Module 3 - When Incidents Turn Criminal Flashcards

Upon the completion of this module students will be able to: Analyze running processes on a computer Apply legal considerations to an incident response scenario

1
Q

Legal Situations That May Occur During Review of Data in IR

A
  • violations of corporate policies / user agreements

- evidence of illegal activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

4th Amendment

A

Right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures… (from government, not LE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Lawful Search (3 types)

A
  • court order
  • consent
  • other legal exception exists
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Katz v. US

A

Unreasonable Searches:

search is constitutional if it does not violate a person’s “reasonable” or “legitimate” expectation of privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Container

A

Courts have differing opinions as to whether or not a computer’s hard drive is one container or a collection of containers. Impacts what may be searched.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Negation of Expectation of Privacy in Orgs (exceptions)

A
  • user policies
  • consent agreements
  • banner/click-through agreements
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

US v. Ziegler

A

Expectation of Privacy:
- private sector employers generally have broad authority to consent to searches in the workplace and this authority extends to workplace networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

US. V. Matlock

US V. Smith

A

Third Party Consent:

co-users of a computer will generally have the ability to consent to a search of its files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Trulock V. Freeh

A

Third Party Consent:
When an individual protects files with passwords and has not shared the passwords with others, who also use the computer, the Fourth Circuit has held that the authority of those other users to consent to search of the computer will not extend to the password-protected files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

People v. Ramey

A

Exigent circumstances exception to 4th amendment:

An emergency situation requiring swift action to prevent imminent danger to life or serious damage to property, or to forestall the imminent escape of a suspect, or destruction of evidence. There is no ready litmus test for determining whether such circumstances exist, and in each case the extraordinary situation must be measured by the facts known by officials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

United States v. Ross

A

Expectation of Privacy:

Because individuals generally retain a reasonable expectation of privacy in the contents of closed containers, they also generally retain a reasonable expectation of privacy in data held within electronic storage devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Abandoned / Orphaned Property

A

If computer equipment is abandoned or thrown out (in a location where the refuse container is out for pickup or disposal – a place where anyone can get to it), the expectation to privacy does not exist.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

US v. Jacobsen (1984)

A

Contraband:
The U.S. Supreme Court has held that there is no privacy interest in contraband.

Third Parties:
The Fourth Amendment “is wholly inapplicable to a search or seizure, even an unreasonable one, effected by a private individual not acting as an agent of the Government or with the participation or knowledge of any governmental official.” (Not criminally responsible for improper search)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

US v. Caymen (2005)

US v. Lyons (1993)

A

Contraband:
Individuals do not generally enjoy a reasonable expectation of privacy in the contents of computers they have stolen or obtained by fraud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

4th Amendment Rights and Individuals

A

Question of civil liability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

US v. Young (2003)

A

A third party may disclose the item or information to the government provided the third party has common authority over the item or information.

17
Q

Third Party significant factors (with regard to government)

A

timing (order of events)

relationship to authorities

18
Q

Sniffing network traffic

A

Question of whether there is an expectation of privacy for communication.

19
Q

Berger v. New York (1967)

A

Communication (sniffing):
Government acquisition of an intangible electronic signal in the course of transmission may also implicate the Fourth Amendment.

20
Q

Title III

A

Omnibus Crime Control and Safe Streets Act of 1968

Government can’t install sniffers everywhere.

21
Q

Private Companies and sniffers

A

Corporations typically have a “monitoring” clause in user agreements.
Network traffic should be done with permission and for a reason.

22
Q

Determining Reasonable Expectation of Privacy in Computers as Storage Devices

A

To determine whether an individual has a reasonable expectation of privacy in information stored in a computer, it is helpful to treat the computer like a closed container such as a briefcase or filling cabinet. The Fourth Amendment generally prohibits law enforcement from accessing and viewing information stored in a computer if it would be prohibited from opening a closed container and examining its contents in the same situation.

23
Q

Relinquishing Control

A

Individuals lose Fourth Amendment protection in their computer files if they relinquish control of the files.

24
Q

Exigent Circumstances (3 scenarios)

A
  • prevent imminent danger to life or serious damage to property
  • forestall the imminent escape of a suspect
  • destruction of evidence