Laserfiche WebLink
Search Warrant <br />Page 17 of 19 <br />Based on my training and experience, I know that Internet Access Records can reveal if a suspect has used the <br />internet to acquire information that could assist them with criminal activity. I also know that gang members utilize <br />their cellular telephones in order to conduct internet searches to obtain information related to news articles, which <br />describe crimes committed by or against their gang. <br /> <br />Location Data: Stored data that would tend to show the location of the device or user including, but not limited to, <br />stored GPS records that contain Latitude & Longitude coordinates including azimuth, any stored cellular tower <br />connection data such as logs of previously connected cell towers, Wi-Fi Access Point SSIDs, and embedded <br />location metadata in photos and videos. Stored data that would tend to show the location of the device or user <br />including, but not limited to, stored GPS records, which contain Latitude & Longitude coordinates including <br />azimuth, any stored cellular tower connection data such as logs of previously connected cell towers, Wi-Fi Access <br />Point SSIDs, and embedded location metadata in photos and videos. <br /> <br />Based on my training and experience, I know that Specialized Location Records can assist Detectives with their <br />investigations by providing detailed records of a device's location during a specific date and time range. <br /> <br />System Information and Configuration: Files and data related to system configurations, storage configurations, <br />device identification and settings data, file system format, serial number, volume name their associated dates and <br />times. Files and data related to system configurations, storage configurations, device identification and settings <br />data, file system format, serial number, volume name their associated dates and times. <br /> <br />Due to my training and experience, I know that Device Information can assist detectives with determining how a <br />device was used by the operator of the device during a specific date and time range. For example, a suspect puts <br />a device into airplane mode to conceal its location during a crime. <br /> <br />User Attribution: Files and data consistent with attribution evidence of a person's use of the mobile phone that <br />may help to identify the user or verify the user's access to and use of the device. These records may be in the <br />form of stored social media and service accounts, email accounts, passwords, PIN codes, patterns, account <br />names, usernames, screen names, remote data storage, or any other evidence that may demonstrate attribution <br />to a particular user or users. Files and data consistent with attribution evidence of a person's use of the mobile <br />phone that may help to identify the user or verify the user's access to and use of the device. These records may <br />be in the form of stored social media and service accounts, email accounts, passwords, PIN codes, patterns, <br />account names, usernames, screen names, remote data storage, or any other evidence that may demonstrate <br />attribution to a particular user or users. <br /> <br />Due to my training and experience, Subscriber Information will reveal what personal information was used on the <br />account(s) associated to the cellphone. <br /> <br />Based upon your Affiant's training, experience and conversations that your Affiant had with other Law <br />Enforcement Officers and forensic experts, your Affiant knows that it is common for mobile phones to contain <br />communication information such as call logs, text messages, emails, or instant messages, photos and videos. As <br />mobile phones are increasingly becoming the primary source of people communication, your Affiant believes it is <br />more than likely this data will be located on the mobile phone(s) described in this search warrant. Your Affiant <br />requests the search of the mobile devices described in this search warrant for evidence of Illegal ammunition <br />possession, assault with a deadly weapon and gang affiliation. <br /> <br />Your Affiant knows that mobile devices like cellular phones contain information that can be useful in investigations <br />such as system and storage configurations, date and time and time zone data, ownership and registration <br />information, and address books. These types of files often do not contain direct evidence of criminal activity but <br />are useful in establishing that device tends to be used by, or belongs to, a specific person. Additional files located <br />on the device such as notes, memos, file metadata, internet history, program files, and installed apps can show <br />activity occurring on the device itself. Though these files may not contain direct evidence, they can be used to <br />corroborate a person's statement and may establish exculpatory evidence. <br /> <br />Your Affiant knows through training and experience that people commonly store photos and videos on their <br />mobile devices. Photo and video files can provide a wide array of evidence such as images showing the devices