“A Ronin Without a Master”: Exploring Police Perspectives on Digital Evidence in England and Wales
Abstract
1. Introduction
1.1. From Crime Scene to Courtroom
1.2. The Unique Characteristics of DE
1.3. The Present Study
- How do police officers define and understand digital devices and DE within investigative practice?
- What guides their decisions around the relevance of digital devices and seizing practices?
- How is DE used in suspect and victim interviews?
- How do officers perceive standards, reliability, and courtroom admissibility regarding DE?
2. Materials and Methods
3. Results
3.1. Theme One: Sense-Making and Handling of Digital Devices and DE in Investigations
“Digital… I don’t really know how to explain it. Like phones and stuff, bank cards… things that connect to the Internet. It’s not in front of you… it’s connected to something. And then evidence kind of goes off… like phones, banking, tracking devices.”(CD)
“[Digital devices are] electronic devices usually that use communication systems, that might use the Internet, might use radio signals. That’s usually my understanding of digital device and the content held within those devices could be considered digital evidence.”(BL)
“Do I think we are missing evidence? Yes, I think you’d be very naive to… to say that we weren’t.”(SK)
“The golden hour… is like a set time period where if it goes to court, you’ve got a higher chance of prosecution if you seize it within that amount of time… Onboard CCTV only lasts for seven days.”(CD)
“If you get that device within the time that the tokens on the phone are still in date… that’s a big challenge. Mobile phone backlogs are quite significant, nine to twelve months in some places… and even three months nationally can mean token expiry… If you miss that opportunity, then you’re going to go through expensive legal treaties, which most of the time don’t get done.”(NC)
“Technically not allowed, but sometimes you have to weigh up the risk. If that phone locks, I’m not going to get the evidence… We get that sometimes with high-risk offences where we’re not as bothered about whether we get a successful criminal conviction as about safeguarding someone.”(NC)
“You just need to put 5555 [as the phone’s pin] in just to quickly access the message.”(MS)
3.2. Theme Two: The Interpretation and Reliability of DE
“You can stick a mobile phone or a computer through the best lab in the in the world. If you then give it to someone who doesn’t have a clue what it means, the risk is there because it’s not the extraction report that’s going to court.”(NC)
“[We are] handed a USB stick full of information… and then what? The trouble is getting into that needle to be able to ask the right questions. You’ve got the evidence. But how do you make it usable? Understandable? Actionable?”(CL)
“Somewhere in there, something there might be one single line or single word. That is, that is that golden nugget… that silver bullet for that investigation.”(WS)
“The issue between the extraction and maybe what the investigation officer gets as a product I don’t think is very well explained. That’s one of the biggest threats to digital investigations, the lack of understanding by the individual reviewing the product.”(SK)
“It’s unconscious bias because when we are used to the way that we look at [for example], child sexual offences online, we would do IP address stuff, so we would either go to a piece of software which would tell us who’s been uploaded in DMS to the children via IP address.”(NC)
“We’ve seen fake CCTV. You might get a call in your son’s voice saying ‘Hi Dad…’ and believe it’s real… I could generate your voice with 30 seconds of audio.”(WS)
“I had one suspect say to me… “Officer, I agree that CCTV image of me from that CCTV… it really does look like me but… it’s not me. I saw my daughter perform on stage and I said to my wife ‘Look at our daughter. Isn’t she doing well?’. And my wife said to me ‘That’s not your daughter’.”(GO)
“Somebody creating fake accounts of different platforms, social media platforms and adding a person to monitor and keep tabs and store the evidential threshold for that becomes a lot more complicated because then you’re looking at IP addresses, Internet service provider data logons.”(GO)
“Cell site evidence, is a bit different because that’s still a bit grey.”(NC)
“There’s been a general attitude… that you know, computers are infallible and the digital records are perfect.”(JK)
“All of a sudden people are getting labelled paedophiles and all that kind of stuff when actually they’ve done nothing wrong.”(NC)
3.3. Theme Three: Strategic Use of DE in Investigative Interviews with Suspects
“All upskirt images I found were found on each device because they’re all communicating with each other, I attributed the digital device to him. So I went and done a request to his network provider who said this phone belongs to himself. I’ve got the longitude and latitude and found the exact locations where it was all happening… these images weren’t downloaded and were taken from the device, which is very key.”(DB)
“Really important that you present it to the suspect in a way that they understand it… to be honest with you, I would struggle to explain a lot of it.”(GO)
“With drug dealing, messages are important. We would usually have a printout of a series of messages and say to the suspects, ‘These are the messages that we believe that you have sent’.”(BL)
“Evidence would be used, more often than not, towards the end of an interview with a suspect in in order to challenge their accounts.”(GO)
“I give them the opportunity to account for their actions. I will then bring out that that CCTV because it’s my time to then trip them up.”(TS)
“Some seasoned criminals are emotionless, but others panic, sweat… and start a sequence of mistruths.”(BL)
“[If] the attribution is quite strong… they will go ‘no comment’. ‘No comment’ because there’s nothing they can say. Or they will start talking.”(NC)
“It’s a relief for them… they just bare all to us… they become quite emotional and you end up feeling sorry for them. They’re our biggest risks, more likely to harm themselves, the suicide rate is quite high in those cases.”(IP)
Subtheme: Digital Devices and DE in Victim-Centred Interviews
“The VRI is the substantial piece of evidence… children will point to places which is important because that’s captured on the video…”(TS)
“Usefulness of that can’t be overstated, especially when dealing with vulnerable victims that don’t like putting pen to paper.”(BL)
“He punched me on my head like this… you can see the amount of force… you can see the bruise as well.”(TS)
“It’s not uncommon for a victim to photograph their injuries or for an abuser to film their abuse and send it to them.”(BL)
“We’ll guide them on extracting Facebook or Apple archives.”(NC)
“We give safeguarding advice, like securing routers, changing passwords, locking down Alexa devices, preventing abusers from controlling smart homes.”(WS)
“Sometimes we’ll just ask victims to screenshot messages and email them, rather than seizing the phone… unless it’s a serious offense.”(BL)
“We have to bear in mind human rights and interrogation of devices and collateral intrusion.”(GO)
“We remind victims we’re here to support them, represent them, and help them achieve closure.”(BL)
“We’ll sit down with victims… and explain things in a way they understand… so they feel confident and safe.”(SK)
3.4. Theme Four: DE in the Courtroom
“Defence barristers don’t understand how difficult it is to crack a phone.”(MS)
“Digital evidence is particularly vulnerable because the judiciary often don’t understand it either… There’s no real check and balance… Most digital evidence that is accepted, it’s not really challenged.”(NC)
“Especially with the cell site evidence… juries don’t get it. You can see people’s eyes just glazing over.”(SK)
“The defense don’t argue about the evidence that you’ve got. What they argue about is your processes in relation to recovering that evidence.”(RP)
“More often it doesn’t get investigated, because they haven’t got the time and the resource to be able to do it.”(RP)
“I would be lying to say if even if I went to work for the defence at the minute, I will probably get quite a bit of digital evidence kicked out of court just by asking four or five little questions that would undermine the data in its entirety.”(NC)
“One court might hear a defence expert challenge GPS data, another court might see it upheld. You know, in the next, in the next courtroom, they might be supporting it, but it depends which side on the fence they sit upon.”(JK)
“I’ve done it many times and to this day I still get like a slight anxiety attack before I go.”(DB)
4. Discussion
4.1. Sense-Making and Handling of Digital Devices and DE in Investigations
4.2. The Interpretation and Reliability of DE
4.3. Use of DE in Investigative Interviews with Suspects and Victims
4.4. Challenges of DE in the Courtroom
5. Future Directions
6. Limitations
7. Conclusions
Supplementary Materials
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
| DE | Digital evidence |
| DMI | Digital media investigators |
| DFI | Digital forensic investigators |
Appendix A
Main Author’s Reflexive Statement
References
- Association of Chief Police Officers. (2012). Good practice guide for digital evidence (5th ed.). Association of Chief Police Officers. Available online: https://www.digital-detective.net/digital-forensics-documents/ACPO_Good_Practice_Guide_for_Digital_Evidence_v5.pdf (accessed on 7 October 2025).
- Braun, V., Clarke, V., Hayfield, N., Davey, L., & Jenkinson, E. (2023). Doing reflexive thematic analysis. In Supporting research in counselling and psychotherapy: Qualitative, quantitative, and mixed methods research (pp. 19–38). Springer International Publishing. [Google Scholar]
- Brookman, F., & Jones, H. (2022). Capturing killers: The construction of CCTV evidence during homicide investigations. Policing and Society, 32(2), 125–144. [Google Scholar] [CrossRef]
- Brookman, F., Jones, H., Williams, R., & Fraser, J. (2020). Dead reckoning: Unraveling how “homicide” cases travel from crime scene to court using qualitative research methods. Homicide Studies, 24(3), 283–306. [Google Scholar] [CrossRef]
- Bull, R., & Blandón-Gitlin, I. (Eds.). (2019). The Routledge international handbook of legal and investigative psychology. Routledge. [Google Scholar]
- Bull, R., & Milne, B. (2020). Recommendations for collecting event memory evidence. In Memory and sexual misconduct (pp. 198–222). Routledge. [Google Scholar]
- Buscariolli, A. (2023). Making crime visible in the digital age: The ethnomethods of data policing. Critical Criminology, 31(2), 545–562. [Google Scholar] [CrossRef]
- Byrne, D. (2022). A worked example of Braun and Clarke’s approach to reflexive thematic analysis. Quality & Quantity, 56(3), 1391–1412. [Google Scholar] [CrossRef]
- Casey, E. (2019). Digital evidence and computer crime: Forensic science, computers, and the internet (4th ed.). Academic Press. [Google Scholar]
- Chesney, B., & Citron, D. (2019). Deep fakes: A looming challenge for privacy, democracy, and national security. California Law Review, 107, 1753. [Google Scholar] [CrossRef]
- Clemens, F., Granhag, P. A., Strömwall, L. A., Vrij, A., Landström, S., Hjelmsäter, E. R. A., & Hartwig, M. (2010). Skulking around the dinosaur: Eliciting cues to children’s deception via strategic disclosure of evidence. Applied Cognitive Psychology, 24(7), 925–940. [Google Scholar] [CrossRef]
- College of Policing. (2022, December 1). Telematics: Five things you need to know. College of Policing. Available online: https://www.college.police.uk/article/telematics-five-things-you-need-know (accessed on 1 October 2025).
- Dando, C. (2020). Eyewitness retrieval and police questioning techniques. In Forgetting: Explaining memory failure (p. 53). Sage Publications. [Google Scholar]
- Digital Policing Portfolio. (n.d.). Written evidence submitted by the Digital Policing Portfolio (PFF0040): Policing for the future—Changing demands and new challenges [Written evidence to the Home Affairs Committee inquiry]. UK Parliament Committees. Available online: https://committees.parliament.uk/writtenevidence/77934/pdf/ (accessed on 1 October 2025).
- Dror, I. E. (2025). Biased and biasing: The hidden bias cascade and bias snowball effects. Behavioral Sciences, 15(4), 490. [Google Scholar] [CrossRef] [PubMed]
- Elzinga, A. (1997). The science-society contract in historical transformation: With special reference to “epistemic drift”. Social Science Information, 36(3), 411–445. [Google Scholar] [CrossRef]
- Frisby, W., Moench, B., Recht, B., & Ristenpart, T. (2012). Security analysis of smartphone point-of-sale systems, Bellevue, WA, USA, 6–7 August 2012 [Conference paper] (pp. 22–33). WOOT. [Google Scholar]
- Garrett, B. L., & Rudin, C. (2024). Glass box artificial intelligence in criminal justice. Cornell Law Review, 109(5), 1083–1138. [Google Scholar] [CrossRef]
- Gordon Smith, H. (2018). Interviewing sexual offence suspects: The impact of organisational, professional and personal factors on eliciting information. Available online: https://www.n8prp.org.uk/2018/11/28/interviewing-sexual-offence-suspects-the-impact-of-organisational-professional-and-personal-factors-on-eliciting-information/ (accessed on 7 October 2025).
- GovNet. (2025, August 13). Digital investigations in the modern era. GovNet Justice. Available online: https://blog.govnet.co.uk/justice/digital-investigations-in-the-modern-era?hs_preview=EFEVpmlh-192718528101 (accessed on 1 October 2025).
- Grassi, P. A., Newton, E. M., Fenton, J. L., Perlner, R. A., Regenscheid, A. R., Burr, W. E., Richer, J. P., Lefkovitz, N. B., Danker, J. M., Choong, Y.-Y., Greene, K. K., & Theofanos, M. F. (2017). Digital identity guidelines: Authentication and lifecycle management (NIST special publication 800-63B). Updates as of 03/02/2020. National Institute of Standards and Technology.
- Hartwig, M., Granhag, P. A., Strömwall, L. A., & Vrij, A. (2005). Detecting deception via strategic disclosure of evidence. Law and Human Behavior, 29(4), 469–484. [Google Scholar] [CrossRef] [PubMed]
- Henry, P. (2009, September 12). Best practices in digital evidence collection. SANS. Available online: https://www.sans.org/blog/best-practices-in-digital-evidence-collection/ (accessed on 20 September 2025).
- Her Majesty’s Inspectorate of Constabulary and Fire & Rescue Services. (2022). How well the police and other agencies use digital forensics in their investigations. HMICFRS. Available online: https://hmicfrs.justiceinspectorates.gov.uk/publication-html/how-well-the-police-and-other-agencies-use-digital-forensics-in-their-investigations/ (accessed on 20 September 2025).
- Hernandez, M. (2025). Third-party application burner phone analysis [Master’s thesis, University of Central Oklahoma]. [Google Scholar]
- Holmes, J. (2024). Investigative interviewing on homicide investigations. In C. Allsop, & S. Pike (Eds.), The Routledge international handbook of homicide investigation (pp. 185–199). Routledge. [Google Scholar]
- Holt, T. J., Clevenger, S., & Navarro, J. (2020). Exploring digital evidence recognition among officers and troopers in a sample of a state police force. Policing: An International Journal, 43(1), 91–103. [Google Scholar]
- Information Commissioner’s Office. (n.d.). Excessive data collection by police and Edessa work. ICO. Available online: https://ico.org.uk/for-the-public/ico-40/excessive-data-collection-by-police-and-edessa-work/ (accessed on 20 September 2025).
- Innes, M., Brookman, F., & Jones, H. (2021). “Mosaicking”: Cross construction, sense-making and methods of police investigation. Policing: An International Journal, 44(4), 708–721. [Google Scholar]
- Järvilehto, L., Sun, Y., Korkman, J., Pakkanen, T., Shen, C., Bader, F. M., & Santtila, P. (2025). Pre-interview hypothesis generation: Large language models (LLMs) show promise for child abuse investigations. Psychology, Crime & Law, 1–32. [Google Scholar] [CrossRef]
- Jones, H., & Brookman, F. (2024a). Backstage at the barristers’ case conference: A dramaturgical analysis. Journal of Contemporary Ethnography, 53(1), 3–30. [Google Scholar] [CrossRef]
- Jones, H., & Brookman, F. (2024b). Risky calls: Understanding the challenges and risks of using mobile phone data during homicide investigations. Policing and Society, 34(10), 1091–1107. [Google Scholar] [CrossRef]
- Jones, H., Brookman, F., Williams, R., & Fraser, J. (2021). We need to talk about dialogue: Accomplishing collaborative sensemaking in homicide investigations. The Police Journal, 94(4), 572–589. [Google Scholar] [CrossRef]
- Kang, S., Kim, S., & Kim, J. (2020). Forensic analysis for IoT fitness trackers and its application. Peer-to-Peer Networking and Applications, 13(2), 564–573. [Google Scholar] [CrossRef]
- Kassin, S. M., & Gudjonsson, G. H. (2004). The psychology of confessions: A review of the literature and issues. Psychological Science in the Public Interest, 5(2), 33–67. [Google Scholar] [CrossRef] [PubMed]
- Klein, G. A., & Calderwood, R. (1996). Investigations of naturalistic decision making and the recognition-primed decision model (No. ARIRN9643). Defense Technical Information Center.
- Krueger, C., & McKeown, S. (2020, June 15–19). Using Amazon Alexa APIs as a source of digital evidence [Conference paper]. 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security) (pp. 1–8), Dublin, Ireland. [Google Scholar]
- Lennox-Steele, A., & Nisbet, A. (2016). A forensic examination of several mobile device Faraday bags & materials to test their effectiveness. In The proceedings of 14th Australian digital forensics conference, 5–6 December 2016, Edith Cowan University, Perth, Australia. Security Research Institute, Edith Cowan University. [Google Scholar]
- Maxwell, V. M. (2023). Digital evidence. In Investigating animal abuse crime scenes (pp. 159–165). CRC Press. [Google Scholar]
- McCartney, C., Allsop, C., & Pike, S. (2024). Homicide investigation and miscarriages of justice. In C. Allsop, & S. Pike (Eds.), The Routledge international handbook of homicide investigation (pp. 353–366). Routledge. [Google Scholar]
- Ministry of Justice. (2023). Achieving best evidence in criminal proceedings: Guidance on interviewing victims and witnesses, and guidance on using special measures. Ministry of Justice. Available online: https://www.gov.uk/government/publications/achieving-best-evidence-in-criminal-proceedings (accessed on 3 October 2025).
- Moston, S., & Engelberg, T. (2011). The effects of evidence on the outcome of interviews with criminal suspects. Police Practice & Research: An International Journal, 12(6), 518–526. [Google Scholar] [CrossRef]
- National Police Chiefs’ Council. (2020). National digital forensic science strategy. Available online: https://www.npcc.police.uk/SysSiteAssets/media/downloads/publications/publications-log/2020/national-digital-forensic-science-strategy.pdf (accessed on 20 April 2025).
- National Police Chiefs’ Council. (2024, August 22). Operation Soteria is a game changer for policing. NPCC. Available online: https://news.npcc.police.uk/releases/operation-soteria-is-a-game-changer-for-policing (accessed on 20 April 2025).
- Ng, M., James, J., & Bull, R. (2024). “What you say in the lab, stays in the lab”: A reflexive thematic analysis of current challenges and future directions of digital forensic investigations in the UK. Forensic Science International: Digital Investigation, 51, 301839. [Google Scholar] [CrossRef]
- Oleszkiewicz, S., & Watson, S. J. (2021). A meta-analytic review of the timing for disclosing evidence when interviewing suspects. Applied Cognitive Psychology, 35(2), 342–359. [Google Scholar] [CrossRef]
- Police Digital Service. (n.d.). Police Digital Service supports digital skills academy for forces. Police Digital Service. Available online: https://pds.police.uk/press-release-police-digital-service-supports-digital-skills-academy-for-forces/ (accessed on 1 September 2025).
- Polman, S., Luther, K., de Almeida, H., Eggers, J., & Watson, S. J. (2024). Examining the effects of evidence disclosure timing and strength on information inconsistencies and provision within investigative interviews. Psychology, Crime & Law. advance online publication. [Google Scholar]
- Santtila, P., Sun, Y., Kask, K., Järvilehto, L., & Xiu, J. (2025). Large language models’ knowledge of children’s memory and suggestibility: Evaluating model predictions of prior experimental results. Acta Psychologica, 258, 105270. [Google Scholar] [CrossRef] [PubMed]
- Shawyer, A., Milne, B., & Bull, R. (2009). Investigative interviewing in the UK. In T. Williamson, B. Milne, & S. Savage (Eds.), International developments in investigative interviewing (pp. 24–38). Routledge. [Google Scholar]
- Simon, H. A. (1972). Theories of bounded rationality. In Decision and organization (Vol. 1, pp. 161–176). North-Holland Publishing Company. [Google Scholar]
- Smith, L., & Bull, R. (2012). Identifying and measuring juror pre-trial bias for forensic evidence: Development and validation of the forensic evidence evaluation bias scale. Psychology, Crime & Law, 18(9), 797–815. [Google Scholar] [CrossRef]
- Sun, Y., Pang, H., Järvilehto, L., Zhang, O., Shapiro, D., Korkman, J., Haginoya, S., & Santtila, P. (2025). Comparing the performance of a large language model and naive human interviewers in interviewing children about a witnessed mock-event. PLoS ONE, 20(2), e0316317. [Google Scholar] [CrossRef]
- Tekin, S., Granhag, P. A., Strömwall, L., Giolla, E. M., Vrij, A., & Hartwig, M. (2015). Interviewing strategically to elicit admissions from guilty suspects. Law and Human Behavior, 39(3), 244–252. [Google Scholar] [CrossRef]
- Tudor-Owen, S., Bull, R., Hatcher, R., & Milne, R. (2023). Interviewing vulnerable suspects: Safeguarding the process. Routledge. [Google Scholar]
- United Nations Office on Drugs and Crime. (n.d.). Handling of digital evidence. United Nations. Available online: https://sherloc.unodc.org/cld/ar/education/tertiary/cybercrime/module-6/key-issues/handling-of-digital-evidence.html (accessed on 1 September 2025).
- van Hulst, M., & Tsoukas, H. (2023). Understanding extended narrative sensemaking: How police officers accomplish story work. Organization, 30(4), 730–753. [Google Scholar] [CrossRef]
- Vaughan, A., Renshaw, L., Jones, D., & Milne, R. (2024). Supporting a vulnerable suspect with appropriate adults in high-stakes crime investigations managed by an interview manager. Investigative Interviewing: Research and Practice, 14(1), 1–18. [Google Scholar]
- Vrij, A., Granhag, P. A., Mann, S., & Leal, S. (2011). Outsmarting the liars: Toward a cognitive lie detection approach. Current Directions in Psychological Science, 20(1), 28–32. [Google Scholar] [CrossRef]
- Wagstaff, I. R., & LaPorte, G. (2018). The importance of diversity and inclusion in the forensic sciences. NIJ Journal, 279, 81–91. [Google Scholar]
- Weick, K. E. (1995). What theory is not, theorizing is. Administrative Science Quarterly, 40(3), 385–390. [Google Scholar] [CrossRef]
- Wells, G. L., & Loftus, E. F. (2003). Eyewitness memory for people and events. In Handbook of psychology: Forensic psychology (Vol. 11, pp. 149–160). John Wiley & Sons, Inc. [Google Scholar]
- Wilson-Kovacs, D. (2021). Digital media investigators: Challenges and opportunities in the use of digital forensics in police investigations in England and Wales. Policing: An International Journal, 44(4), 669–682. [Google Scholar]
- Wilson-Kovacs, D., Helm, R., Growns, B., & Redfern, L. (2023). Digital evidence in defence practice: Prevalence, challenges and expertise. The International Journal of Evidence & Proof, 27(3), 235–253. [Google Scholar] [CrossRef]
- Yin, J., Li, J., Wang, X., Li, Y., Lin, Z., Liu, Y., He, J., Li, K., Chen, J., & Xu, K. (2025). Digital forensics in the age of large language models. arXiv, arXiv:2504.02963. [Google Scholar] [CrossRef]
- Zhang, K. A., Cuesta-Infante, A., Xu, L., & Veeramachaneni, K. (2019). SteganoGAN: High capacity image steganography with GANs. arXiv, arXiv:1901.03892. [Google Scholar] [CrossRef]

| Characteristic | Digital Evidence | Traditional Evidence |
|---|---|---|
| Nature | Intangible (binary form and stored electronically) | Tangible |
| Volatility | High, easily lost/altered | Low, physically persistent |
| Mobility | High, easily transferred | Low, fixed location |
| Data types | Varied (e.g., text messages, GPS, logs) | Physical (e.g., fingerprints, fibres) |
| Storage medium | Devices, cloud | Physical containers, bags |
| Presence of metadata | Often includes metadata—information about how, when, and by whom a file was created or modified | Does not usually come with metadata |
| Replicability | Can be duplicated exactly without degradation | Cannot be exactly duplicated |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Ng, M.; Medhurst, R.; Dando, C.J.; Bull, R. “A Ronin Without a Master”: Exploring Police Perspectives on Digital Evidence in England and Wales. Behav. Sci. 2025, 15, 1416. https://doi.org/10.3390/bs15101416
Ng M, Medhurst R, Dando CJ, Bull R. “A Ronin Without a Master”: Exploring Police Perspectives on Digital Evidence in England and Wales. Behavioral Sciences. 2025; 15(10):1416. https://doi.org/10.3390/bs15101416
Chicago/Turabian StyleNg, Magdalene, Rachael Medhurst, Coral J. Dando, and Ray Bull. 2025. "“A Ronin Without a Master”: Exploring Police Perspectives on Digital Evidence in England and Wales" Behavioral Sciences 15, no. 10: 1416. https://doi.org/10.3390/bs15101416
APA StyleNg, M., Medhurst, R., Dando, C. J., & Bull, R. (2025). “A Ronin Without a Master”: Exploring Police Perspectives on Digital Evidence in England and Wales. Behavioral Sciences, 15(10), 1416. https://doi.org/10.3390/bs15101416

