Chapter 7

Legal

Information in This Chapter:

ent The Legal Aspects of Digital Forensics

ent The Fourth Amendment and Its Impact on Digital Forensics

ent Electronic Discovery

ent Duty to Preserve Potential Digital Evidence in Civil Cases

ent Private Searches and Establishing the Need for Off-Site Analysis

ent Overview of The Electronic Communications Privacy Act

ent Searching Digital Evidence With & Without a Search Warrant

Legal search authority is the first step in the digital forensic process. This holds true for both civil and criminal cases. This chapter serves as an introduction of search and seizure, electronic discovery, and the Stored Communications Act.

Probable Cause, Electronic Discovery (eDiscovery), Electronically Stored Information (ESI), Spoliation, Stored Communication Act (SCA), Consent, Third Parties, Exigent Circumstances, Plain view doctrine, Remote computing service (RCS), Duty to preserve, Data sampling, United States v. Frye, Daubert v. Merrell Dow Pharmaceuticals

Introduction

No discussion on digital forensic fundamentals can be complete without including the legal aspects of the discipline. The legal community has been playing a perpetual game of catch-up with technology since the very beginning. With computer and other technologies becoming so intertwined in our work and private lives, it was inevitable that electronic data would find its way into the courts. It's not just the child pornographers and identity thieves; digital evidence plays a huge role in civil litigation as well.

With these newfangled technologies came new criminal behaviors that necessitated new statutes outlawing them. Some of these are simply old crimes with a new twist. In this instance, the technology just facilitated the crime in an up-to-date, more efficient way.

Search authority is the very first step in the digital forensic process. The authority itself can take many forms, depending on which venue you're working in at the time.

Whether it be a civil or criminal case, having valid search authority is a requirement. In fact, it's the first step in the digital forensic process. In this chapter, we'll examine the fundamental legal issues in both criminal and civil litigation.

The Fourth Amendment

The Fourth Amendment serves as the “litmus test” for all governmental searches and seizures. Any evidence deemed to be seized in violation of the Fourth Amendment is inadmissible in a court of law. Americans have had a long distaste for governmental intrusion into their private lives. Before the American Revolution, British soldiers, operating under Writs of Assistance, routinely invaded the homes of citizens without cause. The Fourth Amendment to the Constitution was crafted with this travesty in mind. The Fourth Amendment says: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized” (FindLaw).

Criminal Law—Searches Without a Warrant

There are two key questions that must be answered from the beginning. First, did the government act? Second, did that action violate the individual's reasonable expectation of privacy? If the answer to the first question is “no,” then the Fourth Amendment doesn't apply. It only covers searches by the government (or its agents), not private citizens.

For Fourth Amendment purposes, a person becomes an agent of the government if they are acting at the request of law enforcement. Under that scenario, it would be no different than if the police officer conducted the search.

Reasonable Expectation of Privacy

What exactly is a “reasonable expectation of privacy”? That's a great question with no easy answer. There is no clear cut rule or test that would help us define it. Much of the interpretation centers on what society as a whole would consider as being reasonable. For example, a person would reasonably have a greater expectation of privacy on their personal computer than they would at a public library. As a rule of thumb, you can consider the computer as a closed container. If the officer lacks the authority to open a desk drawer or box, then the same would be true with a computer (Executive Office for United States Attorneys, 2009).

If the person has a reasonable expectation of privacy, then the government must first obtain a search warrant, or the search would have to meet one of the documented exceptions to the warrant requirement.

What about individual files? Should they be seen as separate, closed containers? It seems that courts aren't sure either. Rulings have been handed down supporting both positions. In (United States v. Slanina, 2002), the Fifth Circuit ruled that when a proper search is conducted on a portion of a disk, defendants no longer have a reasonable expectation of privacy in regards to other files.

In contrast, the Tenth Circuit took the opposite stance saying “[b]ecause computers can hold so much information touching on many different areas of a person's life, there is greater potential for the ‘intermingling’ of documents and a consequent invasion of privacy when police execute a search for evidence on a computer” (United States v. Walser, 2001).

Information that an individual knowingly exposes to others is not protected by the Fourth Amendment. Examples here could include public computers such as those in a classroom or “shared drives” on a network (Executive Office for United States Attorneys, 2009).

Private Searches

Private searches are not afforded Fourth Amendment protection unless the search is done at the request of the government or with their knowledge or involvement. Take the Geek Squad at Best Buy, for example. Let's say that someone gives them permission to work on their home computer and in the process they find child pornography images on their machine. The images found by the repair technician would be admissible as long as they were not searching at the request of the government, thereby acting as their agent.

E-mail

By and large, an individual maintains their Fourth Amendment protections when an e-mail is being transmitted, but would lose those protections when it reaches its final destination. E-mail is viewed in a similar fashion as regular “snail mail.” The legal interception of an individual's e-mail or other electronic communication is something that is tightly controlled. Known as the Wiretap Act, Title III of the Omnibus Crime Control and Safe Streets Act of 1968 prohibits unauthorized monitoring and lists the procedures needed to obtain a warrant for wiretapping (U.S. Department of Justice, Office of Justice Programs, 2010).

The Electronic Communications Privacy Act (ECPA)

The purpose of the ECPA was to ban a third party from intercepting and/or disclosing electronic communication without prior authorization. This federal statute was passed originally in 1968 as an amendment to the Wiretap Act of 1968. The ECPA underwent its first change in 1994 when it was amended by the Communications Assistance to Law Enforcement Act, also known as CALEA. It was modified once again after the 9/11 attacks by the USA Patriot Act. The Patriot Act was authorized again in 2006 (TechTarget, 2005).

Exceptions to the Search Warrant Requirement

There are several well-known exceptions to the search warrant requirement. A warrantless search is valid with consent as long as the person giving the consent is authorized and the consent is truly voluntary. The voluntariness of the consent is judged on the totality of the circumstances. The Supreme Court recognized age, education, intelligence, and the physical and mental condition of the person giving consent as important factors to consider. Other considerations would be whether the person was under arrest at the time of consent and whether the person had been advised of his right to refuse consent. If the validity of the search relies on consent, the burden is on the government to prove it was indeed given voluntarily.

Consent may be revoked at anytime. The search must cease immediately when the consent is withdrawn. So what happens if the suspect has second thoughts after his computer has been collected and taken to the lab for processing? The same standard applies (almost). The search must stop when they revoke their consent. That said, courts have said that this does NOT apply to forensic clones. In other words, although the original must be returned, any clones that have been made do not. Defendants do not have a reasonable expectation of privacy with a forensic clone (United States v. Megahed, 2009). For this very reason, cloning a drive sooner rather than later is a very wise move.

The scope of a consent search is sometimes at issue in a criminal case. If they give you consent to search the house, does that include closed containers and computers? Well, that depends on the particular details of the situation. Courts will again apply the “reasonableness” standard in making a determination. What would a reasonable person have understood the scope to be under those conditions?

The party granting consent may set forth restrictions on the search. Should that be the case, officers must abide with this request. To do otherwise could very well result in the suppression of any evidence recovered.

More Advanced

Consent Forms

In searches that hinge on consent, it often comes down to one side's word over the other. What exactly was said, how it was said, and what the suspect understood at the time could all be scrutinized. A well-crafted consent-to-search form will go a long way in countering any attack on the search. The form should include details specifically relating to digital evidence. The form should seek permission to search not just computers but any storage media including cell phones, manuals, printers, and more. The form should ask for permission to take these items from the location for offsite examination (Executive Office for United States Attorneys, 2009).

In the end, it's important to remember that consent searches can be highly nuanced and heavily dependent on the facts or circumstances that arise during that specific incident. While searching without a warrant is sometimes a necessity, the best practice is to get a search warrant whenever possible. Your case will rest on much more solid ground with a warrant than without.

Third parties can sometimes consent to the search of private property. Roommates, spouses, and parents are just a few of the examples. Normally, if a device is shared, all parties have the authority to provide consent to search its common areas. In this situation, none of them would have a reasonable expectation of privacy in the common areas since it's shared with other people. The notion of common areas is significant. Areas such as those that are password protected would not qualify as a common area. The third party would likely not have the authority to consent to its search. However, if the suspect has shared the password with the third party, then this constraint no longer applies. The suspect's reasonable expectation of privacy has been greatly diminished.

It's foreseeable that in the end, the third party in question really didn't have the authority to consent. This is not necessarily a deal breaker as far as the admissibility is concerned. Officers in the field can only do what a reasonable person would do when determining a third party's legal ability to provide consent. If the suspect is present at the scene, a third party is not permitted to grant consent.

Spouses, under normal circumstances, can consent to the search of common areas. Parents may or may not be able to provide consent to search a child's property. If the child in question is less than eighteen years of age, parents are generally permitted to give consent. If the child is over eighteen, then it gets a bit more complicated. Factors that will impact this determination include the child's age, whether or not they pay rent, and what steps (if any) they have taken to restrict access.

Technicians are often in the position of uncovering evidence during the course of their work. The courts have been split when deciding if the technician has the authority to consent. Officers may recreate the technician's search or observe them retrace their steps. They may not, however, expand the technician's search or direct them to look deeper. Should a technician locate evidence, their findings are normally used as the basis for a search warrant.

Exigent circumstances arise from time to time requiring the immediate seizure and possible search of a digital device. This is generally permitted under one of these three conditions: the evidence is under immanent threat of destruction, a threat puts law enforcement or the public in general in danger, and when the suspect is expected to escape before a search warrant can be acquired. This exception may apply to the seizure of an item or device, but not automatically the search of it. Once the item has been seized (secured), the exigency may no longer exist, thus requiring a search warrant to continue.

Officers have the right to charge suspects with evidence they see if they are legally permitted to be where they are, and if the item is immediately apparent to be incriminating. This is known as the plain view doctrine. This situation typically arises in a digital forensic context when an examiner is analyzing a drive for evidence of one crime and finds evidence of a completely different one. For instance, an examiner searching a hard drive for photos of stolen artwork comes across images of child pornography. At this juncture, the search should cease until a separate warrant pertaining to the possession of child pornography can be obtained.

Border searches and searches by probation and parole officers are afforded much more latitude than those conducted by police officers. From the court's perspective, individuals entering the country can be searched with probable cause or even reasonable suspicion. The court recognizes the government's need to secure the border from contraband and like material. Those individuals on probation or parole have less of an expectation of privacy than other citizens. For example, sex offenders may be prohibited from using the Internet during their supervised release. This stipulation would permit the parole or probation officer the authority to search the offender's computer at any time to ensure compliance. There is even some case law permitting this type of search without these specific conditions in place.

Employees in the workplace may or may not possess a reasonable expectation of privacy on their work computers. This expectation will vary depending on the facts including whether or not the employee is a government employee. Normally, officers can search an employee's computer without a warrant if the employer or another coworker (with shared authority) gives permission. Government employees are looked at a bit differently. That's not to say that employers can't search the employee's system; it just means that the search must be “work-related, justified at their inception, and permissible in scope” (Executive Office for United States Attorneys, 2009).

Searching with a Warrant

Absent one of the well-defined exceptions described here, police officers must have a search warrant before searching someone's private property, including their computer.

A search warrant is an order that is obtained by a law enforcement officer from a judge, granting them permission to search a specific place and seize specific persons or things.

A judge will issue the warrant when he or she believes that there is probable cause that a crime was committed and that the people or things specified in the warrant will be found at that location. The Supreme Court said that probable cause is established when there is “a fair probability that contraband or evidence of a crime will be found in a particular place” (Illinois v. Gates, 1983). Another way to look at it is more likely than not the items or persons to be seized will be found at that specific location. Mathematically, this would equate to a probability of 51 percent.

When applying for a warrant, it's helpful to determine the role of the computer in the crime. The computer can be considered contraband if it contains child pornography or is stolen property. The computer can also be used to store evidence, such as incriminating documents. Finally, the computer can serve as a tool or instrumentality of the crime. This is the case when the computer is used to hack into a company's network, for example.

Seize the Hardware or Just the Information?

We know from the Fourth Amendment that a search warrant must “particularly describe the place to be searched and the person or things to be seized.” To effectively meet that requirement, we first need to understand what precisely we need to seize. In short, is it the hardware or the information held by the hardware? If the computer is contraband, evidence, or fruits or instrumentalities of a crime, then we need to establish probable cause to seize the hardware. Otherwise, our focus is on the information alone.

Particularity

Courts frown heavily on overly broad affidavits that lack the particularity mandated by the Fourth Amendment. Affidavits should make it clear what items can be seized and what can't. “Particularly” describing things that you likely have never seen may seem like an impossible task. It's really not. Serial numbers and the like are not required.

Here is some sample language that could be used:

“Any and all personal computer(s)/computing system(s) located at the residence of (INSERT ADDRESS HERE), to include input and output devices, electronic storage media, computer tapes, scanners, disks, diskettes, optical storage devices, printers, monitors, central processing units, and all associated storage media for electronic data, together with all other computer-related operating equipment and materials.”

Describing the information can be done in a somewhat similar fashion. Although we probably don't know the file names, for example, it's quite possible that we would know the suspect's name, the time period, and the specific crime that's being investigated. The courts are looking for some type of limiting language. Asking for “any and all files” on a suspect's hard drive stands a very good chance of being deemed overly broad, resulting in the suppression of any evidence found.

Establishing Need for Off-Site Analysis

The forensic analysis of a hard drive can be a very time-consuming process. For a variety of reasons, this is best done at the lab or police station. For all intents and purposes, doing this at the scene contemporaneously with the search should not be the first option. As such, the search warrant affidavit should spell out in clear terms the logic and need for this practice. Reasons can include the amount of time and data involved and potential use of antiforensic techniques as well as the need to perform this task under the more controlled conditions (like those found in the lab). This is one way to make this point in an affidavit:

“Computer storage devices (like hard disks or CD-ROMs) can store the equivalent of millions of pages of information. Additionally, a suspect may try to conceal criminal evidence; he or she might store it in random order with deceptive file names. This may require searching authorities to peruse all the stored data to determine which particular files are evidence or instrumentalities of crime. This sorting process can take weeks or months, depending on the volume of data stored, and it would be impractical and invasive to attempt this kind of data search on-site.

Technical requirements. Searching computer systems for criminal evidence sometimes requires highly technical processes requiring expert skill and properly controlled environment. The vast array of computer hardware and software available requires even computer experts to specialize in some systems and applications, so it is difficult to know before a search which expert is qualified to analyze the system and its data. In any event, however, data search processes are exacting scientific procedures designed to protect the integrity of the evidence and to recover even “hidden,” erased, compressed, password- protected, or encrypted files. Because computer evidence is vulnerable to inadvertent or intentional modification or destruction (both from external sources or from destructive code imbedded in the system as a “booby trap”), a controlled environment may be necessary to complete an accurate analysis.” (Executive Office for United States Attorneys, 2009)

Stored Communications Act

The Stored Communications Act (SCA), enacted in 1986, provides statutory privacy protection for customers of network service providers. The SCA controls how the government can access stored account information from entities such as Internet Service Providers (ISPs). This account information typically includes e-mail as well as subscriber and billing information. Specifically, the SCA lays out the process state and federal law enforcement officers must adhere to in order to force disclosure of these records by the provider.

The SCA seeks to codify the type of information sought, the privacy expectations associated with it, and the legal instrument required for the government to access it. The SCA breaks down service providers into two separate and distinct groups: “electronic communication service” providers and those organizations that provide “remote computing services.” Understanding these differences is essential to deciphering the SCA and its legal requirements.

According to the SCA, specifically 18 U.S.C. § 2510(15), an electronic communication service (ECS) provider is “any service which provides to users thereof the ability to send or receive wire or electronic communications.” ECS examples would include companies that deliver telephone and e-mail services (Executive Office for United States Attorneys, 2009). America Online comes to mind, as does Hotmail. It may surprise you to know that any company, no matter what its focus, can qualify as an ECS.

Title 18 U.S.C.§ 2711(2) defines a remote computing service (RCS) as “the provision to the public of computer storage or processing services by means of an electronic communications system.” Put another way, an RCS is provided by an “off-site computer that stores or processes data for a customer” (Executive Office for United States Attorneys, 2009).

The SCA also addresses the variety of information these providers store. This can include basic subscriber information like name, address, and credit card number. Other potential information includes logs and opened, unopened, draft, and sent e-mails.

Electronic Discovery (eDiscovery)

Digital evidence is alive and well in civil cases. Parties involved in litigation need to review all of the potentially relevant data as well as any data that may have to be disclosed to the opposing party. Common means of discovery include interrogatories, depositions, and requests for document production (Sedona Conference, 2007). Electronically stored information (ESI) presents some challenges that paper records do not. For example, ESI is easily modified, volatile, and easily duplicated and dispersed. As such, the rules of evidence for both state and federal courts are changing to specifically address ESI.

The (Sedona Conference, 2007) defines eDiscovery as “The process of collecting, preparing, reviewing, and producing electronically stored information (“ESI”) in the context of the legal process” (Sedona Conference, 2007)

Duty to Preserve

Evidence that was once confined to paper memos and filing cabinets is now found in Microsoft Word documents and back-up tapes. Digital evidence is significantly different from the paper-based evidence so many lawyers were accustomed to dealing with. For example, digital evidence is far more volatile and easier to alter or destroy. Volume is another key difference. There can be such a mind-boggling amount of data in a case that it can cost millions of dollars just to produce and review them.

In December 2006, the federal courts took the first substantive step in addressing and dealing with digital evidence, changing the Rules of Civil Procedure. These rule changes mandate that opposing attorneys work together to deal with the electronically stored information (ESI) in the case very early in the process. Addressing ESI early in a case reduces costs, time, and the chance of relevant evidence being overlooked. Not all lawyers and judges have embraced these changes. Like many folks, some lawyers and judges are very uncomfortable with technology, even going as far as to have someone else check and then print their e-mail.

Zubalake v. USB Warburg was a series of landmark electronic discovery cases. Judge Shira Scheindlin's rulings addressed many of the fundamental concerns in cases that involve ESI. Some of the concerns included the duty to preserve electronic data, a lawyer's duty to oversee their client's compliance with these guidelines, data sampling, cost shifting, and sanctions.

The duty to preserve potentially relevant data begins when there is a “reasonable anticipation of litigation.” Failing to recognize this trigger and take action can result in spoliation of the evidence and potentially severe sanctions to boot. Like other legal standards addressed in this chapter, defining a reasonable anticipation of litigation can be difficult, quite difficult in fact. The duty to preserve is not just caused by the arrival of a subpoena. It's very likely that the duty kicked in well before that time. It's a very fact-specific determination that will vary from case to case. The firing of a disgruntled employee could be enough to trigger it; likewise, so could an accusation of sexual harassment by an employee against his or her supervisor.

Judge Scheindlin also addressed a lawyer's duty to oversee their client's attempts to identify, preserve, collect, and produce potentially relevant evidence. She said, in part, “[c]ounsel must take affirmative steps to monitor compliance so that all sources of discoverable information are identified and searched.” Furthermore, she said that attorneys should draft and distribute a “litigation hold” that directs a company and its employees to protect the relevant data and ensure they're not destroyed or compromised in any way.

Data sampling is a way to test a large collection of ESI for the “existence or frequency of relevant information” (Sedona Conference, 2007). The volume of potentially relevant data can be staggering, especially in a large corporate environment. Data sampling is one of the best ways to save time and reduce costs during the eDiscovery process.

The costs incurred during the eDiscovery process can be massive, rising into hundreds of thousands or even millions of dollars. Typically, in traditional discovery, the producing party bears the cost of production. Under certain conditions, the costs of production may be shifted to the requesting party. In the Zubalake case, Judge Scheindlin addressed this concern and devised a seven-factor test to be used to determine if cost shifting is warranted.

The seven factors are “(1) the extent to which the request is specifically tailored to discover relevant information; (2) the availability of such information from other sources; (3) the total cost of production compared to the amount in controversy; (4) the total cost of production compared to the resources available to each party; (5) the relative ability of each party to control costs and its incentive to do so; (6) the importance of the issue at stake in the litigation and; (7) the relative benefits to the parties of obtaining the information” (Zubulake v. UBS Warburg, 2003).

Private Searches in the Workplace

It's not uncommon for work computers to be the subject of a search for criminal, civil, or administrative actions. From the private side, employers have a fair bit of latitude to search an individual's company computer. A company computer use policy that clearly spells out that work computers, e-mail, and so on are for work purposes only and that they may be searched at any time is an accepted best practice. For Fourth Amendment purposes (law enforcement or their agents), a work computer can be searched with consent of a supervisor or another employee as long as they have common authority over the area to be searched. It is also important to note that federal privacy statutes and the Stored Communications Act may come into play as well.

In the end, consult with the prosecuting attorney or corporate/in-house counsel for guidance. Getting their input can help ensure that the case is on the strongest legal footing (Executive Office for United States Attorneys, 2009)

Alert!

International eDiscovery

With the cloud environment and data regularly flying across borders, international electronic discovery is becoming an issue. Not every country has the same views on privacy or the same legal standards and procedures for discovery. As a result, gaining access to data in a foreign country is very complex. The Sedona Conference's Framework for Analysis of Cross-Border Discovery Conflicts: A Practical Guide to Navigating the Competing Currents of International Data Privacy and e-Discovery is an excellent introduction to the complexities involved in international eDiscovery. You can download it for free from http://www.thesedonaconference.org/.

Expert Testimony

As a digital forensic examiner, you must be prepared to testify in court as an expert witness as to your findings and procedures. What's the difference between a witness and an expert witness? A major difference is that a qualified expert witness can give an opinion, but a “regular” witness can't.

Determining whether or not an individual is an expert is a matter for the court to decide. An expert doesn't have to have a Ph.D or other lofty credentials. FindLaw defines an expert as someone “who by virtue of special knowledge, skill, training, or experience is qualified to provide testimony to aid the factfinder in matters that exceed the common knowledge of ordinary people” (FindLaw).

Under this definition, bakers, tailors, accountants, medical doctors, and school bus drivers could be qualified as an expert. Certainly credentials help, but they are not a requirement.

There are two cases that form the foundation for the admissibility of expert testimony. The first is a 1923 case, United States v. Frye. The Frye (1923) case centered on the admissibility of new lie-detection technology. Out of this case came what became known as the “Frye Test.” The test said that “the results of scientific tests or procedures are admissible as evidence only when the tests or procedures have gained general acceptance in the particular field to which they belong” (United States v. Frye, 1923).

Eventually, the Frye Test fell by the wayside. In Daubert v. Merrell Dow Pharmaceuticals, Inc., 509 U.S. 579 (1993), the U.S. Supreme Court ruled that the Federal Rules of Evidence superseded the Frye Test. Merrell Dow Pharmaceuticals Inc. was sued by plaintiffs who claimed that their drug, Bendectin, had caused significant birth defects. The lower court granted Merrell Dow's request for summary citing that the scientific evidence presented by the plaintiff had not yet gained approval within the scientific community. The Supreme Court agreed.

In Daubert (1993), the Court said that the admissibility should be evaluated on “whether the testimony's underlying reasoning or methodology is scientifically valid and properly can be applied to the facts at issue. Many considerations will bear on the inquiry, including whether the theory or technique in question can be (and has been) tested, whether it has been subjected to peer review and publication, its known or potential error rate and the existence and maintenance of standards controlling its operation, and whether it has attracted widespread acceptance within a relevant scientific community” (Daubert, 1993).

Understanding this groundwork will help the examiner better comprehend the admissibility of their testimony within the context of the law.

Additional Resources

Expert Testimony

Fred Smith and Rebecca Bace's book on expert testimony, A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony as an Expert Technical Witness, contains a tremendous amount of practical information. One of the best aspects of the book is that it is written for information technology experts. The book covers the topic well and is quite “readable.”

Summary

Proper search authority is a necessary first step in the forensic examination process. Evidence collected without it is very likely to be excluded. The Fourth Amendment to the U.S. Constitution protects citizens from unreasonable searches and seizures. The protections afforded by the Fourth Amendment only cover actions by the government. It does not apply to private citizens acting on their own. Law enforcement can search and seize digital evidence with and without a search warrant. Searches with a warrant are always better, from a legal standpoint, than searches without one. That said, exigent circumstances can and do arise that would permit officers to do otherwise.

On the private side, supervisors and employers will likely have broad authority to search company computers, especially if the employee read and signed a computer usage agreement clearly stating that the company computers, e-mail, and so on could be searched at any time.

Consulting with the appropriate legal counsel before searching or seizing digital evidence is never a bad idea. If you have questions or concerns, they should always be raised in advance.

REFERENCES

1. Casey E. Digital evidence and computer crime, 3rd ed.: Forensic science, computers, and the Internet Waltham, MA: Academic Press; 2011.

2. Daubert v. Merrell Dow Pharmaceuticals,Inc., 509 U.S. 579 (1993).

3. Executive Office for United States Attorneys. Prosecuting computer crime Washington, DC: United States Department of Justice; 2007; Office of Legal Education.

4. Executive Office for United States Attorneys. Searching and seizing computers and obtaining electronic evidence in criminal investigations Washington, DC: United States Department of Justice; 2009; Office of Legal Education.

5. Frye v. United States, .293 F. 1013 ( D.C. Cir 1923).

6. FindLaw. (n.d.). Fourth Amendment—Search and Seizure. Retrieved October 4, 2011, from: http://caselaw.lp.findlaw.com/data/constitution/amendment04/.

7. Goldfoot J. The physical computer and the Fourth Amendment. Berkley Journal of Criminal Law. 2011;16(1):112–167.

8. Illinois v. Gates, 462 U.S. 213, 238, (1983).

9. Kerr OS. Digital evidence and the new criminal procedure. Columbia Law Review. 2005a;105(1):279–318.

10. Kerr OS. Searches and seizures in a digital world. Harvard Law Review. 2005b;119(2):532–585.

11. Kroll OnTrack, Inc. (n.d.). Zubulake v. UBS Warburg. Retrieved October 10, 2011, from: http://www.krollontrack.co.uk/zubulake/.

12. McCullagh, D. (2007, December 14). Judge: Man Can't Be Forced to Divulge Encryption Passphrase. Retrieved October 3, 2011, from: http://news.cnet.com/8301-13578_3-9834495-38.html.

13. Scheindlin S, Capra DJ. Electronic discovery and digital evidence: Cases and materials Eagan, MN: Thomson West 2008.

14. Sedona Conference. The Sedona Conference glossary: E-Discovery & digital information management 2nd ed. Sedona, AZ: Sedona Conference; 2007.

15. TechTarget. Electronic Discovery Retrieved November 6, 2011, from Search Financial Security 2007; www.TechTarget.com: http://searchfinancialsecurity.techtarget.com/definition/electronic-discovery.

16. U.S. Department of Justice, Office of Justice Programs. (2010). Privacy and Civil Liberties. Retrieved October 10, 2011, from: http://it.ojp.gov/default.aspx?area=privacy&page=1284#contentTop.

17. United States v. Megahed, 2009 WL 722481, at *3 (M.D. Fla. Mar. 18, 2009).

18. United States v. Slanina, 283 F.3d 670, 680 (5th Cir. 2002).

19. United States v. Walser, 275 F.3d 981, 986 (10th Cir. 2001).

20. Zubulake v. UBS Warburg, 217 F.R.D. 309 (S.D.N.Y. 2003).

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.149.234.188