Electronic Law and Evidence Flashcards

1
Q

EPO #1

How many consenting parties do you need to excuse T3 requirements?

A

One Parties consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

EPO #1

What devices are excluded from T3?

A

Beepers, transponders, and tone only pagers are excluded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

EPO #1

What type of device that is being used to intercept a “real time” requires a T3 order?

A

ANY device (even a cup against the wall) that is used to intercept a real time conversation requires a T3 order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

EPO #1

Does Video Only surveillance require a T3 order? Video Teleconferencing?

A

Video Only - NO T3

Video Teleconferencing - YES, need T3 when you add audio

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

EPO #1

What do you need in order to obtain a wiretap order?

A

Requires DOJ pre-approval and the order must be signed by a Real Judge (Not a Magistrate)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

EPO #2

What do you need to install a GPS/Tracking Device in someones car?

A

You need a Warrant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

EPO #2

What regulates installation and monitoring of Mobile Tracking Devices (GPS)?

A

The Fourth Amendment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

EPO #2

What do you need to track a package from room to room within someone’s house? Why do you need this?

A

Warrant

You need a Warrant because there is REP in the house

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

EPO #3

What governs/regulates Pen Registers and Trap & Trace Devices?

A

Statute - if you don’t get an order its a FELONY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

EPO #3

What document from court do you need to get a Pen Register? How long is it good for?

A

Court Order - Good for 60 days (can be signed by USMJ)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

EPO #3

What document from court do you need to get a Trap & Trace? How long is it good for?

A

Court Order - Good for 60 days (can be signed by USMJ)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

EPO #4

Do you need a T3 to get Video Only Surveillance?

A

NO, Video only excluded from T3, it is purely a 4th Amendment Issue based on REP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

EPO #4

What do you need to use Video Only Surveillance in an area of REP?

A

You need a Warrant per the Fourth Amendment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

EPO #4

What do you need, to install a device in an area of REP?

A

Search Warrant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

EPO #4

Do you need a warrant to put a camera in a non REP area?

A

NO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

EPO #5

What do you need if you want the “Content” of a stored communication?

A

Warrant

17
Q

EPO #5

What do you need to get “Transactional Stored Communications”?

A

2703(d) - Court Order

18
Q

EPO #5

What do you need to get “Basic Subscriber Info”.

A

Subpeona

19
Q

EPO #5

What do you need to prevent people from deleting emails while you are trying to get a warrant?

A

2703(f) - Preservation Order

20
Q

EPO #7
Person takes his computer to get fixed and the person fixing it finds child porn on the computer. Is there a Fourth Amendment issue?

A

NO, private searches not reguated by 4th Amend

21
Q

EPO #7
You as a LEO are searching a computer lawfully with a warrant looking for one thing. While you are looking for that one thing, you find child porn (not intent of the original search). Can you charge the person for child porn? Can you now search for child porn?

A

Yes, you can charge the person with child porn under plain view

You need to get a New Warrant if you want to continue searching for child porn on that computer

22
Q

EPO #7

Can you search the contents of a pager, SIA?

A

YES

23
Q

EPO #7
If you are in a suspect’s office and you see incriminating evidence on the computer screen and they start deleting it, what can you do? Based on what? Can you search that computer?

A

You can immediately seize the computer because it’s an exigent circumstance (destruction of evidence)

You can search the seized computer, but you need a Warrant

24
Q

EPO #8

What is the difference betwen a “data” search and a regular search for real evidence?

A

Only real difference is that you have to justify the off-site search where you seize it first and search it off-site

25
Q

EPO #8
Where can you get a warrant when you want to search/seize stored electronic communications that are stored in more than one district?

A

You can get a warrant from any court with jurisdiction over the offense (Multi-Jurisdictional Warrants)

26
Q

EPO #8

Can you get mult-jurisdictional warrants for communications (emails)?

A

YES

27
Q

EPO #8

Can you get mult-jurisdictional warrants for “data” (attached spreadsheets, etc)?

A

NO, you need a warrant per District of storage

28
Q

EPO #8
Can you search other media storage devices (CD’s, DVD’s, external hard drives, thumb drives, etc.) with your warrant to search the computer?

A

NO, you do NOT have authority to search these items, they must be specified in your warrant

29
Q

EPO #9

Do knock & announce rules (section 3109) apply to searches for data?

A

YES

30
Q

EPO #9

If you develope RS that suspect is about destroy computer files, do you still need to K&A?

A

NO, exigent circumstance for destroying evidence

31
Q

EPO #9

Does Section 3109 (Knock & Announce requirements) apply to searches of computers and searches of data?

A

YES

32
Q

EPO #9

Do you still need to comply with K&A (section 3109) if there is danger?

A

No, its an exception to K&A requirements

33
Q

EPO #10

Does data have to be “authenticated” like all other evidence? If so, how do you authenticate it?

A

Yes - must authenticate

You can authenticate in two ways:

  1. By showing files haven’t been altered since they were seized
  2. Proving Authorship (shown through circumstantial evidence, looking at who had access to the computer and who has passwords to protected files in the computer)