Courtroom Evidence PDF

Summary

This document describes procedures for collecting and presenting evidence in court, covering authentication, witness testimony, business records, and various types of evidence. It also discusses special considerations in executing search warrants for computers and the use of electronic devices for tracking and communication.

Full Transcript

**Courtroom Evidence** **LGD-00003 Describe how evidence should be collected so a foundation can be laid in court.** - - - - - - For Evidence to Be Admissible: - - - **LGD-00008 Describe how statements and reports are used to aid witnesses in courtroom testimony and in prepa...

**Courtroom Evidence** **LGD-00003 Describe how evidence should be collected so a foundation can be laid in court.** - - - - - - For Evidence to Be Admissible: - - - **LGD-00008 Describe how statements and reports are used to aid witnesses in courtroom testimony and in preparation for testimony.** - - - **LGD-00010 Describe how to establish a foundation for business records and public documents so that the contents will be admissible in court.** - - - - **LGD-00012 Describe relevant, direct, and circumstantial evidence.** - - - **LGD-00050 Identify factors that can affect witness credibility and the need to collect information regarding a witness\'s credibility.** **Factors Affecting Witness Credibility:** Bias, motive to fabricate testimony, inability to observe or accurately remember, contradiction, prior inconsistent statements, specific instances of conduct indicating untruthfulness, prior convictions showing untruthfulness. **Need to Collect Information on Witness Credibility:** - - - **LGD-00133 Identify the procedural stages of a criminal prosecution.** **Procedural Stages of a Criminal Trial:** Pre-trial suppression hearings (motion hearings), voir dire (jury selection), opening statements, the case-in-chief (prosecution), the defense case, rebuttal case (prosecution), closing arguments, jury charge, sentencing, post-trial proceedings. **Electronic Law and Evidence** **LGD-00013 Describe special considerations in executing a search warrant to search and/or seize computers.** Under **Title 18 USC § 3105**, a search warrant (SW) must be executed by the officers mentioned in its direction or by an authorized officer, with the assistance of others (such as a Computer Forensics Expert, CFE) only if the officer requires it and is present during the execution. - - **LGD-00015 Describe special issues involving authentication of information contained on computers.** - 1. 2. 3. 4. 5. **Particularity Requirement**: - - **Identifying Objects of the Search**: - - **Off-Site Search**: - - **Need for Multiple Search Warrants**: - **LGD-00025 Describe when computers may be searched and/or seized without a search warrant.** 1. - - 2. - 3. - - - - - **LGD-00103 Identify the federal requirements governing access to stored electronic communications.** The **Electronic Communications Privacy Act of 1986 (ECPA)** governs access to stored electronic communications. **Question 1: What type of information is being sought from the ISP?** 1. 2. 3. **Question 2: What type of legal document is necessary to require the ISP to disclose the information?** 1. 2. 3. **Preservation Letters**:\ To prevent deletion or destruction of evidence by an ISP before legal process is obtained: - **LGD-00104 Identify the federal requirements governing the use of electronic devices that intercept wire, oral, and electronic communications.** - - - - **LGD-00105 Identify the federal requirements governing the use of electronic devices that trace telephone calls and electronic communications.** ### Trap & Trace Devices and Pen Registers Pen Registers - Outgoing Trap & Trace - Incoming - ### Court Order Requirements: 1. - - 2. - - - - - 3. - - - **LGD-00106: Identify the federal requirements governing the use of electronic devices that track the movements of suspects.** False. Title III governs the interception of wire, oral, and electronic communications, not the use of tracking devices. False. Tracking is allowed in places where there is no reasonable expectation of privacy (REP). ### Fourth Amendment Considerations: 1. 2. - - - ### Officer Analysis: 1. - - - 2. - - - ### Warrants for Tracking Devices: 1. 2. 3. - - ### Cell Phone Tracking (Using Cell Site Data or GPS): 1. 2. Are required in order to compel the cell phone service provider to disclose real time and prospective cell site data. **LGD-00107 Identify the federal requirements governing the use of video-only surveillance in locations where an individual has a reasonable expectation of privacy.** ### Governing Law - ### Requirements for Video Surveillance 1. - - - 2. - ### Warrant Requirements (as per 6 Federal Circuit Courts): - 1. 2. 3. 4. **LGD-00185 Describe special considerations in preparing a search warrant to search and/or seize computers** Computer forensic experts should be involved in all phases of the search warrant process: determining probable cause (PC), drafting the search warrant (SW), and executing the search. **Evidentiary Issues and Authentication:** - **Admissibility of Digital Evidence:** - **Best Evidence Rule:** - **Hearsay Issues:** - **Controlled Substance Identification** **IOD-00195 Identify and demonstrate the procedures for conducting sequential and presumptive field drug test of suspected controlled and/or illicit substances using the proper field test kit.** - - - - - **IOD-00290 Identify pharmaceutical drugs using the Drug Identification Bible, and various controlled substances through physical characteristics.** - - **Physical Evidence** **IOD-00208 Identify and/or demonstrate the proper methods for locating, documenting, collecting, and packaging evidence.** - - - - - - - - - - - - - - - **IOD-00345 Identify the components of a document and methods of obtaining request and non-request exemplars.** - - - - - - - - - - - - - - - - - - - **IOD-00417 Identify the process for establishing and maintaining a chain of custody and submitting evidence for laboratory analysis.** - - - - - - - - - - **Investigative Information Sources and Financial Analysis** **IOD-01111 Identify the fundamental principles and operation of bitcoin.** **Introduction to Mobile Device Investigations** **TOD-00071 Determine types of technology and the unique identifiers associated with a mobile device.** - - - - - - - - - - - - Guidelines for Seizing Mobile Devices: 1. 2. 3. 4. Note: Airplane mode is not preferred because it may not disable GPS, Wi-Fi, or Bluetooth. **TOD-00081 Use forensic software tools to analyze and generate a report containing digital data from a seized mobile device.** External Storage (SD Cards, USB Drives, Lightning Devices): - - - Data Extraction and Analysis Methods: 1. 2. 3. 4. Forensic Tools: - - - - Once the extraction is complete, forensic software tools are used to analyze the data and generate a detailed report containing the findings, which can be used in legal proceedings. **First Responders to Digital Evidence** **TOD-00029 Define the uses and roles of electronic devices in criminal activity.** - - - **TOD-00032 Describe how electronic evidence may be altered or destroyed.** Enemies of Digital Evidence: - - Digital Media Negatively Affected By: - - - - **TOD-00079 Identify electronic devices that may be or may contain evidence.** Types of Electronic Media: - - - - - Networks and Servers: - - - **TOD-00084 Identify non-electronic items that may be important in the investigation of an electronic crime.** - - - **TOD-00416 Identify the proper procedures in collecting, preserving, and transporting computers and electronic items seized as evidence.** 1. 2. - - 3. - - 4. - - - 5. - - **Conducting Investigations in the Cyber Environment** **TOD-00483 Identify necessary precautions to protect personal and agency identifying information during investigative activity** **Advertising ID**: - - **Meta Data**: - - **Precautionary Measures**: - - - - - Digital Officer Safety (DOS): Be aware of your digital footprint to reduce personal and professional risks during investigations. Precautions: - - - - Three Areas of Vulnerability: - - - FAT32 Limitation: - **TOD-00484 Identify how social networks and online gaming are being used for criminal activity** Criminal Activities on Social Media: - - - - - - **TOD-00485 Identify how the Internet is used to commit cyber crimes.** Characteristics of Cyber Crime: - - - - Hacking (Digital Trespassing): - Cyber Attacks: - - - - - Targeting Critical Infrastructure: - Enabling Factor of Cyber Crime: - Crimes with Digital Components: - Exploitation of Personally Identifiable Information (PII): - Types of Cyber Crimes: - - - -

Use Quizgecko on...
Browser
Browser