{"id":423,"date":"2024-08-30T18:45:42","date_gmt":"2024-08-30T18:45:42","guid":{"rendered":"https:\/\/youpple.com\/dataclergy\/?p=423"},"modified":"2024-08-30T18:45:53","modified_gmt":"2024-08-30T18:45:53","slug":"acpo","status":"publish","type":"post","link":"https:\/\/youpple.com\/dataclergy\/2024\/08\/30\/acpo\/","title":{"rendered":"ACPO"},"content":{"rendered":"<p>ACPO Good Practice Guide ACPO Good Practice Guide<br \/>\nfor Digital Evidence for Digital Evidence<br \/>\nMarch 2012<br \/>\nACPO Good Practice Guide<br \/>\nfor Digital Evidence<br \/>\nThe Association of Chief Police Officers have agreed to this revised<br \/>\ngood practice guide being circulated to, and adopted by, Police Forces<br \/>\nin England, Wales &amp; Northern Ireland.<br \/>\nIt is NOT PROTECTIVELY MARKED under the Government Protective<br \/>\nMarking Scheme and it is disclosable under the Freedom of<br \/>\nInformation Act 2000.<br \/>\nACPO \u00a9 2012<br \/>\n2 NOT PROTECTIVELY MARKED ACPO Good Practice Guide for Digital Evidence, Version 5 (October 2011)<br \/>\nAssociation of Chief Police Officers of England, Wales &amp; Northern Ireland<\/p>\n<p>Document information<br \/>\nProtective marking NOT PROTECTIVELY MARKED<br \/>\nAuthor DAC Janet Williams QPM<br \/>\nForce\/Organisation Metropolitan Police Service<br \/>\nACPO Business Area Crime BA<br \/>\nContact details 020 7230 6800<br \/>\nReview date As required<br \/>\nVersion 5.0<\/p>\n<p>Any queries relating to this document should be directed to either<br \/>\nthe author detailed above or the ACPO Programme Support Office<br \/>\non 020 7084 8958\/8959.<br \/>\nThis best practice guide has been produced by the ACPO Crime<br \/>\nBusiness Area and was originally approved by ACPO Cabinet in<br \/>\nDecember 2007. The purpose of this document is to provide<br \/>\nguidance not only to assist law enforcement but for all that<br \/>\nassists in investigating cyber security incidents and crime. It will<br \/>\nbe updated according to legislative and policy changes and republished as required.<br \/>\n3 NOT PROTECTIVELY MARKED ACPO Good Practice Guide for Digital Evidence, Version 5 (October 2011)<br \/>\nAssociation of Chief Police Officers of England, Wales &amp; Northern Ireland<br \/>\nContents<br \/>\nSection Page<br \/>\nIntroduction to the Guide 4<br \/>\nForeword 5<br \/>\n1 Application of Guide 6<br \/>\n2 The Principles of Digital Evidence 6<br \/>\n3 Plan 7<br \/>\n4 Capture 8<br \/>\n5 Analyse 10<br \/>\n6 Present 11<br \/>\n7 General 13<br \/>\nAppendix A Network Forensic and Volatile Data Collection<br \/>\nAppendix B Crimes involving Websites, Forums and Blogs<br \/>\nAppendix C Crime Scenes<br \/>\nAppendix D Developing a Digital Investigation Strategy<br \/>\nAppendix E ACPO Workbook<br \/>\n4 NOT PROTECTIVELY MARKED ACPO Good Practice Guide for Digital Evidence, Version 5 (October 2011)<br \/>\nAssociation of Chief Police Officers of England, Wales &amp; Northern Ireland<br \/>\nINTRODUCTION TO THE GUIDE FOR DIGITAL EVIDENCE<br \/>\nIt gives me great pleasure to introduce the 5th version of the ACPO Good Practice Guide for Digital<br \/>\nEvidence. Much effort has been put in to ensure that the right information is available to practitioners and<br \/>\nmanagers in the fight against cyber crime. I would like to thank all those who contributed to its creation for<br \/>\ntheir efforts in drawing together their expert knowledge in tackling the criminal misuse of current and<br \/>\nemerging technologies. The review board drew together people from academia, private and the public<br \/>\nsector and has been an excellent example of collaborative working.<br \/>\nSince taking the UK policing lead for e-Crime in April 2008, I have overseen the creation of the Police Central<br \/>\ne-Crime Unit. The team has grown from strength to strength through partnership working leading to the<br \/>\nformation of a centre of excellence for cyber crime and the successful prosecution of cyber criminals. It is<br \/>\nonly through bringing together the expertise in policing across the UK, the capability and best practice within<br \/>\nindustry, support of Government and the Criminal Justice System that we will combat those responsible for<br \/>\ncyber crime.<br \/>\nI am pleased that there has been recognition of a need to co-ordinate the UK response to cyber security<br \/>\nissues through the establishment of the Office of Cyber Security and the Cyber Security Operations Centre.<br \/>\nThis approach will combine the various industries, law enforcement and agencies\u2019 hard work to corral them<br \/>\ninto a single effort to gather intelligence, enforcement capability and create the right framework of policy<br \/>\nand doctrine to better enable us all to tackle the major issues identified.<br \/>\nThis guide has changed from version 4, where it centred on computer based evidence; the new revision<br \/>\nreflects digital based evidence and attempts to encompass the diversity of the digital world. As such this<br \/>\nguide would not only assist law enforcement but the wider family that assists in investigating cyber security<br \/>\nincidents. I commend all to read and make use of the knowledge and learning contained in this guide to<br \/>\nprovide us with the right tools to carry out our role.<br \/>\nJanet Williams QPM<br \/>\nDeputy Assistant Commissioner<br \/>\nMetropolitan Police Service<br \/>\nACPO lead for the e-Crime Portfolio.<br \/>\n5 NOT PROTECTIVELY MARKED ACPO Good Practice Guide for Digital Evidence, Version 5 (October 2011)<br \/>\nAssociation of Chief Police Officers of England, Wales &amp; Northern Ireland<br \/>\nFOREWORD<br \/>\nIt seems that whenever a review of ACPO guidance is carried out we are in the middle of technological<br \/>\nchanges that have vast impact on the work that is done within digital forensic units. It is a testament to the<br \/>\nauthors of the original four guiding principles for digital forensics that they still hold today, and one of the<br \/>\nkey early decisions of the review board was to keep those four principles, with only a slight change of<br \/>\nwording to principle four.<br \/>\nWe work in an area of constant change. There is a continuing need to re-evaluate and revise our capacities<br \/>\nto perform our duties. There is a need to recover and analyse digital data that can now be found within the<br \/>\nmany devices that are within day to day use, and can supply vital evidence in all our investigations.<br \/>\nHence a second key early decision was to change the title of the document to ACPO Good Practice Guide for<br \/>\nDigital Evidence. This would hopefully encompass all aspects of digital evidence and remove the difficulty<br \/>\nabout trying to draw the line to what is or isn\u2019t a computer and thus falling within the remit of this guide.<br \/>\nIt is important that people who work within the arena of digital forensics do not just concentrate on the<br \/>\ntechnology, as essential as that is, but that the processes we use are fit for the purpose, and that skills and<br \/>\ncapacities within units reflect the demands that are made on them.<br \/>\nA prime example of this is the use of the word \u2019triage\u2019. It has been a subject of much discussion within the<br \/>\nforensic community. It should be noted that it does not mean a single triage tool rather it is a complete<br \/>\nprocess where certain tools will play a part but are not the whole solution.<br \/>\nThis guide is not intended to be an A-Z of digital forensics, or a specific \u201chow to do\u201d instruction manual. It<br \/>\nshould paint an overall picture and provides an underlying structure to what is required within Digital<br \/>\nForensic Units (DFUs). Therefore, the guide has been produced as a high-level document without the<br \/>\nspecific guidance included in previous versions, as this guidance is now available elsewhere. Where<br \/>\nrelevant, links to other guidance documents will be given.<br \/>\nIn this document Digital Forensic Unit is used to cover any type of group that is actively involved in the<br \/>\nprocessing of digital evidence.<br \/>\n6 NOT PROTECTIVELY MARKED ACPO Good Practice Guide for Digital Evidence, Version 5 (October 2011)<br \/>\nAssociation of Chief Police Officers of England, Wales &amp; Northern Ireland<br \/>\n1. SECTION 1 \u2013 APPLICATION OF GUIDE<br \/>\n1.1 When reading and applying the principles of this guide, any reference made to the police service<br \/>\nalso includes the Scottish Crime and Drugs Enforcement Agency (SCDEA) and the Police Service for<br \/>\nNorthern Ireland (PSNI) unless otherwise indicated.<br \/>\n1.2 This guide is primarily written for the guidance of UK law enforcement personnel who may deal with<br \/>\ndigital evidence. This will include:<br \/>\n\u2022 Persons who are involved in the securing, seizing and transporting of equipment from<br \/>\nsearch scenes with a view to recovering digital evidence, as well as in the identification of<br \/>\nthe digital information needed to investigate crime;<br \/>\n\u2022 Investigators who plan and manage the identification, presentation and storage of digital<br \/>\nevidence, and the use of that evidence;<br \/>\n\u2022 Persons who recover and reproduce seized digital evidence and are trained to carry out the<br \/>\nfunction and have relevant training to give evidence in court of their actions. Persons who<br \/>\nhave not received appropriate training and are unable to comply with the<br \/>\nprinciples should not carry out this category of activity;<br \/>\n\u2022 Persons who are involved in the selection and management of persons who may be required<br \/>\nto assist in the recovery, identification and interpretation of digital evidence.<br \/>\n1.3 Since the previous version of the guide was published, the Forensic Science Regulator has published<br \/>\nnew draft Codes of Conduct and Practice covering forensic science throughout the UK. All<br \/>\npractitioners working in the field of digital forensics must abide by these codes.<br \/>\n2. SECTION 2 \u2013 THE PRINCIPLES OF DIGITAL EVIDENCE<br \/>\n2.1 PRINCIPLES<br \/>\n2.1.1 Principle 1: No action taken by law enforcement agencies, persons employed within those agencies<br \/>\nor their agents should change data which may subsequently be relied upon in court.<br \/>\n2.1.2 Principle 2: In circumstances where a person finds it necessary to access original data, that person<br \/>\nmust be competent to do so and be able to give evidence explaining the relevance and the<br \/>\nimplications of their actions.<br \/>\n2.1.3 Principle 3: An audit trail or other record of all processes applied to digital evidence should be<br \/>\ncreated and preserved. An independent third party should be able to examine those processes and<br \/>\nachieve the same result.<br \/>\n2.1.4 Principle 4: The person in charge of the investigation has overall responsibility for ensuring that<br \/>\nthe law and these principles are adhered to.<br \/>\n2.2 EXPLANATION OF THE PRINCIPLES<br \/>\n2.2.1 All digital evidence is subject to the same rules and laws that apply to documentary evidence.<br \/>\n2.2.2 The doctrine of documentary evidence may be explained thus: the onus is on the prosecution to<br \/>\nshow to the court that the evidence produced is no more and no less now than when it was first<br \/>\ntaken into the possession of law enforcement.<br \/>\n2.2.3 Operating systems and other programs frequently alter, add and delete the contents of electronic<br \/>\nstorage. This may happen automatically without the user necessarily being aware that the data has<br \/>\nbeen changed.<br \/>\n7 NOT PROTECTIVELY MARKED ACPO Good Practice Guide for Digital Evidence, Version 5 (October 2011)<br \/>\nAssociation of Chief Police Officers of England, Wales &amp; Northern Ireland<br \/>\n2.2.4 In order to comply with the principles of digital evidence, wherever practicable, proportionate and<br \/>\nrelevant an image should be made of the device. This will ensure that the original data is preserved,<br \/>\nenabling an independent third party to re-examine it and achieve the same result, as required by<br \/>\nprinciple 3.<br \/>\n2.2.5 This may be a physical \/ logical block image of the entire device, or a logical file image containing<br \/>\npartial or selective data (which may be captured as a result of a triage process). Investigators should<br \/>\nuse their professional judgement to endeavour to capture all relevant evidence if this approach is<br \/>\nadopted.<br \/>\n2.2.6 In cases dealing with data which is not stored locally but is stored at a remote, possibly inaccessible<br \/>\nlocation it may not be possible to obtain an image. It may become necessary for the original data to<br \/>\nbe directly accessed to recover the data. With this in mind, it is essential that a person who is<br \/>\ncompetent to retrieve the data and then able to give evidence to a court of law makes any such<br \/>\naccess. Due consideration must also be given to applicable legislation if data is retrieved which<br \/>\nresides in another jurisdiction.<br \/>\n2.2.7 It is essential to display objectivity in a court of law, as well as the continuity and integrity of<br \/>\nevidence. It is also necessary to demonstrate how evidence has been recovered, showing each<br \/>\nprocess through which the evidence was obtained. Evidence should be preserved to such an extent<br \/>\nthat a third party is able to repeat the same process and arrive at the same result as that presented<br \/>\nto a court.<br \/>\n2.2.8 It should be noted that the application of the principles does not preclude a proportionate approach<br \/>\nto the examination of digital evidence. Those making decisions about the conduct of a digital<br \/>\ninvestigation must often make judgements about the focus and scope of an investigation, taking into<br \/>\naccount available intelligence and investigative resources. This will often include a risk assessment<br \/>\nbased on technical and non-technical factors, for example the potential evidence which may be held<br \/>\nby a particular type of device or the previous offending history of the suspect. Where this is done it<br \/>\nshould be transparent, decisions should be justifiable and the rationale recorded.<br \/>\n2.2.9 Application of the four principles will also be informed by:<br \/>\n\u2022 The Forensic Science Regulator\u2019s forthcoming Codes of Practice and Conduct;<br \/>\n\u2022 The guidance around digital forensic process improvements developed by the National<br \/>\nPolicing Improvement Agency\u2019s Forensic 21 programme and those engaged in the collection,<br \/>\nexamination or reporting of digital evidence should also refer to that guidance.<br \/>\n3. SECTION 3 \u2013 PLAN<br \/>\n3.1 This also refers to the:<br \/>\n\u2022 The NPIA Forensic21 HTCU Computer Examination Process, 2011<br \/>\n\u2022 The SCDEA HTCU Guidance.<br \/>\n3.2 The proliferation of digital devices and the advances in digital communications mean that digital<br \/>\nevidence is now present or potentially present in almost every crime.<br \/>\n3.3 Digital evidence can be found in a number of different locations:<br \/>\n\u2022 Locally on an end-user device \u2013 typically a user\u2019s computer, mobile\/smart phone, satellite<br \/>\nnavigation system, USB thumb drive, or digital camera;<br \/>\n\u2022 On a remote resource that is public \u2013 for example websites used for social networking,<br \/>\ndiscussion forums, and newsgroups;<br \/>\n\u2022 On a remote resource that is private \u2013 an internet Service Provider\u2019s logs of users\u2019 activity, a<br \/>\nmobile phone company\u2019s records of customers\u2019 billing, a user\u2019s webmail account, and<br \/>\nincreasingly common, a user\u2019s remote file storage;<br \/>\n8 NOT PROTECTIVELY MARKED ACPO Good Practice Guide for Digital Evidence, Version 5 (October 2011)<br \/>\nAssociation of Chief Police Officers of England, Wales &amp; Northern Ireland<br \/>\n\u2022 In transit \u2013 for example mobile phone text messages, or voice calls, emails, or internet chat.<br \/>\n3.4 It would be quite common for evidence of a crime to be in more than one of the locations<br \/>\nmentioned above. However it might be much easier to obtain the evidence from one location rather<br \/>\nthan another; careful consideration should be given to the resources required to obtain the<br \/>\nevidence.<br \/>\n3.5 For example, if evidence is required of contact between two mobile phone numbers, the best<br \/>\nmethod would be to obtain call data from the Communication Service Providers via the force SPOC,<br \/>\nrather than to request a forensic examination of the mobile phones. The call data is likely to be<br \/>\nmore comprehensive than call logs from a mobile phone and the times and dates can be relied<br \/>\nupon, which is not necessarily the case with logs from a mobile phone.<br \/>\n3.6 In addition, investigators seeking to capture \u2018in transit\u2019 evidence must be aware of the implications<br \/>\nunder the Regulation of Investigatory Powers Act (RIPA) and the need to seek appropriate<br \/>\nauthorities for doing so. Further information is available from force SPOCs.<br \/>\n3.7 With the above in mind, it is important that investigators develop appropriate strategies to identify<br \/>\nthe existence of digital evidence and to secure and interpret that evidence throughout their<br \/>\ninvestigation.<br \/>\n3.8 Due consideration should always be given by the investigators of the benefits to the overall<br \/>\ninvestigation of conducting any digital forensic work. Proportionality should be assessed when a<br \/>\ndigital forensic strategy is being considered to ensure that limited resources for digital forensic<br \/>\ninvestigation are directed appropriately.<br \/>\n4. SECTION 4 \u2013 CAPTURE<br \/>\n4.1 This also refers to:<br \/>\n\u2022 Retrieval of Video Evidence and Production of Working Copies from Digital CCTV Systems<br \/>\nv2.0;<br \/>\n\u2022 Network forensics and volatile data collection \u2013 Appendix A;<br \/>\n\u2022 Crimes involving websites, forums and blogs \u2013 Appendix B.<br \/>\n4.2 PHYSICAL CRIME SCENES<br \/>\n4.2.1 There are many different types of digital media and end-user devices, which may be encountered<br \/>\nduring a search of a crime scene, all of which have the potential to hold data which may be of value<br \/>\nto the investigation. In order to preserve the data and achieve best evidence, these items must be<br \/>\nhandled and seized appropriately, and should be treated with as much care as any other item that is<br \/>\nto be forensically examined. This section is intended to assist individuals to ensure their actions in<br \/>\nrelation to seizure are correct.<br \/>\n4.3 PROPORTIONALITY ISSUES RELATING TO SEIZURE<br \/>\n4.3.1 Proportionality issues relating to seizure are:<br \/>\n\u2022 Before seizing an item, consider whether the item is likely to hold evidence. For example, is<br \/>\nthis a family computer or a computer belonging to a suspect?<br \/>\n\u2022 Ensure that details of where the item was found are recorded, which could assist in<br \/>\nprioritising items for examination at a later stage;<br \/>\n\u2022 Consider when the offence was committed; when seizing CCTV, give consideration to<br \/>\nnarrowing down what is seized, by camera and\/or time period. Check whether another<br \/>\nsystem may be better placed to record the evidence;<br \/>\n9 NOT PROTECTIVELY MARKED ACPO Good Practice Guide for Digital Evidence, Version 5 (October 2011)<br \/>\nAssociation of Chief Police Officers of England, Wales &amp; Northern Ireland<br \/>\n\u2022 Differentiate between mobile phones found on a suspect (likely to be in current use) and<br \/>\nphones found in a drawer (may not be in current use), as different levels of examination<br \/>\nmay be possible for these;<br \/>\n\u2022 Also consider that evidence may be stored online, or on an internet service provider\u2019s<br \/>\nsystems, and end-user devices may only be needed to obtain the details necessary to<br \/>\nrequest this evidence from the service provider. If so, it is best to seize items in current<br \/>\nusage, i.e. computers connected to the internet.<br \/>\n4.3.2 Digital devices and media should not be seized just because they are there. The person in charge of<br \/>\nthe search must have reasonable grounds to remove property and there must be justifiable reasons<br \/>\nfor doing so. The search provisions of PACE Legislation Codes of Practice equally apply to digital<br \/>\ndevices and media in England, Wales and Northern Ireland. In Scotland, officers should ensure they<br \/>\nare acting within the terms of the search warrant.<br \/>\n4.3.3 Due regard should also be given to the application of the European Convention of Human Rights.<br \/>\n4.4 BEFORE ATTENDING A SCENE TO CAPTURE DIGITAL EVIDENCE<br \/>\n4.4.1 Persons responsible for the seizure of digital devices, or for on-scene capture of data, should ensure:<br \/>\n\u2022 They have the necessary equipment. (Refer to the First Responder\u2019s Guide for a detailed<br \/>\nbreakdown);<br \/>\n\u2022 They have considered potential sources of evidence and know what is likely to be relevant,<br \/>\nwhere possible.<br \/>\n4.4.2 Where an investigation is likely to involve the examination of user-created digital images,<br \/>\nconsideration should be given to the question of seizing of cameras and other devices capable of<br \/>\ntaking digital photographs. For example, in cases where a suspect is believed to have taken indecent<br \/>\nphotographs of children, seizure of devices capable of taking digital photos could be useful not only<br \/>\nfor the data they store, but also to link these devices to previously identified indecent photographs<br \/>\nby the examination of digital metadata (EXIF data).<br \/>\n4.4.3 Where necessary, specialist advice from a force\u2019s Digital Forensic Unit should be sought in advance.<br \/>\nIf given sufficient information about the investigation, DFUs will be able to advise on which items are<br \/>\nmost likely to provide the evidence sought.<br \/>\n4.5 WHEN ATTENDING A SCENE<br \/>\n4.5.1 To comply with principle 3, records must be kept of all actions taken in relation to digital evidence,<br \/>\nwhich could include photographs\/diagrams of equipment locations, details of any information<br \/>\nprovided by persons present, and records of any actions taken at the scene.<br \/>\n4.5.2 Refer to the First Responder\u2019s Guide for detailed guidance on seizure for individual items. However,<br \/>\npersons attending a scene should be especially aware that systems which are powered on<br \/>\n(running) need to be handled with care, as there is the potential to make unwanted changes to<br \/>\nthe evidence if these are not dealt with correctly. Such systems should only be accessed by<br \/>\nappropriately trained personnel. In addition, volatile data of evidential value may be lost.<br \/>\n4.6 CAPTURING ONLINE EVIDENCE<br \/>\n4.6.1 In some investigations the capture of digital evidence may be from an online rather than a physical<br \/>\nlocation. Detailed guidance on securing this evidence can be found in \u2018Crimes involving websites,<br \/>\nforums and blogs\u2019 and \u2018Network forensics and volatile data\u2019.<br \/>\n4.6.2 Online evidence can roughly be split into that which is publicly available (e.g. forum postings, where<br \/>\nthe forum does not require a login to view) and that which is private (e.g. Facebook account<br \/>\ninformation). There may be scope to obtain both (e.g. by capturing the text of a forum posting and<br \/>\nthen requesting the account details of the user who made the posting from the forum owner).<br \/>\n10 NOT PROTECTIVELY MARKED ACPO Good Practice Guide for Digital Evidence, Version 5 (October 2011)<br \/>\nAssociation of Chief Police Officers of England, Wales &amp; Northern Ireland<br \/>\nInvestigators should be aware of the potential issues when capturing publicly available data,<br \/>\nIncluding the \u2018footprints\u2019 which are left when accessing a site, which can alert a website owner to<br \/>\nlaw enforcement interest.<br \/>\n4.6.3 Records should be kept of all actions taken when capturing online evidence in order to comply with<br \/>\nprinciple 3.<\/p>\n<p>5. SECTION 5 \u2013 ANALYSE<br \/>\n5.1 This also refers to:<br \/>\n\u2022 The NPIA Forensics21 HTCU Computer Examination Process, 2011;<br \/>\n\u2022 Forensic Science Regulator\u2019s Codes of Practice and Conduct;<br \/>\n\u2022 Digital Imaging Procedure v2.1.<br \/>\n5.2 Devices seized as part of a search will typically be submitted to the force Digital Forensic Unit in<br \/>\naccordance with force policy. Due to the volume and complexity of data stored on digital devices, it<br \/>\nis not possible or desirable to extract all data held on a device for review by investigators. Instead, a<br \/>\nforensic strategy needs to be formulated to enable the examination to be focused on the relevant<br \/>\ndata.<br \/>\n5.3 The National Policing Improvement Agency is currently formulating suggested processes for digital<br \/>\nexaminations involving computer and phone devices. Readers should refer to these processes for<br \/>\nmore specific detail of best practice digital examination processes. Other types of digital<br \/>\nexaminations should follow the same principles, briefly summarised below.<br \/>\n5.4 The investigator needs to properly consider the nature and purpose of the digital examination. The<br \/>\ninvestigator must be clear on what priorities are placed on the examination as it may well be that<br \/>\nkey information needs to be found in order to preserve evidence that may exist elsewhere. This is<br \/>\nparticularly the case where it relates to the existence of additional evidence, offenders and victims.<br \/>\n5.5 When submitting evidence to Digital Forensic Units, investigators must supply specific requirements.<br \/>\nIt is not practically possible to examine every item of digital data and clear tasking is needed to<br \/>\nensure that the digital forensic practitioner has the best chance of finding any evidence which is<br \/>\nrelevant to the investigation.<br \/>\n5.6 For more complex or lengthy investigations, an initial triage\/review of the digital evidence (whether<br \/>\nor not this is done using a specific triage tool) will give investigators and practitioners a better<br \/>\nunderstanding of the nature of the digital evidence held. The forensic strategy should be regularly<br \/>\nreviewed to take account of any changes in the direction of the investigation, which may occur as a<br \/>\nresult of digital forensic examination (for example, finding emails identifying a co-conspirator) or<br \/>\ninvestigations elsewhere (a witness identifying another person as being of interest to the<br \/>\ninvestigation). For this reason it is vital that the investigator and the digital forensic practitioner<br \/>\ncommunicate regularly regarding the progress of the investigation.<br \/>\n5.7 If initial examination results in a large amount of data to be reviewed, consideration must be given<br \/>\nto who is best placed to review that data. Often this will be the investigator, due to their greater<br \/>\nknowledge of the case. Dependent on the source, this data may include:<br \/>\n\u2022 Internet history records;<br \/>\n\u2022 E-mails;<br \/>\n\u2022 Instant Messaging Logs;<br \/>\n\u2022 Media files (images and videos);<br \/>\n\u2022 Text documents;<br \/>\n\u2022 Spreadsheets;<br \/>\n\u2022 CCTV;<br \/>\n\u2022 Text Messages.<br \/>\n11 NOT PROTECTIVELY MARKED ACPO Good Practice Guide for Digital Evidence, Version 5 (October 2011)<br \/>\nAssociation of Chief Police Officers of England, Wales &amp; Northern Ireland<br \/>\n5.8 Collaboration with the Digital Forensic Unit will ensure that the significance of any reviewed data is<br \/>\nnot misunderstood. For example, when reviewing keyword hits which exist in deleted files, the<br \/>\nsignificance of a hit\u2019s location may need explanation from a digital forensic practitioner.<br \/>\n5.9 For mobile phone examinations, different levels of examination may be appropriate depending on<br \/>\nthe intelligence relating to the device and the requirements of the investigation. For example, a<br \/>\nphone which has been found in a drawer may be examined only to retrieve the necessary<br \/>\ninformation to request billing details and to establish whether it is owned by the suspect (level 1). A<br \/>\nphone which is known to be in regular use by a suspect in a high profile investigation may be<br \/>\nsubject to a much more in-depth examination involving the retrieval of deleted data and potentially<br \/>\nthe physical removal and examination of memory chips (level 4). These examination levels are<br \/>\noutlined in the NPIA mobile phone SOPs.<br \/>\n5.10 INTERPRETATION OF DIGITAL DATA<br \/>\n5.10.1 As with other forensic evidence, interpretation is often required to ensure the evidential weight of<br \/>\nrecovered digital evidence is clear. Practitioners who undertake the interpretation of digital data<br \/>\nmust be competent to do so and have had sufficient training to undertake the task assigned to<br \/>\nthem.<br \/>\n5.10.2 As an example, the presence of indecent images of children on a computer would not in itself be<br \/>\nsufficient evidence of possession, as the possessor must be aware of the existence of the images. A<br \/>\ndigital forensic practitioner may interpret the presence of other digital evidence (such as a list of<br \/>\nrecently opened files, recent search terms, the name and location of folders\/files containing the<br \/>\nmaterial, or whether or not the computer is password protected) to establish the likelihood of the<br \/>\nuser being aware of the existence of these images.<br \/>\n5.10.3 Establishing the provenance of digital evidence is another key task of the forensic practitioner, who<br \/>\nmust use their knowledge and skills to identify not just that the evidence exists but also how it came<br \/>\nto be there. This is common to all forensic disciplines; for example, the presence of a defendant\u2019s<br \/>\nfingerprint on a bottle at the crime scene may not have any bearing on whether the defendant<br \/>\ncommitted the crime if the bottle may have been carried there by someone else. It is the<br \/>\nresponsibility of the practitioner to carry out analysis to identify provenance where necessary, to<br \/>\nmitigate the risk of their findings being misinterpreted.<br \/>\n5.10.4 Often the role of the digital forensic practitioner will be to make investigators and prosecutors aware<br \/>\nof the limitations of the digital evidence as well as its strengths.<br \/>\n5.10.5 It must also be borne in mind that the development of digital technology is dynamic and the<br \/>\npractitioners may well face significant challenges to their knowledge. It is not possible to be an<br \/>\nexpert in all aspects of digital forensic examination, but a practitioner should be aware of the limits<br \/>\nof their knowledge and where further research or additional specialist knowledge is required.<br \/>\n6. SECTION 6 \u2013 PRESENT<br \/>\n6.1 This also refers to:<br \/>\n\u2022 NPIA Forensics21 process maps;<br \/>\n\u2022 CPS disclosure manual, annex K.<br \/>\n6.2 Communication of the results of a digital forensic examination may be through a number of means:<br \/>\n\u2022 Verbally to an investigator\/officer throughout a case;<br \/>\n\u2022 By a statement or report on conclusion of the case;<br \/>\n\u2022 In court if witness evidence is required.<br \/>\n12 NOT PROTECTIVELY MARKED ACPO Good Practice Guide for Digital Evidence, Version 5 (October 2011)<br \/>\nAssociation of Chief Police Officers of England, Wales &amp; Northern Ireland<br \/>\n6.3 In all cases a digital forensic practitioner must be aware of their duty of impartiality and that they<br \/>\nmust communicate both the extent and the limitations of the digital forensic evidence. This is<br \/>\nespecially important as, due to the nature of digital forensic evidence, it is not always immediately<br \/>\nunderstandable by the layman.<br \/>\n6.4 VERBAL FEEDBACK<br \/>\n6.4.1 This should be given regularly throughout the progress of an examination. In this way it will enable<br \/>\nthe investigator to pursue relevant lines of enquiry as these become evident, and will ensure that<br \/>\nthe practitioner is up-to-date with any information required to better target their investigation.<br \/>\n6.4.2 It is important that this communication be recorded for potential disclosure at a later date. Good<br \/>\npractice would be for a verbal conversation to be followed up via email, or to be recorded in<br \/>\ncontemporaneous notes.<br \/>\n6.5 STATEMENTS OR REPORTS<br \/>\n6.5.1 The statement or report is the ultimate product of the examination. It should outline the<br \/>\nexamination process and the significant data recovered. Whilst an initial report may be relatively<br \/>\nbrief, the practitioner should be in a position to produce a full technical report should one later be<br \/>\nrequired.<br \/>\n6.5.2 The report should be written to be understandable to the reader; this may include the use of a<br \/>\nglossary, diagrams\/screenshots to illustrate points, the use of examples and avoidance of technical<br \/>\njargon.<br \/>\n6.5.3 When particular items are reproduced in a report, care should be taken to ensure that the<br \/>\nrepresentation is accurate. For example, pictures should not be reproduced at a larger size without<br \/>\nthis being made clear in the report. If a report is produced digitally, items should be reproduced<br \/>\nwhere possible in their original file formats, to ensure that those viewing will see the item as close as<br \/>\npossible to its original appearance. If this is not appropriate (for example, if a file needs to be<br \/>\nconverted to a more common format for reviewing) then the fact that it has been converted must be<br \/>\nstated in the report. Where it is not possible to reproduce the item as it would have originally been<br \/>\nviewed, for example, when a webpage is retrieved some time after the original page was accessed,<br \/>\nthis must also be clearly stated in the report.<br \/>\n6.5.4 The report should make clear the strength of any conclusions reached and always identify where an<br \/>\nopinion is being given, to distinguish this from fact. Where opinion evidence is provided, the<br \/>\npractitioner must state the facts on which this is based, and how he or she came to this conclusion.<br \/>\n6.6 WITNESS EVIDENCE<br \/>\n6.6.1 A practitioner may need to testify about not only the conduct of the examination, but also the<br \/>\nvalidity of the procedure and their experience and qualifications to conduct the examination.<br \/>\n6.6.2 Expert witness training should be considered for digital forensic practitioners so they are familiar<br \/>\nwith the process of giving evidence and aware of their responsibilities as witnesses. A digital<br \/>\nforensic practitioner will not always be giving expert evidence and should clearly understand the<br \/>\ndistinction between expert evidence and evidence of fact.<br \/>\n6.6.3 When giving evidence, practitioners must make clear when they are expressing facts and when they<br \/>\nare giving opinions, as above. Practitioners, when giving expert evidence, must take care to do so<br \/>\nonly where it relates to their own area of expertise and remember that their duty when giving<br \/>\nevidence (whether it be in report form or as a witness) is to the court, regardless of which party has<br \/>\ninstructed them.<br \/>\n13 NOT PROTECTIVELY MARKED ACPO Good Practice Guide for Digital Evidence, Version 5 (October 2011)<br \/>\nAssociation of Chief Police Officers of England, Wales &amp; Northern Ireland<br \/>\n6.7 CONTEMPORANEOUS NOTES<br \/>\n6.7.1 It is worth repeating at this point that full records should be made of all actions taken. These must<br \/>\nbe disclosed to the defence who may subsequently cause a further examination to be conducted. A<br \/>\nsignificant part of such an examination will be to validate the actions and results of the original<br \/>\nexamination. Such records are also part of the unused material for the case under investigation.<br \/>\n7. SECTION 7 \u2013 GENERAL<br \/>\n7.1 TRAINING AND EDUCATION<br \/>\n7.1.1 Also refers to:<br \/>\n\u2022 ACPO Good Practice and Advice Guide for Managers of e-Crime Investigations (\u2018Managers\u2019<br \/>\nGuide\u2019).<br \/>\n7.1.2 The general principle of training in digital investigation significantly differs from usual police training.<br \/>\nOwing to the rapidly changing environment of technology, there is a requirement for the continuous<br \/>\nbut essential retention and updating of skills.<br \/>\n7.1.3 Readers should refer to the section concerning training in the Good Practice and Advice Guide for<br \/>\nManagers of e-Crime Investigations.<br \/>\n7.1.4 It is also the personal responsibility of any person working within the area of digital forensics to<br \/>\nmaintain their knowledge of the subject areas they are involved in. Formal training is just one route,<br \/>\nbut there is also a vast amount of open-source information available for self development and<br \/>\nawareness. (Practitioners should be mindful that the veracity of open-source information cannot<br \/>\nalways be established, and should critically evaluate any information sourced in this way.)<br \/>\nProfessional development can also be progressed by attending conferences and technical<br \/>\nworkshops, conducting independent research, participating in online specialist forums or by<br \/>\ndiscussions with subject matter experts in other forces or agencies.<br \/>\n7.1.5 Police personnel should also be aware of POLKA (Police On-Line Knowledge Area), an information<br \/>\nsharing resource where there are digital forensic communities that discuss numerous topics and a<br \/>\nlibrary of some relevant documentation.<br \/>\n7.2 WELFARE IN THE WORKPLACE<br \/>\n7.2.1 Also refers to:<br \/>\n\u2022 ACPO Good Practice and Advice Guide for Managers of e-Crime Investigations.<br \/>\n7.2.2 There are a number of aspects concerning the welfare of staff working within the digital forensic<br \/>\narea and the risks associated with that type of work:<br \/>\n\u2022 The psychological effect of viewing disturbing material including indecent images of children<br \/>\n(IIOC);<br \/>\n\u2022 Electrical safety;<br \/>\n\u2022 Ergonomics, including working with Display Screen Equipment (DSE);<br \/>\n\u2022 Biohazards.<br \/>\n7.2.3 Both staff and managers should be aware of the potential impacts of these and take steps to<br \/>\nminimise their effect. For further details, refer to the Managers\u2019 Guide.<br \/>\n14 NOT PROTECTIVELY MARKED ACPO Good Practice Guide for Digital Evidence, Version 5 (October 2011)<br \/>\nAssociation of Chief Police Officers of England, Wales &amp; Northern Ireland<br \/>\n7.3 DIGITAL FORENSIC CONTRACTORS<br \/>\n7.3.1 Also refers to:<br \/>\n\u2022 ACPO Good Practice and Advice Guide for Managers of e-Crime Investigations;<br \/>\n\u2022 Forensic Regulator\u2019s Codes of Practice and Conduct.<br \/>\n7.3.2 Where the services of commercial forensic service providers are required by law enforcement, it is<br \/>\nimportant to select external consulting witnesses\/forensic practitioners carefully. Any external<br \/>\npractitioner should be familiar with, and agree to comply with, the principles of digital evidence<br \/>\nreferred to in this guide.<br \/>\n7.3.3 Selection of external providers, particularly in the more unusual or highly technical areas, can be a<br \/>\nproblem for the investigator. Digital forensic units may be able to offer more advice on the criteria<br \/>\nfor selection.<br \/>\n7.3.4 Readers should refer to the ACPO Managers\u2019 Guide for further suggestions on the practical aspects<br \/>\nof selecting an external forensic service provider (including such aspects as security clearance and<br \/>\nphysical security requirements or procurement issues). They should also ensure that any forensic<br \/>\nservice provider engaged on law enforcement work is able to work in accordance with the Forensic<br \/>\nRegulator\u2019s Codes of Practice and Conduct which requires ISO accreditation (ISO 17025 and ISO<br \/>\n17020). The Regulator will expect compliance for all digital forensic services by 2014, but<br \/>\nprocurement frameworks and contracts should be looking at compliance for external service<br \/>\nproviders in advance of this date.<br \/>\n7.3.5 When engaging the services of digital forensic contractors, processes and policies for the retention<br \/>\nof case-related data should be considered, both on an ongoing basis and following the termination<br \/>\nof the contract. Contractors and those engaging them must comply with the terms of the Data<br \/>\nProtection Act, and with any local policies of the engaging organisation.<br \/>\n7.4 DISCLOSURE<br \/>\n7.4.1 Also refers to:<br \/>\n\u2022 Attorney General\u2019s Guidelines on Disclosure (revised April 2005);<br \/>\n\u2022 CPS Disclosure Manual.<br \/>\n7.4.2 The particular issues relating to disclosure of digital evidence are typically those of volume. A digital<br \/>\ninvestigation may involve the examination of a vast amount of data and it is not always<br \/>\nstraightforward for investigators and prosecutors to discharge their disclosure obligations in respect<br \/>\nof this. For example, the average hard disk is now larger than 200 gigabytes and this, if printed out<br \/>\non A4 paper, would be 10,000,000 pages long. In addition, the nature of digital evidence means it is<br \/>\nnot always possible to create a static representation which preserves the nature of the original<br \/>\nevidence (e.g. of a database) and in some cases data can only be disclosed electronically, such as<br \/>\nCCTV.<br \/>\n7.4.3 The Criminal Procedure and Investigations Act 1996 (CPIA) came into force on 1 April 19971<br \/>\n. The<br \/>\nAct, together with its Code of Practice, introduced a statutory framework for the recording,<br \/>\nretention, revelation and disclosure of unused material obtained during criminal investigations<br \/>\ncommenced on or after that date.<br \/>\n7.4.4 Additional guidance for investigators and prosecutors to assist them in complying with their statutory<br \/>\nduties is set out in the Attorney General\u2019s Guidelines on Disclosure (revised April 2005). ACPO and<br \/>\nthe CPS have also agreed detailed joint operational instructions for handling unused material,<br \/>\ncurrently set out in the Disclosure Manual.<\/p>\n<p>1<br \/>\nIt has recently been amended in key respects following the implementation of some of the provisions of Part V of the Criminal Justice<br \/>\nAct 2003, as of 4 April 2005<br \/>\n15 NOT PROTECTIVELY MARKED ACPO Good Practice Guide for Digital Evidence, Version 5 (October 2011)<br \/>\nAssociation of Chief Police Officers of England, Wales &amp; Northern Ireland<br \/>\n7.4.5 What follows should be regarded as a very brief summary of some of the relevant guidance in the<br \/>\nDisclosure Manual. It is not intended as a replacement for the detailed guidance provided in the<br \/>\nManual itself.<br \/>\n7.4.6 Even in relatively straightforward cases, investigators may obtain, and even generate, substantial<br \/>\nquantities of material. Some of this material may in due course be used as evidence: for example,<br \/>\nphysical exhibits recovered from the scene of the crime or linked locations, CCTV material, forensic<br \/>\nevidence, statements obtained from witnesses and tape recordings of defendants interviewed under<br \/>\ncaution before charge. The remaining material is the \u2018unused material\u2019, and it is this material which<br \/>\nis the subject of the procedure for disclosure created under the CPIA.<br \/>\n7.4.7 Generally material must be examined in detail by the disclosure officer or the deputy but,<br \/>\nexceptionally, the extent and manner of inspecting, viewing or listening will depend on the nature of<br \/>\nthe material and its form. For example, it might be reasonable to examine digital material by using<br \/>\nsoftware search tools. If such material is not examined in detail, it must nonetheless be described on<br \/>\nthe disclosure schedules accurately and as clearly as possible. The extent and manner of its<br \/>\nexamination must also be described together with justification 2<br \/>\nfor such action.<br \/>\n7.4.8 The CPIA Code of Practice also provides guidance concerning the duty to pursue all reasonable lines<br \/>\nof enquiry, in relation to computer material3<br \/>\n. Examination of material held on a computer may<br \/>\nrequire expert assistance and, in some cases, Digital Evidence Recovery Officers (DEROs) may be<br \/>\ncommissioned to help extract evidence and assist with unused material. DEROs may be police<br \/>\nofficers, police staff or external service providers. The use of DEROs and related matters is discussed<br \/>\nin detail in Annex H of the Disclosure Manual.<br \/>\n7.4.9 It is important that the material is inspected and described on the unused material schedule, in<br \/>\naccordance with the above guidance, as it is the schedules (non-sensitive and sensitive) which are,<br \/>\nin due course, revealed to the prosecutor, in order that the latter can comply with the duty under<br \/>\nsection 3 CPIA to provide primary disclosure to the accused (or initial disclosure, where the criminal<br \/>\ninvestigation in question has commenced on or after 4 April 2005).<br \/>\n7.4.10 Whether the material is disclosed under section 3 of the CPIA, following service of a statement, or<br \/>\nafter an application for specific disclosure under section 8 of the Act, disclosure may be in the form<br \/>\nof providing a copy or copies of the material in question to the defence. It may also be by permitting<br \/>\nthe defence (or a suitable expert, instructed by the defence) access to the actual material. Guidance<br \/>\nconcerning this is set out in the Disclosure Manual, 30.8 \u2013 30.13.<br \/>\n7.4.11 It is important to note that where the computer material consists of sensitive images falling within<br \/>\nsection 1(1) (a) of the Protection of Children Act 1978, the guidance set out in the Memorandum of<br \/>\nUnderstanding Between CPS and ACPO concerning Section 46 Sexual Offences Act 2003 (signed on<br \/>\n4th October 2004) should be followed.<br \/>\n7.4.12 In Scotland, the question of disclosure is fundamentally different from that in England and Wales<br \/>\nand is one specifically for the Procurator Fiscal. The question of disclosure was judicially considered<br \/>\nin the case of McLeod Petitioner, 1988, SLT233. There is no obligation upon the Crown to produce<br \/>\nevery document in their possession that has any connection with the case. It is the duty of the<br \/>\nProcurator Fiscal to disclose anything that is relevant to establish the guilt or innocence of the<br \/>\naccused. The court will not lightly interfere with the view of the Procurator Fiscal.<\/p>\n<p>2<br \/>\nParagraph 27, Attorney General\u2019s Guidelines on Disclosure (2005) 3<br \/>\nCPIA Code of Practice, paragraph 3.5<br \/>\n16 NOT PROTECTIVELY MARKED ACPO Good Practice Guide for Digital Evidence, Version 5 (October 2011)<br \/>\nAssociation of Chief Police Officers of England, Wales &amp; Northern Ireland<br \/>\n7.5 LEGISLATION<br \/>\n7.5.1 Also refers to:<br \/>\n\u2022 Legislation.gov.uk;<br \/>\n\u2022 ACPO Good Practice and Advice Guide for Managers of e-Crime Investigations.<br \/>\n7.5.2 A wide variety of legislation may apply in examinations of digital evidence. Some of the most<br \/>\nrelevant is detailed below.<br \/>\ni. Computer Misuse Act 1990 (UK Wide)<br \/>\n(http:\/\/www.legislation.gov.uk\/ukpga\/1990\/18\/introduction)<br \/>\nS1 Unauthorised Access To Computer Material<br \/>\n\u2022 It is an offence to cause a computer to perform any function with intent to gain<br \/>\nunauthorised access to any program or data held in any computer. It will be necessary to<br \/>\nprove the access secured is unauthorised and the suspect knows this is the case. This is<br \/>\ncommonly referred to as \u2018hacking\u2019.<br \/>\n\u2022 The Police and Justice Bill 2006 amended the maximum penalty for Section 1 offences. The<br \/>\noffence is now triable either way, i.e. in the Magistrates Court or the Crown Court. The<br \/>\nmaximum custodial sentence has been increased from six months to two years.<br \/>\nS2 Unauthorised Access with Intent to Commit Other Offence<br \/>\n\u2022 An offence is committed as per S1 but the S1 offence is committed with the intention of<br \/>\ncommitting an offence or facilitating the commission of an offence. The offence to be<br \/>\ncommitted must carry a sentence fixed by law or carry a sentence of imprisonment of 5<br \/>\nyears or more. Even if it is not possible to prove the intent to commit the further offence,<br \/>\nthe S1 offence is still committed. Max penalty: 5 years imprisonment.<br \/>\nS3 Unauthorised Acts with Intent to Impair Operation<br \/>\n\u2022 An offence is committed if any person does an unauthorised act with the intention of<br \/>\nimpairing the operation of any computer. This \u2018impairment\u2019 may be such that access to data<br \/>\nis prevented or hindered or that the operation or reliability of any program is affected. This<br \/>\noffence carries a maximum penalty of ten years imprisonment. This offence is used instead<br \/>\nof the Criminal Damage Act 1971, since it is not possible to criminally damage something<br \/>\nthat is not tangible. The Police and Justice Bill 2006 amended the original Section 3<br \/>\nComputer Misuse Act offence, unauthorised modification, and increased the maximum<br \/>\npenalty to ten years imprisonment.<br \/>\nS3A Making, Supplying or Obtaining Article for Use in S1 or S3 offences<br \/>\n\u2022 The Police and Justice Bill 2006 created a new S3A offence of making, supplying (including<br \/>\noffers to supply) or obtaining articles for use in S1 or S3 computer misuse offences. The<br \/>\nmaximum penalty for this offence is two years imprisonment.<br \/>\nS10 Saving For Certain Law Enforcement Powers<br \/>\n\u2022 This section explains that S1 of the Act has effect without prejudice to the operation in<br \/>\nEngland, Wales or Scotland of any enactment relating to powers of inspection, search and<br \/>\nseizure.<br \/>\nS17 Interpretation<br \/>\n\u2022 This section assists by explaining the meaning of some of the words and phrases used<br \/>\nwithin the Act.<br \/>\n17 NOT PROTECTIVELY MARKED ACPO Good Practice Guide for Digital Evidence, Version 5 (October 2011)<br \/>\nAssociation of Chief Police Officers of England, Wales &amp; Northern Ireland<br \/>\nii. The Police &amp; Criminal Evidence Act 1984<br \/>\n(http:\/\/www.legislation.gov.uk\/ukpga\/1984\/60\/contents)<br \/>\n\u2022 This legislation does not apply in Scotland unless officers from England, Wales and Northern<br \/>\nIreland are using their cross-border policing powers and procedures.<br \/>\n\u2022 Schedule 1 details the procedure by which special procedure material and excluded material<br \/>\ncan be obtained.<br \/>\n\u2022 A circuit judge can order that such material be produced to a constable for him to take away<br \/>\nor that such material be made available for the constable to access within seven days of the<br \/>\norder. For information held on a computer, an order can be made that the material is<br \/>\nproduced in a visible and legible form in which it can be taken away.<br \/>\nOr, an order can be made giving a constable access to the material in a visible and legible<br \/>\nform within seven days of the order.<br \/>\nS8 Search Warrant<br \/>\n\u2022 A justice of the peace can issue a search warrant, if it is believed an indictable offence has<br \/>\nbeen committed and evidence of that offence is on the premises. This warrant may, as per<br \/>\nS16 of PACE, also authorise persons who can accompany the officers conducting the search<br \/>\n\u2013 for example a computer expert.<br \/>\nS19 General Power of Seizure<br \/>\n\u2022 This details the power by which an officer can seize items and the circumstances in which<br \/>\nthey can be seized.<br \/>\nS20 Extension of Powers of Seizure to Computerised Information<br \/>\n\u2022 This section details the power for requiring information held on a computer to be produced<br \/>\nin a form in which it can be taken away and in which it is visible and legible.<br \/>\nS21 Access and Copying<br \/>\n\u2022 This section details the power in relation to having items seized accessed and copied to<br \/>\nother relevant parties.<br \/>\nS22 Retention<br \/>\n\u2022 This details the circumstances in which seized property can be retained.<br \/>\nS78 Exclusion of Unfair Evidence<br \/>\n\u2022 The court can exclude evidence where, with regard to all the circumstances, it would have<br \/>\nan adverse effect on the fairness of the proceedings.<br \/>\niii. Criminal Justice &amp; Police Act 2001 (England, Wales &amp; NI.)<br \/>\n(http:\/\/www.legislation.gov.uk\/ukpga\/2001\/16\/contents)<br \/>\nS50 (re search and seizure \u2013 bulk items)<br \/>\n\u2022 Describes the power by which an item can be seized, if it is believed it may be something or<br \/>\nit may contain an item or items for which there is a lawful authorisation to search.<br \/>\n18 NOT PROTECTIVELY MARKED ACPO Good Practice Guide for Digital Evidence, Version 5 (October 2011)<br \/>\nAssociation of Chief Police Officers of England, Wales &amp; Northern Ireland<br \/>\nS50 (1)<br \/>\n\u2022 Where a person is lawfully on premises carrying out a search and it is not practicable to<br \/>\ndetermine at the time if an item found is something that he is entitled to seize, or if the<br \/>\ncontents of an item are things that he is entitled to seize, the item can be taken away for<br \/>\nthis to be determined. There must be reasonable grounds for believing the item may be<br \/>\nsomething for which there was authorisation to search.<br \/>\nS50 (2)<br \/>\n\u2022 Where a person is lawfully on premises and an item for which there is a power to seize is<br \/>\nfound, but it is contained within an item for which there would ordinarily be no power to<br \/>\nseize and it is not practicable to separate them at the time, both items can be seized.<br \/>\n7.5.3 Factors to be considered prior to removing such property:<br \/>\n\u2022 How long would it take to determine what the item is or to separate the items?<br \/>\n\u2022 How many people would it take to do this within a reasonable time period?<br \/>\n\u2022 Would the action required cause damage to property?<br \/>\n\u2022 If the items were separated, would it prejudice the use of the item that is then seized?<br \/>\n\u2022 Once seized, the items must be separated or identified as soon as practicable. Any item<br \/>\nfound, which was seized with no power to do so, must be returned as soon as reasonably<br \/>\npracticable. Items of legal privilege, excluded material and special procedure material,<br \/>\nshould also be returned as soon as practicable, if there is no power to retain them.<br \/>\n7.5.4 It should be noted that the use of this act gives additional rights (such as the right to be present<br \/>\nduring examination) to the owner of the property.<br \/>\n7.5.5 Equivalent powers in Scotland are granted under:<\/p>\n<p>\u2022 Civic Government Scotland Act 1982;<br \/>\n\u2022 Criminal Procedure Scotland Act 1995;<br \/>\n\u2022 Common Law.<br \/>\n7.5.6 SEXUAL OFFENCES ACT 2003 (http:\/\/www.legislation.gov.uk\/ukpga\/2003\/42\/contents)<br \/>\n46 Criminal proceedings, investigations etc. E+W+N.I.<br \/>\n(1)After section 1A of the Protection of Children Act 1978 (c. 37) insert\u2014<br \/>\n\u201c1B Exception for criminal proceedings, investigations etc.<br \/>\n(1) In proceedings for an offence under section 1(1)(a) of making an indecent photograph or<br \/>\npseudo-photograph of a child, the defendant is not guilty of the offence if he proves that\u2014<br \/>\n(a) it was necessary for him to make the photograph or pseudo-photograph for the purposes of<br \/>\nthe prevention, detection or investigation of crime, or for the purposes of criminal proceedings, in<br \/>\nany part of the world,<br \/>\n(b) at the time of the offence charged he was a member of the Security Service, and it was<br \/>\nnecessary for him to make the photograph or pseudo-photograph for the exercise of any of the<br \/>\nfunctions of the Service, or<br \/>\n(c) at the time of the offence charged he was a member of GCHQ, and it was necessary for him<br \/>\nto make the photograph or pseudo-photograph for the exercise of any of the functions of GCHQ.<br \/>\n(2) In this section \u201cGCHQ\u201d has the same meaning as in the Intelligence Services Act 1994.\u201d<br \/>\n7.5.7 CORONERS AND JUSTICE ACT 2009 (Came into force on 06 April 2010)<br \/>\n(http:\/\/www.legislation.gov.uk\/ukpga\/2009\/25\/contents)<br \/>\n19 NOT PROTECTIVELY MARKED ACPO Good Practice Guide for Digital Evidence, Version 5 (October 2011)<br \/>\nAssociation of Chief Police Officers of England, Wales &amp; Northern Ireland<br \/>\n7.5.8 CPS guidance regarding prohibited images of children can be found at:<br \/>\nhttps:\/\/www.cps.gov.uk\/legal\/p_to_r\/prohibited_images_of_children\/<br \/>\n\u2022 Sections 62-68 deal with &#8220;possession of prohibited images of children&#8221;.<br \/>\n7.5.9 The offence targets certain non-photographic images of children, possession of which is<br \/>\nnot covered by previously existing legislation.<br \/>\n7.5.10 A prohibited image is pornographic and concentrates on genitals or shows a sex act and is grossly<br \/>\noffensive, disgusting, or otherwise of an obscene character.<br \/>\n7.5.11 An image is of a child if impression conveyed is that of a child or the predominant impression is that<br \/>\nof a child despite some physical characteristics shown are not those of a child.<br \/>\n7.5.12 If the image is in a series then the context of the series can be used to determine if the individual<br \/>\nimage is prohibited or not.<br \/>\n7.5.13 Classified films are excluded (unless an individual is in possession of a still or clip that has been<br \/>\nextracted solely or principally for the purpose of sexual arousal).<br \/>\n7.5.14 There is a defence of having a legitimate reason for possession, or having not seen the image and<br \/>\nnot knowing, nor having cause to suspect, it was a prohibited image.<br \/>\n7.5.15 The maximum penalty is 3 years\u2019 imprisonment.<br \/>\n7.6 OTHER LEGISLATION<br \/>\n7.6.1 For additional guidance or information in relation to legislation not listed, investigators may wish to<br \/>\nconsult the Police National Legal Database (PNLD) or the UK Legislation website (which replaces the<br \/>\nOffice of Public Sector Information (OPSI) and Statute Law databases), available online at<br \/>\nhttp:\/\/www.legislation.gov.uk.<br \/>\n20 NOT PROTECTIVELY MARKED ACPO Good Practice Guide for Digital Evidence, Version 5 (October 2011)<br \/>\nAssociation of Chief Police Officers of England, Wales &amp; Northern Ireland<\/p>\n<p>GLOSSARY OF TERMS\/ABBREVIATIONS USED IN THIS GUIDE<br \/>\nACPO: Association of Chief Police Officers<br \/>\nDFU: Digital Forensic Unit<br \/>\nNPIA: National Police Improvement Agency<br \/>\nIIOC: Indecent Images Of Children<br \/>\nSPOC: Single Point Of Contact<br \/>\nRIPA: Regulation Of Investigatory Powers Act<br \/>\nRIPSA: Regulation Of Investigatory Powers (Scotland) Act<br \/>\nDPA: Data Protection Act<br \/>\nCCTV: Closed Circuit Television<br \/>\nIP Address: Internet Protocol Address &#8211; numerical address assigned to device in a computer network that<br \/>\nuses the Internet protocol for communications.<br \/>\nPACE: Police &amp; Criminal Evidence Act 1984<br \/>\nSIM: A subscriber identity module or subscriber identification module (SIM) on a removable SIM card<br \/>\nsecurely stores the service-subscriber key (IMSI) used to identify a subscriber on mobile telephony devices<br \/>\n(such as mobile phones and computers).<br \/>\nPUK: PIN Unlock Key (PUK)<br \/>\nCSP\/ISP: Communications Service Provider\/Internet Service Provider<br \/>\n21 NOT PROTECTIVELY MARKED ACPO Good Practice Guide for Digital Evidence, Version 5 (October 2011)<br \/>\nAssociation of Chief Police Officers of England, Wales &amp; Northern Ireland<br \/>\nREFERENCES<br \/>\n\u2022 ACPO Good Practice and Advice Guide for Managers of e-Crime Investigations (\u2018Managers\u2019<br \/>\nGuide\u2019)<br \/>\nhttp:\/\/www.acpo.police.uk\/documents\/crime\/2011\/20110301%20CBA%20ACPO%20manag<br \/>\ners_guide_v10.1.4%20for%20ecrime%20investigations_2011.pdf<br \/>\n\u2022 Attorney General\u2019s Guidelines on Disclosure (revised April 2005)<br \/>\nhttp:\/\/www.cps.gov.uk\/legal\/a_to_c\/attorney_generals_guidelines_on_disclosure\/<br \/>\n\u2022 Crimes involving websites, forums and blogs<br \/>\n\u2022 CPS disclosure manual<br \/>\nhttp:\/\/www.cps.gov.uk\/legal\/d_to_g\/disclosure_manual\/<br \/>\n\u2022 Digital Imaging Procedure v2.1<br \/>\nhttp:\/\/tna.europarchive.org\/20100413151426\/http:\/\/scienceandresearch.homeoffice.gov.uk\/<br \/>\nhosdb\/publications\/cctv-publications\/DIP_2.1_16-Apr08_v2.3_(Web)47aa.html?view=Standard&amp;pubID=555512<br \/>\n\u2022 First Responder\u2019s Guide<br \/>\n\u2022 Forensic Science Regulator\u2019s Codes of Practice and Conduct<br \/>\nhttp:\/\/www.homeoffice.gov.uk\/publications\/agencies-public-bodies\/fsr\/codes-conductpractice?view=Standard&#038;pubID=868070<br \/>\n\u2022 Network forensics and volatile data collection<br \/>\n\u2022 NPIA Forensics21 HTCU Computer Examination Process, 2011<br \/>\n\u2022 NPIA mobile phone SOPs<br \/>\n\u2022 Retrieval of Video Evidence and Production of Working Copies from Digital CCTV Systems<br \/>\nv2.0<br \/>\nhttp:\/\/tna.europarchive.org\/20100413151426\/http:\/\/scienceandresearch.homeoffice.gov.uk\/<br \/>\nhosdb\/publications\/cctv-publications\/66-<br \/>\n08_Retrieval_of_Video_Ev13c4f.html?view=Standard&amp;pubID=585513<br \/>\n\u2022 SCDEA guidance<br \/>\n22 NOT PROTECTIVELY MARKED ACPO Good Practice Guide for Digital Evidence, Version 5 (October 2011)<br \/>\nAssociation of Chief Police Officers of England, Wales &amp; Northern Ireland<br \/>\nACKNOWLEDGEMENTS<br \/>\nReview Board members<br \/>\nPaul Birch (Serious Fraud Office)<br \/>\nLisa Burrell (Police Central e-Crime Unit)<br \/>\nRick Conway (Surrey Police)<br \/>\nSteve Edwards (Police Central e-Crime Unit)<br \/>\nDennis Edgar-Neville (Canterbury University\/British Computer Society)<br \/>\nDanny Faith (NTAC\/F3)<br \/>\nSteve Guest (IACIS)<br \/>\nDan Haagman (7-Safe)<br \/>\nSonny Hanspal (NPIA)<br \/>\nKeith McDevitt (SCDEA)<br \/>\nJelle Niemantsverdriet (VerizonBusiness)<br \/>\nBev Nutter (MPS-DEFS)<br \/>\nHarry Parsonage (Nottingham Police)<br \/>\nPeter Salter (PSNI)<br \/>\nLindy Shepherd (Cranfield University)<br \/>\nPaul Slater (PWC)<br \/>\nRob Watson (7-Safe)<br \/>\nAlastair Wilson (SCDEA)<br \/>\nMark Wilson (MPS-DOI)<br \/>\nPaul Wright (VerizonBusiness)<br \/>\nOther acknowledgments<br \/>\nEsther George (CPS)<br \/>\nJane Stevenson (Workplace Wellbeing)<br \/>\nEddie Fisher (MPS-DEFS)<br \/>\n23 NOT PROTECTIVELY MARKED ACPO Good Practice Guide for Digital Evidence, Version 5 (October 2011)<br \/>\nAssociation of Chief Police Officers of England, Wales &amp; Northern Ireland<br \/>\nAPPENDIX A<br \/>\nNETWORK FORENSICS<br \/>\nHome and corporate network environments<br \/>\nNetworks of computers are becoming more common in the domestic environment and are well established in<br \/>\ncorporate settings. In the home, they are usually based around the broadband Internet connection, which<br \/>\noften also offers functionality to set up a small internal (and often wireless) network within the household.<br \/>\nIn corporate environments, more advanced network setups can be found, for which no generic description<br \/>\ncan be given.<br \/>\nThe use of wireless networks in both the corporate and home environment is also increasing at a<br \/>\nconsiderable rate. To the forensic investigator, this presents a number of challenges and an increased<br \/>\nnumber of potential artefacts to consider. Owing to the potential complexity of \u2018technical\u2019 crime scenes,<br \/>\nspecialist advice should be sought when planning the digital evidence aspect of the forensic strategy.<br \/>\nWireless devices<br \/>\nA whole range of wired and wireless devices may be encountered:<\/p>\n<p>\u25cf Network devices which connect individual systems or provide network functionality: Switches, hubs,<br \/>\nrouters, firewalls (or devices which combine all three).<br \/>\n\u25cf Devices to connect individual computers to the network, such as network cards (which can also be<br \/>\nembedded within the computer)<br \/>\n\u25cf Devices to set up a wireless network: Wireless Access Points.<br \/>\n\u25cf Printers and digital cameras.<br \/>\n\u25cf Bluetooth (small range wireless) devices \u2013 PDAs, mobile phones, dongles.<br \/>\n\u25cf Hard drives which can be connected to the network.<br \/>\nWireless networks cannot be controlled in the same way as a traditionally cabled solution and are potentially<br \/>\naccessible by anyone within radio range. The implications of this should be carefully considered when<br \/>\nplanning a search or developing the wider investigative strategy. A device, such as a computer or a hard<br \/>\ndrive, may not be located on the premises where the search and seizure is conducted.<br \/>\nHome networks and data<br \/>\nIf devices are networked, it may not be immediately obvious where the computer files and data, which are<br \/>\nbeing sought, are kept. Data could be on any one of them. Networks, both wired and wireless, also enable<br \/>\nthe users of the computers to share resources; such as printers, scanners and connections to the Internet. It<br \/>\nmay well be the case that if one of the computers is connected to the Internet, some or all of the others are<br \/>\nalso.<br \/>\nWith the widespread use of broadband type Internet subscriptions such as ADSL and cable, the Internet<br \/>\nconnection is nowadays likely to be of an \u2018always on\u2019 type connection. This implies that even if no-one is<br \/>\napparently working on a computer or using the Internet, there may be data passing to and from computers<br \/>\nor between the network and the Internet.<br \/>\nIf a wired network is present, there will usually be a small box (called a \u2018hub\u2019 or a \u2018switch\u2019) also present,<br \/>\nconnecting the computers together. Hubs, switches and routers look very much the same as one another.<br \/>\nThe network cables are usually connected at the rear.<br \/>\nThe network may also be connected to another device (called a Cable Modem or a ADSL Modem) providing<br \/>\naccess to the Internet. Sometimes, the hub\/switch\/router mentioned before are combined with these<br \/>\nmodems in one device.<br \/>\n24 NOT PROTECTIVELY MARKED ACPO Good Practice Guide for Digital Evidence, Version 5 (October 2011)<br \/>\nAssociation of Chief Police Officers of England, Wales &amp; Northern Ireland<br \/>\nOne wire from a modem will usually be connected to the telephone or television cable system and another<br \/>\nwire will be connected either to one of the computers present or directly to the network hub, or the modem<br \/>\nitself may be incorporated within the hub in a modem\/router.<br \/>\nOperation planning in networked environments<br \/>\nWhen planning an operation involving a network, consider carefully the possibility of remote access, i.e.<br \/>\nperson(s) accessing a network with or without permissions from outside the target premises. Investigators<br \/>\nshould consider the possibility of nefarious activity being carried out through the insecure network of an<br \/>\ninnocent party. The implications of such a scenario are that search warrants could be obtained on the basis<br \/>\nof a resolved Internet Protocol address, which actually relates to an innocent party. The implications are<br \/>\npotentially unlawful searches, legal action taken against the relevant investigative agency and a waste of<br \/>\nresources.<br \/>\nConsider also the possibility of a computer\u2019s access to remote online storage, which may physically reside in<br \/>\na foreign jurisdiction. This can include web-based services for email, photo or document storage or other<br \/>\napplications offered via the Internet. There will be legal issues in relation to accessing any such material.<br \/>\nLegal advice should be sought prior to any access or retrieval and often the provider of the particular service<br \/>\nwill have to be contacted to ensure that material is preserved while the relevant mutual legal assistance<br \/>\nrequests are being arranged.<br \/>\nNetwork detection<br \/>\nNetwork detecting and monitoring is a specialist area and should not be considered without expert advice.<br \/>\nRecommendations for dealing with networks and wireless implementations involve the following steps:<br \/>\n\u25cf Identify and check network devices to see how much network or Internet activity is taking place.<br \/>\nConsider using a wireless network detector to determine whether wireless is in operation and to<br \/>\nlocate wireless devices. Consideration should also be given to mobile Internet devices such as 3G or<br \/>\nGPRS dongles or phones, which operate using the mobile phone network;<br \/>\n\u25cf As you do so, consider photographing the layout of the network and the location of the machines<br \/>\nconnected to it, so as to allow a possible future reconstruction;<br \/>\n\u25cf Once satisfied that no data will be lost as a result, you may isolate the network from the Internet.<br \/>\nThis is best done by identifying the connection to the telephone system or wireless communications<br \/>\npoint and unplugging it from the telephone point. Keep modems and routers running, as they may<br \/>\nneed to be interrogated to find out what is connected to them. Owing to their nature, it is<br \/>\nparticularly difficult to ascertain what is connected to a wireless network;<br \/>\n\u25cf Trace each wire from the network devices to discover the computer to which it is connected. This<br \/>\nmay not be possible in premises where cables may be buried in conduits or walls (advice in this case<br \/>\nshould be sought from the local IT administrator, if available, as to the set up of the system). Make<br \/>\na note of each connection. Note which computer is connected to which number \u2018port\u2019 on the network<br \/>\ndevice (hub \/ switch \/ router or multi function device). Label each connection in such a way that the<br \/>\nsystem can be rebuilt exactly as it stands, should there be any future questions as to the layout. It is<br \/>\nhighly recommended that pictures be taken of the setup;<br \/>\n\u25cf Consider making a connection to the access point\/router in order to establish the external IP<br \/>\naddress. Most modern networks use Network Address Translation (NAT) which means that they<br \/>\ncommunicate with an internal IP address and never get assigned and external IP one.<br \/>\nIn a wireless environment, remember that no cables are used between a PC and other devices. However,<br \/>\nthere will still be some physical cabling to each device (which could include a network cable to the wired<br \/>\nnetwork, power cables etc.), the configuration of which should be recorded. Please also note that Cable \/<br \/>\nADSL modems can have wireless capabilities built in.<br \/>\n\u25cf Once satisfied that the evidential impact is acceptable, you may remove each connection in turn<br \/>\nfrom the network device once it has been identified. This will isolate each computer in turn from the<br \/>\nnetwork. The same can be done with cabling into wireless devices;<br \/>\n\u25cf Seize and bag all network hardware, modems, original boxes and CDs \/ floppy disks etc. (provided<br \/>\nthey are easily removable);<br \/>\n25 NOT PROTECTIVELY MARKED ACPO Good Practice Guide for Digital Evidence, Version 5 (October 2011)<br \/>\nAssociation of Chief Police Officers of England, Wales &amp; Northern Ireland<br \/>\n\u25cf Subsequently treat each device as you would a stand-alone device;<br \/>\n\u25cf Remember that the data which is sought may be on any one of the computers on the network.<br \/>\nOfficers should make a decision based on the reasonable assumption that relevant data may be<br \/>\nstored on a device before seizing that device;<br \/>\n\u25cf Bear in mind the possibility that the network may be a wireless network as well as a wired one, i.e.<br \/>\ncertain computers may be connected to the network via conventional network cabling. Others may<br \/>\nbe connected to that same network via the mains system, and others may be connected via a<br \/>\nwireless link;<br \/>\n\u25cf Also, bear in mind that any mobile phones and PDAs may be wireless or Bluetooth enabled and<br \/>\nconnected to a domestic network.<br \/>\nConcerns with remote wireless storage often focus around the inability to locate the device. In this instance,<br \/>\nit would be impossible to prove that an offence had been committed. Artefacts on seized computers might<br \/>\nprovide evidence that a remote storage device has been used, however the analysis of such artefacts will<br \/>\ntake time and this cannot often be done during the onsite seizure.<br \/>\nCorporate network environments<br \/>\nWhen dealing with computer systems in a corporate environment, the forensic investigator faces a number<br \/>\nof differing challenges. If the system administrator is not part of the investigation then seek their assistance.<br \/>\nThe most significant is likely to be the inability to shut down server(s) due to company operational<br \/>\nconstraints. In such cases, it is common practice that a network enabled \u2018forensic software\u2019 agent is<br \/>\ninstalled, which will give the ability to image data across the network \u2018on-the-fly\u2019, or to a network share or a<br \/>\nlocally connected removable storage medium such as a USB hard drive.<br \/>\nOther devices could be encountered which may assist the investigation. For example, routers and firewalls<br \/>\ncan give an insight into network configuration through Access Control Lists (ACLs) or security rule sets. This<br \/>\nmay be achieved by viewing the configuration screens as an administrator of the device. This will require the<br \/>\nuser names and passwords obtained at the time of seizure or from the suspect during interview.<br \/>\nBy accessing the devices, data may be added, violating Principle 1 but, if the logging mechanism is<br \/>\nresearched prior to investigation, the forensic footprints added during investigation may be taken into<br \/>\nconsideration and therefore Principle 2 can be complied with.<br \/>\nIn the case of large company networks, consider gaining the advice and assistance of the network<br \/>\nadministrator\/ support team (assuming that they are not suspects).<br \/>\nVOLATILE DATA COLLECTION<br \/>\nIn certain circumstances, it may be necessary or advisable for computer forensic investigators to gather<br \/>\nevidence from a computer whilst its running or in a \u2018live\u2019 state. This technique has become a common<br \/>\npractice as, even though some changes to the original evidence will be made, this method often allows<br \/>\naccess to evidence which would have been unavailable if the power is removed from a system. In order to<br \/>\ncapture volatile data on a device the device WILL have to be accessed. Therefore changes WILL be caused<br \/>\nby the examiner.<br \/>\nSpecial consideration should be given to Principle 2 of the guidelines, as conducting live-forensics implies<br \/>\naccess to the original evidence. Any person doing this needs to be competent and fully aware of the impact<br \/>\ntheir actions have and should be prepared to explain their reasons for taking this route.<br \/>\nLive forensics approach<br \/>\nBy profiling the footprint of trusted forensic tools used to gather volatile data, the digital forensic examiner<br \/>\ncan understand the impact of using such tools and can explain any artefacts left by the tools.<br \/>\nIn order to ensure that a consistent approach is used and the chance of errors is minimized, it is<br \/>\nrecommended to use a scripted approach using a number of basic and trusted tools. Regardless of the tools<br \/>\nused, it is advisable to start with capturing the contents of RAM, the volatile memory.<br \/>\n26 NOT PROTECTIVELY MARKED ACPO Good Practice Guide for Digital Evidence, Version 5 (October 2011)<br \/>\nAssociation of Chief Police Officers of England, Wales &amp; Northern Ireland<br \/>\nIf other tools are used before the contents of the RAM are stored, it is very likely that running the forensic<br \/>\ntools will overwrite parts of the RAM.<br \/>\nOther examples of information, which might be available in the dump of the RAM contents, can be retrieved<br \/>\nusing different tools:<br \/>\n\u25cf listings of running processes;<br \/>\n\u25cf logged on and registered users;<br \/>\n\u25cf network information including listening, open and closing network ports;<br \/>\n\u25cf ARP (address resolution protocol) cache;<br \/>\n\u25cf Registry information.<br \/>\nThe tools used to capture this volatile information are generally run from removable media like a USB stick,<br \/>\nDVD or CD-ROM or a floppy disk. A USB stick is generally most convenient, as the output of the tools can be<br \/>\nwritten back to the stick. Writing tool output to the original drive should be avoided whenever possible, as<br \/>\nthis changes the contents of the hard drive and can destroy potential evidence. Again, principle 2 does allow<br \/>\nthe investigator to do this, but a conscious decision will have to be made and the process written down.<br \/>\nWhen inserting USB devices the examiner must ensure that they know the details of the serial numbers of<br \/>\nthe devices they are connecting so that they can be eliminated when analysing the date captured.<br \/>\nWhen in doubt as to whether or not to use live forensics, consult with the digital forensic examiner for<br \/>\nadvice. And, it should be noted that in live forensics it is not always possible to know upfront which<br \/>\napproach will yield the best results. Whichever method is chosen, remember to take meticulous notes \u2013 as<br \/>\ndictated by principle 3.<br \/>\nSummary of steps<br \/>\nA summary of the steps to be taken is shown below. Documentation of all actions, together with reasoning,<br \/>\nshould also apply when following such steps:<br \/>\n\u25cf Perform a risk assessment of the situation \u2013 Is it evidentially required and safe to perform volatile<br \/>\ndata capture?<br \/>\n\u25cf If so, install volatile data capture device to a removable data carrier (such as a USB stick) \u2013<br \/>\npreferably, this has already been done prior to starting the operation;<br \/>\n\u25cf Plug the data carrier into the machine and start the data collection script;<br \/>\n\u25cf Once complete, stop the device (particularly important for USB devices, which if removed before<br \/>\nproper shutdown can lose information);<br \/>\n\u25cf Remove the device;<br \/>\n\u25cf Verify the data output on a separate forensic investigation machine (not the suspect system);<br \/>\n\u25cf Immediately follow with standard power-off procedure.<br \/>\nThe capture and analysis of volatile data no doubt presents the investigator with technical challenges.<br \/>\nHowever, as cases become more complex and connectivity between devices and public networks proliferate,<br \/>\nwith an increase in more advanced malware, which cannot always be retrieved using more traditional disk<br \/>\nforensics, the above recommendations will need to be considered.<br \/>\nIt is vitally important that only someone with the relevant training and is competent to do so should take any<br \/>\nof these actions.<br \/>\n27 NOT PROTECTIVELY MARKED ACPO Good Practice Guide for Digital Evidence, Version 5 (October 2011)<br \/>\nAssociation of Chief Police Officers of England, Wales &amp; Northern Ireland<br \/>\nAPPENDIX B<br \/>\nCRIMES INVOLVING WEBSITES, FORUMS, AND BLOGS<br \/>\nWhere a crime involves evidence displayed on a website the most convenient method of recovering the<br \/>\nevidence may be by engaging the assistance of suitably trained staff to visit the website and take copies of<br \/>\nthe evidential content. In order to do this the officer taking report of the matter needs to obtain the address<br \/>\nof the website, for example, http:\/\/www.acpo.police.uk, or if it is a specific page within the site.<br \/>\nhttp:\/\/www.acpo.police.uk\/about_pages\/structure.html.<br \/>\nWhen carrying out any evidence recovery it is essential that an audit trail of all activity carried out by the<br \/>\ninvestigator is recorded in a log. The recommended method for copying a website is to visit the site and<br \/>\nrecord the relevant pages using video capture software so there is a visible representation of how they look<br \/>\nwhen visited at the time. If video capture software is not available then the pages can be saved as<br \/>\nscreenshots. It is also advisable to follow this by capturing the web pages themselves either by using<br \/>\nwebsite copying software or saving the individual pages. Copying the pages themselves, as well as obtaining<br \/>\na visual record, means that the code from the web pages is also secured should that become relevant later.<br \/>\nThis work should be conducted from a computer which has been specifically set up to be non-attributable on<br \/>\nthe Internet. Failure to use an appropriate system may lead to the compromise of other police operations.<br \/>\nAnyone visiting a website generally exposes a certain amount of information to the website, for example it is<br \/>\ncommon on police systems to have a web browser which is branded with the forces name. This branding is<br \/>\nexposed to a website being visited and so may be recorded in logs on the site along with other information<br \/>\namongst which, will include the pages visited.<br \/>\nIf it appears likely that the evidence on the website might be lost by a delay in carrying out the above<br \/>\nprocedures then the person reporting may be asked to make a copy of the evidence by whatever means<br \/>\nthey are capable of (either printing, screenshot or saving pages), alternatively this could be done by the<br \/>\nperson receiving the report. Before taking these steps every effort should be made to secure the services of<br \/>\na competent person to carry out this work as failing to capture the information correctly could have a<br \/>\ndetrimental impact on the investigation.<br \/>\nWhere there is difficulty in capturing the evidence by visiting the site it might be possible to make an official<br \/>\nrequest to the owner of the site by whatever legal procedures are required within the jurisdiction. The<br \/>\nCSP\/ISP SPOC or Digital Forensic Unit can usually advise on the appropriate procedures.<br \/>\nBy making a request to the service provider hosting the site it may be possible to recover evidence of who<br \/>\nhas created the web page or posting. It is not unusual for details of the user such as name, address, phone<br \/>\nnumber, banking details, email address, and alternative email address to be recorded by a host.<br \/>\nIf there is a requirement to identify who has committed some activity on a website, for example where a<br \/>\nfraud has been committed by purchasing goods from a website or by posting a message on a website, the<br \/>\nlikelihood is that the suspect may be traceable from logs on the site. When any user accesses the Internet<br \/>\nthey are allocated a unique address known as an IP address and their Internet Service Provider (ISP) keeps<br \/>\nlogs of the times and dates and the identity of the user allocated any IP address.<br \/>\nWhen a user visits a site and conducts some activity, for example logs on, posts a message, or makes a<br \/>\npurchase, it is likely that the user\u2019s IP address has been logged by the website. It is often possible to obtain<br \/>\ncopies of logs from websites if there is a requirement to see who has been active on a website by making a<br \/>\nrequest via the force CSP\/ISP SPOC.<br \/>\nIf the evidence is no longer available to be retrieved by any of the above means, and where the use of<br \/>\nresources can be justified by the seriousness of the case, it may be possible to recover evidence of the site<br \/>\ncontents from an end user device that has been used to view the site by conducting a forensic examination<br \/>\nof the device.<br \/>\n28 NOT PROTECTIVELY MARKED ACPO Good Practice Guide for Digital Evidence, Version 5 (October 2011)<br \/>\nAssociation of Chief Police Officers of England, Wales &amp; Northern Ireland<br \/>\nWhere investigators wish to carry out open source intelligence research on the Internet they should be<br \/>\ntrained to do so and conduct the research from a computer which cannot be attributed to the investigator\u2019s<br \/>\nagency.<br \/>\nCovert Interaction on the Internet<br \/>\nIn circumstances where investigators wish to communicate covertly with an online suspect they MUST use<br \/>\nthe services of a Nationally Accredited and Registered (CII). CIIs have received specialist training which<br \/>\naddresses the technical and legal issues relating to undercover operations on the Internet.<br \/>\nCrimes involving email communication<br \/>\nThere are generally two methods of sending and receiving email, one by using a web browser and accessing<br \/>\nemail online for example at the Hotmail, Windows Live, Yahoo or Google websites. In these circumstances<br \/>\nthe mail is stored on the webmail server and is read through the user\u2019s browser. The other method is to<br \/>\naccess email using a program such as Outlook or Windows Mail to download mail to the user\u2019s computer.<br \/>\nThe program is used to view and store the emails locally.<br \/>\nWhere the evidence in a case involves an email sent from a person who the police want to trace the key<br \/>\nevidence is usually found in what is known as the email\u2019s \u201cFull Internet Header\u201d. Each email sent over the<br \/>\nInternet contains this header which is normally not visible to the user. It contains details of the route taken<br \/>\nacross the Internet by the email and includes the IP address of the sender. Even where an email has been<br \/>\nsent with a fictitious email address which has been registered with false details, it is often possible to identify<br \/>\nthe sender from the Full Internet Header.<br \/>\nIn order to obtain the Full Internet Header the person taking the incident report needs to ascertain which of<br \/>\nthe two methods the recipient uses to access their email. Where it is web based identify the webmail host<br \/>\n(i.e. Hotmail, Yahoo etc.) or if by a program on the computer ascertain what program and version number of<br \/>\nthe program. The version number can usually be found in the program\u2019s Help on the menu bar under an<br \/>\nitem called \u201cAbout\u201d.<br \/>\nEach webmail provider and email program treat the Full Internet Header differently and if the officer or user<br \/>\ndoes not know how to display the header the details of the webmail provider or program need to be passed<br \/>\nto a specialist in the Digital Forensic Unit or CSP\/ISP SPOC who will be able to provide advice.<br \/>\nOnce the header has been exposed the relevant email should be printed together with the header, and may<br \/>\nalso be saved electronically. Depending upon the seriousness of the case and the volume of email evidence,<br \/>\nadvice may be sought from the digital forensics unit on the most appropriate method of securing and<br \/>\nretaining the email evidence.<br \/>\nOnce the full header has been obtained the force CSP\/ISP SPOC will be able to use this to conduct enquiries<br \/>\nto attempt to identify the sender from the originating IP address.<br \/>\nWhere an email address of a suspect is known but there is no email available from which a full header can<br \/>\nbe obtained, it may be possible to identify the user of the email address and their location. Depending upon<br \/>\nthe email service provider various details of the user may be recorded together with the first registration IP<br \/>\naddress and a varying period of IP address login history. These details may be obtained by making an<br \/>\nappropriate CSP\/ISP SPOC request for the email address. In conducting such enquiries it needs to be<br \/>\nrecognised that it is a trivial exercise to send an email with a false email address in the &#8220;From:&#8221; field of an<br \/>\nemail.<br \/>\nOn some occasions the investigating agency might access a user\u2019s email account with written authority from<br \/>\nthe user in order to secure evidence. Where this is the case, if third party material is exposed as a<br \/>\nconsequence of viewing the user\u2019s emails, advice should be sought as to whether a Directed Surveillance<br \/>\nAuthority should be in place in addition to the user\u2019s authority. Even if the password and log in details are<br \/>\navailable. For example as a result of the Forensic examination authority and formal authority is required to<br \/>\naccess the email account.<br \/>\n29 NOT PROTECTIVELY MARKED ACPO Good Practice Guide for Digital Evidence, Version 5 (October 2011)<br \/>\nAssociation of Chief Police Officers of England, Wales &amp; Northern Ireland<br \/>\nWhere justified by the investigation, consideration may be given to accessing messages on an email<br \/>\nprovider\u2019s server by obtaining the appropriate RIPA authority.<br \/>\nCrimes Involving Internet Chat<br \/>\nUsers can employ a number of different devices to engage in chat on the Internet. There are three main<br \/>\nways to chat &#8211; using a website&#8217;s chat facility, for example Facebook, using an instant messenger program<br \/>\nlike Windows Live Messenger, or much less commonly, using Internet Relay Chat (IRC).<br \/>\nWhere an incident is reported which involves the use of chat the person taking the report needs to ascertain<br \/>\nwhat method of chat was being used, i.e. what is the name of the website hosting the chat and its full<br \/>\nInternet address, or what program is being used. The key evidence to be secured is<br \/>\n\u25cf any information which may identify the suspect party, and<br \/>\n\u25cf the content of any chat.<br \/>\nIf the chat is web-based the details of the website, any chat room name and the user name of the suspect<br \/>\nshould be obtained together with the times and dates of any chat activity. If the chat facility is part of a<br \/>\nsocial networking site the user will most likely have a unique ID number as well as a user name. This is<br \/>\nusually visible in the web browser&#8217;s address bar when viewing a user&#8217;s profile or when the mouse pointer is<br \/>\nmoved over the user name. The force CSP\/ISP SPOC or Digital Forensic Unit can provide help in finding this<br \/>\nID number. If the chat is by instant messenger program then the user name of the suspect should be<br \/>\nobtained together with the associated email address which is usually available from the contact list of the<br \/>\nperson reporting. Generally a user&#8217;s contact list can be accessed from any computer connected to the<br \/>\nInternet so if it is considered that the user&#8217;s computer might be retained for a forensic examination then it<br \/>\nshould not itself be used to access the contact list.<br \/>\nThere is usually an option for a user to save chat logs but more often than not the default setting is for logs<br \/>\nnot to be saved. If the user has saved chat logs that contain evidence, the logs should be saved to<br \/>\nremovable media for production as evidence, if no removable media is available they should be printed out.<br \/>\nUsers are able to engage in chat from many types of device in addition to computers. Where the<br \/>\ncircumstances of the case warrant it, an end-user device could be submitted for forensic examination in<br \/>\norder to recover evidence of the suspect&#8217;s contact details and chat content.<br \/>\nWhere a suspect&#8217;s user details are obtained it may be possible to identify the suspect by making the<br \/>\nappropriate CSP\/ISP SPOC requests.<br \/>\nIn the event that the chat has been conducted using IRC the following details should be obtained &#8211; the IRC<br \/>\nprogram used, the name of the IRC server, the channel and any usernames. Further advice should then be<br \/>\nsought from the Digital Forensic Unit.<br \/>\nCommunications in the course of a transmission<br \/>\nDigital evidence in transit may be any form of communication using the Internet or a telecommunications<br \/>\nnetwork such as email, chat, voice calls, text messages, and voice-mail. Where such evidence is sought<br \/>\nadvice should be obtained from the force Covert Authorities Bureau.<br \/>\n30 NOT PROTECTIVELY MARKED ACPO Good Practice Guide for Digital Evidence, Version 5 (October 2011)<br \/>\nAssociation of Chief Police Officers of England, Wales &amp; Northern Ireland<br \/>\nAPPENDIX C<br \/>\nCRIME SCENES<br \/>\nThere are many different types of digital media and end-user devices, which may be encountered during a<br \/>\nsearch of a crime scene, all of which have the potential to hold data which may be of value to the<br \/>\ninvestigation. In order to preserve the data and achieve best evidence, these items must be handled and<br \/>\nseized appropriately, and should be treated with as much care as any other item that is to be forensically<br \/>\nexamined. This section is intended to assist individuals to ensure their actions in relation to seizure are<br \/>\ncorrect.<br \/>\nThe following guidance deals with the majority of scenarios that may be encountered. The general<br \/>\nprinciples, if adhered to, will ensure the best chance of evidence being recovered in an uncontaminated and,<br \/>\ntherefore, acceptable manner.<br \/>\nItems found during a search will normally fall into the broad categories of computer-based media items,<br \/>\nCCTV systems and mobile devices. These are considered separately below.<br \/>\nProportionality<br \/>\nBefore seizing an item, consider whether the item is likely to hold evidence (eg, is this a family computer or<br \/>\na computer belonging to a suspect?) Ensure that details of where the item was found are recorded. Consider<br \/>\nwhen the offence was committed; when seizing CCTV, give consideration to narrowing down what is seized,<br \/>\nby camera and\/or time period. Check whether another system may be better placed to record the evidence.<br \/>\nDifferentiate between mobile phones found on a suspect and phones found in a drawer, as different levels of<br \/>\nexamination may be possible for these. Also consider that evidence may be stored online, or on an internet<br \/>\nservice provider&#8217;s systems, and end-user devices may only be needed to obtain the details necessary to<br \/>\nrequest this evidence from the service provider. If so, it is best to seize items in current usage, i.e.<br \/>\ncomputers connected to the internet.<br \/>\nDigital devices and media should not be seized just because it is there. The person in charge of the search<br \/>\nmust have reasonable grounds to remove property and there must be justifiable reasons for doing so. The<br \/>\nsearch provisions of PACE Legislation Codes of Practice equally apply to digital devices and media in<br \/>\nEngland, Wales and Northern Ireland. In Scotland, officers should ensure they are acting within the terms of<br \/>\nthe search warrant.<br \/>\nDue regard should also be taken concerning any possible contravention of the European Convention of<br \/>\nHuman Rights.<br \/>\nWhat to take to a scene<br \/>\nThe following is a suggested list of equipment that might be of value during planned searches. This basic<br \/>\ntool-kit should be considered for use in the proper dismantling of digital systems as well as for their<br \/>\npackaging and removal:<br \/>\n\u25cf Property register;<br \/>\n\u25cf Exhibit labels (tie-on and adhesive);<br \/>\n\u25cf Labels and tape to mark and identify component parts of the system, including leads and sockets;<br \/>\n\u25cf Tools such as screw drivers (flathead and crosshead), small pliers, and wire cutters for removal of<br \/>\ncable ties;<br \/>\n\u25cf A range of packaging and evidential bags fit for the purpose of securing and sealing heavy items<br \/>\nsuch as computers and smaller items such as PDAs and mobile phone handsets;<br \/>\n\u25cf Cable ties for securing cables;<br \/>\n\u25cf Flat pack assembly boxes &#8211; consider using original packaging if available;<br \/>\n\u25cf Coloured marker pens to code and identify removed items;<br \/>\n\u25cf Camera and\/or video to photograph scene in situ and any on-screen displays;<br \/>\n\u25cf Torch;<br \/>\n\u25cf Forensically sterile storage material.<br \/>\n31 NOT PROTECTIVELY MARKED ACPO Good Practice Guide for Digital Evidence, Version 5 (October 2011)<br \/>\nAssociation of Chief Police Officers of England, Wales &amp; Northern Ireland<br \/>\nIn addition, the following items may be useful when attending scenes to retrieve CCTV:<br \/>\n\u25cf Laptop with USB and network connectivity. A selection of proprietary replay software could be<br \/>\ninstalled, to enable the downloaded data to be checked;<br \/>\n\u25cf External CD\/DVD writer;<br \/>\n\u25cf USB hard drives.<br \/>\nRecords to be kept<br \/>\nTo comply with principle 3, records must be kept of all actions taken in relation to digital evidence, for<br \/>\nexample:<br \/>\n\u25cf Sketch map\/photographs of scene and digital equipment;<br \/>\n\u25cf Record location and contact details;<br \/>\n\u25cf If a business, record opening hours;<br \/>\n\u25cf Details of all persons present where digital equipment is located;<br \/>\n\u25cf Details of digital items &#8211; make, model, serial number;<br \/>\n\u25cf Details of connected peripherals;<br \/>\n\u25cf Remarks\/comments\/information offered by user(s) of equipment;<br \/>\n\u25cf Actions taken at scene showing exact time;<br \/>\n\u25cf Notes\/photographs showing state of system when found.<br \/>\nComputer based devices and media<br \/>\nThis includes desktop or laptop PCs and Apple Macintosh systems, digital cameras, memory cards, USB<br \/>\nsticks, external hard drives and games consoles, amongst other items. Mobile devices which have wireless<br \/>\nconnectivity\/ communications capability (such as tablet computers and satellite navigation systems) fall<br \/>\nunder the heading of &#8216;mobile devices&#8217;.<br \/>\nSystems which are powered on (running) need to be handled with care, as there is the potential to make<br \/>\nunwanted changes to the evidence if these are not dealt with correctly. Such systems should only be<br \/>\naccessed by appropriately trained officers In addition, volatile data of evidential value may be lost. Be aware<br \/>\nof the potential to lose other valuable data, particularly when dealing with business systems, which could<br \/>\ngive rise to a claim for damages. In these cases expert advice should be sought before seizing a business<br \/>\nsystem which is powered on.<br \/>\nDesktop and laptop computers\/games consoles<br \/>\nThe scene should be fully documented by written notes and\/or a photographic record.<br \/>\nIf a device is powered on, it needs to be handled carefully to preserve any volatile data and to avoid<br \/>\nunwanted changes to the stored data.<br \/>\nConsider removing the device from any network, as devices can be remotely accessed, causing alteration to<br \/>\nthe data &#8211; but balance this against the possibility of losing data of evidential value, such as the list of<br \/>\ncurrently open connections. If unsure, seek expert advice.<br \/>\nSeizure steps:<br \/>\n1. Secure and take control of the area containing the equipment;<br \/>\n2. Move people away from any computers and power supplies and do not allow any interaction with<br \/>\ndigital devices by suspect;<br \/>\n3. Photograph or video the scene and all the components including the leads in situ. If no camera is<br \/>\navailable, draw a sketch plan of the system and label the ports and cables so that system\/s may be<br \/>\nreconstructed at a later date;<br \/>\n4. Allow any printers to finish printing.<br \/>\n32 NOT PROTECTIVELY MARKED ACPO Good Practice Guide for Digital Evidence, Version 5 (October 2011)<br \/>\nAssociation of Chief Police Officers of England, Wales &amp; Northern Ireland<br \/>\nIf switched off:<br \/>\n5. Do not, in any circumstance, switch the computer on;<br \/>\n6. Make sure that the computer is switched off, by moving the mouse \u2013 some screen savers may give<br \/>\nthe appearance that the computer is switched off, but hard drive and monitor activity lights may<br \/>\nindicate that the machine is switched on;<br \/>\n7. Be aware that some laptop computers may power on by opening the lid. Remove the battery from<br \/>\nthe laptop. Seize any power supply cables for future use.<br \/>\nIf switched on:<br \/>\n8. Record what is on the screen by photographing it and by making a written note of the content of<br \/>\nthe screen;<br \/>\n9. Do not touch the keyboard or click the mouse. If the screen is blank or a screen saver is present,<br \/>\nthe investigator should be asked to decide if they wish to restore the screen. If so, a short<br \/>\nmovement of the mouse should restore the screen or reveal that the screen saver is password<br \/>\nprotected. If the screen restores, photograph or video it and note its content. If password protection<br \/>\nis shown, continue as below, without any further touching of the mouse. Record the time and<br \/>\nactivity of the use of the mouse in these circumstances. (For games consoles, or tablet computers,<br \/>\nthe equivalent would be moving the controller joystick or touching the touchscreen);<br \/>\n10. If the system may contain valuable evidence in its current state (for example, if it is currently<br \/>\ndisplaying a relevant document or an instant message conversation), seizing officers should seek<br \/>\nexpert advice from their local digital forensic unit as this may be lost if the power is lost. This is<br \/>\nespecially important if the suspect is a technically knowledgeable user who may be using encryption,<br \/>\nas there may be no way to retrieve evidence stored in encrypted volumes once the power is lost;<br \/>\n11. Consider advice from the owner\/user of the computer but make sure this information is treated with<br \/>\ncaution;<br \/>\n12. Remove the main power source battery from laptop computers. However, prior to doing so, consider<br \/>\nif the machine is in standby mode. In such circumstances, battery removal could result in avoidable<br \/>\ndata loss. This is normally evident by a small LED (light) lit on the casing. In this case, officers<br \/>\nshould seek advice from their local digital forensic unit;<br \/>\n13. Unplug the power and other devices from sockets on the computer itself (i.e. not the wall socket).<br \/>\nWhen removing the power supply cable, always remove the end connected to the computer, and not<br \/>\nthat attached to the socket. This will avoid any data being written to the hard drive if an<br \/>\nuninterruptible power supply is fitted. If the equipment was switched on, do not close down any<br \/>\nprograms or shut down the computer, as this will cause changes to the stored data and may trigger<br \/>\nwiping software to run, if this is installed;<br \/>\n14. Ensure that all items have signed and completed exhibit labels attached to them. Failure to do so<br \/>\nmay create difficulties with continuity and cause the equipment to be rejected by the digital forensic<br \/>\nunit;<br \/>\n15. Search the area for diaries, notebooks or pieces of paper with passwords on them, often attached or<br \/>\nclose to the computer;<br \/>\n16. Ask the user about the setup of the system, including any passwords, if circumstances dictate. If<br \/>\nthese are given, record them accurately;<br \/>\n17. Allow the equipment to cool down before removal;<br \/>\n18. Track any cables that can be seen as they made lead you to other devices in other rooms.<br \/>\nMobile devices<br \/>\nThis includes mobile phones, smartphones, and other devices which may have wireless<br \/>\nconnectivity\/communications capability such as tablet computers, personal digital assistants (PDAs), personal<br \/>\nmedia players and satellite navigation systems.<br \/>\n1. Secure and take control of the area containing the equipment. Do not allow others to interact with<br \/>\nthe equipment;<br \/>\n2. Photograph the device in situ, or note where it was found, and record the status of the device and<br \/>\nany on-screen information;<br \/>\n33 NOT PROTECTIVELY MARKED ACPO Good Practice Guide for Digital Evidence, Version 5 (October 2011)<br \/>\nAssociation of Chief Police Officers of England, Wales &amp; Northern Ireland<br \/>\n3. If the device is switched on, power it off. It is important to isolate the device from receiving signals<br \/>\nfrom a network to avoid changes being made to the data it contains. For example, it is possible to<br \/>\nwipe certain devices remotely and powering the device off will prevent this.<br \/>\nHowever, in exceptional circumstances the decision may be made to keep the device on. Timely access to<br \/>\nthe handset data is critical the decision may be made to leave the device switched on. Consideration may be<br \/>\ngiven to place the handset in a Faraday environment to further prevent signal reception. In such<br \/>\ncircumstances advice should be sought from the DFU.<br \/>\n4. Seize cables, chargers, packaging, manuals, phone bills etc. as these may assist the enquiry and<br \/>\nminimise the delays in any examination;<br \/>\n5. Packaging materials and associated paperwork may be a good source of PIN\/PUK details;<br \/>\n6. Be aware that some mobile phone handsets may have automatic housekeeping functions, which<br \/>\nclear data after a number of days. For example, some Symbian phones start clearing call\/event<br \/>\nlogs after 30 days, or any other user defined period. Submit items for examination as soon as<br \/>\npossible.<br \/>\nHandling and transporting digital evidence<br \/>\nDigital Devices<br \/>\nHandle with care. If placing in a car, place upright where it will not receive serious physical shocks. Keep<br \/>\naway from magnetic sources (loudspeakers, heated seats &amp; windows and police radios).<br \/>\nHard disks<br \/>\nAs for all digital devices protect from magnetic fields. Place in anti-static bags, tough paper bags or tamperevident cardboard packaging or wrap in paper and place in aerated plastic bags.<br \/>\nRemovable storage<br \/>\nfloppy disks, memory sticks, memory cards, CDs\/DVDs) Protect from magnetic fields. Do not fold or bend.<br \/>\nDo not place labels directly onto floppy disks or CDs\/DVDs. Package in tamper-force approved packaging to<br \/>\navoid interaction with the device whilst it is sealed.<br \/>\nOther items<\/p>\n<p>Protect from magnetic fields. Package correctly and seal in plastic bags. Do not allow items to get wet.<br \/>\nOther Considerations<\/p>\n<p>1. If fingerprints or DNA evidence are likely to be required, always consult with the investigator;<br \/>\n2. Using aluminium powder on electronic devices can be dangerous and result in the loss of evidence.<br \/>\nBefore any examination using this substance, consider all options carefully.<br \/>\nThe equipment should be stored at normal room temperature, without being subject to any extremes of<br \/>\nhumidity and free from magnetic influence such as radio receivers. Dust, smoke, sand, water and oil are also<br \/>\nharmful to electronic equipment. Some devices are capable of storing internal data (such as the time and<br \/>\ndate set on the system) by use of batteries. If the battery is allowed to become flat, internal data will be<br \/>\nlost. It is not possible to determine the life expectancy of any one battery. However, this is an important<br \/>\nconsideration when storing a device for long periods before forensic examination and should be addressed in<br \/>\nlocal policy.<br \/>\n34 NOT PROTECTIVELY MARKED ACPO Good Practice Guide for Digital Evidence, Version 5 (October 2011)<br \/>\nAssociation of Chief Police Officers of England, Wales &amp; Northern Ireland<br \/>\nAPPENDIX D<br \/>\nDEVELOPING A DIGITAL INVESTIGATION STRATEGY<br \/>\nThe investigation of crimes and incidents in which digital evidence is involved, particularly the Internet,<br \/>\npresents some unique challenges to the investigator. The explosion of the availability and use of<br \/>\ntechnology, the growth of virtual storage, development of \u2018Cloud Services\u2019 (online services) and the<br \/>\nconvergence of mobile and traditional computer technology has resulted in most investigations having a<br \/>\ndigital element of some description.<br \/>\nInvestigators need to have a greater understanding of the use of digital evidence if interviews of witnesses<br \/>\nand suspects are to be effective. This is particularly the case in serious or complex investigations where a<br \/>\nfailure to identify and secure volatile digital data could have a significant impact on the conduct of the<br \/>\ninvestigation.<br \/>\nIt is important that investigators develop appropriate strategies to identify the existence of digital evidence<br \/>\nand to secure and interpret that evidence. Irrespective of the size or complexity the investigator should<br \/>\nconsider five primary stages.<br \/>\n\u25cf Data Capture and search and seizure at crime scenes;<br \/>\n\u25cf Data Examination;<br \/>\n\u25cf Data Interpretation;<br \/>\n\u25cf Data Reporting;<br \/>\n\u25cf Interview of Witness and Suspects.<br \/>\nInvestigators should seek the advice of their force Telecoms\/ISP SPOC, Network Investigators and Digital<br \/>\nForensic Units at the earliest opportunity to formulate a written digital forensic strategy.<br \/>\nDue consideration should always be given by the investigators of the benefits to the overall investigation of<br \/>\nconducting any digital forensic work<br \/>\nDATA CAPTURE STRATEGY<br \/>\nThe investigator should develop a Data Capture Strategy to identify and secure all relevant digital evidence.<br \/>\nOther than a requirement to react to immediate events the investigator should be able to plan this strategy<br \/>\nin advance.<br \/>\nWhere a crime or incident is reported, early consideration should be given to the potential to glean evidence<br \/>\nfrom the Internet or end user devices which have a digital memory capacity and from which evidence \/<br \/>\nintelligence may be retrieved.<\/p>\n<p>Social Network Sites<br \/>\nPriority \u2013 Establish the use of Social Networking, Online Communities, Online Storage and other Cloud<br \/>\nServices by witnesses and suspects. Whilst this may be revealed by the examination of seized devices it may<br \/>\nbe gleaned more quickly if asked during interview.<br \/>\nMany current investigations involve Social Networking Sites. It is imperative that early consideration is made<br \/>\naround securing Social Networking Profiles that fall within the investigation. The best evidence is available<br \/>\nfrom the service provider however they are often located outside of the UK and may or may not secure the<br \/>\ncontent on the appropriate request via the force CSP\/ISP SPOC. As such the investigator should always<br \/>\nsecure a copy of what is seen by them as this may be the only opportunity to secure this evidence before it<br \/>\nchanges.<br \/>\n35 NOT PROTECTIVELY MARKED ACPO Good Practice Guide for Digital Evidence, Version 5 (October 2011)<br \/>\nAssociation of Chief Police Officers of England, Wales &amp; Northern Ireland<br \/>\nOpen Source Research<br \/>\nThe internet is a huge repository of information much of it of value to the investigator. Research by properly<br \/>\ntrained staff, preferably with access to a stand alone computer, will enable the investigator to get the best<br \/>\nfrom the vast amount of information that is now held online. In addition to this the force CSP\/ISP SPOCs will<br \/>\nbe able to give advice on the type of data that can potentially be obtained from ISP\u2019s, web mail and web<br \/>\nbased providers.<br \/>\nCare should be taken when undertaking Internet research from any computer linked to the Police National<br \/>\nNetwork (pnn) as a digital footprint will be left and may reveal the law enforcement interest. This will not be<br \/>\nobvious to the general internet user but will most certainly be clear to the hosts or providers of the service<br \/>\nand those who are particularly technically aware and monitoring IP addresses.<br \/>\nRegistration details are often asked for and whilst in some instances they will inevitably be fictitious, on<br \/>\nmany occasions they will include the following;<br \/>\n\u2022 IP log on;<br \/>\n\u2022 Name and Address;<br \/>\n\u2022 Landline and Mobile phone Numbers;<br \/>\n\u2022 Banking data;<br \/>\n\u2022 Emails used;<br \/>\n\u2022 Username and passwords;<br \/>\n\u2022 Linked accounts.<br \/>\nWhilst law enforcement are used to working with RIPA, RIPSA and the DPA to obtain information this<br \/>\nlegislation only applies within the UK. Many services are based outside of the UK based organisations.<\/p>\n<p>It is essential that the CSP\/ISP SPOC is engaged at the earliest opportunity to these enquiries with the<br \/>\nobjective of preserving known time critical data.<br \/>\nNational Technical Assistance Centre (NTAC)<br \/>\nIf encrypted files are located or suspected it is important that the suspect is asked for them, failure to do so<br \/>\nmay result in an offence under sec 49 of RIPA. Encryption is difficult to break and assistance can be sought<br \/>\nvia the Digital Forensic Unit from the National Technical Assistance Centre (NTAC) in London.<br \/>\nThe National Technical Assistance Centre (NTAC) provides technical support only to public authorities,<br \/>\nparticularly law enforcement agencies and the intelligence services. It includes a facility for the complex<br \/>\nprocessing of lawfully obtained protected electronic information.<br \/>\nNTAC is the leading national authority for all matters relating to the processing of protected information into<br \/>\nan intelligible format and the disclosure of key material.<br \/>\nAll public authorities should consult with NTAC at the earliest opportunity when considering exercising the<br \/>\npowers in Part III of the Regulation of Investigatory Powers Act (RIPA).<br \/>\nA public authority cannot serve any notice under Section 49 of RIPA or, when the authority considers it<br \/>\nnecessary, seek to obtain appropriate permission, without the prior written approval of NTAC.<br \/>\nInvestigating Crimes where Digital Evidence may be present<br \/>\nThe proliferation of digital devices and the advances in digital communications mean that digital evidence is<br \/>\nnow present or potentially present in almost every crime.<br \/>\nDigital evidence can be found in a number of different locations,<br \/>\n\u25cf Locally on an end-user device &#8211; typically a users computer, mobile\/smart phone, satellite navigation<br \/>\nsystem, USB thumb drive, or digital camera;<br \/>\n36 NOT PROTECTIVELY MARKED ACPO Good Practice Guide for Digital Evidence, Version 5 (October 2011)<br \/>\nAssociation of Chief Police Officers of England, Wales &amp; Northern Ireland<br \/>\n\u25cf On a remote resource that is public &#8211; for example websites used for social networking, discussion<br \/>\nforums, and newsgroups;<br \/>\n\u25cf On a remote resource that is private \u2013 an Internet Service Provider\u2019s logs of users\u2019 activity, a mobile<br \/>\nphone company\u2019s records of customers\u2019 billing, a user\u2019s webmail account, and increasingly common,<br \/>\na user\u2019s remote file storage;<br \/>\n\u25cf In transit \u2013 for example mobile phone text messages, or voice calls, emails, or Internet chat.<br \/>\nInvestigating Different Types of Crime and Identifying Sources of Evidence<br \/>\nIt would be quite common for evidence of a crime to be in more than one of the locations mentioned above.<br \/>\nHowever it might be much easier to obtain the evidence from one location rather than another; careful<br \/>\nconsideration should be given to the resources required to obtain the evidence.<br \/>\nFor example, if evidence is required of contact between two mobile phone numbers, the best method would<br \/>\nbe to obtain call data from the Communication Service Providers via the force SPOC, rather than to request a<br \/>\nforensic examination of the mobile phones. The call data is likely to be more comprehensive than call logs<br \/>\nfrom a mobile phone and the times and dates can be relied upon, which is not necessarily the case with logs<br \/>\nfrom a mobile phone.<br \/>\nCOVERT FORENSIC COMPUTING<br \/>\nSome investigations may require consideration of gathering digital intelligence in a covert manner. It is<br \/>\nevidently not appropriate to discuss covert tactics within this document however opportunities exist to<br \/>\ncapture digital data online and physically from devices in a covert manner where the appropriate authorities<br \/>\nare in place.<br \/>\nDATA EXAMINATION STRATEGY<br \/>\nDevices seized as part of a search will be forwarded to the force Digital Forensic Unit in accordance with<br \/>\nforce policy.<br \/>\nThe investigator needs to properly consider the nature and purpose of the digital examination.<br \/>\nThe investigator must tailor the needs of the digital examination not only based on the investigation<br \/>\nrequirements but the ability of the Digital Forensic Unit to deliver it. The better the briefing the better the<br \/>\nadvice will be.<br \/>\nThe Investigator must be clear on what priorities are placed on the examination as it may well be, as<br \/>\npreviously stated, that key information needs to be found in order to preserve evidence that may exist<br \/>\nelsewhere. This is particularly the case where it relates to the existence of additional evidence, offenders<br \/>\nand victims. A preview of content may be appropriate albeit the limitations of this approach will require to be<br \/>\nproperly understood.<br \/>\nPriorities may also be set on the type of data to be extracted and viewed by persons other than the Digital<br \/>\nForensics Unit as this may reduce the burden on the unit and increase the likelihood of the delivery of the<br \/>\ndata. This will of course depend on the nature of the examination. But could include;<br \/>\n\u2022 Internet History;<br \/>\n\u2022 Emails;<br \/>\n\u2022 Evidence of webmail;<br \/>\n\u2022 Instant Messaging Logs;<br \/>\n\u2022 Media Files (images &amp; videos);<br \/>\n\u2022 Social Networks;<br \/>\n\u2022 Forums &amp; Chat Rooms;<br \/>\n\u2022 Cloud Services \/ Virtual Storage;<br \/>\n\u2022 File Sharing programs;<br \/>\n\u2022 Usernames \/ Passwords;<br \/>\n\u2022 Encrypted Files;<br \/>\n\u2022 Word Documents;<br \/>\n\u2022 Spreadsheets.<br \/>\n37 NOT PROTECTIVELY MARKED ACPO Good Practice Guide for Digital Evidence, Version 5 (October 2011)<br \/>\nAssociation of Chief Police Officers of England, Wales &amp; Northern Ireland<br \/>\nThe discussion between the investigator and digital forensic unit should result in an agreed digital extraction<br \/>\n\/ examination plan to achieve an agreed outcome. The plan may need to be reviewed as the evidential<br \/>\npicture and priorities change.<br \/>\nDATA INTERPRETATION STRATEGY<br \/>\nStaff tasked by the investigator to undertake the digital data extraction \/ examination must be competent to<br \/>\ndo so and have had sufficient training to undertake the task assigned to them. It must be borne in mind that<br \/>\nthe development of digital technology is dynamic and the examiners may well face significant challenges to<br \/>\ntheir knowledge.<br \/>\nIt is the role of the Digital Evidence Examiner to provide the investigator with a report\/statement accounting<br \/>\nfor the examination of the devices as part of the investigation. The report should account in full for the<br \/>\nparameters set for the examination, data extracted and data examined. There should also be provision to<br \/>\nprovide an interpretation of technical aspects of the examination relevant to the provision of evidence in the<br \/>\ncase.<br \/>\nThe investigator should have a full discussion with the examiner ahead of the production of any reports to<br \/>\nensure all the relevant evidence is contained in the report and that the processes used adhered to the ACPO<br \/>\nPrinciples governing handling digital based evidence. These principles are explained in the section headed<br \/>\n\u201cThe Principles of Digital Evidence\u201d in this guide.<br \/>\nDATA REPORTING<br \/>\nThe report is the ultimate product of the examination. It should outline the examination process and the<br \/>\nsignificant data recovered. Whilst an initial report may be relatively brief, the examiner should be in a<br \/>\nposition to produce a full technical report should one later be required.<br \/>\nExamination notes must be preserved for disclosure or testimony purposes and, if required, the preparation<br \/>\nof a full technical report. In Scotland, they will be preserved as productions to be used as evidence in court.<br \/>\nAn examiner may need to testify about not only the conduct of the examination, but also the validity of the<br \/>\nprocedure and their experience and qualifications to conduct the examination.<br \/>\nThe role of the examiner is to secure from any seized material true copy of any data that they may contain<br \/>\nForensic hardware should be subject to initial and periodic testing. . It is worth repeating at this point that<br \/>\nfull records should be made of all actions taken. These can be made available to the defence who may<br \/>\nsubsequently cause a further examination to be conducted. A significant part of such an examination will be<br \/>\nto validate the actions and results of the original examination. Such records are also part of the unused<br \/>\nmaterial for the case under investigation.<br \/>\nIt is important to remember that legislation continues to change to keep up with technological<br \/>\nand societal change. It is important, therefore, to consider the legal requirements and<br \/>\nrestrictions when examining digital evidence. Recent case law and precedents set at higher<br \/>\ncourts are important considerations when preparing an evidence package for an investigator<br \/>\nThis applies, in particular, to the use of the Internet and files downloaded from the Internet; or<br \/>\nmaterial accessible from foreign jurisdictions i.e. online data stores.<br \/>\nInterview of Witnesses and Suspects<br \/>\nThe interview of witnesses\/suspects is a crucial opportunity to identify key information about the nature and<br \/>\nuse of digital data relative to the investigation in hand. As such those involved must be properly briefed and<br \/>\ncompetent to undertake the interview having the necessary understanding of the areas to explore.<br \/>\nConsideration should be given to consulting with a trained Interview Advisor with a view to the compilation<br \/>\nof an appropriate interview strategy.<br \/>\nBear in mind that the digital examination of devices seized will take time and may not necessarily reveal vital<br \/>\ninformation that the witness \/ suspect may be aware of. Typically this may include;<br \/>\n38 NOT PROTECTIVELY MARKED ACPO Good Practice Guide for Digital Evidence, Version 5 (October 2011)<br \/>\nAssociation of Chief Police Officers of England, Wales &amp; Northern Ireland<br \/>\n\u25cf Web Mail Addresses \/ Username &amp; Passwords \/ shared or sole use;<br \/>\n\u25cf Social Network Profiles \/ Username &amp; Passwords \/ shared or sole use;<br \/>\n\u25cf Use of Forums &amp; Chat Rooms \/ Username &amp; Passwords;<br \/>\n\u25cf Use of Cloud Services \/ Username &amp; Passwords \/ shared or sole use;<br \/>\n\u25cf Use of Virtual Storage \/ Username &amp; Passwords \/ shared or sole use;<br \/>\n\u25cf Use of Role Play Gaming Sites \/ Username &amp; Passwords \/ shared or sole use;<br \/>\n\u25cf Use of Auction sites \/ Username &amp; Passwords \/ shared or sole use;<br \/>\n\u25cf Use of Online Banking;<br \/>\n\u25cf List of User Names;<br \/>\n\u25cf Use of Encryption \/ Encryption Keys;<br \/>\n\u25cf User Names of contacts;<br \/>\n\u25cf Use of the devices;<br \/>\n\u25cf Websites Visited;<br \/>\n\u25cf Internet Service Provider.<br \/>\nThis list is not exhaustive<br \/>\n39 NOT PROTECTIVELY MARKED ACPO Good Practice Guide for Digital Evidence, Version 5 (October 2011)<br \/>\nAssociation of Chief Police Officers of England, Wales &amp; Northern Ireland<br \/>\nWORKBOOK FOR THE CREATION OF ACPO GUIDANCE\/PRACTICE ADVICE<br \/>\nThis workbook, with all sections completed, must be included in the final document as an Appendix<br \/>\nand submitted, through the Head of the Business Area, to the Programme Support Office for quality<br \/>\nassurance prior to submission to Cabinet for approval as ACPO Doctrine.<br \/>\nACPO EQUALITY IMPACT ASSESSMENT TEMPLATE (DIVERSITY AUDIT) AS AGREED WITH THE<br \/>\nCRE<br \/>\n1. Identify all aims of the guidance\/advice<br \/>\n1.1 Identify the aims and projected outcomes of the guidance\/advice:<br \/>\n1.2 Which individuals and organisations are likely to have an interest in or<br \/>\nlikely to be affected by the proposal?<br \/>\n2. Consider the evidence<br \/>\n2.1 What relevant quantitative data has been considered?<br \/>\nAge<br \/>\nDisability<br \/>\nGender<br \/>\nRace<br \/>\nReligion \/ Belief<br \/>\nSexual Orientation<br \/>\n2.2 What relevant qualitative information has been considered?<br \/>\nAge<br \/>\nDisability<br \/>\nGender<br \/>\nRace<br \/>\nReligion \/ Belief<br \/>\nSexual Orientation<br \/>\n2.3 What gaps in data\/information were identified?<br \/>\nAge<br \/>\nDisability<br \/>\nGender<br \/>\nRace<br \/>\nReligion \/ Belief<br \/>\nSexual Orientation<br \/>\n2.4 What consideration has been given to commissioning research?<br \/>\nAge<br \/>\nDisability<br \/>\nGender<br \/>\nRace<br \/>\nReligion \/ Belief<br \/>\nSexual Orientation<br \/>\n40 NOT PROTECTIVELY MARKED ACPO Good Practice Guide for Digital Evidence, Version 5 (October 2011)<br \/>\nAssociation of Chief Police Officers of England, Wales &amp; Northern Ireland<br \/>\n3. Assess likely impact<br \/>\n3.1 From the analysis of data and information has any potential for<br \/>\ndifferential\/adverse impact been identified?<br \/>\nAge<br \/>\nDisability<br \/>\nGender<br \/>\nRace<br \/>\nReligion \/ Belief<br \/>\nSexual Orientation<br \/>\n3.2 If yes explain any intentional impact:<br \/>\nAge<br \/>\nDisability<br \/>\nGender<br \/>\nRace<br \/>\nReligion \/ Belief<br \/>\nSexual Orientation<br \/>\n3.3 If yes explain what impact was discovered which you feel is justifiable in<br \/>\norder to achieve the overall proposal aims. Please provide examples:<br \/>\nAge<br \/>\nDisability<br \/>\nGender<br \/>\nRace<br \/>\nReligion \/ Belief<br \/>\nSexual Orientation<br \/>\n3.4 Are there any other factors that might help to explain differential\/adverse<br \/>\nimpact?<br \/>\nAge<br \/>\nDisability<br \/>\nGender<br \/>\nRace<br \/>\nReligion \/ Belief<br \/>\nSexual Orientation<br \/>\n4. Consider alternatives<br \/>\n4.1 Summarise what changes have been made to the proposal to remove or<br \/>\nreduce the potential for differential\/adverse impact:<br \/>\n4.2 Summarise changes to the proposal to remove or reduce the potential for<br \/>\ndifferential\/adverse impact that were considered but not implemented<br \/>\nand explain why this was the case:<br \/>\n4.3 If potential for differential\/adverse impact remains explain why<br \/>\nimplementation is justifiable in order to meet the wider proposal<br \/>\naims:<br \/>\n41 NOT PROTECTIVELY MARKED ACPO Good Practice Guide for Digital Evidence, Version 5 (October 2011)<br \/>\nAssociation of Chief Police Officers of England, Wales &amp; Northern Ireland<br \/>\n5. Consult formally<br \/>\n5.1 Has the proposal been subject to consultation? If no, please state why not.<br \/>\nIf yes, state which individuals and organisations were consulted and<br \/>\nwhat form the consultation took:<br \/>\nAge<br \/>\nDisability<br \/>\nGender<br \/>\nRace<br \/>\nReligion \/ Belief<br \/>\nSexual Orientation<br \/>\n5.2 What was the outcome of the consultation?<br \/>\nAge<br \/>\nDisability<br \/>\nGender<br \/>\nRace<br \/>\nReligion \/ Belief<br \/>\nSexual Orientation<br \/>\n5.3 Has the proposal been reviewed and\/or amended in light of the outcomes<br \/>\nof consultation?<br \/>\n5.4 Have the results of the consultation been fed back to the consultees?<br \/>\n6. Decide whether to adopt the proposal<br \/>\n6.1 Provide a statement outlining the findings of the impact assessment<br \/>\nprocess. If the proposal has been identified as having a possibility to<br \/>\nadversely impact upon diverse communities, the statement should include<br \/>\njustification for the implementation:<br \/>\n7. Make Monitoring Arrangements<br \/>\n7.1 What consideration has been given to piloting the proposal?<br \/>\n7.2 What monitoring will be implemented at a national level by the proposal<br \/>\nowning agency and\/or other national agency?<br \/>\n7.3 Is this proposal intended to be implemented by local agencies that have a<br \/>\nstatutory duty to impact assess policies? If so, what monitoring<br \/>\nrequirements are you placing on that agency?<br \/>\n8. Publish Assessment Results<br \/>\n8.1 What form will the publication of the impact assessment take?<br \/>\nAuthor:- DAC Janet Williams QPM<br \/>\nMetropolitan Police Service<br \/>\nCrime BA<br \/>\nAny queries relating to this document should be directed to either the author detailed above or the ACPO Programme<br \/>\nSupport Office on 020 7084 8958\/8959.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ACPO Good Practice Guide ACPO Good Practice Guide for Digital Evidence for Digital Evidence March 2012 ACPO Good Practice Guide for Digital Evidence The Association of Chief Police Officers have agreed to this revised good practice guide being circulated to, and adopted by, Police Forces in England, Wales &amp; Northern Ireland. It is NOT PROTECTIVELY [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"pagelayer_contact_templates":[],"_pagelayer_content":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-423","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/youpple.com\/dataclergy\/wp-json\/wp\/v2\/posts\/423","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/youpple.com\/dataclergy\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/youpple.com\/dataclergy\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/youpple.com\/dataclergy\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/youpple.com\/dataclergy\/wp-json\/wp\/v2\/comments?post=423"}],"version-history":[{"count":1,"href":"https:\/\/youpple.com\/dataclergy\/wp-json\/wp\/v2\/posts\/423\/revisions"}],"predecessor-version":[{"id":424,"href":"https:\/\/youpple.com\/dataclergy\/wp-json\/wp\/v2\/posts\/423\/revisions\/424"}],"wp:attachment":[{"href":"https:\/\/youpple.com\/dataclergy\/wp-json\/wp\/v2\/media?parent=423"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/youpple.com\/dataclergy\/wp-json\/wp\/v2\/categories?post=423"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/youpple.com\/dataclergy\/wp-json\/wp\/v2\/tags?post=423"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}