Digital Device Searches

Slides:



Advertisements
Similar presentations
Sean B. Hoar Assistant United States Attorney 2010 Financial Crimes & Digital Evidence Conference.
Advertisements

2 Language of Computer Crime Investigation
E-Discovery in Government Investigations and Criminal Law JOLT Symposium February 22,
Criminal Procedure for the Criminal Justice Professional 11 th Edition John N. Ferdico Henry F. Fradella Christopher Totten Prepared by Tony Wolusky Criminal.
Evidence Collection & Admissibility Computer Forensics BACS 371.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
Teaching Computer Forensics Using Student Developed Evidence Files Anna Carlin Cal Poly Pomona.
The M57 Patents Case Investigating criminal activity within m57.biz
Evidence Computer Forensics. Law Enforcement vs. Citizens  Search must have probable cause –4 th amendment search warrant  Private citizen not subject.
Computer Forensics Principles and Practices
1 Chapter 15 Search Warrants. 2 Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment The police must have “probable.
COS/PSA 413 Day 5. Agenda Questions? Assignment 2 Redo –Due September 3:35 PM Assignment 3 posted –Due September 3:35 PM Quiz 1 on September.
Applications with Warrants In Mind. The Law  Why are there laws specifically for computer crimes?  A persons reasonable right to privacy  The nature.
Legal Aspects of Criminal Investigation: Arrest, Search and Seizure
INTRODUCTION TO THE LAW OF EVIDENCE
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
By Drudeisha Madhub Data Protection Commissioner Date:
Role of Technology in Combating Crime Against Woman and Children Presented by Detective Constable Janelle Blackadar Child Exploitation Section Toronto.
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
Guide to Computer Forensics and Investigations, Second Edition
CPS Acceptable Use Policy Day 2 – Technology Session.
7 Handling a Digital Crime Scene Dr. John P. Abraham Professor UTPA.
Computer Forensics Principles and Practices
Chapter Seven – Searches and Seizures and the Right to Privacy Rolando V. del Carmen.
CLOUD COMPUTING Overview on cloud computing. Cloud vendors. Cloud computing is a type of internet based computing where we use a network of remote servers.
A PRACTICAL GUIDE TO RESPONDING TO A HEALTHCARE DATA SECURITY BREACH May 19, 2011 | State College, PA Matthew H. Meade Stephanie Winer-Schreiber.
Chapter 2 Legal Aspects of Investigation © 2009 McGraw-Hill Higher Education. All rights reserved. LEARNING OBJECTIVES Explain the historical evolution.
Forensic Procedures 1. Assess the situation and understand what type of incident or crime is to be investigated. 2. Obtain senior management approval to.
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
Law 120.  The law must seek a balance between an individual’s right to privacy and the state’s need to conduct a thorough investigation.  Statute and.
_______________________________________________________________________________________________________________ ____________ Successfully Investigating.
“ Copyright © Allyn & Bacon 2008 Criminal Evidence Chapter Six: Warrantless Arrests and Searches This multimedia product and its contents are protected.
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated;
Investigative Constitutional Law Charles L. Feer, JD, MPA, Bakersfield College Department of Criminal Justice Investigative Constitutional Law.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION PRESENTED BY: JUDGE MARK A. SPEISER.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Protecting access to healthcare for immigrants
Surveillance around the world
Courts System Search Warrants.
PhD Oral Exam Presentation
Evidence Collection at the Crime Scene and Constitutional Law
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION
The University of Adelaide, School of Computer Science
Protection of CONSUMER information
Guide to Computer Forensics and Investigations Fifth Edition
Cell Site Simulators (“CSSs”)
Chapter 10: Investigative Constitutional Law
Facial Recognition What is it and how does it work? 1. LEAs collect photo mugshots of arrestees and ask other government agencies (like the DMV or the.
Information Security Seminar
Defending Against the Digital Dragnet
Search warrant Writing an Affidavit.
Computer Forensics Discovery and recovery of digital evidence
Introduction to Computer Forensics
Red Flags Rule An Introduction County College of Morris
CHFI & Digital Forensics [Part.1] - Basics & FTK Imager
Patrick Sefton | Principal, Brightline Lawyers
Laws Governing Police Surveillance
Criminal Procedure: Theory and Practice, 2d.
Pre-Trial Procedures Search and Seizure.
Fourth Amendment: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
Authority to Detain and Arrest; Use of Force
Texas Search and Seizure
Cell Phone and Laptop Searches at the Border
Government Data Practices & Open Meeting Law Overview
Digital Forensics Andrew Schierberg, Fort Mitchell Police, Schierberg LAw Jay Downs, Kenton County Police.
By Anwar Campbell.
Cell Site Location Information
On-Site Investigations
Presentation transcript:

Digital Device Searches A digital device search is an examination of data stored on a device that uses a computer or microcontroller to record information.

Digital Device Searches What do they include? Digital devices may include cell phones, tablets, laptops, desktop computers, and medical devices like pacemakers, hearing aids, heart-rate monitors, smartwatches, and smart meters.

Cloud Searches Digital device searches may sometimes involve cloud searches where the device is used as a portal for examining digital information and media stored outside the device itself, on remote servers known as the “cloud.”

How do they work? Digital device searches (DDS) may be performed: Manually – by looking through data on the device as a user would Forensically – with assistance from other computers or software Hybrid – using some combination of a manual and forensic search Imaging - where law enforcement physically seizes a device for search and makes a complete digital copy or “image” of the entirety of its contents onto a separate external medium such as a hard drive Forensic Analysis - the government uses advanced forensic software to analyze the digital copy of the device contents; expanding its search and analysis capabilities and often allowing them to view deleted data that the software on the device itself wouldn’t be capable of displaying.

What do the cops do? The DOJ’s Manual for Searching and Seizing Computers and Obtaining Evidence in Criminal Investigations (https://eff.org/DOJDSM2009) sets forth a 2-step process for digital device searches: The “imaging” - where law enforcement makes a complete digital copy of all info on the device The “analysis” – where govt uses forensic software to examine the digital copy, allowing it to organize, methodically search, and view data – including data the user may have believed was deleted Imaging - where law enforcement physically seizes a device for search and makes a complete digital copy or “image” of the entirety of its contents onto a separate external medium such as a hard drive Forensic Analysis - the government uses advanced forensic software to analyze the digital copy of the device contents; expanding its search and analysis capabilities and often allowing them to view deleted data that the software on the device itself wouldn’t be capable of displaying.

What do the Cops Know? Review govt training materials: 2011 - DOJ Guide on Admitting Electronic Evidence from 2011: https://eff.org/DOJOAEE 2009 – DOJ CCIPS Criminal Division Manual on Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations. https://eff.org/DOJDSM2009 2009 – DOJ CCIPS Criminal Division Manual on Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations. https://eff.org/DOJDSM2009 2011 - DOJ Guide on admitting Electronic Evidence from 2011: https://eff.org/DOJOAEE

What do the Cops Know? 1994 – NIJ Special Report: Forensic Examination of Digital Evidence: A Guide for Law Enforcement. https://eff.org/DOJNIJ1994 1994 – NIJ Special Report: Electronic Crime Scene Investigation: A Guide for First Responders. https://eff.org/DOJNIJ1st NIJ Forensic Examination of Digital Evidence: The report guides law enforcement agents on how to properly handle and secure digital evidence during criminal investigations, along with suggestions on proper policies and procedures that law enforcement departments can adopt This report guides law enforce­ment and other first responders who may be responsible for preserving an electronic crime scene and for recognizing, col­lecting, and safeguarding digital evidence.

Data Extraction Programs What do the Cops Use? Police use a variety of extraction programs like: Cellebrite Securview Oxygen FTK Imager Encase Police use a variety of forensic extraction programs that have the capacity to collect metadata and content, help bypass encryption, classify images, restore deleted data, track GPS locations over time, search for specific keywords, and map relationships.

Data Extraction Programs What do the Cops Get? These extraction programs have the capacity to: Collect metadata and content, help bypass encryption, classify images, restore deleted data, track GPS locations over time, search for specific keywords, map relationships Metadata – info that relates to a piece of data Content – the substance of the data or electronic communication

What to look for? Seizure of your client’s cell phone or other digital device, production of your client’s digital information, and no subpoenas or warrants directed at third party service providers. Any mention of digital forensics software, like Cellebrite, Secureview, Oxygen, FTK Imager, Encase, MSAB XRY, or E-fense Helix3, or of “images” or “copies” of device contents. Any mention of bypassed digital security, encryption, or passwords, or attempts to bypass these security features. including, but not limited to, iPhones, Android phones, Apple Watches, Fitbit devices, iPads and tablets, and home assistants like the Amazon Echo and Google Home.

DDS Case Highlights Riley v. CA, 134 S.Ct. 2473, 2493 (2014) – digital device searches require a warrant, even incident to arrest US v. Griffith, 867 F.3d 1265, 1272-73 (D.C. Cir. 2017) – threshold factors for device seizure U.S. v. Comprehensive Drug Testing, Inc (CDT), 621 F.3d 1162, 1180 (9th Cir. 2010) – judicial oversight Review our digital device search case inventory at https://www.eff.org/DDScases

Best Practices for Judicial Oversight Govt must waive reliance on the plain view doctrine Forensic analysis should be done by an independent third party. Govt must disclose actual risks of destruction & other avenues of access search protocol must be designed to seize only info for which govt has PC Govt must destroy or return non-responsive data Time limit for device search execution See U.S. v. Comprehensive Drug Testing, Inc (CDT), 621 F.3d 1162, 1180 (9th Cir. 2010)

How do I challenge DDS? Advocate for ex-ante search protocol limits, such as: 1.     Keywords 2.     Date range 3.     Time range 4.     Specific user account 5.     Specific application 6.     Communications to/from specific actors 7.     File type 8.     File size

How do I challenge DDS? File a motion to suppress. For warrantless device searches per Riley. Even if a SW was obtained beforehand, there may still be grounds for suppression: Failure to Authorize Search (v. Seizure) Lack of Specificity/Particularity Lack of Probable Cause Overbreadth Flagrant Disregard Most affidavits submitted in support of a search warrant for a digital device or cloud storage platform are often boilerplate and lacking in specificity and particularity. Some do not even show a nexus between the device seized and the specific incident being investigated.

Lack of Specificity/Particularity SW should be as specific as possible about the files to be searches and the locations on a device where those files are likely to be found. Where the govt uses the device to access content stored remotely in the cloud, object if remote data is not specifically mentioned in the SW or isn’t within the scope of PC articulated

Lack of Probable Cause IP address alone ≠ PC Membership in or attempt to access an online group suspected of illegal conduct alone ≠ PC No Nexus between device and suspect or incident Search exceeds Scope of SW

Overbreadth Object to overbroad seizure of: “any and all” devices “including, but not limited to” language Object to initial seizure of device where govt fails to satisfy threshold factors from US v. Griffith: That client own, use or possess a device That device will be found at a particular place at a particular time (like client’s home) That device contains incriminating evidence about the suspected offense US v. Griffith, 867 F.3d 1265, 1272-73 (D.C. Cir. 2017)

How do I challenge DDS? Refer to more privacy-protective state laws. California’s CalECPA requires: a search warrant (CA Penal Code §§ 1546.1) before obtaining content or location info notice to the target (CA Penal Code section §§ 1546.2) statutory suppression (CA Penal Code §§ 638.55, 1546.4) for violation of the state’s warrant requirement.

How do I challenge DDS? You can learn more about CalECPA by going through this Prezi presentation: https://www.eff.org/CalECPAPrezi And for a peek at what California police are being told about CalECPA, take a look at this CA Peace Officers’ Association Fact Sheet on CalECPA. https://www.eff.org.CPOACalECPA

Digital Device Searches Where do I learn more? Visit: https://eff.org/defense/digital-device-search 


Stephanie Lacambra Criminal Defense Staff Attorney 415-436-9333 x130 stephanie@eff.org