{"id":22440,"date":"2016-09-30T20:51:32","date_gmt":"2016-10-01T00:51:32","guid":{"rendered":"http:\/\/iacpmag.wp.matrixdev.net\/?p=22440"},"modified":"2016-10-04T14:29:10","modified_gmt":"2016-10-04T18:29:10","slug":"the-three-keys-to-managing-digital-evidence-collection-analysis-sharing","status":"publish","type":"post","link":"https:\/\/www.policechiefmagazine.org\/the-three-keys-to-managing-digital-evidence-collection-analysis-sharing\/","title":{"rendered":"The Three Keys to Managing Digital Evidence: Collection, Analysis, Sharing"},"content":{"rendered":"<p>More than 5,700 runners were still out on the course when two explosions rocked the finish line of the 2013 Boston Marathon. Police officers, emergency medical technicians (EMTs), volunteers, and spectators rushed to help those injured by the explosions. So began an investigation that wouldn\u2019t end until 100 hours later, when the final suspect was pulled from a boat in a backyard in Watertown, Massachusetts.<\/p>\n<p>What happened during those 100 hours between the bombing and the capture of Dzhokhar Tsarnaev illustrates the degree to which digital evidence is now critical to police investigations.<\/p>\n<p>In cases such as this, the wealth of digital information available to investigators can break an investigation wide open; yet, it also poses new challenges for many police departments where gathering, analyzing, and sharing information remains difficult.<\/p>\n<p class=\"ARTICLE-TEXT-2014\">The case of the Boston Marathon bombing, in particular, shows the need for new technology to tie together more information. In the end, authorities\u2019 ability to collect, analyze, and share digital evidence is what will help put the bad guys behind bars.<\/p>\n<h3 class=\"ARTICLE-SUBHEAD-2014\"><span class=\"CharOverride-109\" style=\"color: #0073cc;\">Collecting the Many Sources of Digital Evidence<\/span><\/h3>\n<p class=\"ARTICLE-TEXT-2014\">The Boston bombing crime scene was complex and far-reaching, stretching more than 20 square blocks. Nonetheless, within minutes, authorities assembled a team of local and federal officers to go store-by-store along the crime scene to collect video evidence.<\/p>\n<p class=\"ARTICLE-TEXT-2014\">In an event of that magnitude, nothing happens in the field without someone documenting it. Especially in the case of a marathon finish line\u2014spectators, race photographers, and reporters are constantly snapping pictures and shooting videos. For someone to travel into and out of the area without being videotaped or photographed bordered on impossible.<\/p>\n<p class=\"ARTICLE-TEXT-2014\">Crowdsourcing potential evidence was both a blessing and a curse in the Boston Marathon case. In the first 24 hours, the public emailed 13,500 submissions of photos and videos taken during the race. The sheer volume initially crashed the Federal Bureau of Investigation\u2019s (FBI\u2019s) email server. But, ultimately, this crowdsourced information, coupled with CCTV video, led authorities to the Tsarnaev brothers who were responsible for the attack.<span class=\"CharOverride-35\"><sup>1<\/sup><\/span><\/p>\n<p class=\"ARTICLE-TEXT-2014\">The photos and videos allowed authorities to retrace the perpetrators\u2019 actions and whereabouts. With the assistance of the FBI and hundreds of detectives from local, state, and federal authorities working around the clock, the Boston Police Department was able to collect and process an enormous volume of evidence and bring closure to the investigation. Of course this story is the exception, not the rule, in day-to-day police work.<\/p>\n<h3 class=\"ARTICLE-SUBHEAD-2014\"><span class=\"CharOverride-109\" style=\"color: #0073cc;\">A Better Way to Collect Information for Investigations<\/span><\/h3>\n<p class=\"ARTICLE-TEXT-2014\">While digital evidence can be key to advancing a case, few police departments have the budget or time for the often manual work of collecting evidence from\u00a0the many disconnected systems that generate it.<\/p>\n<p class=\"ARTICLE-TEXT-2014\">For example, an investigator might need to fill out and submit paperwork to a 9-1-1 custodian of records to obtain audio recordings, go to a local precinct to get a copy of a recorded interview, or travel to the scene of a crime to canvas the neighborhood for CCTV footage. Data from other systems (records management systems, computer-aided dispatch [CAD], body-worn video, in-car video, crime scene photos, and more) also need to be painstakingly extracted and copied to physical media. And, after all the evidence is collected, the end result is often a pile of USB sticks or CDs, each containing different pieces of information.<\/p>\n<p class=\"ARTICLE-TEXT-2014\">However, there are easier ways. New digital investigation solutions are making data collection more efficient and accessible by enabling police departments to accomplish the following:<\/p>\n<ul>\n<li class=\"ARTICLE-TEXT-BULLET-2014\"><strong><span class=\"Bullets\"><span class=\"PALATINO-NOVA-PRO-BOLD\">Cre<\/span><\/span><span class=\"PALATINO-NOVA-PRO-BOLD\">ate a secure public portal for sharing photos, video, and tips.<\/span> <\/strong><\/li>\n<\/ul>\n<p>There\u2019s a CCTV camera on nearly every storefront and street corner, and almost everyone walking down the street has a smartphone. Yet police departments generally lack tools to crowdsource visual information from private businesses or the public. With a secure portal, private businesses, universities, schools, and other organizations could register their cameras and contact details, enabling law enforcement agencies to electronically initiate requests for video when needed. Similarly, citizens could securely share information and media that could be helpful to a case.<\/p>\n<ul>\n<li><strong><span class=\"Bullets\"><span class=\"PALATINO-NOVA-PRO-BOLD\">Use<\/span><\/span><span class=\"PALATINO-NOVA-PRO-BOLD CharOverride-94\"> a data correlation engine to automate the collection of digital evidence.<\/span> <\/strong><\/li>\n<\/ul>\n<p>As digital silos continue to proliferate, police departments need to be able to automatically connect to various content sources and use data correlation engines to do a lot of the analysis and legwork officers and investigators are doing manually today. Digital investigation solutions solve this problem by breaking down digital silos and correlating data to help automate and expedite the collection of digital evidence.<\/p>\n<ul>\n<li class=\"ARTICLE-TEXT-BULLET-2014\"><strong><span class=\"Bullets\"><span class=\"PALATINO-NOVA-PRO-BOLD\">Aut<\/span><\/span><span class=\"PALATINO-NOVA-PRO-BOLD CharOverride-94\">omate management of requests for evidence.<\/span><\/strong><\/li>\n<\/ul>\n<p>In the early stages of an investigation, authorities should run every single lead to the ground, but that doesn\u2019t always happen, either because they\u2019re too busy with other cases and are unable to follow up or because they lose track of an evidence request. The results aren\u2019t pretty. In at least one case, video evidence was actually recorded over before investigators could get their hands on it. To ensure better control and follow-up on leads, address these issues by not only automating, but also tracking requests for evidence and implementing a system that notifies authorities when those requests are fulfilled. Forget the hours spent sending emails, placing phone calls, filling out forms, traveling to various sites to pick up evidence, canvassing neighborhoods on foot for video cameras, manually collecting evidence, and copying evidence to CDs and USB drives\u2014piecing together evidence to build a case should be efficient and timely.<\/p>\n<h3 class=\"ARTICLE-SUBHEAD-2014\"><span class=\"CharOverride-109\" style=\"color: #0073cc;\">Efficient Evidence Collection Using Data Correlation<\/span><\/h3>\n<p class=\"ARTICLE-TEXT-2014\">Digital content\u2014body camera video, in-car video, 9-1-1 recordings, and so on\u2014includes date and time stamps as well as geotags. For example, many body-worn cameras use GPS tracking. Most smartphones tag photos with a GPS location. Voice recording systems can be configured to capture automatic number identification (ANI), automatic location identification (ALI), and even cellphones\u2019 GPS coordinates. CCTV systems, used by most cities and transportation systems, tie locations of cameras to digitized maps.<\/p>\n<p class=\"ARTICLE-TEXT-2014\">Using these common reference points\u2014locations, times, case numbers, CAD incident numbers, keywords, and more\u2014a digital investigation system can use its data correlation engine to search all connected sources and databases for potential evidence related to a case. Through the power of audio analytics, it can also use keywords or phrases to find 9-1-1 recordings.<\/p>\n<p class=\"ARTICLE-TEXT-2014\">With a digital investigation solution, all the investigator has to do is open the digital case folder from the list of active cases, review the suggested content (along with explanations for why it was recommended), and then selectively add the relevant evidence to the digital case folder.<\/p>\n<p class=\"ARTICLE-TEXT-2014\">Aside from the obvious time savings, automating the evidence collection process significantly lessens the possibility that important facts in the case will be missed. One of an investigator\u2019s biggest fears is missing a critical piece of evidence that will later turn up on social media or be presented by the defense in court.<\/p>\n<h3 class=\"ARTICLE-SUBHEAD-2014\"><span class=\"CharOverride-109\" style=\"color: #0073cc;\">Data Analysis<\/span><\/h3>\n<p class=\"ARTICLE-TEXT-2014\">Even with massive federal assistance during the Boston Marathon bombing case, the amount of digital information to collect and analyze was overwhelming: data from cellphone systems and license plate readers; physical evidence; hundreds of hours of CCTV video; and thousands of crowdsourced photos and videos from private citizens. Dozens of investigators worked around the clock poring over this digital information to extract clues that helped identify the suspects and prevented them from inflicting further harm.<\/p>\n<p class=\"ARTICLE-TEXT-2014\">Any one piece of evidence could hold the key to an investigation. But for investigators, the process of analyzing and understanding this information can be like trying to drink water from a firehose. Today, data are so voluminous, and they are stored in so many unconnected systems, that it\u2019s virtually impossible to take them all in, digest them, and absorb the relevant facts of a case. Still, analyzing the data and drawing connections are the only way to tell the complete story of what happened, who was involved, where and when it occurred, and why it happened.<\/p>\n<p class=\"ARTICLE-TEXT-2014\">Perhaps no case illustrates this better than the Aaron Hernandez case. During the investigation of the ex-New England Patriots football player, who was found guilty of murder in the death of Odin Lloyd, investigators had to collect, sort through, and piece together text messages; cellphone records; photos and videos taken on cellphones; CCTV video recorded at a gas station; video from Department of Transportation cameras in Boston; eyewitness accounts; physical evidence (including shell casings, shoeprints, and gum); and surveillance footage taken from Hernandez\u2019s home.<span class=\"CharOverride-35\"><sup>2<\/sup><\/span><\/p>\n<p class=\"ARTICLE-TEXT-2014\">Finding and gathering all of this evidence across 30 miles (the distance from Hernandez\u2019s home in North Attleboro, Massachusetts, to Boston, where he\u2019d met with Odin Lloyd) were daunting efforts that consumed tremendous resources and strained budgets. Piecing all of this digital content together to tell the story of what happened was an even bigger challenge\u2014but it made a difference in the case\u2019s resolution.<\/p>\n<p class=\"ARTICLE-TEXT-2014\">It\u2019s not difficult to envision how cases such as this could be significantly aided by digital investigation technology that enables investigators to quickly analyze evidence and connect the dots in a case. Visualization tools allow investigators to view the evidence on a map or in a timeline to see how the who, what, when, where, and why all come together. Current cases can even be rolled up into one map-based view to help an investigator visualize common modi operandi (MOs), patterns, and traits on a geographic level.<\/p>\n<p class=\"ARTICLE-TEXT-2014\">Another complexity in the Hernandez case was the many sources of proprietary video that came into play. Video systems have very little, if any, standardization, making it necessary in many cases to secure a proprietary codec to play back the video.<\/p>\n<p class=\"ARTICLE-TEXT-2014\">Police departments need an easier way to transcode video to a common, standard format, so that all of the pieces of an investigation can come together seamlessly. And they need tools that enable them to do so without impacting the integrity of the original file.<\/p>\n<h3 class=\"ARTICLE-SUBHEAD-2014\"><span class=\"CharOverride-109\" style=\"color: #0073cc;\">Information Sharing<\/span><\/h3>\n<p class=\"ARTICLE-TEXT-2014\">Analysis alone won\u2019t bring a case to conclusion. Information sharing and collaboration are essential for effective investigations. This is especially true for cases involving homicides and gang activity, which often include task forces and investigative teams working multiple angles. Larger-scale incidents, such as the Boston Marathon bombing, necessitate collaboration on an even grander scale, at local, state, and federal levels.<\/p>\n<p class=\"ARTICLE-TEXT-2014\">Law enforcement agencies need to be able to share information in an efficient, effective, and timely manner, not just among internal investigation teams, but also with other agencies and district attorneys (DAs) who need evidence to support successful prosecutions.<\/p>\n<p class=\"ARTICLE-TEXT-2014\">Unfortunately, current procedures often work counter to the goal of information sharing.<\/p>\n<h4 class=\"ARTICLE-LEVEL-2-SUBHEAD\"><span style=\"color: #0073cc;\"><em><span class=\"CharOverride-111\">Roadblocks to Information Sharing<\/span><\/em><\/span><\/h4>\n<p class=\"ARTICLE-TEXT-2014\">One of the most telling examples of information sharing falling short is what happens at the end of the investigative process when the investigator turns over evidence to the DA.<\/p>\n<p class=\"ARTICLE-TEXT-2014\">After the investigator manually collects the different pieces of evidence and analyzes them, the next step is to package the digital case evidence for the prosecution. Interview recordings, audio recordings, photographs, in-car video, and documents often are copied in triplicate onto CDs, DVDs, or USB drives. This pile of evidence is often reviewed by the investigator\u2019s supervisor, who approves the evidence. The investigator then physically transports the collection of disks and USB drives to the DA\u2019s office.<\/p>\n<p class=\"ARTICLE-TEXT-2014\">If this sounds extremely time-consuming and labor intensive, it is. But more important, this method of packaging and delivering evidence diminishes its prosecutorial value, in the same way it diminishes its value for investigations. When an investigator or DA is dealing with dozens of files containing all manner of digital evidence, stored on tens, maybe even hundreds of CDs, DVDs, or USB drives, producing a coherent timeline is an uphill battle.<\/p>\n<p class=\"ARTICLE-TEXT-2014\">Yet assembling evidence in a timeline is what makes it compelling. As the cases discussed herein all demonstrate, the ability to connect the dots and tell a story is vitally important for the jury\u2019s understanding of a case. As the volume and variety of digital silos grow, this will become increasingly important\u2014and increasingly difficult.<\/p>\n<h4 class=\"ARTICLE-LEVEL-2-SUBHEAD\"><span style=\"color: #0073cc;\"><em><span class=\"CharOverride-111\">Selecting the Right Tools for Information Sharing<\/span><\/em><\/span><\/h4>\n<p class=\"ARTICLE-TEXT-2014\">The right tools, however, can make this Sisyphean task more manageable, allowing law enforcement professionals to efficiently close cases and bring justice to victims.<\/p>\n<p class=\"ARTICLE-TEXT-2014\">Digital investigation solutions provide a better way for police departments to collaborate and share information. But not all solutions are created equal. Law enforcement leaders can use these four questions to sort the good from the bad. If the answers are \u201cyes\u201d more often than \u201cno,\u201d they\u2019re on the right track.<\/p>\n<ol>\n<li class=\"ARTICLE-TEXT-BULLET-2014 ParaOverride-39\"><span class=\"Bullets\">Doe<\/span>s the system alleviate the time-consuming manual process of copying and hand-delivering digital evidence to prosecutors? For example, does it enable the agency to securely and electronically share evidence with prosecutors, simply by emailing a link to a digital case file?<\/li>\n<li class=\"ARTICLE-TEXT-BULLET-2014 ParaOverride-39\"><span class=\"Bullets\">Doe<\/span>s the system provide permissions-based access to digital case folders where detectives can view and manage collected evidence and collaborate on building a case?<\/li>\n<li class=\"ARTICLE-TEXT-BULLET-2014 ParaOverride-39\"><span class=\"Bullets\">Can<\/span> the system automatically track who accessed what\u2014and when\u2014for each case folder and piece of evidence to protect evidence integrity and ensure admissibility in court?<\/li>\n<li class=\"ARTICLE-TEXT-BULLET-2014 ParaOverride-39\"><span class=\"Bullets\">Doe<\/span>s the solution enable investigators and prosecutors to visualize evidence in ways that make it easily understood\u2014for example, geographically or on a timeline? Can it be presented to the jury in the same manner to increase the likelihood the case will be successfully <span class=\"CharOverride-112\">p<\/span>rosecuted?<\/li>\n<\/ol>\n<p class=\"ARTICLE-TEXT-2014\">A comprehensive digital investigation solution should streamline the entire investigation process from the collection and analysis of digital evidence to collaboration and sharing.<\/p>\n<h3 class=\"ARTICLE-SUBHEAD-2014\"><span class=\"CharOverride-109\" style=\"color: #0073cc;\">The Digital Policing Age Demands New Solutions<\/span><\/h3>\n<p class=\"ARTICLE-TEXT-2014\">Law enforcement agencies everywhere are investing in digital policing initiatives to better safeguard the public, but the amount of digital information generated from these disparate sources makes investigations more challenging. Law enforcement agencies need to find better ways to collect, analyze, and share digital evidence so they can accelerate investigations and more quickly bring justice to victims. Fortunately, the technology to do this is within their reach.&diams;<\/p>\n<h4 class=\"ARTICLE-FOOTNOTE-2014 ParaOverride-10\"><span class=\"PALATINO-NOVA-PRO-BOLD\">Notes:<\/span><\/h4>\n<p class=\"ARTICLE-FOOTNOTE-2014\"><span class=\"CharOverride-35\"><sup>1<\/sup><\/span>Matt Stroud, \u201cIn Boston Bombing, Flood of Digital Evidence Is a Blessing and a Curse,\u201d <em><span class=\"PALATINO-NOVA-PRO-ITAL\">The Verge<\/span><\/em>, April 16, 2013, <a href=\"http:\/\/www.theverge.com\/2013\/4\/16\/4230820\/in-boston-bombing-flood-of-digital-evidence-is-a-blessing-and-a-curse\">http:\/\/www.theverge.com\/2013\/4\/16\/4230820\/in-boston-bombing-flood-of-digital-evidence-is-a-blessing-and-a-curse<\/a> (accessed September 7, 2016).<\/p>\n<p class=\"ARTICLE-FOOTNOTE-2014\"><span class=\"CharOverride-35\"><sup>2<\/sup><\/span>Stephanie Slifer, \u201cAaron Hernandez Guilty of First-Degree Murder in Death of Odin Lloyd,\u201d April 15, 2015, CBS NEWS, <a href=\"http:\/\/www.cbsnews.com\/news\/aaron-hernandez-guilty-of-first-degree-murder-in-death-of-odin-lloyd\">http:\/\/www.cbsnews.com\/news\/aaron-hernandez-guilty-of-first-degree-murder-in-death-of-odin-lloyd <\/a>(accessed September 7, 2016).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>More than 5,700 runners were still out on the course when two explosions rocked the finish line of the 2013 Boston Marathon. Police officers, emergency medical technicians (EMTs), volunteers, and spectators rushed to help those injured by the explosions. So began an investigation that wouldn\u2019t end until 100 hours later, when the final suspect was pulled from a boat in a backyard in Watertown, Massachusetts.<\/p>\n<p>What happened during those 100 hours between the bombing and the capture of Dzhokhar Tsarnaev illustrates the degree to which digital evidence is now critical to police investigations.<\/p>\n<p>In cases such as this, the wealth of digital information available to investigators can break an investigation wide open; yet, it also poses new challenges for many police departments where gathering, analyzing, and sharing information remains difficult.<\/p>\n","protected":false},"author":3,"featured_media":22468,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[146],"tags":[],"class_list":["post-22440","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"acf":{"post_author":"<strong>Ed Davis, Commissioner (Ret.), Boston, Massachusetts, Police Department, CEO, <\/strong><strong>Edward Davis, LLC<\/strong>","main_category":"Technology","legacy_article_id":"","legacy_issue_id":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.4 (Yoast SEO v24.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Three Keys to Managing Digital Evidence: Collection, Analysis, Sharing - Police Chief Magazine<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.policechiefmagazine.org\/the-three-keys-to-managing-digital-evidence-collection-analysis-sharing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Three Keys to Managing Digital Evidence: Collection, Analysis, Sharing\" \/>\n<meta property=\"og:description\" content=\"More than 5,700 runners were still out on the course when two explosions rocked the finish line of the 2013 Boston Marathon. Police officers, emergency medical technicians (EMTs), volunteers, and spectators rushed to help those injured by the explosions. So began an investigation that wouldn\u2019t end until 100 hours later, when the final suspect was pulled from a boat in a backyard in Watertown, Massachusetts.  What happened during those 100 hours between the bombing and the capture of Dzhokhar Tsarnaev illustrates the degree to which digital evidence is now critical to police investigations.  In cases such as this, the wealth of digital information available to investigators can break an investigation wide open; yet, it also poses new challenges for many police departments where gathering, analyzing, and sharing information remains difficult.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.policechiefmagazine.org\/the-three-keys-to-managing-digital-evidence-collection-analysis-sharing\/\" \/>\n<meta property=\"og:site_name\" content=\"Police Chief Magazine\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TheIACP\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-01T00:51:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-10-04T18:29:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.policechiefmagazine.org\/wp-content\/uploads\/Davis-3-Keys.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2421\" \/>\n\t<meta property=\"og:image:height\" content=\"1288\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dani Gudakunst\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TheIACP\" \/>\n<meta name=\"twitter:site\" content=\"@TheIACP\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dani Gudakunst\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.policechiefmagazine.org\/the-three-keys-to-managing-digital-evidence-collection-analysis-sharing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.policechiefmagazine.org\/the-three-keys-to-managing-digital-evidence-collection-analysis-sharing\/\"},\"author\":{\"name\":\"Dani Gudakunst\",\"@id\":\"https:\/\/www.policechiefmagazine.org\/#\/schema\/person\/84ca7fd7f208094a13c5c94b803849b5\"},\"headline\":\"The Three Keys to Managing Digital Evidence: Collection, Analysis, Sharing\",\"datePublished\":\"2016-10-01T00:51:32+00:00\",\"dateModified\":\"2016-10-04T18:29:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.policechiefmagazine.org\/the-three-keys-to-managing-digital-evidence-collection-analysis-sharing\/\"},\"wordCount\":2378,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.policechiefmagazine.org\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.policechiefmagazine.org\/the-three-keys-to-managing-digital-evidence-collection-analysis-sharing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.policechiefmagazine.org\/wp-content\/uploads\/Davis-3-Keys.jpg\",\"articleSection\":[\"Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.policechiefmagazine.org\/the-three-keys-to-managing-digital-evidence-collection-analysis-sharing\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.policechiefmagazine.org\/the-three-keys-to-managing-digital-evidence-collection-analysis-sharing\/\",\"url\":\"https:\/\/www.policechiefmagazine.org\/the-three-keys-to-managing-digital-evidence-collection-analysis-sharing\/\",\"name\":\"The Three Keys to Managing Digital Evidence: Collection, Analysis, Sharing - Police Chief Magazine\",\"isPartOf\":{\"@id\":\"https:\/\/www.policechiefmagazine.org\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.policechiefmagazine.org\/the-three-keys-to-managing-digital-evidence-collection-analysis-sharing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.policechiefmagazine.org\/the-three-keys-to-managing-digital-evidence-collection-analysis-sharing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.policechiefmagazine.org\/wp-content\/uploads\/Davis-3-Keys.jpg\",\"datePublished\":\"2016-10-01T00:51:32+00:00\",\"dateModified\":\"2016-10-04T18:29:10+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.policechiefmagazine.org\/the-three-keys-to-managing-digital-evidence-collection-analysis-sharing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.policechiefmagazine.org\/the-three-keys-to-managing-digital-evidence-collection-analysis-sharing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.policechiefmagazine.org\/the-three-keys-to-managing-digital-evidence-collection-analysis-sharing\/#primaryimage\",\"url\":\"https:\/\/www.policechiefmagazine.org\/wp-content\/uploads\/Davis-3-Keys.jpg\",\"contentUrl\":\"https:\/\/www.policechiefmagazine.org\/wp-content\/uploads\/Davis-3-Keys.jpg\",\"width\":2421,\"height\":1288},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.policechiefmagazine.org\/the-three-keys-to-managing-digital-evidence-collection-analysis-sharing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.policechiefmagazine.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Three Keys to Managing Digital Evidence: Collection, Analysis, Sharing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.policechiefmagazine.org\/#website\",\"url\":\"https:\/\/www.policechiefmagazine.org\/\",\"name\":\"Police Chief Magazine\",\"description\":\"Police Chief Magazine\",\"publisher\":{\"@id\":\"https:\/\/www.policechiefmagazine.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.policechiefmagazine.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.policechiefmagazine.org\/#organization\",\"name\":\"Police Chief Magazine\",\"url\":\"https:\/\/www.policechiefmagazine.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.policechiefmagazine.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.policechiefmagazine.org\/wp-content\/uploads\/logo-name-blue.png\",\"contentUrl\":\"https:\/\/www.policechiefmagazine.org\/wp-content\/uploads\/logo-name-blue.png\",\"width\":500,\"height\":246,\"caption\":\"Police Chief Magazine\"},\"image\":{\"@id\":\"https:\/\/www.policechiefmagazine.org\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TheIACP\",\"https:\/\/x.com\/TheIACP\",\"https:\/\/www.instagram.com\/theiacp\/\",\"https:\/\/www.linkedin.com\/company\/international-association-of-chiefs-of-police\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.policechiefmagazine.org\/#\/schema\/person\/84ca7fd7f208094a13c5c94b803849b5\",\"name\":\"Dani Gudakunst\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.policechiefmagazine.org\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b173cda704aae9e4495ff5dc56e71683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b173cda704aae9e4495ff5dc56e71683?s=96&d=mm&r=g\",\"caption\":\"Dani Gudakunst\"},\"url\":\"https:\/\/www.policechiefmagazine.org\/author\/dgudakunst\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Three Keys to Managing Digital Evidence: Collection, Analysis, Sharing - Police Chief Magazine","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.policechiefmagazine.org\/the-three-keys-to-managing-digital-evidence-collection-analysis-sharing\/","og_locale":"en_US","og_type":"article","og_title":"The Three Keys to Managing Digital Evidence: Collection, Analysis, Sharing","og_description":"More than 5,700 runners were still out on the course when two explosions rocked the finish line of the 2013 Boston Marathon. Police officers, emergency medical technicians (EMTs), volunteers, and spectators rushed to help those injured by the explosions. So began an investigation that wouldn\u2019t end until 100 hours later, when the final suspect was pulled from a boat in a backyard in Watertown, Massachusetts.  What happened during those 100 hours between the bombing and the capture of Dzhokhar Tsarnaev illustrates the degree to which digital evidence is now critical to police investigations.  In cases such as this, the wealth of digital information available to investigators can break an investigation wide open; yet, it also poses new challenges for many police departments where gathering, analyzing, and sharing information remains difficult.","og_url":"https:\/\/www.policechiefmagazine.org\/the-three-keys-to-managing-digital-evidence-collection-analysis-sharing\/","og_site_name":"Police Chief Magazine","article_publisher":"https:\/\/www.facebook.com\/TheIACP","article_published_time":"2016-10-01T00:51:32+00:00","article_modified_time":"2016-10-04T18:29:10+00:00","og_image":[{"width":2421,"height":1288,"url":"https:\/\/www.policechiefmagazine.org\/wp-content\/uploads\/Davis-3-Keys.jpg","type":"image\/jpeg"}],"author":"Dani Gudakunst","twitter_card":"summary_large_image","twitter_creator":"@TheIACP","twitter_site":"@TheIACP","twitter_misc":{"Written by":"Dani Gudakunst","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.policechiefmagazine.org\/the-three-keys-to-managing-digital-evidence-collection-analysis-sharing\/#article","isPartOf":{"@id":"https:\/\/www.policechiefmagazine.org\/the-three-keys-to-managing-digital-evidence-collection-analysis-sharing\/"},"author":{"name":"Dani Gudakunst","@id":"https:\/\/www.policechiefmagazine.org\/#\/schema\/person\/84ca7fd7f208094a13c5c94b803849b5"},"headline":"The Three Keys to Managing Digital Evidence: Collection, Analysis, Sharing","datePublished":"2016-10-01T00:51:32+00:00","dateModified":"2016-10-04T18:29:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.policechiefmagazine.org\/the-three-keys-to-managing-digital-evidence-collection-analysis-sharing\/"},"wordCount":2378,"commentCount":0,"publisher":{"@id":"https:\/\/www.policechiefmagazine.org\/#organization"},"image":{"@id":"https:\/\/www.policechiefmagazine.org\/the-three-keys-to-managing-digital-evidence-collection-analysis-sharing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.policechiefmagazine.org\/wp-content\/uploads\/Davis-3-Keys.jpg","articleSection":["Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.policechiefmagazine.org\/the-three-keys-to-managing-digital-evidence-collection-analysis-sharing\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.policechiefmagazine.org\/the-three-keys-to-managing-digital-evidence-collection-analysis-sharing\/","url":"https:\/\/www.policechiefmagazine.org\/the-three-keys-to-managing-digital-evidence-collection-analysis-sharing\/","name":"The Three Keys to Managing Digital Evidence: Collection, Analysis, Sharing - Police Chief Magazine","isPartOf":{"@id":"https:\/\/www.policechiefmagazine.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.policechiefmagazine.org\/the-three-keys-to-managing-digital-evidence-collection-analysis-sharing\/#primaryimage"},"image":{"@id":"https:\/\/www.policechiefmagazine.org\/the-three-keys-to-managing-digital-evidence-collection-analysis-sharing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.policechiefmagazine.org\/wp-content\/uploads\/Davis-3-Keys.jpg","datePublished":"2016-10-01T00:51:32+00:00","dateModified":"2016-10-04T18:29:10+00:00","breadcrumb":{"@id":"https:\/\/www.policechiefmagazine.org\/the-three-keys-to-managing-digital-evidence-collection-analysis-sharing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.policechiefmagazine.org\/the-three-keys-to-managing-digital-evidence-collection-analysis-sharing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.policechiefmagazine.org\/the-three-keys-to-managing-digital-evidence-collection-analysis-sharing\/#primaryimage","url":"https:\/\/www.policechiefmagazine.org\/wp-content\/uploads\/Davis-3-Keys.jpg","contentUrl":"https:\/\/www.policechiefmagazine.org\/wp-content\/uploads\/Davis-3-Keys.jpg","width":2421,"height":1288},{"@type":"BreadcrumbList","@id":"https:\/\/www.policechiefmagazine.org\/the-three-keys-to-managing-digital-evidence-collection-analysis-sharing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.policechiefmagazine.org\/"},{"@type":"ListItem","position":2,"name":"The Three Keys to Managing Digital Evidence: Collection, Analysis, Sharing"}]},{"@type":"WebSite","@id":"https:\/\/www.policechiefmagazine.org\/#website","url":"https:\/\/www.policechiefmagazine.org\/","name":"Police Chief Magazine","description":"Police Chief Magazine","publisher":{"@id":"https:\/\/www.policechiefmagazine.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.policechiefmagazine.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.policechiefmagazine.org\/#organization","name":"Police Chief Magazine","url":"https:\/\/www.policechiefmagazine.org\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.policechiefmagazine.org\/#\/schema\/logo\/image\/","url":"https:\/\/www.policechiefmagazine.org\/wp-content\/uploads\/logo-name-blue.png","contentUrl":"https:\/\/www.policechiefmagazine.org\/wp-content\/uploads\/logo-name-blue.png","width":500,"height":246,"caption":"Police Chief Magazine"},"image":{"@id":"https:\/\/www.policechiefmagazine.org\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TheIACP","https:\/\/x.com\/TheIACP","https:\/\/www.instagram.com\/theiacp\/","https:\/\/www.linkedin.com\/company\/international-association-of-chiefs-of-police\/"]},{"@type":"Person","@id":"https:\/\/www.policechiefmagazine.org\/#\/schema\/person\/84ca7fd7f208094a13c5c94b803849b5","name":"Dani Gudakunst","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.policechiefmagazine.org\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b173cda704aae9e4495ff5dc56e71683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b173cda704aae9e4495ff5dc56e71683?s=96&d=mm&r=g","caption":"Dani Gudakunst"},"url":"https:\/\/www.policechiefmagazine.org\/author\/dgudakunst\/"}]}},"category_objects":[{"term_id":146,"name":"Technology","slug":"technology","term_group":0,"term_taxonomy_id":146,"taxonomy":"category","description":"","parent":126,"count":394,"filter":"raw"}],"thumbnail_url":"https:\/\/www.policechiefmagazine.org\/wp-content\/uploads\/Davis-3-Keys.jpg","_links":{"self":[{"href":"https:\/\/www.policechiefmagazine.org\/wp-json\/wp\/v2\/posts\/22440","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.policechiefmagazine.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.policechiefmagazine.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.policechiefmagazine.org\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.policechiefmagazine.org\/wp-json\/wp\/v2\/comments?post=22440"}],"version-history":[{"count":7,"href":"https:\/\/www.policechiefmagazine.org\/wp-json\/wp\/v2\/posts\/22440\/revisions"}],"predecessor-version":[{"id":28993,"href":"https:\/\/www.policechiefmagazine.org\/wp-json\/wp\/v2\/posts\/22440\/revisions\/28993"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.policechiefmagazine.org\/wp-json\/wp\/v2\/media\/22468"}],"wp:attachment":[{"href":"https:\/\/www.policechiefmagazine.org\/wp-json\/wp\/v2\/media?parent=22440"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.policechiefmagazine.org\/wp-json\/wp\/v2\/categories?post=22440"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.policechiefmagazine.org\/wp-json\/wp\/v2\/tags?post=22440"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}