Amid a live intrusion at a utility provider in Phoenix, Arizona, responders identify an active backdoor on a control system. System logs show that evidence is in the process of being deleted. To prevent the loss of critical runtime artifacts, investigators must act immediately. Under which condition may a search proceed without first obtaining a warrant?
Submit