paint-brush
How the U.S. Law Enforcement Executes Search Warrants for Digital Devices by@legalpdf

How the U.S. Law Enforcement Executes Search Warrants for Digital Devices

by Legal PDFOctober 6th, 2023
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Law enforcement outlines the precise procedures for executing search warrants on digital devices. Learn about protocols, timelines, and data handling practices in this document, which offers insights into how authorities navigate the digital landscape while upholding legal standards.
featured image - How the U.S. Law Enforcement Executes Search Warrants for Digital Devices
Legal PDF HackerNoon profile picture

Apple vs. FBI (2016) Court Filing, retrieved on February 16, 2016, is part of HackerNoon’s Legal PDF Series. You can jump to any part in this filing here. This part is 17 of 17.

II. Search Procedure for digital Devices

4. In searching digital devices or forensic copies thereof, law enforcement personnel executing this search warrant will employ the following procedure:


a. Law enforcement personnel or other individuals assisting law enforcement personnel (the "search team") will, in their discretion, either search the digital device (s) on-site or seize and transport the device (s) to an appropriate law enforcement laboratory or similar facility to be searched at that location. The search team shall complete the search as soon as is practicable but not to exceed 60 days from the date of execution of the warrant. If additional time is needed, the government may seek an extension of this time period from the Court on or before the date by which the search was to have been completed.


b. The search team will conduct the search only by using search protocols specifically chosen to identify only the specific items to be seized under this warrant.


i. The search team may subject all of the data contained in each digital device capable of containing any of the items to be seized to the search protocols to determine whether the device and any data thereon falls within the list of items to be seized. The search team may also search for and attempt to recover deleted, "hidden," or encrypted data to determine, pursuant to the search protocols, whether the data falls within the list of items to be seized.


ii. The search team may use tools to exclude normal operating system files and standard third-party software that do not need to be searched.


c. When searching a digital device pursuant to the specific search protocols selected, the search team shall make and retain notes regarding how the search was conducted pursuant to the selected protocols.


d. If the search team, while searching a digital device, encounters immediately apparent contraband or other evidence of a crime outside the scope of the items to be seized, the team shall immediately discontinue its search of that device pending further order of the Court and shall make and retain notes detailing how the contraband or other evidence of a crime was encountered, including how it was immediately apparent contraband or evidence of a crime.


e. If the search determines that a digital device does not contain any data falling within the list of items to be seized, the government will, as soon as is practicable, return the device and delete or destroy all forensic copies thereof.


f. If the search determines that a digital device does contain data falling within the list of items to be seized, the government may make and retain copies of such data, and may access such data at any time.


g. If the search determines that a digital device is (1) itself an item to be seized and/or (2) contains data falling within the list of items to be seized, the government may retain forensic copies of the digital device but may not access them (after the time for searching the device has expired) absent further court order.


h. The government may retain a digital device itself until further order of the Court or one year after the conclusion of the criminal investigation or case (whichever is latest), only if the device is determined to be an instrumentality of an offense under investigation or the government, within 14 days following the time period authorized by the Court for completing the search, obtains an order from the Court authorizing retention of the device (or while an application for such an order is pending). Otherwise, the government must return the device. Notwithstanding the above, after the completion of the search of the digital devices, the government shall not access digital data falling outside the scope of the items to be seized absent further order of the Court.


i. Notwithstanding the above, after the completion of the search of the digital devices, the government shall not access digital data falling outside the scope of the items to be seized absent further order of the Court.


5. In order to search for data capable of being read or interpreted by a digital device, law enforcement personnel are authorized to seize the following items:


a. Any digital device capable of being used to commit, further or store evidence of the offense (s) listed above;


b. Any equipment used to facilitate the transmission, creation, display, encoding, or storage of digital data;


c. Any magnetic, electronic, or optical storage device capable of storing digital data;


d. Any documentation, operating logs, or reference manuals regarding the operation of the digital device or software used in the digital device;


e. Any applications, utility programs, compilers, interpreters, or other software used to facilitate direct or indirect communication with the digital device;


f. Any physical keys, encryption devices, dongles, or similar physical items that are necessary to gain access to the digital device or data stored on the digital device; and


g. Any passwords, password files, test keys, encryption codes, or other information necessary to access the digital device or data stored on the digital device.


6. The special procedures relating to digital devices found in this warrant govern only the search of digital devices pursuant to the authority conferred by this warrant and do not apply to any search of digital devices pursuant to any other court order.


7. The government is allowed to share the information obtained from this search (to include copies of digital media) with any government agency investigating, or aiding in the investigation of, this case or related matters.



Continue Reading Here.


About HackerNoon Legal PDF Series: We bring you the most important technical and insightful public domain court case filings.


This court case No. 15-0451M retrieved on September 25, 2023, from archive.epic.org is part of the public domain. The court-created documents are works of the federal government, and under copyright law, are automatically placed in the public domain and may be shared without legal restriction.