Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 1 of 1
Full-Text Articles in Communications Law
Protecting The Innocent: How To Prevent The Consequences Of Misidentification And Doxing By Volunteers Helping With Open Source Investigations, Leigh M. Dannhauser
Protecting The Innocent: How To Prevent The Consequences Of Misidentification And Doxing By Volunteers Helping With Open Source Investigations, Leigh M. Dannhauser
Catholic University Journal of Law and Technology
Individuals performing open source investigations can misidentify alleged perpetrators and dox innocent parties online, which can subsequently lead to threats and harassment against innocent parties and their loved ones. For example, threats were made against Sunil Tripathi’s family after he was wrongly identified as one of the Boston Marathon bombers and doxed on Reddit and Twitter. In 2020, the Berkeley Protocol on Digital Open Source Investigations was published as a guide, and it includes a set of principles to govern open source investigations. However, the Berkeley Protocol is limited to open source investigations performed by those working for organizations. It …