| Down |
| 1. | To protect stored emails from deletion, issue this to the ISP. |
| 3. | To obtain email addresses on outgoing correspondence, you need a: |
| 4. | Evidence connecting a person with an electronic file will often be __________. |
| 5. | Computer search warrant: looking for "records in any _____" |
| 7. | Mobile tracking devices are governed by the ______ _____. |
| 8. | Exigent circumstances will allow you to _______ a computer. |
| 9. | One who possesses a _______ computer has no REP in its contents. |
| 12. | An intrusion into REP by the ___________ triggers 4th Amendment |
| 13. | ______________: "this is what I claim it is." |
| 15. | For data stored in several jurisdictions, you need multiple _____ ______ |
| 18. | To obtain the contents of opened email in storage, you need at least a: |
| 21. | A search warrant for stored emails is valid __________. |
| 22. | When examining files, you must stay within the ______ of your search warrant. |
| 23. | LEOs may search a pager during an ___. |
| 26. | Interception, with a device, of real time oral communications with _____ requires a T-III |
| 29. | This type of federal judge cannot issue a T-III order |
| 31. | Pen registers capture ________ phone numbers. |
| 32. | To monitor a mobile tracking device in an REP area, you need a ______ ______ |
| 33. | Cell phone calls are __________ communications |
| 34. | Always handle data to prevent claims of ___________. |
| 36. | Face-to-face consensual monitoring requires AUSA ________ |
| 39. | To obtain cell-site data, you need at least a: |
| 40. | If agents have RS that "knock & annouce" would cause a suspect to ______ data, they need not K&A. |
| 42. | _____ communications: human voice not on wire or other mechanical means |
| 44. | Trap & trace devices capture ________ phone numbers. |
| 45. | Consent to search a computer may be ______ ("You may only search my C drive.") |