Establishing secure connection… Loading editor… Preparing document…
Navigation

Fill and Sign the Mo Search Warrant Form

Fill and Sign the Mo Search Warrant Form

How it works

Open the document and fill out all its fields.
Apply your legally-binding eSignature.
Save and invite other recipients to sign it.

Rate template

4.5
56 votes
IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF MISSOURI IN THE MATTER OF THE SEARCH OF: xxx xxxxx xxxxx xxxxx xxxxx xxxxxx, Missouri Single Family Residence, located within the Western District of Missouri AFFIDAVIT IN SUPPORT OF SEARCH WARRANT COMES NOW Special Agent xxxxxxxxxxx xxxxxx of the United States Department of Education (hereinafter, ED), Ofce of Inspector General (hereinafter, OIG), who is currently assigned to the Computer Crimes Investigation Division (hereinafter, CCID), being of lawful age and frst duly sworn upon my oath, to depose and state as follows: INTRODUCTION I have been a Special Agent of the ED-OIG for approximately xxxx and a xxxx years. I am assigned to the investigation of white-collar crimes involving ED programs and resources, and in particular to the investigation of crimes involving computer fraud, abuse, and network intrusions. For approximately the last three years, I had the additional part-time duty of participating as a forensic feld examiner for the ED-OIG Computer Analysis Team, which specializes in searching for and analyzing evidence stored on computers. I am currently assigned to the ED-OIG-CCID as a full time computer crime investigator. During my career as a Special Agent, I have participated in several investigations involving computer-related ofenses, and have participated in the execution of several search warrants involving the searches and seizures of computers, computer equipment, software, and electronically stored information. I have personally submitted afdavits in connection with approximately three searches in computer-crime cases. I have interviewed numerous persons involved in the unlawful use of computers to commit fraud against ED programs, and have analyzed computer hardware and software recovered during the execution of search warrants. Additionally, I have received both formal and informal training in the feld of computers and network intrusions from the Federal Law Enforcement Training Center, ASR Data Forensics, Guidance Software, and various forensic and network intrusion training providers. This afdavit seeks the issuance of a search warrant for the residence of xxxxxx xxxxxxxx (hereinafter, the SUBJECT), who is the target of an investigation currently being conducted by ED-OIG-CCID. As set forth in more detail below, there is probable cause to believe the SUBJECT has committed and is continuing to commit criminal unauthorized access into xxxx xxxxxxxx xxxxxxx xxxxxxx (hereinafter, xxxxx), in violation of 18 U.S.C. § 1030, and that the SUBJECT has committed and is continuing to commit illegal interceptions of electronic communications through the use of a keystroke monitoring program in violation of 18 U.S.C. § 2511, and that he maintains at his residence computers, electronic equipment, software programs, storage media, records, and other evidence and instrumentalities of his criminal activities as described more fully herein. DEFINITIONS I am familiar with the following terms from my training and experience, which are relevant to this Afdavit and Application: Addresses = Every device on the Internet has an address that allows other devices to locate and communicate with it. An Internet Protocol (IP) address is a unique number that identifes a device on the Internet. Other addresses include Uniform Resource Locater (URL) addresses, such as “http://www.usdoj.gov,” which are typically used to access web sites or other services on remote devices. Domain names, host names, and machine addresses are other types of addresses associated with Internet use. Citrix = A web-based, remote access system, which provides the user a secure way to access their agency's server from a remote location, at anytime, using any computer, which has the Citrix client installed, over an Internet connection. Domain = A group of Internet devices that are owned or operated by a specifc individual, group, or organization. Devices within a domain have IP addresses within a certain range of numbers, and are usually administered according to the same set of rules and procedures. Domain Name = Identifes a computer or group of computers on the Internet, and corresponds to one or more IP addresses within a particular range. Domain names are typically strings of alphanumeric characters, with each "level" of the domain delimited by a period (e.g., Computer.networklevel1.networklevel2.computer). A domain name can provide information about the organization, ISP, and physical location of a particular network user. Unauthorized Access = The gaining of access to a computer, without or in excess of authority, to obtain information. Access can be achieved by simply stealing or guessing a user's password, or a detailed program can be created to allow the intruder to gain access. Internet = A global network of computers and other electronic devices that communicate with each other via standard telephone lines, high-speed telecommunications links, and wireless transmissions. Due to the structure of the Internet, connections between devices on the Internet often cross state and international borders, even when the devices communicating with each other are in the same state. Internet Service Providers (“ISPs”) = Many individuals and businesses obtain their access to the Internet through businesses known as Internet Service Providers (“ISPs”). ISPs provide their customers with access to the Internet using telephone or other telecommunications lines; provide Internet e-mail accounts that allow users to communicate with other Internet users by sending and receiving electronic messages through the ISPs’ servers; remotely store electronic fles on their customers’ behalf; and may provide other services unique to each particular ISP. ISPs maintain records pertaining to the individuals or companies that have subscriber accounts with it. IP Address = The Internet Protocol address (or simply “IP” address) is a unique numeric address used by computers on the Internet. An IP address looks like a series of four numbers, each in the range 0-255, separated by periods (e.g., 121.56.97.178). Every computer attached to the Internet computer must be assigned an IP address so that Internet trafc sent from and directed to that computer may be directed properly from its source to its destination. Most ISPs control a range of IP addresses. Keystroke Monitoring = A process whereby a computer system users and/or administrators can view or record both the keystrokes entered by a computer user and the computer's response during a computer session. Examples of keystroke monitoring would include viewing characters as they are typed by users, reading users' electronic mail, and viewing other recorded information typed by users. Some keystroke monitoring software programs store the keystrokes in a log fle. Log File = Computer fles that contain records about system events and status, the activities of users, and anomalous or unauthorized computer usage. Names for various log fles include, but are not limited to: user logs, access logs, audit logs, transactional logs, and apache logs. Server = A centralized computer that provides services for other computers connected to it via a network. The other computers attached to a server are sometimes called “clients.” In a large agency, such as ED, it is common for individual employees to have client computers at their desktops. When the employees access their e-mail, or access fles stored on the network itself, those fles are pulled electronically from the server, where they are stored, and are sent to the client’s computer via the network. Notably, server computers can be physically stored in any location: it is common for a network’s server to be located hundreds (and even thousands) of miles away from the client computers. User Name or User ID = Most services ofered on the Internet assign users a name or ID, which is a pseudonym that computer systems use to keep track of users. User names and IDs are typically associated with additional user information or resources, such as a user account protected by a password, personal or fnancial information about the user, a directory of fles, or an email address. USE OF COMPUTERS TO CONDUCT CRIMINAL ACTIVITIES In pertinent part, Title 18, United States Code, Section 1030 prohibits the following: (a) Whoever - (2) intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains – (B) information from any department or agency of the United States . . . (3) intentionally, without authorization to access any nonpublic computer of a department or agency of the United States, accesses such a computer of that department or agency that is exclusively for the use of the Government of the United States or, in the case of a computer not exclusively for such use, is used by or for the Government of the United States, and such conduct affects that use by or for the Government of the United States . . . shall be punished as provided in subsection (c) of this section. In pertinent part, Title 18, United States Code, Section 2511 prohibits the following: (1) Except as otherwise specifically provided in this chapter any person who – (a) intentionally intercepts, endeavors to intercept, or procures any other person to intercept or endeavor to intercept, and wire, oral, or electronic communication . . . shall be punished as provided in subsection (4). . . . Based on my training and experience, I am familiar with the use of computers as an instrumentality in a crime, as creating contraband, or as containing contraband. I know that computer hardware, software, and electronic files may be important to a criminal investigation in two distinct ways: (1) the objects themselves may be contraband, evidence, instrumentalities, or fruits of crime, and/or (2) the objects may be used as storage devices that contain contraband, evidence, instrumentalities, or fruits of crime in the form of electronic data. I know that when an individual uses a computer to obtain unauthorized access to a server over the Internet, the individual's computer will generally serve both as an instrumentality for committing the crime, and also as a storage device for evidence of the crime. The computer is an instrumentality of the crime because it is "used as a means of committing [the] criminal offense" according to Rule 41(b)(3). In particular, the individual's computer is the primary means for accessing the Internet, communicating with the victim computer, and ultimately obtaining the unauthorized access that is prohibited by 18 U.S.C. § 1030. The computer is also likely to be a storage device for evidence of crime because records and evidence relating to the crimes are stored on the computers for future use. Those records and evidence may include files that recorded the unauthorized access, stolen passwords, computer logs, individual's notes as to how the access was achieved, and other records that indicate the scope of the individual's unauthorized access. Rule 41 of the Federal Rules of Criminal Procedure permits the government to search for and seize computer hardware, software, and electronic files that are evidence of crime, contraband, instrumentalities of crime, and/or fruits of crime. In this case, the warrant application requests permission to search and seize for evidence, likely digital and paper, related to the unauthorized access into the United States Department of Education's computer network and of illegal interceptions of electronic communication. This digital and paper evidence constitute both evidence of crime and contraband. This affidavit also requests permission to seize the computer hardware that may contain evidence of computer intrusions and/or unauthorized access and of illegal interceptions of electronic communications, if it becomes necessary for reasons of practicality to remove the hardware and conduct a search off-site. I believe that, in this case, the computer hardware is a container for evidence, a container for contraband, and also itself an instrumentality of the crime under investigation. SEARCH AND ANALYSIS OF THE EVIDENCE Based upon my knowledge, training, and experience, I know that in order to completely and accurately retrieve data maintained in computer hardware or on computer software, to insure accuracy and completeness of such data, and to prevent the loss of the data either from accidental or programmed destruction, it is often necessary that some computer equipment, peripherals, related instructions in the form of manuals and notes, as well as the software utilized to operate such a computer be seized and subsequently processed by a qualified computer specialist in a laboratory setting. This is true because computer storage devices (such as hard disks, diskettes, tapes, compact disks, thumb drives, etc.,) can store the equivalent of thousands of pages of information. Additionally, a user may seek to conceal criminal evidence by storing it in random order with deceptive file names. Searching authorities are thus required to examine all the stored data to determine which particular files are evidence or instrumentalities of criminal activity. This sorting process can take days or weeks, depending on the volume of data stored, and it could be impractical to attempt this kind of data analysis "on-site." INCREMENTAL APPROACH TO SEIZING THE EVIDENCE Your Affiant recognizes that the SUBJECT and his family use their computers for a wide range of day-to-day tasks, which are not the criminal activity under investigation, and that a seizure of the SUBJECT's computers may have the unintended and undesired effect of limiting the SUBJECT and his family's ability to conduct their normal day to day activities. In response to these concerns, the agents who execute the search will take an incremental approach to minimize the inconvenience to the SUBJECT's family and to minimize the need to seize equipment and data. This incremental approach, which will be explained to all of the agents on the search team before the search is executed, will proceed as follows: A. The computer forensic examiner will attempt to create an electronic "image" of the computers, which are likely to store the data and information described in Attachment A. Generally speaking, imaging is the taking of a complete electronic picture of the computer's data, including all hidden sectors and deleted files. Imaging a computer permits the agents to obtain an exact copy of the computer's stored data without actually seizing the computer hardware. A computer forensic examiner will conduct an off-site search for the computer files described in Attachment A, from the "imaged" copy, at a later date. If the computer forensic examiner successfully images the SUBJECT's computers, the agents will not conduct any additional on-site searches or seizures of the Subject’s computers. B. If "imaging" proves impractical, or even impossible for technical reasons, then the agents will seize those components of the SUBJECT's computer system that the computer forensic examiner believes must be seized to permit the agents to locate the computer files described in Attachment A. The components will be seized and taken in to the custody of the ED-OIG-CCID. If the SUBJECT so requests, the computer forensic examiner will, to the extent practicable, attempt to provide the SUBJECT with copies of any files not within the scope of the warrant that may be necessary or important to the continuing function of the SUBJECT's or his family's legitimate business and/or their day to day activities. If, after inspecting the computers, the computer forensic examiner determines that some or all of this equipment is no longer necessary to retrieve and preserve the evidence, ED-OIG-CCID will return it within a reasonable time. DATA ANALYSIS Analyzing computer systems for criminal evidence is a highly technical process requiring expert skill and a properly controlled environment. Since computer evidence is extremely vulnerable to tampering or destruction (either from external sources or from destructive code embedded in the system as a "booby trap"), a controlled environment is essential to its complete and accurate analysis. Searching the SUBJECT's computer system for the evidence described in Attachment A may require a range of data analysis techniques. In some cases, it is possible for agents to conduct carefully targeted searches that can locate evidence without requiring a time-consuming manual search through unrelated materials that may be commingled with criminal evidence. For example, a computer forensic examiner may be able to execute a "keyword" search that searches through the files stored in a computer for special words that are likely to appear only in the materials covered by a warrant. Similarly, a computer forensic examiner may be able to locate the materials covered in the warrant by looking for particular directory or file names. Based on my knowledge, training, and experience, I know that, such techniques may not yield the evidence described in the warrant. Criminals can mislabel or hide files and directories; encode communications to avoid using key words; attempt to delete files to evade detection; or take other steps designed to frustrate law enforcement searches for information. Furthermore, computer data or remnants of such data can be recovered months or even years after they have been deleted from a hard drive. When a person "deletes" a file on a personal computer, the data contained in the file does not actually disappear; rather, that data remains on the hard drive until it is overwritten by new data. Therefore, deleted files, or remnants of deleted files, may reside in free space or slack space - that is, in space on the hard drive that is not allocated to an active file or that is unused after a file has been allocated to a set block of storage space - for long periods of time before they are overwritten. In addition, a computer's operating system may also keep a record of deleted data in a "swap" or "recovery" file. Similarly, files that have been viewed via the Internet are automatically downloaded into a temporary Internet directory or "cache." The browser typically maintains a fixed amount of hard drive space devoted to these files, and the files are only overwritten as they are replaced with more recently viewed Internet pages. Thus, the ability to retrieve residue of an electronic file from a hard drive depends less on when the file was downloaded or viewed than on a particular user's operating system, storage capacity, and computer habits. These steps may require the computer forensic examiner to conduct more extensive searches, such as scanning areas of the disk not allocated to listed files, or opening every file and scanning its contents briefly to determine whether it falls within the scope of the warrant. In light of these difficulties, I request permission to use whatever data analysis techniques appear necessary to locate and retrieve the evidence described in Attachment A. CONCLUSION xxxxxxxxxxx xxxxxx Special Agent United States Department of Education Office of Inspector General Computer Crimes Investigation Division Subscribed and sworn before me this day of xxx 20___. xxxxxxx xxxxxxxx CHIEF UNITED STATES MAGISTRATE JUDGE

Helpful hints for preparing your ‘Mo Search Warrant’ online

Are you fed up with the inconvenience of dealing with paperwork? Look no further than airSlate SignNow, the top electronic signature solution for individuals and small to medium-sized businesses. Bid farewell to the monotonous task of printing and scanning documents. With airSlate SignNow, you can effortlessly fill out and sign documents online. Utilize the powerful features packed within this user-friendly and cost-effective platform and transform your approach to document management. Whether you need to approve forms or gather eSignatures, airSlate SignNow manages it all effortlessly, with just a few clicks.

Follow these comprehensive steps:

  1. Sign in to your account or sign up for a free trial with our service.
  2. Click +Create to upload a file from your device, cloud storage, or our template collection.
  3. Open your ‘Mo Search Warrant’ in the editor.
  4. Click Me (Fill Out Now) to finalize the form on your end.
  5. Add and assign fillable fields for others (if needed).
  6. Continue with the Send Invite settings to request eSignatures from others.
  7. Save, print your version, or convert it into a reusable template.

No need to worry if you have to collaborate with others on your Mo Search Warrant or submit it for notarization—our platform provides everything you need to accomplish such tasks. Register with airSlate SignNow today and elevate your document management to new levels!

Here is a list of the most common customer questions. If you can’t find an answer to your question, please don’t hesitate to reach out to us.

Need help? Contact Support

The best way to complete and sign your mo search warrant form

Save time on document management with airSlate SignNow and get your mo search warrant form eSigned quickly from anywhere with our fully compliant eSignature tool.

How to Sign a PDF Online How to Sign a PDF Online

How to fill out and sign paperwork online

In the past, coping with paperwork took pretty much time and effort. But with airSlate SignNow, document management is quick and simple. Our powerful and user-friendly eSignature solution allows you to effortlessly complete and eSign your mo search warrant form online from any internet-connected device.

Follow the step-by-step guidelines to eSign your mo search warrant form template online:

  • 1.Register for a free trial with airSlate SignNow or log in to your account with password credentials or SSO authorization option.
  • 2.Click Upload or Create and import a form for eSigning from your device, the cloud, or our form catalogue.
  • 3.Click on the document name to open it in the editor and utilize the left-side toolbar to fill out all the empty fields accordingly.
  • 4.Place the My Signature field where you need to eSign your sample. Provide your name, draw, or upload an image of your regular signature.
  • 5.Click Save and Close to accomplish modifying your completed document.

As soon as your mo search warrant form template is ready, download it to your device, save it to the cloud, or invite other people to eSign it. With airSlate SignNow, the eSigning process only requires a few clicks. Use our powerful eSignature tool wherever you are to manage your paperwork successfully!

How to Sign a PDF Using Google Chrome How to Sign a PDF Using Google Chrome

How to complete and sign paperwork in Google Chrome

Completing and signing paperwork is simple with the airSlate SignNow extension for Google Chrome. Installing it to your browser is a fast and productive way to manage your forms online. Sign your mo search warrant form template with a legally-binding electronic signature in just a few clicks without switching between tools and tabs.

Follow the step-by-step guidelines to eSign your mo search warrant form template in Google Chrome:

  • 1.Navigate to the Chrome Web Store, find the airSlate SignNow extension for Chrome, and install it to your browser.
  • 2.Right-click on the link to a document you need to sign and select Open in airSlate SignNow.
  • 3.Log in to your account using your credentials or Google/Facebook sign-in buttons. If you don’t have one, you can start a free trial.
  • 4.Utilize the Edit & Sign menu on the left to complete your sample, then drag and drop the My Signature option.
  • 5.Add an image of your handwritten signature, draw it, or simply enter your full name to eSign.
  • 6.Make sure all data is correct and click Save and Close to finish modifying your paperwork.

Now, you can save your mo search warrant form template to your device or cloud storage, send the copy to other people, or invite them to eSign your form via an email request or a secure Signing Link. The airSlate SignNow extension for Google Chrome improves your document processes with minimum effort and time. Try airSlate SignNow today!

How to Sign a PDF in Gmail How to Sign a PDF in Gmail How to Sign a PDF in Gmail

How to complete and sign paperwork in Gmail

When you receive an email containing the mo search warrant form for approval, there’s no need to print and scan a file or download and re-upload it to a different program. There’s a better solution if you use Gmail. Try the airSlate SignNow add-on to quickly eSign any paperwork right from your inbox.

Follow the step-by-step guidelines to eSign your mo search warrant form in Gmail:

  • 1.Navigate to the Google Workplace Marketplace and look for a airSlate SignNow add-on for Gmail.
  • 2.Install the program with a corresponding button and grant the tool access to your Google account.
  • 3.Open an email containing an attachment that needs approval and use the S sign on the right panel to launch the add-on.
  • 4.Log in to your airSlate SignNow account. Choose Send to Sign to forward the file to other people for approval or click Upload to open it in the editor.
  • 5.Put the My Signature field where you need to eSign: type, draw, or import your signature.

This eSigning process saves time and only requires a couple of clicks. Utilize the airSlate SignNow add-on for Gmail to adjust your mo search warrant form with fillable fields, sign forms legally, and invite other parties to eSign them al without leaving your mailbox. Enhance your signature workflows now!

How to Sign a PDF on a Mobile Device How to Sign a PDF on a Mobile Device How to Sign a PDF on a Mobile Device

How to complete and sign forms in a mobile browser

Need to rapidly complete and sign your mo search warrant form on a smartphone while working on the go? airSlate SignNow can help without the need to install additional software applications. Open our airSlate SignNow tool from any browser on your mobile device and add legally-binding eSignatures on the go, 24/7.

Follow the step-by-step guide to eSign your mo search warrant form in a browser:

  • 1.Open any browser on your device and go to the www.signnow.com
  • 2.Sign up for an account with a free trial or log in with your password credentials or SSO option.
  • 3.Click Upload or Create and import a file that needs to be completed from a cloud, your device, or our form catalogue with ready-to go templates.
  • 4.Open the form and complete the blank fields with tools from Edit & Sign menu on the left.
  • 5.Put the My Signature area to the sample, then enter your name, draw, or upload your signature.

In a few easy clicks, your mo search warrant form is completed from wherever you are. When you're finished editing, you can save the file on your device, create a reusable template for it, email it to other individuals, or invite them electronically sign it. Make your paperwork on the go quick and efficient with airSlate SignNow!

How to Sign a PDF on iPhone How to Sign a PDF on iPhone

How to complete and sign forms on iOS

In today’s business world, tasks must be done rapidly even when you’re away from your computer. With the airSlate SignNow app, you can organize your paperwork and approve your mo search warrant form with a legally-binding eSignature right on your iPhone or iPad. Set it up on your device to close deals and manage forms from just about anywhere 24/7.

Follow the step-by-step guidelines to eSign your mo search warrant form on iOS devices:

  • 1.Go to the App Store, find the airSlate SignNow app by airSlate, and install it on your device.
  • 2.Open the application, tap Create to add a form, and select Myself.
  • 3.Opt for Signature at the bottom toolbar and simply draw your autograph with a finger or stylus to eSign the form.
  • 4.Tap Done -> Save right after signing the sample.
  • 5.Tap Save or take advantage of the Make Template option to re-use this paperwork later on.

This process is so simple your mo search warrant form is completed and signed in just a few taps. The airSlate SignNow app works in the cloud so all the forms on your mobile device remain in your account and are available whenever you need them. Use airSlate SignNow for iOS to enhance your document management and eSignature workflows!

How to Sign a PDF on Android How to Sign a PDF on Android

How to complete and sign forms on Android

With airSlate SignNow, it’s simple to sign your mo search warrant form on the go. Install its mobile app for Android OS on your device and start improving eSignature workflows right on your smartphone or tablet.

Follow the step-by-step guidelines to eSign your mo search warrant form on Android:

  • 1.Navigate to Google Play, search for the airSlate SignNow application from airSlate, and install it on your device.
  • 2.Log in to your account or register it with a free trial, then add a file with a ➕ button on the bottom of you screen.
  • 3.Tap on the imported file and choose Open in Editor from the dropdown menu.
  • 4.Tap on Tools tab -> Signature, then draw or type your name to eSign the template. Fill out blank fields with other tools on the bottom if necessary.
  • 5.Use the ✔ key, then tap on the Save option to end up with editing.

With an easy-to-use interface and total compliance with main eSignature laws and regulations, the airSlate SignNow application is the perfect tool for signing your mo search warrant form. It even works without internet and updates all document adjustments once your internet connection is restored and the tool is synced. Fill out and eSign forms, send them for eSigning, and create multi-usable templates anytime and from anywhere with airSlate SignNow.

Sign up and try Mo search warrant form
  • Close deals faster
  • Improve productivity
  • Delight customers
  • Increase revenue
  • Save time & money
  • Reduce payment cycles