29/37 Report of the Special Rapporteur on extrajudicial, summary or arbitrary executions, Christof Heyns - Use of information and communications technologies to secure the right to life
Document Type: Final Report
Date: 2015 Apr
Session: 29th Regular Session (2015 Jun)
Agenda Item: Item3: Promotion and protection of all human rights, civil, political, economic, social and cultural rights, including the right to development
GE.15-08234 (E)
Human Rights Council Twenty-ninth session
Agenda item 3
Promotion and protection of all human rights, civil,
political, economic, social and cultural rights,
including the right to development
Report of the Special Rapporteur on extrajudicial, summary or arbitrary executions, Christof Heyns
Use of information and communications technologies
to secure the right to life
Summary
In the present report, submitted to the Human Rights Council pursuant to its
resolution 26/12, the Special Rapporteur on extrajudicial, summary or arbitrary executions
discusses the implications of information and communications technologies (ICTs) for the
protection of the right to life.
The Special Rapporteur surveys existing applications of ICTs for promoting,
protecting and monitoring human rights. While noting the potentially transformative role of
“civilian witnesses” in documenting human rights violations and the challenges of using the
evidence generated and transmitted by those witnesses — such as verification —, the
Special Rapporteur considers how various international human rights mechanisms currently
benefit from such material. He makes several recommendations, including that the Office
of the United Nations High Commissioner for Human Rights appoint a specialist in digital
evidence to assist it in making the best use of ICTs.
Contents
Paragraphs Page
I. Activities of the Special Rapporteur ....................................................................... 1–34 3
A. Communications ............................................................................................. 3 3
B. Visits ............................................................................................................... 4–6 3
C. Press releases .................................................................................................. 7–22 3
D. International and national meetings ................................................................ 23–34 4
II. Use of information and communications technologies to secure
the right to life ......................................................................................................... 35–106 5
A. Background ..................................................................................................... 35–43 5
B. Promotion and advocacy ................................................................................. 44–48 8
C. Prevention and protection ............................................................................... 49–66 9
D. Monitoring and fact-finding ............................................................................ 67–76 12
E. Evaluating evidence collected using information and communications
technologies .................................................................................................... 77–91 14
F. Use of information and communications technologies by human
rights mechanisms .......................................................................................... 92–106 17
III. Conclusion .............................................................................................................. 107–113 21
IV. Recommendations ................................................................................................... 114–125 22
A. To the United Nations .................................................................................... 114–116 22
B. To regional human rights mechanisms .......................................................... 117 22
C. To States ........................................................................................................ 118–120 22
D. To civil society organizations and academic institutions ............................... 121–122 23
E. To donors ....................................................................................................... 123 23
F. To technology and software corporations ...................................................... 124–125 23
I. Activities of the Special Rapporteur
1. The Special Rapporteur last submitted a report to the General Assembly in October
2014. In that report (A/69/265), he focused on four topics relating to the protection of the
right to life, namely, the role of regional human rights systems; less lethal and unmanned
weapons in law enforcement; resumptions in the application of the death penalty; and the
role of statistical indicators.
2. The Special Rapporteur submitted his previous report to the Human Rights Council
in June 2014. In that report (A/HRC/26/36), he discussed the protection of the right to life
during law enforcement and the need to bring domestic laws on the use of lethal force by
the police in line with international standards. He also called on the Council to provide the
outline of a legal framework on the use of remotely piloted aircraft or armed drones and to
remain engaged on the matter of autonomous weapons systems.
A. Communications
3. The Special Rapporteur made observations on communications sent between
1 March 2014 and 28 February 2015, and on replies received between 1 May 2014 and 30
April 2015 (A/HRC/29/37/Add.5).
B. Visits
4. From 3 to 7 November 2014, jointly with the Special Rapporteur on torture and
other cruel, inhuman or degrading treatment or punishment, Juan E. Méndez, the Special
Rapporteur visited the Gambia (A/HRC/29/37/Add.2).
5. Follow-up reports on missions undertaken by the Special Rapporteur to India and
Turkey are contained in A/HRC/29/37/Add.3 and 4, and the mission report to Papua New
Guinea is contained in A/HRC/29/37/Add.1.
6. Since the submission of his previous report to the Human Rights Council, the
Special Rapporteur has sent country visit requests to the Governments of Nigeria, Rwanda,
Ukraine and Yemen. He thanks the Governments of the Gambia, Iraq and Yemen for their
positive responses to his requests, and encourages the Governments of Egypt, Eritrea, Iran
(Islamic Republic of), Nigeria, Pakistan, Rwanda and Ukraine to accept his requests for a
visit.
C. Press releases1
7. The press releases set out below were issued by the Special Rapporteur between
March 2014 and March 2015.
8. On 6 March 2014, the Special Rapporteur issued a joint statement on allegations of
excessive use of force and violence against protesters, journalists and media workers in the
Bolivarian Republic of Venezuela.
1 Press releases of the Special Rapporteur are available from www.ohchr.org/en/NewsEvents/
Pages/NewsSearch.aspx?MID=SR_Summ_Executions.
9. On 18 March 2014, he issued a joint statement on the events leading to the death of
a Chinese human rights defender.
10. On 30 May 2014, he issued a joint press statement on the decision by the Security
Council not to refer the situation in the Syrian Arab Republic to the International Criminal
Court.
11. On 12 June 2014, he issued a statement calling on the Government of Mexico to put
an end to violations of the right to life in the country.
12. On 2 July 2014, jointly with other mandate holders, he called on the Government of
Sri Lanka to stop the promotion of racial and faith-based hatred.
13. On 4 July 2014, he issued a joint statement calling on the Government of Nepal to
amend the truth-seeking legislation that allowed for amnesties in cases of serious violations
of human rights and humanitarian law.
14. On 8 August 2014, he issued a joint statement expressing grave concern over the
escalating trend of arrest and sentencing of individuals in the Islamic Republic of Iran.
15. On 12 August 2014, he issued a joint statement expressing concern at the imminent
danger of massacre faced by the Yazidi population and other minority communities
exposed to attacks by the Islamic State in Iraq and Al-Sham (ISIS), in Iraq.
16. On 29 September 2014, he issued a joint statement on the possible adoption of Bill
No. 85 of 2013, aimed at restructuring and expanding the scope of the jurisdiction of
military courts in Colombia.
17. On 29 September 2014, he issued a statement urging the Government of Mexico to
investigate the deaths of 22 people.
18. On 10 October 2014, he issued a joint statement calling on the Government of
Mexico to investigate the disappearances of 43 students in the State of Guerrero.
19. On 26 November 2014, he issued a joint statement urging the President of the
United States of America to support the fullest possible release of a report on Central
Intelligence Agency interrogation practices.
20. On 5 December 2014, he issued a joint statement on the decisions of grand juries in
the United States not to bring to trial the cases of police officers involved in two high-
profile killings.
21. On 27 March 2015, he issued a joint press statement calling for the extradition or
prosecution by Spain of those responsible for human rights abuses.
22. During the reporting period, the Special Rapporteur also issued joint statements on
the death penalty in Bangladesh, Egypt, India, Indonesia, Iran (Islamic Republic of),
Pakistan, Saudi Arabia, the Sudan and the United States.
D. International and national meetings
23. The activities carried out by the Special Rapporteur during the period from 26
March to 22 July 2014 are outlined in the report submitted to the General Assembly at its
sixty-ninth session (A/69/265).
24. On 2 September 2014, the Special Rapporteur delivered an address on the death
penalty to the Human Dimension Committee of the Organization for Security and
Cooperation in Europe, in Vienna.
25. On 15 September 2014, he gave a lecture on autonomous weapons systems at the
Stellenbosch Institute for Advances Studies, in South Africa.
26. On 18 and 19 September 2014, he participated in the World Health Organization and
University of Cambridge Global Violence Reduction Conference 2014, at King’s College,
Cambridge, United Kingdom of Great Britain and Northern Ireland.
27. On 22 September 2014, he participated in a panel discussion entitled “Ensuring the
use of remotely piloted aircraft or armed drones in counter-terrorism and military
operations in accordance with international law, including international human rights and
humanitarian law”, organized by the Human Rights Council, in Geneva.
28. On 25 September 2014, he delivered a speech at the parliamentarian seminar on
drones, organized by the Parliament of Norway, in Oslo.
29. From 29 September to 3 October 2014, the Special Rapporteur participated in the
21st annual meeting of the special procedures mandate holders, in Geneva.
30. On 8 and 9 October 2014, he participated in the international workshop on
enhancing cooperation between United Nations and regional mechanisms for the promotion
and protection of human rights, organized by the Office of the United Nations High
Commissioner for Human Rights (OHCHR), in Geneva.
31. On 20 October 2014, he participated in a discussion at the University of Columbia,
New York, that was co-sponsored by Columbia Law School Human Rights Institute,
Rightlink, the Institute for the Study of Human Rights, the Human Rights and
Humanitarian Policy Concentration of the School of International and Public Affairs and
the Human Rights Law Review.
32. On 10 and 11 November 2014, he participated in the third Jakarta Human Rights
Dialogue, on the right to life and a moratorium on the death penalty in the countries of the
Association of Southeast Asian Nations (ASEAN), organized by OHCHR, the European
Union and the Indonesian representative to the ASEAN Intergovernmental Commission on
Human Rights, in Jakarta.
33. On 10 December 2014, he spoke at the launch of The War Report 2013: Armed
Conflicts and their Consequences, organized by the Geneva Academy of International
Humanitarian Law and Human Rights, in Geneva.
34. On 6 February 2015, he spoke at the ninth meeting of the Security Forum, entitled
“From drones to killer robots”, organized by Webster University in collaboration with the
United Nations Institute for Disarmament Research, in Geneva.
II. Use of information and communications technologies to secure the right to life
A. Background2
35. Given that many of the norms of international law concerning the right to life have
broadly been settled, the work relating to protecting this right often concerns disputed facts
2 The Special Rapporteur thanks the Centre of Governance and Human Rights, University of
Cambridge, in particular Ella McPherson and Thomas Probert, for their valuable research support. As
part of the research, descriptions of many of the applications and projects discussed have been
collated and are available from http://ictandhr.tumblr.com/.
or even the availability of facts. Individuals commit violations of the right to life not
because they believe it is justifiable, but because they believe they will not be called on to
justify themselves. That places a premium on fact-finding and evidence.
36. Because of the expertise that fact-finding requires, the development of human rights
methodologies has hitherto gone hand in hand with the professionalization of human
rights.3 It has evolved over what has been characterized as three generations of
communities involved in international human rights monitoring, each with its own
methods. First, there was the systematic review of available information by a distinguished
group of lawyers on behalf of intergovernmental organizations; second, came the fact-
finding revolution, led by large international human rights non-governmental organizations
(NGOs), that dramatically broadened the field but remained attached to witness
interviewing, which offers first-hand and very detailed accounting, but which can be very
time consuming and vulnerable to interference and selection biases. Over time, the
methodology of the second generation was incorporated into the practices of the first
generation, including the special procedures of the Human Rights Council. Now, however,
the field is being transformed again by a diverse and growing array of digitally enabled
actors — the third generation —, including witnesses, monitors and activists, characterized
by greater flexibility of fact-finding methodology and output.4 Each generation has
broadened the base of those who participate in human rights investigations. No generation
has invalidated earlier work, but it is important that each is able to draw on the strengths of
the others without compromising its own capacities.
37. It has become clear that information and communications technologies (ICTs) — the
hardware and software that facilitate the production, transmission, reception, archiving and
storage of information — can play an increasing role in the protection of all human rights,
including the right to life. Information harnessed in this way can be used to secure
accountability, but the technology can also ensure visibility or mobilize support for persons
in immediate danger.
38. In his daily work of identifying and assessing claims about unlawful killings, the
Special Rapporteur, like many others in the field, is increasingly dependent on information
mediated through technology. See, for example, the use of video material taken with cell
phones during the civil war in Sri Lanka to press both the State and the international
community for fuller investigation of the widespread violations of many human rights,
including the right to life, alleged to have occurred (A/HRC/17/28/Add.1). Similarly, in
preparing the report to the Human Rights Council on the safety of journalists, it became
clear how salient citizen journalists and civic media had become through their use of
technology to highlight and document violations around the world (A/HRC/20/22 and
Corr.1).
39. Increasing digital capacity is greatly enhancing the ability of ordinary people to
participate in human rights monitoring. Digital ICTs create opportunities for pluralism that
can democratize the process of human rights fact-finding, as well as offer mechanisms of
social accountability that citizens can use to hold States and others to account.5 Social
media have created a wealth of opportunities for civilians to highlight human rights
violations that they have witnessed, often unmediated by formal intergovernmental or non-
governmental structures. This has far-reaching implications for the established power
3 Molly K. Land, “Networked activism”, Harvard Human Rights Journal, vol. 22 (2009), pp. 205–43.
4 Philip Alston “Introduction: third generation human rights fact-finding”, Proceedings of the Annual
Meeting of the American Society of International Law, vol. 107 (April 2013), pp. 61–62.
5 Molly K. Land and others, #ICT4HR: Information and Communication Technologies for Human
Rights (World Bank Institute, 2012).
relations in human rights monitoring as there is a much wider community of human rights
monitors at work than ever before. It also presents opportunities in contexts that might
otherwise be closed to scrutiny. In circumstances where the physical presence of human
rights investigators can be a challenge, the sensitive use of ICTs can help to avoid
information austerity about situations that are of great interest to the human rights
community.
40. However, the development of ICTs should not be viewed as an unqualified good in
terms of the protection of human rights. Opportunities for States to carry out surveillance
on and interfere in the work of civil society have multiplied in the digital space, and the
Council should be vigilant concerning the dangers as well as the affordances of ICTs.6 The
use of technology by human rights activists and others can expose them to a range of risks,
of which many may not be aware.
41. In order to fully realize the potential of ICTs for human rights work, it is necessary
to address the issue of the digital divide in terms of both access and literacy. On the one
hand, ICTs facilitate pluralism within human rights work, allowing amateurs to
complement professionals; on the other hand, however, they can create new lines of
inclusion and exclusion that often correspond with pre-existing barriers to access to
resources and power, such as language, education, affluence or gender.7 Moreover, in
addition to providing opportunities to speak, pluralism is also about being heard. Being
heard by human rights fact-finders may depend on one’s ability to produce verifiable
information, which can in turn be determined by one’s digital literacy and digital footprint.8
The greater availability of digital information on human rights violations in one context or
region may lead to such violations being prioritized over more egregious but less visible
violations elsewhere.
42. It is clear that, if used sensibly, ICTs can enhance the protection of human rights,
including the right to life. Various parts of the wider United Nations system have been
investing significant time and resources into accommodating the affordances of ICTs into
their methods of work. The Office for the Coordination of Humanitarian Affairs and the
Department of Peacekeeping Operations have been developing advanced techniques for
crisis monitoring and mapping. The International Criminal Court has undertaken a review
into the way it handles digital evidence. Nonetheless, it still seems that the full potential of
these new tools has not been systematically investigated and internalized by the human
rights community (see A/65/321, paras. 3–10).
43. In the present report, the Special Rapporteur considers how ICTs present, in
particular, opportunities and challenges for the core modalities of human rights work, that
is, promotion, protection and monitoring or fact-finding to ensure accountability should a
violation occur. Although the impact of ICTs and social media on advocacy spaces has
been explored elsewhere, it will be briefly discussed here, as will the role of technology in
facilitating physical protection and the necessary security measures for safety in a digital
environment, which are both significant from the perspective of the mandate. The Special
Rapporteur will then address the question of using ICTs to collect information concerning
6 The Special Rapporteur notes that, at its twenty-eighth session, the Human Rights Council decided to
appoint a special rapporteur on the right to privacy in the digital age.
7 A. Trevor Thrall, Dominik Stecula and Diana Sweet, “May we have your attention please? Human
rights NGOs and the problem of global communication”, International Journal of Press/Politics, vol.
19, No. 2 (April 2014), pp. 135–59.
8 Ella McPherson, “Advocacy organizations’ evaluation of social media information for NGO
journalism: the evidence and engagement models”, American Behavioral Scientist, vol. 59, No. 1
(July 2014), pp. 124–48.
violations, which can foster accountability, exploring the challenges faced, including the
challenge of verification. Finally, the Special Rapporteur will consider the extent to which
digital evidence is currently used within parts of the international human rights machinery.
B. Promotion and advocacy
44. Greater capabilities for information sharing and communication present obvious and
now widely used opportunities to disseminate information about human rights, either
generally, as education, or as more focused advocacy in support of legislative or policy
changes, or calling for investigation or accountability concerning individual cases. Human
rights organizations can supplement traditional communication strategies using mainstream
media, by targeting the public directly.
45. Websites, for example, are used by intergovernmental and non-governmental
organizations, as well as States, to make information about human rights norms or legal
standards available to the widest possible audience. In previous reports, the Special
Rapporteur underlined the importance of clear and publicly available legal frameworks for
preventing arbitrary killings through the use of force or the application of the death penalty
(A/HRC/26/36 and A/67/275).9 ICTs clearly enable States to be more transparent towards
their populations and the international community.
46. In addition to providing information digitally, many human rights organizations
have developed expertise in using social media quickly and directly to engage members of
the public. ICTs may create new educational opportunities that foster environments
supportive of human rights. In Kenya, the PeaceTXT initiative sent peace-promoting text
messages to registered subscribers with the aim of de-escalating potential conflicts.
Elsewhere, NGOs have used secret filming to expose extreme cases of bigotry and
harassment in order to sensitize public.10
47. Digital ICTs can thus facilitate the widespread visibility of human rights, at least
among those connected through social media. Applications such as AiCandle or Pocket
Protest allow users to sign petitions, write e-mails or receive human rights information
using their mobile or smartphones and are particularly useful for urgent mobilizations.11
Messages can also be amplified using platforms such as Thunderclap. Ultimately, such
strategies can succeed in getting a case or issue on the public agenda.12
48. Questions remain as to whether these affordances are markedly changing advocacy
dynamics for the better. Campaigns compete for attention in an ever-proliferating
information context and are accessible — at least in the first instance — only to the
digitally literate.13 Meanwhile, the brevity of the messages and real-time culture of Twitter
may preclude or simplify coverage of complicated situations and the drivers of virality can
9 See also www.use-of-force.info.
10 Cynthia Romero, “What next? The quest to protect journalists and human rights defenders in a digital
world”, conference report, Freedom House, Mexico City, (February 2014), https://freedomhouse.org/
sites/default/files/What%27s%20Next%20-%20The%20Quest%20to%20Protect%20
Journalists%20and%20Human%20Rights%20Defenders%20in%20a%20Digital%20World.pdf.
11 See Amnesty International UK, “What is pocket protest?” (June 2013), www.amnesty.org.uk/what-
pocket-protest.
12 See Jiva Manske “Case studies: concrete examples of compelling and strategic use of social media”,
New Tactics in Human Rights (9 May 2013), https://www.newtactics.org/comment/6124.
13 Thrall, Stecula and Sweet, “May we have your attention please?” (see footnote 7).
sit uneasily with human rights evidence.14 Social networks are effective at increasing
participation, in part because they lessen the motivation that participation requires, which
can lead to shallow or fickle forms of activism (so-called “clicktivism”).15 However, some
have argued that such seemingly insignificant moves are significant in their accumulation,
demonstrating a “supportive environment” and “drawing awareness”.16
C. Prevention and protection
49. ICTs can contribute to the prevention of violations of the right to life, by State or
non-State actors, in a variety of ways. First of all, alert applications can provide physical
and digital protection to potentially vulnerable groups, including human rights defenders.
While that enables networks to take advantage of digital connectivity, the very same
connectivity is a risk for those vulnerable to digital snooping or other forms of surveillance.
Secondly, there is need for education on digital security and safety. Surveillance can,
however, also be a preventive mechanism, and tactics ranging from live-streaming
demonstrations or police operations to using satellite imagery will be discussed below.
1. Alert applications
50. Various organizations are developing alert applications that activists, journalists and
others can use to send a signal that they are in danger. For example, Amnesty International
developed a “panic button” application — disguised as an ordinary utility — that allows
users secretly to activate an alarm by sending a text message, and, optionally, geolocation
data, that can be sent to pre-selected contacts by rapidly pressing the power button of the
phone. When activists or journalists are attacked or detained, their phones are often taken
for the lists of contacts they store. The hidden application will continue to broadcast alerts,
which are not only calls for help but also warnings to the person’s contacts that they should
take security precautions themselves.17 Other applications or devices have been developed
with the same objective.18
51. Such applications respond to the challenges posed by a lack of information and time
lags, which can restrict efforts to protect individuals at risk. Practitioners believe that there
is an approximately 48-hour window after an individual is detained or threatened during
which a large-scale response is most likely to have the greatest effect. There are numerous
examples worldwide in which mass response to detention — coordinated using social
media or otherwise — has persuaded authorities to recalculate the merits of keeping an
individual in custody.
52. The new technologies thus fit into wider and long-standing strategies of
communicating with a trusted network when at risk and mobilizing a wide community to
respond vocally or visibly to an arbitrary act against an individual. It is important, however,
to bear in mind the potential risks of such technology which could become the basis of
identification and targeting.
14 Dustin N. Sharp, “Human rights fact-finding and the reproduction of hierarchies” (6 June 2014),
Social Science Research Network, http://papers.ssrn.com/abstract=2341186.
15 Malcolm Gladwell, “Small change: why the revolution will not be tweeted”, The New Yorker
(4 October 2010), www.newyorker.com/reporting/2010/10/04/101004fa_fact_gladwell.
16 Stephanie Vie, “In defense of ʻslacktivismʼ: the Human Rights Campaign Facebook logo as digital
activism”, First Monday, vol. 19, No. 4 (April 2014), http://firstmonday.org/ojs/index.php/fm/article/
view/4961.
17 See https://panicbutton.io/.
18 BBC News, “Smart bracelet protects aid workers” (5 April 2013), www.bbc.com/news/technology-
22038012.
2. Importance of digital security
53. While they provide additional capabilities for those working on human rights issues,
ICTs can present a number of additional risks, and to mitigate those risks, persons
potentially at risk of violations, including human rights defenders, should take the
requirements of digital security seriously. Digital security can include software to scan
computers for spyware, resources such as Security in-a-Box, as well as digital security
helplines or forums.19
54. Activists can communicate more securely using virtual private networks, encryption
programmes or Tor, a browser designed to increase the anonymity of Internet users.
Nonetheless, developers and trainers should caution users that full privacy and anonymity
online is never guaranteed. The risk of digital insecurity should also be weighed by larger
international human rights actors, both intergovernmental and non-governmental, with
regard to their interactions with smaller organizations or individuals.
55. Evaluating the merits and demerits of secure digital encryption does not fall squarely
within the mandate of the Special Rapporteur. However, it is certainly a complex issue,
with the demands of human rights investigation pulling in both directions, that becomes an
issue of concern to this mandate holder when digital insecurity leads directly to
victimization, including the threats or actual commission of extrajudicial killings. The use
of mainstream social media platforms to share human rights information can pose security
risks both for “civilian witnesses” and their subjects.
3. Monitoring for protection
56. The proliferation of surveillance and recording afforded by ICTs not only greatly
enhances the opportunities to hold individuals to account, as will be discussed below, but
can also prevent the commission of violations. Awareness of surveillance can have a
significant deterrent effect if coupled with credible accountability regimes, as demonstrated
by the use of closed-circuit television surveillance to deter crime. Belief in this deterrent
effect is so strong that some activists have been known to pretend to film events, even
though their phone battery was dead, as a strategy against abduction or arrest.20
57. Perhaps the most directly applicable example of this, and one that addresses a core
interest of the Special Rapporteur — the excessive use of force by law enforcement — is
the use of body-worn cameras by police officers. A recent study of the use of such
technology in California, United States, found that officers’ use of force dropped by 59 per
cent on the introduction of the cameras, and complaints concerning excessive force dropped
by nearly 90 per cent.21 Other trial projects, involving the use of smartphones as body-worn
cameras that transmit video, audio and geolocation information, are being run in Brazil,
Kenya and South Africa.22
19 Resources provided through such programmes as New Tactics in Human Rights
(www.newtactics.org) provide spaces for online knowledge exchange on various aspects of human
rights work, including digital security.
20 Stephanie Hankey and Daniel Ó Clunaigh, “Rethinking risk and security of human rights defenders in
the digital age”, Journal of Human Rights Practice, vol.5, No. 3 (November 2013), p. 543.
21 Barak. Ariel, William A. Farrar and Alex Sutherland, “The effect of police body-worn cameras on use
of force and citizens’ complaints against the police: a randomized controlled trial”, Journal of
Quantitative Criminology (November 2014).
22 Graham Denyer Willis and others, “Smarter policing: tracking the influence of new information
technology in Rio de Janeiro”, Igarapé Institute Strategic Note 10 (November 2013); see also the
Smart Policing initiative, http://en.igarape.org.br/smart-policing/.
58. Just as the preventive impact of closed-circuit television works best where there is
cognition of its presence, some argue that body-worn cameras deter violations because of
their institutionalized use, whereby the police must issue a warning that incidents are being
recorded, which creates cognition of surveillance among both police and civilians.23
59. Concerns exist around possible violations of the right to privacy that body-worn
cameras may generate, leading to suggestions that they be turned off upon entering a home
or when speaking with victims. Others consider that individual officers should not have
control over their cameras, so as to reduce opportunities for selective documentation.24
Concerns also exist with respect to access to and secure storage of the footage. Although
questions remain to be answered, many feel that the deterrent effect of police body-worn
cameras warrants further deployment.25 Linked with the potential advantages of the police
recording themselves is the equally important protection of citizens’ right to record the
police.
60. If body-worn cameras bring surveillance to the micro level of interpersonal
interactions, at the opposite end of the spectrum is the surveillance potential of remote
sensing imagery, either from satellites or drones. Initiatives such as the Satellite Sentinels
Project and Amnesty International’s Eyes on Darfur campaign have highlighted the
possibilities of such mechanisms. Raising awareness among potential perpetrators that
vulnerable areas are being watched could deter violations, or at least those that are visible
remotely.26 However, such surveillance is expensive and can involve rather arbitrary
decisions about which communities or places to monitor. As with other surveillance
methods, the deterrent effect of the technology is connected to both awareness of its
existence (making the accompanying media campaign significant) and the credible threat of
punitive measures.27
61. Those surveillance methods use the threat of accountability in the future to condition
behaviour in the present. It is potentially also possible to exploit the capacities of ICTs to
use information from the (recent) past to influence what happens in the present. Social
media analysis could predict hotspots of human rights violations in real time. For example,
the Hatebase database collects data on the vocabulary and incidence of hate speech on
social media based on the correlation between hate speech and the risk of genocide and is
used to predict regional violence.28
62. There are limitations, however, to the possibilities of ICTs as early warning systems.
Although “big data mining”, i.e. collecting large amounts of data, has a record of being
23 The effect of cognition of surveillance was perhaps most memorably elaborated by Jeremy Bentham,
but its criminological effects, as well as its potential dangers, have not been technologically realized
until recently.
24 Bracken Stockley “Public support for police body cameras – but who controls on/off switch?” The
justice gap (March 2014), http://thejusticegap.com/2014/03/body-worn-video-cameras-scrutiny/.
25 Robert Muggah, “Why police body cameras are taking off, even after Eric Garner’s death”, IPI
Global Observatory (11 December 2014), http://theglobalobservatory.org/2014/12/
police-body-cameras-eric-garner/; see also Alexandra Mateescu, Alex Rosenblat and Danah Boyd,
“Police body-worn cameras”, Data & Society Research Institute Working Paper (February 2015),
www.datasociety.net/pubs/dcr/PoliceBodyWornCameras.pdf.
26 Nathaniel A. Raymond and others, “While we watched: assessing the impact of the satellite sentinel
project”, Georgetown Journal of International Affairs (26 July 2013), http://journal.georgetown.edu/
while-we-watched-assessing-the-impact-of-the-satellite-sentinel-project-by-nathaniel-a-raymond-et-
al/.
27 Patrick Meier, “Will using ʻlive’ satellite imagery to prevent war in the Sudan actually work?”
iRevolutions (30 December 2010), http://irevolution.net/2010/12/30/sat-sentinel-project/.
28 See http://www.hatebase.org/.
good for conflict prediction and prevention, it has been less effective for analysis and
actionable transmission.29
63. Big data mining and remote sensing work for the prevention of human rights
violations also raises methodological and ethical concerns. For example, vulnerable
populations could be put at risk by the remote documentation, and thus identification, of
their locations and situations.30 Moreover, potential inaccuracies in the statistical analysis of
human rights data arise from selection bias, duplication and constraints on data capture.31
4. Towards digital due diligence
64. The application of surveillance to prevent violations of human rights may be so
effective as to imply that States with the capacity to take advantage of them have a
responsibility to do so. Cameras have been used in police vehicles and interrogation rooms
and consideration might be given to other contexts in which such surveillance could have a
preventive effect (for example, prisons), subject to the limitations imposed by other rights,
such as the right to privacy.
65. Other affordances of ICTs can be harnessed by States to fulfil their responsibilities
concerning prevention or precaution. For example, there have been instances of States
using text messages or calls to warn civilian populations before launching air raids. The
recording devices on certain advanced weaponry offer the potential for greater oversight,
but that will require more transparency.
66. In the digital space, however, the responsibility of due diligence extends beyond
States. Human rights monitoring organizations — both intergovernmental and non-
governmental — need to give thought to the consequences of their correspondence or use
of information. Traditional understandings of “informed consent” may need to be revisited.
D. Monitoring and fact-finding
67. As noted above, the particular nature of violations of relevance to this mandate place
a premium on fact-finding. Human rights organizations have developed rigorous fact-
finding methodologies, not least to protect the credibility of their evidence, and thus their
reputations. ICTs and the user-generated content they facilitate have broadened and
democratized the process of fact-finding by empowering both spontaneous and solicited
“civilian witnesses.” The most challenging dimension of this evolution is balancing
democratization with a continued, perhaps heightened, requirement for authority and thus
for verification of digital evidence.
1. Civilian witnesses and video evidence
68. The advantages of video evidence have been appreciated by campaigners for several
decades, at least since the Rodney King incident in the early 1990s. The re-purposing of
private closed-circuit television footage for public investigations has become
29 Sheldon Himelfarb, “Can big data stop wars before they happen?” (United States Institute of Peace,
25 April 2014), www.usip.org/publications/can-big-data-stop-wars-they-happen.
30 See, for example, Harvard Humanitarian Initiative, “The Signal Program on Human Security and
Technology” (2013), http://hhi.harvard.edu/programs-and-research/crisis-mapping-and-early-
warning/signal-program.
31 See the work of the Human Rights Data Analysis Group, https://hrdag.org/coreconcepts/.
commonplace.32 At the international level, the conviction by the International Criminal
Court of Thomas Lubanga, which admitted video footage of interviews of child soldiers
who had been impressed into his militia, proved that video recordings could be used to fill
an evidentiary gap.33 Of course, it is not only witnesses or subjects of violations who are
producing such information, but also perpetrators. Moreover, information does not have to
be shared publicly for it to be useful to human rights investigations.
69. While information from civilian witnesses has long been a cornerstone of human
rights fact-finding, it has traditionally been gathered by professionals. Either professionals
or their trusted contacts would be present during the production and transmission of
information from witness to fact-finder during an interview, for example. ICTs enable
civilian witnesses autonomously to produce and transmit information.
70. At its most spontaneous, civilian witnessing can occur through widely available
consumer tools or platforms. The ubiquity of smartphones enables the capture of visual and
auditory information, which can be easily transmitted through digital channels such as
social media platforms. The benefit of those production and transmission strategies is that
they do not require any particular expertise; the drawback is that they may limit the
metadata (such as source, place and time of production) which could be instrumental to
verifying the information. Alternatively, applications such as InformaCam and EyeWitness
are specifically designed to enhance the metadata supplied with photographic or video
information and to maintain the chain of custody.34
71. A number of NGOs are already offering training courses to citizen witnesses and
trainers on how to produce and transmit material with stronger evidentiary value.
WITNESS, Amnesty International, Tactical Tech and the Open Society Justice Initiative
are all conducting such activities on a global or regional scale. The training may concern
both personal protection issues, such as those concerning digital security, discussed above,
and practical information about the kind of detail to capture in witness videos (such as
licence plates, uniform numbers or landmarks) and how to share them.35
2. Crowdsourcing information
72. Somewhere between the traditional methods of soliciting information from civilian
witnesses and the spontaneous production and transmission of information by civilian
witnesses are the practices of crowdsourcing and crowdseeding. Crowdsourcing involves
turning over tasks to a large, unspecified group recruited through an open call but that is not
necessarily representative, as such calls privilege the participation of those with resources
such as technology, money and time. Crowdseeding is a form of bounded crowdsourcing
whereby participants can be randomly sampled for representativeness and equipped with
the technology and resources necessary for gathering information. A relationship develops
32 See, for example, Daoud Kuttab, “Video technology exposing Isreali violations in the West Bank”,
Al-Monitor (8 July 2014), www.al-monitor.com/pulse/originals/2014/07/israel-palestine-cctv-camera-
footage-occupation-settlers.html.
33 Matthew Shaer, “The media doesn’t care what happens here: can amateur journalism bring justice to
Rio’s favelas?” The New York Times (18 February 2015), www.nytimes.com/2015/02/22/
magazine/the-media-doesnt-care-what-happens-here.html.
34 See information about Informacam, https://guardianproject.info/informa/; and New Perimeter,
“eyeWitness to atrocities”, www.newperimeter.org/our-work/access-to-justice/eyeWitness.html.
35 See, for example, Kelly Matheson, “Video as evidence: basic practices”, Witness blog (16 February
2015), http://blog.witness.org/2015/02/video-as-evidence-basic-practices/.
over time between chosen witnesses and the project, with the credibility and trust that such
a relationship entails.36
73. Besides potentially widening the scope of human rights work, involving civilian
witnesses as a crowd could strengthen the effect of human rights advocacy through greater
participation and awareness as well as potential corroboration.37 However, there are risks.
By publicly mapping information, crowds may jeopardize vulnerable populations. The
techniques may also be used against the human rights community, for example to perform
“human intelligence tasks” such as matching faces to photographs of protests.38
3. Satellite evidence
74. Satellite footage can have a transformative impact on human rights work. Central to
the deterrent effect of satellites is the knowledge that, should a violation occur, somebody is
going to use the footage to expose it. For example, earlier this year, fact-finders at Amnesty
International and Human Rights Watch undertook “change detection” analysis of satellite
images of two towns in north-eastern Nigeria that revealed extensive fire damage. The
information was cross-referenced with eyewitness testimonies to establish that the fires
were part of militant attacks in which hundreds were killed. Although that linking was
important because, on their own, satellite images do little to establish culpability and
causality, the case highlights the benefits of remote sensing for hard-to-reach areas.39
75. Satellite evidence can be combined with other digital processes, such as social media
mapping, in order to better convey information. Reports on the origins of missile or artillery
attacks or the impacts of drone strikes have relied on satellite photography.40
76. At present, much of the satellite imagery relied on for human rights work is owned by commercial operators. This means that, for satellite imagery to be available, there must
be a commercial interest in the area and no cloud cover; also, the imagery will tend to be of
low resolution. Military-grade satellite imagery has broader coverage and higher resolution,
but there is often a reluctance to share information (rather than classified imagery itself)
with human rights investigators, even when national security is not at stake.
E. Evaluating evidence collected using information and communications
technologies
77. The flood of information from civilian witnesses can only have evidentiary potential
if the information can be gathered and evaluated. It is therefore important that human rights
organizations be able to integrate that information into their traditional methods of research
36 Patrick Meier, “From crowdsourcing crisis information to crowdseeding conflict zones (updated)”,
iRevolutions (10 July 2012), http://irevolution.net/2012/07/10/crowdsourcing-to-crowdseeding/.
37 Molly Beutz Land, “Peer producing human rights”, Alberta Law Review, vol. 46, No. 4 (2009),
p. 1115.
38 Jonathan Zittrain, “The Internet creates a new kind of sweatshop”, Newsweek (7 December 2009),
www.newsweek.com/internet-creates-new-kind-sweatshop-75751.
39 Christoph Koettl, “The story behind the Boko Haram satellite images”, Amnesty International
UK/Blogs (17 January 2015), www.amnesty.org.uk/blogs/ether/story-behind-boko-haram-satellite-
images.
40 Bellingcat, “Origin of artillery attacks on Ukrainian military positions in Eastern Ukraine between 14
July 2014 and 8 August 2014” (17 February 2015), www.bellingcat.com/news/uk-and-
europe/2015/02/17/origin-of-artillery-attacks/; and Forensic Architecture, “Drone strikes:
investigating covert operations through spatial media”, www.forensic-architecture.org/case/drone-
strikes/.
and analysis, especially given the importance of reporting credibility. However, evaluating
digital content produced by civilian witnesses can be a challenge, including with regard to
the identification of relevant information, and verification and storage of that information.
Technological developments as well as initiatives in information evaluation practices may
help to address those challenges.
1. Problem of volume
78. The proliferation of digitally produced and transmitted civilian witness information
means that identifying relevant information can be an overwhelming task. Using networks
to crowdsource the filtering process can be an intermediary step, but it will likely be
necessary to harness the analytical affordances of digital ICTs to address their own “signal-
to-noise ratio” problem. One way is through the automated cleansing of large datasets of
potentially relevant information. For example, CrisisNET aims to collect and standardize
real-time digital crisis data from thousands of sources so that researchers can search quickly
and efficiently.41 Although machines cannot replace human expertise in the evaluation of
human rights information — for assessing the relevance of information for evidence is an
ultimately subjective task —, technology can help human rights monitors to concentrate on
the most important material. More research is needed in this regard.
79. There will probably always be a need to curate digital content for monitoring and
consumption by a wide audience of interested parties. Such curation will involve a
combination of automation and traditional fact-finding or verification skills. One successful
model is the WITNESS Human Rights Channel, which uses material that is verified in
partnership with the social media news agency Storyful.
2. Problem of transience
80. Because much of the material of relevance to human rights investigations could be
online for only a very limited time (owing to pressures either on the uploader or the
platform not to host content of a certain type),42 it is important that investigators have the
capacity to capture all the information that might be needed and to store it securely. The
development of guidelines for national investigators as well as human rights monitors
should be a priority.43
81. The storage of material for human rights investigations can be a security risk for
activists. Applications such as Eyewitness and International Evidence Locker have been
designed to allow witnesses to upload evidence to a cloud-based repository and to use or
delete it as best suits their circumstances. Those applications also allow secure transmission
of information to target audiences while maintaining the metadata of the information as
well as the information itself. Nonetheless, collaboration between investigators and
technology corporations will remain a vital consideration.
3. Problem of verification
82. Although sometimes raised as a major impediment to the embrace of digital
evidence, verification is not a new issue: it concerns the conventional institutional need to
establish the credibility of a source and the accuracy of its information before acting on or
41 See http://crisis.net/about/.
42 Madeleine Bair, “Navigating the ethics of citizen video: the case of a sexual assault in Egypt”, Arab
Media & Society, vol. 19, (2014), http://arabmediasociety.com/?article=844.
43 Resources exist to guide activists concerning the archiving of their material, for example, see
http://archiveguide.witness.org/. The Office of the Prosecutor of the International Criminal Court is
currently finalizing guidelines for investigators.
staking one’s reputation to a claim. While the nature of the information being verified and
the specific techniques are shifting rapidly as ICTs evolve, the fundamentals of verification
remain constant: identifying and corroborating the content and provenance of information
received.
83. Verification usually involves checking the origin, source, time and place of the
information in question, as well as the chain of custody. Fact-finders must take time to
establish the identity of the source, assess the file for metadata indicators, then cross-
reference those with other sources. A new set of methods, often referred to as information
forensics, is emerging, but many elements of the process still require human expertise and
painstaking checks, akin to old-fashioned investigation.
84. The witness may provide information concerning the time, place and content in an
interview, or, alternatively, may include that information in the file. The former method
underlines the importance of cross-fertilization between the methodology of the second and
third generations of fact-finding and the extent to which the sources of one can bolster the
authority of the other, while the latter can occur either during the production process, for
example by verbalizing the location and date, or through the transmission process. The
information may also be evident through physical landmarks (such as road signs or
geological features), weather conditions, clothing, weapons or dialect captured in the digital
file, or it may also be identified through the metadata automatically embedded in the file,
such as the time stamp. That information can be corroborated and cross-referenced against
other digital files and evidence, including satellite images. Several videos of the same
incident can be time synced so as to provide a multiperspective video timeline.44
85. Recognition of the need for expertise concerning digital verification is growing. The
more knowledge about information forensics that human rights fact-finders have, the more
comfortably and quickly they will be able to use digital information from civilian
witnesses. The Verification Handbook, published in 2014, quickly became a reference point
for humanitarians and human rights fact-finders.45
86. Increasing verification knowledge among civilian witnesses is likely to ease the
verification process. WITNESS, for example, provides a guide on what information to
include in videos documenting human rights violations.46
87. Another strategy to facilitate verification is through initiatives that support either the
provision of information for verification or the evaluation of that information. Such
initiatives have been referred to as “verification subsidies” and may incorporate human
participation or designed technologies.47 Applications such as InformaCam automate the
addition of verification cues at production and prompt their inclusion during transmission.
Alternatively, the power of the crowd can be used retrospectively, as is done, for example,
44 See, for example, the Rashomon Project, http://rieff.ieor.berkeley.edu/rashomon/about-rashomon/.
45 Craig Silverman (ed.) Verification Handbook: An ultimate guideline on digital age sourcing for
emergency coverage (European Journalism Centre, 2014), http://verificationhandbook.com/.
46 See “A field guide to enhancing the evidentiary value of video for human rights”,
http://verificationhandbook.com/book/appendix.php.
47 Ella McPherson,Error! Hyperlink reference not valid. “Digital civilian witnesses of human rights
violations: easing the tension between pluralism and verification at human rights organizations” in
Lind (ed.), Producing Theory 2.0: The Intersection of Audiences and Production in a Digital World,
vol. 2 (forthcoming 2015).
with Veri.ly.48 Alternatively, Checkdesk, a platform designed for individual newsrooms,
allows for collaborative and transparent verification among members of a bounded crowd.
88. While the technical difficulty of verification should not be exaggerated, its
importance cannot be overstated. If used by a human rights organization, unverified
material can lead to the degradation of the organization’s credibility, but hoaxes can also
create combustible situations — so-called “digital wildfires” — that can lead to violence.49
Many States already have laws limiting freedom of expression for reasons such as
incitement of violence or panic, but they are struggling with how to apply those laws
effectively to online activities. Any regulation in that area will remain complex and
controversial; it has been suggested that the online community itself must fill the gap, with
important roles for community curators and moderators.50 The Special Rapporteur on
contemporary forms of racism, racial discrimination, xenophobia and related intolerance
reported to the Human Rights Council in 2014 on the complex challenges for his mandate
posed by the Internet and social media (A/HRC/26/49). In addition to pointing out policies
developed by some of the major social media sites, he also highlighted the importance of
civil society initiatives.
4. Using digital evidence
89. Most of the information that can be captured through the streams described above is
“convenience data”, but its value to a human rights investigation cannot always be
immediately assessed. Moreover, it is important not to privilege images as much can also
be learned from blogs or micro-blogs, which can be used to corroborate other sources.
90. While verification subsidies potentially speed up the verification process, using them
requires digital literacy about verification among human rights fact-finders and civilian
witnesses. It is unclear how knowledge about producing and transmitting information
effectively, safely and ethically for evidence will be diffused among civilian witnesses,
particularly those who are acting in a truly spontaneous manner. Pre-emptive steps to train
human rights monitors will favour the prepared, but it is often the accidental witnesses who
are best placed to be truly informative.
91. For that reason, organizations such as WITNESS advocate for the standard inclusion
of an “eyewitness” or “proof” mode, resembling InformaCam, in preloaded photo and
video applications on smartphones and in social media platforms.51 The inclusion of those
features in mainstream applications and platforms means that civilian witnesses are more
likely to know about them and thus to use them.
F. Use of information and communications technologies by human rights
mechanisms
92. Thus far, the present report has addressed the applications of ICTs in human rights
work in general, rather than their use by the international machinery for the protection of
human rights. It is important that the international community be open to these new
48 See Victor Naroditskiy, “Veri.ly – getting the facts straight during humanitarian disasters”, (August
2014), www.software.ac.uk/blog/2014-08-13-verily-getting-facts-straight-during-humanitarian-
disasters.
49 This issue was raised in the World Economic Forum Global Risks report, 8th ed. (2013), pp. 23–27.
50 See Lee Howell, “Only you can prevent digital wildfires” (8 January 2013), www.nytimes.com/
2013/01/09/opinion/only-you-can-prevent-digital-wildfires.html.
51 Sam Gregory “How an Eyewitness mode helps activists (and others) be trusted”, WITNESS Blog
(3 March 2014), http://blog.witness.org/2014/03/eyewitness-mode-helps-activists/.
methodologies, otherwise advocacy organizations and civilian witnesses will find it
difficult to take full advantage of existing accountability mechanisms. As noted above,
technological evidence must not be seen as the endpoint — without meaningful
accountability it is just more sound and fury — and it is therefore vital that official channels
designed to facilitate accountability for human rights violations be open to this type of
evidence.
93. The broader United Nations community has invested in harnessing the potential of
ICTs, particularly in the area of crisis information management (A/69/517). The United
Nations Office of Information and Communications Technology has, in conjunction with
the ICT4Peace Foundation, coordinated the Crisis Information Management Advisory
Group, which has become a forum to discuss technological developments in humanitarian
aid and crisis information management.52 The Office for the Coordination of Humanitarian
Affairs (OCHA) has reviewed the impact of ICT-enabled networks on humanitarian relief
and has, since then, undertaken a number of collaborative projects to take advantage of the
power of the crowd.53 Meanwhile, the Global Pulse project is a major undertaking on the
humanitarian impact of big data.54
94. In 2014, the Department of Peacekeeping Operations requested the Expert Panel on
Technology and Innovation in United Nations Peacekeeping to recommend ways in which
technology and innovation could enhance their operational effectiveness. The panel issued
its final report in February 2015,55 in which it recommended that, among other things, the
Security Council create a special technical mission to use technical audio, visual,
monitoring and surveillance technologies to inform decision-making.
95. The United Nations human rights mechanisms have not completely ignored the
advances of ICTs. Several of them have created successful social media presences as part of
their promotional engagement strategies and campaigns to reach millions of users
worldwide. Although the promotional uses of digital ICTs are significant, the Special
Rapporteur will now consider the engagement of various international and regional human
rights mechanisms that use ICTs for fact-finding and accountability.
1. Special procedures and other mechanisms of the Human Rights Council
96. This report was in part motivated by the Special Rapporteur’s investigation of video
evidence of executions at the end of the civil war in Sri Lanka (see A/HRC/17/28/Add.1,
appendix). In that instance, the Special Rapporteur was able to provide impetus to a broad
coalition pressing for accountability by independently seeking out technical experts to
comment on the metadata of the videos, the ballistics of the weapons shown in the videos
and the movement of the bodies. Given the rapid developments in the field, it is quite
possible that such expertise is easier to find today, however, the capacity of OHCHR has
not changed greatly. Special procedures mandate holders would benefit from in-house
technical knowledge for selecting the best experts for specific tasks.
97. As noted above, the verification of user-generated content is fundamental to reaping
the advantages of ICTs in terms of broadening access to and the scope of human rights
work. However, it is important that verification not be viewed as a barrier to the use of
digital evidence. The technical difficulty of verification is sometimes exaggerated and used
52 See http://ict4peace.org/crisis-information-management-advisory-group-cimag-retreat/.
53 OCHA Policy and Studies Series, Humanitarianism in the Network Age: including world
humanitarian data and trends 2012, (2013), https://docs.unocha.org/sites/dms/Documents/
WEB%20Humanitarianism%20in%20the%20Network%20Age%20vF%20single.pdf.
54 See http://www.unglobalpulse.org/.
55 See http://www.performancepeacekeeping.org/offline/download.pdf.
as an excuse not to engage with such evidence. Verification should be demystified within
the international human rights machinery, so that the advantages offered by digital evidence
can be more fully embraced.
98. With respect to the dangers of ignorance concerning digital security, it is noteworthy
that many Human Rights Council mechanisms encourage individual contact through
insecure generic email addresses, with no warnings concerning security or suggestions of
alternatives. While offering such contact points is a laudable effort to broaden access to its
mechanisms, the Council is arguably failing in its duty of care by failing to adequately warn
individuals or groups of the potential risks that they may be taking.
99. Of course, the impression should not be given that the special procedures of the
Council are closed off to information from the new data streams discussed in the present
report. Indeed, much of the NGO reporting on which special procedures’ communications
are based derives information from such sources. However, the fact that the Council is not
yet open to weighing such evidence or reporting places it at risk, over the coming years, of
isolation from the broader human rights community with which it has done so much to
engage in the past.
2. National and international commissions of inquiry
100. Various national investigations have made use of digital evidence. The finding that
the death of Ian Tomlinson during a demonstration in London in 2009 was an unlawful
killing hinged on a witness video that was tracked down and handed over to the
Independent Police Complaints Commission by an investigative reporter. Also, the ongoing
inquiry into the shootings at Marikana, South Africa, received ostensibly probative video
evidence that the South African Human Rights Commission has had synchronized by a
technological expert.56
101. At the international level, OHCHR has partnered with the Operational Satellite
Applications Programme of the United Nations, and with various external partners on an ad
hoc basis, to use both satellite and video evidence in the work of international commissions
of inquiry.57 As discussed above, when combined with other techniques of human rights
monitoring, satellite imagery can provide extremely valuable information for inclusion in
reporting to the Human Rights Council.
102. The Commission of Inquiry on Human Rights in the Democratic People’s Republic
of Korea made use of both satellite imagery and clandestinely recorded videos and
photographs in order to demonstrate the existence of several political prison camps (see
A/HRC/25/63). The Commission relied on the videos and photographs to the extent that
they could confirm their authenticity, and, with respect to satellite imagery, on
commercially available footage. The Commission noted that higher resolution satellite
imagery produced by more technologically advanced States would, almost certainly, have
provided further information. Unfortunately, despite requests, those images were not made
available to the Commission (see A/HRC/25/CRP.1, para. 60–61).
103. The Independent International Commission of Inquiry on the Syrian Arab Republic
has also made use of a certain amount of satellite and digital material, as one might expect
56 See the “Written submissions of the South African Human Rights Commission regarding ʻPhase
One’” in the Marikana Commission of Inquiry (29 October 2014), www.sahrc.org.za/home/21/
files/SAHRC%20PHASE%20ONE%20FINAL%20WRITTEN%20SUBMISSIONS.pdf.
57 See http://www.unitar.org/unosat/.
from a body monitoring one of the most documented conflicts in history.58 In conducting its
special inquiry into the Al-Houla killings, for example, the Commission examined satellite
imagery to review access points to an area where killings had occurred, as well as to review
statements made by interviewees and to assess claims that the Government had razed
civilian areas in Damascus and Hama.59 The Commission mentioned instances where it had
received or found video evidence supporting allegations of torture or other forms of ill-
treatment or footage of killings, but noted when it could not verify those recordings.60
Video material has also been directly gathered by the United Nations Supervision Mission
in the Syrian Arab Republic and referred to in reports of the Commission.61 The
Commission also undertook preliminary reviews and conducted forensic analyses of 26,948
photographs allegedly taken between 2011 and 2013 in government detention facilities.62 In
more recent reports, the Commission cited a number of videos that had been created and
distributed by ISIS; those videos have been a challenge to the current methodology of using
videos only to substantiate events for which there are other witness testimonies, but the
Commission has given them weight as confessions.63
3. International criminal accountability
104. Information derived from digital sources has become increasingly important to
international tribunals, including several of those established during the 1990s, and now
also the International Criminal Court. In assessing the importance of such evidence to
moving forward its work, the Court has been proactive in establishing working methods
that can accommodate such evidence. In 2012 and 2013, the Court encouraged partners to
exchange ideas and expertise on strategies to improve the capacity of investigators and
prosecutors to gather and analyse digital evidence concerning serious international crimes.64
105. One of the recommendations from that process was that the Office of the Prosecutor
should “hire specialists trained in advanced cyberinvestigation techniques and familiar with
cutting-edge technologies” and who would have “experience and credentials specific to
digital investigations, including computer and smartphone forensics, online investigations,
data storage and management, advanced cyberinvestigation techniques, and superior
knowledge of digital security.” It was suggested that this would “go a long way toward
building a robust in-house capacity for vetting digital data and extracting quality
evidence.”65 On the basis of that consultation, the Office of the Prosecutor appointed a
specialist in the verification of digital material to work as a “cyberinvestigator”, as part of
its team of other investigators from legal and law enforcement backgrounds.
106. Recognizing the transient nature of much of the relevant material, the Office of the
Prosecutor has adopted the practice of surveying digital evidence that is available when the
preliminary examinations are opened. As noted above, the Court has developed guidelines
for use by investigators concerning best practices with respect to the retrieval, storage and
58 See Marc Lynch, Deen Freelon and Sean Aday, Syria’s Socially Mediated Civil War (United States
Institute of Peace, 2014).
59 See A/HRC/21/50, annex IV; and A/HRC/22/59, annex XIII, para. 18.
60 A/HRC/21/50, annex VIII, para. 31; A/HRC/22/59, annex V, para. 22.
61 A/HRC/21/50, annex V, para. 14.
62 A/HRC/27/60, para. 26.
63 A/HRC/28/69 and Corr.1, annex II, paras. 21–25.
64 See Human Rights Center, University of California, Beyond Reasonable Doubt: Using scientific
evidence to advance prosecutions at the International Criminal Court (Berkeley, 2012); and Digital
fingerprints: Using electronic evidence to advance prosecutions at the International Criminal Court
(Berkeley, 2014).
65 See Human Rights Center, Digital Fingerprints, p. 11 (see footnote 64).
investigation of digital evidence, including the capture of websites and seizure of hard
drives.
III. Conclusion
107. ICTs have had a profound effect on the impact and character of human rights
work. However, it is important that the process not be taken too far, especially in
information-scarce environments, where it will be increasingly important to resist the
temptation to privilege digital material. While new technology may raise expectations
for information, it should be noted that traditional human rights monitoring and
reporting make no claim to comprehensiveness, and neither should analysis of new
ICT-enabled data streams. The latter should not be viewed as a shortcut, but rather as
part of a complementary process that fits into pre-existing strategies used by human
rights actors.
108. It is also important that ICTs be embraced with due acknowledgement of their
risks. While in many cases, technology can be a vehicle for pluralism, issues of a
digital divide remain. In order to benefit from digital protection measures, human
rights defenders need to know about them. The digitally enabled promotion of human
rights may contribute to a culture of awareness, but if promotion resources for those
initiatives are diverted away from more traditional channels, this will be to the
detriment of vulnerable groups who are not online.
109. It is also important to acknowledge the importance of ownership and control of
the mechanisms of digital ICTs. The use of digital evidence often depends on the
willingness of technology corporations to host, store and facilitate searches for this
information. Moreover, in some States, access to externally owned commercial social
media platforms, such as Twitter, Facebook and YouTube, are blocked. In others,
entire communication networks have been shut down to suppress the flow of
information.
110. Keeping up with digital literacy and paying for new technology can be difficult
for human rights organizations. One solution would be collaboration between ICT
specialists and human rights experts to develop, implement and even commercialize
new applications for human rights, or to negotiate low-cost or free licensing for the
use of existing solutions. Donors are interested in funding technological developments,
but reportedly can focus more on the technology than on the training that is required
to deploy it. However, technology can be useless or even dangerous without training.
As one observer noted, “sooner or later, all technology problems become education
problems.”66
111. The collaborative framework can be extended further. Indeed, a wide range of
organizations are willing to assist international human rights mechanisms in more
fully benefiting from ICTs. Coordination efforts have been made in that regard, but it
seems that the human rights community is currently far behind other international
agencies — most notably in terms of crisis response — in fully realizing that
potential.67
66 Christopher Neu, “Mobile applications for atrocity prevention require mobile students”, TechChange,
(19 February 2013), http://techchange.org/2013/02/19/mobile-applications-for-atrocity-prevention-
require-mobile-students/.
67 In the humanitarian response context, Digital Humanitarian Network has produced two reports aimed
at both sides of such partnerships: see http://digitalhumanitarians.com/content/guidance-
112. What is needed to support those United Nations human rights mechanisms that
respond directly to evidence that is often gathered by third parties is in-house capacity
to conduct a triage-like function on digital material, as an initial assessment of the
likely value of the source, before passing it on to external experts for full verification
or other technical assessment. Such a “first opinion” and liaison capacity within the
secretariat of international mechanisms, including the special procedures, would
encourage greater use of potentially valuable information.
113. Of course, technological advances in gathering evidence remain only as
effective, in real terms, as the accountability mechanisms to which they contribute and
which are, in large part, external to the technology. In that sense, the improved
information streams offered by ICTs are necessary, but not sufficient, for better
protection of human rights, including the right to life. That underlines the importance
of international human rights mechanisms, including the Human Rights Council and
its special procedures, being able to fully interact with such materials. Some human
rights NGOs — the so-called “second generation” — are keeping pace with the
innovations of the “third generation.” It is vital that the “first generation” catch up.
IV. Recommendations
A. To the United Nations
114. OHCHR should appoint, on a consultancy basis and as soon as possible, a
digital content specialist to provide advice with respect to information received from
or produced by civilian witnesses and to serve as an interface with external networks
of expertise in that area. That should be seen as a stopgap solution to ensure quick
movement on that front. At the same time, OHCHR should, with the assistance of the
appointed specialist, set about establishing longer-term capacity.
115. As international commissions of inquiry and fact-finding missions are ad hoc
bodies that are likely to receive a large and increasing quantity of digital evidence,
consideration should be given to expertise for analysing such material in the staffing
requirements for those mechanisms.
116. More broadly, OHCHR should take steps to improve awareness of and to
familiarize its staff and processes at all levels with the requirements of digital security.
That involves the development of minimum standards of due diligence with respect to
the digital security of sources. Guidelines for United Nations staff on the ethics of
using information from open sources, especially social media, should also be
developed in consultation with relevant partners.
B. To regional human rights mechanisms
117. Regional human rights mechanisms should evaluate their capacity to receive
and use digital material and to promote best practices in terms of digital security.
Where necessary, they should liaise with OHCHR to increase that capacity.
collaborating-formal-humanitarian-organizations, and http://digitalhumanitarians.com/content/
guidance-collaborating-volunteer-technical-communities.
C. To States
118. States should respect and, where necessary, protect the individual’s right to
make a recording of a public event, including the conduct of law enforcement officials,
and to “record back” an interaction in which he or she is being recorded by a State
agent.
119. States should consider measures that may be taken innovatively to use ICTs to
prevent violations of the right to life by its agents, particularly the excessive use of
force by law enforcement officers, or in custodial settings. That could include, but is
not limited to, innovations such as body-worn cameras, with due consideration given
to the necessary safeguards of the right to privacy.
120. States with advanced capacity to capture satellite imagery should consider
providing at least derived information to international human rights mechanisms that
have such needs, if necessary, on a confidential or non-attributable basis.
D. To civil society organizations and academic institutions
121. While remaining open to developments from a rapidly evolving field of
technological innovation, civil society organizations should adopt an evidence-based
assessment of the benefits of new ICT-enabled mechanisms. In collaboration with
academics, they should concentrate resources on those areas where ICTs genuinely
afford greater capacity, while maintaining the vital work they do using other, more
traditional methods. Academics and human rights organizations should also
collaborate to prioritize research in areas where it is needed most, for example to
address the “volume challenge”.
122. Those responsible for human rights curricula and training programmes should
consider including modules on the effective use of ICTs to secure human rights.
Larger organizations should continue to seek to assist those with more limited digital
resources.
E. To donors
123. Donors should acknowledge that technological solutions to human rights
problems can only be as successful as the training that accompanies them. In addition
to expecting rigorous and honest appraisals of the utility and impact of new
applications or devices, donors should also mainstream and support efforts to improve
digital literacy and digital security awareness among those communities that most
need it.
F. To technology and software corporations
124. Developers should favourably consider the inclusion of an “eyewitness” or
“proof” function in mainstream camera applications that gives users the option to
include the metadata and establish the integrity of the file, so as to make video
evidence valuable, without the need to have previously downloaded a specialized
application.
125. Social media platforms should devise a process whereby user-generated content
that may be of relevance to human rights investigations, but that has been removed
from platforms because of community standards, can remain available to fact-finders.