Searching and Seizing -- Warrants and Evidence 1 Computer Forensics BACS 371 1 Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal.

Slides:



Advertisements
Similar presentations
THE FOURTH AMENDMENT Constitutional Law.
Advertisements

The Law of Search Warrants. Where do the search & seizure rules come from?
PURPOSE OF THIS SECTION  HISTORY OF SEARCH WARRANTS  BASIC REQUIREMENTS FOR WRITING AND OBTAINING A SEARCH WARRANT IN OHIO.
A dialogue with FMUG: Sensitive Data & Filemaker MIT Policy and Data Classifications ** DRAFT ** Guidelines Feedback and Discussion Tim McGovern 2 June.
2 Language of Computer Crime Investigation
Criminal Procedure for the Criminal Justice Professional 11 th Edition John N. Ferdico Henry F. Fradella Christopher Totten Prepared by Tony Wolusky Criminal.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
Guide to Computer Forensics and Investigations, Second Edition
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
U.S criminal law’s reinforcement of technological measures protecting property: where the DMCA fits in Elliot N. Turrini Assistant U.S. Attorney Computer.
Legal Issues Computer Forensics COEN 252 Drama in Soviet Court. Post-Stalin (1955). Painted by Solodovnikov. Oil on Canvas, 110 x 130 cm.
Security, Privacy, and Ethics Online Computer Crimes.
Evidence Computer Forensics. Law Enforcement vs. Citizens  Search must have probable cause –4 th amendment search warrant  Private citizen not subject.
Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,
Computer Forensics Principles and Practices
1 Chapter 15 Search Warrants. 2 Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment The police must have “probable.
Applications with Warrants In Mind. The Law  Why are there laws specifically for computer crimes?  A persons reasonable right to privacy  The nature.
Chapter 17 Videotapes, Photographs, Documents, and Writings as Evidence.
NDSU RECORDS MANAGEMENT INITIATIVE December 2007 PowerPoint.
Chapter 3, Section 4 U.S. Government 2013
Legal Aspects of Criminal Investigation: Arrest, Search and Seizure
By Drudeisha Madhub Data Protection Commissioner Date:
Security+ All-In-One Edition Chapter 20 – Forensics Brian E. Brzezicki.
Discovering Computers Fundamentals, Third Edition CGS 1000 Introduction to Computers and Technology Fall 2006.
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
UNIT 5 AMERICAN GOVERNMENT. LESSON PAGES How do the 4 th and 5 th Amendments protect against unreasonable law enforcement procedures? Objective:
Guide to Computer Forensics and Investigations, Second Edition
Phases of Computer Forensics 1 Computer Forensics BACS Management Information Systems for the Information Age 5e, Haag, Cummings, McCubbrey, 2005,
Essential Computer Concepts
7. Legal. Topics Fourth Amendment E-Discovery Duty to Preserve Private Searches ECPA Searching With & Without a Warrant.
TC2-Computer Literacy Mr. Sencer February 3, 2010.
BUSINESS B1 Information Security.
CHAPTER 7 Storage Katie Moody Storage Storage holds data, instructions, and information for future use. Every computer uses storage to hold software.
Review of Exceptions to Warrant Rule Vehicles Open fields Anything with consent Abandoned property Inventory Plain view.
Investigating Cybercrime DATALAWS Information Technology Law Consultants Presented by F. F Akinsuyi (MSc, LLM)MBCS.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Implications of Information Technology for the Audit Process
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
U.S. Copyright Enforcement Benjamin Hardman Attorney / Advisor Office of Intellectual Property Policy & Enforcement, USPTO.
Electronic Evidence Admissibility Carmen R. Cintrón Ferrer, 2006, Derechos Reservados ISACA – San Juan Chapter, February Meeting.
Computer Forensics Principles and Practices
CLOUD COMPUTING Overview on cloud computing. Cloud vendors. Cloud computing is a type of internet based computing where we use a network of remote servers.
Chapter 2 Legal Aspects of Investigation © 2009 McGraw-Hill Higher Education. All rights reserved. LEARNING OBJECTIVES Explain the historical evolution.
Forensic and Investigative Accounting Chapter 9 Proper Evidence Management © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave. Chicago,
 What is the exclusionary rule  Explain stop and frisk  What is the plain view doctrine  What did Miranda v Arizona require police to do  What happens.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
Do Now: 1.When can an officer stop and frisk a person? Analyze the data on pg. 135 of your textbook. 2.What happens after charges are brought against an.
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
4 th Amendment: Search and Seizure. The Fourth Amendment to the U.S. Constitution protects personal privacy, and every citizen's right to be free from.
Computer Forensics BACS 371
Search Warrants. A search warrant… is a legal order, signed by a judge, allowing law enforcement to search a particular area or premises. Search warrants.
Chapter 12: Criminal Justice Process ~ The Investigation Objective: Student should be able to correlate how the constitution relates to an investigation.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION PRESENTED BY: JUDGE MARK A. SPEISER.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
File-System Management
Evidence Collection at the Crime Scene and Constitutional Law
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION
The University of Adelaide, School of Computer Science
Protection of CONSUMER information
Forensic and Investigative Accounting
Lesson # 7 A Practical Guide to Computer Forensics Investigations
Computer Forensics 1 1.
Search warrant Writing an Affidavit.
Chapter 3, Section 4 U.S. Government 2015
Chapter 17 Videotapes Photographs Documents Writings.
THE CRIMINAL JUSTICE PROCESS: THE INVESTIGATIVE PHASE
IA455 Chris Danieli and Zachary gibson
On-Site Investigations
Presentation transcript:

Searching and Seizing -- Warrants and Evidence 1 Computer Forensics BACS Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations, USDOJ/NIJ, Sections II and V,

Fundamentals of Warrants  Must Describe  Probable cause A reasonable belief that a person has committed a crime  Place to be searched, things to be seized Limited right to violate a person’s privacy

Four Steps for Successful Search and Seizure 1. Assemble a team consisting of the case agent, the prosecutor, and a technical expert as far in advance as possible 2. Learn as much as possible about the computer system that will be searched before devising a search strategy or drafting the warrant 3. Formulate a strategy for conduction the search (including a backup plan) based on the known information about the targeted computer system 4. Draft the warrant, taking special care to describe the object of the search and the property to be seized accurately, and particularly, and explain the possible search strategies in the supporting affidavit.

Basic Search Strategies 1. Search the computer and print out a hard copy of particular files at that time 2. Search the computer and make an electronic copy of particular files at that time 3. Create a duplicate electronic copy of the entire storage device on-site, and then later recreate a working copy of the storage device off-site for review 4. Seize the equipment, remove it from the premises, and review its contents off-site

When to Seize  Seize if…  The hardware is itself evidence, and instrumentality, contraband, or a fruit of the crime  But… When the hardware is not a stand-alone PC but part of a complicated network, and collateral damage to a legitimate business could result, may not want to seize  Generally, do not seize if…  The hardware is merely a storage device for evidence  But… Property used to commit an offense involving obscene material may be forfeited

Other Reasons to Seize  Seize only if a less intrusive alternative is infeasible  If agents suspect evidence is mislabeled, encrypted, stored in hidden directories, embedded in slack space, …  Uncommon Operating System  Suspected “booby traps”  Generally, pursue the quickest, least intrusive, and most direct search strategy consistent with securing evidence described in warrant

Privacy Protection Act (PPA)  Matters when search may result in seizure of 1 st Amendment materials (publishing, …)  “Congress probably intended the PPA to apply only when law enforcement intentionally targeted First Amendment material that related to a crime.”  Incidental seizure of PPA-protected material commingled on a suspect’s computer with evidence of a crime does not give rise to PPA liability.  However, subsequent search of such material was probably forbidden

Electronic Communications Privacy Act (ECPA)  Governs law enforcement access to contents of electronic communications stored by third party service providers  Prohibits unauthorized access to electronic or wire communications in “electronic storage”  ECPA is implicated only when law enforcement does not obtain a search warrant  Ordinarily served like subpoenas: Investigators transmit request for information to service providers

Other Warrant Issues  Multiple Warrants for Network Searches  No-Knock Warrants  Sneak-and-Peek Warrants  Privileged Documents

Drafting Warrant and Affidavit  Affidavit  A sworn statement that explains the basis for the affiant’s belief that the search is justified by probable cause  Warrant  Typically a one-page form, plus attachments, that describes the place to be searched, and the persons or things to be seized  Warrant must be executed within 10 days

Drafting the Warrant and Affidavit 1. Accurately and Particularly Describe the Property to be Seized in the Warrant  Specific enough to separate cited items from irrelevant ones  Not so broad as to include items which should not be seized  Hardware vs. Information 2. Establish Probable Cause in the Affidavit  A fair probability that contraband or evidence of crime will be found in the particular place to be searched 3. In the Affidavit Supporting the Warrant, Include an Explanation of the Search Strategy

Sample Warrant  All records relating to violations of 21 U.S.C. § 841 (a) (drug trafficking) and/or 21 U.S.C. § 846 (conspiracy to traffic drugs) involving [the suspect] since January 1, 1996, including lists of customers and related identifying information; types, amounts, and prices of drugs trafficked as well as dates, places, and amounts of specific transactions; any information related to sources of narcotic drugs (including names, addresses, phone numbers, or any other identifying information); any information recording [the suspect's] schedule or travel from 1995 to the present; all bank records, checks, credit card bills, account information, and other financial records.  The terms "records " and "information" include all of the foregoing items of evidence in whatever form and by whatever means they may have been created or stored, including any electrical, electronic, or magnetic form (such as any information on an electronic or magnetic storage device, including floppy diskettes, hard disks, ZIP disks, CD-ROMs, optical discs, backup tapes, printer buffers, smart cards, USB storage devices, memory calculators, pagers, personal digital assistants such as Palm Pilot computers, as well as printouts or readouts from any magnetic storage device); any handmade form (such as writing, drawing, painting); any mechanical form (such as printing or typing); and any photographic form (such as microfilm, microfiche, prints, slides, negatives, videotapes, motion pictures, photocopies).

Evidence  Potential Hearsay  “The hearsay rules exist to prevent unreliable out-of-court statements by human declarants from improperly influencing the outcomes of trials.”  Records containing only computer-generated data untouched by human hands cannot contain hearsay  Authentication  Must offer evidence “to support a finding that the [computer record or other evidence] in question is what its proponent claims.”  Circumstantial evidence generally provides the key to establishing the authorship and authenticity of a computer record  Best Evidence  “[i]f data are stored in a computer or similar device, any printout or other output readable by sight, shown to reflect the data accurately, is an ‘original.’”