Podcast
Questions and Answers
What is the primary purpose of a Pre-Trial Suppression Hearing?
What is the primary purpose of a Pre-Trial Suppression Hearing?
What should a caregiver do first in a crisis situation?
What should a caregiver do first in a crisis situation?
In which stage of a criminal prosecution does the government present its response to the Defendant's case?
In which stage of a criminal prosecution does the government present its response to the Defendant's case?
What is the first action to take when a threat is present in a crisis?
What is the first action to take when a threat is present in a crisis?
Signup and view all the answers
What type of evidence requires inference to be drawn from its existence?
What type of evidence requires inference to be drawn from its existence?
Signup and view all the answers
Which factor does NOT affect a witness's credibility?
Which factor does NOT affect a witness's credibility?
Signup and view all the answers
Which of the following identifies key characteristics of Bitcoin addresses?
Which of the following identifies key characteristics of Bitcoin addresses?
Signup and view all the answers
What is meant by 'impeachment' in the context of witness credibility?
What is meant by 'impeachment' in the context of witness credibility?
Signup and view all the answers
What is 'off-ramping' in the context of cryptocurrency?
What is 'off-ramping' in the context of cryptocurrency?
Signup and view all the answers
What is a key element of recovering a cryptocurrency wallet?
What is a key element of recovering a cryptocurrency wallet?
Signup and view all the answers
What is the function of 'Charge to the Jury' in the trial process?
What is the function of 'Charge to the Jury' in the trial process?
Signup and view all the answers
What is required for establishing a proper foundation for evidence in court?
What is required for establishing a proper foundation for evidence in court?
Signup and view all the answers
Which of the following is a misconception regarding the credibility of a witness?
Which of the following is a misconception regarding the credibility of a witness?
Signup and view all the answers
What is a primary method used to authenticate witness testimony?
What is a primary method used to authenticate witness testimony?
Signup and view all the answers
Which of the following is NOT a best practice for maintaining the chain of custody of evidence?
Which of the following is NOT a best practice for maintaining the chain of custody of evidence?
Signup and view all the answers
What is the role of statements and reports in aiding witness testimony?
What is the role of statements and reports in aiding witness testimony?
Signup and view all the answers
What type of records are considered self-authenticating in court?
What type of records are considered self-authenticating in court?
Signup and view all the answers
Which characteristic defines a Mental Health Crisis (MHC)?
Which characteristic defines a Mental Health Crisis (MHC)?
Signup and view all the answers
When recognizing behaviors associated with mental illness, law enforcement officers should:
When recognizing behaviors associated with mental illness, law enforcement officers should:
Signup and view all the answers
Which of the following factors should be considered when observing signs of mental illness?
Which of the following factors should be considered when observing signs of mental illness?
Signup and view all the answers
Which statement regarding evidence documentation is correct?
Which statement regarding evidence documentation is correct?
Signup and view all the answers
What is the primary goal of collecting physical evidence in an investigation?
What is the primary goal of collecting physical evidence in an investigation?
Signup and view all the answers
What should be done first before moving or touching anything at a crime scene?
What should be done first before moving or touching anything at a crime scene?
Signup and view all the answers
Which type of evidence is described as being tangible, having form and mass, and may require processing?
Which type of evidence is described as being tangible, having form and mass, and may require processing?
Signup and view all the answers
What is a key characteristic of a rough sketch made at a crime scene?
What is a key characteristic of a rough sketch made at a crime scene?
Signup and view all the answers
Which stage of search allows law enforcement officers to gauge what is needed to process a scene?
Which stage of search allows law enforcement officers to gauge what is needed to process a scene?
Signup and view all the answers
What is NOT a form of evidence discussed?
What is NOT a form of evidence discussed?
Signup and view all the answers
What is the optimal number of people recommended to take measurements?
What is the optimal number of people recommended to take measurements?
Signup and view all the answers
Which measurement method is considered the most accurate?
Which measurement method is considered the most accurate?
Signup and view all the answers
Which principle suggests that every contact leaves a trace?
Which principle suggests that every contact leaves a trace?
Signup and view all the answers
How should blood or bodily fluids be treated during evidence collection?
How should blood or bodily fluids be treated during evidence collection?
Signup and view all the answers
In the packaging process, what is the first step to ensure proper handling of evidence?
In the packaging process, what is the first step to ensure proper handling of evidence?
Signup and view all the answers
What is the main purpose of elimination samples in evidence collection?
What is the main purpose of elimination samples in evidence collection?
Signup and view all the answers
What factor should be considered to maintain the integrity of fragile/trace evidence during collection?
What factor should be considered to maintain the integrity of fragile/trace evidence during collection?
Signup and view all the answers
What is the primary purpose of the IMEI?
What is the primary purpose of the IMEI?
Signup and view all the answers
Which of the following is NOT a step in proper forensic handling procedures?
Which of the following is NOT a step in proper forensic handling procedures?
Signup and view all the answers
What distinguishes physical extraction from logical extraction in data recovery?
What distinguishes physical extraction from logical extraction in data recovery?
Signup and view all the answers
Which tool is mentioned as aiding in bypassing iOS passcodes?
Which tool is mentioned as aiding in bypassing iOS passcodes?
Signup and view all the answers
What should always be done first before collecting forensic evidence from a device?
What should always be done first before collecting forensic evidence from a device?
Signup and view all the answers
What type of storage devices should be treated as a separate piece of evidence when seized?
What type of storage devices should be treated as a separate piece of evidence when seized?
Signup and view all the answers
In what environment should an examiner assess wireless network risks when interacting with a device?
In what environment should an examiner assess wireless network risks when interacting with a device?
Signup and view all the answers
What is a critical action to take if a Faraday bag or aluminum is not available?
What is a critical action to take if a Faraday bag or aluminum is not available?
Signup and view all the answers
Study Notes
Courtroom Evidence
-
EPO #1: Procedural Stages of a Criminal Prosecution: Pre-trial suppression hearings (defense seeks evidence removal, no jury), voir dire (jury selection), case-in-chief (prosecution's case, witnesses), defense's case (defense cross-examines), rebuttal case (government rebuts defense), closing arguments (explaining evidence), jury instructions (legal elements), and sentencing (conviction hearing).
-
EPO #2: Relevant, Direct, and Circumstantial Evidence: Relevant evidence pertains to the case. Direct evidence is firsthand accounts (testimonial), and circumstantial evidence requires inference.
-
EPO #3: Witness Credibility and Information Collection: Factors affecting witness credibility include bias, motive to fabricate, inability to accurately recall, contradiction, perception errors, prior inconsistent testimony, and prior convictions (felony or misdemeanor within last 10 years) relevant to perjury.
Evidence Collection and Witness Preparation
-
EPO #4: Evidence Collection for a Court Foundation: Proper foundation means demonstrating the evidence is what it claims to be, preventing fraudulent accusations/mistakes, and documenting possession & control chain. Best practices include photographing evidence before seizure, minimizing people handling evidence, and accurate packaging/forms.
-
EPO #5: Statement and Report Use for Witness Preparation: Reviewing notes, reports, and documents can help witnesses refresh their memory. They can be used in cross-examination, although not for jury review unless expressly allowed.
-
EPO #6: Business and Public Document Admissibility: To establish admissibility, original documents (or duplicates) are necessary unless lost or destroyed in bad faith, or if they are in possession but not produced by the party possessing it. Expert witnesses can testify on behalf of lost documents.
Mental Health Crisis Response
-
EPO #1: Mental Health Crisis Behaviors: Mental health crises involve significant stress affecting thoughts, emotional regulation, and behaviors. Abnormal behaviors violate social norms and cause stress or distress. Common situations involving law enforcement include concerned citizens calling about a psychiatric emergency, suicidal individuals, and inappropriate public behavior. Symptoms include excessive feelings, social disruption, altered thinking, or changes in habits.
-
EPO #2: De-escalation Techniques for MHC: Responding to MHC calls requires gathering information, considering safety concerns, developing a plan, being aware of "suicide-by-cop" potential, immediately assessing the scene and individuals, and identifying threats focusing on officer safety. Indicators of crisis include environmental (excessive waste/hoarding), verbal (illogical/grandiose thoughts), and behavioral (physical movements/mannerisms). Maintaining a stable scene, establishing rapport, and maintaining distance are key in de-escalation.
Bitcoin & Cryptocurrencies
- EPO #1: Principles of Bitcoin Operation: Bitcoin is a decentralized digital currency that operates through blockchain technology. Bitcoin transactions use addresses (26-36 characters long, either (1), (3), or (bc1)), and wallets (hardware, software, seed phrases). Money conversion involves on-ramping (fiat to crypto) and off-ramping (crypto to fiat).
Controlled Substance Identification
- EPO #1: Pharmaceutical Drug Identification: Drug Identification Bibles document over-the-counter, prescription, and controlled substances with imprint characteristics. Descriptions, illustrations, and classifications include Schedule I drugs (no medical use), and lists of illicit drugs. Physical characteristics (appearance & smell) of various controlled substances including Heroin (different colors, smells), Cocaine (HCl or base forms, textures/appearance), Marijuana (different forms, consistencies), and Ecstasy/MDMA (powder, pill) are detailed.
Physical Evidence Handling
- EPO #1: Evidence Location, Documentation, Collection, and Packaging: Evidence collection involves a proper approach, preliminary survey, evaluation, physicality, and expected juror analysis. Proper documentation includes chronological order, legible photos, sketches (overall, intermediate, and close-up), and measurements. Evidence is collected and packaged to preserve integrity, and is documented accurately including time.
Electronic Evidence Collection, Preservation, and Transport
-
EPO #1: Federal Regulations Governing Electronic Devices (intercepting communications): Title III of the USA Patriot Act governs eavesdropping, recordings of conversations involving devices, and devices containing or retrieving conversations.
-
EPO #2: Federal Regulations Governing Use of Electronic Devices to Trace Phone Calls and Electronic Communications: Pen register (outgoing), and trap & trace (incoming) systems are monitored by the government to track electronic communications.
-
EPO #3: Federal Regulations Governing Tracking Movements of Suspects: Physical intrusion of a suspect's property (person, residence, or items thereof) requires a warrant to be valid. Tracking a person over time or in a specific location may also require warrants depending on privacy expectations and totality of the circumstances. The validity of warrants may be examined via legal precedent.
-
EPO #4: Federal Regulations Governing Use of Video Surveillance: Location-specific warrant requirements related to surveillance, and how privacy expectations may be established, are outlined to describe when electronic surveillance may be permissible without a warrant.
-
EPO #5: Identifying Federal Regulations Governing Access to Stored Electronic Communications: Determining the legal requirements for determining storage of electronic communications, including when a warrant may or may not be necessary, and what data is stored with digital information and cloud servers.
-
EPO #6: Computer Seizure Considerations: Special considerations pertaining to securing electronic devices, and the specifics of executing searches, and seizures, of computers are detailed, including considerations for preserving data during collection, and documentation of data extraction methodology and processes.
-
EPO #7: Authentication of Computer Information: The authentication process for verifying the validity and integrity of information contained on a computer is important for establishing credible evidence.
-
EPO #8: Computer Searches Without Warrants: Situations where computer searches may occur without a warrant (e.g., incident to lawful arrest, plain view) are presented and explored.
-
EPO #9: Search Warrant Preparation: A detailed description of the steps involved in preparing a search warrant for computers, procedures, and any legal considerations.
First Responders, Digital Evidence
-
EPO #1: Electronic Devices in Criminal Activity: Electronic devices are used for networking penetration, doxxing, and the theft of information. They also serve as tools for criminal activity and data storage for crimes.
-
EPO #2: Altering and Destroying Electronic Evidence: Electronic evidence is susceptible to alteration and destruction via several means, requiring awareness of these methods to safely preserve evidence when investigating.
-
EPO #3: Identifying Electronic Devices: Different electronic devices used can store digital evidence like phones, iPads, computers, optical media, storage devices (external hard drives), and others.
-
EPO #4: Non-Electronic Evidence: Non-electronic items (e.g., computer hardware details, trace evidence, ownership indicators, printouts, or passwords) are important.
-
EPO #5: Collecting, Preserving, and Transporting Evidence: Collecting procedures for electronic evidence include photographing screens, preserving data, and maintaining the integrity of the evidence in its chain of custody.
-
Proper handling of electronic devices and data: Procedures and guidelines for proper handling of digital evidence to properly preserve data must be followed meticulously.
Mobile Device Investigations
-
EPO #1: Mobile Device Technology & Identifiers: Unique identifiers (e.g., IMEI, ICCID) associated with mobile devices (feature or smart phones) to distinguish them.
-
EPO #2: Forensic Software and Digital Data: How to analyze, generate reports, and use forensic software for data extraction or analysis of mobile devices. This may include methods to analyze the phone in use, data extraction to find patterns and evidence.
-
External File System Analysis and Extraction: External drive or cloud data analysis and data extraction procedure steps.
Cyber Investigations
-
EPO #1: Cyber Security Precautions: Protecting personal & agency identifying information involves procedures to mitigate vulnerabilities associated with devices, data, and flow of information.
-
EPO #2: Online Crime & Gaming: The use of social networks for criminal activity, including malware, cyber bullying, creating illegal environments, recruitment, and selling stolen goods.
-
EPO #3: Internet Crime: Identifying how the internet facilitates crimes, highlighting its use, anonymity, and cheap cost for crimes including malware, advanced persistent threats, or distributed denials of service.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on key concepts in criminal justice and cryptocurrency regulations. This quiz covers topics from pre-trial hearings to witness credibility and Bitcoin addresses. Assess your understanding of evidence, jury instructions, and crisis management in legal contexts.