تحديات استخدام الأدلة الرقمية في عصر جرائم التزييف العميق
Corresponding Author(s) : القاضى. محمد حسن مكاوى
مجلة القانون والتكنولوجيا ,
مجلد 3 عدد 2 (2023)
الملخص
تناقش هذه الورقة البحثية تحديات استخدام الأدلة الرقمية في مواجهة جرائم التزييف العميق Deepfake. خاصة في عصر تتسارع فيه تكنولوجيا المعلومات لحظياً نحو ابتكار العديد من التقنيات الحديثة التي تثير الكثير من المخاوف، في ظل ظهور عدد كبير من القضايا التي لم تكن موجودة قبل بضعة أعوام، ولعل جرائم التزييف العميق تُعد الأخطر ضمن خوارزميات الذكاء الاصطناعي على تهديدات الأمن السيبراني.
تُرتكب الجرائم اليوم في بيئة رقمية، وفي البحث عن أدلة تلك الجرائم، فإنه لا غنى عن الاستفادة بالكميات الهائلة من البيانات الضخمة المخزنة في أجهزة الاتصالات والتى تعد أدلة رقمية. ومع تعقد التحقيقات في الجرائم السيبرانية بسبب معوقات جمع الأدلة، يسعى الباحث إلى مناقشة ماهية الأدلة الرقمية وأنواعها وأشكالها وخصائصها ومصادرها ومبادئها والتحديات التي تواجه تطبيقها، ثم استعراض القوانين المنظمة للأدلة الرقمية دوليا ومحليا مثل إتفاقية بودابست بشأن الجرائم السيبرانية، والقواعد الفيدرالية الأمريكية للأدلة الرقمية.
يسعي الباحث إلى كشف وتحليل المواد المنظمة لجمع الأدلة الرقمية في قانون مكافحة جرائم تقنية المعلومات المصري ولائحته التنفيذية، بالإضافة إلى تسليط الضوء على جرائم التزييف العميق التى تنتهك الخصوصية الرقمية كجريمة اصطناع أو نشر أو حيازة أشياء أو صور خادشة للحياء العام، وجريمة انتهاك الخصوصية بنشر صور شخصية دون رضاء المجنى عليه، وجريمة معالجة البيانات الشخصية للغير، وجريمة الانتقام الإباحي عبر تقنية التزييف العميق. وبناء علي مقارنة التشريعات الدولية مع نظيرتها المصرية يستخلص الباحث بعض النتائج والمقترحات للمشرع المصري بهدف معالجة أوجه القصور، والحد من المخاطر والتحديات لجمع الأدلة الرقمية فى جرائم التزييف العميق.
الكلمات المفتاحية: (الجرائم السيبرانية – الأدلة الرقمية - الذكاء الاصطناعى – التزييف العميق –الخصوصية الرقمية – الأمن السيبراني).
الكلمات المفتاحية
تنزيل الاقتباسات
Endnote/Zotero/Mendeley (RIS)BibTeX
- Legislations
- Convention on Cybercrime, Budapest, 23.XI.2001
- Code of Virginia, § 18.2-386.2.
- Texas-2019-SB751-
- California Election Code § 20010
- The Egyptian constitution 2014 amended in 2019
- The Penal code no 58 of 1937
- Anti-Cyber and Information Technology Crimes Law No. 175 of 2018
- Books and Articles
- Abdel Fattah Bayoumi Hijazi (2009) Digital Evidence and Forgery in Computer and Internet Crimes, An In-depth Study of Computer and Internet Crimes, Bahjat for Printing and Binding
- Ahmed Abdel-Mawgoud Zakir (2022) The crime of deep pornographic counterfeiting, a comparative study, The Legal Journal, Cairo University Faculty of Law, Khartoum Branch, Volume 11, Issue 7
- Ahmed Awad Bilal (2013) The Rule of Excluding Illegally Obtained Evidence in Comparative Criminal Procedures, 3rd Edition Dar Al-Nahda Al-Arabia
- Ahmed Fathy Sorour (2015) The Mediator in Penal Law, General Section, Sixth Edition, Cairo, Dar Al-Nahda Al-Arabiya
- Aju D, Anil Kumar Kakelli and Kishore Rajendiran (2021) A Comprehensive Perspective on Mobile Forensics: Process, Tools, and Future Trends, Confluence of AI, Machine, and Deep Learning in Cyber Forensics, premiere reference resource
- Andrii Skrypnyk and Ivan Titko (2019) Use of Information from Electronic Media in Criminal Proceeding of Several European States: Comparative Legal Research SOCRATES University Faculty of Law Electronic Scientific Journal of Law 3(15): DOI: https://doi.org/10.25143/socr.15.2019.3.008-023
- Ani petrosyan (2023) Worldwide digital population 2023, Statista
- Anna-Maria Osula and Mark Zoetekouw (2017) The Notification Requirement in Transborder Remote Search and Seizure: Domestic and International Law Perspectives. 11 Masaryk University Journal of Law and Technology DOI: https://doi.org/10.5817/MUJLT2017-1-6
- Ashley Dean (2020) Deepfakes, Pose Detection, and the Death of “Seeing is Believing”, Law and Technology Today
- Betül Çolak (2021) Legal Issues of Deepfakes, The institute of Internet & the just society
- Brett Lantz (2015) Machine Learning with R, Packt Publishing Limited; 2 edition
- Chet Hosmer (2002) Proving the Integrity of Digital Evidence with Time, 1st Int’l J. Of Digital Evidence
- Cybercrime Convention committee (T-CY) (2013) T-CY Guidance Note, Critical information infrastructure attacks, adopted by the 9th plenary of the T-CY june
- David Mugisha (2019) DIGITAL FORENSICS: Digital Evidence In Judicial System, International Journal of Cyber Criminology
- Dawn Lomer (2016) 15 Types of Evidence and How to Use Them, I SIGHT
- Delphine Baize (1999) De la contrefaçon à l'imitation, revue française de gestion, juin-juillet-aout
- Don Mason (2013) Digital Evidence and Computer Forensics, National Center for Justice and the Rule of Law
- Emad Sayed Haidar (2018) Primary Investigation of Computer Crimes, Ph.D. Thesis, Faculty of Law, Cairo University
- Eoghan Casey (2016) Focused Digital Evidence Analysis And Forensic Distinguishers 18 Digital Investigation DOI: https://doi.org/10.1016/j.diin.2016.08.004
- Gamil Abdel-Baki Al-Saghir (2001) Procedural aspects related to the Internet, Dar Al-Nahda Al-Arabiya
- Gavin manes, Elizabeth Downing, Lance Watson and Christopher Thrutchley (2007) New Federal Rules and Digital Evidence, Annual ADFSL conference on digital forencsics, security and Law
- Jean-Philippe Aumasson (2018) serious Cryptography A Practical Introduction to Modern Encryption, San Francisco,
- Jerry Norton, evidence meaning, The Editors of Encyclopaedia Britannica
- John Letzing (2021) How to tell reality from a deepfake, World Economic Forum
- Khaled Mamdouh Ibrahim (2009) Informational Crimes, 1st edition, Alexandria: University Thought House
- Larry E. Daniel and Lars E. Daniel (2012) Digital Forensics for Legal Professionals, Understanding Digital Evidence From The Warrant To The Courtroom, 1st edition, Syngress DOI: https://doi.org/10.1016/B978-1-59749-643-8.00003-1
- Mahmoud Salama Al-Sherif (2022) revenge porn crime through deep falsification and criminal responsibility for it, Journal of the Faculty of Law for Legal and Economic Research, Faculty of Law, Alexandria University
- Mamdouh Abd al-Hamid Abd al-Muttalib (2003) a proposed model for the rules for adopting digital evidence of evidence in computer crimes, published within the proceedings of the banking and electronic business conference organized by the Faculty of Sharia and Law at the United Arab Emirates University and the Dubai Chamber of Commerce and Industry,
- Martin Novak (2020) Digital Evidence in Criminal Cases Before the U.S. Courts of Appeal: Trends and Issues for Consideration, Journal of Digital Forensics Security and Law, Volume 14 Number 4 DOI: https://doi.org/10.15394/jdfsl.2019.1609
- Mazen Abbas (2022) Destroying Digital Evidence: Technical and Legal Dimensions, Master thesis, Cybercrime investigations professional master, Faculty of Law, British University in Egypt
- Mika Westerlund (2019) The Emergence of Deepfake Technology: A Review, Technology Innovation Management Review 9, no. 11 DOI: https://doi.org/10.22215/timreview/1282
- Mohamed El-Guindy (2021). Applying Digital Forensics Methodology to Open Source Investigations in Counterterrorism. Journal of Law and Emerging Technologies, 1(1), DOI: https://doi.org/10.54873/jolets.v1i1.32
- Mohamed Hassan Mekkawi (2022) Digital Privacy in International Law and International conventions, Journal of Media Research and Studies, Issue Twenty
- Mohamed Hassan Mekkawi (2023) Cyber blackmail between threats and protection: A study of the Egyptian and American Legislation, Journal of Law and Emerging Technology (JOLETS), Volume 2, Issue 2 DOI: https://doi.org/10.54873/jolets.v2i2.71
- Piotr Lewulis (2022) Collecting Digital Evidence from Online Sources: Deficiencies in Current Polish Criminal Law, Criminal Law Law Forum33, Springer DOI: https://doi.org/10.1007/s10609-021-09430-4
- Ramses Benham, (1971) The General Theory of Criminal Law, Alexandria, Origin of Knowledge publishing
- Rashad Rasras, Ziad Alkadi, and Mutaz Rasmi (2019) A Methodology Based on Steganography and Cryptography to Protect Highly Secure Messages, Engineering technology and applied science researches,
- Roman Dremliuga and Alexander Korobeev (2021) A Fight Against the Dissemination of Deepfakes in Other Countries: Criminal and Criminological Aspects, July 2021 Russian Journal of Criminology 15(3) DOI: https://doi.org/10.17150/2500-4255.2021.15(3).372-379
- S.Suguna, V.Dhanakoti, and R.Manjupriya (2016) A Study on Symmetric and Asymmetric key encryption algorithms, International Research Journal of Engineering and Technology (IRJET),
- Sabika Tasneem & Sidra Jabeen (2022) How to Overcome Major Problems in Handling Digital Evidence?, VIDIZMO
- Standard opereating procedures for the collection, analysis and presentation of electronic evidence
- Tarik Sorour (2010) Explanation of the Penal Code Special Section, Crimes of Persons and Money, second edition, Dar Al-Nahda Al-Arabiya
- The committee on the judiciary house of representatives, Federal Rules of Evidence, 2014
- William Y. Arms, Christophe Blanchi and Edward A. Overly (1997) An Architecture for Information in Digital Libraries, D-Lib Magazine,
- Xandra E. Kramer (2018) Challenges of Electronic Taking of Evidence: Old Problems in a New Guise and New Problems in Disguise Il Conferencia Internacional & XXVI Jornadas Iberoamericanas de Derecho Procesal IIDP & IAPL, La Prueba en el Proceso / Evidence in the process Atelier 2018
- Yuezun Li and Siwei Lyu (2019) Exposing DeepFake Videos by Detecting Face Warping Artifacts
- Zachary Roush (2022) Digital Forensics: Data Recovery and Steps You Can Take to Assist in the Recovery Effort, JDSPURA
المراجع
Legislations
Convention on Cybercrime, Budapest, 23.XI.2001
Code of Virginia, § 18.2-386.2.
Texas-2019-SB751-
California Election Code § 20010
The Egyptian constitution 2014 amended in 2019
The Penal code no 58 of 1937
Anti-Cyber and Information Technology Crimes Law No. 175 of 2018
Books and Articles
Abdel Fattah Bayoumi Hijazi (2009) Digital Evidence and Forgery in Computer and Internet Crimes, An In-depth Study of Computer and Internet Crimes, Bahjat for Printing and Binding
Ahmed Abdel-Mawgoud Zakir (2022) The crime of deep pornographic counterfeiting, a comparative study, The Legal Journal, Cairo University Faculty of Law, Khartoum Branch, Volume 11, Issue 7
Ahmed Awad Bilal (2013) The Rule of Excluding Illegally Obtained Evidence in Comparative Criminal Procedures, 3rd Edition Dar Al-Nahda Al-Arabia
Ahmed Fathy Sorour (2015) The Mediator in Penal Law, General Section, Sixth Edition, Cairo, Dar Al-Nahda Al-Arabiya
Aju D, Anil Kumar Kakelli and Kishore Rajendiran (2021) A Comprehensive Perspective on Mobile Forensics: Process, Tools, and Future Trends, Confluence of AI, Machine, and Deep Learning in Cyber Forensics, premiere reference resource
Andrii Skrypnyk and Ivan Titko (2019) Use of Information from Electronic Media in Criminal Proceeding of Several European States: Comparative Legal Research SOCRATES University Faculty of Law Electronic Scientific Journal of Law 3(15): DOI: https://doi.org/10.25143/socr.15.2019.3.008-023
Ani petrosyan (2023) Worldwide digital population 2023, Statista
Anna-Maria Osula and Mark Zoetekouw (2017) The Notification Requirement in Transborder Remote Search and Seizure: Domestic and International Law Perspectives. 11 Masaryk University Journal of Law and Technology DOI: https://doi.org/10.5817/MUJLT2017-1-6
Ashley Dean (2020) Deepfakes, Pose Detection, and the Death of “Seeing is Believing”, Law and Technology Today
Betül Çolak (2021) Legal Issues of Deepfakes, The institute of Internet & the just society
Brett Lantz (2015) Machine Learning with R, Packt Publishing Limited; 2 edition
Chet Hosmer (2002) Proving the Integrity of Digital Evidence with Time, 1st Int’l J. Of Digital Evidence
Cybercrime Convention committee (T-CY) (2013) T-CY Guidance Note, Critical information infrastructure attacks, adopted by the 9th plenary of the T-CY june
David Mugisha (2019) DIGITAL FORENSICS: Digital Evidence In Judicial System, International Journal of Cyber Criminology
Dawn Lomer (2016) 15 Types of Evidence and How to Use Them, I SIGHT
Delphine Baize (1999) De la contrefaçon à l'imitation, revue française de gestion, juin-juillet-aout
Don Mason (2013) Digital Evidence and Computer Forensics, National Center for Justice and the Rule of Law
Emad Sayed Haidar (2018) Primary Investigation of Computer Crimes, Ph.D. Thesis, Faculty of Law, Cairo University
Eoghan Casey (2016) Focused Digital Evidence Analysis And Forensic Distinguishers 18 Digital Investigation DOI: https://doi.org/10.1016/j.diin.2016.08.004
Gamil Abdel-Baki Al-Saghir (2001) Procedural aspects related to the Internet, Dar Al-Nahda Al-Arabiya
Gavin manes, Elizabeth Downing, Lance Watson and Christopher Thrutchley (2007) New Federal Rules and Digital Evidence, Annual ADFSL conference on digital forencsics, security and Law
Jean-Philippe Aumasson (2018) serious Cryptography A Practical Introduction to Modern Encryption, San Francisco,
Jerry Norton, evidence meaning, The Editors of Encyclopaedia Britannica
John Letzing (2021) How to tell reality from a deepfake, World Economic Forum
Khaled Mamdouh Ibrahim (2009) Informational Crimes, 1st edition, Alexandria: University Thought House
Larry E. Daniel and Lars E. Daniel (2012) Digital Forensics for Legal Professionals, Understanding Digital Evidence From The Warrant To The Courtroom, 1st edition, Syngress DOI: https://doi.org/10.1016/B978-1-59749-643-8.00003-1
Mahmoud Salama Al-Sherif (2022) revenge porn crime through deep falsification and criminal responsibility for it, Journal of the Faculty of Law for Legal and Economic Research, Faculty of Law, Alexandria University
Mamdouh Abd al-Hamid Abd al-Muttalib (2003) a proposed model for the rules for adopting digital evidence of evidence in computer crimes, published within the proceedings of the banking and electronic business conference organized by the Faculty of Sharia and Law at the United Arab Emirates University and the Dubai Chamber of Commerce and Industry,
Martin Novak (2020) Digital Evidence in Criminal Cases Before the U.S. Courts of Appeal: Trends and Issues for Consideration, Journal of Digital Forensics Security and Law, Volume 14 Number 4 DOI: https://doi.org/10.15394/jdfsl.2019.1609
Mazen Abbas (2022) Destroying Digital Evidence: Technical and Legal Dimensions, Master thesis, Cybercrime investigations professional master, Faculty of Law, British University in Egypt
Mika Westerlund (2019) The Emergence of Deepfake Technology: A Review, Technology Innovation Management Review 9, no. 11 DOI: https://doi.org/10.22215/timreview/1282
Mohamed El-Guindy (2021). Applying Digital Forensics Methodology to Open Source Investigations in Counterterrorism. Journal of Law and Emerging Technologies, 1(1), DOI: https://doi.org/10.54873/jolets.v1i1.32
Mohamed Hassan Mekkawi (2022) Digital Privacy in International Law and International conventions, Journal of Media Research and Studies, Issue Twenty
Mohamed Hassan Mekkawi (2023) Cyber blackmail between threats and protection: A study of the Egyptian and American Legislation, Journal of Law and Emerging Technology (JOLETS), Volume 2, Issue 2 DOI: https://doi.org/10.54873/jolets.v2i2.71
Piotr Lewulis (2022) Collecting Digital Evidence from Online Sources: Deficiencies in Current Polish Criminal Law, Criminal Law Law Forum33, Springer DOI: https://doi.org/10.1007/s10609-021-09430-4
Ramses Benham, (1971) The General Theory of Criminal Law, Alexandria, Origin of Knowledge publishing
Rashad Rasras, Ziad Alkadi, and Mutaz Rasmi (2019) A Methodology Based on Steganography and Cryptography to Protect Highly Secure Messages, Engineering technology and applied science researches,
Roman Dremliuga and Alexander Korobeev (2021) A Fight Against the Dissemination of Deepfakes in Other Countries: Criminal and Criminological Aspects, July 2021 Russian Journal of Criminology 15(3) DOI: https://doi.org/10.17150/2500-4255.2021.15(3).372-379
S.Suguna, V.Dhanakoti, and R.Manjupriya (2016) A Study on Symmetric and Asymmetric key encryption algorithms, International Research Journal of Engineering and Technology (IRJET),
Sabika Tasneem & Sidra Jabeen (2022) How to Overcome Major Problems in Handling Digital Evidence?, VIDIZMO
Standard opereating procedures for the collection, analysis and presentation of electronic evidence
Tarik Sorour (2010) Explanation of the Penal Code Special Section, Crimes of Persons and Money, second edition, Dar Al-Nahda Al-Arabiya
The committee on the judiciary house of representatives, Federal Rules of Evidence, 2014
William Y. Arms, Christophe Blanchi and Edward A. Overly (1997) An Architecture for Information in Digital Libraries, D-Lib Magazine,
Xandra E. Kramer (2018) Challenges of Electronic Taking of Evidence: Old Problems in a New Guise and New Problems in Disguise Il Conferencia Internacional & XXVI Jornadas Iberoamericanas de Derecho Procesal IIDP & IAPL, La Prueba en el Proceso / Evidence in the process Atelier 2018
Yuezun Li and Siwei Lyu (2019) Exposing DeepFake Videos by Detecting Face Warping Artifacts
Zachary Roush (2022) Digital Forensics: Data Recovery and Steps You Can Take to Assist in the Recovery Effort, JDSPURA