AP Notes, Outlines, Study Guides, Vocabulary, Practice Exams and more!

digital age crime and terrorism Flashcards

Terms : Hide Images
56986920644th amendmentprotects against unreasonable search and seizure0
5698706470digital evidenceinfo leveraged in an attempt to pick people and events within within time and space to establish casualty for criminal incidents1
5698772022types of evidencefruits of crime- stolen computers tool of criminal activity- hacking counterfeit documents repository of incriminating evidence- drug records, meth repository contraband- items hidden under different names unwitting record of criminal activity- email records, browsing history2
5698797903digital evidence category"information and data of value to an investigation that is stored on, received, or transmitted by an electronic device"3
5698814617examples of digital evidencehardware software all manuals for software data-logs, passwords printers and scanners cameras, video and audio recording devices4
5698827042probable cause elementsa crime has been committed evidence of the crime exists the evidence presently exists in the place to be searched5
5698834619four corners ruleif not written within the four corners of the affidavit of probable cause then it did not happen; does not exist; is not a fact6
5698845837jurisdictionpower of the court to decide a matter in question7
5698848848suppression of evidenceevidence obtained as a result of the excluded items should be suppressed and not used in trial8
5698855067rules for search warranta search warrant is only valid for 48 hours unless special circumstances exist and a judge gives an extension. search warrants must be served during daylight hours between 6am-10pm unless special circumstances and authorized by a judge.9
5698874016rules for a consent searchmust be knowingly and voluntary must not be coerced by police; coercion may not be real or implied, physical or psychological; no promises or threats10
5698891133exigent circumstance doctrineallows law enforcement officers to search and/or seize evidence without a warrant if they have probable cause and there is a pressing need to preserve evidence that is in danger of being destroyed or corrupted.11
5698904020fruit of the poisonous tree doctrineother pieces of evidence gained during a flawed search, based upon the exclusionary rule, may be excluded.12
5698909068border searchcourts have recognized the need to allow for border searches that are more intrusive that would be allowed in other locations. border patrol can seize any electronic device at the border and provide a receipt to the individual, returning it at a later date if it contains no contraband.13
5698918372consent searchmost commonly used warrantless searches used by law enforcement. valid consent to search allows officer to search for any item within the scope of consent. officer writes the consent form with all details and the individual signs it prior to the search.14
5698928636chain of custodyassures that digital evidence has been preserved in its original form. this entails being able to document when the evidence was collected and where it was collected from, who owned the device, and who had access to it. it also entails how the evidence is stored. involves documenting how the evidence was stored, who has handled the evidence, and who had access.15
5698941505hearsay ruleexists to prevent unreliable out of court statements by people from influencing the outcomes of trials. when a computer record contains the assertion of a person, the record can contain hearsay.16
5698947813best evidence rulestates that to prove the content of a writing, recoding, or photograph, the "original" writing, recording, or photograph is originally required. an accurate printout of computer data always satisfies the best evidence rule.17
5698963763challenges to authenticityquestion whether the records were altered, manipulated, or damaged after they were created. challenged the reliability of the computer program that generated the records. challenge the authenticity of computer stored records by questioning the identity of their author.18
5698992053national security agencyresponsible for designing and maintaining computerized coding systems designed to protect the integrity of US info systems. It is the lead agencies responsible for monitoring and protecting all of the federal governments computer networks from acts of cyberterrorism.19
5699014007FBIprotection of the united states from cyber based attacks and high technology crimes is its third priority behind the only terror and foreign intelligence.20
5699130987homeland securityimproves info sharing among federal law enforcement agencies. consolidated a host of over 100 federal offices. Increases interagency coordination in the fight against domestic terror.21
5699140305secret servicesafeguards the nations financial payment system against fraud and counterfeit financial instruments. has primary jurisdiction in cases involving access device fraud, and in the investigation of computer fraud relating to computers and computer systems of "federal interest"22
5699152047department of justiceDOJ is headed by the chief of law enforcement officer of the federal government- the attorney general. attorney general oversees the administration of justice on the federal level. houses the criminal divisions computer crime intellectual property section.23
5699169123federal trade commissionthe federal governments primary mechanism for protecting consumer markets.24
5699171998department of energymain responsibilities revolve around domestic energy production, conservation and efficiency25
5699178059US postal inspection serviceprovide business with a safe venue for exchange of funds and securities and provides private citizens a safe secure way to transmit correspondence.26
5699185747postal serviceinvestigate postal offenses and civil matters related to postal service. it frequently conducts joint investigations with other federal agencies.27
5699201697infragard**a program designed to facilitate the exchange of information among several institutions and agencies. Begun in 1998, this is a network of private and public sector partners who work together to identify and solve technical problems within critical computer infra structures.28
5699214512consumer sentinel**centralized database of identity theft complaints used to compile statistics regarding the incidence of identity theft.29
5699221795operation apothecary**to arrest and prosecute those who sell and distribute counterfeit pharmaceuticals and controlled substances over the internet.30
5699231387what are four "critical needs" at the state and law enforcement level regarding the investigation of cybercrime?**1. training 2. equipment 3. updated criminal codes (laws) designed to complement current enforcement efforts 4. resources of tapping federal expertise and equipment related to computer crime enforcement31

Need Help?

We hope your visit has been a productive one. If you're having any problems, or would like to give some feedback, we'd love to hear from you.

For general help, questions, and suggestions, try our dedicated support forums.

If you need to contact the Course-Notes.Org web experience team, please use our contact form.

Need Notes?

While we strive to provide the most comprehensive notes for as many high school textbooks as possible, there are certainly going to be some that we miss. Drop us a note and let us know which textbooks you need. Be sure to include which edition of the textbook you are using! If we see enough demand, we'll do whatever we can to get those notes up on the site for you!