SlideShare a Scribd company logo
1 of 168
Computer Searches Abigail Abraham Assistant State Attorney Cook County, Illinois Ivan Orton Sr. Deputy Prosecuting Attorney King County, Washington
You Remember Law School Exams, Don’t You?
You sign off on a routine drug warrant.  Undercover says he bought drugs at the house you want to search.  The warrant authorizes the seizure of drugs, records of drug transactions and evidence of dominion and control
When search is executed of multi-room house, drugs are found in one bedroom.   One computer is found in the living room and a second is found in a second bedroom.  There is a small quantity of marijuana in the first bedroom.
Upon your advice, the police seize the computers and the drugs and turn the computers over to private computer experts for examination. Because the experts are backed up with other computers, they don’t get to these two computers for two weeks.
The search of the computer found in the living room finds: ,[object Object],[object Object],[object Object]
After Charges are Filed ,[object Object]
The search of the computer found in the living room - cont. ,[object Object],[object Object],[object Object],[object Object]
A search of the other computer reveals several things. ,[object Object],[object Object]
[object Object],[object Object],Contents of Second Computer
Possession with intent charges are filed against both occupants of the house.  Sexual Exploitation of a Minor charges are filed against the owner of the house.
[object Object],[object Object],[object Object],Discovery
Two days later the daughter of the tenant, whose emotional troubles were presented in the media in coverage of this case, commits suicide .
The defense attorneys move to suppress all evidence found on both computers.  In a separate civil action they bring an action for violation of the Privacy Protection Act, and the Electronic Communications Privacy Act.
The Judge grants the motions to suppress, holding that: ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],This opinion has since been withdrawn .
[object Object],[object Object],[object Object],[object Object]
Then you wake up in a cold sweat.  The detective didn’t bring that warrant to you yesterday.  He’s bringing it to you tomorrow.  The rest of this presentation will be spent trying to help you avoid the mistakes made in this nightmare case.
Disclaimer: The Judge’s rulings in this example are not necessarily accurate rulings.
Searching and Seizing Electronic Evidence
Whose Computer
Role of Computer in Crime
Our Primary Focus Today Suspect’s Computer where computer is a container of evidence
We Will Also Examine the laws governing access to Third Party Computers where computer is a container of evidence
The Things You’ll Find ,[object Object],[object Object],[object Object]
Rilling’s Log Files
The Things You’ll Find ,[object Object],[object Object],[object Object]
Accidental death search
Accidental death search
Poison search
Poison search
 
 
 
 
General Search Law for Containers ,[object Object],[object Object],[object Object],[object Object]
Always Distinguish ,[object Object],[object Object]
Remember ,[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Outline of Presentation
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Outline of Presentation
Preparing the Warrant ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
When Do You Need a Warrant ,[object Object],[object Object],[object Object]
Is There a Reasonable Expectation of Privacy in: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Government Action ,[object Object],[object Object],[object Object]
Preparing the Warrant ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Consent Exception ,[object Object],[object Object],[object Object],[object Object],[object Object]
Workplace Searches  ,[object Object],[object Object],[object Object]
Workplace Searches - Private  ,[object Object],[object Object],[object Object],[object Object]
Workplace Searches - Public  ,[object Object],[object Object],[object Object]
Workplace Searches - Public  ,[object Object],[object Object],[object Object]
Workplace Searches - Public  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Workplace Searches - Public  ,[object Object],[object Object]
Preparing the Warrant ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Alternatives to Search Warrants ,[object Object],[object Object],[object Object],[object Object],[object Object]
When You Might Need an Alternative to a Search Warrants ,[object Object],[object Object]
Subpoenas ,[object Object],[object Object],[object Object]
2703(d) Order Pen Register/Trap & Trace ,[object Object]
Preparing the Warrant ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What are you Searching For? INFORMATION
Describe Evidence in Terms of Specific Records or Information
Preparing the Warrant ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Define “Records” or “Information” to Include Computer Records ,[object Object]
Or, More Specifically The terms “records” and “information” include those items in whatever form and by whatever means they have been created or stored, including any electrical, electronic, or magnetic form (such as any information on an electronic or magnetic storage device, including floppy diskettes, hard disks, ZIP disks, CD-ROMs, optical discs, backup tapes, printer buffers, smart cards, memory calculators, pagers, personal digital assistants such as Palm Pilot computers, as well as printouts or readouts from any magnetic storage device); any handmade form (such as writing, drawing, painting); any mechanical form (such as printing or typing_: and any photographic form (such as microfilm, microfiche, prints, slides, negatives, videotapes, motion pictures, photocopies).
Remember: You Can Defend the Search of a Computer Where the Warrant did not Specify Computer Records
Preparing the Warrant ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Probable Cause ,[object Object],[object Object]
Probable Cause to Search Where you want to Search ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
Preparing the Warrant ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How Will Search Be Conducted ,[object Object],[object Object],[object Object],[object Object]
Reasons to Search Off Site ,[object Object],[object Object],[object Object],[object Object]
Off Site Searches Approved ,[object Object],[object Object],[object Object]
Preparing the Warrant ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Other Issues to Address in Warrant Affidavit ,[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Outline of Presentation
Executing the Warrant ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What Can Be Searched ,[object Object],[object Object]
 
Plain View in Computer Context ,[object Object],[object Object],[object Object]
Executing the Warrant ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
If Taking Computer to Search Off Site, What Can You Take? ,[object Object],[object Object],[object Object]
Executing the Warrant ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Presence and Assistance of Expert in Conducting Search ,[object Object],[object Object],[object Object],[object Object]
Executing the Warrant ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Must Officer be present when search executed ,[object Object],[object Object],[object Object]
Executing the Warrant ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
When to Get an Additional Warrant? ,[object Object],[object Object],[object Object]
Executing the Warrant ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Prompt Execution ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Outline of Presentation
Post Search - What to Return ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Outline of Presentation
PPA and ECPA ,[object Object]
Privacy Protection Act, 42 U.S.C. § 2000aa ,[object Object],[object Object],[object Object]
Steve Jackson Games ,[object Object],[object Object],[object Object]
Steve Jackson Games (cont) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Steve Jackson Games (cont) ,[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Obtaining Information from Providers
Tools for Obtaining Electronic Evidence ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],Seizing Information & Software
The Big Picture
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Real-time Information (1)
Pen Register / Trap & Trace ,[object Object],[object Object],[object Object],[object Object]
Legal Side of Pen / Traps (12-31-05 sunset  DOES NOT  apply)   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Reasons for Using New Law ,[object Object],[object Object],[object Object],[object Object]
Reasons for Using New Law,  cont. ,[object Object],[object Object],[object Object],[object Object]
The Big Picture
Real-time Content (2)  ,[object Object],[object Object],[object Object]
Wiretap Orders ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Exceptions to the Court Order Requirement  18 U.S.C. § 2511(2)(i) (12-31-05 sunset applies to “trespasser”) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
“Trespasser” Exception Requirements (10-31-05 sunset applies)   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Big Picture
The Stored Wire & Electronic Communications Act (3)  ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Stored Electronic Communications
Limitations on Access ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],Compelled Production
Compelling Production of  Unread E-mail ,[object Object],[object Object],[object Object],[object Object],[object Object]
Compelling Production of  Other Contents ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Compelling Content  - Examples - ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Fine Points of Search Warrants (12-31-05 sunset for national scope)
Voluntary Disclosure of Contents ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Voluntary Disclosure of Contents - Exceptions - ,[object Object],[object Object],[object Object],[object Object],[object Object]
Emergency Exception   (12-31-05 sunset applies) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Voluntary Disclosure of Contents - Examples - ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Big Picture
Compelled Production of  Subscriber / Account Data (4)  (12-31-05 sunset DOES NOT apply)   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Subscriber / Account Information
Compelled Disclosure of Other Transactional Data ,[object Object],[object Object],[object Object],[object Object],[object Object]
Articulable Facts Orders, Jurisdictional Issues ,[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Outline of Presentation
Voice Mail ,[object Object],[object Object],[object Object],[object Object]
Voice Mail (cont) ,[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Outline of Presentation
Out of State Providers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Out of State Providers -  A New Proposal ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Outside The United States ,[object Object],[object Object],[object Object]
Outside The United States - an Example United States v. Vassili Gorschkov
Russian Hackers - 1 ,[object Object],[object Object],[object Object]
Russian Hackers - 2 ,[object Object],[object Object]
Russian Hackers - 3 ,[object Object],[object Object],[object Object]
Russian Hackers - 4 ,[object Object],[object Object],[object Object]
Russian Hackers - 5 ,[object Object],[object Object]
Russian Hackers - 6 ,[object Object],[object Object],[object Object]
Russian Hackers - 7 ,[object Object],[object Object],[object Object]
Russian Hackers - 8 ,[object Object],[object Object],[object Object],[object Object]
Russian Hackers - 9 ,[object Object],[object Object],[object Object]
Russian Hackers - 10 ,[object Object],[object Object]
Anything Illegal? Evidence Admissible?
Court Ruling - 1 ,[object Object]
Court Ruling - 2 ,[object Object],[object Object],[object Object],[object Object],[object Object]
Court Ruling - 3 ,[object Object]
Court Ruling - 4 ,[object Object],[object Object],[object Object],[object Object]
Court Ruling - 5 ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Outline of Presentation
People of Colorado v.  Michael John Gall ,[object Object],[object Object],[object Object],[object Object],[object Object]
People of Colorado v.  Michael John Gall (cont) ,[object Object]
People of Colorado v.  Michael John Gall (cont) ,[object Object],[object Object],[object Object],[object Object]
People of Colorado v.  Michael John Gall (cont) ,[object Object]
People of Colorado v.  Michael John Gall (cont) ,[object Object],[object Object],[object Object]
People of Colorado v.  Michael John Gall (cont) ,[object Object],[object Object],[object Object]
People of Colorado v.  Michael John Gall (cont) ,[object Object],[object Object],[object Object]
People of Colorado v.  Michael John Gall (cont) ,[object Object],[object Object],[object Object],[object Object]
You Don’t Want to be the Prosecutor when . . .
Resources ,[object Object],[object Object],[object Object]
Resources ,[object Object],[object Object],[object Object]
QUESTIONS? Call Us ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Allan lee jerome pierce memo
Allan lee jerome pierce memoAllan lee jerome pierce memo
Allan lee jerome pierce memo
Angela Baxley
 

What's hot (18)

CJA 215 Effective Communication - tutorialrank.com
CJA 215 Effective Communication - tutorialrank.comCJA 215 Effective Communication - tutorialrank.com
CJA 215 Effective Communication - tutorialrank.com
 
Cja 215 Education Redefined - snaptutorial.com
Cja 215     Education Redefined - snaptutorial.comCja 215     Education Redefined - snaptutorial.com
Cja 215 Education Redefined - snaptutorial.com
 
ACP Getting the Goods
ACP Getting the GoodsACP Getting the Goods
ACP Getting the Goods
 
Judge revokes Zimmerman's bond - CNN.com
Judge revokes Zimmerman's bond - CNN.comJudge revokes Zimmerman's bond - CNN.com
Judge revokes Zimmerman's bond - CNN.com
 
Allan lee jerome pierce memo
Allan lee jerome pierce memoAllan lee jerome pierce memo
Allan lee jerome pierce memo
 
Cja 215 Education Organization / snaptutorial.com
Cja 215 Education Organization / snaptutorial.comCja 215 Education Organization / snaptutorial.com
Cja 215 Education Organization / snaptutorial.com
 
CJA 215 Exceptional Education / snaptutorial.com
CJA 215 Exceptional Education / snaptutorial.comCJA 215 Exceptional Education / snaptutorial.com
CJA 215 Exceptional Education / snaptutorial.com
 
The Background Investigator October 2013 Edition
The Background Investigator October 2013 EditionThe Background Investigator October 2013 Edition
The Background Investigator October 2013 Edition
 
The Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime LawThe Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime Law
 
CJA 215 Inspiring Innovation/tutorialrank.com
 CJA 215 Inspiring Innovation/tutorialrank.com CJA 215 Inspiring Innovation/tutorialrank.com
CJA 215 Inspiring Innovation/tutorialrank.com
 
Cja 215 Education Specialist-snaptutorial.com
Cja 215 Education Specialist-snaptutorial.comCja 215 Education Specialist-snaptutorial.com
Cja 215 Education Specialist-snaptutorial.com
 
CJA 215 Entire Course NEW
CJA 215 Entire Course NEWCJA 215 Entire Course NEW
CJA 215 Entire Course NEW
 
CJA 215 Life of the Mind/newtonhelp.com   
CJA 215 Life of the Mind/newtonhelp.com   CJA 215 Life of the Mind/newtonhelp.com   
CJA 215 Life of the Mind/newtonhelp.com   
 
Municipalities & The Internet: A Few Legal Issues
Municipalities & The Internet: A Few Legal IssuesMunicipalities & The Internet: A Few Legal Issues
Municipalities & The Internet: A Few Legal Issues
 
Medina.complaint
Medina.complaintMedina.complaint
Medina.complaint
 
OLC Presentation Jipson
OLC Presentation JipsonOLC Presentation Jipson
OLC Presentation Jipson
 
Human Trafficking Court Case Against Facebook
Human Trafficking Court Case Against FacebookHuman Trafficking Court Case Against Facebook
Human Trafficking Court Case Against Facebook
 
Twitter contra USA
Twitter contra USATwitter contra USA
Twitter contra USA
 

Viewers also liked

Law Enforcement Role In Computing
Law Enforcement Role In ComputingLaw Enforcement Role In Computing
Law Enforcement Role In Computing
CTIN
 
A 1 Day
A 1 DayA 1 Day
A 1 Day
CTIN
 
End Of The Day
End Of The DayEnd Of The Day
End Of The Day
CTIN
 
Cjtc Level 1 Business
Cjtc Level 1 BusinessCjtc Level 1 Business
Cjtc Level 1 Business
CTIN
 
We Know Your Type
We Know Your TypeWe Know Your Type
We Know Your Type
CTIN
 
C Dos Bas
C Dos BasC Dos Bas
C Dos Bas
CTIN
 
Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drives
CTIN
 

Viewers also liked (7)

Law Enforcement Role In Computing
Law Enforcement Role In ComputingLaw Enforcement Role In Computing
Law Enforcement Role In Computing
 
A 1 Day
A 1 DayA 1 Day
A 1 Day
 
End Of The Day
End Of The DayEnd Of The Day
End Of The Day
 
Cjtc Level 1 Business
Cjtc Level 1 BusinessCjtc Level 1 Business
Cjtc Level 1 Business
 
We Know Your Type
We Know Your TypeWe Know Your Type
We Know Your Type
 
C Dos Bas
C Dos BasC Dos Bas
C Dos Bas
 
Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drives
 

Similar to Nac 1 21 03

1Figures title5Civil Liberties and the Supreme Court.docx
1Figures title5Civil Liberties and the Supreme Court.docx1Figures title5Civil Liberties and the Supreme Court.docx
1Figures title5Civil Liberties and the Supreme Court.docx
drennanmicah
 
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docx
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docxGovernment Employs Backdoor Searches ACSB standards- Social and Ethica.docx
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docx
LeonardN9WWelchw
 
I need answers to both discussions questions as well as replies to f.docx
I need answers to both discussions questions as well as replies to f.docxI need answers to both discussions questions as well as replies to f.docx
I need answers to both discussions questions as well as replies to f.docx
anthonybrooks84958
 
Second Chance Law in Indiana
Second Chance Law in IndianaSecond Chance Law in Indiana
Second Chance Law in Indiana
Faith Brickley
 
Chapter1. Plea bargaining.Plea agreement is any agreement in a c.docx
Chapter1. Plea bargaining.Plea agreement is any agreement in a c.docxChapter1. Plea bargaining.Plea agreement is any agreement in a c.docx
Chapter1. Plea bargaining.Plea agreement is any agreement in a c.docx
christinemaritza
 

Similar to Nac 1 21 03 (16)

1Figures title5Civil Liberties and the Supreme Court.docx
1Figures title5Civil Liberties and the Supreme Court.docx1Figures title5Civil Liberties and the Supreme Court.docx
1Figures title5Civil Liberties and the Supreme Court.docx
 
Legal aspects of digital forensics
Legal aspects of digital forensics Legal aspects of digital forensics
Legal aspects of digital forensics
 
Jurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceJurisdiction issues in cyberspace
Jurisdiction issues in cyberspace
 
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docx
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docxGovernment Employs Backdoor Searches ACSB standards- Social and Ethica.docx
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docx
 
Fingerprints, Passcodes, and Self Incrimination - BSides Nova
Fingerprints, Passcodes, and Self Incrimination - BSides NovaFingerprints, Passcodes, and Self Incrimination - BSides Nova
Fingerprints, Passcodes, and Self Incrimination - BSides Nova
 
P2P: Session 6 / Infringement
P2P: Session 6 / InfringementP2P: Session 6 / Infringement
P2P: Session 6 / Infringement
 
Darren Chaker Computer Search Warrant
Darren Chaker Computer Search WarrantDarren Chaker Computer Search Warrant
Darren Chaker Computer Search Warrant
 
Court covering
Court coveringCourt covering
Court covering
 
I need answers to both discussions questions as well as replies to f.docx
I need answers to both discussions questions as well as replies to f.docxI need answers to both discussions questions as well as replies to f.docx
I need answers to both discussions questions as well as replies to f.docx
 
Second Chance Law in Indiana
Second Chance Law in IndianaSecond Chance Law in Indiana
Second Chance Law in Indiana
 
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspace
 
Rule of Law Day
Rule of Law DayRule of Law Day
Rule of Law Day
 
Cja 215 Enhance teaching / snaptutorial.com
Cja 215  Enhance teaching / snaptutorial.comCja 215  Enhance teaching / snaptutorial.com
Cja 215 Enhance teaching / snaptutorial.com
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
 
Chapter1. Plea bargaining.Plea agreement is any agreement in a c.docx
Chapter1. Plea bargaining.Plea agreement is any agreement in a c.docxChapter1. Plea bargaining.Plea agreement is any agreement in a c.docx
Chapter1. Plea bargaining.Plea agreement is any agreement in a c.docx
 
Intellectual Property In California
Intellectual Property In CaliforniaIntellectual Property In California
Intellectual Property In California
 

More from CTIN

Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source Forensics
CTIN
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011
CTIN
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
CTIN
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3
CTIN
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troyla
CTIN
 
Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4
CTIN
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-public
CTIN
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows Systems
CTIN
 
Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
CTIN
 
Mac Forensics
Mac ForensicsMac Forensics
Mac Forensics
CTIN
 
Nra
NraNra
Nra
CTIN
 
Live Forensics
Live ForensicsLive Forensics
Live Forensics
CTIN
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
CTIN
 
Edrm
EdrmEdrm
Edrm
CTIN
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
CTIN
 
Search Warrants
Search WarrantsSearch Warrants
Search Warrants
CTIN
 
Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector Concerns
CTIN
 
Sadfe2007
Sadfe2007Sadfe2007
Sadfe2007
CTIN
 
Raidprep
RaidprepRaidprep
Raidprep
CTIN
 
Networking Overview
Networking OverviewNetworking Overview
Networking Overview
CTIN
 

More from CTIN (20)

Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source Forensics
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troyla
 
Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-public
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows Systems
 
Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
 
Mac Forensics
Mac ForensicsMac Forensics
Mac Forensics
 
Nra
NraNra
Nra
 
Live Forensics
Live ForensicsLive Forensics
Live Forensics
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
 
Edrm
EdrmEdrm
Edrm
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Search Warrants
Search WarrantsSearch Warrants
Search Warrants
 
Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector Concerns
 
Sadfe2007
Sadfe2007Sadfe2007
Sadfe2007
 
Raidprep
RaidprepRaidprep
Raidprep
 
Networking Overview
Networking OverviewNetworking Overview
Networking Overview
 

Recently uploaded

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

Nac 1 21 03

  • 1. Computer Searches Abigail Abraham Assistant State Attorney Cook County, Illinois Ivan Orton Sr. Deputy Prosecuting Attorney King County, Washington
  • 2. You Remember Law School Exams, Don’t You?
  • 3. You sign off on a routine drug warrant. Undercover says he bought drugs at the house you want to search. The warrant authorizes the seizure of drugs, records of drug transactions and evidence of dominion and control
  • 4. When search is executed of multi-room house, drugs are found in one bedroom. One computer is found in the living room and a second is found in a second bedroom. There is a small quantity of marijuana in the first bedroom.
  • 5. Upon your advice, the police seize the computers and the drugs and turn the computers over to private computer experts for examination. Because the experts are backed up with other computers, they don’t get to these two computers for two weeks.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. Possession with intent charges are filed against both occupants of the house. Sexual Exploitation of a Minor charges are filed against the owner of the house.
  • 12.
  • 13. Two days later the daughter of the tenant, whose emotional troubles were presented in the media in coverage of this case, commits suicide .
  • 14. The defense attorneys move to suppress all evidence found on both computers. In a separate civil action they bring an action for violation of the Privacy Protection Act, and the Electronic Communications Privacy Act.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20. Then you wake up in a cold sweat. The detective didn’t bring that warrant to you yesterday. He’s bringing it to you tomorrow. The rest of this presentation will be spent trying to help you avoid the mistakes made in this nightmare case.
  • 21. Disclaimer: The Judge’s rulings in this example are not necessarily accurate rulings.
  • 22. Searching and Seizing Electronic Evidence
  • 24. Role of Computer in Crime
  • 25. Our Primary Focus Today Suspect’s Computer where computer is a container of evidence
  • 26. We Will Also Examine the laws governing access to Third Party Computers where computer is a container of evidence
  • 27.
  • 29.
  • 34.  
  • 35.  
  • 36.  
  • 37.  
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61. What are you Searching For? INFORMATION
  • 62. Describe Evidence in Terms of Specific Records or Information
  • 63.
  • 64.
  • 65. Or, More Specifically The terms “records” and “information” include those items in whatever form and by whatever means they have been created or stored, including any electrical, electronic, or magnetic form (such as any information on an electronic or magnetic storage device, including floppy diskettes, hard disks, ZIP disks, CD-ROMs, optical discs, backup tapes, printer buffers, smart cards, memory calculators, pagers, personal digital assistants such as Palm Pilot computers, as well as printouts or readouts from any magnetic storage device); any handmade form (such as writing, drawing, painting); any mechanical form (such as printing or typing_: and any photographic form (such as microfilm, microfiche, prints, slides, negatives, videotapes, motion pictures, photocopies).
  • 66. Remember: You Can Defend the Search of a Computer Where the Warrant did not Specify Computer Records
  • 67.
  • 68.
  • 69.
  • 70.  
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.  
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.
  • 87.
  • 88.
  • 89.
  • 90.
  • 91.
  • 92.
  • 93.
  • 94.
  • 95.
  • 96.
  • 97.
  • 98.
  • 99.
  • 100.
  • 101.
  • 102.
  • 104.
  • 105.
  • 106.
  • 107.
  • 108.
  • 110.
  • 111.
  • 112.
  • 113.
  • 115.
  • 116.
  • 117.
  • 118.
  • 119.
  • 120.
  • 121.
  • 122.
  • 123.
  • 124.
  • 125.
  • 126.
  • 128.
  • 129. Subscriber / Account Information
  • 130.
  • 131.
  • 132.
  • 133.
  • 134.
  • 135.
  • 136.
  • 137.
  • 138.
  • 139. Outside The United States - an Example United States v. Vassili Gorschkov
  • 140.
  • 141.
  • 142.
  • 143.
  • 144.
  • 145.
  • 146.
  • 147.
  • 148.
  • 149.
  • 151.
  • 152.
  • 153.
  • 154.
  • 155.
  • 156.
  • 157.
  • 158.
  • 159.
  • 160.
  • 161.
  • 162.
  • 163.
  • 164.
  • 165. You Don’t Want to be the Prosecutor when . . .
  • 166.
  • 167.
  • 168.