<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Just Security</provider_name><provider_url>https://www.justsecurity.org</provider_url><title>Low-Hanging Fruit: Responding to the Digital Evidence Challenge in Law Enforcement - Just Security</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="fy7bovd7FW"&gt;&lt;a href="https://www.justsecurity.org/59718/low-hanging-fruit-responding-digital-evidence-challenge-csis-report/"&gt;Low-Hanging Fruit: Responding to the Digital Evidence Challenge in Law Enforcement&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.justsecurity.org/59718/low-hanging-fruit-responding-digital-evidence-challenge-csis-report/embed/#?secret=fy7bovd7FW" width="600" height="338" title="&#x201C;Low-Hanging Fruit: Responding to the Digital Evidence Challenge in Law Enforcement&#x201D; &#x2014; Just Security" data-secret="fy7bovd7FW" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://www.justsecurity.org/wp-content/uploads/2018/07/GettyImages-822081432-2-1024x576.jpg</thumbnail_url><thumbnail_width>1024</thumbnail_width><thumbnail_height>576</thumbnail_height><description>Whether you believe law enforcement is &#x201C;going dark&#x201D; or we are in a &#x201C;golden age of surveillance,&#x201D; law enforcement faces serious challenges in identifying and accessing digital evidence that is available and important to their criminal investigations. Some of these problems are, no doubt, related to encryption and ephemerality of data &#x2013; the two issues [&hellip;]</description></oembed>
