc.);((<em>Prosecutor v. Katanga and Ngudjolo<\/em>, ICC-01\/04-01\/07-2635, Decision on the Prosecution\u2019s Bar Table Motions, ICC-01\/04-01\/07-2635, 17 December 2010, para. 22. <em>See also <\/em>ICTY RPE, Rule 89(E); ICTR RPE, Rule 89(D); STL RPE, Rule 149(E). )) and<\/li>\n<li><strong>Reliable<\/strong> \u2013 the evidence is in the same condition as when it was used or located (<em>e<\/em>., it was not tampered with or altered), can be independently verified or tested (<em>i.e<\/em>., it is not based on untestable and uncorroborated hearsay), and\/or has other indicia of reliability considering the source of the evidence, its nature and characteristics, the purpose for which it was generated, and so on.((For a list of factors normally considered by ICC Chambers in assessing the reliability of evidence, <em>see <\/em><em>Prosecutor v. Katanga and Ngudjolo<\/em>, ICC-01\/04-01\/07-2635, Decision on the Prosecution\u2019s Bar Table Motions, ICC-01\/04-01\/07-2635, 17 December 2010, para. 27.))<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">All three criteria should be satisfied before a tangible piece of evidence (as opposed to <em>viva-voce<\/em> testimonial evidence) can be received in evidence for the Trial Chamber\u2019s consideration. For each tangible piece of evidence (such as a printout of a social media post or video), the proponent should satisfy, through the testimony of one or more witnesses, each of the three criteria by laying the foundation necessary for its acceptance as evidence.<\/p>\n<p style=\"text-align: justify;\"><em>Examples of laying a foundation<\/em><\/p>\n<p style=\"text-align: justify;\">\u00a0\u00a0\u00a0 <u>Photograph<\/u><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul style=\"text-align: justify;\">\n<li>Representation of the scene at the time of the incident<\/li>\n<li>True<\/li>\n<li>Accurate<\/li>\n<li>Fair<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><u>Voice<\/u><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul style=\"text-align: justify;\">\n<li>Prior knowledge of the voice<\/li>\n<li>Ability to hear<\/li>\n<li>Recognition of the voice<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">While the ICC Trial Chambers are not required to make a separate ruling on the admissibility of evidence up front and are permitted to defer their admissibility assessment after hearing all the evidence, Rule 64(1) of the ICC Rules of Procedure and Evidence requires that \u201c[a]n issue relating to the relevance or admissibility must be raised at the time when the evidence is submitted to a Chamber.\u201d Thus, while objections related to the foundations of the evidence may not be sufficient to render the evidence inadmissible, they can affect the Trial Chamber\u2019s determination of the weight accorded to the evidence.<\/p>\n<p style=\"text-align: justify;\"><strong><em>Proffering &amp; objecting to the admission of open source digital user-generated evidence<\/em><\/strong><\/p>\n<p style=\"text-align: justify;\">One primary difficulty of proffering (and objecting to the admission of) digital user-generated evidence is that the source of the information (such as the original poster on social media) may be anonymous. According to eyeWitness to Atrocities Program Director Wendy Betts, \u201c[t]here\u2019s a valid legal argument to make that the app itself <em>is<\/em> the witness.\u201d((Interview with Wendy Betts, cited in Rebecca Hamilton, <em>User Generated Evidence<\/em>, 57 Columbia J. Transitional L. 1, 46-47 (2018) (italics in original). )) However, while the eyeWitness app may include vast amounts of metadata (GPS coordinates, cell tower data, etc.) and establish a secure chain of custody so that the data is not compromised, the app cannot establish the primary criterion of foundations: reliability. As the saying goes, <em>garbage in, garbage out<\/em>. If unreliable and untrustworthy data is uploaded into the app, neither the vast amounts of metadata nor secure chain of custody can render the unreliable evidence reliable.<\/p>\n<p style=\"text-align: justify;\">Also, without having the original poster come to testify (and be subjected to robust cross-exanimation), the content of the information provided by the anonymous witness is unverifiable anonymous hearsay, which is generally accorded low probative value.((<em>Prosecutor v. Bemba<\/em>, ICC-01\/05-01\/08-424, Decision Pursuant to Article 61(7)(a) and (b) of the Rome Statue on the Charges of the Prosecutor Against Jean-Pierre Bemba Gombo, 15 June 2009, para. 50. )) For instance, in expressing their dissatisfaction with the prosecution\u2019s use of anonymous evidence recorded in NGO reports and press articles, the <em>Gbagbo<\/em> Pre-Trial Chamber considered:<\/p>\n<p style=\"text-align: justify; padding-left: 40px;\">Proving allegations solely through anonymous hearsay puts the Defence in a difficult position because it is not able to investigate and challenge the trustworthiness of the source(s) of the information, thereby unduly limiting the right of the Defence under article 61(6)(b) of the Statute to challenge the Prosecutor\u2019s evidence, a right to which the Appeals Chamber attached \u201cconsiderable significance\u201d. Further, it is highly problematic when the Chamber itself does not know the source of the information and is deprived of vital information about the source of the evidence. In such cases, the Chamber is unable to assess the trustworthiness of the source, making it all but impossible to determine what probative value to attribute to the information.((<em>Prosecutor v. Gbagbo,<\/em> ICC-02\/11-01\/11-432, Decision Adjourning the Hearing on the Confirmation of Charges Pursuant to Article 61 (7) (c) (i) of the Rome Statute, 3 June 2013, para. 29. ))<\/p>\n<p style=\"text-align: justify;\">Corroboration, according to the <em>Gbagbo<\/em> Pre-Trial Chamber, would also \u201cbe difficult, if not impossible, to determine whether and to what extent anonymous hearsay in documentary evidence corroborates other evidence of the same kind.\u201d((<em>Id<\/em>., para. 30.)) This is because it will be difficult to determine whether to or more anonymous sources are truly independent of each other (especially with numerous groups operating\/investigating <em>in situ<\/em>) \u2013 and the Chamber should not be speculating in making its findings.((<em>Id<\/em>.)) Acknowledging that in exceptional circumstances anonymous evidence may be corroborated by independent sources, the <em>Gbagbo<\/em> Pre-Trial Chamber considered that it \u201cmay still not have enough information about the trustworthiness of these sources\u201d and thus must be \u201cextremely cautious in attributing the appropriate level of probative value.\u201d((<em>Id<\/em>.))<\/p>\n<p style=\"text-align: justify;\">Another difficulty in objecting to the use of such evidence concerns challenges to the method of collection: <em>i.e<\/em>., whether any data collected may have been altered, deleted, manipulated, or compromised in any way thus rendering it unreliable. The ICC Office of the Prosecutor (\u201cOTP\u201d) has a Cyber Unit staffed with experts and investigators trained in digital forensics to explain away the technicalities. Gratefully, the OTP has put together an impressively useful virtual training on <em>Digital Forensic Capabilities and Presentation in Court<\/em> and was generous enough to have Yvan Cuypers of the OTP Cyber Unit explain it all in a <a href=\"https:\/\/www.icc-cpi.int\/news\/icc-concludes-online-training-counsel\" target=\"_blank\" rel=\"noopener\">recent training organized by Counsel Support Services<\/a> (\u201cCSS\u201d). But this is not enough. Not if the defence is to be fully due diligent as required by Article 5 of the <a href=\"https:\/\/www.icc-cpi.int\/sites\/default\/files\/Publications\/Code-of-Professional-Conduct-for-counsel.pdf\" target=\"_blank\" rel=\"noopener\">ICC Code of Professional Conduct for Counsel<\/a> (as well as the national codes of ethics and professional responsibility to which defence counsel are bound), the defence will need its own expert to challenge the prosecution\u2019s foundations. Hiring an expert with the right qualifications comes at a high cost. With virtually all suspects and accused at the ICC being indigent and reliant on CSS for providing adequate resources for a defence \u2013 presumably amounting to equality of arms \u2013 query whether the defence will have access to qualified experts in digital forensics.<\/p>\n<p style=\"text-align: justify;\">Providentially, there are two excellent guidelines available, which, in our opinion, should be the advocate\u2019s first port-of-call when dealing with digital user-generated evidence. Though they have not been formally adopted by the ICC or other international(ized) criminal courts and tribunals, they are thorough and comprehensive. Whether you are in the process of collecting digital user-generated evidence for future judicial proceedings or seeking to have such evidence admitted or rejected (or afforded no weight), we advise you consult them.<\/p>\n<p style=\"text-align: justify;\"><strong><em>Best practices guidelines<\/em><\/strong><\/p>\n<p style=\"text-align: justify;\">The Berkley Protocol on Digital Open Source Investigations and the <a href=\"https:\/\/leiden-guidelines.com\/guidelines\/\" target=\"_blank\" rel=\"noopener\">Leiden Guidelines on the use of Digitally Derived Evidence<\/a> were developed to assist practitioners and civil society understand the essential elements which should be considered when conducting digital open source investigations and in submitting the results for use in international criminal trials. The two documents have distinct aims and coverage.<\/p>\n<p style=\"text-align: justify;\">Primarily aimed at those conducting open source investigations, the Berkley Protocol provides standardized methodologies for collecting and securely storing evidence, in particular, to ensure that open source investigators understand the importance of:<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul style=\"text-align: justify;\">\n<li>Tracing the provenance of online content and attributing it to its original source, where possible;<\/li>\n<li>Evaluating the credibility and reliability of online sources;<\/li>\n<li>Verifying online content and assessing its veracity and reliability;<\/li>\n<li>Complying with legal requirements and ethical norms;<\/li>\n<li>Minimizing any risk of harm to themselves, their organizations and third parties;<\/li>\n<li>Enhancing protection of the human rights of sources, including the right to privacy.((Berkley Protocol on Digital Open Source Investigations, para. 10.))<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">The Berkley Protocol also sets out guiding principles to which those conducting open source investigations should adhere:<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul style=\"text-align: justify;\">\n<li><strong>Accountability<\/strong> \u2013 ensuring that open source investigators are transparent and accountable for their actions, such as clear documentation, record-keeping, and oversight.<\/li>\n<li><strong>Competency <\/strong>\u2013 ensuring that open source investigators have the proper training and technical skills to carry out their investigations in a professional and ethical manner.<\/li>\n<li><strong>Objectivity<\/strong> \u2013 a principle that applies to all investigations, whether online or offline, under which investigators must understand the potential for personal, cultural, or structural biases that affect their work, for example, by deploying multiple working hypotheses and not favoring any particular theory to explain a case.<\/li>\n<li><strong>Legality<\/strong> \u2013 ensuring that open source investigations comply with the applicable laws such as data protection and the internationally recognized human right to privacy.<\/li>\n<li><strong>Security awareness <\/strong>\u2013 ensuring that individuals conducting open source investigators have basic operational security awareness to ensure that they minimize their digital trail and avoid potential risks to themselves, their sources, or others.((Berkley Protocol on Digital Open Source Investigations, paras. 25-29.))<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">By contrast, the Leiden Guidelines are intended for legal practitioners, \u201ccomprehensively outlining the essential elements which should be considered before submitting [digitally derived evidence] to an international court or tribunal.\u201d((<a href=\"https:\/\/leiden-guidelines.com\/guidelines\/\" target=\"_blank\" rel=\"noopener\">Leiden Guidelines on the use of Digitally Derived Evidence<\/a>, Introduction.)) Acknowledging that each international(ized) criminal court and tribunal has their own procedural and evidentiary rules, the Leiden Guidelines draw primarily from the ICC\u2019s approach to the admissibility of evidence as expressed by the <em>Bemba<\/em> Trial Chamber:<\/p>\n<p style=\"text-align: justify; padding-left: 40px;\">[F]or an item to be admitted into evidence it must satisfy the three-part test under which it must (i) be relevant to the case; (ii) have probative value; and (iii) be sufficiently relevant and probative as to outweigh any prejudicial effect its admission may cause. Further, [the] determination on the admissibility into evidence of an item has no bearing on the final weight to be afforded to it, which will only be determined by the Chamber at the end of the case when assessing the evidence as a whole.((<em>Prosecutor v. Bemba<\/em>, ICC-01\/05-01\/08-2721, Decision on the admission into evidence of items deferred in the Chamber\u2019s \u201cDecision on the Prosecution\u2019s Application for Admission of Materials into Evidence Pursuant to Article 64(9) of the Rome Statute\u201d (ICC-01\/05-01\/08-2299), para. 9. ))<\/p>\n<p style=\"text-align: justify;\">After providing definitions of <em>relevance<\/em>, <em>probative value<\/em>, and <em>prejudice <\/em>in the introduction, the Leiden Guidelines go on to provide succinct summaries of jurisprudence from the various international(ized) criminal courts and tribunals concerning the admission and use of specific types of evidence: videos, photographs, aerial and satellite images, intercepts, call data records, and audio recordings. For example, with video evidence, the Leiden Guidelines provide the following practice points:<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul style=\"text-align: justify;\">\n<li>A1. Instead of excerpts, videos should be submitted in their entirety.<\/li>\n<li>A.2 A video and its associated transcripts and translations must be seen as forming integral parts of the same evidence.<\/li>\n<li>A3. Videos not in a working language of the Court should be translated into one of the working languages of the Court and made available to the Chamber and all parties within the time limit fixed by the Chamber.<\/li>\n<li>A4. When a witness appears on a video that the party intends to tender into evidence, the video should be tendered through the witness during the examination-in-chief and not through the bar table.<\/li>\n<li>A5. The Court can make an inference from the content of a video to the extent that it allows the Court to make a definite finding.<\/li>\n<li>A6. Videos can be admitted into evidence if relevance and prima facie authenticity is demonstrated by providing information about the date, the location, the events depicted, the author, the source, and\/or the chain of custody.<\/li>\n<li>A7. Video evidence of interviews conducted during an armed conflict by a party to the conflict may not be objective and reliable and therefore low probative value may be attached to the video.<\/li>\n<li>A8. The consent of witnesses and others affected by the work of the Court whose image is depicted in video evidence is required.((<a href=\"https:\/\/leiden-guidelines.com\/guidelines\/\" target=\"_blank\" rel=\"noopener\">Leiden Guidelines on the use of Digitally Derived Evidence<\/a>, A. Videos.))<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">When it comes to digital user-generated evidence, however, the Leiden Guidelines are scant, noting that while digital user-generated evidence such as social media posts have been admitted in ICC proceedings, \u201cnone of the Chambers discussed the admissibility of social media evidence or specific evidentiary requirements and as such, no authoritative guidelines could reasonably be deduced or formulated.\u201d((<a href=\"https:\/\/leiden-guidelines.com\/guidelines\/\" target=\"_blank\" rel=\"noopener\">Leiden Guidelines on the use of Digitally Derived Evidence<\/a>, Introduction.)) Perhaps this is because the ICC Chambers (and other international(ized) criminal courts and tribunals) have treated digital user-generated evidence just like any other piece of evidence.<\/p>\n<p style=\"text-align: justify;\">For example, the <em>Bemba et al.<\/em> Trial Chamber admitted screenshots of publicly available Facebook profiles, which were relevant to establishing the relationships between the accused and witnesses.((<em>Prosecutor v. Bemba et al.<\/em>, ICC-01\/05-01\/13-1498, Public redacted version of the \u201cProsecution\u2019s Fifth Request for the Admission of Evidence from the Bar Table\u201d, 27 November 2015, ICC-01\/05-01\/13-1498-Conf, 30 November 2015, para. 17.)) It considered that the documents were open source material from Facebook and thus <em>prima facie <\/em>authentic and reliable: the authenticity and reliability of the documents was corroborated by their general appearance, bearing the indicia that they originated from Facebook, including the Facebook logo, the layout of the webpage in the screen shot, and its structure.((<em>Id<\/em>.)) Further, their veracity and reliability was independently corroborated by other evidence in the case, including the testimony and statements of three witnesses.((<em>Id<\/em>., para. 18.))<\/p>\n<p style=\"text-align: justify;\">In another instance at the Special Court for Sierra Leone, the defence was permitted to confront a witness with a social media post, having laid a foundation:<\/p>\n<p style=\"text-align: justify; padding-left: 40px;\"><em>Q. Do you recognise this as being a Facebook page, Ms White?<\/em><\/p>\n<p style=\"text-align: justify; padding-left: 40px;\"><em>A. I do.<\/em><\/p>\n<p style=\"text-align: justify; padding-left: 40px;\"><em>Q. Do you see just below the photos \u2013<\/em><\/p>\n<p style=\"text-align: justify; padding-left: 40px;\"><em>Q. \u201cJeanna Ridout, what an inconvenience. Friday at 11.05 a.m.\u201d 11.05 a.m. The UK is one hour behind The Hague, so that&#8217;s 10 o\u2019clock here in The Hague. So at that time would your employees be in the office?<\/em><\/p>\n<p style=\"text-align: justify; padding-left: 40px;\"><em>A. 11.05 on Friday morning, yes.<\/em>((<em>Prosecutor v. Taylor<\/em>, SCSL-2003-01-T, Transcript, 9 August 2010, pp. 45783, 45788.))<\/p>\n<p style=\"text-align: justify;\"><strong><em>Approaching<\/em><\/strong> <strong><em>open source digital user-generated evidence as any other type of evidence <\/em><\/strong><\/p>\n<p style=\"text-align: justify;\">The long story short is that despite the technicalities involved in collecting, storing, and using digital-user-generated evidence, it is no different than any other piece of evidence in terms of admissibility and assessment in court.<\/p>\n<p style=\"text-align: justify;\">In introducing any digital user-generated evidence, it is incumbent upon the advocate to lay a foundation to show that the evidence in question is relevant, authentic, and reliable in order for any weight to be accorded to it. This may require an expert to demonstrate and explain how the evidence was collected and stored, including what measures were taken to minimize the risk of the data being altered or compromised. It may also require having the source of the material in question testify in court. While this entails security concerns for the source, there are mechanisms to ensure witness security such as the possibility of testifying under pseudonym and relocation.<\/p>\n<p style=\"text-align: justify;\">As for the advocate objecting to the use of digital user-generated evidence (or any evidence being submitted for that matter), objections must be made <em>prior<\/em> to the testimony of any witness who is going to introduce and use the evidence during his or her testimony. Although this advice is very adversarial in nature and limited to common law jurisdictions, if the advocate is unsatisfied with the foundation that has been laid, he\/she should seek leave to question the witness in the form of a <em>voir dire <\/em>limited to the issues of foundation prior to the witness using the evidence in his or her testimony. While leave for <em>voir dire<\/em> is unlikely to be granted at the ICC (especially by civil law-trained judges), it merits at least an attempt to highlight the foundational concerns. In other words, do not wait until cross-examination. During cross-examination, the advocate should also deal with foundations as the preliminary issue. Even if the advocate were granted the ability to do a limited <em>voir dire<\/em>, this should not prevent him or her from supplementing at the beginning of cross-examination, provided that it is not repetitious.<\/p>\n<p style=\"text-align: justify;\"><strong><em>Parting remarks <\/em><\/strong><\/p>\n<p style=\"text-align: justify;\">In this new brave world of digitalization and artificial intelligence \u2013 such as the text-generating <a href=\"https:\/\/www.wsj.com\/articles\/chatgpt-ai-chatbot-app-explained-11675865177\" target=\"_blank\" rel=\"noopener\">ChatGPT<\/a>, AI-synthesized \u201c<a href=\"https:\/\/www.voanews.com\/a\/seeing-is-believing-global-scramble-to-tackle-deepfakes-\/6945185.html\" target=\"_blank\" rel=\"noopener\">deepfakes<\/a>\u201d, and who knows what\u2019s next in technological advancement \u2013 digital evidence will increasingly be challenged in arguing for or against the admission of evidence whose provenance, authenticity, and reliability is difficult to discern to a high level of certainty (beyond reasonable doubt). At the end of the day, however, the basic evidentiary rules and principles of foundations relevant to ordinary evidence are just as applicable \u2013 indeed, the nettles that must be grasped. The Berkley Protocol and Leiden Guidelines are useful, but without a deep and abiding understating of evidentiary foundations, the advocate is less likely to fully appreciate them.<\/p>\n<p style=\"text-align: justify;\">For an excellent primer on foundations, we highly recommend Edward J. Imwinkelried,<em>\u00a0<\/em><a href=\"https:\/\/store.lexisnexis.com\/products\/evidentiary-foundations-skuusSku42175\" target=\"_blank\" rel=\"noopener\"><em>Evidentiary Foundations<\/em><\/a><em>,\u00a0<\/em>Twelfth Edition. While it primarily relates to the United States Federal Rules of Evidence, the principles related to evidentiary foundations are relevant irrespective the legal tradition, be it civil law, common law, or hybrid.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-919\" src=\"https:\/\/i0.wp.com\/michaelgkarnavas.net\/blog\/wp-content\/uploads\/2015\/05\/comments2.png?resize=274%2C184&#038;ssl=1\" alt=\"Don't forget to leave your comments\" width=\"274\" height=\"184\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Michael G. Karnavas and Noah Al-Malt Recently we had the opportunity to attend a panel discussion at the Leiden University Grotius Center for International Legal Studies on Filling an Accountability Gap? How a Standing UN Investigative Mechanism Would Further International Justice. Bluntly, it seemed more like a promotional event for the International Commission of &hellip; <a href=\"https:\/\/michaelgkarnavas.net\/blog\/2023\/02\/13\/defending-in-the-age-of-open-source\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Defending in the age of open source digital user-generated evidence&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[18,21],"tags":[4,7],"class_list":["post-4522","post","type-post","status-publish","format-standard","hentry","category-icc","category-international-criminal-law","tag-icc","tag-international-criminal-law"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Defending in the age of open source digital user-generated evidence - michaelgkarnavas.net\/Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/michaelgkarnavas.net\/blog\/2023\/02\/13\/defending-in-the-age-of-open-source\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Defending in the age of open source digital user-generated evidence - michaelgkarnavas.net\/Blog\" \/>\n<meta property=\"og:description\" content=\"By Michael G. Karnavas and Noah Al-Malt Recently we had the opportunity to attend a panel discussion at the Leiden University Grotius Center for International Legal Studies on Filling an Accountability Gap? How a Standing UN Investigative Mechanism Would Further International Justice. Bluntly, it seemed more like a promotional event for the International Commission of &hellip; Continue reading &quot;Defending in the age of open source digital user-generated evidence&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/michaelgkarnavas.net\/blog\/2023\/02\/13\/defending-in-the-age-of-open-source\/\" \/>\n<meta property=\"og:site_name\" content=\"michaelgkarnavas.net\/Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-13T03:47:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-26T15:10:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/michaelgkarnavas.net\/blog\/wp-content\/uploads\/2015\/05\/comments2.png\" \/>\n<meta name=\"author\" content=\"Michael G. Karnavas\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/mgkarnavas\" \/>\n<meta name=\"twitter:site\" content=\"@mgkarnavas\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael G. Karnavas\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"20 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/michaelgkarnavas.net\\\/blog\\\/2023\\\/02\\\/13\\\/defending-in-the-age-of-open-source\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/michaelgkarnavas.net\\\/blog\\\/2023\\\/02\\\/13\\\/defending-in-the-age-of-open-source\\\/\"},\"author\":{\"name\":\"Michael G. Karnavas\",\"@id\":\"https:\\\/\\\/michaelgkarnavas.net\\\/blog\\\/#\\\/schema\\\/person\\\/d03dcdb5c7e0e85117fb75cfb7b98c79\"},\"headline\":\"Defending in the age of open source digital user-generated evidence\",\"datePublished\":\"2023-02-13T03:47:03+00:00\",\"dateModified\":\"2024-04-26T15:10:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/michaelgkarnavas.net\\\/blog\\\/2023\\\/02\\\/13\\\/defending-in-the-age-of-open-source\\\/\"},\"wordCount\":4426,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\\\/\\\/michaelgkarnavas.net\\\/blog\\\/#\\\/schema\\\/person\\\/d03dcdb5c7e0e85117fb75cfb7b98c79\"},\"image\":{\"@id\":\"https:\\\/\\\/michaelgkarnavas.net\\\/blog\\\/2023\\\/02\\\/13\\\/defending-in-the-age-of-open-source\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/michaelgkarnavas.net\\\/blog\\\/wp-content\\\/uploads\\\/2015\\\/05\\\/comments2.png\",\"keywords\":[\"ICC\",\"International Criminal Law\"],\"articleSection\":[\"ICC\",\"International Criminal Law\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/michaelgkarnavas.net\\\/blog\\\/2023\\\/02\\\/13\\\/defending-in-the-age-of-open-source\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/michaelgkarnavas.net\\\/blog\\\/2023\\\/02\\\/13\\\/defending-in-the-age-of-open-source\\\/\",\"url\":\"https:\\\/\\\/michaelgkarnavas.net\\\/blog\\\/2023\\\/02\\\/13\\\/defending-in-the-age-of-open-source\\\/\",\"name\":\"Defending in the age of open source digital user-generated evidence - michaelgkarnavas.net\\\/Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/michaelgkarnavas.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/michaelgkarnavas.net\\\/blog\\\/2023\\\/02\\\/13\\\/defending-in-the-age-of-open-source\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/michaelgkarnavas.net\\\/blog\\\/2023\\\/02\\\/13\\\/defending-in-the-age-of-open-source\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/michaelgkarnavas.net\\\/blog\\\/wp-content\\\/uploads\\\/2015\\\/05\\\/comments2.png\",\"datePublished\":\"2023-02-13T03:47:03+00:00\",\"dateModified\":\"2024-04-26T15:10:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/michaelgkarnavas.net\\\/blog\\\/2023\\\/02\\\/13\\\/defending-in-the-age-of-open-source\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/michaelgkarnavas.net\\\/blog\\\/2023\\\/02\\\/13\\\/defending-in-the-age-of-open-source\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/michaelgkarnavas.net\\\/blog\\\/2023\\\/02\\\/13\\\/defending-in-the-age-of-open-source\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/michaelgkarnavas.net\\\/blog\\\/wp-content\\\/uploads\\\/2015\\\/05\\\/comments2.png?fit=274%2C184&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/michaelgkarnavas.net\\\/blog\\\/wp-content\\\/uploads\\\/2015\\\/05\\\/comments2.png?fit=274%2C184&ssl=1\",\"width\":274,\"height\":184,\"caption\":\"Don't forget to leave your comments\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/michaelgkarnavas.net\\\/blog\\\/2023\\\/02\\\/13\\\/defending-in-the-age-of-open-source\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/michaelgkarnavas.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Defending in the age of open source digital user-generated evidence\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/michaelgkarnavas.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/michaelgkarnavas.net\\\/blog\\\/\",\"name\":\"Michael G. Karnavas Blog\",\"description\":\"International Criminal Law Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/michaelgkarnavas.net\\\/blog\\\/#\\\/schema\\\/person\\\/d03dcdb5c7e0e85117fb75cfb7b98c79\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/michaelgkarnavas.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/michaelgkarnavas.net\\\/blog\\\/#\\\/schema\\\/person\\\/d03dcdb5c7e0e85117fb75cfb7b98c79\",\"name\":\"Michael G. Karnavas\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/michaelgkarnavas.net\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/MGKarnavasCt.jpg?fit=365%2C365&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/michaelgkarnavas.net\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/MGKarnavasCt.jpg?fit=365%2C365&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/michaelgkarnavas.net\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/MGKarnavasCt.jpg?fit=365%2C365&ssl=1\",\"width\":365,\"height\":365,\"caption\":\"Michael G. Karnavas\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/michaelgkarnavas.net\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/MGKarnavasCt.jpg?fit=365%2C365&ssl=1\"},\"description\":\"Michael G. Karnavas is an American trained lawyer. He is licensed in Alaska and Massachusetts and is qualified to appear before the various International tribunals, including the International Criminal Court (ICC). Residing and practicing primarily in The Hague, he is recognized as an expert in international criminal defence, including pre-trial, trial, and appellate advocacy.\",\"sameAs\":[\"http:\\\/\\\/michaelgkarnavas.net\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/michael-g-karnavas-97494a75\\\/\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/twitter.com\\\/mgkarnavas\"],\"url\":\"https:\\\/\\\/michaelgkarnavas.net\\\/blog\\\/author\\\/michael-g-karnavas\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Defending in the age of open source digital user-generated evidence - michaelgkarnavas.net\/Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/michaelgkarnavas.net\/blog\/2023\/02\/13\/defending-in-the-age-of-open-source\/","og_locale":"en_US","og_type":"article","og_title":"Defending in the age of open source digital user-generated evidence - michaelgkarnavas.net\/Blog","og_description":"By Michael G. Karnavas and Noah Al-Malt Recently we had the opportunity to attend a panel discussion at the Leiden University Grotius Center for International Legal Studies on Filling an Accountability Gap? How a Standing UN Investigative Mechanism Would Further International Justice. Bluntly, it seemed more like a promotional event for the International Commission of &hellip; Continue reading \"Defending in the age of open source digital user-generated evidence\"","og_url":"https:\/\/michaelgkarnavas.net\/blog\/2023\/02\/13\/defending-in-the-age-of-open-source\/","og_site_name":"michaelgkarnavas.net\/Blog","article_published_time":"2023-02-13T03:47:03+00:00","article_modified_time":"2024-04-26T15:10:25+00:00","og_image":[{"url":"https:\/\/michaelgkarnavas.net\/blog\/wp-content\/uploads\/2015\/05\/comments2.png","type":"","width":"","height":""}],"author":"Michael G. Karnavas","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/mgkarnavas","twitter_site":"@mgkarnavas","twitter_misc":{"Written by":"Michael G. Karnavas","Est. reading time":"20 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/michaelgkarnavas.net\/blog\/2023\/02\/13\/defending-in-the-age-of-open-source\/#article","isPartOf":{"@id":"https:\/\/michaelgkarnavas.net\/blog\/2023\/02\/13\/defending-in-the-age-of-open-source\/"},"author":{"name":"Michael G. Karnavas","@id":"https:\/\/michaelgkarnavas.net\/blog\/#\/schema\/person\/d03dcdb5c7e0e85117fb75cfb7b98c79"},"headline":"Defending in the age of open source digital user-generated evidence","datePublished":"2023-02-13T03:47:03+00:00","dateModified":"2024-04-26T15:10:25+00:00","mainEntityOfPage":{"@id":"https:\/\/michaelgkarnavas.net\/blog\/2023\/02\/13\/defending-in-the-age-of-open-source\/"},"wordCount":4426,"commentCount":2,"publisher":{"@id":"https:\/\/michaelgkarnavas.net\/blog\/#\/schema\/person\/d03dcdb5c7e0e85117fb75cfb7b98c79"},"image":{"@id":"https:\/\/michaelgkarnavas.net\/blog\/2023\/02\/13\/defending-in-the-age-of-open-source\/#primaryimage"},"thumbnailUrl":"https:\/\/michaelgkarnavas.net\/blog\/wp-content\/uploads\/2015\/05\/comments2.png","keywords":["ICC","International Criminal Law"],"articleSection":["ICC","International Criminal Law"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/michaelgkarnavas.net\/blog\/2023\/02\/13\/defending-in-the-age-of-open-source\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/michaelgkarnavas.net\/blog\/2023\/02\/13\/defending-in-the-age-of-open-source\/","url":"https:\/\/michaelgkarnavas.net\/blog\/2023\/02\/13\/defending-in-the-age-of-open-source\/","name":"Defending in the age of open source digital user-generated evidence - michaelgkarnavas.net\/Blog","isPartOf":{"@id":"https:\/\/michaelgkarnavas.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/michaelgkarnavas.net\/blog\/2023\/02\/13\/defending-in-the-age-of-open-source\/#primaryimage"},"image":{"@id":"https:\/\/michaelgkarnavas.net\/blog\/2023\/02\/13\/defending-in-the-age-of-open-source\/#primaryimage"},"thumbnailUrl":"https:\/\/michaelgkarnavas.net\/blog\/wp-content\/uploads\/2015\/05\/comments2.png","datePublished":"2023-02-13T03:47:03+00:00","dateModified":"2024-04-26T15:10:25+00:00","breadcrumb":{"@id":"https:\/\/michaelgkarnavas.net\/blog\/2023\/02\/13\/defending-in-the-age-of-open-source\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/michaelgkarnavas.net\/blog\/2023\/02\/13\/defending-in-the-age-of-open-source\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/michaelgkarnavas.net\/blog\/2023\/02\/13\/defending-in-the-age-of-open-source\/#primaryimage","url":"https:\/\/i0.wp.com\/michaelgkarnavas.net\/blog\/wp-content\/uploads\/2015\/05\/comments2.png?fit=274%2C184&ssl=1","contentUrl":"https:\/\/i0.wp.com\/michaelgkarnavas.net\/blog\/wp-content\/uploads\/2015\/05\/comments2.png?fit=274%2C184&ssl=1","width":274,"height":184,"caption":"Don't forget to leave your comments"},{"@type":"BreadcrumbList","@id":"https:\/\/michaelgkarnavas.net\/blog\/2023\/02\/13\/defending-in-the-age-of-open-source\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/michaelgkarnavas.net\/blog\/"},{"@type":"ListItem","position":2,"name":"Defending in the age of open source digital user-generated evidence"}]},{"@type":"WebSite","@id":"https:\/\/michaelgkarnavas.net\/blog\/#website","url":"https:\/\/michaelgkarnavas.net\/blog\/","name":"Michael G. Karnavas Blog","description":"International Criminal Law Blog","publisher":{"@id":"https:\/\/michaelgkarnavas.net\/blog\/#\/schema\/person\/d03dcdb5c7e0e85117fb75cfb7b98c79"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/michaelgkarnavas.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/michaelgkarnavas.net\/blog\/#\/schema\/person\/d03dcdb5c7e0e85117fb75cfb7b98c79","name":"Michael G. Karnavas","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/michaelgkarnavas.net\/blog\/wp-content\/uploads\/2023\/02\/MGKarnavasCt.jpg?fit=365%2C365&ssl=1","url":"https:\/\/i0.wp.com\/michaelgkarnavas.net\/blog\/wp-content\/uploads\/2023\/02\/MGKarnavasCt.jpg?fit=365%2C365&ssl=1","contentUrl":"https:\/\/i0.wp.com\/michaelgkarnavas.net\/blog\/wp-content\/uploads\/2023\/02\/MGKarnavasCt.jpg?fit=365%2C365&ssl=1","width":365,"height":365,"caption":"Michael G. Karnavas"},"logo":{"@id":"https:\/\/i0.wp.com\/michaelgkarnavas.net\/blog\/wp-content\/uploads\/2023\/02\/MGKarnavasCt.jpg?fit=365%2C365&ssl=1"},"description":"Michael G. Karnavas is an American trained lawyer. He is licensed in Alaska and Massachusetts and is qualified to appear before the various International tribunals, including the International Criminal Court (ICC). Residing and practicing primarily in The Hague, he is recognized as an expert in international criminal defence, including pre-trial, trial, and appellate advocacy.","sameAs":["http:\/\/michaelgkarnavas.net","https:\/\/www.linkedin.com\/in\/michael-g-karnavas-97494a75\/","https:\/\/x.com\/https:\/\/twitter.com\/mgkarnavas"],"url":"https:\/\/michaelgkarnavas.net\/blog\/author\/michael-g-karnavas\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/michaelgkarnavas.net\/blog\/wp-json\/wp\/v2\/posts\/4522","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/michaelgkarnavas.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/michaelgkarnavas.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/michaelgkarnavas.net\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/michaelgkarnavas.net\/blog\/wp-json\/wp\/v2\/comments?post=4522"}],"version-history":[{"count":22,"href":"https:\/\/michaelgkarnavas.net\/blog\/wp-json\/wp\/v2\/posts\/4522\/revisions"}],"predecessor-version":[{"id":5348,"href":"https:\/\/michaelgkarnavas.net\/blog\/wp-json\/wp\/v2\/posts\/4522\/revisions\/5348"}],"wp:attachment":[{"href":"https:\/\/michaelgkarnavas.net\/blog\/wp-json\/wp\/v2\/media?parent=4522"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/michaelgkarnavas.net\/blog\/wp-json\/wp\/v2\/categories?post=4522"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/michaelgkarnavas.net\/blog\/wp-json\/wp\/v2\/tags?post=4522"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}