When
law enforcement agencies began making
computer crime arrests in the 1990s, they would often ask judges for
no knock search warrants, to deny their targets time to
delete incriminating evidence from computers or storage media. In more extreme circumstances where it was likely that the targets could get advance notice of arriving police, judges would grant "power-off" warrants, allowing utilities to turn off the electricity to the location of the raid shortly beforehand, further forestalling any efforts to destroy evidence before it could be seized. These methods were effective against criminals who produced and distributed pirated software and movies, which was the primary large-scale computer crime of the era. The usual technique for authorities—either public entities such as law enforcement or private organizations like companies—seizing a computer (usually a
laptop) that they believe is being used improperly is first to physically separate the suspect user from the computer enough that they cannot touch it, to prevent them from closing its lid, unplugging it, or typing a command. Once they have done so, they often install a device in the USB port that
spoofs minor actions of a
mouse,
touchpad, or keyboard, preventing the computer from going into
sleep mode, from which it would usually return to a
lock screen which would require a password. Agents with the U.S.
Federal Bureau of Investigation (FBI) investigating
Ross Ulbricht, founder of the online
black market Silk Road, learned that he often ran the site from his laptop, using the
wireless networks available at branches of the
San Francisco Public Library. When they had enough evidence to arrest him, they planned to catch him in the act of running Silk Road, with his computer on and logged in. They needed to ensure he was unable to trigger
encryption or delete evidence when they did. ==Use==