Electronic Crime Scene Investigation: An On-the-Scene Reference for Police/Law Enforcement/First Responders – 2023

Electronic Crime Scene Investigation: An On-the-Scene Reference for First Responders

By U.S. Department of Justice – Office of Justice Programs

Law Enforcement Support – Provided by the SCARS Institute

Article Abstract

The “Electronic Crime Scene Investigation: An On-the-Scene Reference for First Responders” by the U.S. Department of Justice is a guide updated in 2023 to assist first responders in properly identifying, collecting, preserving, and analyzing digital evidence at crime scenes. Published by the National Institute of Justice, it emphasizes the importance of maintaining the integrity of both the physical device and the data stored within.

The guide covers various types of electronic devices and outlines best practices for evidence handling, including documenting the scene, securing evidence, and recognizing potential sources of digital information. First responders are instructed to follow proper legal protocols to ensure that evidence remains admissible in court, with special attention given to the risks of improper shutdown or handling, which could alter or destroy critical information.

This guide is a vital tool for law enforcement and helps bridge the gap between traditional crime scene investigation and the digital landscape.

Electronic Crime Scene Investigation: An On-the-Scene Reference for First Responders – 2023
Electronic Crime Scene Investigation: An On-the-Scene Reference for Police/Law Enforcement/First Responders - 2023 - on SCARS Institute Encyclopedia of Scams

Electronic Crime Scene Investigation: An On-the-Scene Reference for First Responders

By U.S. Department of Justice – Office of Justice Programs – Published 2001-Updated November 2023

[edited for this format]

The flipbook was updated by the Electronic Crime Partnership Initiative (ECPI), a program established by the National Institute of Justice to build the capacity of state and local law enforcement to prevent, investigate and prosecute electronic crime and identify, collect, preserve and examine digital evidence.

This publication does not create, is not intended to create, and may not be relied upon to create any rights, substantive or procedural, enforceable as law by any party in any matter civil or criminal. Opinions or points of view expressed in this document represent a consensus of ECPI members and do not necessarily represent the official position or policies of the U.S. Department of Justice.

The National Institute of Justice is a component of the Office of Justice Programs, which also includes the Bureau of Assistance; the Bureau of Justice Statistics; the Community Capacity Development Office; the Office for Victims of Crime; the Office of Juvenile

Justice and Delinquency Prevention; and the Office of Sex Offender Sentencing, Monitoring, Apprehending, Registering, and Tracking (SMART).

Introduction

This flipbook is intended as a quick reference for first responders who may be responsible for identifying, preserving, collecting and securing evidence at an electronic crime scene. It is a companion piece to Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition, from which it is excerpted.

Use this flipbook only after you have reviewed and familiarized yourself with the contents of Electronic Crime Scene Investigation, which is available for free download at http://www.ojp.usdoj.gov/nij/pubs-sum/219941.htm [not available to the public]

Consider agency protocols; federal, state and local laws; and prevailing technology when applying the information in this flipbook.

Electronic Devices: Types, Description and Potential Evidence

Computer Systems

    • Laptops
    • Desktop systems
    • Tower computers
    • Rack-mounted systems
    • Minicomputers
    • Mainframe systems

A computer system’s hardware is likely to include:

    • A case containing circuit boards, microprocessors, hard drive, memory and interface connections.
    • A monitor or video display
    • A keyboard and
    • Peripheral devices such as external hard drives, modems, printers, scanners, routers and docking stations.

Storage Devices

    • Hard drives (whether loose or connected to the system).
    • External hard drives (generally require a power supply and a connection to the computer system).
    • Removable media, g., cartridges or disk-based data storage devices.
    • Thumb or flash drives: Small, lightweight, removable data storage devices with USB connections. Can be found as part of, or disguised as, any number of common or unique devices, e.g., wristwatch or Swiss Army Knife.
    • Memory cards: Small data storage devices commonly used with digital cameras, computers, mobile phones, digital music players, personal digital assistants (PDAs) and video game consoles.

Handheld Devices

    • PDAs
    • Digital multimedia devices
    • Pagers
    • Digital cameras
    • Global positioning satellite (GPS) receivers
    • Mobile and smartphones

Peripheral Devices

Equipment that can be attached or connected to a computer.

    • Modems
    • Routers
    • Printers
    • Scanners
    • Docking stations

Computer Networks

    • Two or more computer systems linked by data cables or by wireless connections to enable them to share resources and data.
    • Often include printers and data-routing devices such as hubs, switches and routers.

Sources of Potential Digital Evidence in Electronic Devices

    • The device and its
    • The function(s) it performs or
    • Software, documents, photos, image files, e-mail and attachments, databases, financial information, Internet browsing history, chat logs, buddy lists and event logs.
    • Information stored on the device regarding its use, e.g., incoming and outgoing phone and fax numbers and recently scanned, faxed or printed documents.
    • Identifying information associated with the computer system, e.g., Internet protocol (IP) and local area network (LAN) addresses, broadcast settings, and media access card (MAC) or network interface card (NIC) addresses.

Electronic devices also may hold latent evidence such as fingerprints, DNA or other physical evidence that should be preserved.

See below for other potential sources of evidence.

Securing and Evaluating the Scene

Document, photograph, and secure digital evidence at the scene as soon as possible.

When securing and evaluating the scene:

    • Do not alter the state of an electronic If a computer or an electronic device is off, leave it off.
    • Remove all unauthorized persons from the area where evidence is to be collected.
    • Identify, seize and secure all electronic devices, including personal or portable devices.
    • Recognize potential digital evidence in telephones, digital video recorders, other household appliances and motor vehicles.

If the computer is on or the power state cannot be determined:

    • Look and listen for indications that the computer is on — e.g., fans running, drives spinning and lit light-emitting diodes (LEDs).
    • If you cannot determine the power state of the computer, observe the monitor to determine if it is on, off or in sleep mode.
    • Check display screen for signs of data
    • Look out for words such as “delete,” “format,” “remove,” “copy,” “move,” “cut” or “wipe.”
    • Look for indications that the computer is being accessed remotely and/or signs of ongoing communications with other computers or users — e.g., Instant Messaging (IM) windows or chat rooms.
    • Take note of all cameras and determine whether they are active.

Preliminary Interviews

Separate and identify all adults of interest and record the location they occupied when you entered the scene. Obtain the following information from interviewee(s):

  • Purpose of computers and
  • All users of the computers and
  • Type of Internet access and Internet service
  • Computer and Internet user information — g., login names, user account names and passwords, and Instant Message screen names.
  • E-mail and Web mail (Web-based e-mail) accounts and personal Web
  • Account information for online social networking Web sites — g., MySpace, Facebook.
  • All security provisions, data access restrictions, destructive devices or software in use.
  • Any automated applications in
  • Any other relevant

Documenting the Scene

Your documentation should include:

  • The type, location, position, condition and power status of the device.
  • A record of all activity and processes visible on the display screen(s).
  • A record of all physical connections to and from the computers and other devices.
  • A record of any network and wireless components capable of linking devices to each other and the Internet.
  • The type, condition and power status of the device’s Internet and network access.
  • Video, photos, notes and sketches to assist in recreating/conveying the details of the scene.

Some computer systems and electronic devices — and the information they contain — may be protected under applicable laws, agency policies or other

factors, that may prohibit collection of these devices or components. However, do include the location, condition and power state of these devices in your documentation.

Movement of a running computer or electronic device may cause changes or damage to the computer or device or the digital evidence it contains. Computers and electronic devices should not be moved until it is determined that they are powered off.

Evidence Collection

Handling digital evidence correctly is essential to preserving the integrity of the physical device as well as the information or data it contains. Turning off the power to a computer or other electronic device may cause the information or data stored on it to be damaged or lost.

If you are not trained in handling digital evidence —

  • Do not attempt to explore the contents of a computer or other electronic device or to recover information from it.
  • Do not alter the state of a computer or other electronic device.
  • Do not press any keys or click the
  • If the computer or device is off, leave it
  • Do not move a computer or other electronic device that is powered on.
  • Do not accept offers of help or technical assistance from unauthorized
  • DO request technical assistance from personnel with advanced equipment and training in digital evidence collection. See http://www.ecpi-us.org/Technicalresources.html for a list of available resources.

Assess the Situation

Before seizing digital evidence, make sure you have the legal authority to do so. Improper access to information or data stored on electronic devices may violate provisions of federal laws.

After securing the scene and identifying the computer’s power status, follow the steps listed below for the situation most like your own.

Situation 1: Monitor is on. Program, application, work product, picture, e-mail or Internet site is displayed.

    1. Photograph screen and record information
    2. Proceed to “If the Computer Is ON”.

Situation 2: Monitor is on. Screen saver or picture is visible.

    1. Move mouse slightly without depressing buttons or rotating wheel if present.
    2. Note any onscreen activity that causes a change in the display.
    3. Photograph screen and record information.
    4. Proceed to “If the Computer Is ON”.

Situation 3: Monitor is on. Display is blank.

    1. Move mouse slightly without depressing buttons or rotating wheel if present.
    2. Display changes to login screen, work product, or other visible display.
    3. Note change in display.
    4. Photograph screen and record information
    5. Proceed to “If the Computer Is ON”.

Situation 4a: Monitor is off. Display is blank.

    1. If monitor’s power switch is in off position, turn monitor on.
    2. Display changes to a login screen, work product or other visible display.
    3. Note change in the display.
    4. Photograph screen and record information
    5. Proceed to “If the Computer Is ON”.

Situation 4b: Monitor is off. Display is blank.

    1. If monitor’s power switch is in off position, turn monitor on.
    2. Display does not change. Screen remains blank.
    3. Note that the display does not change.
    4. Photograph blank screen.
    5. Proceed to “If the Computer Is OFF”.

Situation 5: Monitor is on. Display is blank.

    1. Move mouse slightly without depressing any buttons or rotating the wheel if present.
    2. If display does not change, confirm that power is supplied to the monitor.
    3. If display remains blank, check computer case for active lights and listen for fans spinning or other indications computer is on.
    4. If computer case gives no indication that it is powered on, proceed to “If the Computer Is OFF”

If the Computer Is OFF

For desktop, tower and minicomputers follow these steps:

      1. Document, photograph, and sketch all wires, cables, and devices connected to the computer.
      2. Uniquely label and photograph the power supply cord and all cables, wires or USB drives attached to the computer and the connection each of these occupies on the computer.
      3. Remove and secure the power supply cord from the back of the computer and from the wall outlet, power strip or battery backup device.
      4. Disconnect and secure all cables, wires and USB drives from the computer and document the device or equipment connected at the opposite end.
      5. Place tape over the floppy disk slot if present. En- sure that the CD or DVD drive trays are retracted into place and tape across the drive tray to prevent it from opening.
      6. Place tape over the power switch.
      7. Record the make, model, serial numbers and any user-applied markings or identifiers.
      8. Record or log computer and all cords, cables, wires, devices and components according to agency procedures.
      9. Carefully package all evidence collected to prevent damage or alteration during transportation and

For laptop computers follow these steps:

      1. Document, photograph and sketch all wires, cables and devices connected to the laptop.
      2. Uniquely label and photograph all wires, cables and devices connected to the laptop and the connection each occupies.
      3. Remove and secure the power supply and all batteries from the laptop computer.
      4. Disconnect and secure all cables, wires, and USB drives from the laptop and document the equipment or device connected at the opposite end.
      5. Place tape over the floppy disk slot if present. Ensure that the CD or DVD drive trays are retracted into place and tape across the drive tray to prevent it from opening.
      6. Place tape over the power switch.
      7. Record the make, model, serial numbers and any user-applied markings or identifiers.
      8. Record or log the laptop computer and all cords, cables, wires, devices and components according to agency procedures.
      9. Carefully package all evidence collected to prevent damage or alteration during transportation and

If the Computer Is ON

Removing the power supply is generally the safest option. If evidence of a crime is visible on the computer display, however, request assistance from personnel with experience in volatile data capture and preservation (see http://www.ecpi-us.org/Technicalresources.html [not available to the public]).

Immediate disconnection of power is recommended when —

      • Information or activity on screen indicates that information or data is being deleted or overwritten.
      • A destructive process appears to be in progress on the computer’s data storage device(s).
      • The system is powered on in a typical Microsoft Windows® Pulling the power supply cord from the back of the computer will preserve information about the last user account logged in, login time, most recently used documents, most recently used commands, and other valuable information.

Immediate disconnection of power is NOT recommended when —

      • Information or data of apparent evidentiary value is in plain view onscreen. Seek assistance from personnel with advanced training in digital evidence collection.
      • Indications exist that any of the following are active or in use: Chat room(s), text documents, remote data storage, Instant Messaging (IM), child pornography, contraband, financial documents, data encryption and obvious illegal activities.
      • The device is a mobile or smart Leave mobile and smart phones in the power state in which they were found.

Improper shutdown of mainframe computers, servers or a group of networked computers may result in the loss of data, loss of evidence and potential civil liability. Secure the scene and request assistance from personnel with advanced training in digital evidence collection of large or complex computer systems (see http://www.ecpi-us.org/Technicalresources.html [not available to the public]).

Packaging and Transporting Digital Evidence

Packaging Procedures

    • Ensure that all digital evidence collected is properly documented, labeled, marked, photographed, video recorded or sketched and inventoried. Properly label connections and connected devices to facilitate reassembly of the system later.
    • Protect any latent, trace or biological evidence contained on the digital evidence. Photograph digital evidence before conducting latent, trace or biological evidence processes on the evidence.
    • Pack all digital evidence in antistatic Plastic bags and containers can produce static electricity and allow the development of humidity and condensation that can damage or destroy digital evidence.
    • Package digital evidence in a manner that will prevent it from being bent, scratched or otherwise deformed. Label all containers
    • Leave phones in the power state in which they were found. Package phones in radio frequency-shielding material to prevent them from accessing communication signals.
    • Collect all power supplies and adapters for all electronic devices

Transportation Procedures

    • Keep digital evidence away from magnetic fields,

e.g., those produced by radio transmitters, car stereo speaker magnets, and magnetic mount emergency lights. Other transportation hazards include heated seats and any device or material that can produce static electricity, such as carpets.

    • Do not keep digital evidence in a vehicle for extended periods. Heat, cold and humidity can damage or destroy digital evidence.
    • Ensure that computers and electronic devices are packaged and secured during transportation to prevent damage from shock and vibration.
    • Document the transportation of the digital evidence and maintain the chain of custody.

Electronic Crime and Digital Evidence Considerations by Crime Category

Below are potential sources of digital evidence for different crimes. These lists are not exhaustive.

Child Abuse and/or Exploitation

    • Calendars and journals
    • Computer games
    • Digital photo software
    • Printed photographs
    • Printers and copiers
    • Scanners
    • Still cameras and media
    • Video cameras and tapes
    • Video games and consoles
    • Voice over Internet Protocol (VoIP) phones

Computer Intrusion

    • Antennas
    • Books and references on hacking
    • List of computers accessed
    • List of IP addresses
    • Network devices and components
    • Printed computer code
    • Wireless network equipment

Counterfeiting

    • Checks and money orders
    • Credit card information
    • Database printouts
    • Financial records
    • High-quality printers
    • Magnetic strip readers
    • Online banking software
    • Printed computer code
    • Reproductions of signatures
    • Scanners, copiers, laminators

Death Investigations

    • Credit card information
    • Financial records
    • Medical records
    • Online banking software
    • Personal writings and/or diaries
    • Recently printed material
    • Reproductions of signatures
    • Telephone records and/or telephone bills
    • Will-making software

Domestic Violence, Threats and Extortion

    • Caller ID records
    • Financial records
    • Legal documents
    • Personal writings and/or diaries
    • Protection orders
    • Telephone records/telephone bills

E-mail Threats, Harassment and/or Stalking

    • Caller ID records
    • Financial records
    • Legal documents
    • Maps, directions, GPS equipment
    • Personal Web sites
    • Personal writings and/or diaries
    • Telephone records

Gambling

    • Accounting software
    • Cash
    • Client lists
    • Database printouts
    • Electronic money transfers
    • Financial records
    • Forged documents
    • Lists of online gambling sites
    • References to odds and/or lines
    • Sports betting statistics

Identity Theft

    • Accounting software
    • Cash
    • Checks and money orders
    • Credit card information
    • Database printouts
    • Electronic money transfers
    • Financial records
    • Forged documents
    • High-quality printers
    • Mail in the victim’s name
    • Online banking software
    • Reproductions of signatures
    • Scanners, copiers, laminators
    • Web site transaction records

Narcotics

    • Cash
    • Countersurveillance equipment
    • Credit card information
    • Database printouts
    • Electronic money transfers
    • Fictitious identification
    • Financial records
    • Forged documents
    • GPS devices and maps
    • Online banking software
    • Photographs of drugs and accomplices
    • Police scanners
    • Unfilled prescriptions

Online Fraud and/or Economic Fraud

    • Accounting software
    • Cash
    • Checks and money orders
    • Credit card information
    • Database printouts
    • Electronic money transfers
    • Financial records
    • Forged documents
    • Online banking software
    • Reproductions of signatures

Prostitution

    • Appointment logs
    • Calendars and/or journals
    • Cash
    • Client lists
    • Credit card information
    • Database printouts
    • Electronic money transfers
    • Financial records
    • Forged documents
    • Lists of online escort sites
    • Medical records
    • Online banking software
    • Printed photos

Software Piracy

    • Cash
    • CD and DVD burners and labelers
    • Credit card information
    • Electronic money transfers
    • Financial records
    • Forged documents
    • Software activation codes
    • Software duplication equipment

Telecommunication Fraud

    • Boot loader devices
    • Cash
    • Credit card information
    • Database printouts
    • Electronic money transfers
    • EPROM burner
    • Financial records
    • Forged documents
    • Online banking software
    • Phone cables
    • SIM card reader
    • Stolen phones

Terrorism (Homeland Security)

    • Cash
    • Credit card information
    • Database printouts
    • Electronic money transfers
    • Fictitious identification
    • Financial records
    • GPS equipment and/or maps
    • Phone cables
    • Stolen phones
    • VoIP phones

Other Potential Sources of Evidence

    • Answering machines
    • Audio recorders
    • Blank pads of paper with impressions from prior writings
    • Calendars
    • CDs and CD burners
    • Cell phones/smartphones
    • Computer processors (chips)
    • Computer-printed material
    • Contact lists
    • Copy machines
    • Cordless landline telephones
    • Digital cameras
    • DVDs and DVD burners
    • DVD/CD players
    • External data-storage devices
    • Fax machines
    • GPS equipment and accessories
    • Handwritten notes
    • Hard drive duplicators
    • Hardware and software manuals
    • Information on steganography
    • Internet activity records
    • Laptop power supplies and accessories
    • Microphones
    • MP-3 players, g., iPods
    • Multifunction machines (e.g., printer, scanner, copier, fax combos)
    • Pagers
    • Pieces of paper with possible passwords
    • Printed e-mails and notes
    • Printers
    • Records of chat sessions
    • Removable media
    • Scanners
    • Screen names and buddy lists
    • Smart cards
    • Software duplication equipment
    • Telephone caller ID units
    • User names and passwords
    • Video cassette recorders (VCRs) and VCR tapes
    • Web cameras
    • Wireless access points

Information to Document to Assist the Forensic Examination

  • Authorization to examine evidence
  • Case Summary
  • Investigation point of contact
  • Keyword lists
  • Passwords
  • Preliminary reports and documents
  • Suspect information and nicknames
  • Suspected criminal activity

Please Leave Us Your Comment
Also, tell us of any topics we might have missed.

Leave a Reply

Your comments help the SCARS Institute better understand all scam victim/survivor experiences and improve our services and processes. Thank you

Your email address will not be published. Required fields are marked *

Thank you for your comment. You may receive an email to follow up. We never share your data with marketers.

Recent Reader Comments

Important Information for New Scam Victims

If you are looking for local trauma counselors please visit counseling.AgainstScams.org or join SCARS for our counseling/therapy benefit: membership.AgainstScams.org

If you need to speak with someone now, you can dial 988 or find phone numbers for crisis hotlines all around the world here: www.opencounseling.com/suicide-hotlines

SCARS Resources:

Other Cyber Resources

-/ 30 /-

What do you think about this?
Please share your thoughts in a comment below!

Legal Disclaimer:

The content provided on this platform regarding psychological topics is intended solely for educational and entertainment purposes. The publisher makes no representations or warranties regarding the accuracy or completeness of the information presented. The content is designed to raise awareness about various psychological subjects, and readers are strongly encouraged to conduct their own research and verify information independently.

The information presented does not constitute professional advice, diagnosis, or treatment of any psychological disorder or disease. It is not a substitute for professional medical or mental health advice, diagnosis, or treatment. Readers are advised to seek the guidance of a licensed medical professional for any questions or concerns related to their mental health.

The publisher disclaims any responsibility for actions taken or not taken based on the content provided. The treatment of psychological issues is a serious matter, and readers should consult with qualified professionals to address their specific circumstances. The content on this platform is not intended to create, and receipt of it does not constitute, a therapist-client relationship.

Interpretation and Definitions

Definitions

For the purposes of this Disclaimer:

  • Company (referred to as either “the Company”, “We”, “Us” or “Our” in this Disclaimer) refers to Society of Citizens Against Relationship Scams Inc. (registered d.b.a. “SCARS”,) 9561 Fountainbleau Blvd., Suit 602, Miami FL 33172.
  • Service refers to the Website.
  • You means the individual accessing this website, or the company, or other legal entity on behalf of which such individual is accessing or using the Service, as applicable.
  • Website refers to RomanceScamsNOW.com, accessible from https://romancescamsnow.com

Website Disclaimer

The information contained on this website is for general information purposes only.

The Company assumes no responsibility for errors or omissions in the contents of the Service.

In no event shall the Company be liable for any special, direct, indirect, consequential, or incidental damages or any damages whatsoever, whether in an action of contract, negligence or other tort, arising out of or in connection with the use of the Service or the contents of the Service. The Company reserves the right to make additions, deletions, or modifications to the contents on the Service at any time without prior notice.

The Company does not warrant this website in any way.

External Links Disclaimer

This website may contain links to external websites that are not provided or maintained by or in any way affiliated with the Company.

Please note that the Company does not guarantee the accuracy, relevance, timeliness, or completeness of any information on these external websites.

Errors and Omissions Disclaimer

The information given by SCARS is for general guidance on matters of interest only. Even if the Company takes every precaution to ensure that the content of this website is both current and accurate, errors can occur. Plus, given the changing nature of laws, rules, and regulations, there may be delays, omissions, or inaccuracies in the information contained on this website.

SCARS is not responsible for any errors or omissions, or for the results obtained from the use of this information.

Fair Use Disclaimer

SCARS may use copyrighted material that has not always been specifically authorized by the copyright owner. The Company is making such material available for criticism, comment, news reporting, teaching, scholarship, or research.

The Company believes this constitutes a “fair use” of any such copyrighted material as provided for in section 107 of the United States Copyright law.

If You wish to use copyrighted material from this website for your own purposes that go beyond fair use, You must obtain permission from the copyright owner.

Views Expressed Disclaimer

The Service may contain views and opinions which are those of the authors and do not necessarily reflect the official policy or position of any other author, agency, organization, employer, or company, including SCARS.

Comments published by users are their sole responsibility and the users will take full responsibility, liability, and blame for any libel or litigation that results from something written in or as a direct result of something written in a comment. The Company is not liable for any comment published by users and reserves the right to delete any comment for any reason whatsoever.

No Responsibility Disclaimer

The information on the Service is provided with the understanding that the Company is not herein engaged in rendering legal, accounting, tax, medical or mental health, or other professional advice and services. As such, it should not be used as a substitute for consultation with professional accounting, tax, legal, medical or mental health, or other competent advisers.

In no event shall the Company, its team, board of directors, volunteers, or its suppliers be liable for any special, incidental, indirect, or consequential damages whatsoever arising out of or in connection with your access or use or inability to access or use the Service.

“Use at Your Own Risk” Disclaimer

All information on this website is provided “as is”, with no guarantee of completeness, accuracy, timeliness or of the results obtained from the use of this information, and without warranty of any kind, express or implied, including, but not limited to warranties of performance, merchantability, and fitness for a particular purpose.

SCARS will not be liable to You or anyone else for any decision made or action taken in reliance on the information given by the Service or for any consequential, special, or similar damages, even if advised of the possibility of such damages.

Contact Us

If you have any questions about this Disclaimer, You can contact Us:

  • By email: contact@AgainstScams.org

PLEASE NOTE: Psychology Clarification

The following specific modalities within the practice of psychology are restricted to psychologists appropriately trained in the use of such modalities:

  • Diagnosis: The diagnosis of mental, emotional, or brain disorders and related behaviors.
  • Psychoanalysis: Psychoanalysis is a type of therapy that focuses on helping individuals to understand and resolve unconscious conflicts.
  • Hypnosis: Hypnosis is a state of trance in which individuals are more susceptible to suggestion. It can be used to treat a variety of conditions, including anxiety, depression, and pain.
  • Biofeedback: Biofeedback is a type of therapy that teaches individuals to control their bodily functions, such as heart rate and blood pressure. It can be used to treat a variety of conditions, including stress, anxiety, and pain.
  • Behavioral analysis: Behavioral analysis is a type of therapy that focuses on changing individuals’ behaviors. It is often used to treat conditions such as autism and ADHD.
    Neuropsychology: Neuropsychology is a type of psychology that focuses on the relationship between the brain and behavior. It is often used to assess and treat cognitive impairments caused by brain injuries or diseases.

SCARS and the members of the SCARS Team do not engage in any of the above modalities in relationship to scam victims. SCARS is not a mental healthcare provider and recognizes the importance of professionalism and separation between its work and that of the licensed practice of psychology.

SCARS is an educational provider of generalized self-help information that individuals can use for their own benefit to achieve their own goals related to emotional trauma. SCARS recommends that all scam victims see professional counselors or therapists to help them determine the suitability of any specific information or practices that may help them.

SCARS cannot diagnose or treat any individuals, nor can it state the effectiveness of any educational information that it may provide, regardless of its experience in interacting with traumatized scam victims over time. All information that SCARS provides is purely for general educational purposes to help scam victims become aware of and better understand the topics and to be able to dialog with their counselors or therapists.

It is important that all readers understand these distinctions and that they apply the information that SCARS may publish at their own risk, and should do so only after consulting a licensed psychologist or mental healthcare provider.

SCARS IS A DIGITAL PUBLISHER AND DOES NOT OFFER HEALTH OR MEDICAL ADVICE, LEGAL ADVICE, FINANCIAL ADVICE, OR SERVICES THAT SCARS IS NOT LICENSED OR REGISTERED TO PERFORM.

IF YOU’RE FACING A MEDICAL EMERGENCY, CALL YOUR LOCAL EMERGENCY SERVICES IMMEDIATELY, OR VISIT THE NEAREST EMERGENCY ROOM OR URGENT CARE CENTER. YOU SHOULD CONSULT YOUR HEALTHCARE PROVIDER BEFORE FOLLOWING ANY MEDICALLY RELATED INFORMATION PRESENTED ON OUR PAGES.

ALWAYS CONSULT A LICENSED ATTORNEY FOR ANY ADVICE REGARDING LEGAL MATTERS.

A LICENSED FINANCIAL OR TAX PROFESSIONAL SHOULD BE CONSULTED BEFORE ACTING ON ANY INFORMATION RELATING TO YOUR PERSONAL FINANCES OR TAX RELATED ISSUES AND INFORMATION.

SCARS IS NOT A PRIVATE INVESTIGATOR – WE DO NOT PROVIDE INVESTIGATIVE SERVICES FOR INDIVIDUALS OR BUSINESSES. ANY INVESTIGATIONS THAT SCARS MAY PERFORM IS NOT A SERVICE PROVIDED TO THIRD-PARTIES. INFORMATION REPORTED TO SCARS MAY BE FORWARDED TO LAW ENFORCEMENT AS SCARS SEE FIT AND APPROPRIATE.

This content and other material contained on the website, apps, newsletter, and products (“Content”), is general in nature and for informational purposes only and does not constitute medical, legal, or financial advice; the Content is not intended to be a substitute for licensed or regulated professional advice. Always consult your doctor or other qualified healthcare provider, lawyer, financial, or tax professional with any questions you may have regarding the educational information contained herein. SCARS makes no guarantees about the efficacy of information described on or in SCARS’ Content. The information contained is subject to change and is not intended to cover all possible situations or effects. SCARS does not recommend or endorse any specific professional or care provider, product, service, or other information that may be mentioned in SCARS’ websites, apps, and Content unless explicitly identified as such.

The disclaimers herein are provided on this page for ease of reference. These disclaimers supplement and are a part of SCARS’ website’s Terms of Use. 

All original content is Copyright © 1991 – 2023 Society of Citizens Against Relationship Scams Inc. (Registered D.B.A SCARS) All Rights Reserved Worldwide & Webwide. Third-party copyrights acknowledge.

U.S. State of Florida Registration Nonprofit (Not for Profit) #N20000011978 [SCARS DBA Registered #G20000137918] – Learn more at www.AgainstScams.org

View the claimed and or registered indicia, service marks, and trademarks of Society of Citizens Against Relationship Scams Inc., All Rights Reserved Worldwide

Contact the law firm for the Society of Citizens Against Relationship Scams Incorporated by email at legal@AgainstScams.org

Share This Information - Choose Your Social Media!

Leave A Comment

Your comments help the SCARS Institute better understand all scam victim/survivor experiences and improve our services and processes. Thank you


Thank you for your comment. You may receive an email to follow up. We never share your data with marketers.