SlideShare une entreprise Scribd logo
1  sur  72
Computer Crime and Digital Evidence Legal Issues Ivan Orton Complex Prosecutions & Investigations Division King County Prosecutor’s Office 500 Fourth Ave., Rm. 840 Seattle, WA  98104 [email_address] 206 296-9082
Legal Issues that Arise in Three Situations ,[object Object],[object Object],[object Object]
Fixing a Bad Warrant,  Already Executed
Legal Problems in Computer Searches ,[object Object],[object Object],[object Object],[object Object]
Legal Problems in Computer Searches (cont) ,[object Object],[object Object],[object Object],[object Object]
Legal Problems in Computer Searches ,[object Object]
General Search Law for Containers ,[object Object],[object Object],[object Object],[object Object]
It is axiomatic that when a search warrant properly describes the things to be searched and seized, it also authorizes law enforcement officers to search inside any container in which the items could reasonably be found. State v. Mazzaferro, Div I, 2007 UNPUBLISHED OPINION
The Grow House
The Card Reader
The Unpublished Opinions ,[object Object],[object Object]
Issues ,[object Object],[object Object]
Legal Problems in Computer Searches ,[object Object]
Legal Problems in Computer Searches ,[object Object]
Legal Problems in Computer Searches ,[object Object]
Content of the Affidavit: Issues ,[object Object]
Content of the Affidavit: Issues ,[object Object],[object Object]
Legal Problems in Computer Searches ,[object Object]
Consent Exception ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Password Protected Files … ,[object Object],[object Object],[object Object]
Workplace Searches
Facts  ,[object Object],[object Object],[object Object]
Evidence Suppressed?
More Facts  ,[object Object],[object Object],[object Object],[object Object]
Now Should Evidence be Suppressed?
4 th  Amendment Primer  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Difference between Public and Private Employer Searches  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Public Employer Searches  ,[object Object],[object Object],[object Object]
Public Employer Searches  ,[object Object],[object Object],[object Object]
Back to the Scenario What are the Issues  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Back to the Scenario What are the Issues  ,[object Object],[object Object]
Ziegler 1  ,[object Object],[object Object]
Remember O’Connor  ,[object Object],[object Object]
Was Ziegler Correctly Decided?  ,[object Object],[object Object],[object Object],[object Object]
Ziegler 2  ,[object Object],[object Object],[object Object]
Where Does that Leave Us?  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Refinement of Public Search Law  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Legal Problems in Computer Searches ,[object Object]
Legal Problems in Computer Searches (cont) ,[object Object]
Out of State Providers -  A New Law Requires compulsory process recipient to produce records within 20 days Applies to any person or corporation who has conducted business or engaged in transactions occurring at least in part in Washington Effective June 12 2008
Legal Problems in Computer Searches (cont) ,[object Object]
Time to Conduct Search ,[object Object],[object Object],[object Object],[object Object]
Time to Conduct Search ,[object Object],[object Object],[object Object],[object Object]
Time to Conduct Search ,[object Object],[object Object],[object Object],[object Object]
Time to Conduct Search ,[object Object],[object Object]
Time to Conduct Search ,[object Object],[object Object]
Time to Conduct Search Washington Court Rule CrR 2.3(c) [The warrant] shall command the officer to search, within a specified period of time not to exceed 10 days, the person, place, or thing named for the property or person specified.
Time to Conduct Search State v. Kern 81 Wn.App. 308 ,[object Object],[object Object],[object Object],[object Object]
Time to Conduct Search State v. Kern 81 Wn.App. 308 ,[object Object],[object Object],[object Object]
Time to Conduct Search  State v. Grenning COA No. 32426-1-II (Jan. 8, 2008) A forensic examination of information stored on copies of a hard drive may extend beyond the 10-day deadline specified in CrR 2.3(c), provided the computer is seized within the 10-day period. A delay in analyzing the information stored on a hard drive will only result in the suppression of evidence if:  (1) the delay caused a lapse in probable cause;  (2) it created unfair prejudice to the defendant; or  (3) officers acted in bad faith.
Tracing Electronic Communications ,[object Object],[object Object]
Fourth Amendment  US Constitution No Expectation of Privacy in Records Held by Third Parties U.S. v. Miller (1976)
WA Constitution Article One, Section 7 No person shall be disturbed in his private affairs or his home invaded without authority of law Broader than 4th Amendment U.S. v. Miller may not be law in Washington is not the
[object Object],Electronic Communications Privacy Act (ECPA),  Privacy Protection Act (PPA) and Washington’s Privacy Act
[object Object],[object Object],[object Object],[object Object],Electronic Communications Privacy Act
[object Object],[object Object],[object Object],[object Object],Privacy Protection Act
[object Object],[object Object],[object Object],Washington Privacy Act RCW 9.73
[object Object],[object Object],Search Warrant Law
E-Mail Spoofing ,[object Object],[object Object]
E-Mail Spoofing ,[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
E-Mail Spoofing ,[object Object],[object Object]
E-Mail Spoofing -  A More Sophisticated Method ,[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SpoofMail 1.17
SpoofMail 1.17 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SpoofMail 1.17
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Headers I Inserted Headers Servers Inserted
E-Mail Spoofing -  Other Sophisticated Methods ,[object Object],[object Object],[object Object]
Problems in Electronic Communications Cases ,[object Object]
Computer Trespass ,[object Object],[object Object]
Ivan Orton Complex Prosecutions & Investigations Division King County Prosecutor’s Office 500 Fourth Ave., Rm. 840 Seattle, WA  98104 [email_address] 206 296-9082

Contenu connexe

Tendances

Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)Brendan Kenny
 
Overview on Information Disclosure Statement Practice by Justin Cassell
Overview on Information Disclosure Statement Practice by Justin CassellOverview on Information Disclosure Statement Practice by Justin Cassell
Overview on Information Disclosure Statement Practice by Justin CassellWorkman Nydegger
 
Navigating the Patent Prosecution Highway
Navigating the Patent Prosecution HighwayNavigating the Patent Prosecution Highway
Navigating the Patent Prosecution HighwayWorkman Nydegger
 
NPE Patent Litigation Latest Developments
NPE Patent Litigation Latest DevelopmentsNPE Patent Litigation Latest Developments
NPE Patent Litigation Latest DevelopmentsParsons Behle & Latimer
 
Westlaw General Legal Overview
Westlaw General Legal OverviewWestlaw General Legal Overview
Westlaw General Legal OverviewHVCClibrary
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industryjamiehaworth1
 
Pitfalls to be Aware of When Working with Inventions Funded Through Governmen...
Pitfalls to be Aware of When Working with Inventions Funded Through Governmen...Pitfalls to be Aware of When Working with Inventions Funded Through Governmen...
Pitfalls to be Aware of When Working with Inventions Funded Through Governmen...Workman Nydegger
 
Identity and Eligibility Confirmation - E-Verify and Other Tools
Identity and Eligibility Confirmation - E-Verify and Other ToolsIdentity and Eligibility Confirmation - E-Verify and Other Tools
Identity and Eligibility Confirmation - E-Verify and Other ToolsImperative Information Group
 

Tendances (8)

Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)
 
Overview on Information Disclosure Statement Practice by Justin Cassell
Overview on Information Disclosure Statement Practice by Justin CassellOverview on Information Disclosure Statement Practice by Justin Cassell
Overview on Information Disclosure Statement Practice by Justin Cassell
 
Navigating the Patent Prosecution Highway
Navigating the Patent Prosecution HighwayNavigating the Patent Prosecution Highway
Navigating the Patent Prosecution Highway
 
NPE Patent Litigation Latest Developments
NPE Patent Litigation Latest DevelopmentsNPE Patent Litigation Latest Developments
NPE Patent Litigation Latest Developments
 
Westlaw General Legal Overview
Westlaw General Legal OverviewWestlaw General Legal Overview
Westlaw General Legal Overview
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industry
 
Pitfalls to be Aware of When Working with Inventions Funded Through Governmen...
Pitfalls to be Aware of When Working with Inventions Funded Through Governmen...Pitfalls to be Aware of When Working with Inventions Funded Through Governmen...
Pitfalls to be Aware of When Working with Inventions Funded Through Governmen...
 
Identity and Eligibility Confirmation - E-Verify and Other Tools
Identity and Eligibility Confirmation - E-Verify and Other ToolsIdentity and Eligibility Confirmation - E-Verify and Other Tools
Identity and Eligibility Confirmation - E-Verify and Other Tools
 

En vedette

Vista Forensics
Vista ForensicsVista Forensics
Vista ForensicsCTIN
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaCTIN
 
Sadfe2007
Sadfe2007Sadfe2007
Sadfe2007CTIN
 
Edrm
EdrmEdrm
EdrmCTIN
 
Nra
NraNra
NraCTIN
 
CyberCrime
CyberCrimeCyberCrime
CyberCrimeCTIN
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityCTIN
 
Search Warrants
Search WarrantsSearch Warrants
Search WarrantsCTIN
 
Live Forensics
Live ForensicsLive Forensics
Live ForensicsCTIN
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsCTIN
 
Mac Forensics
Mac ForensicsMac Forensics
Mac ForensicsCTIN
 
Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drivesCTIN
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicCTIN
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011CTIN
 
Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4CTIN
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3CTIN
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3CTIN
 
Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source ForensicsCTIN
 
Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector ConcernsCTIN
 

En vedette (19)

Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troyla
 
Sadfe2007
Sadfe2007Sadfe2007
Sadfe2007
 
Edrm
EdrmEdrm
Edrm
 
Nra
NraNra
Nra
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
 
Search Warrants
Search WarrantsSearch Warrants
Search Warrants
 
Live Forensics
Live ForensicsLive Forensics
Live Forensics
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows Systems
 
Mac Forensics
Mac ForensicsMac Forensics
Mac Forensics
 
Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drives
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-public
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011
 
Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
 
Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source Forensics
 
Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector Concerns
 

Similaire à Computer Searchs, Electronic Communication, Computer Trespass

Nac 1 21 03
Nac 1 21 03Nac 1 21 03
Nac 1 21 03CTIN
 
Darren Chaker Computer Search Warrant
Darren Chaker Computer Search WarrantDarren Chaker Computer Search Warrant
Darren Chaker Computer Search WarrantDarren Chaker
 
1Figures title5Civil Liberties and the Supreme Court.docx
1Figures title5Civil Liberties and the Supreme Court.docx1Figures title5Civil Liberties and the Supreme Court.docx
1Figures title5Civil Liberties and the Supreme Court.docxdrennanmicah
 
public and private sectors.pptx
public and private sectors.pptxpublic and private sectors.pptx
public and private sectors.pptxvenu154151
 
Evolving Issues in Workplace Privacy
Evolving Issues in Workplace PrivacyEvolving Issues in Workplace Privacy
Evolving Issues in Workplace Privacymkeane
 
you have learned what digital evidence is, not in the physical s.docx
you have learned what digital evidence is, not in the physical s.docxyou have learned what digital evidence is, not in the physical s.docx
you have learned what digital evidence is, not in the physical s.docxlaquandabignell
 
Information and administration
Information and administrationInformation and administration
Information and administrationtaratoot
 
Fingerprints, Passcodes, and Self Incrimination - BSides Nova
Fingerprints, Passcodes, and Self Incrimination - BSides NovaFingerprints, Passcodes, and Self Incrimination - BSides Nova
Fingerprints, Passcodes, and Self Incrimination - BSides NovaWendy Knox Everette
 
The Fourth Amendment Explained
The Fourth Amendment ExplainedThe Fourth Amendment Explained
The Fourth Amendment ExplainedJeremy Duncan
 
Responding to Grand Jury: Subpoenas & Search Warrants
Responding to Grand Jury: Subpoenas & Search WarrantsResponding to Grand Jury: Subpoenas & Search Warrants
Responding to Grand Jury: Subpoenas & Search WarrantsNexsen Pruet
 
NEWBIE LITIGATOR SCHOOL - Part I 2022 - The Federal Rules of Civil Procedure
NEWBIE LITIGATOR SCHOOL - Part I 2022 - The Federal Rules of Civil ProcedureNEWBIE LITIGATOR SCHOOL - Part I 2022 - The Federal Rules of Civil Procedure
NEWBIE LITIGATOR SCHOOL - Part I 2022 - The Federal Rules of Civil ProcedureFinancial Poise
 
Paper #1Reasonable Expectation of PrivacyIn this discussion,.docx
Paper #1Reasonable Expectation of PrivacyIn this discussion,.docxPaper #1Reasonable Expectation of PrivacyIn this discussion,.docx
Paper #1Reasonable Expectation of PrivacyIn this discussion,.docxsmile790243
 
Electronic Document Retention And Legal Holds
Electronic Document Retention And Legal HoldsElectronic Document Retention And Legal Holds
Electronic Document Retention And Legal HoldsJohn Jablonski
 
The Federal Rules of Civil Procedure (Series: Newbie Litigator School)
The Federal Rules of Civil Procedure (Series: Newbie Litigator School)The Federal Rules of Civil Procedure (Series: Newbie Litigator School)
The Federal Rules of Civil Procedure (Series: Newbie Litigator School)Financial Poise
 
In-House Counsel's Role in Avoiding Willful Patent Infringement
In-House Counsel's Role in Avoiding Willful Patent InfringementIn-House Counsel's Role in Avoiding Willful Patent Infringement
In-House Counsel's Role in Avoiding Willful Patent InfringementTim Hsieh
 
Ch 15 Search and Seizure
Ch 15 Search and SeizureCh 15 Search and Seizure
Ch 15 Search and Seizurerharrisonaz
 

Similaire à Computer Searchs, Electronic Communication, Computer Trespass (20)

Nac 1 21 03
Nac 1 21 03Nac 1 21 03
Nac 1 21 03
 
Darren Chaker Computer Search Warrant
Darren Chaker Computer Search WarrantDarren Chaker Computer Search Warrant
Darren Chaker Computer Search Warrant
 
An Encyclopedia of Wiretaps
An Encyclopedia of WiretapsAn Encyclopedia of Wiretaps
An Encyclopedia of Wiretaps
 
1Figures title5Civil Liberties and the Supreme Court.docx
1Figures title5Civil Liberties and the Supreme Court.docx1Figures title5Civil Liberties and the Supreme Court.docx
1Figures title5Civil Liberties and the Supreme Court.docx
 
public and private sectors.pptx
public and private sectors.pptxpublic and private sectors.pptx
public and private sectors.pptx
 
Evolving Issues in Workplace Privacy
Evolving Issues in Workplace PrivacyEvolving Issues in Workplace Privacy
Evolving Issues in Workplace Privacy
 
2009 case law overview
2009 case law overview2009 case law overview
2009 case law overview
 
you have learned what digital evidence is, not in the physical s.docx
you have learned what digital evidence is, not in the physical s.docxyou have learned what digital evidence is, not in the physical s.docx
you have learned what digital evidence is, not in the physical s.docx
 
Information and administration
Information and administrationInformation and administration
Information and administration
 
Fingerprints, Passcodes, and Self Incrimination - BSides Nova
Fingerprints, Passcodes, and Self Incrimination - BSides NovaFingerprints, Passcodes, and Self Incrimination - BSides Nova
Fingerprints, Passcodes, and Self Incrimination - BSides Nova
 
The Fourth Amendment Explained
The Fourth Amendment ExplainedThe Fourth Amendment Explained
The Fourth Amendment Explained
 
Responding to Grand Jury: Subpoenas & Search Warrants
Responding to Grand Jury: Subpoenas & Search WarrantsResponding to Grand Jury: Subpoenas & Search Warrants
Responding to Grand Jury: Subpoenas & Search Warrants
 
3170725_Unit-5.pptx
3170725_Unit-5.pptx3170725_Unit-5.pptx
3170725_Unit-5.pptx
 
NEWBIE LITIGATOR SCHOOL - Part I 2022 - The Federal Rules of Civil Procedure
NEWBIE LITIGATOR SCHOOL - Part I 2022 - The Federal Rules of Civil ProcedureNEWBIE LITIGATOR SCHOOL - Part I 2022 - The Federal Rules of Civil Procedure
NEWBIE LITIGATOR SCHOOL - Part I 2022 - The Federal Rules of Civil Procedure
 
Paper #1Reasonable Expectation of PrivacyIn this discussion,.docx
Paper #1Reasonable Expectation of PrivacyIn this discussion,.docxPaper #1Reasonable Expectation of PrivacyIn this discussion,.docx
Paper #1Reasonable Expectation of PrivacyIn this discussion,.docx
 
Electronic Document Retention And Legal Holds
Electronic Document Retention And Legal HoldsElectronic Document Retention And Legal Holds
Electronic Document Retention And Legal Holds
 
The Federal Rules of Civil Procedure (Series: Newbie Litigator School)
The Federal Rules of Civil Procedure (Series: Newbie Litigator School)The Federal Rules of Civil Procedure (Series: Newbie Litigator School)
The Federal Rules of Civil Procedure (Series: Newbie Litigator School)
 
In-House Counsel's Role in Avoiding Willful Patent Infringement
In-House Counsel's Role in Avoiding Willful Patent InfringementIn-House Counsel's Role in Avoiding Willful Patent Infringement
In-House Counsel's Role in Avoiding Willful Patent Infringement
 
Ch 15 Search and Seizure
Ch 15 Search and SeizureCh 15 Search and Seizure
Ch 15 Search and Seizure
 
Itet3 its forensics
Itet3 its forensicsItet3 its forensics
Itet3 its forensics
 

Plus de CTIN

Raidprep
RaidprepRaidprep
RaidprepCTIN
 
Networking Overview
Networking OverviewNetworking Overview
Networking OverviewCTIN
 
M Compevid
M CompevidM Compevid
M CompevidCTIN
 
L Scope
L ScopeL Scope
L ScopeCTIN
 
Level1 Part8 End Of The Day
Level1 Part8 End Of The DayLevel1 Part8 End Of The Day
Level1 Part8 End Of The DayCTIN
 
Law Enforcement Role In Computing
Law Enforcement Role In ComputingLaw Enforcement Role In Computing
Law Enforcement Role In ComputingCTIN
 
Level1 Part7 Basic Investigations
Level1 Part7 Basic InvestigationsLevel1 Part7 Basic Investigations
Level1 Part7 Basic InvestigationsCTIN
 
K Ai
K AiK Ai
K AiCTIN
 
July132000
July132000July132000
July132000CTIN
 
Investigative Team
Investigative TeamInvestigative Team
Investigative TeamCTIN
 
Introduction To Unix
Introduction To UnixIntroduction To Unix
Introduction To UnixCTIN
 

Plus de CTIN (11)

Raidprep
RaidprepRaidprep
Raidprep
 
Networking Overview
Networking OverviewNetworking Overview
Networking Overview
 
M Compevid
M CompevidM Compevid
M Compevid
 
L Scope
L ScopeL Scope
L Scope
 
Level1 Part8 End Of The Day
Level1 Part8 End Of The DayLevel1 Part8 End Of The Day
Level1 Part8 End Of The Day
 
Law Enforcement Role In Computing
Law Enforcement Role In ComputingLaw Enforcement Role In Computing
Law Enforcement Role In Computing
 
Level1 Part7 Basic Investigations
Level1 Part7 Basic InvestigationsLevel1 Part7 Basic Investigations
Level1 Part7 Basic Investigations
 
K Ai
K AiK Ai
K Ai
 
July132000
July132000July132000
July132000
 
Investigative Team
Investigative TeamInvestigative Team
Investigative Team
 
Introduction To Unix
Introduction To UnixIntroduction To Unix
Introduction To Unix
 

Dernier

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Dernier (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Computer Searchs, Electronic Communication, Computer Trespass

  • 1. Computer Crime and Digital Evidence Legal Issues Ivan Orton Complex Prosecutions & Investigations Division King County Prosecutor’s Office 500 Fourth Ave., Rm. 840 Seattle, WA 98104 [email_address] 206 296-9082
  • 2.
  • 3. Fixing a Bad Warrant, Already Executed
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. It is axiomatic that when a search warrant properly describes the things to be searched and seized, it also authorizes law enforcement officers to search inside any container in which the items could reasonably be found. State v. Mazzaferro, Div I, 2007 UNPUBLISHED OPINION
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 22.
  • 24.
  • 25. Now Should Evidence be Suppressed?
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40. Out of State Providers - A New Law Requires compulsory process recipient to produce records within 20 days Applies to any person or corporation who has conducted business or engaged in transactions occurring at least in part in Washington Effective June 12 2008
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47. Time to Conduct Search Washington Court Rule CrR 2.3(c) [The warrant] shall command the officer to search, within a specified period of time not to exceed 10 days, the person, place, or thing named for the property or person specified.
  • 48.
  • 49.
  • 50. Time to Conduct Search State v. Grenning COA No. 32426-1-II (Jan. 8, 2008) A forensic examination of information stored on copies of a hard drive may extend beyond the 10-day deadline specified in CrR 2.3(c), provided the computer is seized within the 10-day period. A delay in analyzing the information stored on a hard drive will only result in the suppression of evidence if: (1) the delay caused a lapse in probable cause; (2) it created unfair prejudice to the defendant; or (3) officers acted in bad faith.
  • 51.
  • 52. Fourth Amendment US Constitution No Expectation of Privacy in Records Held by Third Parties U.S. v. Miller (1976)
  • 53. WA Constitution Article One, Section 7 No person shall be disturbed in his private affairs or his home invaded without authority of law Broader than 4th Amendment U.S. v. Miller may not be law in Washington is not the
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 66.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72. Ivan Orton Complex Prosecutions & Investigations Division King County Prosecutor’s Office 500 Fourth Ave., Rm. 840 Seattle, WA 98104 [email_address] 206 296-9082