CJUS 540 Test 2 Study Guide
.docx
keyboard_arrow_up
School
Liberty University *
*We aren’t endorsed by this school
Course
540
Subject
Computer Science
Date
Feb 20, 2024
Type
docx
Pages
6
Uploaded by steezlebot
CJUS 540 Test 2 Liberty University
Clancy, Tomas K. (2019).
Cyber Crime and Digital Evidence
(3
rd
ed.). Upper Saddle River, NJ: Carolina Academic Press. ISBN: 9781531009618.
Chapters 8-12 of the reading assignment Set 1
1.
If someone said to you, “The law on the searching digital devices at the US international border is crystal clear!” What questions might you ask them and with what case law would they be supported?
2. Regarding third party consent, does the Court shift the burden onto the police to determine the existence of the password/encryption by either 1) asking about it or 2) configuring the software to look for it?
3.
Does the scope of the search incident to arrest
extend beyond the location where the accused is arrested? Why? Or why not?
4. Describe the basic elements of a search warrant
5. When is a warrant for digital evidence executed? Is it when the computer or other digital device is seized or is
it when the forensic examination back at a laboratory finds the evidence?
6. Describe what “outside the box” or data in transit means and how it is regulated.
7. Following a warrantless seizure, can the police take as much time as they desire to obtain a warrant?
8.
If someone were to ask you about the difference between a Pen Register and
a Trap and Trace device and their respective uses, what would you tell them?
Question 1 When is a warrant for digital evidence executed? Is it when the computer or other digital device is seized or is it when the forensic examination back at a laboratory finds the evidence? There are two computer searches: (1) seize the equipment and (2) obtain the data contained in the computer equipment. The equipment that can be seized is the computer hardware and software. If the data is seized, that can include hard drives or other storage devices such as a floppy disk. In the context of warrants issued to seize computer software and hardware, the courts have often found generic descriptions of the items to be seized to be sufficient (Clancy, 2019). A warrant for digital evidence is executed when there is probable cause. A warrant can be executed when searching and seizing a computer on a scene. If the computer needs further examination, another warrant may need to be requested if there is additional incriminating evidence not covered under the first warrant. There
are two principal approaches to searches involving electronic data stored on computers, if a computer is a form of a container and the data in electronic storage mere forms of documents or whether such searches for data require a "special approach" (Clancy, 2019). References Clancy, T. K. (2019). Cyber Crime and Digital Evidence: Materials and Cases (3rd ed.) Durham: Carolina Academic Press. When is a warrant for digital evidence executed? Is it when the computer or other digital device is seized or is it when the forensic examination back at a laboratory finds the evidence? Selected Answer: There are two varieties of computer searches: one is to seize the equipment, that is, the computer hardware and software; the other is to obtain the data contained in the computer equipment, including on hard drives and various storage devices, such as floppy disk. A warrant for digital evidence is executed when there is probable cause. A warrant can be executed when searching and seizing a computer on the scene, and when if the computer is take back for forensic examination another warrant may need to be requested if more incriminating evidence is found that was not in the original warrant.
Question 2 Regarding third party consent, does the Court shift the burden onto the police to determine the existence of the password/encryption by either 1) asking about it or 2) configuring the software to look for it? The presence of password of password protection files is important to asses in a third party's authority to consent. By creating password protected files, the creator intends to exclude other users from files. Under such circumstances, it cannot be said for that person to agree for other users to search files. The lack of passwords to
protect files from other users gives other users access to searching the computer. Courts consider the issue and attempted to analogize computers to other items that
are commonly found in Fourth Amendment jurisprudence. An individuals privacy in a computer has been compared to a "locked footlocker inside the bedroom". Courts addressing the issue of third party consent in the context of computers, have examined officers' knowledge about password protection as an indication if a
computer is "locked" in a way a footlocker or breifcase would be (Clancy, 2019). Additionally, the courts consider the location of the computer within the house and other indicia of household members' access to the computer in assessing third party
authority (Clancy, 2019). Third party authority to consent to search has been upheld
when the computer is located in a common area and other users have access to use
the computer. There has been issues if the computer is in a common area and a third party user has disclaimed access or control over the computer or accessing files. Given the case law indicating the importance of computer password protection, the common knowledge about the prevelance of password usage, and the design of EnCase or similar password bypass mechanisms, the Fourth Amendment and the reasonable inquiry rule, mandate that in consent based, warrantless computer searches, law enforcement personnel inquire or otherwise check for the presence of password protection and, if a password is present, inquire about the consenter's knowledge of that password and joint access to the computer (Clancy, 2019). References
Clancy, T. K. (2019). Cyber Crime and Digital Evidence: Materials and Cases (3rd ed.) Durham: Carolina Academic Press. Regarding third party consent, does the Court shift the burden onto the police to determine the existence of the password/encryption by either 1) asking about it or 2) configuring the software to look for it? Selected Answer: Case law indicates the importance of computer password protection, the common knowledge about the prevalence of password usage, and at design of EnCase or similar password bypass mechanisms, the 4th Amendment and the reasonable inquiry rule, mandates that in
consent based, warrant less computer searches, law enforcement personnel inquire or otherwise check for the presence of password protection and, if a password is present inquire about the consenter's knowledge of that password and joint access to the computer
Question 3 Following a warrantless seizure, can the police take as much time as they desire to obtain a warrant?
Many jurisdictions require that a search warrant be executed within a certain time period. The federal rule requires, except for tracking devices, the warrant must be executed within 14 days from the date the magistrate signed the warrant. Execution
of the warrant after that specified time period is expired, the courts could find violation of the governing statutory or procedural ruled and find the warrant useless. If the warrant is invalid, the search would be considered warrantless and the standard applicable to a warrantless search and seizure would be applied (Clancy, 2019). Once it has been established, a seizure has occurred, it must be justified and reasonable. Consistent with the treatment of seizure of persons, the court has distinguished between temporary detentions, justified by articulable
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
"The impact of hacking on life" - For the last several years cyber-attacks/hacking are in the news on a seemingly continuous basis. Some of the most recent/largest hacking events include the Solarwinds hack that was the conduit for the major breach of many US Federal agencies and the disturbing Equifax hack from 2017. Have these events and the subsequent reporting caused you to change any habits/behaviors? Please provide your thoughts on this along with why you have or have not made any changes as a result of these events.
Hint: Please don't use chat gpt
arrow_forward
Word limit: 1000 words
arrow_forward
Hi I want to make a video presentation on this topic which should be 5 mins atleast, so need help below format:
Discussion: Misadventures of a Nation State Podcast
Discuss Darknet Diaries Episode 10. Why is this a video discussion instead of a written response? It is an important skill to master to be able to present and summarize the key concepts of a complex cybersecurity incident in a short time frame. Remember that unless you are talking to other cybersecurity professionals, probably no one thinks this stuff is as interesting as you do.
Instructions: The main purpose of the video discussion assignments is to get you to dig into the main four cybersecurity frameworks and references we use in the class. Use the context of the specific security incident to explore and explain some aspects of the NIST CSF, the CIS CSCs, ACSC Strategies to Mitigate Cyber Incidents, and the MITRE ATT&CK matrix.
Keep each discussion sub-topic focused and to approximately 1 minute for a TOTAL video…
arrow_forward
According to the courts, what does the First Amendment of the U.S. Constitution allow
for internet free "speech?" May the Government browse Web sites without a warrant in
order to nip terrorism plots in the bud? What does the Fourth Amendment's search and
seizure provisions allow with regard to shutting down objectionable web sites? What about
sites that are hosted overseas?
arrow_forward
What is the ISO 27000 series of standards? Which individual standards make up the series?
Supplementary Materials
Pfleeger, C.P., Pfleeger, S.L., & Margulies, J. (2015). Security in Computing 5
th Edition. Pearson
Education.
Stallings, W., & Brown, L. (2015). Computer security. Principles and Practice 3rd Edition. Pearson
Education
Schou, C., & Hernandez, S. (2014). Information Assurance Handbook: Effective Computer Security and Risk Management Strategies. McGraw Hill Professional.
Agrawal, M., Campoe, A., & Pierce, E. (2014). Information security and IT risk management. Wiley
Publishing.
arrow_forward
Essay:
Why is cryptography important in information/cyber security?
arrow_forward
Information security and privacy - what are they? Are all age groups the same when it comes to their perceptions of privacy?
arrow_forward
Computer Science
After you have concluded the readings and lectures this week, think about what the laws do not cover in terms of cybercrime. Where are the gaps? Assume you are the lead staffer for a congressman, what would you recommend for future legislation (realistically – given current available technologies and limitations)? How would you approach a non-technically savvy person and convince them to support your legislation?
arrow_forward
Do you know of anybody who has been bullied on the internet? What was your immediate response to this? How did you know that the individual had previously been bullied??
arrow_forward
Identity theft occurs when someone acquires your personal information and uses it to hijack your finances. A common scenario is a thief using your Social Security number to open a credit card account in your name. When the thief does not pay, it is your credit history that is tarnished.
1. List three steps an individual should take to avoid identity theft.
2. List three steps a corporation that maintains your personal data in its information system should take to safeguard your data.
3. How can Internet activities contribute to the likelihood of identity theft? How can you prevent it from happening to you?
arrow_forward
Discuss the concept of mobile device fingerprinting and its implications for privacy and security.
arrow_forward
Computer science
arrow_forward
Cybersecurity discussion
In 2013, Edward Snowden was hired by the NSA after previous employment with the CIA as a systems administrator. In early June of 2013 he revealed thousands of classified NSA documents to journalists Glenn Greenwald, Laura Poitras, Barton Gellman, and Ewen MacAskill about government surveillance programs. By June 21, 2013, the United States Department of Justice unsealed charges against Edward Snowden of two counts of violating the Espionage Act of 1917 and theft of government property, which identified the leak of state secrets as an act of treason.
Snowden has become a subject of controversy, both ethically and legally being seen as a traitor, a hero, a whistleblower, a dissident, and patriot.
Data Security and Privacy in the Age of Surveillance (Links to an external site.)
Edward Snowden: Patriot or Traitor? (Links to an external site.)
Edward Snowden is Both A Patriot and A Traitor (Links to an external site.)
Using the above short video and articles…
arrow_forward
intellectual property (IP) theft from an organization. What was stolen? What vulnerability did the threat actors exploit? How valuable was the IP? What did the threat actors do with it? What loss did it create for the organization? How could it have been prevented? Write a one-page paper on your findings.
arrow_forward
What are the general categories of computer-related crimes?
How does the Fourth Amendment apply to the Internet?
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Related Questions
- "The impact of hacking on life" - For the last several years cyber-attacks/hacking are in the news on a seemingly continuous basis. Some of the most recent/largest hacking events include the Solarwinds hack that was the conduit for the major breach of many US Federal agencies and the disturbing Equifax hack from 2017. Have these events and the subsequent reporting caused you to change any habits/behaviors? Please provide your thoughts on this along with why you have or have not made any changes as a result of these events. Hint: Please don't use chat gptarrow_forwardWord limit: 1000 wordsarrow_forwardHi I want to make a video presentation on this topic which should be 5 mins atleast, so need help below format: Discussion: Misadventures of a Nation State Podcast Discuss Darknet Diaries Episode 10. Why is this a video discussion instead of a written response? It is an important skill to master to be able to present and summarize the key concepts of a complex cybersecurity incident in a short time frame. Remember that unless you are talking to other cybersecurity professionals, probably no one thinks this stuff is as interesting as you do. Instructions: The main purpose of the video discussion assignments is to get you to dig into the main four cybersecurity frameworks and references we use in the class. Use the context of the specific security incident to explore and explain some aspects of the NIST CSF, the CIS CSCs, ACSC Strategies to Mitigate Cyber Incidents, and the MITRE ATT&CK matrix. Keep each discussion sub-topic focused and to approximately 1 minute for a TOTAL video…arrow_forward
- According to the courts, what does the First Amendment of the U.S. Constitution allow for internet free "speech?" May the Government browse Web sites without a warrant in order to nip terrorism plots in the bud? What does the Fourth Amendment's search and seizure provisions allow with regard to shutting down objectionable web sites? What about sites that are hosted overseas?arrow_forwardWhat is the ISO 27000 series of standards? Which individual standards make up the series? Supplementary Materials Pfleeger, C.P., Pfleeger, S.L., & Margulies, J. (2015). Security in Computing 5 th Edition. Pearson Education. Stallings, W., & Brown, L. (2015). Computer security. Principles and Practice 3rd Edition. Pearson Education Schou, C., & Hernandez, S. (2014). Information Assurance Handbook: Effective Computer Security and Risk Management Strategies. McGraw Hill Professional. Agrawal, M., Campoe, A., & Pierce, E. (2014). Information security and IT risk management. Wiley Publishing.arrow_forwardEssay: Why is cryptography important in information/cyber security?arrow_forward
- Information security and privacy - what are they? Are all age groups the same when it comes to their perceptions of privacy?arrow_forwardComputer Science After you have concluded the readings and lectures this week, think about what the laws do not cover in terms of cybercrime. Where are the gaps? Assume you are the lead staffer for a congressman, what would you recommend for future legislation (realistically – given current available technologies and limitations)? How would you approach a non-technically savvy person and convince them to support your legislation?arrow_forwardDo you know of anybody who has been bullied on the internet? What was your immediate response to this? How did you know that the individual had previously been bullied??arrow_forward
- Identity theft occurs when someone acquires your personal information and uses it to hijack your finances. A common scenario is a thief using your Social Security number to open a credit card account in your name. When the thief does not pay, it is your credit history that is tarnished. 1. List three steps an individual should take to avoid identity theft. 2. List three steps a corporation that maintains your personal data in its information system should take to safeguard your data. 3. How can Internet activities contribute to the likelihood of identity theft? How can you prevent it from happening to you?arrow_forwardDiscuss the concept of mobile device fingerprinting and its implications for privacy and security.arrow_forwardComputer sciencearrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning