View Full Document

Applications with Warrants in Mind



View the full content.
View Full Document
View Full Document

1 views

Unformatted text preview:

Applications with Warrants In Mind The Law Why are there laws specifically for computer crimes A persons reasonable right to privacy The nature of computers and electronics Probable cause Search and Seizure Basically identical to previous laws with exceptions to the actual allowable procedure for searching and or seizing In both cases a warrant must be obtained before searching and seizing but the conditions for each are different The exemption to a warrant is probable cause but this is difficult for electronics The Process QuickTime and a TIFF Uncompressed decompressor are needed to see this picture Crime is suspected Suspects are watched Their system is qualitatively analyzed When enough substantial evidence is acquired a warrant is requested and granted by a magistrate judge They go to physically analyze the system Important things to Think about The criminal computers are in most cases standard PC s or laptops but also are many times servers It is important to know what OS the machine is running Is the machine booby trapped Where should I look for data QuickTime and a TIFF Uncompressed decompressor are needed to see this picture The File System Are the desired files hidden within other data types Could the files be in hidden invisible directories What programs could be running Is there a program set to wipe the whole drive upon boot up if a special password or key is not entered Time constraints How long will it take to get the warrant With proper evidence it should not take long How long will the warrant last Usually the warrant will last about a month How long is too long to hold on to a suspects computer Depends on the nature and size of system Analyzing the Evidence Much of the work in analyzing a system is hardware related In most cases the first thing to do is make a copy of the hard drive Once a hard copy is made they data can be sorted with out worry of contamination They use hard drive duplicators QuickTime and a TIFF Uncompressed decompressor are



Access the best Study Guides, Lecture Notes and Practice Exams

Loading Unlocking...
Login

Join to view Applications with Warrants in Mind and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Applications with Warrants in Mind and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?