5698692064 | 4th amendment | protects against unreasonable search and seizure | 0 | |
5698706470 | digital evidence | info leveraged in an attempt to pick people and events within within time and space to establish casualty for criminal incidents | 1 | |
5698772022 | types of evidence | fruits of crime- stolen computers tool of criminal activity- hacking counterfeit documents repository of incriminating evidence- drug records, meth repository contraband- items hidden under different names unwitting record of criminal activity- email records, browsing history | 2 | |
5698797903 | digital evidence category | "information and data of value to an investigation that is stored on, received, or transmitted by an electronic device" | 3 | |
5698814617 | examples of digital evidence | hardware software all manuals for software data-logs, passwords printers and scanners cameras, video and audio recording devices | 4 | |
5698827042 | probable cause elements | a crime has been committed evidence of the crime exists the evidence presently exists in the place to be searched | 5 | |
5698834619 | four corners rule | if not written within the four corners of the affidavit of probable cause then it did not happen; does not exist; is not a fact | 6 | |
5698845837 | jurisdiction | power of the court to decide a matter in question | 7 | |
5698848848 | suppression of evidence | evidence obtained as a result of the excluded items should be suppressed and not used in trial | 8 | |
5698855067 | rules for search warrant | a search warrant is only valid for 48 hours unless special circumstances exist and a judge gives an extension. search warrants must be served during daylight hours between 6am-10pm unless special circumstances and authorized by a judge. | 9 | |
5698874016 | rules for a consent search | must be knowingly and voluntary must not be coerced by police; coercion may not be real or implied, physical or psychological; no promises or threats | 10 | |
5698891133 | exigent circumstance doctrine | allows law enforcement officers to search and/or seize evidence without a warrant if they have probable cause and there is a pressing need to preserve evidence that is in danger of being destroyed or corrupted. | 11 | |
5698904020 | fruit of the poisonous tree doctrine | other pieces of evidence gained during a flawed search, based upon the exclusionary rule, may be excluded. | 12 | |
5698909068 | border search | courts have recognized the need to allow for border searches that are more intrusive that would be allowed in other locations. border patrol can seize any electronic device at the border and provide a receipt to the individual, returning it at a later date if it contains no contraband. | 13 | |
5698918372 | consent search | most commonly used warrantless searches used by law enforcement. valid consent to search allows officer to search for any item within the scope of consent. officer writes the consent form with all details and the individual signs it prior to the search. | 14 | |
5698928636 | chain of custody | assures that digital evidence has been preserved in its original form. this entails being able to document when the evidence was collected and where it was collected from, who owned the device, and who had access to it. it also entails how the evidence is stored. involves documenting how the evidence was stored, who has handled the evidence, and who had access. | 15 | |
5698941505 | hearsay rule | exists to prevent unreliable out of court statements by people from influencing the outcomes of trials. when a computer record contains the assertion of a person, the record can contain hearsay. | 16 | |
5698947813 | best evidence rule | states that to prove the content of a writing, recoding, or photograph, the "original" writing, recording, or photograph is originally required. an accurate printout of computer data always satisfies the best evidence rule. | 17 | |
5698963763 | challenges to authenticity | question whether the records were altered, manipulated, or damaged after they were created. challenged the reliability of the computer program that generated the records. challenge the authenticity of computer stored records by questioning the identity of their author. | 18 | |
5698992053 | national security agency | responsible for designing and maintaining computerized coding systems designed to protect the integrity of US info systems. It is the lead agencies responsible for monitoring and protecting all of the federal governments computer networks from acts of cyberterrorism. | 19 | |
5699014007 | FBI | protection of the united states from cyber based attacks and high technology crimes is its third priority behind the only terror and foreign intelligence. | 20 | |
5699130987 | homeland security | improves info sharing among federal law enforcement agencies. consolidated a host of over 100 federal offices. Increases interagency coordination in the fight against domestic terror. | 21 | |
5699140305 | secret service | safeguards the nations financial payment system against fraud and counterfeit financial instruments. has primary jurisdiction in cases involving access device fraud, and in the investigation of computer fraud relating to computers and computer systems of "federal interest" | 22 | |
5699152047 | department of justice | DOJ is headed by the chief of law enforcement officer of the federal government- the attorney general. attorney general oversees the administration of justice on the federal level. houses the criminal divisions computer crime intellectual property section. | 23 | |
5699169123 | federal trade commission | the federal governments primary mechanism for protecting consumer markets. | 24 | |
5699171998 | department of energy | main responsibilities revolve around domestic energy production, conservation and efficiency | 25 | |
5699178059 | US postal inspection service | provide business with a safe venue for exchange of funds and securities and provides private citizens a safe secure way to transmit correspondence. | 26 | |
5699185747 | postal service | investigate postal offenses and civil matters related to postal service. it frequently conducts joint investigations with other federal agencies. | 27 | |
5699201697 | infragard** | a program designed to facilitate the exchange of information among several institutions and agencies. Begun in 1998, this is a network of private and public sector partners who work together to identify and solve technical problems within critical computer infra structures. | 28 | |
5699214512 | consumer sentinel** | centralized database of identity theft complaints used to compile statistics regarding the incidence of identity theft. | 29 | |
5699221795 | operation apothecary** | to arrest and prosecute those who sell and distribute counterfeit pharmaceuticals and controlled substances over the internet. | 30 | |
5699231387 | what are four "critical needs" at the state and law enforcement level regarding the investigation of cybercrime?** | 1. training 2. equipment 3. updated criminal codes (laws) designed to complement current enforcement efforts 4. resources of tapping federal expertise and equipment related to computer crime enforcement | 31 |
digital age crime and terrorism Flashcards
Primary tabs
Need Help?
We hope your visit has been a productive one. If you're having any problems, or would like to give some feedback, we'd love to hear from you.
For general help, questions, and suggestions, try our dedicated support forums.
If you need to contact the Course-Notes.Org web experience team, please use our contact form.
Need Notes?
While we strive to provide the most comprehensive notes for as many high school textbooks as possible, there are certainly going to be some that we miss. Drop us a note and let us know which textbooks you need. Be sure to include which edition of the textbook you are using! If we see enough demand, we'll do whatever we can to get those notes up on the site for you!