SlideShare a Scribd company logo
1 of 168
Computer Searches Abigail Abraham Assistant State Attorney Cook County, Illinois Ivan Orton Sr. Deputy Prosecuting Attorney King County, Washington
You Remember Law School Exams, Don’t You?
You sign off on a routine drug warrant.  Undercover says he bought drugs at the house you want to search.  The warrant authorizes the seizure of drugs, records of drug transactions and evidence of dominion and control
When search is executed of multi-room house, drugs are found in one bedroom.   One computer is found in the living room and a second is found in a second bedroom.  There is a small quantity of marijuana in the first bedroom.
Upon your advice, the police seize the computers and the drugs and turn the computers over to private computer experts for examination. Because the experts are backed up with other computers, they don’t get to these two computers for two weeks.
The search of the computer found in the living room finds: ,[object Object],[object Object],[object Object]
After Charges are Filed ,[object Object]
The search of the computer found in the living room - cont. ,[object Object],[object Object],[object Object],[object Object]
A search of the other computer reveals several things. ,[object Object],[object Object]
[object Object],[object Object],Contents of Second Computer
Possession with intent charges are filed against both occupants of the house.  Sexual Exploitation of a Minor charges are filed against the owner of the house.
[object Object],[object Object],[object Object],Discovery
Two days later the daughter of the tenant, whose emotional troubles were presented in the media in coverage of this case, commits suicide .
The defense attorneys move to suppress all evidence found on both computers.  In a separate civil action they bring an action for violation of the Privacy Protection Act, and the Electronic Communications Privacy Act.
The Judge grants the motions to suppress, holding that: ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],This opinion has since been withdrawn .
[object Object],[object Object],[object Object],[object Object]
Then you wake up in a cold sweat.  The detective didn’t bring that warrant to you yesterday.  He’s bringing it to you tomorrow.  The rest of this presentation will be spent trying to help you avoid the mistakes made in this nightmare case.
Disclaimer: The Judge’s rulings in this example are not necessarily accurate rulings.
Searching and Seizing Electronic Evidence
Whose Computer
Role of Computer in Crime
Our Primary Focus Today Suspect’s Computer where computer is a container of evidence
We Will Also Examine the laws governing access to Third Party Computers where computer is a container of evidence
The Things You’ll Find ,[object Object],[object Object],[object Object]
Rilling’s Log Files
The Things You’ll Find ,[object Object],[object Object],[object Object]
Accidental death search
Accidental death search
Poison search
Poison search
 
 
 
 
General Search Law for Containers ,[object Object],[object Object],[object Object],[object Object]
Always Distinguish ,[object Object],[object Object]
Remember ,[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Outline of Presentation
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Outline of Presentation
Preparing the Warrant ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
When Do You Need a Warrant ,[object Object],[object Object],[object Object]
Is There a Reasonable Expectation of Privacy in: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Government Action ,[object Object],[object Object],[object Object]
Preparing the Warrant ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Consent Exception ,[object Object],[object Object],[object Object],[object Object],[object Object]
Workplace Searches  ,[object Object],[object Object],[object Object]
Workplace Searches - Private  ,[object Object],[object Object],[object Object],[object Object]
Workplace Searches - Public  ,[object Object],[object Object],[object Object]
Workplace Searches - Public  ,[object Object],[object Object],[object Object]
Workplace Searches - Public  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Workplace Searches - Public  ,[object Object],[object Object]
Preparing the Warrant ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Alternatives to Search Warrants ,[object Object],[object Object],[object Object],[object Object],[object Object]
When You Might Need an Alternative to a Search Warrants ,[object Object],[object Object]
Subpoenas ,[object Object],[object Object],[object Object]
2703(d) Order Pen Register/Trap & Trace ,[object Object]
Preparing the Warrant ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What are you Searching For? INFORMATION
Describe Evidence in Terms of Specific Records or Information
Preparing the Warrant ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Define “Records” or “Information” to Include Computer Records ,[object Object]
Or, More Specifically The terms “records” and “information” include those items in whatever form and by whatever means they have been created or stored, including any electrical, electronic, or magnetic form (such as any information on an electronic or magnetic storage device, including floppy diskettes, hard disks, ZIP disks, CD-ROMs, optical discs, backup tapes, printer buffers, smart cards, memory calculators, pagers, personal digital assistants such as Palm Pilot computers, as well as printouts or readouts from any magnetic storage device); any handmade form (such as writing, drawing, painting); any mechanical form (such as printing or typing_: and any photographic form (such as microfilm, microfiche, prints, slides, negatives, videotapes, motion pictures, photocopies).
Remember: You Can Defend the Search of a Computer Where the Warrant did not Specify Computer Records
Preparing the Warrant ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Probable Cause ,[object Object],[object Object]
Probable Cause to Search Where you want to Search ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
Preparing the Warrant ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How Will Search Be Conducted ,[object Object],[object Object],[object Object],[object Object]
Reasons to Search Off Site ,[object Object],[object Object],[object Object],[object Object]
Off Site Searches Approved ,[object Object],[object Object],[object Object]
Preparing the Warrant ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Other Issues to Address in Warrant Affidavit ,[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Outline of Presentation
Executing the Warrant ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What Can Be Searched ,[object Object],[object Object]
 
Plain View in Computer Context ,[object Object],[object Object],[object Object]
Executing the Warrant ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
If Taking Computer to Search Off Site, What Can You Take? ,[object Object],[object Object],[object Object]
Executing the Warrant ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Presence and Assistance of Expert in Conducting Search ,[object Object],[object Object],[object Object],[object Object]
Executing the Warrant ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Must Officer be present when search executed ,[object Object],[object Object],[object Object]
Executing the Warrant ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
When to Get an Additional Warrant? ,[object Object],[object Object],[object Object]
Executing the Warrant ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Prompt Execution ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Outline of Presentation
Post Search - What to Return ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Outline of Presentation
PPA and ECPA ,[object Object]
Privacy Protection Act, 42 U.S.C. § 2000aa ,[object Object],[object Object],[object Object]
Steve Jackson Games ,[object Object],[object Object],[object Object]
Steve Jackson Games (cont) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Steve Jackson Games (cont) ,[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Obtaining Information from Providers
Tools for Obtaining Electronic Evidence ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],Seizing Information & Software
The Big Picture
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Real-time Information (1)
Pen Register / Trap & Trace ,[object Object],[object Object],[object Object],[object Object]
Legal Side of Pen / Traps (12-31-05 sunset  DOES NOT  apply)   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Reasons for Using New Law ,[object Object],[object Object],[object Object],[object Object]
Reasons for Using New Law,  cont. ,[object Object],[object Object],[object Object],[object Object]
The Big Picture
Real-time Content (2)  ,[object Object],[object Object],[object Object]
Wiretap Orders ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Exceptions to the Court Order Requirement  18 U.S.C. § 2511(2)(i) (12-31-05 sunset applies to “trespasser”) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
“Trespasser” Exception Requirements (10-31-05 sunset applies)   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Big Picture
The Stored Wire & Electronic Communications Act (3)  ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Stored Electronic Communications
Limitations on Access ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],Compelled Production
Compelling Production of  Unread E-mail ,[object Object],[object Object],[object Object],[object Object],[object Object]
Compelling Production of  Other Contents ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Compelling Content  - Examples - ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Fine Points of Search Warrants (12-31-05 sunset for national scope)
Voluntary Disclosure of Contents ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Voluntary Disclosure of Contents - Exceptions - ,[object Object],[object Object],[object Object],[object Object],[object Object]
Emergency Exception   (12-31-05 sunset applies) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Voluntary Disclosure of Contents - Examples - ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Big Picture
Compelled Production of  Subscriber / Account Data (4)  (12-31-05 sunset DOES NOT apply)   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Subscriber / Account Information
Compelled Disclosure of Other Transactional Data ,[object Object],[object Object],[object Object],[object Object],[object Object]
Articulable Facts Orders, Jurisdictional Issues ,[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Outline of Presentation
Voice Mail ,[object Object],[object Object],[object Object],[object Object]
Voice Mail (cont) ,[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Outline of Presentation
Out of State Providers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Out of State Providers -  A New Proposal ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Outside The United States ,[object Object],[object Object],[object Object]
Outside The United States - an Example United States v. Vassili Gorschkov
Russian Hackers - 1 ,[object Object],[object Object],[object Object]
Russian Hackers - 2 ,[object Object],[object Object]
Russian Hackers - 3 ,[object Object],[object Object],[object Object]
Russian Hackers - 4 ,[object Object],[object Object],[object Object]
Russian Hackers - 5 ,[object Object],[object Object]
Russian Hackers - 6 ,[object Object],[object Object],[object Object]
Russian Hackers - 7 ,[object Object],[object Object],[object Object]
Russian Hackers - 8 ,[object Object],[object Object],[object Object],[object Object]
Russian Hackers - 9 ,[object Object],[object Object],[object Object]
Russian Hackers - 10 ,[object Object],[object Object]
Anything Illegal? Evidence Admissible?
Court Ruling - 1 ,[object Object]
Court Ruling - 2 ,[object Object],[object Object],[object Object],[object Object],[object Object]
Court Ruling - 3 ,[object Object]
Court Ruling - 4 ,[object Object],[object Object],[object Object],[object Object]
Court Ruling - 5 ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Outline of Presentation
People of Colorado v.  Michael John Gall ,[object Object],[object Object],[object Object],[object Object],[object Object]
People of Colorado v.  Michael John Gall (cont) ,[object Object]
People of Colorado v.  Michael John Gall (cont) ,[object Object],[object Object],[object Object],[object Object]
People of Colorado v.  Michael John Gall (cont) ,[object Object]
People of Colorado v.  Michael John Gall (cont) ,[object Object],[object Object],[object Object]
People of Colorado v.  Michael John Gall (cont) ,[object Object],[object Object],[object Object]
People of Colorado v.  Michael John Gall (cont) ,[object Object],[object Object],[object Object]
People of Colorado v.  Michael John Gall (cont) ,[object Object],[object Object],[object Object],[object Object]
You Don’t Want to be the Prosecutor when . . .
Resources ,[object Object],[object Object],[object Object]
Resources ,[object Object],[object Object],[object Object]
QUESTIONS? Call Us ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

CJA 215 Effective Communication - tutorialrank.com
CJA 215 Effective Communication - tutorialrank.comCJA 215 Effective Communication - tutorialrank.com
CJA 215 Effective Communication - tutorialrank.comBartholomew24
 
Cja 215 Education Redefined - snaptutorial.com
Cja 215     Education Redefined - snaptutorial.comCja 215     Education Redefined - snaptutorial.com
Cja 215 Education Redefined - snaptutorial.comDavisMurphyC78
 
Judge revokes Zimmerman's bond - CNN.com
Judge revokes Zimmerman's bond - CNN.comJudge revokes Zimmerman's bond - CNN.com
Judge revokes Zimmerman's bond - CNN.comjazzybaby4843
 
Allan lee jerome pierce memo
Allan lee jerome pierce memoAllan lee jerome pierce memo
Allan lee jerome pierce memoAngela Baxley
 
Cja 215 Education Organization / snaptutorial.com
Cja 215 Education Organization / snaptutorial.comCja 215 Education Organization / snaptutorial.com
Cja 215 Education Organization / snaptutorial.comBaileya85
 
CJA 215 Exceptional Education / snaptutorial.com
CJA 215 Exceptional Education / snaptutorial.comCJA 215 Exceptional Education / snaptutorial.com
CJA 215 Exceptional Education / snaptutorial.comdonaldzs100
 
The Background Investigator October 2013 Edition
The Background Investigator October 2013 EditionThe Background Investigator October 2013 Edition
The Background Investigator October 2013 EditionSteven Brownstein
 
The Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime LawThe Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime LawSource Conference
 
CJA 215 Inspiring Innovation/tutorialrank.com
 CJA 215 Inspiring Innovation/tutorialrank.com CJA 215 Inspiring Innovation/tutorialrank.com
CJA 215 Inspiring Innovation/tutorialrank.comjonhson115
 
Cja 215 Education Specialist-snaptutorial.com
Cja 215 Education Specialist-snaptutorial.comCja 215 Education Specialist-snaptutorial.com
Cja 215 Education Specialist-snaptutorial.comrobertlesew54
 
CJA 215 Entire Course NEW
CJA 215 Entire Course NEWCJA 215 Entire Course NEW
CJA 215 Entire Course NEWshyamuopuop
 
CJA 215 Life of the Mind/newtonhelp.com   
CJA 215 Life of the Mind/newtonhelp.com   CJA 215 Life of the Mind/newtonhelp.com   
CJA 215 Life of the Mind/newtonhelp.com   bellflower13
 
Municipalities & The Internet: A Few Legal Issues
Municipalities & The Internet: A Few Legal IssuesMunicipalities & The Internet: A Few Legal Issues
Municipalities & The Internet: A Few Legal IssuesShawn Tuma
 
Human Trafficking Court Case Against Facebook
Human Trafficking Court Case Against FacebookHuman Trafficking Court Case Against Facebook
Human Trafficking Court Case Against FacebookSean Gugerty
 

What's hot (18)

CJA 215 Effective Communication - tutorialrank.com
CJA 215 Effective Communication - tutorialrank.comCJA 215 Effective Communication - tutorialrank.com
CJA 215 Effective Communication - tutorialrank.com
 
Cja 215 Education Redefined - snaptutorial.com
Cja 215     Education Redefined - snaptutorial.comCja 215     Education Redefined - snaptutorial.com
Cja 215 Education Redefined - snaptutorial.com
 
ACP Getting the Goods
ACP Getting the GoodsACP Getting the Goods
ACP Getting the Goods
 
Judge revokes Zimmerman's bond - CNN.com
Judge revokes Zimmerman's bond - CNN.comJudge revokes Zimmerman's bond - CNN.com
Judge revokes Zimmerman's bond - CNN.com
 
Allan lee jerome pierce memo
Allan lee jerome pierce memoAllan lee jerome pierce memo
Allan lee jerome pierce memo
 
Cja 215 Education Organization / snaptutorial.com
Cja 215 Education Organization / snaptutorial.comCja 215 Education Organization / snaptutorial.com
Cja 215 Education Organization / snaptutorial.com
 
CJA 215 Exceptional Education / snaptutorial.com
CJA 215 Exceptional Education / snaptutorial.comCJA 215 Exceptional Education / snaptutorial.com
CJA 215 Exceptional Education / snaptutorial.com
 
The Background Investigator October 2013 Edition
The Background Investigator October 2013 EditionThe Background Investigator October 2013 Edition
The Background Investigator October 2013 Edition
 
The Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime LawThe Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime Law
 
CJA 215 Inspiring Innovation/tutorialrank.com
 CJA 215 Inspiring Innovation/tutorialrank.com CJA 215 Inspiring Innovation/tutorialrank.com
CJA 215 Inspiring Innovation/tutorialrank.com
 
Cja 215 Education Specialist-snaptutorial.com
Cja 215 Education Specialist-snaptutorial.comCja 215 Education Specialist-snaptutorial.com
Cja 215 Education Specialist-snaptutorial.com
 
CJA 215 Entire Course NEW
CJA 215 Entire Course NEWCJA 215 Entire Course NEW
CJA 215 Entire Course NEW
 
CJA 215 Life of the Mind/newtonhelp.com   
CJA 215 Life of the Mind/newtonhelp.com   CJA 215 Life of the Mind/newtonhelp.com   
CJA 215 Life of the Mind/newtonhelp.com   
 
Municipalities & The Internet: A Few Legal Issues
Municipalities & The Internet: A Few Legal IssuesMunicipalities & The Internet: A Few Legal Issues
Municipalities & The Internet: A Few Legal Issues
 
Medina.complaint
Medina.complaintMedina.complaint
Medina.complaint
 
OLC Presentation Jipson
OLC Presentation JipsonOLC Presentation Jipson
OLC Presentation Jipson
 
Human Trafficking Court Case Against Facebook
Human Trafficking Court Case Against FacebookHuman Trafficking Court Case Against Facebook
Human Trafficking Court Case Against Facebook
 
Twitter contra USA
Twitter contra USATwitter contra USA
Twitter contra USA
 

Viewers also liked

Law Enforcement Role In Computing
Law Enforcement Role In ComputingLaw Enforcement Role In Computing
Law Enforcement Role In ComputingCTIN
 
A 1 Day
A 1 DayA 1 Day
A 1 DayCTIN
 
End Of The Day
End Of The DayEnd Of The Day
End Of The DayCTIN
 
Cjtc Level 1 Business
Cjtc Level 1 BusinessCjtc Level 1 Business
Cjtc Level 1 BusinessCTIN
 
We Know Your Type
We Know Your TypeWe Know Your Type
We Know Your TypeCTIN
 
C Dos Bas
C Dos BasC Dos Bas
C Dos BasCTIN
 
Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drivesCTIN
 

Viewers also liked (7)

Law Enforcement Role In Computing
Law Enforcement Role In ComputingLaw Enforcement Role In Computing
Law Enforcement Role In Computing
 
A 1 Day
A 1 DayA 1 Day
A 1 Day
 
End Of The Day
End Of The DayEnd Of The Day
End Of The Day
 
Cjtc Level 1 Business
Cjtc Level 1 BusinessCjtc Level 1 Business
Cjtc Level 1 Business
 
We Know Your Type
We Know Your TypeWe Know Your Type
We Know Your Type
 
C Dos Bas
C Dos BasC Dos Bas
C Dos Bas
 
Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drives
 

Similar to Computer searches uncover drugs, child porn, suicide

1Figures title5Civil Liberties and the Supreme Court.docx
1Figures title5Civil Liberties and the Supreme Court.docx1Figures title5Civil Liberties and the Supreme Court.docx
1Figures title5Civil Liberties and the Supreme Court.docxdrennanmicah
 
Legal aspects of digital forensics
Legal aspects of digital forensics Legal aspects of digital forensics
Legal aspects of digital forensics KakshaPatel3
 
Jurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceJurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceatuljaybhaye
 
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docx
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docxGovernment Employs Backdoor Searches ACSB standards- Social and Ethica.docx
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docxLeonardN9WWelchw
 
Fingerprints, Passcodes, and Self Incrimination - BSides Nova
Fingerprints, Passcodes, and Self Incrimination - BSides NovaFingerprints, Passcodes, and Self Incrimination - BSides Nova
Fingerprints, Passcodes, and Self Incrimination - BSides NovaWendy Knox Everette
 
P2P: Session 6 / Infringement
P2P: Session 6 / InfringementP2P: Session 6 / Infringement
P2P: Session 6 / InfringementAnne Gilliland
 
Darren Chaker Computer Search Warrant
Darren Chaker Computer Search WarrantDarren Chaker Computer Search Warrant
Darren Chaker Computer Search WarrantDarren Chaker
 
I need answers to both discussions questions as well as replies to f.docx
I need answers to both discussions questions as well as replies to f.docxI need answers to both discussions questions as well as replies to f.docx
I need answers to both discussions questions as well as replies to f.docxanthonybrooks84958
 
Second Chance Law in Indiana
Second Chance Law in IndianaSecond Chance Law in Indiana
Second Chance Law in IndianaFaith Brickley
 
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspaceDr. Arun Verma
 
Cja 215 Enhance teaching / snaptutorial.com
Cja 215  Enhance teaching / snaptutorial.comCja 215  Enhance teaching / snaptutorial.com
Cja 215 Enhance teaching / snaptutorial.comDavis107a
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINamiable_indian
 
Chapter1. Plea bargaining.Plea agreement is any agreement in a c.docx
Chapter1. Plea bargaining.Plea agreement is any agreement in a c.docxChapter1. Plea bargaining.Plea agreement is any agreement in a c.docx
Chapter1. Plea bargaining.Plea agreement is any agreement in a c.docxchristinemaritza
 
Intellectual Property In California
Intellectual Property In CaliforniaIntellectual Property In California
Intellectual Property In CaliforniaEEVaranini
 

Similar to Computer searches uncover drugs, child porn, suicide (16)

1Figures title5Civil Liberties and the Supreme Court.docx
1Figures title5Civil Liberties and the Supreme Court.docx1Figures title5Civil Liberties and the Supreme Court.docx
1Figures title5Civil Liberties and the Supreme Court.docx
 
Legal aspects of digital forensics
Legal aspects of digital forensics Legal aspects of digital forensics
Legal aspects of digital forensics
 
Jurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceJurisdiction issues in cyberspace
Jurisdiction issues in cyberspace
 
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docx
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docxGovernment Employs Backdoor Searches ACSB standards- Social and Ethica.docx
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docx
 
Fingerprints, Passcodes, and Self Incrimination - BSides Nova
Fingerprints, Passcodes, and Self Incrimination - BSides NovaFingerprints, Passcodes, and Self Incrimination - BSides Nova
Fingerprints, Passcodes, and Self Incrimination - BSides Nova
 
P2P: Session 6 / Infringement
P2P: Session 6 / InfringementP2P: Session 6 / Infringement
P2P: Session 6 / Infringement
 
Darren Chaker Computer Search Warrant
Darren Chaker Computer Search WarrantDarren Chaker Computer Search Warrant
Darren Chaker Computer Search Warrant
 
Court covering
Court coveringCourt covering
Court covering
 
I need answers to both discussions questions as well as replies to f.docx
I need answers to both discussions questions as well as replies to f.docxI need answers to both discussions questions as well as replies to f.docx
I need answers to both discussions questions as well as replies to f.docx
 
Second Chance Law in Indiana
Second Chance Law in IndianaSecond Chance Law in Indiana
Second Chance Law in Indiana
 
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspace
 
Rule of Law Day
Rule of Law DayRule of Law Day
Rule of Law Day
 
Cja 215 Enhance teaching / snaptutorial.com
Cja 215  Enhance teaching / snaptutorial.comCja 215  Enhance teaching / snaptutorial.com
Cja 215 Enhance teaching / snaptutorial.com
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
 
Chapter1. Plea bargaining.Plea agreement is any agreement in a c.docx
Chapter1. Plea bargaining.Plea agreement is any agreement in a c.docxChapter1. Plea bargaining.Plea agreement is any agreement in a c.docx
Chapter1. Plea bargaining.Plea agreement is any agreement in a c.docx
 
Intellectual Property In California
Intellectual Property In CaliforniaIntellectual Property In California
Intellectual Property In California
 

More from CTIN

Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source ForensicsCTIN
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011CTIN
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3CTIN
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3CTIN
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaCTIN
 
Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4CTIN
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicCTIN
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsCTIN
 
Vista Forensics
Vista ForensicsVista Forensics
Vista ForensicsCTIN
 
Mac Forensics
Mac ForensicsMac Forensics
Mac ForensicsCTIN
 
Nra
NraNra
NraCTIN
 
Live Forensics
Live ForensicsLive Forensics
Live ForensicsCTIN
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityCTIN
 
Edrm
EdrmEdrm
EdrmCTIN
 
CyberCrime
CyberCrimeCyberCrime
CyberCrimeCTIN
 
Search Warrants
Search WarrantsSearch Warrants
Search WarrantsCTIN
 
Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector ConcernsCTIN
 
Sadfe2007
Sadfe2007Sadfe2007
Sadfe2007CTIN
 
Raidprep
RaidprepRaidprep
RaidprepCTIN
 
Networking Overview
Networking OverviewNetworking Overview
Networking OverviewCTIN
 

More from CTIN (20)

Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source Forensics
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troyla
 
Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-public
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows Systems
 
Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
 
Mac Forensics
Mac ForensicsMac Forensics
Mac Forensics
 
Nra
NraNra
Nra
 
Live Forensics
Live ForensicsLive Forensics
Live Forensics
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
 
Edrm
EdrmEdrm
Edrm
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Search Warrants
Search WarrantsSearch Warrants
Search Warrants
 
Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector Concerns
 
Sadfe2007
Sadfe2007Sadfe2007
Sadfe2007
 
Raidprep
RaidprepRaidprep
Raidprep
 
Networking Overview
Networking OverviewNetworking Overview
Networking Overview
 

Recently uploaded

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Computer searches uncover drugs, child porn, suicide

  • 1. Computer Searches Abigail Abraham Assistant State Attorney Cook County, Illinois Ivan Orton Sr. Deputy Prosecuting Attorney King County, Washington
  • 2. You Remember Law School Exams, Don’t You?
  • 3. You sign off on a routine drug warrant. Undercover says he bought drugs at the house you want to search. The warrant authorizes the seizure of drugs, records of drug transactions and evidence of dominion and control
  • 4. When search is executed of multi-room house, drugs are found in one bedroom. One computer is found in the living room and a second is found in a second bedroom. There is a small quantity of marijuana in the first bedroom.
  • 5. Upon your advice, the police seize the computers and the drugs and turn the computers over to private computer experts for examination. Because the experts are backed up with other computers, they don’t get to these two computers for two weeks.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. Possession with intent charges are filed against both occupants of the house. Sexual Exploitation of a Minor charges are filed against the owner of the house.
  • 12.
  • 13. Two days later the daughter of the tenant, whose emotional troubles were presented in the media in coverage of this case, commits suicide .
  • 14. The defense attorneys move to suppress all evidence found on both computers. In a separate civil action they bring an action for violation of the Privacy Protection Act, and the Electronic Communications Privacy Act.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20. Then you wake up in a cold sweat. The detective didn’t bring that warrant to you yesterday. He’s bringing it to you tomorrow. The rest of this presentation will be spent trying to help you avoid the mistakes made in this nightmare case.
  • 21. Disclaimer: The Judge’s rulings in this example are not necessarily accurate rulings.
  • 22. Searching and Seizing Electronic Evidence
  • 24. Role of Computer in Crime
  • 25. Our Primary Focus Today Suspect’s Computer where computer is a container of evidence
  • 26. We Will Also Examine the laws governing access to Third Party Computers where computer is a container of evidence
  • 27.
  • 29.
  • 34.  
  • 35.  
  • 36.  
  • 37.  
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61. What are you Searching For? INFORMATION
  • 62. Describe Evidence in Terms of Specific Records or Information
  • 63.
  • 64.
  • 65. Or, More Specifically The terms “records” and “information” include those items in whatever form and by whatever means they have been created or stored, including any electrical, electronic, or magnetic form (such as any information on an electronic or magnetic storage device, including floppy diskettes, hard disks, ZIP disks, CD-ROMs, optical discs, backup tapes, printer buffers, smart cards, memory calculators, pagers, personal digital assistants such as Palm Pilot computers, as well as printouts or readouts from any magnetic storage device); any handmade form (such as writing, drawing, painting); any mechanical form (such as printing or typing_: and any photographic form (such as microfilm, microfiche, prints, slides, negatives, videotapes, motion pictures, photocopies).
  • 66. Remember: You Can Defend the Search of a Computer Where the Warrant did not Specify Computer Records
  • 67.
  • 68.
  • 69.
  • 70.  
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.  
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.
  • 87.
  • 88.
  • 89.
  • 90.
  • 91.
  • 92.
  • 93.
  • 94.
  • 95.
  • 96.
  • 97.
  • 98.
  • 99.
  • 100.
  • 101.
  • 102.
  • 104.
  • 105.
  • 106.
  • 107.
  • 108.
  • 110.
  • 111.
  • 112.
  • 113.
  • 115.
  • 116.
  • 117.
  • 118.
  • 119.
  • 120.
  • 121.
  • 122.
  • 123.
  • 124.
  • 125.
  • 126.
  • 128.
  • 129. Subscriber / Account Information
  • 130.
  • 131.
  • 132.
  • 133.
  • 134.
  • 135.
  • 136.
  • 137.
  • 138.
  • 139. Outside The United States - an Example United States v. Vassili Gorschkov
  • 140.
  • 141.
  • 142.
  • 143.
  • 144.
  • 145.
  • 146.
  • 147.
  • 148.
  • 149.
  • 151.
  • 152.
  • 153.
  • 154.
  • 155.
  • 156.
  • 157.
  • 158.
  • 159.
  • 160.
  • 161.
  • 162.
  • 163.
  • 164.
  • 165. You Don’t Want to be the Prosecutor when . . .
  • 166.
  • 167.
  • 168.