Summary

This document includes details on courtroom evidence, covering procedural stages of a criminal prosecution, relevant evidence, witness credibility and the collection of information on them, and the proper methods of collecting evidence. It details the important points in an investigation and courtroom process.

Full Transcript

Exam 4 1121. Courtroom Evidence EPO #1. Identify the Procedural Stages of a Criminal Prosecution. 1. Pre-Trial Suppression (Motion) Hearings a. Typically where Defense files evi to be removed (LEOs testify here in front of Judge, no Jury) 2. Voir Dire a. Jury Selection 3. C...

Exam 4 1121. Courtroom Evidence EPO #1. Identify the Procedural Stages of a Criminal Prosecution. 1. Pre-Trial Suppression (Motion) Hearings a. Typically where Defense files evi to be removed (LEOs testify here in front of Judge, no Jury) 2. Voir Dire a. Jury Selection 3. Case-in-Chief a. Prosecutors case (includes their witnesses too) i. Defense can cross-examine at this time 4. Defense’s Case a. Same as above but vise versa 5. Rebuttal Case a. Government can rebut what Defense is put forward – evi put forth can only be used to challenge what defense put forward, the Defense can then rebut the rebut through their own evi that counter acts the evi i. Little hamster running around and around its little wheel 6. Closing Argument a. Both sides explain to Jury what evi revealed, proved, or disproved 7. Charge to the Jury a. Instructions for them → Judge tells Jury the law/elements/components 8. Sentencing a. Conviction → hearing b. Only fed judges choose sentence for fed crim trials (unless its death penalty) EPO #2. Describe Relevant, Direct, & Circumstantial Evidence. Relevant → whether or not it pertains to case Direct → testimonial, first hand accounts Circumstantial → where inference is required EPO #3. Identify Factors That Can Affect Witness Credibility & the Need to Collect Information on Them. IMPEACHMENT: an attack on testimony of witness credibility * a Witness can be rehabilitated from impeachment 1. Bias a. Does relationship give cause to fabricate a lie or alter testimony 2. Motive to Fabricate a. Is there a personal stake to fabricate a lie (co-dependent, financial interest) 3. Inability to Observe or Accurately Remember a. If person did not see or hear encounter first hand or has unstable recall 4. Contradicion 5. Perception a. An inability to observe or remember encounter 6. Prior inconsistent testimony 7. Specific Instances of Conduct that Indicate a Witness is Untruthful 8. Prior convictions a. Felony w/in last 10 years b. Misdemeanor w/in last 10 years ONLY IF it pertains to perjury or false statements c. ***Arrests do not count EPO #4. Describe How Evidence Should be Collected so a Foundation Can Be Laid in Court. Proper Foundation → showing evidence, in form of testimony, that it is what it is claimed to be 1. Authentification a. Prevents fraudulent accusations b. Prevents innocent mistakes c. Method = Witness w/ personal knowledge 2. Chain of Custody a. Possession & Control of evidence b. Documentation c. Best practices: i. Photograph evi before seizure ii. Minimize # of people who handle it iii. Fill out packaging/forms accurately *Foundation Issues = Mishandling, deterioration, or improper lab testing of evidence EPO #5. Describe How Statements & Reports Are Used to Aid/Prepare Witnesses in Courtroom Testimony. 1. Refresh Memory a. Notes, Reports, Documents → really anything that a W claims to help them remember b. *Becomes available to defense if used in ct to remember (not given to jury or read aloud) i. Can be used to cross examine EPO #6. Describe How to Establish a Foundation for Business Records & Public Docs to be Admissible in Court. 1. Best evidence = original doc or duplicates a. Exceptions → doc is lost or destroyed in bad faith → doc is in possession but is not produced by party possessing it → a witness testifying on behalf of doc 2. Self-Authentifying a. No Witness required to testify on behalf of it Ex. = gov documents “under seal” or certified = business records created in ordinary business of commerce, created/kept/maintained not for purpose of trial 4013. Law Enforcement Response to a Mental Health Crisis EPO #1. Recognize Behaviors Associated w/ a Mental Health Crisis (MHC). MENTAL ILLNESS : problems in areas of thoughts, emotion regulation, & behavior that reflects dysf(x) → causes clinically significant stress → person’s experiences significant distress/disability in social, occupational, education, etc. arenas MH CRISIS: a behavioral, emotional, psychiatric situation resulting in a significant ↓ in f(x)’ing levels needed for daily life → significant stress leads to distress & abnormal behavior ABNORMAL BHVR: violates societal norms // maladaptive // causes person stress in daily life SIGNS = physical indications that can be recognized by observers - Consideration Factors: Religion, Culture/Location, Social class - *LE Emphasis Items: a. LEO’s only report signs/symptoms, not diagnose b. “Excited Delirium” is not a thing i. Focus on behaviors or descriptions, aka be specific c. Most custody deaths occur from positional asphyxiation d. 5 Most Common Situations for LE: 1. Concerned person calls police during psychiatric emergency 2. A person w/ a mental illness feels suicidal & calls police for help (most difficult for LE) 3. Police encounter a person w/ mental illness behaving inappropriately in public 4. Citizens calls police bc of unusual bhvr making them feel threatened a. Or mere presence of a person w/ mental illness feels threatening 5. Person w/ mental illness calls police for help for imagined threats SYMPTOMS = abnormalities recognized by patient, an inward & experiential manifestation → Categories of Behaviors to Look Out For: 1. Excessive Feelings 2. Social Disruption 3. Altered Thinking 4. Changes in Habits EPO #2. Identify and/or Demonstrate Techniques to De-Escalate a Situation w/ a Subject Believed to be in a MHC. 1. Responding to Calls: a. Gather all info available from dispatch b. Consider officer/public safety concerns c. Develop a plan – consider time of day, weather, routes d. Always be aware of “suicide by cop” potential e. Immediately assess scene + individs present i. Must immediately I.D. threats, focus on O safety, & roles of individs on scene 2. Indicators a. Environmental Cues (excess waste, pack-ratting, hoarding/accumulation) b. Verbal Cues (illogical/grand thoughts, paranoia/delus/halluc, unusual speech pattrns, hostile/arguing/beligrnt c. Behavioral Cues (body mvmt/postur/mannerism/pacing/agitation, lethargic/sluggish, repetitive/ritualistic) → confusion, unaware of surroundings, inapprop emtnl response, causing harm/injury 3. Stabilize Scene a. Goal is always voluntary compliance → recognize danger signs i. Safely & quickly eliminate distractions 4. Contact w/ Subject a. Establish Rapport* i. Maintain Distance, Move Slowly, Learn names/Introduce Self, Psych 1st Aid/MI/Cialdini’s ii. Keep voice even & calm, build trust through identifying personal issues, reassure as much as pssble iii. Locate caregiver, identify cause/origin of crisis, do not argue w/ them, do no play into their reality 5. If threat → LE should take immediate action to prevent harm 6. Stable Scene a. Assess for additional info (phys evi, emergency services, comply w/ policy) 7. Interview Witnesses, Family members, Caretakers a. Identify state of caretaker (caretaker burnout) 8. Identify next steps/resources nearby a. Crisis Intervention Teams (CIT) b. Return to Caretaker c. Involuntary Commitment d. d. Arrest 9. End of Encounter a. Documentation 2336. Investigative Info Sources & Financial Analysis EPO #1. Identify the Fundamental Principles & Operation of Bitcoin. Crypto = virtual currency - Bitcoin = first decentralized digital currency a. Operates through blockchain technology i. Bitcoin addresses: 1. 26-36 characters long 2. Begin w/ either (1), (3), or (bc1) ii. Wallets: 1. Hardware a. Trezor & Ledger 2. Software 3. Recovering Wallets a. Seed Phrases: i. 12-24 short words ii. Precise order (no backup to this//last resort) b. Money Conversion → On-Ramping: the process of turning fiat currency into crypto → Off-Ramping: the process of turning crypto into fiat 2070. Controlled Substance Identification EPO #1. Identify Pharmaceutical Drugs Using the Drug Identification Bible, & Various Controlled Substances Through Physical Characteristics. (1) Drug Identification Bible (a) Purpose = Document current drug scene for LEOs/others not in medical field (i) Table & Capsule Imprint Section: 1) All OTC, Rx, & Scheduled drugs w/ medical use in U.S./Canada/Mexico 2) Includes alpha/numeric codes… aka the imprint 3) Lists ingredients, appearance, use, brand, control, & manufacturer 4) Schedule I drugs are NOT listed bc there is no medical use* (ii) Controlled Rx Drug Photos (iii) Illicit Drug Text Literary Section 1) Lists all common abused Schedule I Drugs 2) CSA Schedule, street names/prices, history, manufac methods, pharma class, & effects (iv) Illicit Drug Photo Section (v) Slang/Glossary Section (2) Controlled Substances (a) Physical Characteristics (i) Heroin 1) Asian White → white/tan/gray, smells of vinegar, grainy like talcum powder, bitter in taste 2) Mexican Brown → brwn/brick red, grainy like brwn sugar, clumps, retains same smell/taste 3) Black Tar → fresh = roofing tar dry = hard, dark gray/blk, retains same smell/taste (ii) Cocaine 1) HCl → pearlescent/sheen flakes to fluffy in texture 2) Base (“Crack”) → waxy, chunky/granular, off-white if converted from HCl form → converted other way = crystalline structure → either way, its non-water soluble (iii) Marijuana 1) Green/Brwn Leafy, higher concentrations has the buds 2) Hashish → THC spores, hard rock-like from compression of marij. Plant (iv) Ecstasy (MDMA) 1) Typically in tablet form w/ all different shapes, colors, sizes, & logos (v) Fentanyl 1) Schedule II Opioid (for severe pain), Lethal Dose = 2mg (wt of mosquito) 2) White/Off-white powder sold as heroin & counterfeit Rx narcotics 2194. Physical Evidence EPO #1. Identify and/or Demonstrate Proper Methods for Locating, Documenting, Collecting, & Packaging Evidence. 1. LOCATING: a. Stages of Search: i. Preparation (legal, personnel, equip) ii. Approach (secure & protect) iii. Basic Premises (identify V, S, W’s & why we are here) iv. Preliminary Survey (dvlp fluid theory, allows LEOs to gauge what is needed to process scene) v. Evaluation (assess evi) 1. Evi comes in 3 Forms : Physical (Real) / Testimonial (Statements) / Documentary (Written) 2. Goals: Furnish truth, prove/disprove claims, is better than eyewitness testimony* 3. Physicality: a. Tangible, Any object, Has Form & Mass, Visible/Invisible, May req processing, Helps reconstruct scene b. Uses: i) Corroborates V, W, & S statements (iv) Est. elements of crime ii) Exonerates Innocent (v) Place S in contact w/ V iii) Juries expect phys evi 4. Human error: i) Can ↓ value/effect in trial ii) Evi can speak for itself, does not lie, not subject to emotions, cannot be impeached ***Utmost importance for LEOs to handle it appropriately 2. DOCUMENTING: - Golden Rule → do not touch, move, or alter anything until scene is documented → Exceptions = safety & fragility of evi i. Note Scene 1. In chronological order, Written in ink, Legible, Accurate ii. Photograph Scene 1. Overall, Intermediate/Mid-Range, Close-Up 2. Use scales & numbers iii. Sketch Scene 1. Rough Sketch a. Any changes/corrections to rough sketch must be made: @ the scene b. Must be identified by the: Title Block c. Should contain the phrase: “Not to scale” 2. Measurements a. Optimal number of ppl to take measurements: 2 or more b. Three basic types of measurements: i. Baseline (locate items along a wall) ii. Rectangular coordinate (locate items against a wall, 2 measurements @ ∟) iii. Triangulation (2 fixed pts, most accurate) 3. COLLECTING: a. Locard’s Principle of Interchange – “It is highly improbable that someone can enter an enviro and leave it without leaving something of themselves and or taking something of the enviro w them” →Every contact leaves a trace b. Comparison Standards – i. Class Characteristics 1. A quality or feature shared by all members of a certain class of objects or substances 2. Cannot measure unique features to find specific source → Can become circumstantial evi ii. Individual Characteristics 1. a feature, even among members of the same class, resulting from nature, accidental or chance, occurrences, wear and tear, uses and abuse, which demonstrates uniqueness or individuality - All items recovered from a known source are subject to the same analysis as the unknown iii. Control Samples – Items used for collection of evi may alter the evidential value of evi iv. Elimination Samples – Samples taken from a known source to compare to or against unknown or Q’d specimens c. Types of Evi to Collect →*Fragile/Trace evi first (ex. hairs/fibers, biohazards, laten friction ridges, volatile liquids) i. Blood/Bodily Fluids 1. Air dry if possible, do not subject to heat/humidity or place in non-porous container 2+ hrs ii. Electronic Evi 4. PACKAGING: a. Order of packaging: i. Document → Mark container → Place evi inside →Seal container b. Markl evi only if necessary or commanded by policy (In a non-critical area) EPO #2. Identify Process for est. & Maintaining a Chain of Custody & Submitting Evidence for Lab Analysis. Chain of Custody = essential in admissibility of evi into legal system = Life history of item (from time until it is discovered until officially release = Courts require proof that evi = same as collected @ scene (a) Practices: #1. Letter of Transmittal (Goes to lab for analysis) EPO #3. Identify the Components of a Document & Methods of Obtaining Request & Non-Request Exemplars. EXEMPLAR: authentic specimens which contain true cross section of material from known source (1) 3 Components (a) Paper or other medium (i) Characteristics depends on type used (ii) Wood, Cloth, Discs, CDs, Hard Drives (b) Ink or other medium (i) Graphite, Toner, Software (c) Writing Instruments (i) Handwriting, Printer, Typewriter (2) Methods (a) Humans (i) Handwriting → health, drugs/alc, age affect sample over time (ii) Request: (+) allows inv to more closely duplicate content of Q’d handwriting (iii) Non-Request: (+) done w/o S knowledge, ↓’d expectation to disguise writing (b) Machines (i) Anything that prints (seize machine if possible) 3122. First Responders to Digital Evidence EPO #1. Define the Uses & Roles of Electronic Devices in Criminal Activity. Roles: 1. Target of an illegal scheme a. Uses: i. Network penetration // Unauthorized access (Hacking) ii. Doxxing iii. Theft of PII, trade secrets, or financial information iv. Ransomware, Maladvertising, Spyware v. Database record alteration, creation, or deletion vi. Theft of computers or other electronic devices 2. Instrument/Tool to facilitate criminal activity a. Uses: i. Any electronic communications - (stalking, threats, harassment, crim to crim discussions) ii. A hacker’s system/platform iii. Phishing & Spear-Phishing 3. Storage/Repository for criminal activity a. Uses: i. Graphics/Video, Surveillance iii. Temporary Internet Files (TFI) ii. Personal correspondence iv. Financial records/documents EPO #2. Describe How Electronic Evidence May be Altered or Destroyed. Two enemies of Digital Evi: 1. Physical / External a. Damage to exterior or device itself 2. Software / Internal a. Damage to contents within system/coding Beware of electronic media & Electrostatic discharge EPO #3. Identify Electronic Devices That May Be or May Contain Evidence. 1. Any electronic device that can store data a. Phones b. iPads c. Computers d. Optical Media (CD’s/DvD’s) e. Storage Devices f. Firesticks g. Cloud capabilities EPO #4. Identify Non- Electronic Items That May Be Important in the Investigation of an Electronic Crime. 1. Computer hardware/software documentation 2. Critical trace evidence (DNA) 3. Indicators of ownership to associate Subject 4. Printer Reports 5. Scraps of paper w/ access codes/passwords EPO #5. Identify Proper Procedures in Collecting, Preserving, & Transporting Computers + E-Items Seized as Evi. Collecting: a. First and foremost → Officer safety always priority, Use PPE, Secure Scene i. Physical (separate people from devices) ii. Electronic (sever all connectivity) b. Search for devices in order from small to large (phones → tablets → computers) i. Do NOT turn off a router Preserving: a. Press “SHIFT” or wiggle mouse to keep it on w/o creating new data b. Photograph screen c. Document everything d. B4 turning off computer obtain: i. RAM Capture (do NOT use Fat32*) ii. Encryption iii. Battery B4 Power (laptop) e. Be mindful of temperature extremes Transporting: a. Bottom, back floorboard of vehicle to maintain C.o.C 3064. Introduction to Mobile Device Investigations EPO #1. Determine Types of Technology & the Unique Identifiers (UI) Associated w/ a Mobile Device. Types: 1. Feature Phones a. Unique Identifiers: basic, limited power, slower, smaller, limited storage & connectivity 2. Smart Phones a. Unique Identifiers: mini computer, ↑ processing power, ↑ display quality, ↑ capabilities/connectivity 3. SIM (Subscriber Identity Module) Cards a. Unique Identifier: Physical microchip that connects a device to a cellular network b. ICCID (Integrated Circuit Card Identifier) i. Is the Unique Identifier for a SIM card & that authenticates device & connect it to a network ii. 19-20 digit serial #, printed on SIM Card 4. Cellular Network Technology a. Unique Identifiers: CDMA & GSM i. CDMA (Code Division Multiple Access) 1. MEID (Mobile Equipment Identifier) a. 15 alphanumeric identifier ii. GSM (Global System for Mobile Communications) 1. IMEI (International Mobile Equipment Identity) a. 15 or 17 digits b. Identifies Device Proper Forensic Handling Procedures: 1. Have Legal Authority 3. Off is Off / On is On 2. Document device (bc its evidence) 4. Isolate Device w/ Faraday Bag → Take photo of front & back of device → Airplane mode only if Faraday/aluminum not available Ideal Circumstances when interacting w/ devices: 1. Document it, Collect Forensically, Examine by Qualified Personnel (same as any other evidence EPO #2. Use Forensic Software Tools to Analyze/Generate a Report Containing Digi Data from Seized Mobile Device. 1. External Storage a. SD Cards & USB Drives → treat as a different piece of evi from device itself b. Lightning Drives → can be used to remove files from iOS devices 2. Connection Analysis a. Preservation Letter → Call Detail Reports/Records i. CDR → Cellular Service Provider ii. Gather what cell tower phone is connected to via IMEI/MEID b. Cellebrite + XRY to analyze // Gray Key aids in bypassing iOS passcodes 3. Data Extraction & Analysis a. Manual Examination i. Requires examiner to go in menu/directory and extract evi b. Logical Extraction i. Most widely supported*** ii. Uses devices backup feature from device’s operating system iii. Limited c. Physical Extraction i. Gives access to all data stored (even unallocated space) ii. “Unlimited” 4. Software Cable Interaction a. Cable → Device via COM port, USB*, or Bluetooth adapter b. “Trust” F(x) for iOS, Toggle Program for Android 5. Lab Environment = Faraday Bags/Boxes, Assess wireless network risks, & Airplane mode if others not avail Field Environment = Assess wireless network & GPS risks, Airplane Mode 6. Integrated Phone Capabilities: a. Call Logs e. Personal Calendars/Appointments i. Location Data b. Contacts f. Documents/Audio/Video/Image Files j. Metadata c. Messages g. Memos/Notes d. Email h. Internet Browser History 7. Analysis & Reporting a. Analytical Software Graphical User Interface (tables, data columns, data tabs) b. Keyword Searches (table + fill extraction) c. Filtering (file size, time/date, file type) d. Generating Extraction Report e. Proper Documentation for Seizure & Data Extraction (Cellebrite) 8. Geo Fence Warrant 9. BFU vs. AFU 3579. Conducting Investigations in the Cyber Environment EPO #1. Identify Necessary Precautions to Protect Personal & Agency Identifying Information During Inv Activity. (3) Vulnerabilities: 1. Computer Systems a. IP Address (software for router to I.D. an individual device) b. MAC Address (hardware attached to device) c. Network Name d. Tracking ID’s 2. Computer Files a. System generated data c. How viruses can get on your computer: b. Meta Data (data on the data) - unsolicited email (phishing) - random USB - emails, shared files, downloaded files *ALWAYS scope b4hand 3. Data Flow a. Wireless Networks*** (1) Change service set identifier (SSID) & Default router name (2) Change router login name & password (3) Invoke Encryption (WPA2-PSK) b. Open/Free Wi-Fi Hotspots i. Don’t use unless VPN available c. Firewall i. Make sure its on & Use default firewall for your ios Reduce vulnerability: 1. Keep everything updated (Patches for known vulnerabilities) 2. Consider safer alternatives (Operating System, i.e. Linux) a. Operating Systems, Web Browsers, Applications (Apps) 3. Turn your computer OFF when not used a. Can't be hacked when off 4. Use ANTI-VIRUS a. Norton, McAfee → NOT Kaspersky (Russian) 5. Administrator vs user accounts a. Privileges and policies b. Use strong passwords* c. Consider using a password manager Mitigate Danger:*** 1. Identify Danger & Act Immediately (a) disconnect from internet (b) run virus scan (c) run anti-spyware 2. Common operational security Principals*** - Awareness of your digital profile or cyber footprint - Common sense approach to personal/professional online safety & security 3. Goal of Digital Officer Safety*** → reduce personal/professional operational risks associated w/ online activity Things @ risk: - PII (photographs, DL #, SSN, DOB, POB), Geographical Info (addresses, former ones, phone #’s), Educational, Financial, Familial Information, Email Addresses Information Control, Can vs. Can’t Can → social media (plain view project) Read all terms & policies b4 downloading (tosdr.org) Tighten privacy settings Cannot control → banks, credit bureaus, retail stores, schools, hospitals, public records, data aggregators Digital Footprint → “Ego” surfing should be done on a regular basis to know what information can easily be obtained EPO #2. Identify How Social Networks & Online Gaming are Being Used for Criminal Activity. 1. Find targets 2. Spread Malware 3. Cyber Bully 4. Communicate/Create environments to meet and share content in a secure manner* i.e. for child exploitation 5. Glamorize organization, Recruit Members, & Direct Mvmts a. Gangs, threat groups, theft rings b. Sell stolen goods on (1) Establish marketplaces (Facebook, Ebay, etc.) (2) Virtual Bazaars EPO #3. Identify How the Internet is Used to Commit Crimes Why Internet? a. ↓ Physical Risk d. Low Expense/Barrier of Entry ***The internet removes the NECESSITY b. Anonymity e. Global pool of Victims of the criminal being PHYSICALLY c. Many Cyber Tools at the same LOCATION as the V How Internet? a. Cyber Attacks i. Malware, Advanced Persistent Threat, Zero Day Attack, Key Loggers, Botnets, Email Scams, Doxxing b. Targeting Infrastructure i. Supervisory Control And Data Acquisition (SCADA) Systems 1. These Control mass transit, Electrical grids, Military systems, ATC systems, Medical Facilities, etc. **Cyber criminals who possess a high degree of technical skills attack SCADA systems daily** c. Social Engineering i. Act of getting person to divulge information via human interaction & trust (i.e. honey-potting, AI bots) d. Online Auction Fraud i. Empty box What Internet: a. Surface vs Deep Web: - Surface = friendly la la land - Deep = secure, less accessible places → Dark web = a secret legal place where illegal things lurk (special software, typically trades in crypto) 1380. Electronic Law & Evidence EPO #1. Identify the Federal Reqs Governing the Use of Electronic Devices that Intercept Wire, Oral, & E-Comms. 1. Devices: electronic equipment *Federal Req’s: Non-Devices: human ears & hearing aids → Title III 2. Types: a. Real Time a. Wire b. Content or Communication b. Oral c. W/ a Device c. Electronic d. W/o Consent EPO #2. Identify the Federal Reqs Governing the Use of Electronic Devices that Trace Phone Calls & E-Comms. 1. Pen Register 2. Trap & Trace a. Outgoing a. Incoming EPO #3. Identify the Federal Reqs Governing the Use of Electronic Devices that Track the Movements of Suspects. United States v. Jones United States v. Katz 1. Physical Intrusion 1. Government intrusion 2. On a person, dwelling, paper, or effect 2. Subjective expectation/action 3. For the purpose of gathering info 3. In a place/way that the public rsnbly expects a REP Carpenter v. United States → LEOs/Investigators cannot track every movement of an individual for ≥ 7 days - 4A vio & req’s a SW signed by a Maj Judge EPO #4. Identify the Federal Reqs Governing the Use of Video-Only Surv in Locations Where Individs have a REP. *If there’s sound = Title III vio Requirements: 1. Public = good to go 2. Private = depends a. Interior of home → need a Warrant b. Open Fields → good to go c. Curtilage → depends on totality of circumstances i. What privacy measures has a person taken/in possession of to demonstrate their REP here? ii. Is the technology being used circumventing their means of privacy? EPO #5. Identify the Federal Reqs Governing Access to Stored Electronic Communications. Stored Electronic Communications: 1. Stored content = SW by a judge in district or whoever has authority/jurisdiction over offense 2. Stored data = Separate SW by judge in district (likely to be in another state bc of cloud servers) EPO #6. Describe Special Considerations in Executing a SW to Search and/or Seize Computers. EPO #7. Describe Special Issues Involving Authentication of Information Contained on Computers. EPO #8. Describe When Computers May be Searched w/o a SW. EPO #9. Describe Special Considerations in Preparing a SW to Search and/or Seize Computers.

Use Quizgecko on...
Browser
Browser