Legal Issues Computer Forensics COEN 252 Drama in Soviet Court. Post-Stalin (1955). Painted by Solodovnikov. Oil on Canvas, 110 x 130 cm.

Slides:



Advertisements
Similar presentations
THE FOURTH AMENDMENT Constitutional Law.
Advertisements

Due Process and Search and Seizure- 4 th and 14 th Amendments.
The Fourth Amendment What Are Your Rights? Mr. Carr Social Studies.
Evidence Collection & Admissibility Computer Forensics BACS 371.
Chapter 2 Crime Scene. Crime Scene 1 Roles in crime scene? Tasks?  Evidence?  Victim missing?  Foot? Fingers?  What you identified as steps to manage.
Criminal Justice Process: the investigation – Chp 12 Arrest – Suspect taken into custody 4 th Amendment: The right of the people to be secure in their.
Computer Encryption Cheryl Dong Naima Ritter Hayden Bottoms Jennifer Kozin Brittany James.
Evidence Computer Forensics. Law Enforcement vs. Citizens  Search must have probable cause –4 th amendment search warrant  Private citizen not subject.
Law enforcement officers conduct searches every day in an effort to find evidence that can be seized and used in court to prosecute people who have violated.
Chapter 17 Videotapes, Photographs, Documents, and Writings as Evidence.
4th Amendment.
Rights of Suspects The Fourth Amendment The Fifth Amendment.
UNIT 5 AMERICAN GOVERNMENT. LESSON PAGES How do the 4 th and 5 th Amendments protect against unreasonable law enforcement procedures? Objective:
Unit Five Lesson 31 How do the Fourth and Fifth Amendments Protect Against Unreasonable Law Enforcement Procedures.
The Exclusionary Rule The Fourth Amendment History of the Exclusionary Rule Deontological Defenses of the Rule Consequentialist Defenses Objections Alternatives.
Legal Issues Computer Forensics COEN 152/252 Drama in Soviet Court. Post-Stalin (1955). Painted by Solodovnikov. Oil on Canvas, 110 x 130 cm.
7. Legal. Topics Fourth Amendment E-Discovery Duty to Preserve Private Searches ECPA Searching With & Without a Warrant.
Legal Issues Computer Forensics COEN 252 Drama in Soviet Court. Post-Stalin (1955). Painted by Solodovnikov. Oil on Canvas, 110 x 130 cm.
Legal Issues Computer Forensics COEN 252 Drama in Soviet Court. Post-Stalin (1955). Painted by Solodovnikov. Oil on Canvas, 110 x 130 cm.
1 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Legal Issues in Cybercrime Cases: Search & Seizure.
Introduction to Constitutional Law Unit 4. CJ140-02A – Introduction to Constitutional Law Unit 4: The Fourth Amendment CJ140-02A– Class 4 Part 1.
Chapter Seven – Searches and Seizures and the Right to Privacy Rolando V. del Carmen.
Legal Issues Computer Forensics COEN 252 Drama in Soviet Court. Post-Stalin (1955). Painted by Solodovnikov. Oil on Canvas, 110 x 130 cm.
Criminal Justice Today CHAPTER Criminal Justice Today, 13th Edition Frank Schmalleger Copyright © 2015, © 2013 by Pearson Education, Inc. All Rights Reserved.
Criminal Procedure Week 2. U.S. CONSTITUTION PURPOSE WHICH GOVERNMENT IT REGULATES Bill of Rights.
“Technology Solutions” Full-Pipe Surveillance EDUCAUSE CSG - Blacksburg January 9, 2008 Lee Smith, Attorney.
PROCEDURES IN THE JUSTICE SYSTEM, 8 th ed. Roberson, Wallace, and Stuckey PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ
Psychology of Homicide Unit II
Criminal Procedure Chapter 6. Copyright © 2007 Thomson Delmar Learning Objectives Define arrest, and explain the authority of a firefighter to make an.
Chapter 2 Legal Aspects of Investigation © 2009 McGraw-Hill Higher Education. All rights reserved. LEARNING OBJECTIVES Explain the historical evolution.
Evidence in a Court of Law Chapter 3. Admissibility of Evidence: Relevance Relevance Competence Competence.
Search and Seizure. I) Search and Seizure A) The 4 th amendment outlines the rules governing search and seizure.
The Bill of Rights The First Fundamental Changes of the Constitution.
Amendments in Action Search and Seizure. The 4 th Amendment “The right of the people to be secure in their persons, houses, papers, and effects, against.
4. Legal Limitations on Police behavior: a)Police are authorized to use coercive and intrusive measures in enforcing the law  Legal use of force = defining.
 What is the exclusionary rule  Explain stop and frisk  What is the plain view doctrine  What did Miranda v Arizona require police to do  What happens.
Legal Stumbling Blocks When Rescue and Law Enforcement Collide Gillian Deegan Assistant Commonwealth’s Attorney Botetourt County VA.
Police and the Constitution: The Rules of Law Enforcement.
The Fourth Amendment and the Home By Laura Zajac.
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated;
 The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated,
Computer Forensics BACS 371
4 th Amendment Timothy Bian, Myris Kramsch, Mazen Elhosseiny, Daniel Alday, John Scott, Kartik Raju.
Due Process Amendments What is due process? Due process, for the people of the United States, refers to how laws are enforced why laws are.
FOURTH AMENDMENT Search and Seizure. Fourth Amendment “ The right of the people to be secure in their persons, houses, papers and effects, against unreasonable.
Fourth Amendment And Probable Cause. By the end of this presentation you should be able to understand; ◦Fourth Amendment of the U.S. Constitution ◦How.
4 th Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not.
The Bill of Rights and the Criminal Trial Process.
Criminal Investigation: Laws of Arrest, Search and Seizure Chapter 12 Law and Government.
Unit 4 Seminar. Tell me what the Miranda warning is and what it means to you.
The Bill of Rights and Search and Seizure. The students will be able to: 1. Discuss the amendments involved from the Bill of Rights that pertain to obtaining.
4th Amendment "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
Limiting the Right of Search
Amendments in Action Search and Seizure.
Criminal Investigation and the Law
Forensics Week 7.
The Fourth Amendment and the Home
Amendments in Action Search and Seizure.
Fourth Amendment.
Fourth Amendment And Probable Cause.
Crime Scene Investigation and Evidence Collection
CHAPTER 1 1/15/2019 BHS Law Related Education Program Criminal Justice
Criminal Procedure: Theory and Practice, 2d.
Bell Work (Think of your response and be prepared to share)
Fourth Amendment: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
Search & Seizure The act of taking possession of this property.
Warm Up – February 11 Grab the handouts from the front table
Search & Seizure in Schools:
How does this Constitutional amendment protect Americans?
Judicial Restraint vs. Judicial Activism
Presentation transcript:

Legal Issues Computer Forensics COEN 252 Drama in Soviet Court. Post-Stalin (1955). Painted by Solodovnikov. Oil on Canvas, 110 x 130 cm.

Issues of Evidence An information is admissible in court if it is Relevant Its probative value outweighs its prejudicial effect.

Issues of Evidence Foundation –Context for Information Hearsay –Not admissible with exceptions Chain of Custody –Establishes trustworthiness of evidence by preventing tampering Stipulation: Agreement between parties or concession by one party in a judicial proceeding.

Exceptions to Hearsay Admissions: –out-of-court statements contrary to penal or pecuniary interest, including those found on a computer. Business Records –Made in the normal course of business. –Relied on by the business. –Made at or near the occurrence of the act the record purports to record. –Offered through a competent witness, either the custodian of the record or another who can testify to those issues.

Computer-Generated Records Computer generated records often fall under the business record exemption. Courts might also start to make a distinction between computer-generated records and computer-stored records.

Computer-Generated Records Not a question of hear-say (is there better evidence available) But a question of Authenticity. Is the generating program reliable?

Breach of Chain of Custody Not every breach makes the item inadmissible. Not necessary to have the best security against tampering. Government agents are assumed to be trustworthy. But

Chain of Custody Working on the original. A forensic examination that is done directly on the original disk drive will make it difficult to argue that the evidence could not have been tampered with. Much better to make a “true copy” and examine the true copy. Proof that it is a true copy.

Best Evidence Rule Copies are worse than originals, therefore they are not admissible unless the original has been destroyed. Does not apply to various computer outputs.

Acquisition of Evidence Distinction between government agents and private citizens. Illegal actions by private citizens can yield admissible evidence and lead to their punishment. If a sworn law officer violates an amendment, the gained evidence is usually suppressed, but the officer is protected by sovereign immunity.

Electronic Communications Privacy Act ("ECPA"), Title III Extends protection against wiretapping to communications between computers Know the exceptions Know the consequences of violating the title

Electronic Communications Privacy Act ("ECPA"), Title III A person acting under the color of law can intercept electronic communication where such a person is party to the communication or one of the parties of the communication have given prior consent to such interception.

Electronic Communications Privacy Act ("ECPA"), Title III "A person not acting under color of law" is also allowed to intercept an "electronic communication" where "such person is a party to the communication, or one of the parties to the communication has given prior consent to such interception." The consent can be implicit, e.g. by using a computer protected with login banners.

ECPA Title III Concerns Title III also permits providers of a communication service, including an electronic communication service, the right to intercept communications as a "necessary incident to the rendition of his service" or to protect "the rights or property of the provider of that service."

ECPA Title III Concerns Two exceptions to the last rule: If there is no actual damage, then the right to monitor does not exist. The government is not allow to do the monitoring, but they can profit from monitoring.

Fourth Amendment The right of people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

Fourth Amendment Computer Storage = Closed Container such as a briefcase With Warrant: –Limits to warrant because of privilege or additional protection. Without Warrant –Expectation of Privacy

Fourth Amendment No expectation of privacy –Public display –Material in some else’s hands –Consent by co-owner or authorized person Exigent circumstances Plain view exception Lawful arrest Very difficult and interesting case law.

Privacy Protection Act Protects publishers against government searches of material that is acquired for publication Reaction to the Daily Stanfordian case Internet publishing allows much private computer material to fall under the PPA protection

Electronic Communications Privacy Act Protects third party data against law enforcement seizes E.g. internet provider.

Legally Privileged Documents Need to prevent ongoing investigation from using legally privileged documents. Medical records. Attorney-client communications. Priest-penitent communications.