Module 9 – Storing Information Training Materials on the International Protocol © Institute for International Criminal Investigations 2015 INTERNATIONAL.

Slides:



Advertisements
Similar presentations
First responder (usually a uniformed police officer): 1.Medical assistance is first priority…protecting evidence is secondary! 2.Protect scene…nothing.
Advertisements

Chapter 2 Crime Scene. Crime Scene 1 Roles in crime scene? Tasks?  Evidence?  Victim missing?  Foot? Fingers?  What you identified as steps to manage.
Crime Scene Investigation. Arriving at a Crime Scene  A crime scene is the site where the offense took place  When officers first arrive at the crime.
Crime Scene Investigation Forensic Science Mr. Glatt
The Crime Scene. Principle of Exchange Dr. Edmond Locard, director of the world’s first forensic lab (1910, Lyon, France), established the idea of the.
Guide to Computer Forensics and Investigations, Second Edition
Processing a Crime Scene
Developed by Jaime Yarussi and Mary Pinn under NIC Cooperative Agreement #06S20GJJ1 DNA Collection: The Body As A Crime Scene Investigating Allegations.
The Crime Scene. Locard’s Principle Dr. Edmond Locard Dr. Edmond Locard Director of the world’s first forensic lab in France Director of the world’s.
Shoot-Around Reflect on yesterday’s video: how did DNA affect the case? Was the DNA analysis the main evidence that led detectives to the killer? Where.
1 CRIME SCENES, EVIDENCE & FORENSICS LEARNING DOMAIN 30.
Forensic Evidence in Elder Mistreatment Cases
Strengthening Health System Responses to Gender-based Violence in EECA: A resource package 7. Documentation of GBV 1.
Recordkeeping for Good Governance Toolkit Digital Recordkeeping Guidance Funafuti, Tuvalu – June 2013.
Computer Forensics Principles and Practices
Crime Scene Investigation. Arriving at a Crime Scene  A crime scene is the site where the offence took place  When officers first arrive at the crime.
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
Crime Scene Investigation & Evidence Collection
The Crime Scene. Vocabulary Make a vocabulary page in your notebook for each of the following terms: Primary Crime Scene Secondary Crime Scene Physical.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
Chapters 1 & 2 Hi Guys! How many of you are actually writing this down without thinking about it? 1 Crime Scene Investigation.
Basics and Photography.  The goal of a crime scene investigation is to recognize, document, and collect evidence at the scene of a crime.  This information.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Taken from: The Manual for Forensic Medicine: A guide for clinicians authored by Ralph J. Riviello.
AJ 104 Crime Scene Evidence, Experiments, and Models.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
ISO/IEC 27001:2013 Annex A.8 Asset management
1 Introduction to Forensic Science and the Law Fourth amendment protects citizens against “unreasonable search and seizures” Police and crime scene investigators.
CHAIN OF CUSTODY AND EVIDENCE HANDLING
Locard’s Exchange Principle “When a person comes into contact with an object or another person, a cross- transfer of physical evidence can occur.”
Evidence.  States that when a person comes into contact with an object or another person, a cross- transfer of physical evidence can occur  The material.
The Crime Scene “Oh, how simple it would all have been had I been there before they came like a herd of buffalo and wallowed all in it.” -A. Conan Doyle,
Handling Personal Data & Security of Information Paula Trim, Information Officer, Children’s Strategic Services, Mon – Thurs 9:15-2:15.
CJO3 EOC Review Evidence. O – Describe the role of evidence in investigations O – Assist in identifying, preserving, collecting, recording,
Module 8 – Additional Sources of Information Training Materials on the International Protocol © Institute for International Criminal Investigations 2015.
CHAP 6 – COMPUTER FORENSIC ANALYSIS. 2 Objectives Of Analysis Process During Investigation: The purpose of this process is to discover and recover evidences.
Module 3 - Preliminary Considerations Training Materials on the International Protocol © Institute for International Criminal Investigations 2015 INTERNATIONAL.
Module 4 – Key Planning Topics Training Materials on the International Protocol © Institute for International Criminal Investigations 2015 INTERNATIONAL.
Introduction – Using the International Protocol Training Materials on the International Protocol © Institute for International Criminal Investigations.
Unit 3 Providing safe environments for children
Locard’s Exchange Principle
The Crime Scene.
Crime scene investigation
Chapter 2 Evidence Collection
Chapter 2 Crime Scene Investigation and Evidence Collection By the end of this chapter you will be able to: Summarize Locard’s exchange principle.
11-2 Evidence Collection Jeopardy
Crime Scene Investigation
Assault and Related Offenses
Death Investigation.
Packaging Evidence Essential Question: How do we demonstrate the proper techniques for collecting and packaging physical evidence found at the crime scene?
Collecting Additional Information
Crime Scene Investigation
The Crime Scene.
Crime Scene Investigation
Storing and Handling Information
Crime Scene Investigation
Steps to Solving a Crime
Steps to Solving a Crime
Respond Evaluate Crime Scene Investigation Hermitage Technical Center - Criminal Justice Team Process Debrief.
Crime Scene Investigation
Crime Scene Basics Forensic Science.
Data Management Ethical considerations for educational research
Crime Scene Investigation
Crime Scene Investigation
Roles of the Forensic Scientist
The Crime Scene.
Crime Scene Overview November 27, 2018.
Crime Scene Investigation Methods
Once the scene has been secured, a lead investigator will start processing the crime scene area.
Once the scene has been secured, a lead investigator will start processing the crime scene area.
Presentation transcript:

Module 9 – Storing Information Training Materials on the International Protocol © Institute for International Criminal Investigations 2015 INTERNATIONAL PROTOCOL, PART 2 MODULE 9 PAGES 68-70

Training Materials on the International Protocol © Institute for International Criminal Investigations 2015  Storage of evidence or information is a crucial point and must be considered from the very beginning of any investigation or documentation process  Before you pick anything up, before you speak to a witness, before you turn on your computer or answer the phone, you must consider and plan for the following question: Storing information International Protocol, pages Module 4 – Key Planning Topics Module 6 – Testimony Module 8 – Additional Sources of Information Annex 6 & 7 – Chain of Custody W HERE AND HOW ARE WE GOING TO STORE THIS INFORMATION ?

Training Materials on the International Protocol © Institute for International Criminal Investigations 2015  If you collect evidence/information about sexual violence, you have an obligation to store and manage it in a way that ensures its integrity and does not put anyone at risk  The type of information you may collect – photos of crime scenes or injuries, statements from survivors/witnesses, medical or police records – is highly sensitive and confidential, extremely personal and could be very damaging if misused or made public Storing information International Protocol, pages Module 4 – Key Planning Topics Module 6 – Testimony Module 8 – Additional Sources of Information Annex 6 & 7 – Chain of Custody

Training Materials on the International Protocol © Institute for International Criminal Investigations 2015  If you choose to collect such information, you must ensure that it is stored and maintained in a way that protects the safety of survivors/witnesses, their family/community and your own staff  You should consider the ultimate use of the evidence/information – this will have implications for how long you will have to store the evidence and under what conditions  If you cannot guarantee or maintain the necessary facilities to store the evidence/information, you should consider not collecting it Storing information International Protocol, pages Module 4 – Key Planning Topics Module 6 – Testimony Module 8 – Additional Sources of Information Annex 6 & 7 – Chain of Custody

Training Materials on the International Protocol © Institute for International Criminal Investigations 2015 To safely store sensitive information about sexual violence, you must plan for the following: Storing information safely International Protocol, pages Module 4 – Key Planning Topics Module 6 – Testimony Location where information will be stored and person responsible for it Storing information identifying witnesses separately from information provided Not storing public information with protected/sensitive information Not storing public information with protected/sensitive information Organising information in a logical and easily accessible way Training staff on how to locate stored information and emergency security Avoiding checkpoint routes with sensitive information/use of data encryption

Storing documents or physical information International Protocol, page 69 Module 3 – Preliminary Considerations Module 8 – Additional Sources of Information Training Materials on the International Protocol © Institute for International Criminal Investigations 2015   If you are storing documents or other physical items, you should keep them in a locked storage facility (cabinet/safe/storage unit) in a cool dry place and maintain restricted access   You should also keep a logbook to record any access to the storage facility – include names, date, time and purpose of access – and ensure the safety of staff who maintain/guard it   If the physical information is perishable, make sure the storage conditions are appropriate – if it is partial or incomplete, make sure each item is marked and identified as part of a larger set

Storing audio-visual information International Protocol, page 69 Module 7 – Interviewing Module 8 – Additional Sources of Information Annex 6 & 7 – Chain of Custody Training Materials on the International Protocol © Institute for International Criminal Investigations 2015   All photographs and video-recordings should be numbered and catalogued – the record number should indicate if they are linked to or corroborate any witness statements, documents or other pieces of evidence/ information   For audio or video-recordings (other than interview recordings), the person responsible for the recording must continue to protect the confidentiality and security of the identities of the individuals in the recording, no matter how long it is stored

Training Materials on the International Protocol © Institute for International Criminal Investigations 2015  Some evidence/information about sexual violence may be in electronic or digital form only (images taken on a mobile phone, recordings, document scans) but must still be securely stored  You may also have an electronic database or digital archive to catalogue and manage or store copies of your documentary and physical evidence/information  Storing and managing digital information has some advantages (less physical space, easier to analyse) and some complications (power supply, internet access, software or hardware problems) Storing digital information International Protocol, pages Module 4 – Key Planning Topics Module 6 – Testimony

E NSURING THE SECURITY AND INTEGRITY OF DIGITAL INFORMATION Training Materials on the International Protocol © Institute for International Criminal Investigations 2015 Storing digital information International Protocol, pages Module 3 – Preliminary Considerations Module 6 - Testimony Conduct risk assessments and implement digital security protocols All digital information should be encrypted with professional software All digital information should be encrypted with professional software Automatically record any access, additions/deletions or edits to the file Make and keep two copies of all files on computer/USB/read-only CD Limit access to specific staff and have an emergency security plan Maintain adequate anti-virus software and back-up database files

Training Materials on the International Protocol © Institute for International Criminal Investigations 2015 Collecting digital information International Protocol, pages Module 3 – Preliminary Considerations Module 7 – Interviewing TECHNOLOGYADVANTAGESDISADVANTAGES GPS cameras, metadata and digital records Can provide critical detail about when, how and where information was collected Security risk if confiscated, may be used to identify sources/witnesses/locations Mobile data collection applications Secure remote storage, no risk to sensitive data if mobile is lost/stolen, preserves chain of custody Risk of hacking, authorities may monitor data sent over phone or internet Cloud storage/ remote digital storage Ability to remotely access information, back-up in case of loss or damage to original device Security/copyright issues if using commercial providers, risk of hacking

Training Materials on the International Protocol © Institute for International Criminal Investigations 2015  Some jurisdictions may require specific forensic evidence of sexual violence (i.e. medical exam by a government doctor) – some may accept it as corroboration (i.e. clothing, tissue samples, photos, evidence of weapons, ropes/ligatures)  If you are not appropriately trained to collect medico-legal/ biological evidence (blood or semen, soiled clothing, skin or hair, DNA swabs) then you should not do so – you may do more harm than good  If you do not have appropriate facilities to preserve and manage forensic evidence (refrigerated storage units, lab processing) then you should not collect it – if it is not stored correctly, it cannot be used Storing forensic evidence International Protocol, page 70 Module 4 – Key Planning Topics Module 8 – Additional Sources of Information Annex 6 & 7 – Chain of Custody

Training Materials on the International Protocol © Institute for International Criminal Investigations 2015  Forensic medico-legal examinations should only be conducted by trained professionals, and should be accompanied by appropriate medical care for the survivor  If a forensic medical examination is not a legal requirement to prove sexual violence you should not pursue one, as it can be embarrassing, invasive and re-traumatising for survivors  Further guidance on ethical and practical standards for the collection of medical forensic evidence can be found in the WHO Guidelines and the Istanbul Protocol Storing forensic evidence International Protocol, page 70 Module 4 – Key Planning Topics Module 8 – Additional Sources of Information Annex 10 – Sample Sexual Assault Medical Certificate

 Relevant factors for storing forensic evidence include: Training Materials on the International Protocol © Institute for International Criminal Investigations 2015 Temperature & humidity of storage facilities Using gloves when handling evidence to avoid contamination Ensuring sterility of all packaging and evidence bags Physical evidence should be clean and dry – may require a sealed container Biological evidence may need to be refrigerated or frozen to be usable Using appropriate containers - wet items will degrade in plastic packaging Storing forensic evidence International Protocol, page 70 Module 4 – Key Planning Topics Module 8 – Additional Sources of Information Annex 6 & 7 – Chain of Custody