|
Search Warrant
<br />Page 17 of 19
<br />Based on my training and experience, I know that Internet Access Records can reveal if a suspect has used the
<br />internet to acquire information that could assist them with criminal activity. I also know that gang members utilize
<br />their cellular telephones in order to conduct internet searches to obtain information related to news articles, which
<br />describe crimes committed by or against their gang.
<br />
<br />Location Data: Stored data that would tend to show the location of the device or user including, but not limited to,
<br />stored GPS records that contain Latitude & Longitude coordinates including azimuth, any stored cellular tower
<br />connection data such as logs of previously connected cell towers, Wi-Fi Access Point SSIDs, and embedded
<br />location metadata in photos and videos. Stored data that would tend to show the location of the device or user
<br />including, but not limited to, stored GPS records, which contain Latitude & Longitude coordinates including
<br />azimuth, any stored cellular tower connection data such as logs of previously connected cell towers, Wi-Fi Access
<br />Point SSIDs, and embedded location metadata in photos and videos.
<br />
<br />Based on my training and experience, I know that Specialized Location Records can assist Detectives with their
<br />investigations by providing detailed records of a device's location during a specific date and time range.
<br />
<br />System Information and Configuration: Files and data related to system configurations, storage configurations,
<br />device identification and settings data, file system format, serial number, volume name their associated dates and
<br />times. Files and data related to system configurations, storage configurations, device identification and settings
<br />data, file system format, serial number, volume name their associated dates and times.
<br />
<br />Due to my training and experience, I know that Device Information can assist detectives with determining how a
<br />device was used by the operator of the device during a specific date and time range. For example, a suspect puts
<br />a device into airplane mode to conceal its location during a crime.
<br />
<br />User Attribution: Files and data consistent with attribution evidence of a person's use of the mobile phone that
<br />may help to identify the user or verify the user's access to and use of the device. These records may be in the
<br />form of stored social media and service accounts, email accounts, passwords, PIN codes, patterns, account
<br />names, usernames, screen names, remote data storage, or any other evidence that may demonstrate attribution
<br />to a particular user or users. Files and data consistent with attribution evidence of a person's use of the mobile
<br />phone that may help to identify the user or verify the user's access to and use of the device. These records may
<br />be in the form of stored social media and service accounts, email accounts, passwords, PIN codes, patterns,
<br />account names, usernames, screen names, remote data storage, or any other evidence that may demonstrate
<br />attribution to a particular user or users.
<br />
<br />Due to my training and experience, Subscriber Information will reveal what personal information was used on the
<br />account(s) associated to the cellphone.
<br />
<br />Based upon your Affiant's training, experience and conversations that your Affiant had with other Law
<br />Enforcement Officers and forensic experts, your Affiant knows that it is common for mobile phones to contain
<br />communication information such as call logs, text messages, emails, or instant messages, photos and videos. As
<br />mobile phones are increasingly becoming the primary source of people communication, your Affiant believes it is
<br />more than likely this data will be located on the mobile phone(s) described in this search warrant. Your Affiant
<br />requests the search of the mobile devices described in this search warrant for evidence of Illegal ammunition
<br />possession, assault with a deadly weapon and gang affiliation.
<br />
<br />Your Affiant knows that mobile devices like cellular phones contain information that can be useful in investigations
<br />such as system and storage configurations, date and time and time zone data, ownership and registration
<br />information, and address books. These types of files often do not contain direct evidence of criminal activity but
<br />are useful in establishing that device tends to be used by, or belongs to, a specific person. Additional files located
<br />on the device such as notes, memos, file metadata, internet history, program files, and installed apps can show
<br />activity occurring on the device itself. Though these files may not contain direct evidence, they can be used to
<br />corroborate a person's statement and may establish exculpatory evidence.
<br />
<br />Your Affiant knows through training and experience that people commonly store photos and videos on their
<br />mobile devices. Photo and video files can provide a wide array of evidence such as images showing the devices
|