A. DEFINITIONS
B. LIST OF COMPUTER SYSTEM COMPONENTS
C. DETERMINING THE COMPUTER'S ROLE IN THE OFFENSEA. SEARCH WARRANTS
B. PLAIN VIEW
C. EXIGENT CIRCUMSTANCES
D. BORDER SEARCHES
E. CONSENT SEARCHES1. Scope of the Consent
2. Third-Party Consenta. General Rules
b. Spouses
c. Parents
d. Employers
e. Networks: System AdministratorsF. INFORMANTS AND UNDERCOVER AGENTS
A. THE INDEPENDENT COMPONENT DOCTRINE
B. HARDWARE AS CONTRABAND OR FRUITS OF CRIME1. Authority for Seizing Contraband or Fruits of Crime
2. Contraband and Fruits of Crime DefinedC. HARDWARE AS AN INSTRUMENTALITY OF THE OFFENSE
1. Authority for Seizing Instrumentalities
2. Instrumentalities DefinedD. HARDWARE AS EVIDENCE OF AN OFFENSE
1. Authority for Seizing Evidence
2. Evidence DefinedE. TRANSPORTING HARDWARE FROM THE SCENE
IV. SEARCHING FOR AND SEIZING INFORMATION
A. INTRODUCTION
B. INFORMATION AS CONTRABAND
C. INFORMATION AS AN INSTRUMENTALITY
D. INFORMATION AS EVIDENCE1. Evidence of Identity
2. Specific Types of Evidencea. Hard Copy Printouts
b. Handwritten NotesE. PRIVILEGED AND CONFIDENTIAL INFORMATION
1. In GeneralF. UNDERSTANDING WHERE THE EVIDENCE MIGHT BE: STAND-ALONE PCs, NETWORKS AND FILE-SERVERS, BACKUPS, ELECTRONIC BULLETIN BOARDS, AND ELECTRONIC MAIL
1. Stand-Alone PCsa. Input/Output Devices: Do Monitors, Modems, Printers, and Keyboards
Ever Need to be Searched?
b. Routine Data Backups2. Networked PCs
G. SEARCHING FOR INFORMATION
1. Business Records and Other Documents
2. Data Created or Maintained by Targets
3. Limited Data Searches
4. Discovering the Unexpecteda. Items Different from the Description in the Warrant
b. EncryptionH. DECIDING WHETHER TO CONDUCT THE SEARCH ON-SITE OR TO REMOVE HARDWARE TO ANOTHER LOCATION
1. Seizing Computers because of the Volume of Evidencea. Broad Warrant Authorizes Voluminous Seizure of Documents
b. Warrant is Narrowly Drawn but Number of Document to be Sifted
through is Enormous
c. Warrant Executed in the Home
d. Applying Existing Rules to Computers2. Seizing Computers because of Technical Concerns
a. Conducting a Controlled Search to Avoid Destroying Data
b. Seizing Hardware and Documentation so the System Will Operate
at the LabI. EXPERT ASSISTANCE
1. Introduction
2. Finding Expertsa. Federal Sources
b. Private Experts(1) Professional Computer Organizations
(2) Universities
(3) Computer and Telecommunications Industry Personnel
(4) The Victim3. What the Experts Can Do
a. Search Planning and Execution
b. Electronic Analysis
c. Trial Preparation
d. Training for Field AgentsV. NETWORKS AND BULLETIN BOARDS
A. INTRODUCTION
B. THE PRIVACY PROTECTION ACT, 42 U.S.C. § 2000aa1. A Brief History of the Privacy Protection Act
2. Work Product Materials
3. Documentary Materials
4. Computer Searches and the Privacy Protection Acta. The Reasonable Belief Standard
b. Similar Form of Public Communication
c. Unique Problems: Unknown Targets and Commingled Materials5. Approval of Deputy Assistant Attorney General Required
C. STORED ELECTRONIC COMMUNICATIONS
A. DRAFTING A WARRANT TO SEIZE HARDWARE
B. DRAFTING A WARRANT TO SEIZE INFORMATION1. Describing the Place to be Searcheda. General Rule: Obtain a Second Warrant
b. Handling Multiple Sites within the Same District
c. Handling Multiple Sites in Different Districts
d. Information at an Unknown Site
e. Information/Devices Which Have Been Moved2. Describing the Items to be Seized
3. Removing Hardware to Search Off-Site: Ask th Magistrate for Explicit Permission.
4. Seeking Authority for a No-Knock WarrantA. INTRODUCTION
B. PROCEDURES FOR PRESERVING EVIDENCE1. Chain of Custody
2. Organization
3. Keeping Records
4. Returning Seized Computers and Materialsa. Federal Rules of Criminal Procedure: Rule 41(e)
b. Hardware
c. Documentation
d. Notes and Papers
e. Third-Party OwnersA. INTRODUCTION
B. THE BEST EVIDENCE RULE
C. AUTHENTICATING ELECTRONIC DOCUMENTS1. "Distinctive" Evidence
2. Chain of Custody
3. Electronic Processing of EvidenceD. THE HEARSAY RULE
IX. APPENDICES
APPENDIX A: SAMPLE COMPUTER LANGUAGE FOR SEARCH WARRANTS1. Tangible Objectsa. Justify Seizing the Objects
b. List and Describe the Objects(1) Hardware
(2) Software
(3) Documentation
(4) Passwords and Data Security Devices2. Information: Records, Documents, Data
a. Describe the Content of Records, Documents, or other Information
b. Describe the Form which the Relevant Information May Take
c. Electronic Mail: Searching and Seizing Data from a BBS Server under 18 U.S.C. § 2703(1) If All the E-Mail is Evidence of Crime
(2) If Some of the E-Mail is Evidence of Crime
(3) If None of the E-Mail is Evidence of Crimed. Ask Permission to Seize Storage Devices when Off-Site Search is Necessary
e. Ask Permission to Seize, Use, and Return Auxiliary Items, as Necessary
f. Data Analysis Techniques3. Stipulation for Returning Original Electronic Data
APPENDIX B: GLOSSARY
APPENDIX C: FEDERAL EXPERTS FOR COMPUTER CRIME INVESTIGATIONS
APPENDIX D: COMPUTER SEARCH AND SEIZURE WORKING GROUP
APPENDIX E: STATUTORY POPULAR NAME TABLE
APPENDIX F: TABLE OF AUTHORITIESCases
Statutes
Federal Rules
Federal Regulations
Legislative History
Reference Materials
Go to . . . CCIPS Home || Home Page