WS #190 Judging in the Digital Age Cybersecurity Digital Evidence

27 Jun 2025 10:15h - 11:30h

WS #190 Judging in the Digital Age Cybersecurity Digital Evidence

Session at a glance

Summary

This discussion focused on “Judging in the Digital Age: Cybersecurity and Digital Evidence,” examining how courts worldwide are adapting to function as digital ecosystems where evidence, records, and hearings increasingly exist online. Dr. Naza Nicholas from Tanzania’s Internet Society opened the session by explaining the initiative’s goal to bridge the gap between judiciary systems and internet governance spaces, building on previous efforts since 2022 to bring judges into digital rights discussions.


Judge Eliamani Laltaika from Tanzania’s High Court outlined the five key considerations courts use when evaluating digital evidence: relevance, authenticity, system integrity, chain of custody, and statutory compliance. He emphasized that these principles apply regardless of whether evidence originates domestically or internationally, and noted that everyone creates digital evidence through daily activities like taking photos or using messaging apps.


Professor Peter Swire from Georgia Tech highlighted three critical areas where digital evidence differs from traditional evidence: authentication challenges in verifying identity, maintaining chain of custody through digital signatures and hash functions, and addressing AI hallucinations where artificial intelligence systems may generate false citations or information. He recommended implementing two-factor authentication and systematic verification of AI-generated content.


The discussion addressed significant challenges including spyware surveillance, with Dr. Jacqueline Pegato from Data Privacy Brazil citing cases where surveillance tools were used against activists and even Supreme Court justices. Advocate Umar Khan from Pakistan emphasized the need for balanced surveillance that protects both security and privacy rights, while Marin Ashraf from IT4Change discussed specific challenges in prosecuting online gender-based violence cases, particularly regarding evidence authentication and platform cooperation.


Participants identified critical gaps including outdated legislation, insufficient judicial training in cybersecurity, and the need for better international cooperation frameworks. The session concluded with calls for continued capacity building, multi-stakeholder dialogue, and systematic reforms to ensure courts can effectively handle digital evidence while protecting fundamental rights in an increasingly connected world.


Keypoints

## Major Discussion Points:


– **Digital Evidence Authentication and Chain of Custody**: The panel extensively discussed the five key considerations for admitting digital evidence in courts: relevance, authenticity, system integrity, chain of custody, and statutory compliance. Speakers emphasized the challenges of verifying digital evidence, especially when it originates from different jurisdictions or involves AI-generated content.


– **Cross-Border Legal Cooperation and Jurisdictional Challenges**: Multiple speakers addressed the complexities of handling digital evidence that crosses international boundaries, discussing the need for legal harmonization, mutual legal assistance treaties, and standardized procedures for accessing data from foreign jurisdictions while respecting data protection laws.


– **State Surveillance vs. Individual Rights**: The discussion covered the tension between legitimate law enforcement needs for digital surveillance and cybersecurity measures versus protecting individual privacy rights and ensuring fair trials. The Brazilian spyware case and Pakistani digital rights experiences were highlighted as examples of this ongoing challenge.


– **Online Gender-Based Violence and Platform Accountability**: Speakers examined the specific challenges courts face when dealing with online gender-based violence cases, including difficulties in obtaining digital evidence from platforms, ensuring survivor privacy, and addressing algorithmic amplification of harm.


– **Judicial Capacity Building and Training Gaps**: A recurring theme was the urgent need for specialized training for judges and legal professionals in cybersecurity, digital forensics, AI literacy, and data protection to keep pace with rapidly evolving technology and emerging forms of digital crime.


## Overall Purpose:


The session aimed to bridge the gap between the judiciary and the internet governance community by creating a permanent platform for dialogue and exchange. The goal was to bring judges into the Internet Governance Forum space, break down institutional silos, and equip judicial systems with the knowledge and tools needed to handle digital evidence and cybersecurity challenges in the modern era.


## Overall Tone:


The discussion maintained a collaborative and educational tone throughout, characterized by mutual respect among panelists from different jurisdictions and backgrounds. The atmosphere was constructive and forward-looking, with speakers sharing practical experiences and concrete recommendations. There was a sense of urgency about addressing the digital knowledge gap in judicial systems, but the tone remained optimistic about the potential for capacity building and international cooperation. The session concluded on an encouraging note, with participants expressing commitment to continued collaboration and training initiatives.


Speakers

**Speakers from the provided list:**


– **Naza Nicholas** – Dr. Naza Nicholas Kirama from Tanzania, works with Internet Society Tanzania Chapter, coordinator for the Tanzania Internet Governance Forum


– **Eliamani Isaya Laltaika** – Honorable Dr. Eliamani Isaya Laltaika, sitting judge of High Court of Tanzania


– **Peter Swire** – Professor at Georgia Tech, law professor teaching in the College of Computing, leader of the Cross-Border Data Forum, expert on cross-border data and law enforcement access issues


– **Jacqueline Pegato** – Works with Data Privacy Brazil, a Brazilian NGO focused on digital rights in Brazil and the Global South


– **Umar Khan** – Advocate of the high court in Pakistan, digital rights and defense lawyer, works on cyber cases in Pakistan


– **Marin Ashraf** – Senior research associate at IT4Change (India-based not-for-profit organization), works on online gender-based violence, digital platform accountability, information integrity, and AI governance issues


– **Adriana Castro** – Professor at External University in Colombia


– **Participant** – (Role/expertise not specified in transcript)


**Additional speakers:**


None identified beyond the provided speakers names list.


Full session report

# Judging in the Digital Age: Cybersecurity and Digital Evidence – Discussion Report


## Introduction and Context


The session “Judging in the Digital Age: Cybersecurity and Digital Evidence” aimed to bridge the gap between judicial systems and internet governance communities. Dr. Naza Nicholas from Tanzania’s Internet Society opened by explaining that this initiative began in 2023 in Japan, building on efforts to bring judges into digital rights discussions and create dialogue platforms between the judiciary and multi-stakeholder internet governance spaces.


The panel included Judge Eliamani Isaya Laltaika from Tanzania’s High Court, Professor Peter Swire from Georgia Tech, Dr. Jacqueline Pegato from Data Privacy Brazil, Advocate Umar Khan from Pakistan’s high court, Marin Ashraf from India’s IT4Change, and Professor Adriana Castro from Colombia’s External University. Dr. Nicholas outlined four key questions the session would address: how courts assess digital evidence, balancing surveillance with privacy rights, handling cross-border digital evidence, and protecting court systems from cyber threats.


## Digital Evidence Assessment Framework


Judge Laltaika established the foundational principles courts use when evaluating digital evidence, emphasizing five key considerations: relevance, authenticity, system integrity, chain of custody, and statutory compliance. He noted that “digital evidence assessment follows the same principles regardless of jurisdiction, with no discrimination between domestic and foreign evidence.”


The judge provided historical context, explaining that digital evidence is relatively new in legal development, beginning in the late 1970s in the United States. He made the discussion relevant by observing that “each one of you is currently creating digital evidence or electronic evidence from the pictures you are taking, from your geolocation, from the voices you are sending over WhatsApp.”


## Technical Challenges and AI Concerns


Professor Swire highlighted critical differences between digital and traditional evidence, particularly around authentication and chain of custody. He emphasized that two-factor authentication is significantly more secure than password-based systems and that digital signatures using mathematical hash operations can prove document integrity.


Swire raised concerns about AI-generated content, providing a specific example: “We know that AI can have hallucinations. We’ve seen law cases in the United States where a lawyer just put in a question to the AI system and got back case citations that were not true. They made them up.” He recommended systematic verification of AI-generated content, suggesting judges sample-check citations when full verification isn’t feasible.


## Surveillance and Privacy Rights


Dr. Pegato presented concerning examples of spyware surveillance tools being used against activists and Supreme Court justices in Brazil. She argued that “when surveillance happens outside transparent legal frameworks, courts are sidelined and unable to guarantee fundamental rights they are tasked to protect.” She emphasized that spyware tools “move way beyond traditional investigative methods, such as telephonic interceptions” and require strict judicial oversight.


Advocate Khan offered a different perspective, acknowledging that “surveillance is necessary for cybersecurity but must balance legality, proportionality, and transparency while protecting constitutional rights to privacy and dignity.” This highlighted different approaches to surveillance regulation across jurisdictions.


## Online Gender-Based Violence Challenges


Marin Ashraf addressed specific challenges courts face with online gender-based violence cases. She explained that “digital evidence in online gender-based violence cases often fails to meet burden of proof due to authentication certificate difficulties and lack of platform cooperation.” Her research in India found that “in many cases, even if the prosecution fails to even submit digital evidence, and the main barrier here comes from the lack of cooperation from the digital platforms.”


Ashraf emphasized that courts must understand how platforms and algorithms can amplify harms against survivors, arguing for “ecosystem-level changes in sensitisation and inclusive policies for handling online violence cases.”


## Cross-Border Evidence and Jurisdictional Issues


The panel discussed complexities of handling digital evidence crossing international boundaries. Judge Laltaika noted that “international collaboration mechanisms are necessary for data exchange and extraterritorial expertise in cybercrime cases.” Professor Castro raised practical concerns about “notification and contact information procedures present ongoing challenges in data protection investigations.”


Dr. Nicholas emphasized that “legal harmonisation across jurisdictions is needed to handle digital evidence uniformly and share best practices from diverse legal systems,” highlighting the need for standardized procedures accommodating the borderless nature of digital evidence.


## Judicial Training and Capacity Building


A recurring theme was the urgent need for specialized training. Judge Laltaika acknowledged that “many courts still operate in physical form without understanding digital evidence, creating risks of wrongful convictions.” He advocated for “capacity building programmes should invite judges to forums and designate specific training programmes.”


Dr. Pegato reinforced this, stating that “judges need continuous specialised training in cybersecurity, digital forensics, and data protection to address knowledge gaps.” Advocate Khan noted that “legal frameworks need updating as outdated laws from 2015 cannot adequately address 2025 digital crimes.”


## Cybersecurity for Court Systems


The discussion revealed different approaches to protecting judicial systems from cyber threats. Professor Swire advocated for courts having independent backup systems, arguing that “courts need backup systems and offline storage to protect against ransomware attacks that could lock up judicial files.”


Judge Laltaika presented an alternative view, suggesting that “courts can leverage government data centres for security standards rather than operating in isolation.” He explained that “the judiciary does not operate in silo… we are part of the government. So the standard of security that applies to records of parliament or state house applies to the court as well.”


## Data Protection in Legal Proceedings


The panel addressed balancing transparency in legal proceedings with privacy protection. Dr. Pegato noted that “Brazil has constitutional right to data protection and comprehensive LGPD law but lacks criminal data protection framework,” highlighting legislative gaps even in jurisdictions with advanced privacy laws.


Professor Swire mentioned practical solutions such as protective orders for handling sensitive information, while Professor Castro reinforced the complexity of these issues in cross-border contexts where different privacy regimes must be reconciled.


## Key Implementation Challenges


Several critical challenges emerged from the discussion. Platform cooperation remains problematic, with companies often unresponsive to law enforcement requests for digital evidence. Resource constraints limit courts’ ability to develop comprehensive cybersecurity infrastructure, particularly in developing countries.


Authentication certificate difficulties create barriers to justice access, especially when complainants lack computer resources. Outdated legal frameworks struggle to address rapidly evolving digital crimes and technologies, creating persistent gaps between legal capabilities and technological realities.


## Proposed Solutions


The panel identified concrete steps for addressing these challenges. Continuing dialogue between multi-stakeholder communities and judiciary through IGF sessions was seen as essential. Developing technical and legal standards for digital chain of custody, including metadata preservation and authentication layers, emerged as a priority.


Establishing systematic training programmes for judges in cybersecurity and digital forensics through judicial academies was universally supported. Creating multi-stakeholder dialogue platforms among courts, technologists, civil society, and policymakers was identified as crucial for collaborative solutions.


Updating legal frameworks to address contemporary digital crimes and implementing cybersecurity protocols for courts were emphasized as urgent needs.


## Conclusion


The session successfully brought together diverse stakeholders to address common challenges courts face in adapting to digital evidence and cybersecurity threats. While speakers represented different legal traditions and perspectives, they shared recognition of the urgent need for judicial capacity building, proper digital evidence procedures, and balanced approaches to surveillance and privacy rights.


The discussion established a foundation for ongoing collaboration between traditionally separate communities, demonstrating that technological challenges create opportunities for judicial reform across diverse legal systems. The commitment to continued dialogue and capacity building provides a pathway for ensuring justice systems can effectively serve populations in an increasingly digital world while protecting fundamental rights.


Session transcript

Naza Nicholas: Thank you so much, and you’re welcome to this session, Judging in the Digital Age, Cybersecurity and Digital Evidence. And we are on Channel 5. If you would take your equipment and turn it on, put it on Channel 5. Today we have a number of speakers from various jurisdictions in terms of our IGF, you know, segments. And can I have this slide, please? Thank you. My name is Dr. Naza Nicholas Kirama from Tanzania. I work with Internet Society Tanzania Chapter, and I also double up as the coordinator for the Tanzania Internet Governance Forum. And today we are going to have a very good session on Judging in the Digital Age, Cybersecurity and Digital Evidence. And why are we here? We are here because courts globally are now digital ecosystems, and evidence records and even hearings actually exist online. Digital evidence is central to more than cases, mobile data, emails, metadata, surveillance footage, blockchain logs, AI-generated content. We have things like… Welcome to the session on digital rights online. We have been working tirelessly since 2023, 2022, to bring the judiciary, especially judges, to the Internet Governance Space, and it started in 2023. In Japan, we had a session called Judges on Digital Rights Online. And the goal is to break the silos, to link judiciary with the Internet Governance Space, and to create a platform for dialogue and exchange. We are working with experts, technologists, and policemakers, and not forgetting the regular Internet users. This session builds on the momentum by creating a permanent platform for dialogue and exchange. We are not just talking tech, we are reshaping the judicial culture for the future. We hope to strengthen the social Islam dynamics in the world and reach different levels of accessibility of the electronic device, in the regulatory commission, in opposing and expressing an open commentary in the district. In January, we launched a new report on cybersecurity in the IQ and we are trying to structure this report. How do we protect institutions? That is question number three. AI and justice. Can we trust machines, machine learning in evidence analysis or sentencing? Question number four. Training gaps. Judges need continuous specialized training to keep up with emerging tech and things like AI. The next slide is about our vision. We need to continue to be resilient, digitally literate, to have those in the judicial system. We need to build legal harmonization across jurisdictions to handle digital evidence uniformly. Share best practices from diverse legal systems. Civil, common, and hybrid traditions. And also develop capacity building programs, cyber law, data protection, digital forensic, and AI literacy. Also we foster collaboration between judiciary, civil society, tech developers, and also empower courts not just to catch up, but lead in shaping responsible digital justice. With that introduction, now I take this whole burden to the Honorable Dr. Eliamani Laltaika from the High Court of Tanzania. And the issue of the whole of this that I have been able to talk about. Honorable Eliamani, as a sitting judge of High Court in Tanzania, Are your courts currently addressing challenges related to admissibility of digital evidence, especially when such evidence originates from outside your jurisdiction or lacks clear standard for authentication?


Eliamani Isaya Laltaika: Thank you very much, Dr. Naza. First and foremost, my appreciation to the IGF Secretariat for their willingness and continuous support to engage the judiciary in this very important part of the 21st century legal process. Before I answer your question, Dr. Naza, I would like to kind of unpack some of these concepts. From a legal point of view, cyber security, these processes, legal, policy, economic, social and even diplomatic processes are to keep the cyberspace safe for all users, including children, people with disability and across regions. So that is the whole concept of cyber security is to ensure that the cyberspace is safe for all of us to use. And digital evidence, also known as electronic evidence, this is now the information with probative value presented to a court for a judge to consider in making a decision whether something has happened or has not. And digital evidence or electronic evidence is a newcomer in the development of law and judiciaries all over the world. It started in the late 70s in the U.S. Before that, only hard copies were used to prove something that has happened or not. When courts consider whether to admit evidence or not, there are usually five considerations. And this doesn’t really distinguish whether that piece of evidence is from one’s jurisdiction or it’s from some other country. Number one, relevance. I would ask counsel who is addressing me or I will use my own conviction to judge whether a certain piece of evidence is relevant to the case I’m addressing. If it doesn’t, it’s not relevant, however impressive it is. Number two, authenticity. The evidence must be shown to be what it purports to be. If you are telling me this is a video of someone stabbing a knife on some innocent passerby, I should be able to know that that is actually what is being done. It’s not a cartoon that has been curated. Number three, integrity of the system. I should be able to verify the system from which that video was extracted or that piece of paper or that email was printed out. Number four, chain of custody. I should know who took care of that piece of evidence. How many hands did it change through before it came to my court? And finally, and this is a little bit technical, I would check whether it complies with the statutory requirements. I would like to focus on the evidence of my own country. Every country has its own legal system, its own precedent, its own way of judging evidence. So if a piece of evidence passes that process, there is no discrimination whether it is from my jurisdiction or not. And I would only say that people thought these are only things from the movie, but I can say that these are actual things that are happening. And each one of you is currently creating digital evidence or electronic evidence from the pictures you are taking, from your geolocation, from the voices you are sending over WhatsApp. Everything, the meta tags can be used to authenticate that so-and-so was in Norway at this date and this is what he did. Everything you are doing, from shopping online to walking into a casino, that is actually building some sort of a digital evidence ecosystem. What does this mean in practice? It means cyber security law is much, much, much beyond what many people consider criminal. Law, as I said two years ago in Japan, is not only about punishing people. There are so many roles of the law and I will conclude by this, that law can play a punitive role. So-and-so has done something wrong and must be punished. Law can play a facilitative role.


Naza Nicholas: Can you hear us?


Peter Swire: Can you hear me right now?


Naza Nicholas: Yes, we can hear you loud and clear. If you can spend one minute to introduce yourself.


Peter Swire: and the background. Yes. Okay. And I don’t know if the video is working. Maybe it doesn’t work. Oh, there it goes. Okay. Hello. I’m in Spain today. My name is Peter Swire. I’m a professor at Georgia Tech. My background is a law professor, but I teach in the College of Computing, so I work on these issues. I also work on these issues as the leader of the Cross-Border Data Forum, where we do a lot of research on issues of data going across borders, especially law enforcement access. So that’s a little bit of my background. Is there a specific question you’d like me to address?


Naza Nicholas: Yes. The question I have for you, professor, is what are the key principles or methodologies that judges and lawyers must understand to critically assess the reliability and chain of custody for digital evidence, especially when it is presented through automated or AI-generated tools? You have five minutes.


Peter Swire: Yes, and I’ll try to stay within the time. So first of all, thank you for including me here today. I’m teaching in Spain this summer, and I feel honored to get to participate in this panel. I will turn to your question with just a little bit of background first, because we have resources at the Cross-Border Data Forum that talks about issues of government access to data across borders, such as the Budapest Convention and how to compare it to the new UN Cybercrime Convention. So we have a very recent study on the Cross-Border Data Forum about this. We’ve also written about how regional conventions, such as in Africa, might be useful for having governments get access to law enforcement requests that exist in other countries, because without that access, the United States has a blocking statute, and it’s hard to get the content of email communications for the judges. So that is background. I would like to emphasize three areas where the digital evidence issues are different. But first, I’ll tell you how much the digital issues are the same. So listening to our distinguished judge just now, his principles for evidence, including relevance and dependability, are the principles of evidence that existed before the Internet happened in a very large extent. And so each country has its own. You’ve always faced the problem that maybe this piece of paper has a fake signature on it. Now it might be a fake document electronically, but it’s been the same problem for judges since forever about whether to believe the evidence that comes into court. So for the three things I’d emphasize, the first is authentication. Somebody might say that they are writing from a police agency or a prosecutor’s office, but in fact, they’re faking it. They might be from some other place. And so and this was mentioned by the judge. And so the first thing to trust in evidence is that you’re dealing with the right party, that is the right person sending you the data. And in a world now where passwords can be broken many times, the standard good technology is to have what’s called two factor authentication. And many of you have used this where you log in with a password, then they send you a code and you send the code. And that’s much harder to fake than than simply a password based system. So that’s the first thing, some some confidence you’re dealing with the right people for authentication. The second question is chain of custody and whether you believe the document that came from Alice is the same document that’s received by Bob. And we have well-established procedures, what are called digital signatures. And the basic idea is Alice sends a document and they do a mathematical operation on it called a hash. And this unique number that emerges on the far end. And if even one sentence or one word in the document is changed, the hash of the document changes. And so these digital signatures are a mechanism to prove what left from Alice is the same thing received by. Bobb, such as the court system. And so systems of digital signatures are very important. The third question that’s come up more recently is what about AI? And we know that AI can have hallucinations. We’ve seen law cases in the United States where a lawyer just put in a question to the AI system and got back case citations that were not true. They made them up. Because AI and large language models use predictive technology, not definite technology, when they are trying to send evidence. And so when you receive a set of documents that have been generated by AI or might have been generated by AI, should you believe all the citations? And there’s no perfect answer to this, but one answer to this is to double check the citations. Maybe if you have time, you double check all of the citations. You go to the link in the page and make sure it says what they say it says. And that’s something, when I worked with a judge as a clerk, we did already. We checked to make sure the lawyers were giving us a proper citation. But if there’s too many citations to check in this way, maybe you do a sample. Maybe you try 10, or you try 50, or whatever the number is, and start to see whether you have any fake citations come in. So I think what I’m emphasizing for today is, in many ways, the problems are the same judges have had since forever. But we have to be sure about authentication. Is this really the person? We have to have some assurances on chain of custody and authenticity, and that’s digital signatures. And we have to worry about hallucinations in AI. And that means checking the sources, because otherwise it might be a fake citation that you don’t trust. So I’ll stop there. Thank you very much.


Naza Nicholas: Thank you, Professor. Now we have learned that there is a definitely predictive and definitive citations and all that. And that is why we are bringing the whole court system into the IGF. I want to now go to Dr. Jacqueline, who is here with us. And Dr. Jacqueline, if you would spend the next one minute to introduce yourself and then I will do a question for you.


Jacqueline Pegato: Of course. Thank you so much for having me. My name is Jacqueline Pegato. I’m with Data Privacy Brazil, a Brazilian NGO working with digital rights in Brazil and also in the Global South. It’s a pleasure to be here. Although I’m not a lawyer, I’ll try my best to address your question.


Naza Nicholas: Thank you so much, because we are a multi-stakeholder driven body of the United Nations, the IGF. Now I receive the order from the judge for every speaker to stay within five minutes. Thank you, Professor, for staying within five minutes. It was actually around 3.43 minutes. Now, Dr. Jacqueline, with the rise of things like spyware, the state surveillance tools being used in the name of national security, how should the judiciary respond when such technologies are used together with evidence? What role do courts play in safeguarding rights while navigating cases where surveillance methods themselves may be legally or ethically contested?


Jacqueline Pegato: Thank you. I think I’m going to first bring the concept of spyware for those who are not familiar with it. But I think most of us know by now that spyware refers to surveillance technologies used to secretly extract data from personal devices and networks, often without the user’s knowledge and with minimal legal oversight. So while presented as legitimate tools in the context of national security or law enforcement, these tools are increasingly being used in ways that erode democratic institutions. that I think exemplifies this threat. First Mile, a spyware tool, was deployed by intelligence officials to surveil targets that ranged from activists to Supreme Court justice themselves. So it is a paradigmatic case that stresses the most salient features of this type of surveillance. But it’s only one example in a broader context of lack of oversight. This incident reveals a structural problem. When surveillance happens outside transparent legal frameworks, courts are sidelined and unable to guarantee fundamental rights they are tasked to protect. And in the Brazilian context of use of spyware by the state, there is a Supreme Court case pending in which the regulatory gap that allows for the current state of things is being challenged as unconstitutional. In this case, we argue that the use of different spyware for surveillance by the state should be ruled unconstitutional, since even in possible legitimate contexts of criminal persecution and law enforcement, the nature of how they work and their affordances move way beyond traditional investigative methods, such as telephonic interceptions. Taking advantage of vulnerabilities found in other platforms and networks. resulting in a level of intrusion that is difficult to justify under democratic parameters. However, even if the entire system is not ruled unconstitutional, we are requesting that strict criteria be established for the use of spyware, analogous to the existing regulations for other cases of breach of confidentiality, particularly the requirements of prior judicial authorization and adherence to similar strictness as in other situations of confidentiality breach, the constitutional interpretation of communication confidentiality updated to contemporary standards of intrusiveness, the inclusion of mechanisms to respect the chain of custody, the individualization of subjects subjected to intrusion procedures, and the development of other parameters compatible with the constitutional order. So I’ll stop here now. Thank you.


Naza Nicholas: Thank you, Dr. Jacqueline. That was very informative. And I’m very glad that you could do this submission. Now I go to Advocate Umar Khan from Pakistan. If you can introduce yourself first.


Umar Khan: Thank you so much, Dr. Nazer. Thank you so much, IGF, and the new trick into this IGF somehow following from the last two IGF. This is Umar Khan from Pakistan. I’m basically a high court lawyer and working on the digital rights, dealing cyber cases in Pakistan, which is a bit new thing in Pakistan. Onward, we are having our first national law from 2016 Prevention of Electronics Crime Act. So this is from my side. Yeah, Dr. Nazer. Thank you so much, Umar Khan, advocate of the high court in Pakistan. You have a vast experience as a digital rights and defense lawyer. How do you see the balance between state surveillance for cybersecurity and the individual’s right to fair trial, particularly when digital forensics are used to prosecute cybercrime? Very important question. I think there are two questions within one question, digital forensics and digital surveillance. Basically, to prosecute a digital crime or a cybercrime, it is very much important. Digital surveillance is the same as the government or the state is looking after the general public. Also in the digital world, when the world has become a globe, on just one click there are certain issues related to the people, general masses, are also arising at the same time. So I believe that surveillance is a key. Without it, you cannot go with the internet. Everybody will be doing their own job. Everybody can do a crime. So surveillance is just to monitor, track and collect data. But the main thing is the key, the balance, that how they keep the balance, look into the principle of legality, professionality and with that the transparency. That if the surveillance they are doing, the state agencies are doing, whether it is protecting the rights of the people, along with that, is this not violating the right to privacy, the right to dignity, which are the constitutional rights given to the humans, to the citizens, by the law, by the constitution, or by the Universal Declaration of Human Rights. So I believe that surveillance, data collection, and all these things are important but how the data collected from the end user are protected because we have seen in the world that on the state level the data of the user have been shared so I believe that this is very important. The second one that the important thing is the digital evidence in forensic so by the end of the day if a crime has been committed it is the evidence that has to prove whether the crime has committed or not. The way the professor and the honorable judge has mentioned that the chain of the custody the evidence that reached the court that is very much important and without forensic it is not possible to prove whether it is to be proved in the way that the evidence that has been collected is according to the law is it following the SOPs whether the forensic the legality of the evidence so I believe that whenever it is happening you are prosecuting a crime you are collecting evidence it has to follow the standard of a digital forensic in a way that it has been proved because forgery is very much important is very much easy now AI has become a tool that can create hurdles for the people so it is the state that should ensure the standard of the digital process in the way that a crime that has committed should be prosecuted in a way that the right to a fair trial has not been violated which is very important this is from my side.


Naza Nicholas: Thank you so much I appreciate your intervention and now I go to Marin Ashraf she’s a tech research policy researcher and I would like to ask you to to use the next one to to introduce yourself and that will be followed by a question


Marin Ashraf: yeah thank you Dr. Nasir. Hi everyone my name is Marin and I am a senior research associate at IT4Change which is an India-based not-for-profit organization working at the intersections of digital technology and social justice. My core area of work includes working on online gender-based violence and legal and policy responses to it, digital platform accountability, information integrity, and AI governance issues. Very happy to be here and to share the space with the esteemed panelists.


Naza Nicholas: Thank you so much, Marin. I know you are doing a fantastic job of research and informing the community. Your work experience explores the intersection of tech and governance and social justice. From a feminist legal and policy perspective, how can judicial systems be better equipped to handle cases of online gender-based violence and platform-related harms, especially when evidence is embedded within opaque algorithms and transnational digital ecosystems?


Marin Ashraf: Thank you, Dr. Nasir. To answer that question, I would like to first briefly share some insights from my research that IT4Change, the organization that I work with, undertook on judicial approaches to online gender-based violence cases in India. The challenges that are commonly encountered in prosecuting such cases, especially the digital evidentiary issues. Online gender-based violence is typically dealt as a criminal offense in India under the General Penal Code and the Information Technology Act. As with any criminal offense, it becomes crucial to prove the guilt of the accused person beyond reasonable doubt. In our study, we found that in several cases of online gender-based violence, it unfortunately failed to meet the high burden of proof that is required because of difficulties in bringing in expert testimony, relying on witnesses, and ensuring the admissibility of digital evidence. So under Indian law, digital evidence will be admissible under two conditions. Either it has to be if the original computer source in which the evidence is recorded is produced, and in which case it’s a primary evidence, or if the copies of the electronic record are produced, in which case we need a certificate of authentication. And in our research study, we found that in many cases the court tend to dismiss the digital evidence because of lack of authentication certificate. And the issue is that it’s very difficult to sometimes obtain the authentication certificate, especially if the complainant doesn’t have access to the computer resource, or in many cases they might have applied to obtain the certificate, but it is not issued, or they may not be aware how to get the authentication certificate. So in such cases, the court tend to dismiss, of course, because of concerns of authenticity. And that means depriving a crucial piece of evidence, which might only be the single evidence in many cases, and thus depriving access to justice for the survivors. Now another issue is that in many cases, even if the prosecution fails to even submit digital evidence, and the main barrier here comes from the lack of cooperation from the digital platforms, like social media platforms, in responding to requests from law enforcement agencies to provide information. Despite the police asking for information from the social media platforms or from telecom service providers, sometimes there’s a delay in responding to it. And another issue with respect to digital evidence is the threat to privacy. Because in many cases, the evidence and other materials and the devices has to be submitted to the state or the police, and there have been concerns of manipulation or leaking to the accused side. So there is significant threat to privacy in that regard, the chain of custody, in preserving the chain of custody. Now, apart from the digital evidentiary issues, I also wanted to touch…


Naza Nicholas: If we were to come up with one red flag, judges should look for a digital forensic report. What would that be?


Peter Swire: Well, I hadn’t prepared that question.


Naza Nicholas: Yes.


Peter Swire: I thought you might ask of one piece of advice to judicial systems that they would do. Yes. And I want to mention the problem of ransomware, which is the possibility that a bad actor will try to lock up the files of a court system so that the judges and the courts lose access to the files. And when I teach my cybersecurity class, I say to people, for ransomware, the most important thing is to have some offline backups of your records, if at all possible. And you also have to protect your backup system from attack, because the bad guys try to get into your backup system. We have seen a lot of, in the United States, state and local governments get hit with these attacks. We have seen court systems get hit with these ransomware attacks. And having a good backup, where you can go back and get everything the way it was yesterday, that’s a huge help if you’re able to have that kind of technical backup in place. You asked about red flags. I think that the thing I would worry about is whether somebody on the other end of the line is really who they say they are, right? We know in our personal lives that we think we might be talking to somebody on social media, and it’s somebody else. And so finding some way to have a channel to communicate with them, and a second channel to make sure they are who they really say they are, that kind of two-factor thing is important, because otherwise you might be getting evidence from somebody who’s not even the right person.


Naza Nicholas: Thank you, Professor. Now I go to Dr. Jacqueline. I know you are not a lawyer, but we are all, you know, in some way or somehow we’ll be ending up in court. So what would be your suggestion or recommendations on spyware? If you could spend like one minute to respond to that.


Jacqueline Pegato: Sure. Thank you for the question. We have in our project, Data Privacy Brazil, we are developing some key recommendations on the research. And just to also clarify that I spoke about the Brazilian case, but we also, this is not an exclusive view of Brazil. We have cases in Colombia. We have a very important precedence in the US with the Pegasus and the ruling ordering to damages to META. But yeah, let me say some recommendations we are working on in terms of, I think we have four recommendations, key recommendations, I would say. The first one is to develop technical and legal standards for the digital chain of custody, including metadata preservation, access logs, authentication layers and independent audit trails. The second one would be trained judges and legal professionals in cybersecurity, digital forensics and especially data protection. The digital knowledge gap within our courts is a risk we can no longer afford in this scenario. The third recommendation would be to equip courts with cybersecurity protocols and contingency plans to strengthen institutional resilience against cyber threats, including unauthorized access to judicial data. And last but not least, of course, promote multistakeholder dialogue among courts, technologists, civil society and policymakers. I think judicial systems must evolve collaboratively to meet these realities we are talking about here. So thank you.


Naza Nicholas: Thank you so much. Marin, can you share one way courts could be more responsive to survivors of online violence? If you could put that in one minute, I think it would be very short and clear.


Marin Ashraf: Yeah, sure. I’ll try. So I think one of the important ways, as I said in my previous intervention, that it’s very important to understand the online public sphere itself and how the unique vulnerabilities that people face in the online sphere, especially also the role of the platforms and the algorithms in amplifying the harms. Secondly, it’s really important for the courts to uphold the right to privacy of the survivors in cases of OHV.


Eliamani Isaya Laltaika: using a computer system while in a plane or a ship registered in Tanzania, the law will catch up with you. So to be able to exchange data and get, you know, extra territorial expertise, one must be able to collaborate. And I’m seeing a positive development within the East African community where there are initiatives to empower judges and the legal fraternity to borrow a phrase from my panelist here on how to really get into the 21st century well-equipped with protecting citizenry. Thank you.


Naza Nicholas: Thank you, Dr. Judge. Uma, I know from the legal perspective serving the civil society, what do you think should be the legal safeguards that are of most urgent to protect, you know, defendants in digital crime cases?


Umar Khan: Very important question. There’s a principle the honorable judge will know that innocent until proven guilty. So a person is innocent until he is proven guilty. So there are certain challenges which are often faced by the defendants in the digital crimes. And I will just mention a few of them. One of them is like updating outdated law legislations because every day new thing is happening in the digital world. So with this, a law passed in 2015 cannot be brought in 2025 because digital crimes are…


Participant: case in Ecuador and would like to know your perspective. I don’t know if it will be contempt of court, but Ola Bini is a digital rights defender, has been facing a political judicial case in Ecuador since 2019. His case illustrates the risks of misusing digital evidence in judicial proceedings. In his trial, the prosecutor’s office used a simple photograph which showed the connection from an unverified user to an IP to support an alleged attempt to gain unauthorized access to a state telecommunication system. Marta says, commonsensically, that a single photograph is not in itself evidence of a digital crime. So Marta wants to know, in addition to the need for digital forensics, what other protocols must be in place to ensure that alleged digital evidence


Peter Swire: Okay. There’s many good possible first steps, but one thing is to have backup so that you don’t lose the court records. And that’s what I said about ransomware. So now, even in a resource-constrained place, digital storage is relatively inexpensive. And if you lose all the records because of a cyber attack, now you have a very hard time doing your judging. But if at least you have the records saved, then you can start again tomorrow and have a good chance to have a fair trial.


Eliamani Isaya Laltaika: Thank you very much. To share a practical experience from my country, we have our slot in the data center. So the judiciary does not operate in silo, like it has its own way of preserving. No, we are part of the government. So the standard of security that applies to records of parliament or state house applies to the court as well. So we do not foresee anyone easily targeting the judiciary and succeeding because you are targeting the heart of the government.


Naza Nicholas: Thank you, Judge. I saw a hand and then there’s another hand over here. If you can be on the mic. So do we have to take all the questions and then we’ll respond at once? Yes, as they come.


Adriana Castro: Yes. Hi, my name is Adriana Castro. I’m a professor at External University in Colombia. And I would like to raise an additional issue. A moment before the digital evidence, the contact information and notification. The Ibero-American data protection network composed of data protection authorities recently published an open letter to the companies accountable on data processing. It’s an open invitation directed to the companies which massively process


Eliamani Isaya Laltaika: The goal of cyber security is to ensure that the cyberspace is safe for all users, including people with disabilities and even children. With progressive data protection laws, there are ways that judges are instructed to ensure in-camera hearing.


Peter Swire: So in the United States, we have a law about medical privacy that’s called HIPAA, which I worked on when we created it. And it has a mechanism for what they call qualified protective orders. So one possibility is only the judge looks at the evidence, the sensitive evidence in camera, just the judge. Another possibility is they close the courtroom just for the medical information so that both parties see it. And both of those are allowed by the judge to create a protective order around this very sensitive information. So there’s a model for that that you can find easily online if you look for it for qualified protective orders.


Naza Nicholas: Thank you so much. I see, I don’t see, is there any question from online? Okay. Thank you so much. And now I go to, is there anybody? There was a lady who asked the question, I think.


Eliamani Isaya Laltaika: That was not responded. I just wanted to say a sentence or two from the lady, a professor from Colombia. There are current ongoing UN mechanisms to ensure that country laws are not too restrictive. So there are diplomatic processes to collaborate and ensure that data flows easily for purposes of conviction and adducing evidence. At the moment we are


Naza Nicholas: Eliamani, today we have participated in this judging in the digital era, cyber security and digital evidence. If you look at the way you have interacted with the audience, the questions that they have brought to the panelists, what would be your parting shot today?


Jacqueline Pegato: I’m going back to Brazil because it’s the context that I know. In Brazil we have the right to data protection as a constitutional right. This happened in 2022 and I think it was a great victory. We also have a comprehensive general data protection law, we call LGPD, that is in place also with an independent data protection authority. But we still don’t have a criminal data protection framework. So I think that’s an important gap to address. And I think all of the questions and discussions that we raised here today could share this concern of having this framework to fight against private related crimes and also these weaknesses of the judicial system, their ability to handle cyber crime effectively. So this gap in Brazil has been identified and debated in some legislative reform efforts, including the reform of the Brazilian Code of Criminal Procedure and some specific advocacy efforts, but no law has been approved so far. So I think that’s one development that we still have to fight for.


Naza Nicholas: Thank you, Dr. Jacqueline. Marin, the same question goes to you also. Just in one minute, if you can give your parting shot, what would you like to see in the future?


Marin Ashraf: Speaking from the perspective of the area of work that I work in that is online gender-based violence, I think court should be safe spaces for women and other survivors of online violence that are seeking justice. It’s very important that criminal justice system undertake ecosystem level changes in sensitization and inclusive policies and equip judges and law enforcement to deal with online violence cases in a sensitive and rights respecting manner. At the same time, it’s also important to update our laws to reflect the current realities and to to even to recognize newer forms of violence like gender trolling or gender-based hate speech, doxxing. So not all jurisdictions have yet recognized. So the changes at the legislature levels are also crucial for the judiciary to work effectively in this case. Thank you.


Naza Nicholas: Professor Peter


Peter Swire: Yes, thank you very much and thank you for being able to participate remotely in this very well organized session today. What I want to come back to the data protection point that’s come up a couple of times. So the cross-border data forum we created seven years ago, and it has stated goals in the website. One of them is that government should get access to data when there’s a legitimate government need. You know, there’s an actual crime. Maybe there’s a warrant with a judicial court order. On the other hand, we also have to have privacy and data protection happen when these requests come in. So imagine if you’re a company or imagine if you’re a court and there’s a request from some other country and you don’t know the practices there. Maybe it’s a request for data that’s really to stop political dissent. Maybe it’s illegitimate and not protecting data protection rules. And so our work has been for seven years to try to figure out how do we have correct access when it’s criminal and there’s the right showing. How to have privacy and data protection when those rights need to be upheld as part of the system. And how can we make it workable so that the people who hold the data know what their responsibility is.


Naza Nicholas: What will be your parting shot today?


Eliamani Isaya Laltaika: My parting shot actually is just to say thank you to the many people, especially the civil society, fraternity, who are doing a fantastic job to ensure that there is capacity building for judges. My colleagues here from India and from Brazil, even from Pakistan, have highlighted that there is this knowledge gap. It’s true that some of us are not aware of some of these developments in the cyberspace. You can find a court that is still in its physical form, and if you ask someone about digital evidence, that is the hardest question you can ask. But we can generally narrow the gap by ensuring that we invite judges to some of these fora. We designate programs for capacity building, and many of us will attend. We will not stay in courts only to wait to convict someone wrongfully because we don’t know the law or we don’t know just a bit of science. So thank you very much, Dr. Naza. You have been a trailblazer in Tanzania. That’s how you got me out of my chamber to travel with you many places to try and learn, and I can assure you that what you are doing is making a difference, not only in Tanzania but across the continent and some other parts of the world. Thank you.


Umar Khan: Thank you so much, Dr. Nazer. And I believe this is for the second time I’m sitting with the people from the Sambi ground or the relevant background towards the legal or judiciary track. So I believe it should be continued by the end of the day. Crimes are happening, and it is the courts, the prosecutors, the lawyers, and the agencies who are going to handle these cases. And as mentioned by the Honorable Judge, High Court Tanzania, that the capacity building of the judges are very important. They should not just sit in the courts. It is very important. And I’m happy that from the last time when we sit in the Saudi, when we go back home, we just tried to have a training for the judicial academy of my province. Unfortunately, that didn’t happen because of the timing in the Ramadan. But I’m hopeful that this time when I go back home, we are having some judges to be trained, inshallah, and we will be looking into your support. Thank you once again.


Naza Nicholas: Thank you so much. Is the professor from Columbia still around? If you have one minute for your parting shot. If you have anything to say, one minute.


Adriana Castro: I would say just that there are still a lot of challenges in Columbia. We have the main challenge of notification. I mentioned something about data protection investigations, but also in human rights procedures, we have a specific issue on notification. So that’s one of the main capacity building areas that we will look forward. Thank you very much.


Naza Nicholas: Professor, I think I’ll keep in touch. Thank you, ladies and gentlemen, for attending our session. We have come to the end of our session. Thank you so much for your contribution, and thank you so much for listening. And one of our goals of our session is to bridge the divide between the multi-stakeholder and the judiciary, to make sure that we inform and transform the judiciary to become the better institution and get the judiciary out of their silos so we can make justice better for every single one of us. Thank you so much. So if we can come for a picture, for a photo. Thank you so much. Thank you so much.


E

Eliamani Isaya Laltaika

Speech speed

117 words per minute

Speech length

1116 words

Speech time

569 seconds

Courts must verify five key considerations for digital evidence: relevance, authenticity, integrity of system, chain of custody, and statutory compliance

Explanation

Judge Laltaika outlined the standard framework courts use to evaluate digital evidence, emphasizing that these considerations apply regardless of whether evidence originates from domestic or foreign jurisdictions. He stressed that evidence must pass through this systematic evaluation process to be admissible in court.


Evidence

Examples provided include verifying a video showing someone stabbing with a knife is authentic and not a curated cartoon, and ensuring proper chain of custody tracking how many hands the evidence passed through before reaching court


Major discussion point

Digital Evidence Authentication and Chain of Custody


Topics

Legal and regulatory | Cybersecurity


Agreed with

– Peter Swire
– Jacqueline Pegato
– Participant

Agreed on

Importance of proper digital evidence authentication and chain of custody


Digital evidence assessment follows the same principles regardless of jurisdiction, with no discrimination between domestic and foreign evidence

Explanation

The judge argued that courts apply the same evidentiary standards whether digital evidence comes from within their jurisdiction or from another country. The key is that evidence must pass the established legal tests for admissibility rather than its geographic origin.


Evidence

Judge explained that every country has its own legal system and precedents, but if evidence passes the required process, there is no discrimination based on jurisdiction


Major discussion point

Cross-Border Digital Evidence and Legal Harmonization


Topics

Legal and regulatory | Jurisdiction


International collaboration mechanisms are necessary for data exchange and extraterritorial expertise in cybercrime cases

Explanation

Judge Laltaika emphasized that cybercrime often crosses borders, requiring courts to collaborate internationally to obtain evidence and expertise. He noted positive developments in regional cooperation, particularly within the East African community.


Evidence

Mentioned initiatives within the East African community to empower judges and legal fraternity with 21st century tools for protecting citizenry


Major discussion point

Cross-Border Digital Evidence and Legal Harmonization


Topics

Legal and regulatory | Cybersecurity


Many courts still operate in physical form without understanding digital evidence, creating risks of wrongful convictions

Explanation

The judge acknowledged a significant knowledge gap in the judiciary regarding digital evidence and cyberspace developments. He warned that judges lacking this knowledge could make incorrect decisions that result in wrongful convictions.


Evidence

Judge stated that asking some courts about digital evidence would be the hardest question, and emphasized the risk of convicting someone wrongfully due to lack of knowledge


Major discussion point

Judicial Capacity Building and Training Gaps


Topics

Legal and regulatory | Capacity development


Agreed with

– Jacqueline Pegato
– Umar Khan

Agreed on

Need for judicial capacity building and training in digital technologies


Capacity building programs should invite judges to forums and designate specific training programs

Explanation

Judge Laltaika advocated for proactive judicial education through specialized forums and training programs. He emphasized that judges should not remain isolated in their chambers but should actively seek to learn about technological developments affecting their work.


Evidence

Judge thanked civil society for capacity building efforts and mentioned his own participation in various learning opportunities organized by Dr. Naza Nicholas


Major discussion point

Judicial Capacity Building and Training Gaps


Topics

Capacity development | Legal and regulatory


Agreed with

– Jacqueline Pegato
– Umar Khan

Agreed on

Need for judicial capacity building and training in digital technologies


Courts can leverage government data centers for security standards rather than operating in isolation

Explanation

The judge explained that in Tanzania, the judiciary doesn’t operate independently for data security but is integrated with government infrastructure. This approach provides better security standards by applying the same protections used for other government institutions.


Evidence

Judge mentioned that Tanzania’s judiciary has a slot in the government data center, with security standards that apply to parliament and state house also applying to courts


Major discussion point

Cybersecurity Infrastructure for Courts


Topics

Infrastructure | Cybersecurity


Disagreed with

– Peter Swire

Disagreed on

Approach to cybersecurity infrastructure for courts


P

Peter Swire

Speech speed

193 words per minute

Speech length

1664 words

Speech time

514 seconds

Authentication requires confidence in dealing with the right parties, with two-factor authentication being more secure than password-based systems

Explanation

Professor Swire emphasized that verifying the identity of parties providing evidence is crucial, as passwords can be easily compromised. He recommended two-factor authentication as a more reliable method for ensuring authentic communication in legal proceedings.


Evidence

Explained two-factor authentication process where users log in with password then receive and send back a code, making it much harder to fake than simple password systems


Major discussion point

Digital Evidence Authentication and Chain of Custody


Topics

Cybersecurity | Legal and regulatory


Agreed with

– Eliamani Isaya Laltaika
– Jacqueline Pegato
– Participant

Agreed on

Importance of proper digital evidence authentication and chain of custody


Digital signatures using mathematical hash operations can prove document integrity from sender to receiver

Explanation

Professor Swire explained how digital signatures work through mathematical hash functions that create unique numbers for documents. If even one word is changed, the hash changes, providing proof that the document received is identical to what was sent.


Evidence

Described the technical process where Alice sends a document with a mathematical hash operation, and any change in the document changes the unique number, proving integrity from Alice to Bob (such as court system)


Major discussion point

Digital Evidence Authentication and Chain of Custody


Topics

Cybersecurity | Legal and regulatory


Agreed with

– Eliamani Isaya Laltaika
– Jacqueline Pegato
– Participant

Agreed on

Importance of proper digital evidence authentication and chain of custody


AI systems can have hallucinations and generate fake citations, requiring judges to double-check sources and citations

Explanation

Professor Swire warned about AI’s tendency to create false information, particularly fake legal citations, because AI uses predictive rather than definitive technology. He emphasized the need for judges to verify AI-generated content before relying on it.


Evidence

Cited US law cases where lawyers used AI systems that generated fake case citations, and explained that large language models use predictive technology that can make up citations


Major discussion point

AI and Automated Tools in Legal Proceedings


Topics

Legal and regulatory | Cybersecurity


Courts need to distinguish between predictive AI technology and definitive evidence when assessing reliability

Explanation

Professor Swire highlighted the fundamental difference between AI’s predictive capabilities and the definitive evidence required in legal proceedings. This distinction is crucial for judges when evaluating AI-generated or AI-assisted evidence.


Evidence

Explained that large language models use predictive technology, not definite technology, when generating evidence


Major discussion point

AI and Automated Tools in Legal Proceedings


Topics

Legal and regulatory | Cybersecurity


Judges should sample-check citations when there are too many to verify individually

Explanation

Professor Swire provided practical advice for handling large volumes of potentially AI-generated citations. When complete verification isn’t feasible, statistical sampling can help identify patterns of fake citations.


Evidence

Suggested trying 10, 50, or whatever number is manageable to check for fake citations when complete verification isn’t possible


Major discussion point

AI and Automated Tools in Legal Proceedings


Topics

Legal and regulatory | Cybersecurity


Courts need backup systems and offline storage to protect against ransomware attacks that could lock up judicial files

Explanation

Professor Swire identified ransomware as a major threat to court systems, where bad actors can lock up all court files. He emphasized that having offline backups is the most important protection, though backup systems themselves must also be secured.


Evidence

Mentioned seeing state and local governments and court systems in the US hit with ransomware attacks, and emphasized the importance of having backups to restore everything from yesterday


Major discussion point

Cybersecurity Infrastructure for Courts


Topics

Cybersecurity | Infrastructure


Disagreed with

– Eliamani Isaya Laltaika

Disagreed on

Approach to cybersecurity infrastructure for courts


Courts need mechanisms like qualified protective orders for handling sensitive information, including in-camera hearings

Explanation

Professor Swire described legal mechanisms from US medical privacy law (HIPAA) that can be adapted for protecting sensitive digital evidence. These include judges reviewing evidence privately or closing courtrooms for sensitive information while ensuring both parties can see it.


Evidence

Referenced HIPAA qualified protective orders that allow either only the judge to see sensitive evidence in camera, or closing the courtroom just for medical information so both parties can see it


Major discussion point

Data Protection and Privacy in Legal Proceedings


Topics

Human rights | Legal and regulatory


Agreed with

– Jacqueline Pegato
– Umar Khan

Agreed on

Need for balance between surveillance/security and privacy rights


J

Jacqueline Pegato

Speech speed

123 words per minute

Speech length

830 words

Speech time

404 seconds

Spyware tools are increasingly used beyond legitimate law enforcement, eroding democratic institutions and requiring strict judicial oversight

Explanation

Jacqueline argued that spyware, while presented as legitimate national security tools, is being misused to target activists and even Supreme Court justices. This misuse occurs outside transparent legal frameworks, preventing courts from protecting fundamental rights.


Evidence

Cited the First Mile spyware case where intelligence officials surveilled targets ranging from activists to Supreme Court justices, demonstrating surveillance outside transparent legal frameworks


Major discussion point

State Surveillance and Privacy Rights Balance


Topics

Human rights | Cybersecurity


Agreed with

– Umar Khan
– Peter Swire

Agreed on

Need for balance between surveillance/security and privacy rights


Disagreed with

– Umar Khan

Disagreed on

Scope of spyware regulation


Courts should establish strict criteria for spyware use, including prior judicial authorization and constitutional interpretation updated for contemporary intrusion standards

Explanation

Jacqueline outlined specific legal requirements that should govern spyware use, emphasizing that these tools go far beyond traditional investigative methods. She argued for constitutional protections to be updated to reflect modern intrusion capabilities.


Evidence

Referenced a pending Brazilian Supreme Court case challenging spyware use as unconstitutional, and detailed specific requirements including prior judicial authorization, chain of custody mechanisms, and individualization of surveillance subjects


Major discussion point

State Surveillance and Privacy Rights Balance


Topics

Human rights | Legal and regulatory


Agreed with

– Umar Khan
– Peter Swire

Agreed on

Need for balance between surveillance/security and privacy rights


Technical and legal standards must be developed for digital chain of custody, including metadata preservation and independent audit trails

Explanation

Jacqueline emphasized the need for comprehensive standards that ensure digital evidence integrity throughout the legal process. These standards should include technical safeguards and independent verification mechanisms.


Evidence

Listed specific requirements including metadata preservation, access logs, authentication layers and independent audit trails as part of comprehensive digital chain of custody standards


Major discussion point

Digital Evidence Authentication and Chain of Custody


Topics

Legal and regulatory | Cybersecurity


Agreed with

– Eliamani Isaya Laltaika
– Peter Swire
– Participant

Agreed on

Importance of proper digital evidence authentication and chain of custody


Judges need continuous specialized training in cybersecurity, digital forensics, and data protection to address knowledge gaps

Explanation

Jacqueline identified the digital knowledge gap within courts as a significant risk that can no longer be ignored. She emphasized that judicial systems must evolve collaboratively with technical experts to meet current realities.


Evidence

Stated that the digital knowledge gap within courts is a risk that can no longer be afforded, and emphasized need for multistakeholder dialogue among courts, technologists, civil society and policymakers


Major discussion point

Judicial Capacity Building and Training Gaps


Topics

Capacity development | Legal and regulatory


Agreed with

– Eliamani Isaya Laltaika
– Umar Khan

Agreed on

Need for judicial capacity building and training in digital technologies


Judicial systems should have cybersecurity protocols and contingency plans to strengthen institutional resilience

Explanation

Jacqueline argued that courts need proactive cybersecurity measures to protect against cyber threats, including unauthorized access to judicial data. This requires systematic planning and implementation of security protocols.


Major discussion point

Cybersecurity Infrastructure for Courts


Topics

Cybersecurity | Infrastructure


Brazil has constitutional right to data protection and comprehensive LGPD law but lacks criminal data protection framework

Explanation

Jacqueline highlighted a significant gap in Brazil’s legal framework where data protection is constitutionally protected and regulated, but criminal enforcement mechanisms are missing. This gap affects the judicial system’s ability to handle cybercrime effectively.


Evidence

Mentioned that Brazil’s constitutional right to data protection was established in 2022, and that legislative reform efforts including reform of the Brazilian Code of Criminal Procedure have been debated but no law approved


Major discussion point

Data Protection and Privacy in Legal Proceedings


Topics

Human rights | Legal and regulatory


M

Marin Ashraf

Speech speed

152 words per minute

Speech length

758 words

Speech time

297 seconds

Digital evidence in online gender-based violence cases often fails to meet burden of proof due to authentication certificate difficulties and lack of platform cooperation

Explanation

Marin explained that online gender-based violence cases frequently fail in court because of technical barriers to proving digital evidence. The high burden of proof required in criminal cases becomes difficult to meet when authentication certificates are hard to obtain or platforms don’t cooperate with law enforcement.


Evidence

Cited research study showing courts dismiss digital evidence due to lack of authentication certificates, and noted difficulties when complainants don’t have access to computer resources or don’t know how to obtain certificates


Major discussion point

Online Gender-Based Violence and Platform Accountability


Topics

Human rights | Legal and regulatory


Courts must understand online vulnerabilities and the role of platforms and algorithms in amplifying harms against survivors

Explanation

Marin argued that effective judicial response to online gender-based violence requires understanding how digital platforms and their algorithms can amplify harm. Courts need to recognize the unique nature of online spaces and their impact on survivors.


Major discussion point

Online Gender-Based Violence and Platform Accountability


Topics

Human rights | Legal and regulatory


Criminal justice systems need ecosystem-level changes in sensitization and inclusive policies for handling online violence cases

Explanation

Marin emphasized that addressing online gender-based violence requires comprehensive reform of criminal justice systems, not just individual training. This includes making courts safe spaces for survivors and updating laws to recognize new forms of violence.


Evidence

Mentioned need to recognize newer forms of violence like gender trolling, gender-based hate speech, and doxxing that not all jurisdictions have yet recognized


Major discussion point

Online Gender-Based Violence and Platform Accountability


Topics

Human rights | Legal and regulatory


U

Umar Khan

Speech speed

139 words per minute

Speech length

875 words

Speech time

376 seconds

Surveillance is necessary for cybersecurity but must balance legality, proportionality, and transparency while protecting constitutional rights to privacy and dignity

Explanation

Umar Khan argued that state surveillance in the digital world is essential for monitoring and preventing cybercrime, but it must be conducted within legal frameworks that respect fundamental rights. The key challenge is maintaining this balance while ensuring effective law enforcement.


Evidence

Emphasized principles of legality, professionality, and transparency in surveillance, and mentioned constitutional rights to privacy and dignity as well as Universal Declaration of Human Rights


Major discussion point

State Surveillance and Privacy Rights Balance


Topics

Human rights | Cybersecurity


Agreed with

– Jacqueline Pegato
– Peter Swire

Agreed on

Need for balance between surveillance/security and privacy rights


Disagreed with

– Jacqueline Pegato

Disagreed on

Scope of spyware regulation


Legal frameworks need updating as outdated laws from 2015 cannot adequately address 2025 digital crimes

Explanation

Umar Khan highlighted the rapid pace of technological change that makes existing cybercrime laws obsolete. He emphasized that legal frameworks must continuously evolve to address new forms of digital crime and technological developments.


Evidence

Mentioned Pakistan’s Prevention of Electronics Crime Act from 2016 as an example of how laws become outdated, stating that a law passed in 2015 cannot be brought to 2025 because digital crimes are constantly evolving


Major discussion point

Judicial Capacity Building and Training Gaps


Topics

Legal and regulatory | Cybersecurity


Agreed with

– Eliamani Isaya Laltaika
– Jacqueline Pegato

Agreed on

Need for judicial capacity building and training in digital technologies


P

Participant

Speech speed

123 words per minute

Speech length

128 words

Speech time

62 seconds

A simple photograph showing IP connection is insufficient evidence for digital crimes without proper forensic protocols

Explanation

A participant raised the case of Ola Bini in Ecuador, where prosecutors used only a photograph showing connection from an unverified user to an IP address as evidence of unauthorized access to state systems. The participant argued that such minimal evidence cannot constitute proof of digital crime.


Evidence

Referenced the Ola Bini case in Ecuador where a digital rights defender faced charges based on a single photograph showing IP connection, which the participant argued commonsensically cannot be evidence of digital crime by itself


Major discussion point

Digital Evidence Authentication and Chain of Custody


Topics

Human rights | Legal and regulatory


Agreed with

– Eliamani Isaya Laltaika
– Peter Swire
– Jacqueline Pegato

Agreed on

Importance of proper digital evidence authentication and chain of custody


A

Adriana Castro

Speech speed

118 words per minute

Speech length

127 words

Speech time

64 seconds

Notification and contact information procedures present ongoing challenges in data protection investigations

Explanation

Professor Castro highlighted specific procedural challenges in data protection cases, particularly around notifying parties and establishing proper contact information. These issues affect both data protection investigations and human rights procedures.


Evidence

Mentioned that the Ibero-American data protection network published an open letter to companies about data processing accountability, and noted specific notification challenges in Colombia


Major discussion point

Data Protection and Privacy in Legal Proceedings


Topics

Human rights | Legal and regulatory


N

Naza Nicholas

Speech speed

107 words per minute

Speech length

1389 words

Speech time

775 seconds

Legal harmonization across jurisdictions is needed to handle digital evidence uniformly and share best practices from diverse legal systems

Explanation

Dr. Nicholas emphasized the need for consistent approaches to digital evidence across different legal systems and jurisdictions. He advocated for sharing best practices between civil, common, and hybrid legal traditions to create more uniform standards.


Evidence

Mentioned the goal of building legal harmonization across jurisdictions and sharing best practices from diverse legal systems including civil, common, and hybrid traditions


Major discussion point

Cross-Border Digital Evidence and Legal Harmonization


Topics

Legal and regulatory | Capacity development


Agreements

Agreement points

Need for judicial capacity building and training in digital technologies

Speakers

– Eliamani Isaya Laltaika
– Jacqueline Pegato
– Umar Khan

Arguments

Many courts still operate in physical form without understanding digital evidence, creating risks of wrongful convictions


Capacity building programs should invite judges to forums and designate specific training programs


Judges need continuous specialized training in cybersecurity, digital forensics, and data protection to address knowledge gaps


Legal frameworks need updating as outdated laws from 2015 cannot adequately address 2025 digital crimes


Summary

All speakers agreed that there is a significant knowledge gap in the judiciary regarding digital evidence and emerging technologies, requiring systematic capacity building programs and continuous training to prevent wrongful decisions and keep pace with technological developments.


Topics

Capacity development | Legal and regulatory


Importance of proper digital evidence authentication and chain of custody

Speakers

– Eliamani Isaya Laltaika
– Peter Swire
– Jacqueline Pegato
– Participant

Arguments

Courts must verify five key considerations for digital evidence: relevance, authenticity, integrity of system, chain of custody, and statutory compliance


Authentication requires confidence in dealing with the right parties, with two-factor authentication being more secure than password-based systems


Digital signatures using mathematical hash operations can prove document integrity from sender to receiver


Technical and legal standards must be developed for digital chain of custody, including metadata preservation and independent audit trails


A simple photograph showing IP connection is insufficient evidence for digital crimes without proper forensic protocols


Summary

Speakers unanimously emphasized that digital evidence requires rigorous authentication processes, proper chain of custody documentation, and technical standards to ensure reliability and admissibility in court proceedings.


Topics

Legal and regulatory | Cybersecurity


Need for balance between surveillance/security and privacy rights

Speakers

– Jacqueline Pegato
– Umar Khan
– Peter Swire

Arguments

Spyware tools are increasingly used beyond legitimate law enforcement, eroding democratic institutions and requiring strict judicial oversight


Courts should establish strict criteria for spyware use, including prior judicial authorization and constitutional interpretation updated for contemporary intrusion standards


Surveillance is necessary for cybersecurity but must balance legality, proportionality, and transparency while protecting constitutional rights to privacy and dignity


Courts need mechanisms like qualified protective orders for handling sensitive information, including in-camera hearings


Summary

Speakers agreed that while surveillance and security measures are necessary for cybersecurity, they must be balanced with privacy rights through proper legal frameworks, judicial oversight, and constitutional protections.


Topics

Human rights | Cybersecurity


Similar viewpoints

Both speakers emphasized that digital evidence evaluation should follow consistent principles regardless of origin, and that courts need robust cybersecurity infrastructure including backup systems to protect against cyber threats.

Speakers

– Eliamani Isaya Laltaika
– Peter Swire

Arguments

Digital evidence assessment follows the same principles regardless of jurisdiction, with no discrimination between domestic and foreign evidence


Courts need backup systems and offline storage to protect against ransomware attacks that could lock up judicial files


Courts can leverage government data centers for security standards rather than operating in isolation


Topics

Legal and regulatory | Cybersecurity | Infrastructure


Both speakers highlighted gaps in legal frameworks and the need for comprehensive reforms to address digital rights violations, particularly emphasizing the challenges faced by vulnerable groups in accessing justice through digital evidence.

Speakers

– Jacqueline Pegato
– Marin Ashraf

Arguments

Brazil has constitutional right to data protection and comprehensive LGPD law but lacks criminal data protection framework


Digital evidence in online gender-based violence cases often fails to meet burden of proof due to authentication certificate difficulties and lack of platform cooperation


Criminal justice systems need ecosystem-level changes in sensitization and inclusive policies for handling online violence cases


Topics

Human rights | Legal and regulatory


Both speakers emphasized the risks posed by AI technology in legal proceedings and the need for courts to develop systematic approaches to verify AI-generated content while building institutional resilience against cyber threats.

Speakers

– Peter Swire
– Jacqueline Pegato

Arguments

AI systems can have hallucinations and generate fake citations, requiring judges to double-check sources and citations


Courts should distinguish between predictive AI technology and definitive evidence when assessing reliability


Judges should sample-check citations when there are too many to verify individually


Judicial systems should have cybersecurity protocols and contingency plans to strengthen institutional resilience


Topics

Legal and regulatory | Cybersecurity


Unexpected consensus

Cross-border cooperation and legal harmonization

Speakers

– Eliamani Isaya Laltaika
– Naza Nicholas
– Adriana Castro

Arguments

International collaboration mechanisms are necessary for data exchange and extraterritorial expertise in cybercrime cases


Legal harmonization across jurisdictions is needed to handle digital evidence uniformly and share best practices from diverse legal systems


Notification and contact information procedures present ongoing challenges in data protection investigations


Explanation

Despite representing different legal systems (Tanzania’s common law, Brazil’s civil law, and Colombia’s hybrid system), speakers showed unexpected consensus on the need for international cooperation and harmonized approaches to digital evidence, suggesting that technological challenges transcend traditional legal system boundaries.


Topics

Legal and regulatory | Jurisdiction


Multi-stakeholder approach to judicial reform

Speakers

– Eliamani Isaya Laltaika
– Jacqueline Pegato
– Marin Ashraf

Arguments

Capacity building programs should invite judges to forums and designate specific training programs


Judges need continuous specialized training in cybersecurity, digital forensics, and data protection to address knowledge gaps


Courts must understand online vulnerabilities and the role of platforms and algorithms in amplifying harms against survivors


Explanation

Unexpectedly, a sitting judge (Laltaika) showed strong alignment with civil society advocates (Pegato and Ashraf) on the need for collaborative, multi-stakeholder approaches to judicial education and reform, breaking down traditional institutional silos.


Topics

Capacity development | Human rights | Legal and regulatory


Overall assessment

Summary

The discussion revealed strong consensus across all speakers on three main areas: the critical need for judicial capacity building in digital technologies, the importance of rigorous digital evidence authentication processes, and the necessity of balancing security measures with privacy rights. Speakers also agreed on the need for international cooperation and multi-stakeholder approaches to address digital justice challenges.


Consensus level

High level of consensus with significant implications for digital justice reform. The agreement between judicial officials and civil society advocates suggests a shared understanding of the challenges and potential for collaborative solutions. This consensus indicates readiness for systematic reforms in judicial systems globally, including harmonized standards for digital evidence, comprehensive training programs, and balanced approaches to surveillance and privacy rights. The unexpected alignment between different legal traditions and stakeholder groups suggests that technological challenges are creating common ground for judicial reform across diverse legal systems.


Differences

Different viewpoints

Approach to cybersecurity infrastructure for courts

Speakers

– Peter Swire
– Eliamani Isaya Laltaika

Arguments

Courts need backup systems and offline storage to protect against ransomware attacks that could lock up judicial files


Courts can leverage government data centers for security standards rather than operating in isolation


Summary

Professor Swire advocates for courts to have independent backup systems and offline storage as protection against ransomware, while Judge Laltaika argues that courts should integrate with government data centers rather than operate independently for security


Topics

Cybersecurity | Infrastructure


Scope of spyware regulation

Speakers

– Jacqueline Pegato
– Umar Khan

Arguments

Spyware tools are increasingly used beyond legitimate law enforcement, eroding democratic institutions and requiring strict judicial oversight


Surveillance is necessary for cybersecurity but must balance legality, proportionality, and transparency while protecting constitutional rights to privacy and dignity


Summary

Jacqueline takes a more restrictive stance on spyware, arguing it erodes democratic institutions and should face strict judicial oversight, while Umar Khan sees surveillance as necessary for cybersecurity with appropriate balancing of rights


Topics

Human rights | Cybersecurity


Unexpected differences

Individual vs. institutional approach to judicial cybersecurity

Speakers

– Peter Swire
– Eliamani Isaya Laltaika

Arguments

Courts need backup systems and offline storage to protect against ransomware attacks that could lock up judicial files


Courts can leverage government data centers for security standards rather than operating in isolation


Explanation

This disagreement is unexpected because both speakers are cybersecurity experts, yet they have fundamentally different philosophies about whether courts should have independent security infrastructure or integrate with government systems. This reflects deeper questions about judicial independence versus efficiency


Topics

Cybersecurity | Infrastructure


Overall assessment

Summary

The discussion showed remarkable consensus on the need for judicial modernization, capacity building, and better digital evidence handling, with disagreements mainly on implementation approaches rather than fundamental goals


Disagreement level

Low to moderate disagreement level. Most speakers agreed on core principles but differed on specific methodologies and priorities. The main tensions were between individual versus institutional approaches to security, and between restrictive versus balanced approaches to surveillance. These disagreements reflect practical implementation challenges rather than fundamental philosophical differences, suggesting good potential for collaborative solutions.


Partial agreements

Partial agreements

Similar viewpoints

Both speakers emphasized that digital evidence evaluation should follow consistent principles regardless of origin, and that courts need robust cybersecurity infrastructure including backup systems to protect against cyber threats.

Speakers

– Eliamani Isaya Laltaika
– Peter Swire

Arguments

Digital evidence assessment follows the same principles regardless of jurisdiction, with no discrimination between domestic and foreign evidence


Courts need backup systems and offline storage to protect against ransomware attacks that could lock up judicial files


Courts can leverage government data centers for security standards rather than operating in isolation


Topics

Legal and regulatory | Cybersecurity | Infrastructure


Both speakers highlighted gaps in legal frameworks and the need for comprehensive reforms to address digital rights violations, particularly emphasizing the challenges faced by vulnerable groups in accessing justice through digital evidence.

Speakers

– Jacqueline Pegato
– Marin Ashraf

Arguments

Brazil has constitutional right to data protection and comprehensive LGPD law but lacks criminal data protection framework


Digital evidence in online gender-based violence cases often fails to meet burden of proof due to authentication certificate difficulties and lack of platform cooperation


Criminal justice systems need ecosystem-level changes in sensitization and inclusive policies for handling online violence cases


Topics

Human rights | Legal and regulatory


Both speakers emphasized the risks posed by AI technology in legal proceedings and the need for courts to develop systematic approaches to verify AI-generated content while building institutional resilience against cyber threats.

Speakers

– Peter Swire
– Jacqueline Pegato

Arguments

AI systems can have hallucinations and generate fake citations, requiring judges to double-check sources and citations


Courts should distinguish between predictive AI technology and definitive evidence when assessing reliability


Judges should sample-check citations when there are too many to verify individually


Judicial systems should have cybersecurity protocols and contingency plans to strengthen institutional resilience


Topics

Legal and regulatory | Cybersecurity


Takeaways

Key takeaways

Courts must establish five key considerations for digital evidence admissibility: relevance, authenticity, integrity of system, chain of custody, and statutory compliance, with no discrimination between domestic and foreign evidence


AI-generated evidence poses new challenges as AI systems can hallucinate and create fake citations, requiring judges to double-check sources and sample-verify citations when volume is too large


Digital authentication requires two-factor verification and digital signatures using mathematical hash operations to ensure document integrity from sender to receiver


State surveillance tools like spyware require strict judicial oversight with prior authorization, constitutional interpretation updated for contemporary intrusion standards, and balance between security needs and privacy rights


Online gender-based violence cases face unique challenges with digital evidence authentication and platform cooperation, requiring courts to understand online vulnerabilities and algorithmic harm amplification


Cross-border digital evidence cooperation requires legal harmonization across jurisdictions and international collaboration mechanisms for data exchange in cybercrime cases


Judicial capacity building is critical as many judges lack knowledge of digital evidence, cybersecurity, and data protection, creating risks of wrongful convictions


Courts need robust cybersecurity infrastructure including backup systems, offline storage, and contingency plans to protect against ransomware attacks and maintain judicial operations


Resolutions and action items

Continue bridging the divide between multi-stakeholder community and judiciary through IGF sessions to transform judicial institutions


Develop technical and legal standards for digital chain of custody including metadata preservation, access logs, authentication layers and independent audit trails


Establish training programs for judges in cybersecurity, digital forensics, and data protection through judicial academies and capacity building initiatives


Create multistakeholder dialogue platforms among courts, technologists, civil society and policymakers for collaborative judicial system evolution


Update legal frameworks to address contemporary digital crimes and recognize newer forms of online violence like gender trolling and doxxing


Implement cybersecurity protocols and contingency plans to strengthen institutional resilience against cyber threats


Advocate for comprehensive criminal data protection frameworks in jurisdictions lacking such legislation


Unresolved issues

How to effectively balance state surveillance needs for cybersecurity with individual privacy rights and fair trial guarantees in practice


Lack of platform cooperation in providing digital evidence for law enforcement requests, causing delays and evidence gaps


Notification and contact information procedures in cross-border data protection investigations remain challenging


Outdated legal frameworks cannot adequately address rapidly evolving digital crimes and technologies


Resource constraints in developing comprehensive backup systems and cybersecurity infrastructure for courts


Gaps in criminal data protection frameworks in various jurisdictions including Brazil


Difficulty obtaining authentication certificates for digital evidence, particularly when complainants lack access to computer resources


Privacy threats and chain of custody concerns when digital devices must be submitted to law enforcement


Suggested compromises

Use qualified protective orders allowing judges to review sensitive evidence in-camera or close courtrooms only for sensitive information while maintaining transparency for other proceedings


Implement sample-checking of citations when full verification is not feasible due to volume constraints


Leverage existing government data center infrastructure for judicial cybersecurity rather than courts operating in isolation


Establish strict criteria for spyware use analogous to existing regulations for other confidentiality breaches while allowing legitimate law enforcement applications


Develop progressive data protection laws with in-camera hearing provisions to balance transparency with privacy protection


Create mechanisms for legitimate government access to data with proper judicial oversight while maintaining privacy and data protection when rights need to be upheld


Thought provoking comments

Digital evidence is a newcomer in the development of law and judiciaries all over the world. It started in the late 70s in the U.S. Before that, only hard copies were used to prove something that has happened or not… each one of you is currently creating digital evidence or electronic evidence from the pictures you are taking, from your geolocation, from the voices you are sending over WhatsApp.

Speaker

Eliamani Isaya Laltaika


Reason

This comment was particularly insightful because it reframed digital evidence from an abstract legal concept to something personally relevant to every participant. By connecting everyday digital activities to evidence creation, Judge Laltaika made the technical discussion accessible and highlighted the ubiquity of digital footprints in modern life.


Impact

This observation shifted the discussion from theoretical legal principles to practical, personal implications. It helped establish the relevance of the topic for all participants and set the foundation for understanding why digital evidence standards matter for everyone, not just legal professionals.


We know that AI can have hallucinations. We’ve seen law cases in the United States where a lawyer just put in a question to the AI system and got back case citations that were not true. They made them up. Because AI and large language models use predictive technology, not definite technology.

Speaker

Peter Swire


Reason

This comment introduced a critical distinction between predictive and definitive technology that fundamentally challenges how courts might approach AI-generated evidence. The concept of AI ‘hallucinations’ in legal contexts represents a new category of evidentiary risk that traditional legal frameworks weren’t designed to handle.


Impact

This insight prompted a deeper discussion about verification methods and introduced the need for new protocols like citation checking. It elevated the conversation from basic digital evidence authentication to the more complex challenge of AI-generated content, influencing subsequent discussions about verification standards.


When surveillance happens outside transparent legal frameworks, courts are sidelined and unable to guarantee fundamental rights they are tasked to protect… the nature of how they work and their affordances move way beyond traditional investigative methods, such as telephonic interceptions.

Speaker

Jacqueline Pegato


Reason

This comment was thought-provoking because it highlighted how advanced surveillance technologies can undermine judicial authority itself. By pointing out that spyware capabilities exceed traditional investigative methods, Pegato challenged the adequacy of existing legal frameworks and raised questions about institutional power balance.


Impact

This observation shifted the discussion from technical evidence handling to broader questions of judicial oversight and democratic accountability. It introduced the concept that technology might be outpacing the law’s ability to maintain checks and balances, prompting discussions about constitutional interpretation and regulatory gaps.


In many cases, even if the prosecution fails to even submit digital evidence, and the main barrier here comes from the lack of cooperation from the digital platforms, like social media platforms, in responding to requests from law enforcement agencies to provide information.

Speaker

Marin Ashraf


Reason

This comment revealed a critical gap between legal authority and practical enforcement in the digital age. It highlighted how private platforms’ cooperation (or lack thereof) can determine access to justice, particularly for vulnerable populations like survivors of online gender-based violence.


Impact

This insight broadened the discussion beyond technical evidence standards to include jurisdictional and corporate accountability issues. It introduced the concept that justice outcomes might depend on private companies’ policies and responsiveness, adding a new dimension to the conversation about digital justice.


There’s a principle the honorable judge will know that innocent until proven guilty… there are certain challenges which are often faced by the defendants in the digital crimes. And I will just mention a few of them. One of them is like updating outdated law legislations because every day new thing is happening in the digital world.

Speaker

Umar Khan


Reason

This comment was insightful because it highlighted the tension between fundamental legal principles and rapidly evolving technology. Khan pointed out that the speed of technological change creates a structural challenge for legal systems that rely on precedent and established procedures.


Impact

This observation prompted discussion about the need for adaptive legal frameworks and continuous judicial education. It shifted focus to the systemic challenge of keeping legal systems current with technological developments, influencing later discussions about capacity building and international cooperation.


So the judiciary does not operate in silo, like it has its own way of preserving. No, we are part of the government. So the standard of security that applies to records of parliament or state house applies to the court as well.

Speaker

Eliamani Isaya Laltaika


Reason

This comment challenged assumptions about judicial independence in cybersecurity contexts. It revealed how digital infrastructure requirements might blur traditional separations between branches of government, raising questions about both security benefits and potential vulnerabilities.


Impact

This insight prompted discussion about institutional cybersecurity strategies and highlighted practical considerations for court system protection. It added a governance dimension to the technical discussion and influenced thinking about collaborative approaches to judicial cybersecurity.


Overall assessment

These key comments collectively transformed the discussion from a technical examination of digital evidence procedures into a comprehensive exploration of how technology is reshaping fundamental aspects of justice systems. The most impactful insights connected abstract legal concepts to personal experience, revealed gaps between legal authority and practical enforcement, and highlighted how technological change challenges traditional legal frameworks. The comments created a progression from individual evidence handling to systemic questions about judicial authority, democratic oversight, and institutional adaptation. This evolution helped establish the session’s central theme: that digital transformation requires not just new technical skills, but fundamental reconsideration of how justice systems operate in the digital age. The discussion successfully bridged technical, legal, and policy perspectives, achieving the stated goal of bringing judiciary concerns into the broader internet governance conversation.


Follow-up questions

How do we protect institutions from cyber threats?

Speaker

Naza Nicholas


Explanation

This was identified as question number three in the introduction, highlighting the need for institutional cybersecurity measures to protect judicial systems


AI and justice – Can we trust machines, machine learning in evidence analysis or sentencing?

Speaker

Naza Nicholas


Explanation

This was identified as question number four, addressing the critical issue of AI reliability in judicial decision-making processes


Training gaps – Judges need continuous specialized training to keep up with emerging tech and things like AI

Speaker

Naza Nicholas


Explanation

This highlights the ongoing need for judicial education and capacity building in digital technologies


What other protocols must be in place to ensure that alleged digital evidence is properly authenticated beyond digital forensics?

Speaker

Participant (Marta)


Explanation

This question arose from the Ola Bini case in Ecuador, emphasizing the need for comprehensive protocols to prevent misuse of digital evidence


How to handle contact information and notification issues in cross-border data processing cases?

Speaker

Adriana Castro


Explanation

This addresses practical challenges in international cooperation for digital evidence collection and data protection compliance


How to protect sensitive personal data during judicial proceedings while ensuring fair trial rights?

Speaker

Adriana Castro


Explanation

This concerns balancing transparency in legal proceedings with privacy protection, especially for sensitive personal information


Development of criminal data protection framework in jurisdictions that lack comprehensive cyber crime laws

Speaker

Jacqueline Pegato


Explanation

This addresses legislative gaps in countries like Brazil that have data protection laws but lack specific criminal frameworks for data-related crimes


How to update outdated legislation to address rapidly evolving digital crimes?

Speaker

Umar Khan


Explanation

This highlights the challenge of keeping legal frameworks current with technological developments in cybercrime


How to establish judicial training programs and capacity building initiatives across different jurisdictions?

Speaker

Multiple speakers (Eliamani Laltaika, Umar Khan)


Explanation

This addresses the urgent need for systematic education of judges and legal professionals in digital evidence and cybersecurity matters


How to improve cooperation between digital platforms and law enforcement agencies for evidence collection in online gender-based violence cases?

Speaker

Marin Ashraf


Explanation

This addresses practical barriers in obtaining digital evidence from social media platforms and service providers for prosecution of online violence cases


Disclaimer: This is not an official session record. DiploAI generates these resources from audiovisual recordings, and they are presented as-is, including potential errors. Due to logistical challenges, such as discrepancies in audio/video or transcripts, names may be misspelled. We strive for accuracy to the best of our ability.