Preventing Spoliation of Evidence with Blockchain: A Perspective from
South Asia
- URL: http://arxiv.org/abs/2107.14050v1
- Date: Wed, 14 Jul 2021 11:59:12 GMT
- Title: Preventing Spoliation of Evidence with Blockchain: A Perspective from
South Asia
- Authors: Ali Shahaab, Chaminda Hewage, Imtiaz Khan
- Abstract summary: Evidence destruction and tempering is a time-tested tactic to protect the powerful perpetrators, criminals, and corrupt officials.
We propose a conceptual model - 'EvidenceChain', through which citizens can anonymously upload digital evidence.
Person uploading the evidence can anonymously share it with investigating authorities or openly with public, if coerced by the perpetrators or authorities.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Evidence destruction and tempering is a time-tested tactic to protect the
powerful perpetrators, criminals, and corrupt officials. Countries where law
enforcing institutions and judicial system can be comprised, and evidence
destroyed or tampered, ordinary citizens feel disengaged with the investigation
or prosecution process, and in some instances, intimidated due to the
vulnerability to exposure and retribution. Using Distributed Ledger
Technologies (DLT), such as blockchain, as the underpinning technology, here we
propose a conceptual model - 'EvidenceChain', through which citizens can
anonymously upload digital evidence, having assurance that the integrity of the
evidence will be preserved in an immutable and indestructible manner. Person
uploading the evidence can anonymously share it with investigating authorities
or openly with public, if coerced by the perpetrators or authorities.
Transferring the ownership of evidence from authority to ordinary citizen, and
custodianship of evidence from susceptible centralized repository to an
immutable and indestructible distributed repository, can cause a paradigm shift
of power that not only can minimize spoliation of evidence but human rights
abuse too. Here the conceptual model was theoretically tested against some
high-profile spoliation of evidence cases from four South Asian developing
countries that often rank high in global corruption index and low in human
rights index.
Related papers
- Evidence Tampering and Chain of Custody in Layered Attestations [0.0]
In distributed systems, trust decisions are made on the basis of integrity evidence generated via remote attestation.
We present algorithms for identifying all such tampering opportunities for given evidence as well as tampering "strategies" by which an adversary can modify incriminating evidence without being detected.
Our efforts are intended to help protocol designers ensure their protocols reduce evidence tampering opportunities to the smallest, most trustworthy set of components possible.
arXiv Detail & Related papers (2024-01-31T21:54:53Z) - AI and Democracy's Digital Identity Crisis [0.0]
Privacy-preserving identity attestations can drastically reduce instances of impersonation and make disinformation easy to identify and potentially hinder.
In this paper, we discuss attestation types, including governmental, biometric, federated, and web of trust-based.
We believe these systems could be the best approach to authenticating identity and protecting against some of the threats to democracy that AI can pose in the hands of malicious actors.
arXiv Detail & Related papers (2023-09-25T14:15:18Z) - Argumentation Schemes for Blockchain Deanonymization [3.184882058033374]
We develop argumentation schemes to legal reasoning about cryptocurrency deanonymisation.
We demonstrate the applicability of the resulting schemes through an exemplary real-world case.
Ultimately, we envision that using our schemes in legal practice can solidify the evidential value of blockchain investigations.
arXiv Detail & Related papers (2023-05-26T12:37:55Z) - Complex Claim Verification with Evidence Retrieved in the Wild [73.19998942259073]
We present the first fully automated pipeline to check real-world claims by retrieving raw evidence from the web.
Our pipeline includes five components: claim decomposition, raw document retrieval, fine-grained evidence retrieval, claim-focused summarization, and veracity judgment.
arXiv Detail & Related papers (2023-05-19T17:49:19Z) - Untargeted Backdoor Attack against Object Detection [69.63097724439886]
We design a poison-only backdoor attack in an untargeted manner, based on task characteristics.
We show that, once the backdoor is embedded into the target model by our attack, it can trick the model to lose detection of any object stamped with our trigger patterns.
arXiv Detail & Related papers (2022-11-02T17:05:45Z) - Fact-Saboteurs: A Taxonomy of Evidence Manipulation Attacks against
Fact-Verification Systems [80.3811072650087]
We show that it is possible to subtly modify claim-salient snippets in the evidence and generate diverse and claim-aligned evidence.
The attacks are also robust against post-hoc modifications of the claim.
These attacks can have harmful implications on the inspectable and human-in-the-loop usage scenarios.
arXiv Detail & Related papers (2022-09-07T13:39:24Z) - Quantum Proofs of Deletion for Learning with Errors [91.3755431537592]
We construct the first fully homomorphic encryption scheme with certified deletion.
Our main technical ingredient is an interactive protocol by which a quantum prover can convince a classical verifier that a sample from the Learning with Errors distribution in the form of a quantum state was deleted.
arXiv Detail & Related papers (2022-03-03T10:07:32Z) - Synthetic Disinformation Attacks on Automated Fact Verification Systems [53.011635547834025]
We explore the sensitivity of automated fact-checkers to synthetic adversarial evidence in two simulated settings.
We show that these systems suffer significant performance drops against these attacks.
We discuss the growing threat of modern NLG systems as generators of disinformation.
arXiv Detail & Related papers (2022-02-18T19:01:01Z) - SNARKs to the rescue: proof-of-contact in zero knowledge [0.0]
This paper describes techniques to help with COVID-19 automated contact tracing, and with the restoration efforts.
We describe a decentralized protocol for proof-of-contact'' in zero knowledge where a person can publish a short cryptographic proof attesting to the fact that they have been infected.
arXiv Detail & Related papers (2020-05-26T13:00:37Z) - Cross-ethnicity Face Anti-spoofing Recognition Challenge: A Review [79.49390241265337]
Chalearn Face Anti-spoofing Attack Detection Challenge consists of single-modal (e.g., RGB) and multi-modal (e.g., RGB, Depth, Infrared (IR)) tracks.
This paper presents an overview of the challenge, including its design, evaluation protocol and a summary of results.
arXiv Detail & Related papers (2020-04-23T06:43:08Z) - Fake News, Disinformation, and Deepfakes: Leveraging Distributed Ledger
Technologies and Blockchain to Combat Digital Deception and Counterfeit
Reality [0.0]
Digital deception raises concerns over role of Internet and social media in democratic societies.
This overview aims to explore the potential of Distributed Ledger Technologies (DLTs) and blockchain to combat digital deception.
Some recommendations are enumerated to guide future researchers on issues that will have to be tackled to face fake news, disinformation and deepfakes.
arXiv Detail & Related papers (2019-04-10T18:42:45Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.