skip to main content
10.1145/3460537.3460550acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicbctConference Proceedingsconference-collections
research-article

Preventing Spoliation of Evidence with Blockchain: A Perspective from South Asia

Published: 20 July 2021 Publication History

Abstract

Evidence destruction and tempering is a time-tested tactic to protect the powerful perpetrators, criminals, and corrupt officials. Countries where law enforcing institutions and judicial system can be comprised, and evidence destroyed or tampered, ordinary citizens feel disengaged with the investigation or prosecution process, and in some instances, intimidated due to the vulnerability to exposure and retribution. Using Distributed Ledger Technologies (DLT), such as blockchain, as the underpinning technology, here we propose a conceptual model – ‘EvidenceChain’, through which citizens can anonymously upload digital evidence, having assurance that the integrity of the evidence will be preserved in an immutable and indestructible manner. Person uploading the evidence can anonymously share it with investigating authorities or openly with public, if coerced by the perpetrators or authorities. Transferring the ownership of evidence from authority to ordinary citizen, and custodianship of evidence from susceptible centralized repository to an immutable and indestructible distributed repository, can cause a paradigm shift of power that not only can minimize spoliation of evidence but human rights abuse too. Here the conceptual model was theoretically tested against some high-profile spoliation of evidence cases from four South Asian developing countries that often rank high in global corruption index and low in human rights index.

References

[1]
H. Campbell Black and M. A. Author, “Black's law dictionary,” 1999.
[2]
J. Rogers, “Prosecutorial Crimes and Corruption: The (White) Elephant in the Courtroom,” 2017.
[3]
J. Cohen, “Studies on Transitional Justice in Context Addressing Corruption Through Justice-Sensitive Security Sector Reform,” 2017.
[4]
T. Wyatt, K. Johnson, L. Hunter, R. George, and R. Gunter, “Corruption and Wildlife Trafficking: Three Case Studies Involving Asia,” Asian J. Criminol., vol. 13, no. 1, pp. 35–55, Mar. 2018.
[5]
A. Kouznetsov, S. Kim, and J. Pierce, “A longitudinal meta-analysis of corruption in international business and trade: Bridging the isolated themes,” Int. Trade J., vol. 32, no. 5, pp. 414–438, Oct. 2018.
[6]
K. A. Emmanuel, “Effect of Corruption on Corporate Governance in Selected Area Offices of Deposit Money Banks in Enugu State, Nigeria,” Int. Res. J. Manag. IT Soc. Sci., vol. 4, no. 2, 2017.
[7]
M. A. Zuckerman, “YES, I DESTROYED THE EVIDENCE-SUE ME? INTENTIONAL SPOLIATION OF EVIDENCE IN ILLINOIS.”
[8]
J. Warkotsch, Beyond the Panama Papers. The Performance of EU Good Governance Promotion: The Anticorruption Report, volume 4, 1st ed. Verlag Barbara Budrich, 2017.
[9]
J. C. Spring, “The Blockchain Paradox: Almost Always Reliable, Almost Never The Blockchain Paradox: Almost Always Reliable, Almost Never Admissible Admissible THE BLOCKCHAIN PARADOX: ALMOST ALWAYS RELIABLE, ALMOST NEVER ADMISSIBLE,” SMU Law Rev., vol. 72, no. 4, 2019.
[10]
V. Buterin, “A next-generation smart contract and decentralized application platform,” Etherum, no. January, pp. 1–36, 2014.
[11]
J. Benet, “IPFS - Content Addressed, Versioned, P2P File System,” Jul. 2014.
[12]
“Tor Project | Anonymity Online.” [Online]. Available: https://www.torproject.org/. [Accessed: 02-Jun-2020].
[13]
X. Xu, “A taxonomy of blockchain-based systems for architecture design,” Ieeexplore.Ieee.Org.
[14]
“LAHORE: Fire breaks out in LDA building - Newspaper - DAWN.COM.” [Online]. Available: https://www.dawn.com/news/361501. [Accessed: 22-May-2020].
[15]
“Eight plunge to death as fire erupts at LDA plaza in Lahore | The Express Tribune.” [Online]. Available: https://tribune.com.pk/story/546486/several-trapped-as-fire-erupts-at-lda-plaza-in-lahore/. [Accessed: 22-May-2020].
[16]
“PNB fraud: Nirav Modi papers gutted in fire at Income Tax office: The Tribune India.” [Online]. Available: https://www.tribuneindia.com/news/archive/nation/pnb-fraud-nirav-modi-papers-gutted-in-fire-at-income-tax-office-599478. [Accessed: 04-Jun-2020].
[17]
“BSTI destroys evidence, frames innocents: court.” [Online]. Available: https://www.newagebd.net/article/97234/bsti-destroys-evidence-frames-innocents-cou. [Accessed: 02-Jun-2020].
[18]
“Sri Lanka ex-minister held over phone calls recording scandal- The New Indian Express.” [Online]. Available: https://www.newindianexpress.com/world/2020/jan/17/sri-lanka-ex-minister-held-over-phone-calls-recording-scandal-2090807.html. [Accessed: 02-Jun-2020].
[19]
S. Indrajith, “The Island - Hirunika says her conversations with Ranjan tampered with.” [Online]. Available: http://island.lk/index.php?page_cat=article-details&page=article-details&code_title=217537]. I. [Accessed: 04-Jun-2020].
[20]
“Sahiwal killings forensic report finds CTD tampered with digital evidence.” [Online]. Available: https://www.geo.tv/latest/228221-sahiwal-killings-forensic-report-finds-ctd-tampered-with-digital-evidence. [Accessed: 22-May-2020].
[21]
“Benazir Bhutto assassination case: JIT complete report | The Express Tribune.” [Online]. Available: https://tribune.com.pk/story/339661/benazir-bhutto-assassination-case-jit-complete-report/. [Accessed: 22-May-2020].
[22]
“ফোনালাপ ফাঁস, যা বললেন ভিপি নুর | 846890 | কালের কণ্ঠ | kalerkantho.” [Online]. Available: https://www.kalerkantho.com/online/national/2019/12/04/846890. [Accessed: 02-Jun-2020].
[23]
“The Billion-Dollar Bank Job - The New York Times.” [Online]. Available: https://www.nytimes.com/interactive/2018/05/03/magazine/money-issue-bangladesh-billion-dollar-bank-heist.html. [Accessed: 28-May-2020].
[24]
“ফের কথা পাল্টালেন অর্থমন্ত্রী | daily nayadiganta.” [Online]. Available: https://www.dailynayadiganta.com/detail/news/155682?m=0. [Accessed: 28-May-2020].
[25]
W. Zia, B. Rasul, K. Khurshid, A. Aziz, N. Saeed, and I. Mangi, “FINAL INVESTIGATION REPORT OF JOINT INVESTIGATION TEAM-(PANAMA CASE) The Scope and Key Focus Areas of JIT's Investigation Report.”
[26]
U. Cheema, “Efforts on to save accused.” [Online]. Available: https://nation.com.pk/05-Dec-2009/efforts-on-to-save-accused. [Accessed: 04-Jun-2020].
[27]
“Uzair Baloch JIT report: Ali Zaidi appeals to CJP to take suo motu notice.” [Online]. Available: https://www.thenews.com.pk/latest/683414-uzair-baloch-jit-report-ali-zaidi-appeals-to-cjp-to-take-suo-motu-notice. [Accessed: 09-Jul-2020].
[28]
“Record tempering case: Court orders trial of ex-SECP chief Zafar Hijazi - SAMAA.” [Online]. Available: https://www.samaa.tv/news/2017/11/record-tempering-case-court-orders-trial-ex-secp-chief-zafar-hijazi/. [Accessed: 05-Jun-2020].
[29]
“Nirav Modi files shifted out before blaze: I-T probe - The Hindu.” [Online]. Available: https://www.thehindu.com/news/cities/mumbai/nirav-modi-files-shifted-out-before-blaze-i-t-probe/article24436986.ece. [Accessed: 02-Jun-2020].
[30]
“Court records destroyed in fire | Chandigarh News - Times of India.” [Online]. Available: https://timesofindia.indiatimes.com/city/chandigarh/Court-records-destroyed-in-fire/articleshow/7393788.cms. [Accessed: 02-Jun-2020].
[31]
“Bandarawela court arsonist arrested | Daily News.” [Online]. Available: https://www.dailynews.lk/2018/05/09/law-order/150398/bandarawela-court-arsonist-arrested. [Accessed: 02-Jun-2020].
[32]
“Fire at Deiyandara Court suspected to be an act of Arson to destroy evidence.” [Online]. Available: https://www.newsfirst.lk/2020/05/14/fire-at-deiyandara-court-suspected-to-be-an-act-of-arson-to-destroy-evidence/. [Accessed: 04-Jun-2020].
[33]
“Sri Lanka Charges Forensic Chief over Rugby Murder Cover Up, Could Get Death Sentence.” [Online]. Available: https://www.news18.com/news/world/sri-lanka-charges-forensic-chief-over-rugby-murder-cover-up-could-get-death-sentence-2262181.html. [Accessed: 04-Jun-2020].
[34]
“Ashiana, Paragon housing scheme records go up in flames in Lahore - SAMAA.” [Online]. Available: https://www.samaa.tv/news/2018/08/ashiana-paragon-housing-scheme-records-go-up-in-flames-in-lahore/. [Accessed: 05-Jun-2020].
[35]
“Nandipur power project payments, purchases record gutted.” [Online]. Available: https://www.thenews.com.pk/print/148967-Nandipur-power-project-payments-purchases-record-gutted. [Accessed: 05-Jun-2020].
[36]
“A story behind Asghar Khan case?” [Online]. Available: https://www.geo.tv/latest/195530-a-story-behind-asghar-khan-case. [Accessed: 06-Jun-2020].
[37]
S. Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System,” Www.Bitcoin.Org, p. 9, 2008.
[38]
A. Shahaab, B. Lidgey, C. Hewage, and I. Khan, “Applicability and Appropriateness of Distributed Ledgers Consensus Protocols in Public and Private Sectors: A Systematic Review,” IEEE Access, vol. 7, pp. 43622–43636, 2019.
[39]
G. Zyskind, O. Nathan, and A. S. Pentland, “Decentralizing privacy: Using blockchain to protect personal data,” Proc. - 2015 IEEE Secur. Priv. Work. SPW 2015, pp. 180–184, 2015.
[40]
A. Shahaab, R. Maude, C. Hewage, and I. Khan, “Blockchain: A Panacea for Trust Challenges In Public Services? A Socio-technical Perspective,” vol. 3, no. 2, pp. 1–11, 2020.
[41]
“Vermont Laws.” [Online]. Available: https://legislature.vermont.gov/statutes/section/12/081/01913. [Accessed: 29-May-2020].
[42]
“Provisions of the Supreme People ’s Court on Several Issues Concerning the Trial of Cases by Internet Courts-Supreme People ’s Court of the People ’s Republic of China.” [Online]. Available: http://www.court.gov.cn/zixun-xiangqing-116981.html. [Accessed: 29-May-2020].
[43]
“How we're investigating Digital Ledger Technologies to secure digital evidence - Inside HMCTS.” [Online]. Available: https://insidehmcts.blog.gov.uk/2018/08/23/how-were-investigating-digital-ledger-technologies-to-secure-digital-evidence/. [Accessed: 21-May-2020].
[44]
Z. Tian, M. Li, M. Qiu, Y. Sun, and S. Su, “Block-DEF: A secure digital evidence framework using blockchain,” Inf. Sci. (Ny)., vol. 491, pp. 151–165, Jul. 2019.
[45]
S. Bonomi, M. Casini, and C. Ciccotelli, “B-CoC: A blockchain-based chain of custody for evidences management in digital forensics,” in OpenAccess Series in Informatics, 2020, vol. 71.
[46]
A. Hamid Lone and R. Naaz Mir, “FORENSIC-CHAIN: ETHEREUM BLOCKCHAIN BASED DIGITAL FORENSICS CHAIN OF CUSTODY,” 2017.
[47]
S. Brotsis, “Blockchain Solutions for Forensic Evidence Preservation in IoT Environments.”
[48]
J. H. Ryu, P. K. Sharma, J. H. Jo, and J. H. Park, “A blockchain-based decentralized efficient investigation framework for IoT digital forensics,” J. Supercomput., vol. 75, no. 8, pp. 4372–4387, Aug. 2019.
[49]
D. Ankaa Wijaya and D. Ariadi Suwarsono, “Securing Digital Evidence Information in Bitcoin A Case Study in Directorate General of Taxes.”
[50]
B. Gipp, J. Kosti, and C. Breitinger, “Securing Video Integrity Using Decentralized Trusted Timestamping on the Bitcoin Blockchain,” MCIS 2016 Proc., Jan. 2016.
[51]
M. Liu, J. Shang, P. Liu, Y. Shi, and M. Wang, “VideoChain: Trusted Video Surveillance Based on Blockchain for Campus,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2018, vol. 11066 LNCS, pp. 48–58.
[52]
R. A. Haraty and B. Zantout, “The TOR Data Communication System: A Survey.”
[53]
M. G. Reed, P. F. Syverson, and D. M. Goldschlag, “Anonymous Connections and Onion Routing.”
[54]
“Tor: ‘The king of high-secure, low-latency anonymity’ | US news | theguardian.com.” [Online]. Available: https://www.theguardian.com/world/interactive/2013/oct/04/tor-high-secure-internet-anonymity. [Accessed: 27-May-2020].
[55]
“The Guardian SecureDrop.” [Online]. Available: https://www.theguardian.com/securedrop. [Accessed: 14-Jul-2020].
[56]
“Edward Snowden Explains How To Reclaim Your Privacy.” [Online]. Available: https://theintercept.com/2015/11/12/edward-snowden-explains-how-to-reclaim-your-privacy/. [Accessed: 14-Jul-2020].
[57]
“Brave passes 15 million monthly active users and 5 million daily active users, showing 2.25x MAU growth in the past year.” [Online]. Available: https://brave.com/15-million/. [Accessed: 09-Jul-2020].
[58]
J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-Policy Attribute-Based Encryption,” 2007.
[59]
M. Abdalla, E. Kiltz, and G. Neven, “Generalized key delegation for hierarchical identity-based encryption,” in European Symposium on Research in Computer Security, 2007, pp. 139–154.
[60]
N. Stephens, I. Khan, and R. Errington, “Analysing the role of virtualisation and visualisation on interdisciplinary knowledge exchange in stem cell research processes,” Palgrave Commun., vol. 4, no. 1, Dec. 2018.
[61]
“Ethereum Avg. Transaction Fee chart.” [Online]. Available: https://bitinfocharts.com/comparison/transactionfees-eth-sma7.html. [Accessed: 09-Jul-2020].
[62]
A. Egberts, “The Oracle Problem - An Analysis of how Blockchain Oracles Undermine the Advantages of Decentralized Ledger Systems,” SSRN Electron. J., Jun. 2019.
[63]
“Security vs usability: it doesn't have to be a trade-off.” [Online]. Available: https://www.telegraph.co.uk/connect/better-business/security-versus-usability-ux-debate/. [Accessed: 02-Jun-2020].

Cited By

View all
  • (2025)Multiparty trust levels in evidence management: Ensuring tamper-proof chain of custody in blockchain.Journal of Information Assurance and Security10.2478/ias-2024-000719:3(80-103)Online publication date: 20-Feb-2025
  • (2024)IoT Forensics-Based on the Integration of a Permissioned Blockchain NetworkBlockchains10.3390/blockchains20400212:4(482-506)Online publication date: 18-Dec-2024
  • (2024)Judicial System in Bangladesh Using Distributed Blockchain Technology2024 3rd International Conference on Advancement in Electrical and Electronic Engineering (ICAEEE)10.1109/ICAEEE62219.2024.10561869(1-5)Online publication date: 25-Apr-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICBCT '21: Proceedings of the 2021 3rd International Conference on Blockchain Technology
March 2021
216 pages
ISBN:9781450389624
DOI:10.1145/3460537
This work is licensed under a Creative Commons Attribution International 4.0 License.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 July 2021

Check for updates

Author Tags

  1. blockchain technology for evidence preservation
  2. distributed ledger technologies
  3. evidence protection
  4. spoliation of evidence in developing countries

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

  • Knowledge Economy Skills Scholarships (KESS 2)

Conference

ICBCT '21

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)18
  • Downloads (Last 6 weeks)3
Reflects downloads up to 25 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Multiparty trust levels in evidence management: Ensuring tamper-proof chain of custody in blockchain.Journal of Information Assurance and Security10.2478/ias-2024-000719:3(80-103)Online publication date: 20-Feb-2025
  • (2024)IoT Forensics-Based on the Integration of a Permissioned Blockchain NetworkBlockchains10.3390/blockchains20400212:4(482-506)Online publication date: 18-Dec-2024
  • (2024)Judicial System in Bangladesh Using Distributed Blockchain Technology2024 3rd International Conference on Advancement in Electrical and Electronic Engineering (ICAEEE)10.1109/ICAEEE62219.2024.10561869(1-5)Online publication date: 25-Apr-2024
  • (2024)Safeguarding Justice Employing Blockchain-Enabled Secure Chain of Custody Framework for Digital EvidenceInnovations in Electrical and Electronic Engineering10.1007/978-981-99-8661-3_1(1-11)Online publication date: 16-Feb-2024

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media