Evidence - Cell Phones
41 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which electronic device is included in the definition of 'Digital Equipment' as per the policy?

  • Scanners
  • External drives
  • Modems
  • Printers with memory (correct)

What is the function of an ESN (Electronic Serial Number) in wireless carrier networks?

  • Device identification for network access (correct)
  • Software installation
  • Battery optimization
  • Data encryption

Where is the International Mobile Equipment Identity (IMEI) number usually located on a phone/device?

  • On the front screen
  • Under the camera lens
  • Inside the battery compartment (correct)
  • On the back cover

What are MEIDs (Mobile Equipment Identifiers) unique to among mobile phones?

<p>CDMA mobile phones (D)</p> Signup and view all the answers

Which peripheral hardware is included in the definition of 'Computer Equipment' according to the policy?

<p>Cables (C)</p> Signup and view all the answers

What is the purpose of securing seized electronic devices in compliance with the policy?

<p>To prevent unauthorized access (D)</p> Signup and view all the answers

What is the recommended action when encountering cellular phones with suspected evidence that will not be powered off?

<p>Activating 'Airplane Mode' (B)</p> Signup and view all the answers

Why is it important to photograph the location and power status of a seized cellular phone?

<p>To create a visual record (A)</p> Signup and view all the answers

What unique numbers are used to identify devices like cell phones?

<p>MEID, IMEI, or ESN (B)</p> Signup and view all the answers

What should be done if an Apple iPhone is powered on and the security code is unknown?

<p>Manually place it in 'Airplane Mode' (C)</p> Signup and view all the answers

Why is it typically preferable to power off cellular phones before collecting them as evidence?

<p>To prevent data loss (B)</p> Signup and view all the answers

What is the purpose of placing an Apple iPhone in 'Airplane Mode' during collection procedures?

<p>To prevent remote wiping of the device (D)</p> Signup and view all the answers

Why is proper legal standing necessary before internally examining a seized device?

<p>To justify the search legally (C)</p> Signup and view all the answers

What should be done if an iPhone is powered on and the security code is unknown but powering it off is not an option?

<p>Manually place it in 'Airplane Mode' (D)</p> Signup and view all the answers

'Faraday bags' are used for what purpose in relation to cell phones?

<p>'Faraday bags' are used for isolating cell phones from remote wiping. (B)</p> Signup and view all the answers

What may be required to access a locked cell phone in addition to a warrant for the physical device?

<p>All of the above (D)</p> Signup and view all the answers

Which of the following is NOT mentioned as a common source for digital data in the text?

<p>Application data stored on the user's computer (B)</p> Signup and view all the answers

What should an investigating officer state when recording digital evidence from a searched device?

<p>The officer should state the device's physical identification and simply state 'digital evidence' for information retrieved from the items searched (D)</p> Signup and view all the answers

What is required in addition to the completed Request for Digital Forensic Services Form, according to the text?

<p>A copy of the document that provides legal authority for the digital forensic services requested (C)</p> Signup and view all the answers

Which of the following court cases is NOT mentioned in the references section of the text?

<p>Terry v. Ohio (C)</p> Signup and view all the answers

Which of the following CALEA Accreditation standards is NOT relevant to this policy?

<p>42.1.3 (B)</p> Signup and view all the answers

What is the purpose of the check digit in a MEID (Mobile Equipment Identifier)?

<p>To verify the authenticity of the MEID (D)</p> Signup and view all the answers

Under what circumstances can digital equipment be seized without proper legal authority?

<p>Digital equipment cannot be seized without proper legal authority (C)</p> Signup and view all the answers

What type of packaging material should be avoided when collecting digital evidence?

<p>Plastic materials (A)</p> Signup and view all the answers

What should be done if a computer is found powered on during evidence collection?

<p>Disable the power at its source without shutting it down normally (B)</p> Signup and view all the answers

How should laptop computers be handled during evidence collection?

<p>Remove the battery to discontinue power (B)</p> Signup and view all the answers

What additional items should be seized along with the digital equipment during evidence collection?

<p>Books, manuals, software, disks, external drives, USB drives, and memory cards related to the system (C)</p> Signup and view all the answers

What should be done to prevent potential remote data wiping of seized computers?

<p>Isolate the computer from all networks as soon as reasonably possible (D)</p> Signup and view all the answers

What should be done if a computer or digital equipment is found in a damaged state?

<p>Treat the item as if it were a working device and follow proper handling procedures (D)</p> Signup and view all the answers

What should be done to document the physical setup of seized digital equipment?

<p>Take photographs of the overall equipment location and component-to-component relationship (B)</p> Signup and view all the answers

What should be done if passwords or related information are found in the area where digital equipment is seized?

<p>Seize the passwords and related information along with the equipment (D)</p> Signup and view all the answers

Which of the following statements is true regarding the search of digital devices?

<p>A separate 'piggy back' warrant should be obtained for searching a device, distinct from the original seizure warrant. (C)</p> Signup and view all the answers

Which of the following is NOT a valid authority for searching digital equipment, according to the text?

<p>Owner consent (C)</p> Signup and view all the answers

What is required for obtaining call detail records containing cell-site location information from a service provider?

<p>A search warrant supported by probable cause (B)</p> Signup and view all the answers

Which of the following statements is true regarding the examination of digital evidence?

<p>Digital copies of relevant data should be created whenever possible. (A)</p> Signup and view all the answers

Which of the following is NOT a requirement for a valid search warrant for a digital device, according to the text?

<p>The warrant must authorize the search of 'any and all information' on the device. (C)</p> Signup and view all the answers

Under what circumstances can an employer grant consent to search an employee's computer, according to the text?

<p>The computer is owned by the employer. (C)</p> Signup and view all the answers

What form should be used to document written consent for searching a digital media device?

<p>OPD Form 5B (C)</p> Signup and view all the answers

Which of the following is NOT an exigent circumstance that may justify a warrantless search of a digital device, according to the text?

<p>The possibility of data loss on the device (C)</p> Signup and view all the answers

Under what circumstance is the expectation of privacy of an individual absolved, according to the text?

<p>Upon the death of the individual. (C)</p> Signup and view all the answers

What is required for examining digital evidence, according to the text?

<p>The investigator must have received proper training prior to the search. (D)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser