SlideShare a Scribd company logo
Crowdsourcing the Investigation
Osgoode Professional Development
 Technology Crime and Electronic
   Evidence, December 1, 2012

   Constable Scott Mills, Toronto Police
                  Service
     Steven Johnston, Alberta Justice
         Specialized Prosecutions
DISCLAIMER

The opinions expressed herein are those of the
  writer/presenter and are not necessarily the
  opinions of the Toronto Police Service, the
  Attorney General of Alberta, or the those of
  the Department of the Solicitor General and
  Justice of Alberta.
Crowdsourcing
According to Wikipedia:

Crowdsourcing is a type of participative online activity in which an
   individual, an institution, a non-profit organization, or company
   proposes to a group of individuals of varying knowledge,
   heterogeneity, and number, via a flexible open call, the voluntary
   undertaking of a task. The undertaking of the task, of variable
   complexity and modularity, and in which the crowd should
   participate bringing their work, money, knowledge and/or
   experience, always entails mutual benefit. The user will receive the
   satisfaction of a given type of need, be it economic, social
   recognition, self-esteem, or the development of individual skills,
   while the crowdsourcer will obtain and utilize to their advantage
   that what the user has brought to the venture, whose form will
   depend on the type of activity undertaken".
Why does this matter?

• Impact on policing, investigations and court
• Trends
• Is it really new?
What’s old is new again
The digital footprint
Intentionally or not any person who is in public
  creates a digitial footprint,
From CCTV’s to social media people create, both
  intentionally and unintentionally a footprint in
  the digital world which can be accessed by
  people around the world.
Who is the Crowd?
Any person who wants to assist.

Software can run alone as the Crowd, i.e.
  Tagging of photos.

The impact of privacy laws, while seemingly vast
  are ultimately local. If Facebook Canada turns
  off an app, it may be that in another country
  the app is still on and fully useable.
Police and the Crowd
• First impact is decision to embrace – or not

• If investigation goes to Crowd, must have a
  plan in place to deal with the amount of
  information coming in, both good and bad.

• Verification.
Finding Data in Crowd

Youtube – witnesses discussing the case, video
  being posted which police may not have had,
  and ultimately the use of software and the
  crowd lead to sources of information
Facial Recongition Software
Impact on Courts
Disclosure – how will it be managed?

Privacy Issues

Admissibility in Courts
Disclosure
Vast amount of data = proportional increase in
  requirement to manage the data in disclosure
Privacy Issues

In wake of the Vancouver Riots, police sought to
  use the ICBC drivers licences for background
  information and use facial recognition
  software.
BC Privacy Commissioner ruled this requires
  judicial authorization.
Admissibility in Court
Alberta Justice Policy is to not use facial
  recognition software

Not aware of use in Canadian Courts

Developing area of law – standards.
References
California v. Heard, Superior Court in the State
  of California, Court No 2429070, June 2010;

ANSI/NIST-ITL Standards Data Format for
 Interchange of Fingerprint, Facial and other
 Biometric Information;

People v. Johnson, Court of Appeal, 5th District,
  California – No. F046939, May 2006
Data Mining can be done by
        computers acting alone
• Potential advantages include a more
  “objective” evaluation of evidence
• Can find patterns where a person may not
• Can deal with much larger volumes of data
  than a person
• “predictive policing”
Can an algorithym become RPG?
Already happening in private security context,
  i.e. Credit Cards

What is impact for police/search issues

More Related Content

What's hot

Social Media and the Courts
Social Media and the CourtsSocial Media and the Courts
Social Media and the Courts
Omar Ha-Redeye
 
10-30-13 Social Media and Confidentiality Presentation
10-30-13 Social Media and Confidentiality Presentation10-30-13 Social Media and Confidentiality Presentation
10-30-13 Social Media and Confidentiality Presentation
Jonathan Ezor
 
A Look at Lawyers' Use of Technology in 2011
A Look at Lawyers' Use of Technology in 2011A Look at Lawyers' Use of Technology in 2011
A Look at Lawyers' Use of Technology in 2011Nicole Black
 
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedingsJan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
Timothy Holborn
 
On line speech harms- melbourne
On line speech harms- melbourneOn line speech harms- melbourne
On line speech harms- melbourne
David Harvey
 
3 14-14 ezor social media ethics rules presentation
3 14-14 ezor social media ethics rules presentation3 14-14 ezor social media ethics rules presentation
3 14-14 ezor social media ethics rules presentation
Jonathan Ezor
 
10-8-13 BYOD Risk Presentation for Nassau County Bar Committee
10-8-13 BYOD Risk Presentation for Nassau County Bar Committee10-8-13 BYOD Risk Presentation for Nassau County Bar Committee
10-8-13 BYOD Risk Presentation for Nassau County Bar Committee
Jonathan Ezor
 
CSUN 2013 Legal Update: Web, Mobile, Digital Accessibility (Lainey Feingold +...
CSUN 2013 Legal Update: Web, Mobile, Digital Accessibility (Lainey Feingold +...CSUN 2013 Legal Update: Web, Mobile, Digital Accessibility (Lainey Feingold +...
CSUN 2013 Legal Update: Web, Mobile, Digital Accessibility (Lainey Feingold +...
Lainey Feingold
 
The Largest Democracy - India
The Largest Democracy - IndiaThe Largest Democracy - India
feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...
Timothy Holborn
 
19 July 2012 - Loc-poi overview v2
19 July 2012 - Loc-poi overview v2 19 July 2012 - Loc-poi overview v2
19 July 2012 - Loc-poi overview v2
Timothy Holborn
 
Revitalizing democracy - the power of online tools
Revitalizing democracy - the power of online toolsRevitalizing democracy - the power of online tools
Revitalizing democracy - the power of online tools
Madarasz Csaba
 
Data and ethics Training
Data and ethics TrainingData and ethics Training
POLS 3620 Internet freedom
POLS 3620 Internet freedomPOLS 3620 Internet freedom
POLS 3620 Internet freedomroypong
 
Tag August2011
Tag August2011Tag August2011
Tag August2011
Deborah Gonzalez, Esq.
 
March 2013 Australian Centre Liberal Arts
March 2013 Australian Centre Liberal Arts March 2013 Australian Centre Liberal Arts
March 2013 Australian Centre Liberal Arts
Timothy Holborn
 
Presentation at ENISA summer school
Presentation at ENISA summer schoolPresentation at ENISA summer school
Presentation at ENISA summer school
osimod
 
RIM On The Social Side
RIM On The Social SideRIM On The Social Side
RIM On The Social Side
Natalie Alesi
 
Unraveling intermediary liability
Unraveling intermediary liabilityUnraveling intermediary liability
Unraveling intermediary liabilityEmily Laidlaw
 
Can the Digital be Obtained
Can the Digital be ObtainedCan the Digital be Obtained
Can the Digital be Obtained
Jo Balucanag - Bitonio
 

What's hot (20)

Social Media and the Courts
Social Media and the CourtsSocial Media and the Courts
Social Media and the Courts
 
10-30-13 Social Media and Confidentiality Presentation
10-30-13 Social Media and Confidentiality Presentation10-30-13 Social Media and Confidentiality Presentation
10-30-13 Social Media and Confidentiality Presentation
 
A Look at Lawyers' Use of Technology in 2011
A Look at Lawyers' Use of Technology in 2011A Look at Lawyers' Use of Technology in 2011
A Look at Lawyers' Use of Technology in 2011
 
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedingsJan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
 
On line speech harms- melbourne
On line speech harms- melbourneOn line speech harms- melbourne
On line speech harms- melbourne
 
3 14-14 ezor social media ethics rules presentation
3 14-14 ezor social media ethics rules presentation3 14-14 ezor social media ethics rules presentation
3 14-14 ezor social media ethics rules presentation
 
10-8-13 BYOD Risk Presentation for Nassau County Bar Committee
10-8-13 BYOD Risk Presentation for Nassau County Bar Committee10-8-13 BYOD Risk Presentation for Nassau County Bar Committee
10-8-13 BYOD Risk Presentation for Nassau County Bar Committee
 
CSUN 2013 Legal Update: Web, Mobile, Digital Accessibility (Lainey Feingold +...
CSUN 2013 Legal Update: Web, Mobile, Digital Accessibility (Lainey Feingold +...CSUN 2013 Legal Update: Web, Mobile, Digital Accessibility (Lainey Feingold +...
CSUN 2013 Legal Update: Web, Mobile, Digital Accessibility (Lainey Feingold +...
 
The Largest Democracy - India
The Largest Democracy - IndiaThe Largest Democracy - India
The Largest Democracy - India
 
feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...
 
19 July 2012 - Loc-poi overview v2
19 July 2012 - Loc-poi overview v2 19 July 2012 - Loc-poi overview v2
19 July 2012 - Loc-poi overview v2
 
Revitalizing democracy - the power of online tools
Revitalizing democracy - the power of online toolsRevitalizing democracy - the power of online tools
Revitalizing democracy - the power of online tools
 
Data and ethics Training
Data and ethics TrainingData and ethics Training
Data and ethics Training
 
POLS 3620 Internet freedom
POLS 3620 Internet freedomPOLS 3620 Internet freedom
POLS 3620 Internet freedom
 
Tag August2011
Tag August2011Tag August2011
Tag August2011
 
March 2013 Australian Centre Liberal Arts
March 2013 Australian Centre Liberal Arts March 2013 Australian Centre Liberal Arts
March 2013 Australian Centre Liberal Arts
 
Presentation at ENISA summer school
Presentation at ENISA summer schoolPresentation at ENISA summer school
Presentation at ENISA summer school
 
RIM On The Social Side
RIM On The Social SideRIM On The Social Side
RIM On The Social Side
 
Unraveling intermediary liability
Unraveling intermediary liabilityUnraveling intermediary liability
Unraveling intermediary liability
 
Can the Digital be Obtained
Can the Digital be ObtainedCan the Digital be Obtained
Can the Digital be Obtained
 

Viewers also liked

#SMILEcon Tampa Using Twitter & Text For Community Policing In Kenya
#SMILEcon Tampa Using Twitter & Text For Community Policing In Kenya #SMILEcon Tampa Using Twitter & Text For Community Policing In Kenya
#SMILEcon Tampa Using Twitter & Text For Community Policing In Kenya
Scott Mills
 
Social Media Canvass For Crime Prevention SMILE Conference Vancouver by Scott...
Social Media Canvass For Crime Prevention SMILE Conference Vancouver by Scott...Social Media Canvass For Crime Prevention SMILE Conference Vancouver by Scott...
Social Media Canvass For Crime Prevention SMILE Conference Vancouver by Scott...
Scott Mills
 
Social Media And The Law For Students By Toronto Police Officer Laurie McCan...
Social  Media And The Law For Students By Toronto Police Officer Laurie McCan...Social  Media And The Law For Students By Toronto Police Officer Laurie McCan...
Social Media And The Law For Students By Toronto Police Officer Laurie McCan...
Scott Mills
 
Social Media For Success & Safety CSIWorld.org 33rd Annual Training Conferenc...
Social Media For Success & Safety CSIWorld.org 33rd Annual Training Conferenc...Social Media For Success & Safety CSIWorld.org 33rd Annual Training Conferenc...
Social Media For Success & Safety CSIWorld.org 33rd Annual Training Conferenc...
Scott Mills
 
Lawyer Eric Roher @ERoher on Emergency & Disaster Planning In Schools
Lawyer Eric Roher @ERoher on Emergency & Disaster Planning In SchoolsLawyer Eric Roher @ERoher on Emergency & Disaster Planning In Schools
Lawyer Eric Roher @ERoher on Emergency & Disaster Planning In Schools
Scott Mills
 
Safe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & TechnologySafe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & Technology
Scott Mills
 
City of Toronto Graffiti Management Plan | Toronto Police Training Seminar Ap...
City of Toronto Graffiti Management Plan | Toronto Police Training Seminar Ap...City of Toronto Graffiti Management Plan | Toronto Police Training Seminar Ap...
City of Toronto Graffiti Management Plan | Toronto Police Training Seminar Ap...
Scott Mills
 
Social Media & Homicide Investigations | Colonel Henry F. Williams Homicide S...
Social Media & Homicide Investigations | Colonel Henry F. Williams Homicide S...Social Media & Homicide Investigations | Colonel Henry F. Williams Homicide S...
Social Media & Homicide Investigations | Colonel Henry F. Williams Homicide S...
Scott Mills
 
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Scott Mills
 
Stopping Suicides Using Social Media @GoTransit & @RealTimeCrisis
Stopping Suicides Using Social Media @GoTransit & @RealTimeCrisisStopping Suicides Using Social Media @GoTransit & @RealTimeCrisis
Stopping Suicides Using Social Media @GoTransit & @RealTimeCrisis
Scott Mills
 
@UNDOC Human Trafficking-Crime Stoppers International 2011
@UNDOC Human Trafficking-Crime Stoppers International 2011@UNDOC Human Trafficking-Crime Stoppers International 2011
@UNDOC Human Trafficking-Crime Stoppers International 2011
Scott Mills
 
LAWWORKS 2012 Social Media For Success And Safety In Schools
LAWWORKS 2012 Social Media For Success And Safety In SchoolsLAWWORKS 2012 Social Media For Success And Safety In Schools
LAWWORKS 2012 Social Media For Success And Safety In Schools
Scott Mills
 
Social Media And The Law In Canada by Lawyer Eric Roher
Social Media And The Law In Canada by Lawyer Eric Roher Social Media And The Law In Canada by Lawyer Eric Roher
Social Media And The Law In Canada by Lawyer Eric Roher
Scott Mills
 
#RealTimeCrisis Intervention Presention at @CACP_ACC_ @MHCC_ #MHPolice Confer...
#RealTimeCrisis Intervention Presention at @CACP_ACC_ @MHCC_ #MHPolice Confer...#RealTimeCrisis Intervention Presention at @CACP_ACC_ @MHCC_ #MHPolice Confer...
#RealTimeCrisis Intervention Presention at @CACP_ACC_ @MHCC_ #MHPolice Confer...
Scott Mills
 
Human Trafficking @CanStopCrime It's Happening Here Don't Close Your Eyes
Human Trafficking @CanStopCrime It's Happening Here Don't Close Your Eyes Human Trafficking @CanStopCrime It's Happening Here Don't Close Your Eyes
Human Trafficking @CanStopCrime It's Happening Here Don't Close Your Eyes
Scott Mills
 
How Viable Is Crime Stoppers? by K. Scott Abrams Crime Stoppers International...
How Viable Is Crime Stoppers? by K. Scott Abrams Crime Stoppers International...How Viable Is Crime Stoppers? by K. Scott Abrams Crime Stoppers International...
How Viable Is Crime Stoppers? by K. Scott Abrams Crime Stoppers International...
Scott Mills
 
Anti-intimidation: Atelier du 14 mai 2013 aux parents Ecole Sainte-Marguerite...
Anti-intimidation: Atelier du 14 mai 2013 aux parents Ecole Sainte-Marguerite...Anti-intimidation: Atelier du 14 mai 2013 aux parents Ecole Sainte-Marguerite...
Anti-intimidation: Atelier du 14 mai 2013 aux parents Ecole Sainte-Marguerite...
Scott Mills
 
Tiedonhallintataitojen opetussuunnitelma Tampereen lukioihin
Tiedonhallintataitojen opetussuunnitelma Tampereen lukioihinTiedonhallintataitojen opetussuunnitelma Tampereen lukioihin
Tiedonhallintataitojen opetussuunnitelma Tampereen lukioihin
Heidi Eriksson
 

Viewers also liked (20)

#SMILEcon Tampa Using Twitter & Text For Community Policing In Kenya
#SMILEcon Tampa Using Twitter & Text For Community Policing In Kenya #SMILEcon Tampa Using Twitter & Text For Community Policing In Kenya
#SMILEcon Tampa Using Twitter & Text For Community Policing In Kenya
 
Social Media Canvass For Crime Prevention SMILE Conference Vancouver by Scott...
Social Media Canvass For Crime Prevention SMILE Conference Vancouver by Scott...Social Media Canvass For Crime Prevention SMILE Conference Vancouver by Scott...
Social Media Canvass For Crime Prevention SMILE Conference Vancouver by Scott...
 
Social Media And The Law For Students By Toronto Police Officer Laurie McCan...
Social  Media And The Law For Students By Toronto Police Officer Laurie McCan...Social  Media And The Law For Students By Toronto Police Officer Laurie McCan...
Social Media And The Law For Students By Toronto Police Officer Laurie McCan...
 
Social Media For Success & Safety CSIWorld.org 33rd Annual Training Conferenc...
Social Media For Success & Safety CSIWorld.org 33rd Annual Training Conferenc...Social Media For Success & Safety CSIWorld.org 33rd Annual Training Conferenc...
Social Media For Success & Safety CSIWorld.org 33rd Annual Training Conferenc...
 
Lawyer Eric Roher @ERoher on Emergency & Disaster Planning In Schools
Lawyer Eric Roher @ERoher on Emergency & Disaster Planning In SchoolsLawyer Eric Roher @ERoher on Emergency & Disaster Planning In Schools
Lawyer Eric Roher @ERoher on Emergency & Disaster Planning In Schools
 
Safe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & TechnologySafe Community Partnership October 2013 Social Media & Technology
Safe Community Partnership October 2013 Social Media & Technology
 
City of Toronto Graffiti Management Plan | Toronto Police Training Seminar Ap...
City of Toronto Graffiti Management Plan | Toronto Police Training Seminar Ap...City of Toronto Graffiti Management Plan | Toronto Police Training Seminar Ap...
City of Toronto Graffiti Management Plan | Toronto Police Training Seminar Ap...
 
Social Media & Homicide Investigations | Colonel Henry F. Williams Homicide S...
Social Media & Homicide Investigations | Colonel Henry F. Williams Homicide S...Social Media & Homicide Investigations | Colonel Henry F. Williams Homicide S...
Social Media & Homicide Investigations | Colonel Henry F. Williams Homicide S...
 
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
 
Stopping Suicides Using Social Media @GoTransit & @RealTimeCrisis
Stopping Suicides Using Social Media @GoTransit & @RealTimeCrisisStopping Suicides Using Social Media @GoTransit & @RealTimeCrisis
Stopping Suicides Using Social Media @GoTransit & @RealTimeCrisis
 
@UNDOC Human Trafficking-Crime Stoppers International 2011
@UNDOC Human Trafficking-Crime Stoppers International 2011@UNDOC Human Trafficking-Crime Stoppers International 2011
@UNDOC Human Trafficking-Crime Stoppers International 2011
 
LAWWORKS 2012 Social Media For Success And Safety In Schools
LAWWORKS 2012 Social Media For Success And Safety In SchoolsLAWWORKS 2012 Social Media For Success And Safety In Schools
LAWWORKS 2012 Social Media For Success And Safety In Schools
 
Social Media And The Law In Canada by Lawyer Eric Roher
Social Media And The Law In Canada by Lawyer Eric Roher Social Media And The Law In Canada by Lawyer Eric Roher
Social Media And The Law In Canada by Lawyer Eric Roher
 
#RealTimeCrisis Intervention Presention at @CACP_ACC_ @MHCC_ #MHPolice Confer...
#RealTimeCrisis Intervention Presention at @CACP_ACC_ @MHCC_ #MHPolice Confer...#RealTimeCrisis Intervention Presention at @CACP_ACC_ @MHCC_ #MHPolice Confer...
#RealTimeCrisis Intervention Presention at @CACP_ACC_ @MHCC_ #MHPolice Confer...
 
Human Trafficking @CanStopCrime It's Happening Here Don't Close Your Eyes
Human Trafficking @CanStopCrime It's Happening Here Don't Close Your Eyes Human Trafficking @CanStopCrime It's Happening Here Don't Close Your Eyes
Human Trafficking @CanStopCrime It's Happening Here Don't Close Your Eyes
 
How Viable Is Crime Stoppers? by K. Scott Abrams Crime Stoppers International...
How Viable Is Crime Stoppers? by K. Scott Abrams Crime Stoppers International...How Viable Is Crime Stoppers? by K. Scott Abrams Crime Stoppers International...
How Viable Is Crime Stoppers? by K. Scott Abrams Crime Stoppers International...
 
Anti-intimidation: Atelier du 14 mai 2013 aux parents Ecole Sainte-Marguerite...
Anti-intimidation: Atelier du 14 mai 2013 aux parents Ecole Sainte-Marguerite...Anti-intimidation: Atelier du 14 mai 2013 aux parents Ecole Sainte-Marguerite...
Anti-intimidation: Atelier du 14 mai 2013 aux parents Ecole Sainte-Marguerite...
 
Tiedonhallintataitojen opetussuunnitelma Tampereen lukioihin
Tiedonhallintataitojen opetussuunnitelma Tampereen lukioihinTiedonhallintataitojen opetussuunnitelma Tampereen lukioihin
Tiedonhallintataitojen opetussuunnitelma Tampereen lukioihin
 
Presentazione ifm
Presentazione ifmPresentazione ifm
Presentazione ifm
 
La palma, our island
La palma, our islandLa palma, our island
La palma, our island
 

Similar to Crowdsourcing The Investigation Technology & Digital Evidence Symposium Osgoode Hall 2012

Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
Carolina Rossini
 
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxDigital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
webb00704
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
waiforchi Wagiteerhh
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
hyacinthshackley2629
 
Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Online
caniceconsulting
 
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docxAccessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
nettletondevon
 
Future of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, Vodafone
Future Agenda
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...
Patrick McCormick
 
Digital citizen feedback report final
Digital citizen feedback report finalDigital citizen feedback report final
Digital citizen feedback report finalLoren Treisman
 
Cyber Forensics.ppt
Cyber Forensics.pptCyber Forensics.ppt
Cyber Forensics.ppt
HODCSEKncet
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
REVULN
 
Reply to post 1 & 2 with 250 words  each.Post 11.  What va
Reply to post 1 & 2 with 250 words  each.Post 11.  What vaReply to post 1 & 2 with 250 words  each.Post 11.  What va
Reply to post 1 & 2 with 250 words  each.Post 11.  What va
felipaser7p
 
White Paper: Social Media for Litigation
White Paper: Social Media for LitigationWhite Paper: Social Media for Litigation
White Paper: Social Media for Litigation
Medpricer
 
smiAware-WhitePaper-LegalInvestigations
smiAware-WhitePaper-LegalInvestigationssmiAware-WhitePaper-LegalInvestigations
smiAware-WhitePaper-LegalInvestigationsMedpricer
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentationChande Kasita
 
Don't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateDon't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' Debate
Fabio Chiusi
 
Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...
Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...
Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...
LorieLynDeGuzmanSalv
 
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSSOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
HB Litigation Conferences
 
Clarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillanceClarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillanceNANDI AYANA
 

Similar to Crowdsourcing The Investigation Technology & Digital Evidence Symposium Osgoode Hall 2012 (20)

Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxDigital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
 
Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Online
 
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docxAccessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
 
Future of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture of privacy - An initial perspective - Stephen Deadman, Vodafone
Future of privacy - An initial perspective - Stephen Deadman, Vodafone
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...
 
Digital citizen feedback report final
Digital citizen feedback report finalDigital citizen feedback report final
Digital citizen feedback report final
 
Cyber Forensics.ppt
Cyber Forensics.pptCyber Forensics.ppt
Cyber Forensics.ppt
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
 
Reply to post 1 & 2 with 250 words  each.Post 11.  What va
Reply to post 1 & 2 with 250 words  each.Post 11.  What vaReply to post 1 & 2 with 250 words  each.Post 11.  What va
Reply to post 1 & 2 with 250 words  each.Post 11.  What va
 
White Paper: Social Media for Litigation
White Paper: Social Media for LitigationWhite Paper: Social Media for Litigation
White Paper: Social Media for Litigation
 
smiAware-WhitePaper-LegalInvestigations
smiAware-WhitePaper-LegalInvestigationssmiAware-WhitePaper-LegalInvestigations
smiAware-WhitePaper-LegalInvestigations
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
Don't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateDon't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' Debate
 
Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...
Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...
Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...
 
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSSOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
 
Clarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillanceClarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillance
 
Identity Management Policy Seminar
Identity Management Policy SeminarIdentity Management Policy Seminar
Identity Management Policy Seminar
 

More from Scott Mills

Beyond Engagement-Building Your Social Media Strategy
Beyond Engagement-Building Your Social Media StrategyBeyond Engagement-Building Your Social Media Strategy
Beyond Engagement-Building Your Social Media Strategy
Scott Mills
 
Crime Stoppers International Newsletter "In Touch"
Crime Stoppers International Newsletter "In Touch"Crime Stoppers International Newsletter "In Touch"
Crime Stoppers International Newsletter "In Touch"Scott Mills
 
Case Studies & Literature Review * Real Time Crisis Centre Hub #RTCH
Case Studies & Literature Review * Real Time Crisis Centre Hub #RTCHCase Studies & Literature Review * Real Time Crisis Centre Hub #RTCH
Case Studies & Literature Review * Real Time Crisis Centre Hub #RTCH
Scott Mills
 
"The Caller" The Voice of Crime Stoppers International Feb2013 Issue 1 Volume 38
"The Caller" The Voice of Crime Stoppers International Feb2013 Issue 1 Volume 38"The Caller" The Voice of Crime Stoppers International Feb2013 Issue 1 Volume 38
"The Caller" The Voice of Crime Stoppers International Feb2013 Issue 1 Volume 38
Scott Mills
 
Social Media For Success And Safety By Scott Mills
Social Media For Success And Safety By Scott MillsSocial Media For Success And Safety By Scott Mills
Social Media For Success And Safety By Scott Mills
Scott Mills
 
Human Trafficking Today's Slavery Hidden In Plain Sight
Human Trafficking Today's Slavery Hidden In Plain Sight Human Trafficking Today's Slavery Hidden In Plain Sight
Human Trafficking Today's Slavery Hidden In Plain Sight
Scott Mills
 
Operation Captura | Crime Stoppers International | 2011
Operation Captura | Crime Stoppers International | 2011Operation Captura | Crime Stoppers International | 2011
Operation Captura | Crime Stoppers International | 2011Scott Mills
 
Crime stoppers interntional conference= money talks
Crime stoppers interntional conference= money talksCrime stoppers interntional conference= money talks
Crime stoppers interntional conference= money talksScott Mills
 
Promote Crime Stoppers International
Promote Crime Stoppers InternationalPromote Crime Stoppers International
Promote Crime Stoppers International
Scott Mills
 
Human Trafficking | Colin Farquhar (COP-Turks & Caicos) | Crime Stoppers Inte...
Human Trafficking | Colin Farquhar (COP-Turks & Caicos) | Crime Stoppers Inte...Human Trafficking | Colin Farquhar (COP-Turks & Caicos) | Crime Stoppers Inte...
Human Trafficking | Colin Farquhar (COP-Turks & Caicos) | Crime Stoppers Inte...
Scott Mills
 
FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International
Scott Mills
 
"Security & Justice For All" | UNODC | Steve Thurlow Crime Has No Borders Ple...
"Security & Justice For All" | UNODC | Steve Thurlow Crime Has No Borders Ple..."Security & Justice For All" | UNODC | Steve Thurlow Crime Has No Borders Ple...
"Security & Justice For All" | UNODC | Steve Thurlow Crime Has No Borders Ple...
Scott Mills
 
1-800-CORRUPT Justin Felice ACP-JCF Crime Stoppers International Conference P...
1-800-CORRUPT Justin Felice ACP-JCF Crime Stoppers International Conference P...1-800-CORRUPT Justin Felice ACP-JCF Crime Stoppers International Conference P...
1-800-CORRUPT Justin Felice ACP-JCF Crime Stoppers International Conference P...
Scott Mills
 

More from Scott Mills (13)

Beyond Engagement-Building Your Social Media Strategy
Beyond Engagement-Building Your Social Media StrategyBeyond Engagement-Building Your Social Media Strategy
Beyond Engagement-Building Your Social Media Strategy
 
Crime Stoppers International Newsletter "In Touch"
Crime Stoppers International Newsletter "In Touch"Crime Stoppers International Newsletter "In Touch"
Crime Stoppers International Newsletter "In Touch"
 
Case Studies & Literature Review * Real Time Crisis Centre Hub #RTCH
Case Studies & Literature Review * Real Time Crisis Centre Hub #RTCHCase Studies & Literature Review * Real Time Crisis Centre Hub #RTCH
Case Studies & Literature Review * Real Time Crisis Centre Hub #RTCH
 
"The Caller" The Voice of Crime Stoppers International Feb2013 Issue 1 Volume 38
"The Caller" The Voice of Crime Stoppers International Feb2013 Issue 1 Volume 38"The Caller" The Voice of Crime Stoppers International Feb2013 Issue 1 Volume 38
"The Caller" The Voice of Crime Stoppers International Feb2013 Issue 1 Volume 38
 
Social Media For Success And Safety By Scott Mills
Social Media For Success And Safety By Scott MillsSocial Media For Success And Safety By Scott Mills
Social Media For Success And Safety By Scott Mills
 
Human Trafficking Today's Slavery Hidden In Plain Sight
Human Trafficking Today's Slavery Hidden In Plain Sight Human Trafficking Today's Slavery Hidden In Plain Sight
Human Trafficking Today's Slavery Hidden In Plain Sight
 
Operation Captura | Crime Stoppers International | 2011
Operation Captura | Crime Stoppers International | 2011Operation Captura | Crime Stoppers International | 2011
Operation Captura | Crime Stoppers International | 2011
 
Crime stoppers interntional conference= money talks
Crime stoppers interntional conference= money talksCrime stoppers interntional conference= money talks
Crime stoppers interntional conference= money talks
 
Promote Crime Stoppers International
Promote Crime Stoppers InternationalPromote Crime Stoppers International
Promote Crime Stoppers International
 
Human Trafficking | Colin Farquhar (COP-Turks & Caicos) | Crime Stoppers Inte...
Human Trafficking | Colin Farquhar (COP-Turks & Caicos) | Crime Stoppers Inte...Human Trafficking | Colin Farquhar (COP-Turks & Caicos) | Crime Stoppers Inte...
Human Trafficking | Colin Farquhar (COP-Turks & Caicos) | Crime Stoppers Inte...
 
FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International
 
"Security & Justice For All" | UNODC | Steve Thurlow Crime Has No Borders Ple...
"Security & Justice For All" | UNODC | Steve Thurlow Crime Has No Borders Ple..."Security & Justice For All" | UNODC | Steve Thurlow Crime Has No Borders Ple...
"Security & Justice For All" | UNODC | Steve Thurlow Crime Has No Borders Ple...
 
1-800-CORRUPT Justin Felice ACP-JCF Crime Stoppers International Conference P...
1-800-CORRUPT Justin Felice ACP-JCF Crime Stoppers International Conference P...1-800-CORRUPT Justin Felice ACP-JCF Crime Stoppers International Conference P...
1-800-CORRUPT Justin Felice ACP-JCF Crime Stoppers International Conference P...
 

Recently uploaded

PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 

Recently uploaded (20)

PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 

Crowdsourcing The Investigation Technology & Digital Evidence Symposium Osgoode Hall 2012

  • 1. Crowdsourcing the Investigation Osgoode Professional Development Technology Crime and Electronic Evidence, December 1, 2012 Constable Scott Mills, Toronto Police Service Steven Johnston, Alberta Justice Specialized Prosecutions
  • 2. DISCLAIMER The opinions expressed herein are those of the writer/presenter and are not necessarily the opinions of the Toronto Police Service, the Attorney General of Alberta, or the those of the Department of the Solicitor General and Justice of Alberta.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. Crowdsourcing According to Wikipedia: Crowdsourcing is a type of participative online activity in which an individual, an institution, a non-profit organization, or company proposes to a group of individuals of varying knowledge, heterogeneity, and number, via a flexible open call, the voluntary undertaking of a task. The undertaking of the task, of variable complexity and modularity, and in which the crowd should participate bringing their work, money, knowledge and/or experience, always entails mutual benefit. The user will receive the satisfaction of a given type of need, be it economic, social recognition, self-esteem, or the development of individual skills, while the crowdsourcer will obtain and utilize to their advantage that what the user has brought to the venture, whose form will depend on the type of activity undertaken".
  • 20. Why does this matter? • Impact on policing, investigations and court • Trends • Is it really new?
  • 21. What’s old is new again
  • 22. The digital footprint Intentionally or not any person who is in public creates a digitial footprint, From CCTV’s to social media people create, both intentionally and unintentionally a footprint in the digital world which can be accessed by people around the world.
  • 23. Who is the Crowd? Any person who wants to assist. Software can run alone as the Crowd, i.e. Tagging of photos. The impact of privacy laws, while seemingly vast are ultimately local. If Facebook Canada turns off an app, it may be that in another country the app is still on and fully useable.
  • 24. Police and the Crowd • First impact is decision to embrace – or not • If investigation goes to Crowd, must have a plan in place to deal with the amount of information coming in, both good and bad. • Verification.
  • 25. Finding Data in Crowd Youtube – witnesses discussing the case, video being posted which police may not have had, and ultimately the use of software and the crowd lead to sources of information Facial Recongition Software
  • 26. Impact on Courts Disclosure – how will it be managed? Privacy Issues Admissibility in Courts
  • 27. Disclosure Vast amount of data = proportional increase in requirement to manage the data in disclosure
  • 28. Privacy Issues In wake of the Vancouver Riots, police sought to use the ICBC drivers licences for background information and use facial recognition software. BC Privacy Commissioner ruled this requires judicial authorization.
  • 29. Admissibility in Court Alberta Justice Policy is to not use facial recognition software Not aware of use in Canadian Courts Developing area of law – standards.
  • 30. References California v. Heard, Superior Court in the State of California, Court No 2429070, June 2010; ANSI/NIST-ITL Standards Data Format for Interchange of Fingerprint, Facial and other Biometric Information; People v. Johnson, Court of Appeal, 5th District, California – No. F046939, May 2006
  • 31. Data Mining can be done by computers acting alone • Potential advantages include a more “objective” evaluation of evidence • Can find patterns where a person may not • Can deal with much larger volumes of data than a person • “predictive policing”
  • 32. Can an algorithym become RPG? Already happening in private security context, i.e. Credit Cards What is impact for police/search issues

Editor's Notes

  1. What has changed since?
  2. Does the person become an agent? What about anonymnity. Many places take Crimestoppers tips in modern ways, but what about Facebook etc.
  3. Louisiana v. Johnson, Court of Appeal of Louisiana, 4 th Circuit, Feb 10, 2010 – allegation that jurors were using own computers to do enhancement of photos.