{"id":314,"date":"2025-05-08T16:11:29","date_gmt":"2025-05-08T16:11:29","guid":{"rendered":"https:\/\/resilienceinnovationlab.org\/?p=314"},"modified":"2025-05-30T14:16:53","modified_gmt":"2025-05-30T14:16:53","slug":"berkeley-protocol-archival-activism-and-advocacy","status":"publish","type":"post","link":"https:\/\/resilienceinnovationlab.org\/?p=314","title":{"rendered":"Berkeley Protocol &#8211; Archival Activism and Advocacy"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"683\" height=\"1024\" src=\"https:\/\/resilienceinnovationlab.org\/wp-content\/uploads\/2025\/05\/image-2-683x1024.png\" alt=\"\" class=\"wp-image-315\" srcset=\"https:\/\/resilienceinnovationlab.org\/wp-content\/uploads\/2025\/05\/image-2-683x1024.png 683w, https:\/\/resilienceinnovationlab.org\/wp-content\/uploads\/2025\/05\/image-2-200x300.png 200w, https:\/\/resilienceinnovationlab.org\/wp-content\/uploads\/2025\/05\/image-2-768x1152.png 768w, https:\/\/resilienceinnovationlab.org\/wp-content\/uploads\/2025\/05\/image-2-720x1080.png 720w, https:\/\/resilienceinnovationlab.org\/wp-content\/uploads\/2025\/05\/image-2.png 1024w\" sizes=\"(max-width: 683px) 100vw, 683px\" \/><\/figure>\n\n\n\n<p><a href=\"https:\/\/www.ohchr.org\/sites\/default\/files\/2024-01\/OHCHR_BerkeleyProtocol.pdf\" data-type=\"link\" data-id=\"https:\/\/www.ohchr.org\/sites\/default\/files\/2024-01\/OHCHR_BerkeleyProtocol.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">The Berkeley Protocol on Digital Open Source Investigations (The Protocol) <\/a>is a pioneering initiative aimed at standardising the use of open-source information in investigations into human rights abuses and war crimes. Developed by the Human Rights Center at the University of California, Berkeley, it represents a significant step forward in the ethical and legal use of open-source intelligence (OSINT), including content collected from social media posts, videos, and other publicly accessible online sources. This framework is essential for helping investigators collect, verify, and present evidence in a way that meets international legal standards\u2014an essential process for holding perpetrators of human rights violations accountable.<\/p>\n\n\n\n<p>The Protocol addresses the challenges and complexities of verifying visual content\u2014such as photographs and videos\u2014to ensure authenticity and reliability. In crisis situations, digital evidence captured by ordinary citizens on smartphones can be highly impactful\u2014provided it is properly verified. The Protocol outlines procedures for confirming the source, location, and timing of such content, ensuring it can be effectively used in legal proceedings. Methods such as geolocation and chronolocation help prevent the spread of misinformation and strengthen the credibility of evidence used in human rights investigations.<\/p>\n\n\n\n<p>Blockchain technology has the potential to complement the Berkeley Protocol by offering a secure and tamper-proof platform for archiving crucial open-source data. In the context of archival activism, blockchain can be used to safeguard sensitive information collected during human rights investigations. Its decentralised nature ensures that once data is recorded, it cannot be altered or deleted without consensus\u2014preserving the integrity of evidence. This is particularly valuable in documenting war crimes or human rights abuses, where the risk of evidence being tampered with or destroyed by malicious actors is high.<\/p>\n\n\n\n<p>The goal of archival activism is to preserve vital information that might otherwise be lost or suppressed. Blockchain offers a powerful solution to this challenge. By storing open-source evidence on blockchain networks, activists and investigators can ensure that information remains accessible and unaltered\u2014even in the face of efforts by authoritarian regimes or other actors to suppress it. This decentralised archiving approach aligns with the principles of the Berkeley Protocol, which emphasises reliability and transparency in the collection and use of open-source data.<\/p>\n\n\n\n<p>The use of blockchain in human rights investigations also fosters greater collaboration among activists, legal professionals, and researchers. The technology\u2019s transparency and decentralisation enable multiple parties to access and verify evidence without requiring a central authority, enhancing trust and cooperation in the investigative process. This is particularly significant in international contexts, where organisations may collaborate to document and prosecute human rights violations. By offering a shared, tamper-proof evidence ledger, blockchain enhances the credibility of collected information and supports the aims of the Protocol.<\/p>\n\n\n\n<p>Moreover, blockchain can help address a major challenge identified by the Protocol: the fleeting nature of digital content. Social media platforms often remove content deemed too violent or in violation of policies, risking the loss of critical evidence. By archiving such material on the blockchain, investigators can ensure that vital information is preserved even after removal from online platforms. This helps maintain a complete record of events and ensures the voices of those affected by human rights violations are not silenced.<\/p>\n\n\n\n<p>The Protocol also highlights ethical considerations in the collection and use of open-source data. Blockchain\u2019s inherent transparency can address some of these concerns by providing a clear chain of custody for digital evidence. This means that the origin and handling of each piece of evidence can be traced, ensuring it has not been tampered with and that its use adheres to ethical standards. Such accountability is crucial in high-risk human rights investigations, where the consequences of using unreliable evidence can be severe.<\/p>\n\n\n\n<p>Beyond archiving and verification, blockchain also has a role to play in human rights advocacy, drawing public attention to abuses. By creating a permanent and publicly accessible record of evidence, blockchain can amplify the stories of victims and raise international awareness of ongoing crises. This aligns with the goals of the Protocol\u2014not only to support legal accountability but also to increase public recognition of human rights violations and promote social justice. Blockchain platforms can be used to share verified evidence with the public, journalists, and advocacy organisations, ensuring that truth is not buried and that responsible parties are held accountable.<\/p>\n\n\n\n<p>The integration of the Protocol\u2019s open-source investigation guidelines with blockchain\u2019s secure archiving and transparency capabilities creates a powerful toolset for safeguarding open-source data and supporting human rights advocacy. By ensuring that evidence is both credible and accessible, this approach strengthens the case against violators and supports efforts to seek justice for victims. In this context, blockchain enhances the integrity of evidence and empowers activists and investigators to continue their work in the face of adversity.<\/p>\n\n\n\n<p>In conclusion, the Protocol provides a much-needed framework for the ethical and effective use of open-source information in human rights investigations. By incorporating blockchain technology into this process, archival activists can ensure that key evidence is preserved, protected, and used to promote accountability and justice. This innovative approach to archival activism holds the potential to transform the field of human rights investigation, offering new tools and methodologies for documenting abuses and advocating for change.<\/p>\n\n\n\n<p>Read more: <a href=\"https:\/\/resilienceinnovationlab.org\/wp-content\/uploads\/2025\/01\/Web3Manual_final.pdf\" data-type=\"link\" data-id=\"https:\/\/resilienceinnovationlab.org\/wp-content\/uploads\/2025\/01\/Web3Manual_final.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Web3-backed Digital Archiving: User Guide For Beginners (Chinese Only)<\/a><\/p>\n\n\n\n<p><strong>\u6a94\u6848\u884c\u52d5\u4e3b\u7fa9\u8207\u5021\u5c0e -\u300a\u67cf\u514b\u840a\u6578\u4f4d\u958b\u6e90\u8abf\u67e5\u5354\u8b70\u300b<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/www.ohchr.org\/sites\/default\/files\/2024-01\/OHCHR_BerkeleyProtocol.pdf\" data-type=\"link\" data-id=\"https:\/\/www.ohchr.org\/sites\/default\/files\/2024-01\/OHCHR_BerkeleyProtocol.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">\u300a\u67cf\u514b\u840a\u6578\u4f4d\u958b\u6e90\u8abf\u67e5\u5354\u8b70\u300b (The Berkeley Protocol on Digital Open Source Investigation)<\/a> \u662f\u4e00\u9805\u958b\u5275\u6027\u7684\u5021\u8b70\uff0c\u65e8\u5728\u898f\u7bc4\u5728\u8abf\u67e5\u4eba\u6b0a\u4fb5\u5bb3\u548c\u6230\u722d\u7f6a\u884c\u4e2d\u4f7f\u7528\u958b\u6e90\u4fe1\u606f\u3002\u8a72\u5354\u8b70\u7531\u52a0\u5dde\u5927\u5b78\u67cf\u514b\u840a\u5206\u6821\u4eba\u6b0a\u4e2d\u5fc3\u5236\u5b9a\uff0c\u4ee3\u8868\u4e86\u5728\u9053\u5fb7\u548c\u6cd5\u5f8b\u4e0a\u4f7f\u7528\u958b\u6e90\u60c5\u5831\uff08OSINT\uff09\u7684\u91cd\u5927\u9032\u6b65\uff0c\u9019\u4e9b\u60c5\u5831\u5305\u62ec\u5f9e\u793e\u4ea4\u5a92\u9ad4\u5e16\u5b50\u3001\u8996\u983b\u548c\u5176\u4ed6\u516c\u958b\u53ef\u8a2a\u554f\u7684\u5728\u7dda\u5167\u5bb9\u4e2d\u6536\u96c6\u7684\u4fe1\u606f\u3002\u9019\u4e00\u6846\u67b6\u5c0d\u65bc\u5e6b\u52a9\u8abf\u67e5\u4eba\u54e1\u4ee5\u7b26\u5408\u570b\u969b\u6cd5\u5f8b\u6a19\u6e96\u7684\u65b9\u5f0f\u6536\u96c6\u3001\u9a57\u8b49\u548c\u5448\u73fe\u8b49\u64da\u81f3\u95dc\u91cd\u8981\uff0c\u9019\u5c0d\u65bc\u8ffd\u7a76\u4eba\u6b0a\u4fb5\u5bb3\u52a0\u5bb3\u8005\u7684\u8cac\u4efb\u81f3\u95dc\u91cd\u8981\u3002<\/p>\n\n\n\n<p>\u300a\u67cf\u514b\u840a\u5354\u8b70\u300b\u91dd\u5c0d\u9a57\u8b49\u8996\u89ba\u5167\u5bb9\uff08\u5982\u7167\u7247\u548c\u8996\u983b\uff09\u7684\u6311\u6230\u548c\u8907\u96dc\u6027\uff0c\u4ee5\u78ba\u4fdd\u5176\u771f\u5be6\u6027\u548c\u53ef\u9760\u6027\u3002\u5728\u5371\u6a5f\u4e8b\u4ef6\u4e2d\uff0c\u666e\u901a\u516c\u6c11\u4f7f\u7528\u667a\u80fd\u624b\u6a5f\u8a18\u9304\u7684\u6578\u78bc\u8b49\u64da\u53ef\u80fd\u5177\u6709\u5f88\u5927\u7684\u5f71\u97ff\u529b\uff0c\u4f46\u524d\u63d0\u662f\u5b83\u5011\u5f97\u5230\u4e86\u9069\u7576\u7684\u9a57\u8b49\u3002\u8a72\u5354\u8b70\u5236\u5b9a\u4e86\u9a57\u8b49\u6b64\u985e\u5167\u5bb9\u7684\u4f86\u6e90\u3001\u4f4d\u7f6e\u548c\u6642\u9593\u7684\u7a0b\u5e8f\uff0c\u78ba\u4fdd\u5176\u80fd\u5920\u5728\u6cd5\u5f8b\u7a0b\u5e8f\u4e2d\u6709\u6548\u4f7f\u7528\u3002\u9019\u4e00\u9a57\u8b49\u904e\u7a0b\uff0c\u5305\u62ec\u5730\u7406\u5b9a\u4f4d\u548c\u6642\u9593\u5b9a\u4f4d\u7b49\u65b9\u6cd5\uff0c\u6709\u52a9\u65bc\u9632\u6b62\u932f\u8aa4\u4fe1\u606f\u7684\u50b3\u64ad\uff0c\u4e26\u52a0\u5f37\u4eba\u6b0a\u8abf\u67e5\u4e2d\u4f7f\u7528\u7684\u8b49\u64da\u7684\u53ef\u4fe1\u5ea6\u3002<\/p>\n\n\n\n<p>\u5340\u584a\u93c8\u6280\u8853\u6709\u53ef\u80fd\u901a\u904e\u63d0\u4f9b\u4e00\u500b\u5b89\u5168\u4e14\u4e0d\u53ef\u66f4\u6539\u7684\u5e73\u53f0\u4f86\u88dc\u5145\u300a\u67cf\u514b\u840a\u5354\u8b70\u300b\uff0c\u7528\u65bc\u5b58\u6a94\u91cd\u8981\u7684\u958b\u6e90\u6578\u64da\u3002\u5728\u6a94\u6848\u884c\u52d5\u4e3b\u7fa9\u7684\u80cc\u666f\u4e0b\uff0c\u53ef\u4ee5\u5229\u7528\u5340\u584a\u93c8\u4f86\u4fdd\u8b77\u5728\u4eba\u6b0a\u8abf\u67e5\u4e2d\u6536\u96c6\u7684\u654f\u611f\u4fe1\u606f\u3002\u5340\u584a\u93c8\u7684\u53bb\u4e2d\u5fc3\u5316\u6027\u8cea\u78ba\u4fdd\u4e00\u65e6\u6578\u64da\u88ab\u8a18\u9304\uff0c\u5c31\u4e0d\u80fd\u5728\u672a\u7d93\u5171\u8b58\u7684\u60c5\u6cc1\u4e0b\u88ab\u66f4\u6539\u6216\u522a\u9664\uff0c\u9019\u5c0d\u65bc\u7dad\u8b77\u8b49\u64da\u7684\u5b8c\u6574\u6027\u81f3\u95dc\u91cd\u8981\u3002\u9019\u5728\u8a18\u9304\u6230\u722d\u7f6a\u884c\u6216\u4eba\u6b0a\u4fb5\u5bb3\u6642\u5c24\u70ba\u6709\u50f9\u503c\uff0c\u56e0\u70ba\u60e1\u610f\u884c\u70ba\u8005\u7be1\u6539\u6216\u522a\u9664\u8b49\u64da\u7684\u98a8\u96aa\u5f88\u9ad8\u3002<\/p>\n\n\n\n<p>\u6a94\u6848\u884c\u52d5\u4e3b\u7fa9\u7684\u76ee\u6a19\u662f\u4fdd\u5b58\u90a3\u4e9b\u53ef\u80fd\u6703\u4e1f\u5931\u6216\u88ab\u58d3\u5236\u7684\u91cd\u8981\u4fe1\u606f\uff0c\u800c\u5340\u584a\u93c8\u6280\u8853\u70ba\u9019\u4e00\u6311\u6230\u63d0\u4f9b\u4e86\u5f37\u5927\u7684\u89e3\u6c7a\u65b9\u6848\u3002\u901a\u904e\u5c07\u958b\u6e90\u8b49\u64da\u5b58\u5132\u5728\u5340\u584a\u93c8\u4e0a\uff0c\u6d3b\u52d5\u5bb6\u548c\u8abf\u67e5\u4eba\u54e1\u53ef\u4ee5\u78ba\u4fdd\u9019\u4e9b\u4fe1\u606f\u5728\u9762\u5c0d\u8a66\u5716\u58d3\u5236\u72af\u7f6a\u8b49\u64da\u7684\u5a01\u6b0a\u653f\u6b0a\u6216\u5176\u4ed6\u5be6\u9ad4\u6642\u4fdd\u6301\u53ef\u8a2a\u554f\u4e14\u672a\u88ab\u7be1\u6539\u3002\u9019\u7a2e\u53bb\u4e2d\u5fc3\u5316\u7684\u5b58\u6a94\u65b9\u5f0f\u7b26\u5408\u300a\u67cf\u514b\u840a\u5354\u8b70\u300b\u7684\u539f\u5247\uff0c\u5f37\u8abf\u5728\u6536\u96c6\u548c\u4f7f\u7528\u958b\u6e90\u6578\u64da\u6642\u7684\u53ef\u9760\u6027\u548c\u900f\u660e\u6027\u3002<\/p>\n\n\n\n<p>\u5728\u4eba\u6b0a\u8abf\u67e5\u4e2d\u4f7f\u7528\u5340\u584a\u93c8\u6280\u8853\u9084\u4fc3\u9032\u4e86\u884c\u52d5\u8005\u3001\u6cd5\u5f8b\u5c08\u696d\u4eba\u58eb\u548c\u7814\u7a76\u4eba\u54e1\u4e4b\u9593\u66f4\u5927\u7684\u5408\u4f5c\u3002\u5340\u584a\u93c8\u7684\u900f\u660e\u548c\u53bb\u4e2d\u5fc3\u5316\u7279\u6027\u5141\u8a31\u591a\u65b9\u5728\u7121\u9700\u4e2d\u592e\u6b0a\u5a01\u7684\u60c5\u6cc1\u4e0b\u8a2a\u554f\u548c\u9a57\u8b49\u8b49\u64da\uff0c\u5f9e\u800c\u4fc3\u9032\u8abf\u67e5\u904e\u7a0b\u4e2d\u7684\u4fe1\u4efb\u8207\u5408\u4f5c\u3002\u9019\u5728\u570b\u969b\u80cc\u666f\u4e0b\u5c24\u70ba\u91cd\u8981\uff0c\u56e0\u70ba\u4e0d\u540c\u7684\u7d44\u7e54\u53ef\u80fd\u6703\u5171\u540c\u52aa\u529b\u8a18\u9304\u548c\u8d77\u8a34\u4eba\u6b0a\u4fb5\u5bb3\u884c\u70ba\u3002\u901a\u904e\u63d0\u4f9b\u4e00\u500b\u5171\u4eab\u7684\u3001\u9632\u7be1\u6539\u7684\u8b49\u64da\u5206\u985e\u5e33\uff0c\u5340\u584a\u93c8\u53ef\u4ee5\u589e\u5f37\u6240\u6536\u96c6\u4fe1\u606f\u7684\u53ef\u4fe1\u5ea6\uff0c\u4e26\u652f\u6301\u300a\u67cf\u514b\u840a\u5354\u8b70\u300b\u7684\u76ee\u6a19\u3002<\/p>\n\n\n\n<p>\u6b64\u5916\uff0c\u5340\u584a\u93c8\u53ef\u4ee5\u5e6b\u52a9\u89e3\u6c7a\u300a\u67cf\u514b\u840a\u5354\u8b70\u300b\u6240\u6307\u51fa\u7684\u4e00\u500b\u4e3b\u8981\u6311\u6230\uff1a\u96fb\u5b50\u4fe1\u606f\u7684\u77ed\u66ab\u6027\u3002\u793e\u4ea4\u5a92\u9ad4\u516c\u53f8\u7d93\u5e38\u6703\u522a\u9664\u88ab\u8a8d\u70ba\u5167\u5bb9\u904e\u65bc\u66b4\u529b\u6216\u9055\u53cd\u5176\u653f\u7b56\u7684\u5167\u5bb9\uff0c\u9019\u53ef\u80fd\u5c0e\u81f4\u5bf6\u8cb4\u8b49\u64da\u7684\u4e1f\u5931\u3002\u901a\u904e\u5c07\u6b64\u985e\u5167\u5bb9\u5b58\u6a94\u5728\u5340\u584a\u93c8\u4e0a\uff0c\u8abf\u67e5\u4eba\u54e1\u53ef\u4ee5\u78ba\u4fdd\u91cd\u8981\u4fe1\u606f\u5373\u4f7f\u5728\u793e\u4ea4\u5a92\u9ad4\u5e73\u53f0\u4e0a\u88ab\u522a\u9664\u5f8c\u4ecd\u7136\u5f97\u5230\u4fdd\u5b58\u3002\u9019\u4e0d\u50c5\u6709\u52a9\u65bc\u4fdd\u6301\u5c0d\u4e8b\u4ef6\u7684\u5168\u9762\u8a18\u9304\uff0c\u9084\u78ba\u4fdd\u90a3\u4e9b\u53d7\u5230\u4eba\u6b0a\u4fb5\u5bb3\u7684\u4eba\u5011\u7684\u8072\u97f3\u4e0d\u6703\u88ab\u6d88\u97f3\u3002<\/p>\n\n\n\n<p>\u300a\u67cf\u514b\u840a\u5354\u8b70\u300b\u9084\u5f37\u8abf\u5728\u6536\u96c6\u548c\u4f7f\u7528\u958b\u6e90\u6578\u64da\u904e\u7a0b\u4e2d\u7684\u502b\u7406\u8003\u91cf\u3002\u5340\u584a\u93c8\u6280\u8853\u5177\u6709\u5167\u5728\u7684\u900f\u660e\u6027\uff0c\u80fd\u5920\u901a\u904e\u63d0\u4f9b\u96fb\u5b50\u8b49\u64da\u7684\u6e05\u6670\u4fdd\u7ba1\u93c8\u4f86\u89e3\u6c7a\u4e00\u4e9b\u9019\u6a23\u7684\u502b\u7406\u554f\u984c\u3002\u9019\u610f\u5473\u8457\u6bcf\u500b\u8b49\u64da\u7684\u4f86\u6e90\u548c\u8655\u7406\u904e\u7a0b\u90fd\u53ef\u4ee5\u88ab\u8ffd\u8e64\uff0c\u78ba\u4fdd\u5176\u672a\u88ab\u7be1\u6539\uff0c\u4e26\u4e14\u5176\u4f7f\u7528\u7b26\u5408\u502b\u7406\u6e96\u5247\u3002\u9019\u7a2e\u7d1a\u5225\u7684\u554f\u8cac\u5728\u4eba\u6b0a\u8abf\u67e5\u4e2d\u81f3\u95dc\u91cd\u8981\uff0c\u56e0\u70ba\u98a8\u96aa\u6975\u9ad8\uff0c\u4f7f\u7528\u4e0d\u53ef\u9760\u8b49\u64da\u7684\u5f8c\u679c\u53ef\u80fd\u975e\u5e38\u56b4\u91cd\u3002<\/p>\n\n\n\n<p>\u9664\u4e86\u5728\u5b58\u6a94\u548c\u9a57\u8b49\u4e2d\u7684\u4f5c\u7528\u5916\uff0c\u5340\u584a\u93c8\u9084\u53ef\u4ee5\u5728\u5021\u5c0e\u4eba\u6b0a\u65b9\u9762\u767c\u63ee\u4f5c\u7528\uff0c\u5438\u5f15\u516c\u773e\u5c0d\u4eba\u6b0a\u4fb5\u5bb3\u884c\u70ba\u7684\u95dc\u6ce8\u3002\u901a\u904e\u5275\u5efa\u6c38\u4e45\u4e14\u516c\u958b\u53ef\u8a2a\u554f\u7684\u8b49\u64da\u8a18\u9304\uff0c\u5340\u584a\u93c8\u53ef\u4ee5\u5e6b\u52a9\u653e\u5927\u53d7\u5bb3\u8005\u7684\u6545\u4e8b\uff0c\u4e26\u5c07\u570b\u969b\u95dc\u6ce8\u5f15\u5411\u6301\u7e8c\u7684\u5371\u6a5f\u3002\u9019\u8207\u300a\u67cf\u514b\u840a\u5354\u8b70\u300b\u7684\u76ee\u6a19\u4e00\u81f4\uff0c\u4e0d\u50c5\u652f\u6301\u6cd5\u5f8b\u554f\u8cac\uff0c\u9084\u63d0\u9ad8\u4eba\u5011\u5c0d\u4eba\u6b0a\u4fb5\u5bb3\u7684\u8a8d\u8b58\uff0c\u4e26\u4fc3\u9032\u793e\u6703\u6b63\u7fa9\u3002\u7531\u65bc\u5340\u584a\u93c8\u7684\u5e73\u53f0\u53ef\u4ee5\u7528\u65bc\u8207\u516c\u773e\u3001\u8a18\u8005\u548c\u5021\u5c0e\u7d44\u7e54\u5206\u4eab\u7d93\u904e\u9a57\u8b49\u7684\u8b49\u64da\uff0c\u78ba\u4fdd\u771f\u76f8\u4e0d\u88ab\u96b1\u779e\uff0c\u4e26\u8b93\u90a3\u4e9b\u8ca0\u6709\u8cac\u4efb\u7684\u4eba\u53d7\u5230\u8ffd\u7a76\u3002<\/p>\n\n\n\n<p>\u300a\u67cf\u514b\u840a\u5354\u8b70\u300b\u7684\u958b\u6e90\u8abf\u67e5\u6307\u5357\u8207\u5340\u584a\u93c8\u5728\u5b89\u5168\u5b58\u6a94\u548c\u900f\u660e\u6027\u65b9\u9762\u7684\u80fd\u529b\u76f8\u7d50\u5408\uff0c\u5275\u9020\u4e86\u4e00\u7a2e\u5f37\u6709\u529b\u7684\u5de5\u5177\u4f86\u4fdd\u8b77\u958b\u6e90\u6578\u64da\u4e26\u652f\u6301\u4eba\u6b0a\u5021\u5c0e\u3002\u901a\u904e\u78ba\u4fdd\u8b49\u64da\u65e2\u53ef\u9760\u53c8\u53ef\u8a2a\u554f\uff0c\u9019\u4e00\u65b9\u6cd5\u53ef\u4ee5\u5e6b\u52a9\u5c0d\u4eba\u6b0a\u4fb5\u5bb3\u8005\u5efa\u7acb\u66f4\u6709\u529b\u7684\u6848\u4ef6\uff0c\u4e26\u652f\u6301\u70ba\u53d7\u5bb3\u8005\u722d\u53d6\u6b63\u7fa9\u7684\u52aa\u529b\u3002\u5728\u9019\u4e00\u80cc\u666f\u4e0b\u4f7f\u7528\u5340\u584a\u93c8\u4e0d\u50c5\u63d0\u9ad8\u4e86\u8b49\u64da\u7684\u5b8c\u6574\u6027\uff0c\u9084\u4f7f\u884c\u52d5\u8005\u548c\u8abf\u67e5\u4eba\u54e1\u80fd\u5920\u5728\u9762\u5c0d\u6311\u6230\u6642\u7e7c\u7e8c\u4ed6\u5011\u7684\u5de5\u4f5c\u3002<\/p>\n\n\n\n<p>\u7e3d\u4e4b\uff0c\u300a\u67cf\u514b\u840a\u958b\u6e90\u8abf\u67e5\u5354\u8b70\u300b\u70ba\u5728\u4eba\u6b0a\u8abf\u67e5\u4e2d\u5177\u9053\u5fb7\u4e14\u6709\u6548\u5730\u4f7f\u7528\u958b\u6e90\u4fe1\u606f\u63d0\u4f9b\u4e86\u4e00\u500b\u6025\u9700\u7684\u6846\u67b6\u3002\u901a\u904e\u5c07\u5340\u584a\u93c8\u6280\u8853\u6574\u5408\u5230\u9019\u4e00\u904e\u7a0b\u4e2d\uff0c\u6a94\u6848\u884c\u52d5\u8005\u53ef\u4ee5\u78ba\u4fdd\u95dc\u9375\u8b49\u64da\u5f97\u5230\u4fdd\u5b58\u3001\u4fdd\u8b77\u4e26\u7528\u65bc\u4fc3\u9032\u554f\u8cac\u548c\u6b63\u7fa9\u3002\u9019\u7a2e\u5275\u65b0\u7684\u6a94\u6848\u884c\u52d5\u4e3b\u7fa9\u65b9\u6cd5\u6709\u53ef\u80fd\u6539\u8b8a\u4eba\u6b0a\u8abf\u67e5\u9818\u57df\uff0c\u70ba\u8a18\u9304\u4fb5\u5bb3\u884c\u70ba\u548c\u5021\u5c0e\u8b8a\u9769\u63d0\u4f9b\u65b0\u7684\u5de5\u5177\u548c\u65b9\u6cd5\u3002<\/p>\n\n\n\n<p>\u95b1\u8b80\u66f4\u591a\uff1a<a href=\"https:\/\/resilienceinnovationlab.org\/wp-content\/uploads\/2025\/01\/Web3Manual_final.pdf\" data-type=\"link\" data-id=\"https:\/\/resilienceinnovationlab.org\/wp-content\/uploads\/2025\/01\/Web3Manual_final.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">\u300a\u300c\u7121\u5927\u53f0\u300d\u5f0f\u8cc7\u6599\u8a18\u9304\uff1aWeb3\u6a94\u6848\u4fdd\u5b58\u5165\u9580\u624b\u518a\u300b<\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Berkeley Protocol on Digital Open Source Investigations (The Protocol) is a pioneering initiative aimed at standardising the use of open-source information in investigations into human rights abuses and war crimes. Developed by the Human Rights Center at the University of California, Berkeley, it represents a significant step forward in the ethical and legal use [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"saved_in_kubio":false,"iawp_total_views":2,"footnotes":""},"categories":[23,1,22],"tags":[26,14,17,8],"class_list":["post-314","post","type-post","status-publish","format-standard","hentry","category-publications","category-uncategorized","category-web3-education","tag-archival-activism","tag-manual","tag-social-movements","tag-web3"],"_links":{"self":[{"href":"https:\/\/resilienceinnovationlab.org\/index.php?rest_route=\/wp\/v2\/posts\/314","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/resilienceinnovationlab.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/resilienceinnovationlab.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/resilienceinnovationlab.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/resilienceinnovationlab.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=314"}],"version-history":[{"count":2,"href":"https:\/\/resilienceinnovationlab.org\/index.php?rest_route=\/wp\/v2\/posts\/314\/revisions"}],"predecessor-version":[{"id":317,"href":"https:\/\/resilienceinnovationlab.org\/index.php?rest_route=\/wp\/v2\/posts\/314\/revisions\/317"}],"wp:attachment":[{"href":"https:\/\/resilienceinnovationlab.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=314"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/resilienceinnovationlab.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=314"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/resilienceinnovationlab.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=314"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}