Upgrade to remove ads
digital age crime and terrorism
Terms in this set (32)
protects against unreasonable search and seizure
info leveraged in an attempt to pick people and events within within time and space to establish casualty for criminal incidents
types of evidence
fruits of crime- stolen computers
tool of criminal activity- hacking counterfeit documents
repository of incriminating evidence- drug records, meth
repository contraband- items hidden under different names
unwitting record of criminal activity- email records, browsing history
digital evidence category
"information and data of value to an investigation that is stored on, received, or transmitted by an electronic device"
examples of digital evidence
all manuals for software
printers and scanners
cameras, video and audio recording devices
probable cause elements
a crime has been committed
evidence of the crime exists
the evidence presently exists in the place to be searched
four corners rule
if not written within the four corners of the affidavit of probable cause then it did not happen; does not exist; is not a fact
power of the court to decide a matter in question
suppression of evidence
evidence obtained as a result of the excluded items should be suppressed and not used in trial
rules for search warrant
a search warrant is only valid for 48 hours unless special circumstances exist and a judge gives an extension.
search warrants must be served during daylight hours between 6am-10pm unless special circumstances and authorized by a judge.
rules for a consent search
must be knowingly and voluntary
must not be coerced by police; coercion may not be real or implied, physical or psychological; no promises or threats
exigent circumstance doctrine
allows law enforcement officers to search and/or seize evidence without a warrant if they have probable cause and there is a pressing need to preserve evidence that is in danger of being destroyed or corrupted.
fruit of the poisonous tree doctrine
other pieces of evidence gained during a flawed search, based upon the exclusionary rule, may be excluded.
courts have recognized the need to allow for border searches that are more intrusive that would be allowed in other locations.
border patrol can seize any electronic device at the border and provide a receipt to the individual, returning it at a later date if it contains no contraband.
most commonly used warrantless searches used by law enforcement.
valid consent to search allows officer to search for any item within the scope of consent.
officer writes the consent form with all details and the individual signs it prior to the search.
chain of custody
assures that digital evidence has been preserved in its original form.
this entails being able to document when the evidence was collected and where it was collected from, who owned the device, and who had access to it.
it also entails how the evidence is stored.
involves documenting how the evidence was stored, who has handled the evidence, and who had access.
exists to prevent unreliable out of court statements by people from influencing the outcomes of trials.
when a computer record contains the assertion of a person, the record can contain hearsay.
best evidence rule
states that to prove the content of a writing, recoding, or photograph, the "original" writing, recording, or photograph is originally required.
an accurate printout of computer data always satisfies the best evidence rule.
challenges to authenticity
question whether the records were altered, manipulated, or damaged after they were created.
challenged the reliability of the computer program that generated the records.
challenge the authenticity of computer stored records by questioning the identity of their author.
national security agency
responsible for designing and maintaining computerized coding systems designed to protect the integrity of US info systems.
It is the lead agencies responsible for monitoring and protecting all of the federal governments computer networks from acts of cyberterrorism.
protection of the united states from cyber based attacks and high technology crimes is its third priority behind the only terror and foreign intelligence.
improves info sharing among federal law enforcement agencies.
consolidated a host of over 100 federal offices.
Increases interagency coordination in the fight against domestic terror.
safeguards the nations financial payment system against fraud and counterfeit financial instruments.
has primary jurisdiction in cases involving access device fraud, and in the investigation of computer fraud relating to computers and computer systems of "federal interest"
department of justice
DOJ is headed by the chief of law enforcement officer of the federal government- the attorney general.
attorney general oversees the administration of justice on the federal level.
houses the criminal divisions computer crime intellectual property section.
federal trade commission
the federal governments primary mechanism for protecting consumer markets.
department of energy
main responsibilities revolve around domestic energy production, conservation and efficiency
US postal inspection service
provide business with a safe venue for exchange of funds and securities and provides private citizens a safe secure way to transmit correspondence.
investigate postal offenses and civil matters related to postal service. it frequently conducts joint investigations with other federal agencies.
a program designed to facilitate the exchange of information among several institutions and agencies. Begun in 1998, this is a network of private and public sector partners who work together to identify and solve technical problems within critical computer infra structures.
centralized database of identity theft complaints used to compile statistics regarding the incidence of identity theft.
to arrest and prosecute those who sell and distribute counterfeit pharmaceuticals and controlled substances over the internet.
what are four "critical needs" at the state and law enforcement level regarding the investigation of cybercrime?**
3. updated criminal codes (laws) designed to complement current enforcement efforts
4. resources of tapping federal expertise and equipment related to computer crime enforcement
This set is often in folders with...
Digital Age Crime and Terrorism
You might also like...
Chapter 1: Understanding the Digital Forensics Pro…
Forensics Exam 1 - Quiz 5
Computer forensics - Chapter 1
Other Quizlet sets
STATS test 1
Constitution/Constitutional Convention Test 3/20/1…
COMM R110 - Quiz 4 Sections 3.2-3.6, COMM R110 - Q…
Strength of Materials Final