SlideShare ist ein Scribd-Unternehmen logo
1 von 72
Computer Crime and Digital Evidence Legal Issues Ivan Orton Complex Prosecutions & Investigations Division King County Prosecutor’s Office 500 Fourth Ave., Rm. 840 Seattle, WA  98104 [email_address] 206 296-9082
Legal Issues that Arise in Three Situations ,[object Object],[object Object],[object Object]
Fixing a Bad Warrant,  Already Executed
Legal Problems in Computer Searches ,[object Object],[object Object],[object Object],[object Object]
Legal Problems in Computer Searches (cont) ,[object Object],[object Object],[object Object],[object Object]
Legal Problems in Computer Searches ,[object Object]
General Search Law for Containers ,[object Object],[object Object],[object Object],[object Object]
It is axiomatic that when a search warrant properly describes the things to be searched and seized, it also authorizes law enforcement officers to search inside any container in which the items could reasonably be found. State v. Mazzaferro, Div I, 2007 UNPUBLISHED OPINION
The Grow House
The Card Reader
The Unpublished Opinions ,[object Object],[object Object]
Issues ,[object Object],[object Object]
Legal Problems in Computer Searches ,[object Object]
Legal Problems in Computer Searches ,[object Object]
Legal Problems in Computer Searches ,[object Object]
Content of the Affidavit: Issues ,[object Object]
Content of the Affidavit: Issues ,[object Object],[object Object]
Legal Problems in Computer Searches ,[object Object]
Consent Exception ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Password Protected Files … ,[object Object],[object Object],[object Object]
Workplace Searches
Facts  ,[object Object],[object Object],[object Object]
Evidence Suppressed?
More Facts  ,[object Object],[object Object],[object Object],[object Object]
Now Should Evidence be Suppressed?
4 th  Amendment Primer  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Difference between Public and Private Employer Searches  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Public Employer Searches  ,[object Object],[object Object],[object Object]
Public Employer Searches  ,[object Object],[object Object],[object Object]
Back to the Scenario What are the Issues  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Back to the Scenario What are the Issues  ,[object Object],[object Object]
Ziegler 1  ,[object Object],[object Object]
Remember O’Connor  ,[object Object],[object Object]
Was Ziegler Correctly Decided?  ,[object Object],[object Object],[object Object],[object Object]
Ziegler 2  ,[object Object],[object Object],[object Object]
Where Does that Leave Us?  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Refinement of Public Search Law  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Legal Problems in Computer Searches ,[object Object]
Legal Problems in Computer Searches (cont) ,[object Object]
Out of State Providers -  A New Law Requires compulsory process recipient to produce records within 20 days Applies to any person or corporation who has conducted business or engaged in transactions occurring at least in part in Washington Effective June 12 2008
Legal Problems in Computer Searches (cont) ,[object Object]
Time to Conduct Search ,[object Object],[object Object],[object Object],[object Object]
Time to Conduct Search ,[object Object],[object Object],[object Object],[object Object]
Time to Conduct Search ,[object Object],[object Object],[object Object],[object Object]
Time to Conduct Search ,[object Object],[object Object]
Time to Conduct Search ,[object Object],[object Object]
Time to Conduct Search Washington Court Rule CrR 2.3(c) [The warrant] shall command the officer to search, within a specified period of time not to exceed 10 days, the person, place, or thing named for the property or person specified.
Time to Conduct Search State v. Kern 81 Wn.App. 308 ,[object Object],[object Object],[object Object],[object Object]
Time to Conduct Search State v. Kern 81 Wn.App. 308 ,[object Object],[object Object],[object Object]
Time to Conduct Search  State v. Grenning COA No. 32426-1-II (Jan. 8, 2008) A forensic examination of information stored on copies of a hard drive may extend beyond the 10-day deadline specified in CrR 2.3(c), provided the computer is seized within the 10-day period. A delay in analyzing the information stored on a hard drive will only result in the suppression of evidence if:  (1) the delay caused a lapse in probable cause;  (2) it created unfair prejudice to the defendant; or  (3) officers acted in bad faith.
Tracing Electronic Communications ,[object Object],[object Object]
Fourth Amendment  US Constitution No Expectation of Privacy in Records Held by Third Parties U.S. v. Miller (1976)
WA Constitution Article One, Section 7 No person shall be disturbed in his private affairs or his home invaded without authority of law Broader than 4th Amendment U.S. v. Miller may not be law in Washington is not the
[object Object],Electronic Communications Privacy Act (ECPA),  Privacy Protection Act (PPA) and Washington’s Privacy Act
[object Object],[object Object],[object Object],[object Object],Electronic Communications Privacy Act
[object Object],[object Object],[object Object],[object Object],Privacy Protection Act
[object Object],[object Object],[object Object],Washington Privacy Act RCW 9.73
[object Object],[object Object],Search Warrant Law
E-Mail Spoofing ,[object Object],[object Object]
E-Mail Spoofing ,[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
E-Mail Spoofing ,[object Object],[object Object]
E-Mail Spoofing -  A More Sophisticated Method ,[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SpoofMail 1.17
SpoofMail 1.17 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SpoofMail 1.17
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Headers I Inserted Headers Servers Inserted
E-Mail Spoofing -  Other Sophisticated Methods ,[object Object],[object Object],[object Object]
Problems in Electronic Communications Cases ,[object Object]
Computer Trespass ,[object Object],[object Object]
Ivan Orton Complex Prosecutions & Investigations Division King County Prosecutor’s Office 500 Fourth Ave., Rm. 840 Seattle, WA  98104 [email_address] 206 296-9082

Weitere ähnliche Inhalte

Was ist angesagt?

Westlaw General Legal Overview
Westlaw General Legal OverviewWestlaw General Legal Overview
Westlaw General Legal Overview
HVCClibrary
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industry
jamiehaworth1
 
Identity and Eligibility Confirmation - E-Verify and Other Tools
Identity and Eligibility Confirmation - E-Verify and Other ToolsIdentity and Eligibility Confirmation - E-Verify and Other Tools
Identity and Eligibility Confirmation - E-Verify and Other Tools
Imperative Information Group
 

Was ist angesagt? (8)

Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)
 
Overview on Information Disclosure Statement Practice by Justin Cassell
Overview on Information Disclosure Statement Practice by Justin CassellOverview on Information Disclosure Statement Practice by Justin Cassell
Overview on Information Disclosure Statement Practice by Justin Cassell
 
Navigating the Patent Prosecution Highway
Navigating the Patent Prosecution HighwayNavigating the Patent Prosecution Highway
Navigating the Patent Prosecution Highway
 
NPE Patent Litigation Latest Developments
NPE Patent Litigation Latest DevelopmentsNPE Patent Litigation Latest Developments
NPE Patent Litigation Latest Developments
 
Westlaw General Legal Overview
Westlaw General Legal OverviewWestlaw General Legal Overview
Westlaw General Legal Overview
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industry
 
Pitfalls to be Aware of When Working with Inventions Funded Through Governmen...
Pitfalls to be Aware of When Working with Inventions Funded Through Governmen...Pitfalls to be Aware of When Working with Inventions Funded Through Governmen...
Pitfalls to be Aware of When Working with Inventions Funded Through Governmen...
 
Identity and Eligibility Confirmation - E-Verify and Other Tools
Identity and Eligibility Confirmation - E-Verify and Other ToolsIdentity and Eligibility Confirmation - E-Verify and Other Tools
Identity and Eligibility Confirmation - E-Verify and Other Tools
 

Andere mochten auch

Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
CTIN
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troyla
CTIN
 
Sadfe2007
Sadfe2007Sadfe2007
Sadfe2007
CTIN
 
Edrm
EdrmEdrm
Edrm
CTIN
 
Nra
NraNra
Nra
CTIN
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
CTIN
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
CTIN
 
Search Warrants
Search WarrantsSearch Warrants
Search Warrants
CTIN
 
Live Forensics
Live ForensicsLive Forensics
Live Forensics
CTIN
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows Systems
CTIN
 
Mac Forensics
Mac ForensicsMac Forensics
Mac Forensics
CTIN
 
Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drives
CTIN
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-public
CTIN
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011
CTIN
 
Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4
CTIN
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3
CTIN
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
CTIN
 
Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source Forensics
CTIN
 
Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector Concerns
CTIN
 

Andere mochten auch (19)

Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troyla
 
Sadfe2007
Sadfe2007Sadfe2007
Sadfe2007
 
Edrm
EdrmEdrm
Edrm
 
Nra
NraNra
Nra
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
 
Search Warrants
Search WarrantsSearch Warrants
Search Warrants
 
Live Forensics
Live ForensicsLive Forensics
Live Forensics
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows Systems
 
Mac Forensics
Mac ForensicsMac Forensics
Mac Forensics
 
Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drives
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-public
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011
 
Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
 
Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source Forensics
 
Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector Concerns
 

Ähnlich wie Computer Searchs, Electronic Communication, Computer Trespass

Nac 1 21 03
Nac 1 21 03Nac 1 21 03
Nac 1 21 03
CTIN
 
1Figures title5Civil Liberties and the Supreme Court.docx
1Figures title5Civil Liberties and the Supreme Court.docx1Figures title5Civil Liberties and the Supreme Court.docx
1Figures title5Civil Liberties and the Supreme Court.docx
drennanmicah
 
you have learned what digital evidence is, not in the physical s.docx
you have learned what digital evidence is, not in the physical s.docxyou have learned what digital evidence is, not in the physical s.docx
you have learned what digital evidence is, not in the physical s.docx
laquandabignell
 
The Fourth Amendment Explained
The Fourth Amendment ExplainedThe Fourth Amendment Explained
The Fourth Amendment Explained
Jeremy Duncan
 
Responding to Grand Jury: Subpoenas & Search Warrants
Responding to Grand Jury: Subpoenas & Search WarrantsResponding to Grand Jury: Subpoenas & Search Warrants
Responding to Grand Jury: Subpoenas & Search Warrants
Nexsen Pruet
 
Paper #1Reasonable Expectation of PrivacyIn this discussion,.docx
Paper #1Reasonable Expectation of PrivacyIn this discussion,.docxPaper #1Reasonable Expectation of PrivacyIn this discussion,.docx
Paper #1Reasonable Expectation of PrivacyIn this discussion,.docx
smile790243
 
In-House Counsel's Role in Avoiding Willful Patent Infringement
In-House Counsel's Role in Avoiding Willful Patent InfringementIn-House Counsel's Role in Avoiding Willful Patent Infringement
In-House Counsel's Role in Avoiding Willful Patent Infringement
Tim Hsieh
 
Ch 15 Search and Seizure
Ch 15 Search and SeizureCh 15 Search and Seizure
Ch 15 Search and Seizure
rharrisonaz
 

Ähnlich wie Computer Searchs, Electronic Communication, Computer Trespass (20)

Nac 1 21 03
Nac 1 21 03Nac 1 21 03
Nac 1 21 03
 
Darren Chaker Computer Search Warrant
Darren Chaker Computer Search WarrantDarren Chaker Computer Search Warrant
Darren Chaker Computer Search Warrant
 
An Encyclopedia of Wiretaps
An Encyclopedia of WiretapsAn Encyclopedia of Wiretaps
An Encyclopedia of Wiretaps
 
1Figures title5Civil Liberties and the Supreme Court.docx
1Figures title5Civil Liberties and the Supreme Court.docx1Figures title5Civil Liberties and the Supreme Court.docx
1Figures title5Civil Liberties and the Supreme Court.docx
 
public and private sectors.pptx
public and private sectors.pptxpublic and private sectors.pptx
public and private sectors.pptx
 
Evolving Issues in Workplace Privacy
Evolving Issues in Workplace PrivacyEvolving Issues in Workplace Privacy
Evolving Issues in Workplace Privacy
 
2009 case law overview
2009 case law overview2009 case law overview
2009 case law overview
 
you have learned what digital evidence is, not in the physical s.docx
you have learned what digital evidence is, not in the physical s.docxyou have learned what digital evidence is, not in the physical s.docx
you have learned what digital evidence is, not in the physical s.docx
 
Information and administration
Information and administrationInformation and administration
Information and administration
 
Fingerprints, Passcodes, and Self Incrimination - BSides Nova
Fingerprints, Passcodes, and Self Incrimination - BSides NovaFingerprints, Passcodes, and Self Incrimination - BSides Nova
Fingerprints, Passcodes, and Self Incrimination - BSides Nova
 
The Fourth Amendment Explained
The Fourth Amendment ExplainedThe Fourth Amendment Explained
The Fourth Amendment Explained
 
Responding to Grand Jury: Subpoenas & Search Warrants
Responding to Grand Jury: Subpoenas & Search WarrantsResponding to Grand Jury: Subpoenas & Search Warrants
Responding to Grand Jury: Subpoenas & Search Warrants
 
3170725_Unit-5.pptx
3170725_Unit-5.pptx3170725_Unit-5.pptx
3170725_Unit-5.pptx
 
NEWBIE LITIGATOR SCHOOL - Part I 2022 - The Federal Rules of Civil Procedure
NEWBIE LITIGATOR SCHOOL - Part I 2022 - The Federal Rules of Civil ProcedureNEWBIE LITIGATOR SCHOOL - Part I 2022 - The Federal Rules of Civil Procedure
NEWBIE LITIGATOR SCHOOL - Part I 2022 - The Federal Rules of Civil Procedure
 
Paper #1Reasonable Expectation of PrivacyIn this discussion,.docx
Paper #1Reasonable Expectation of PrivacyIn this discussion,.docxPaper #1Reasonable Expectation of PrivacyIn this discussion,.docx
Paper #1Reasonable Expectation of PrivacyIn this discussion,.docx
 
Electronic Document Retention And Legal Holds
Electronic Document Retention And Legal HoldsElectronic Document Retention And Legal Holds
Electronic Document Retention And Legal Holds
 
The Federal Rules of Civil Procedure (Series: Newbie Litigator School)
The Federal Rules of Civil Procedure (Series: Newbie Litigator School)The Federal Rules of Civil Procedure (Series: Newbie Litigator School)
The Federal Rules of Civil Procedure (Series: Newbie Litigator School)
 
In-House Counsel's Role in Avoiding Willful Patent Infringement
In-House Counsel's Role in Avoiding Willful Patent InfringementIn-House Counsel's Role in Avoiding Willful Patent Infringement
In-House Counsel's Role in Avoiding Willful Patent Infringement
 
Ch 15 Search and Seizure
Ch 15 Search and SeizureCh 15 Search and Seizure
Ch 15 Search and Seizure
 
Itet3 its forensics
Itet3 its forensicsItet3 its forensics
Itet3 its forensics
 

Mehr von CTIN

Raidprep
RaidprepRaidprep
Raidprep
CTIN
 
Networking Overview
Networking OverviewNetworking Overview
Networking Overview
CTIN
 
M Compevid
M CompevidM Compevid
M Compevid
CTIN
 
L Scope
L ScopeL Scope
L Scope
CTIN
 
Level1 Part8 End Of The Day
Level1 Part8 End Of The DayLevel1 Part8 End Of The Day
Level1 Part8 End Of The Day
CTIN
 
Law Enforcement Role In Computing
Law Enforcement Role In ComputingLaw Enforcement Role In Computing
Law Enforcement Role In Computing
CTIN
 
Level1 Part7 Basic Investigations
Level1 Part7 Basic InvestigationsLevel1 Part7 Basic Investigations
Level1 Part7 Basic Investigations
CTIN
 
K Ai
K AiK Ai
K Ai
CTIN
 
July132000
July132000July132000
July132000
CTIN
 
Investigative Team
Investigative TeamInvestigative Team
Investigative Team
CTIN
 
Introduction To Unix
Introduction To UnixIntroduction To Unix
Introduction To Unix
CTIN
 

Mehr von CTIN (11)

Raidprep
RaidprepRaidprep
Raidprep
 
Networking Overview
Networking OverviewNetworking Overview
Networking Overview
 
M Compevid
M CompevidM Compevid
M Compevid
 
L Scope
L ScopeL Scope
L Scope
 
Level1 Part8 End Of The Day
Level1 Part8 End Of The DayLevel1 Part8 End Of The Day
Level1 Part8 End Of The Day
 
Law Enforcement Role In Computing
Law Enforcement Role In ComputingLaw Enforcement Role In Computing
Law Enforcement Role In Computing
 
Level1 Part7 Basic Investigations
Level1 Part7 Basic InvestigationsLevel1 Part7 Basic Investigations
Level1 Part7 Basic Investigations
 
K Ai
K AiK Ai
K Ai
 
July132000
July132000July132000
July132000
 
Investigative Team
Investigative TeamInvestigative Team
Investigative Team
 
Introduction To Unix
Introduction To UnixIntroduction To Unix
Introduction To Unix
 

Kürzlich hochgeladen

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Kürzlich hochgeladen (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Computer Searchs, Electronic Communication, Computer Trespass

  • 1. Computer Crime and Digital Evidence Legal Issues Ivan Orton Complex Prosecutions & Investigations Division King County Prosecutor’s Office 500 Fourth Ave., Rm. 840 Seattle, WA 98104 [email_address] 206 296-9082
  • 2.
  • 3. Fixing a Bad Warrant, Already Executed
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. It is axiomatic that when a search warrant properly describes the things to be searched and seized, it also authorizes law enforcement officers to search inside any container in which the items could reasonably be found. State v. Mazzaferro, Div I, 2007 UNPUBLISHED OPINION
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 22.
  • 24.
  • 25. Now Should Evidence be Suppressed?
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40. Out of State Providers - A New Law Requires compulsory process recipient to produce records within 20 days Applies to any person or corporation who has conducted business or engaged in transactions occurring at least in part in Washington Effective June 12 2008
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47. Time to Conduct Search Washington Court Rule CrR 2.3(c) [The warrant] shall command the officer to search, within a specified period of time not to exceed 10 days, the person, place, or thing named for the property or person specified.
  • 48.
  • 49.
  • 50. Time to Conduct Search State v. Grenning COA No. 32426-1-II (Jan. 8, 2008) A forensic examination of information stored on copies of a hard drive may extend beyond the 10-day deadline specified in CrR 2.3(c), provided the computer is seized within the 10-day period. A delay in analyzing the information stored on a hard drive will only result in the suppression of evidence if: (1) the delay caused a lapse in probable cause; (2) it created unfair prejudice to the defendant; or (3) officers acted in bad faith.
  • 51.
  • 52. Fourth Amendment US Constitution No Expectation of Privacy in Records Held by Third Parties U.S. v. Miller (1976)
  • 53. WA Constitution Article One, Section 7 No person shall be disturbed in his private affairs or his home invaded without authority of law Broader than 4th Amendment U.S. v. Miller may not be law in Washington is not the
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 66.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72. Ivan Orton Complex Prosecutions & Investigations Division King County Prosecutor’s Office 500 Fourth Ave., Rm. 840 Seattle, WA 98104 [email_address] 206 296-9082