Deck 5: Searches for Electronically Stored Information and Electronic Surveillance

ملء الشاشة (f)
exit full mode
سؤال
Neither Title III of the Omnibus Crime Control and Safe Streets Act of 1968 nor the Fourth Amendment requires law enforcement to _____.

A) obtain a judicial order to intercept wire, oral, or electronic communications
B) obtain judicial authorization to covertly enter the premises to install a listening device
C) first receive administrative authorization to apply for an interception order
D) conduct themselves in a way that minimizes the interception of communications not subject to the interception order
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
_____ is most accurately defined as searches using wiretaps, bugs, or other devices to overhear conversation or obtain other kinds of information?

A) Electronic surveillance
B) Covert surveillance
C) Covert intelligence
D) Cyber surveillance
سؤال
Under the exigent circumstances exception, a law enforcement officer must apply for an interception order _____ after the interception has occurred or begins to occur.

A) immediately
B) within forty-eight hours
C) as soon as practicable
D) when prudent as deemed by the officer
سؤال
Which statement concerning time limitations on the forensic examination phase of electronically stored information is correct?

A) The police are only allowed 10 days to extract the evidence.
B) The time period allowed to obtain the evidence is the same for forensic searches and more traditional searches.
C) Law enforcement is allowed a shorter time period to obtain the evidence than normally allowed under a traditional search warrant.
D) Rule 41 does not require magistrates to specify a time limit because the amount of time is unpredictable.
سؤال
The term _____ transfer refers to a transfer containing the human voice at any point between, and including, the point of origin and the point of reception?

A) aural
B) electronic
C) intercept
D) oral
سؤال
The first phase of searches of Electronically Stored Information (ESI) includes _____.

A) entering the place(s) housing the devices on which data are stored
B) seizing the devices on which the data may be stored as well as devices linked via networks
C) examining the seized devices for the data described in a warrant
D) providing the devices to forensic computer specialists who search for data described in a warrant
سؤال
In Berger v. New York (1967) the issue was the constitutionality of a New York statute that authorized electronic surveillance pursuant to a judicial warrant. In the case, the Court:

A) validated the law because the government had probable cause and the intrusion was reasonably related to what the government was looking for
B) validated the law because it properly limited the nature, scope, or duration of the electronic surveillance
C) invalidated the law because the government did not establish probable cause
D) invalidated the law because it failed to properly limit the nature, scope, or duration of the electronic surveillance
سؤال
In Olmstead v. United States (1928), the Court held that wiretapping of telephone conversations _____.

A) is covered by the Fourth Amendment, but does not violate it
B) was not covered by the Fourth Amendment
C) is covered by the Fourth Amendment, and is a violation of it
D) was only a partial violation of the Fourth Amendment
سؤال
In the case of Olmstead v. United States, the Court decided that the practice of wiretapping was not covered by the Fourth Amendment, primarily because _____.

A) the person had no reasonable expectation of privacy in the home
B) the evidence was obtained only by hearing (and did not involve tangible items) so the interception of a conversation could not qualify as a seizure
C) the Fourth Amendment protects people, but not places
D) there was no legitimate remedy for the alleged violation at the time, as the exclusionary rule did not yet exist yet
سؤال
A _____ wiretap allows for interception of a particular suspect's communications wherever they are made, dispensing with the normal requirement that interceptions be limited to a fixed location.

A) geographical
B) roving
C) non-specific
D) roaming
سؤال
Materials that are made inaccessible to anyone without a special court order are said to be _____.

A) under lock and key
B) on-hold
C) under seal
D) en todos
سؤال
The exacting process of computer forensic examination includes _____.

A) read protecting the device
B) connecting the computer to a network
C) imaging the hard drive
D) deconstructing the hard drive
سؤال
Within a reasonable time, but not later than _____ days after the termination of the period of an order, an inventory must be served on the persons named in the order and on such other parties to intercepted communications as the judge determines in the interest of justice.

A) twenty
B) thirty
C) sixty
D) ninety
سؤال
_____ concerns the use of scientific methods toward the preservation, collection, and interpretation of digital evidence from digital sources.

A) Forensic computer information systems
B) Computer forensics
C) Electronic surveillance
D) Computer science
سؤال
The statutory-based exclusionary rule in Title III of the Omnibus Crime Control and Safe Streets Act of 1968 applies to _____.

A) wire, oral, and electronic communications
B) electronic and wire communications, but not oral communications
C) electronic and oral communications, but not wire communications
D) wire and oral communications, but not electronic communications
سؤال
Title III of the Omnibus Crime Control and Safe Streets Act of 1968 refers to a "person who was a party to any intercepted" wire or oral communication or "a person against whom the interception was directed" as _____.

A) suspect
B) aggrieved
C) felonious
D) victimized
سؤال
What specific legislation authorizes courts to conduct closed reviews of surveillance materials?

A) The Foreign Intelligence Surveillance Act (FISA)
B) Stored Communications Act (SCA)
C) Electronic communications Privacy Act (ECPA)
D) Freedom of Information Act (FOIA)
سؤال
When one party to a communication consents to the interception of the communication, _____.

A) Title III of the Wiretap Act prevents the use of the communication in court against another party, but the Fourth Amendment allows use of the communication
B) the Fourth Amendment prevents the use of the communication in court against another party, but Title III of the Wiretap Act allows use of the communication in court against another party
C) both the Fourth Amendment and Title III of the Wiretap Act prevent use of the communication in court against another party
D) neither Title III of the Wiretap Act nor the Fourth Amendment prevents the use of the communication in court against another party
سؤال
Title III of the Omnibus Crime Control and Safe Streets Act of 1968 _____.

A) requires authorization by a judge in the location of the tapped telephone
B) allows the issuance of interception orders for any felony offense
C) permits taps even when ordinary investigative procedures have not been exhausted
D) requires that the order be executed "as soon as practicable"
سؤال
What term describes tools for hiding, destroying, or counterfeiting the information relied on by digital forensics experts?

A) anti forensics
B) Trojans
C) wipes
D) back doors
سؤال
If a conversation takes place in public where other parties can overhear the conversation, there is no reasonable expectation of privacy. However, any recording of such a conversation would violate Title III of the Wiretap Act.
سؤال
Title III of the Wiretap Act does not cover video surveillance using video cameras that record only images and not aural communications.
سؤال
The Foreign Intelligence Surveillance Act does not require a showing of probable cause to believe that a crime has been or is being committed.
سؤال
Title III of the Wiretap Act applies to private searches and seizures of wire, oral, or electronic communications.
سؤال
Searches and seizures concerning foreign intelligence and antiterrorism efforts are authorized and regulated by the Foreign Intelligence and Racketeering Act (FIRA).
سؤال
Under the _____ exception, victims of computer attacks by hackers can authorize law enforcement officials to intercept wire or electronic communications of a computer trespasser, if specific statutory requirements are satisfied.

A) computer trespasser
B) provider
C) public access
D) exceptional privilege
سؤال
Before the enactment of the _____, interception orders for wire communications in computer hacking investigations were not permitted.

A) Omnibus Crime Control and Safe Streets Act of 1968
B) FISA
C) Violent Crime Control and Law Enforcement Act of 1994
D) USA PATRIOT Act
سؤال
Many courts require the government to return seized computers and data storage equipment at a particular time as a condition of issuing the warrant.
سؤال
Title III of the Omnibus Crime Control and Safe Streets Act of 1968 does not apply to the use of electronic devices emitting signals that enable law enforcement officials to track the location of objects and persons. Why?

A) Title III only covers incidental interception of communication.
B) By their very nature, the devices are mobile and this not covered.
C) These devices are incapable of transmitting speech.
D) The devices were not in existence in 1968.
سؤال
Prior to the passing of Title III of the Omnibus Crime Control and Safe Streets Act of 1968, the United States Government utilized a "national security exception" to conduct warrantless electronic surveillance of foreign powers. In 1978, the Foreign Intelligence Surveillance Act (FISA) was passed as a result of the _____.

A) Watergate scandal
B) abuses of the Vietnam war
C) Iranian Hostage Crisis
D) violent acts by student groups
سؤال
Title III of the Wiretap Act applies to the use of electronic devices emitting signals that enable law enforcement officials to track the location of objects and persons.
سؤال
Although e-mail has replaced telephone communication in many spheres, it is not considered a 'wire communication' for purposes of Title III of the Wiretap Act.
سؤال
Under the _____ exception, an employee or agent of a communications service entity may intercept and disclose communications to protect the rights or property of the provider as part of the ordinary course of business.

A) computer trespasser
B) public access
C) provider
D) exigent circumstances
سؤال
Who determines the composition of the Foreign Intelligence Surveillance Court (FISC)?

A) the Associate Justices of the U.S. Supreme Court.
B) the Speaker of the House.
C) the Attorney General of the U.S.
D) the Chief Justice of the U.S. Supreme Court.
سؤال
Title III of the Omnibus Crime Control and Safe Streets Act of 1968 specifically exempts _____ from the warrant requirement.

A) buildings
B) cell phones
C) tone-only pagers
D) answering machines
سؤال
When law enforcement officers intercept communications that relate to offenses other than those specified in the interception order, the government may use the evidence of these other crimes only if _____.

A) the evidence was observed in plain view
B) the evidence could have been discovered through an independent source
C) another application is made to a court "as soon as practicable" for a determination that the interception complied with Title III requirements
D) the evidence is testimonial in nature
سؤال
What is the difference between a pen register and a trap-and-trace device?

A) A pen register records incoming addressing information (such as caller ID information); whereas a trap-and-trace device records outgoing addressing information (such as numbers dialed from a phone).
B) A pen register records outgoing addressing information (such as numbers dialed from a phone); whereas a trap-and-trace device records incoming addressing information (such as caller ID information).
C) A pen register intercepts communication; whereas a trap-and-trace device does not intercept communication.
D) A pen register does not intercept communication; whereas a trap-and-trace device intercepts communication.
سؤال
Many courts have upheld requirements that forensic analysis of the computers had to be conducted within 90 days of the physical search.
سؤال
Title III of the Omnibus Crime Control and Safe Streets Act of 1968 is often referred to as the _____.

A) Digital Act
B) Wiretap Act
C) Electronics Act
D) Surveillance Act
سؤال
The Department of Justice cautions that limitations on search methodologies have the potential to seriously impair the government's ability to uncover electronic evidence.
سؤال
Briefly describe how the Title III of the Omnibus Crime Control and Safe Streets Acts of 1968 originated.
سؤال
Compare and contrast an interception order under Title III of the Wiretap Act and an ordinary search warrant.
سؤال
What is meant by sealing/putting under seal and why this is done?
سؤال
Briefly describe what the Foreign Intelligence Surveillance Act (FISA) is and does.
سؤال
Explain the conflicting demands for more effective law enforcement and individual privacy rights relevant to electronic surveillance.
سؤال
Computer __________ uses the scientific methods for the preservation, collection, and analysis of digital sources of information.
سؤال
A(n) ___________ is defined as "…a transfer containing the human voice at any point between and including the point of origin and the point of reception."
سؤال
Dropbox, SkyDrive and SugarSync are companies that offer remote computing services, where one can digitally store their information "in the __________ ."
سؤال
When one party to a communication consents to the interception of the communication, neither Title III of the Wiretap Act nor the Fourth Amendment prevents the use of the communication in court against another party to the communication. This is called __________.
سؤال
The __________ allows a communications service provider to intercept and disclose communications to protect the rights or property of the provider as part of the ordinary course of business.
سؤال
Congress created a special Article III court to review FISA applications called the __________.
سؤال
Title III of the Wiretap Act provides authority for designated officials to intercept wire, oral, or electronic communications without a prior interception order if an emergency situation exists that involves immediate danger of death or serious physical injury to any person. This is referred to as the __________.
سؤال
Assess the requirements that some courts impose on applications for search warrants for electronically stored information. Identify the limitations in place and explain the rationale of these limitations.
سؤال
Outline the two stage process used for most searches of electronically stored information.
سؤال
Searches conducted using wiretaps, bugs, or other devices to overhear conversations or obtain other kinds of information are collectively referred to as __________ surveillance.
سؤال
What impact has "cloud" technology had upon law enforcement in terms of electronic surveillance? Explain your reasoning.
سؤال
The case of Dalia v. United States ruled that a judicial order to place an eavesdropping device by law enforcement in a business or residence need not have a separate order specifically authorizing the __________ entry to install the device.
سؤال
The __________ provides that any person may intercept an electronic communication made through a system that is configured so that the communication is readily accessible to the general public.
سؤال
Explain the jurisdiction and procedures of the Foreign Intelligence Surveillance Court (FISC).
سؤال
List a minimum of three forms of wiretaps. Describe each.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/60
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 5: Searches for Electronically Stored Information and Electronic Surveillance
1
Neither Title III of the Omnibus Crime Control and Safe Streets Act of 1968 nor the Fourth Amendment requires law enforcement to _____.

A) obtain a judicial order to intercept wire, oral, or electronic communications
B) obtain judicial authorization to covertly enter the premises to install a listening device
C) first receive administrative authorization to apply for an interception order
D) conduct themselves in a way that minimizes the interception of communications not subject to the interception order
B
2
_____ is most accurately defined as searches using wiretaps, bugs, or other devices to overhear conversation or obtain other kinds of information?

A) Electronic surveillance
B) Covert surveillance
C) Covert intelligence
D) Cyber surveillance
A
3
Under the exigent circumstances exception, a law enforcement officer must apply for an interception order _____ after the interception has occurred or begins to occur.

A) immediately
B) within forty-eight hours
C) as soon as practicable
D) when prudent as deemed by the officer
B
4
Which statement concerning time limitations on the forensic examination phase of electronically stored information is correct?

A) The police are only allowed 10 days to extract the evidence.
B) The time period allowed to obtain the evidence is the same for forensic searches and more traditional searches.
C) Law enforcement is allowed a shorter time period to obtain the evidence than normally allowed under a traditional search warrant.
D) Rule 41 does not require magistrates to specify a time limit because the amount of time is unpredictable.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
5
The term _____ transfer refers to a transfer containing the human voice at any point between, and including, the point of origin and the point of reception?

A) aural
B) electronic
C) intercept
D) oral
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
6
The first phase of searches of Electronically Stored Information (ESI) includes _____.

A) entering the place(s) housing the devices on which data are stored
B) seizing the devices on which the data may be stored as well as devices linked via networks
C) examining the seized devices for the data described in a warrant
D) providing the devices to forensic computer specialists who search for data described in a warrant
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
7
In Berger v. New York (1967) the issue was the constitutionality of a New York statute that authorized electronic surveillance pursuant to a judicial warrant. In the case, the Court:

A) validated the law because the government had probable cause and the intrusion was reasonably related to what the government was looking for
B) validated the law because it properly limited the nature, scope, or duration of the electronic surveillance
C) invalidated the law because the government did not establish probable cause
D) invalidated the law because it failed to properly limit the nature, scope, or duration of the electronic surveillance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
8
In Olmstead v. United States (1928), the Court held that wiretapping of telephone conversations _____.

A) is covered by the Fourth Amendment, but does not violate it
B) was not covered by the Fourth Amendment
C) is covered by the Fourth Amendment, and is a violation of it
D) was only a partial violation of the Fourth Amendment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
9
In the case of Olmstead v. United States, the Court decided that the practice of wiretapping was not covered by the Fourth Amendment, primarily because _____.

A) the person had no reasonable expectation of privacy in the home
B) the evidence was obtained only by hearing (and did not involve tangible items) so the interception of a conversation could not qualify as a seizure
C) the Fourth Amendment protects people, but not places
D) there was no legitimate remedy for the alleged violation at the time, as the exclusionary rule did not yet exist yet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
10
A _____ wiretap allows for interception of a particular suspect's communications wherever they are made, dispensing with the normal requirement that interceptions be limited to a fixed location.

A) geographical
B) roving
C) non-specific
D) roaming
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
11
Materials that are made inaccessible to anyone without a special court order are said to be _____.

A) under lock and key
B) on-hold
C) under seal
D) en todos
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
12
The exacting process of computer forensic examination includes _____.

A) read protecting the device
B) connecting the computer to a network
C) imaging the hard drive
D) deconstructing the hard drive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
13
Within a reasonable time, but not later than _____ days after the termination of the period of an order, an inventory must be served on the persons named in the order and on such other parties to intercepted communications as the judge determines in the interest of justice.

A) twenty
B) thirty
C) sixty
D) ninety
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
14
_____ concerns the use of scientific methods toward the preservation, collection, and interpretation of digital evidence from digital sources.

A) Forensic computer information systems
B) Computer forensics
C) Electronic surveillance
D) Computer science
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
15
The statutory-based exclusionary rule in Title III of the Omnibus Crime Control and Safe Streets Act of 1968 applies to _____.

A) wire, oral, and electronic communications
B) electronic and wire communications, but not oral communications
C) electronic and oral communications, but not wire communications
D) wire and oral communications, but not electronic communications
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
16
Title III of the Omnibus Crime Control and Safe Streets Act of 1968 refers to a "person who was a party to any intercepted" wire or oral communication or "a person against whom the interception was directed" as _____.

A) suspect
B) aggrieved
C) felonious
D) victimized
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
17
What specific legislation authorizes courts to conduct closed reviews of surveillance materials?

A) The Foreign Intelligence Surveillance Act (FISA)
B) Stored Communications Act (SCA)
C) Electronic communications Privacy Act (ECPA)
D) Freedom of Information Act (FOIA)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
18
When one party to a communication consents to the interception of the communication, _____.

A) Title III of the Wiretap Act prevents the use of the communication in court against another party, but the Fourth Amendment allows use of the communication
B) the Fourth Amendment prevents the use of the communication in court against another party, but Title III of the Wiretap Act allows use of the communication in court against another party
C) both the Fourth Amendment and Title III of the Wiretap Act prevent use of the communication in court against another party
D) neither Title III of the Wiretap Act nor the Fourth Amendment prevents the use of the communication in court against another party
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
19
Title III of the Omnibus Crime Control and Safe Streets Act of 1968 _____.

A) requires authorization by a judge in the location of the tapped telephone
B) allows the issuance of interception orders for any felony offense
C) permits taps even when ordinary investigative procedures have not been exhausted
D) requires that the order be executed "as soon as practicable"
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
20
What term describes tools for hiding, destroying, or counterfeiting the information relied on by digital forensics experts?

A) anti forensics
B) Trojans
C) wipes
D) back doors
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
21
If a conversation takes place in public where other parties can overhear the conversation, there is no reasonable expectation of privacy. However, any recording of such a conversation would violate Title III of the Wiretap Act.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
22
Title III of the Wiretap Act does not cover video surveillance using video cameras that record only images and not aural communications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
23
The Foreign Intelligence Surveillance Act does not require a showing of probable cause to believe that a crime has been or is being committed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
24
Title III of the Wiretap Act applies to private searches and seizures of wire, oral, or electronic communications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
25
Searches and seizures concerning foreign intelligence and antiterrorism efforts are authorized and regulated by the Foreign Intelligence and Racketeering Act (FIRA).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
26
Under the _____ exception, victims of computer attacks by hackers can authorize law enforcement officials to intercept wire or electronic communications of a computer trespasser, if specific statutory requirements are satisfied.

A) computer trespasser
B) provider
C) public access
D) exceptional privilege
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
27
Before the enactment of the _____, interception orders for wire communications in computer hacking investigations were not permitted.

A) Omnibus Crime Control and Safe Streets Act of 1968
B) FISA
C) Violent Crime Control and Law Enforcement Act of 1994
D) USA PATRIOT Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
28
Many courts require the government to return seized computers and data storage equipment at a particular time as a condition of issuing the warrant.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
29
Title III of the Omnibus Crime Control and Safe Streets Act of 1968 does not apply to the use of electronic devices emitting signals that enable law enforcement officials to track the location of objects and persons. Why?

A) Title III only covers incidental interception of communication.
B) By their very nature, the devices are mobile and this not covered.
C) These devices are incapable of transmitting speech.
D) The devices were not in existence in 1968.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
30
Prior to the passing of Title III of the Omnibus Crime Control and Safe Streets Act of 1968, the United States Government utilized a "national security exception" to conduct warrantless electronic surveillance of foreign powers. In 1978, the Foreign Intelligence Surveillance Act (FISA) was passed as a result of the _____.

A) Watergate scandal
B) abuses of the Vietnam war
C) Iranian Hostage Crisis
D) violent acts by student groups
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
31
Title III of the Wiretap Act applies to the use of electronic devices emitting signals that enable law enforcement officials to track the location of objects and persons.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
32
Although e-mail has replaced telephone communication in many spheres, it is not considered a 'wire communication' for purposes of Title III of the Wiretap Act.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
33
Under the _____ exception, an employee or agent of a communications service entity may intercept and disclose communications to protect the rights or property of the provider as part of the ordinary course of business.

A) computer trespasser
B) public access
C) provider
D) exigent circumstances
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
34
Who determines the composition of the Foreign Intelligence Surveillance Court (FISC)?

A) the Associate Justices of the U.S. Supreme Court.
B) the Speaker of the House.
C) the Attorney General of the U.S.
D) the Chief Justice of the U.S. Supreme Court.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
35
Title III of the Omnibus Crime Control and Safe Streets Act of 1968 specifically exempts _____ from the warrant requirement.

A) buildings
B) cell phones
C) tone-only pagers
D) answering machines
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
36
When law enforcement officers intercept communications that relate to offenses other than those specified in the interception order, the government may use the evidence of these other crimes only if _____.

A) the evidence was observed in plain view
B) the evidence could have been discovered through an independent source
C) another application is made to a court "as soon as practicable" for a determination that the interception complied with Title III requirements
D) the evidence is testimonial in nature
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
37
What is the difference between a pen register and a trap-and-trace device?

A) A pen register records incoming addressing information (such as caller ID information); whereas a trap-and-trace device records outgoing addressing information (such as numbers dialed from a phone).
B) A pen register records outgoing addressing information (such as numbers dialed from a phone); whereas a trap-and-trace device records incoming addressing information (such as caller ID information).
C) A pen register intercepts communication; whereas a trap-and-trace device does not intercept communication.
D) A pen register does not intercept communication; whereas a trap-and-trace device intercepts communication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
38
Many courts have upheld requirements that forensic analysis of the computers had to be conducted within 90 days of the physical search.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
39
Title III of the Omnibus Crime Control and Safe Streets Act of 1968 is often referred to as the _____.

A) Digital Act
B) Wiretap Act
C) Electronics Act
D) Surveillance Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
40
The Department of Justice cautions that limitations on search methodologies have the potential to seriously impair the government's ability to uncover electronic evidence.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
41
Briefly describe how the Title III of the Omnibus Crime Control and Safe Streets Acts of 1968 originated.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
42
Compare and contrast an interception order under Title III of the Wiretap Act and an ordinary search warrant.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
43
What is meant by sealing/putting under seal and why this is done?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
44
Briefly describe what the Foreign Intelligence Surveillance Act (FISA) is and does.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
45
Explain the conflicting demands for more effective law enforcement and individual privacy rights relevant to electronic surveillance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
46
Computer __________ uses the scientific methods for the preservation, collection, and analysis of digital sources of information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
47
A(n) ___________ is defined as "…a transfer containing the human voice at any point between and including the point of origin and the point of reception."
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
48
Dropbox, SkyDrive and SugarSync are companies that offer remote computing services, where one can digitally store their information "in the __________ ."
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
49
When one party to a communication consents to the interception of the communication, neither Title III of the Wiretap Act nor the Fourth Amendment prevents the use of the communication in court against another party to the communication. This is called __________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
50
The __________ allows a communications service provider to intercept and disclose communications to protect the rights or property of the provider as part of the ordinary course of business.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
51
Congress created a special Article III court to review FISA applications called the __________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
52
Title III of the Wiretap Act provides authority for designated officials to intercept wire, oral, or electronic communications without a prior interception order if an emergency situation exists that involves immediate danger of death or serious physical injury to any person. This is referred to as the __________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
53
Assess the requirements that some courts impose on applications for search warrants for electronically stored information. Identify the limitations in place and explain the rationale of these limitations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
54
Outline the two stage process used for most searches of electronically stored information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
55
Searches conducted using wiretaps, bugs, or other devices to overhear conversations or obtain other kinds of information are collectively referred to as __________ surveillance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
56
What impact has "cloud" technology had upon law enforcement in terms of electronic surveillance? Explain your reasoning.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
57
The case of Dalia v. United States ruled that a judicial order to place an eavesdropping device by law enforcement in a business or residence need not have a separate order specifically authorizing the __________ entry to install the device.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
58
The __________ provides that any person may intercept an electronic communication made through a system that is configured so that the communication is readily accessible to the general public.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
59
Explain the jurisdiction and procedures of the Foreign Intelligence Surveillance Court (FISC).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
60
List a minimum of three forms of wiretaps. Describe each.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.