150 Search Warrants, Court Orders, and Affidavits


Book Description

Updated October 2013 Includes Apple iPhone Unlock and Bypass Procedures and Google Android Unlock and Bypass Procedures Search warrants are one of the most powerful tools available to law enforcement officers. However, one of the greatest challenges in drafting a search warrant can come while trying to accurately describe or articulate the person, place, or thing to be searched and the items to be seized. This book is designed to assist law enforcement officers who have little or no experience in writing a search warrant affidavit, as well as, experienced investigators who have written search warrants in the past and who want a reference of both common and unusual templates. If you are looking for a legal manual full of case citations and legal theory then this is the wrong book for you. If you are looking for practical search warrant and affidavit templates covering some of the most common subjects, and some unusual ones, you've come to the right place. Every search warrant template, court order, and affidavit was taken from actual court documents after having been reviewed by a magistrate and authorized. Each of the subjects covered in this book are drawn from a review of hundreds of federal, state, and local affidavits used to successfully create search warrants which were subsequently authorized by a judge or a magistrate. The search warrant, court order, and affidavit templates in this book include: Incorporating Information into the Affidavit and Search Warrant-From Crime Report, Witnesses, Informants, and Citizen InformantsDominion and Control Evidence-Authorization for Videotaping and Photographing and Forensic Examination and MeasurementsLocations-Single Family Residences, Apartments, Rural Location, and Stores or BusinessesSpecialized Locations-Auto Dealerships, Safe Deposit Boxes, Private Mail Boxes, Stock Brokerages, Title Companies, Travel Agencies, and Bank and Financial Institution Including Seizure of FundsVehicles-Hidden Compartments and Installing GPS TrackersComputers-Search and Seizure, Child Pornography, Internet Service Providers, Facebook, Ebay, and PayPalTelephones, Cell Phones, Records, and Wiretaps-Voicemail Records/Password Reset, Calling Cards, and Pen RegistersApple-Assistance Unlocking or Bypassing a Locked iPhoneGoogle-Assistance Unlocking an Android Cell Phone-Search WarrantProperty Crimes, Fraud, and Forgery-Stolen Property, Utility Theft, Vehicle Theft, Chop Shops, Identity Theft, CounterfeitingNarcotics-Amphetamine/Methamphetamine, Cocaine, Heroin, Marijuana, GHB, Ketamine, LSD, PCP, MDMA, and Clan LabsSpecial Procedures-Authorization for Federal Law Enforcement to Assist, Authorization for Civilians to Assist, Special Master, Sealing the Affidavit, Extensions, Night Time Service Authorization, Waiver of Knock Notice or 'No Knock', How to Protect a Confidential Informant, and Answering the Telephone During the SearchReviews: "As a 28-year law enforcement veteran, I can say that this is one of the best and least expensive tools available to law enforcement officers. I wish I had this available to me as a young cop." "This is an excellent reference library tool for Law Enforcement Officers. I highly recommend it to my Brothers in Blue." "This book is essential for any Detective or Inspector who need to write a warrant very quickly. This is a must buy " If you are tired of looking for a search warrant example or template. Look no further. Get you copy today.




150 Search Warrants, Court Orders, and Affidavits


Book Description

Search warrants are one of the most powerful tools available to law enforcement officers. However, one of the greatest challenges in drafting a search warrant can come while trying to accurately describe or articulate the person, place, or thing to be searched and the items to be seized. This book is designed to assist law enforcement officers who have little or no experience in writing a search warrant affidavit, as well as, experienced investigators who have written search warrants in the past and who want a reference of both common and unusual templates. If you are looking for a legal manual full of case citations and legal theory then this is the wrong book for you. If you are looking for practical search warrant and affidavit templates covering some of the most common subjects, and some unusual ones, you've come to the right place. Every search warrant template, court order, and affidavit was taken from actual court documents after having been reviewed by a magistrate and authorized. Each of the subjects covered in this book are drawn from a review of hundreds of federal, state, and local affidavits used to successfully create search warrants which were subsequently authorized by a judge of a magistrate. The 150 search warrant, court order, and affidavit templates in this book include: Incorporating Information into the Affidavit and Search Warrant such as Crimes Reports, Witness Information, Informant Information, and Confidential Reliable Informant Information Dominion and Control Evidence Seeking Authorization to Take Videotape, Photograph, and Digital Images During a Warrant Search Seeking Authorization For Forensics - Photographing, Taking Measurements, Seizing Weapons And Evidence Single Family Residences or Duplexes, Apartment House or Large Complexes, and Rural Locations Hidden Compartments or Hiding Places At Or Within A Location Examples of Search Warrants and Affidavits for Auto Dealerships, Safe Deposit Box/Private Mail Boxes, Businesses, Stock Brokerages, Title Companies, Travel Agencies or Services, and Trust Companies Describing Vehicles With Known License Plate Numbers, Known VIN, Unknown Locations or Plate Numbers, Updated (2013) Language for Installing A GPS Tracker Templates Describing Known Suspects, Suspects Known Only by Nickname or Moniker, and Suspects At A Location Computers and Internet Service Providers Search and Seizure Warrants and Affidavits: Google, Facebook, Ebay/Paypal, Telephones, Cell Phones, Records, and Wiretaps- Voicemail Records and Password Resets, Specialized Records Searches (Calls to Destination), Calling Cards, Pen Register, Obtaining Assistance From Google and Apple to Unlock Password Protected Phones, and Title III Electronic Surveillance (Wiretaps) Property Crimes, Fraud, and Forgery- Stolen Property, Utility Theft, Vehicle Theft, Chop Shops, Identity Theft, Counterfeit Currency, Telemarketer Fraud, Counterfeit Credit/Gift Cards, and Counterfeit CDs/DVDs/Software Narcotics-General Search Warrant Affidavit and Templates, Specific Drugs Including: Amphetamine/Methamphetamine, Cocaine, Heroin, Marijuana Possession and Cultivation, Clandestine Drug Labs, GHB, Ketamine, LSD, PCP, MDMA, and Steroids Gang Search Warrants and Affidavits Special Procedures-Seeking Authorization For Federal Law Enforcement Officer(s) To Assist In Search Warrant, Authorization For Civilian(s) To Assist At The Search Warrant Site(s)-Search Warrant Special Master Authorization, Sealing Statement of Probable Cause / Affidavit (Hobbs), Use Of Informants -- Two-Prong Test, Other Sealing Orders, Extension Dates of Returns, Release of Evidence During the Search Warrant Service, Night Time Service, and Waiver of Knock Notice




Criminal Investigation on the Street


Book Description

Criminal Investigation on the Street presents investigative principles and techniques—and applies them to solving real-world crimes—in an engaging, student-friendly style centered on the Investigative Triangle: legal aspects, evidence, and behavioral analysis. Students and instructors alike will benefit from this book’s comprehensive coverage and accessible writing style. Along with the Investigative Triangle model, which provides a solid framework for approaching investigations, students will also learn about Criminal Investigative Analysis, a range of behavior-based services and strategies to help solve crimes. Chapters 1–7 (Section I) present the principles and techniques of criminal investigation—history and theory, legal background, forensics, crime scene, witnesses and informants, interviews and interrogations—including a chapter on crime analysis and Criminal Investigative Analysis. Chapters 8–13 (Section II) apply these principles and techniques to specific types of crime, beginning with assault and death investigations and a separate chapter on culpable homicide. Section II also covers sex crimes; theft, burglary, robbery, and arson; enterprise and white-collar crime, and terrorism. The book is illustrated throughout with a variety of Exhibits: photographs and drawings, flowcharts, facsimiles of police documents, and other instructive visuals. Each chapter begins with an engaging vignette, some based on high-profile news articles and others drawn from the author’s extensive experience. Interactive features—Case Focus, You Call It, and You Write It—occur at strategic points in every chapter, challenging students to answer questions and apply concepts to actual cases and fictional scenarios. Each chapter ends with a return to the Investigative Triangle, assessing how it applies to the chapter’s main topics. Chapters 1–7 (Section I) each include a list of Important Cases (court decisions relevant to the chapter’s key concepts). At the end of every chapter (Sections I and II), the Investigate Further feature provides an annotated list of readings, films, and other resources appropriate for class projects, term papers, and special assignments. Each chapter concludes with review questions and a chapter summary. This book is geared to students in the Criminal Investigation course at both two- and four-year institutions, and will appeal to those aspiring to a career in any field related to criminal investigation.




Cell Phone Investigations


Book Description

As the first of its kind, Cell Phone Investigations is the most comprehensive book written on cell phones, cell sites, and cell related data. This book also features sample search warrant templates and updated material regarding the 2014 Supreme Court ruling. Cell Phone Investigations demonstrates how to examine mobile devices and sift through data without expensive equipment or years of specialized training. Features: -Includes a vast selection of search warrant templates -Demonstrates how to acquire phone records and how they are useful -Explains how cell towers and cell cites work and how they can apply to investigations -Explores digital evidence and its application in cell phone forensics -Illustrates how to handle locked devices










Investigations 150 Things You Should Know


Book Description

By covering the essential tips and techniques for investigators, Investigations: 150 Things You Should Know becomes a useful reference. By further covering the legal guidelines that investigators must follow, it becomes indispensable. Through anecdotes, case studies, and documented procedures the authors of this book have amassed the most complete collection of investigative information available. This ready reference is for anyone interested in investigations. Readers in and out of the law enforcement field will find this book easy to use and understand when seeking explanations about a wide variety of investigative topics including: constitutional law, documentary evidence, interviewing and interrogating, and surveillance. Comprehensive overview of investigation Easily readable and accessible information supplies all the necessary elements for the beginner or expert investigator Further investigative resources are listed in valuable appendices




United States Attorneys' Manual


Book Description







Search Warrant Templates


Book Description

Is the suspect's phone locked or password protected? Did the forensic tool get everything or did it miss an important piece of evidence or intelligence? Is the suspect still out on the street or a fugitive? The average cell phone user has between 25-44 applications on their device. These applications can collect and store massive amounts of information. This information is not always recovered by forensic tools and is often missed by investigators. Some of the available information from applications includes: Personally Identifiable Information-Names, email addresses, phone numbers, demographic information, physical addresses, biographical information, and profile pictures. Device Information-Make, model, operating system, unique device identifiers, and operating system identifiers (Apple and Google) Content-Call records, contact lists and electronic phonebooks, email, text, or instant messages, pictures, videos, and EXIF/metadata Linked Social Media Accounts-Facebook, Microsoft, Google+, Instagram, Twitter, LinkedIn, and Foursquare Log File Information-Cross platform applications and devices, date and time of access, and Internet Protocol addresses Financial-Method and source of payment, credit card numbers, issuing financial institutions, and third-party payment processors such as PayPal. Geolocation Data-Historical location information from GPS, Wi-Fi, and cell towers. Search Warrant Templates: Social Media and Applications picks up where 150 Search Warrants and Cell Phone Investigations left off. It contains the building blocks for a successful search warrant including: Sealing and non-disclosure orders Mutual Legal Assistance Treaty information for companies in foreign countries Contact information including legal entity name, address for service of process, phone number, email address, and point of contact information, when available Data retention and contact information for more than 280 applications including: Social Media-Badoo, Banjo, Connect, Dubsmash, FriendLife, High There, Keek, KiK, MeetMe, Meetup, Mobli, Moco, MySpace, Tagged, Twitter, Vimeo, Vine, and WhosHere Alternate Communications Using Wi-Fi or Data-AIM, Boss Revolution, FriendCaller, Fring, Glide, GroupeMe, HeyTell, HeyWire, Line, MagicApp, ooVoo, Palringo, Path, Pinger, Presto, Skype, Talkatone, Talkbox, Tango, Text Now, TextMe, textPlus, TiKL, Viber, Voxer, Voxofon, WeChat, WhatsApp, Whistle Phone, and Zello Anonymous/Encrypted Communications/Self-Destructing Message Platforms- After School, Ask.fm, Blackberry Messenger, Burner, Clipchat, Confide, CoverMe, Frankly Chat, Omegle, Snapchat, Whisper, Wickr, and Yik Yak Casual Sex/Dating-Adam4Adam, Ashley Madison, Coffee Meets Bagel, Couple, Grindr, HER, OkCupid, PlentyOfFish, Scruff, Shuttefly, Skout, Tinder, and Zoosk. Others-Airbnb, Amazon, Candy Crush, Dish Anywhere, Dropbox, Electronic Arts, Evernote, Expedia, Game of War, Hotels.com, Hulu, Interactive Corporation (IAC), Muzy, Netflix, Pandora Radio, PayPal, RedBox, Rockstar Games, SoundCloud, Spotify, Square, Supercell, Timehop, Uber, World of Tanks, Worldstar Hip Hop, and Yahoo! Don't miss any more evidence or intelligence. Get Search Warrant Templates: Social Media and Applications today.