Down |
1. | To protect stored emails from deletion, issue this to the ISP. |
3. | To obtain email addresses on outgoing correspondence, you need a: |
4. | Evidence connecting a person with an electronic file will often be __________. |
5. | Computer search warrant: looking for "records in any _____" |
7. | Mobile tracking devices are governed by the ______ _____. |
8. | Exigent circumstances will allow you to _______ a computer. |
9. | One who possesses a _______ computer has no REP in its contents. |
12. | An intrusion into REP by the ___________ triggers 4th Amendment |
13. | ______________: "this is what I claim it is." |
15. | For data stored in several jurisdictions, you need multiple _____ ______ |
18. | To obtain the contents of opened email in storage, you need at least a: |
21. | A search warrant for stored emails is valid __________. |
22. | When examining files, you must stay within the ______ of your search warrant. |
23. | LEOs may search a pager during an ___. |
26. | Interception, with a device, of real time oral communications with _____ requires a T-III |
29. | This type of federal judge cannot issue a T-III order |
31. | Pen registers capture ________ phone numbers. |
32. | To monitor a mobile tracking device in an REP area, you need a ______ ______ |
33. | Cell phone calls are __________ communications |
34. | Always handle data to prevent claims of ___________. |
36. | Face-to-face consensual monitoring requires AUSA ________ |
39. | To obtain cell-site data, you need at least a: |
40. | If agents have RS that "knock & annouce" would cause a suspect to ______ data, they need not K&A. |
42. | _____ communications: human voice not on wire or other mechanical means |
44. | Trap & trace devices capture ________ phone numbers. |
45. | Consent to search a computer may be ______ ("You may only search my C drive.") |