Exam 5: Searches for Electronically Stored Information and Electronic Surveillance

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Title III provides authority for designated officials to intercept wire,oral,or electronic communications without a prior interception order if an emergency situation exists that involves immediate danger of death or serious physical injury to any person.This is referred to as the _________________.

(Short Answer)
4.7/5
(37)

The __________ showing required for electronic surveillance is the same as that required by the Fourth Amendment for a search warrant.

(Multiple Choice)
4.8/5
(35)

A(n)___________ is defined as "…a transfer containing the human voice at any point between and including the point of origin and the point of reception."

(Short Answer)
4.8/5
(44)

Many courts require the government to return seized computers and data storage equipment at a particular time as a condition of issuing the warrant.

(True/False)
4.9/5
(30)

The term ____________ is used to describe tools for hiding,destroying,or counterfeiting the information relied on by digital forensics experts.

(Multiple Choice)
4.9/5
(36)

In Berger v.New York (1967)the issue was the constitutionality of a New York statute that authorized electronic surveillance pursuant to a judicial warrant.In the case,the Court:

(Multiple Choice)
4.8/5
(33)

The concept of ______________ concerns the use of scientific methods toward the preservation,collection,and analysis of digital sources of information.

(Short Answer)
4.9/5
(37)

Explain the conflicting demands for more effective law enforcement and individual privacy rights relevant to electronic surveillance.

(Essay)
4.9/5
(26)

When law enforcement officers intercept communications that relate to offenses other than those specified in the interception order,the government may use the evidence of these other crimes only if:

(Multiple Choice)
4.8/5
(31)

Neither Title III nor the Fourth Amendment requires law enforcement to:

(Multiple Choice)
4.9/5
(40)

Briefly describe what the Foreign Intelligence Surveillance Act (FISA)is.

(Short Answer)
4.9/5
(36)

Under the ________________________,victims of computer attacks by hackers may authorize law enforcement officials to intercept wire or electronic communications of a computer trespasser,if specific statutory requirements are satisfied.

(Multiple Choice)
4.8/5
(34)

Title III applies to private searches and seizures of wire,oral,or electronic communications.

(True/False)
4.8/5
(36)

Prior to the passing of Title III,the United States Government utilized a "national security exception" to conduct warrantless electronic surveillance of foreign powers.In 1978,the Foreign Intelligence Surveillance Act (FISA)was passed as a result of what government abuse?

(Multiple Choice)
4.8/5
(37)

The Foreign Intelligence Surveillance Act does not require a showing of probable cause to believe that a crime has been or is being committed.

(True/False)
4.9/5
(35)

Searches conducted using wiretaps,bugs,or other devices to overhear conversations or obtain other kinds of information are referred to as __________.

(Short Answer)
4.9/5
(34)

Title III does not cover video surveillance-the use of video cameras that record only images and not aural communications.

(True/False)
4.9/5
(31)

Which of the following is not a limitation that some courts impose on applications for search warrants for electronically stored information?

(Multiple Choice)
4.9/5
(34)

The federal government recommends that an affidavit explain the techniques that will be used to search only for the specific files related to the investigation,and not every file on the computer.

(True/False)
4.9/5
(31)

Regarding Title III,a(n)_____________________ person means a "person who was a party to any intercepted" wire or oral communication or "a person against whom the interception was directed."

(Multiple Choice)
4.8/5
(29)
Showing 21 - 40 of 60
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)