Advertisement
Legal Process
Subscribe to Legal Process

The Lead

Digital devices have provided law enforcement agencies investigating child abuse and exploitation with an embarrassment of riches. The devices can hold thousands of images that can be used as evidence and as clues to help identify and find missing childre

Improved Image Analysis Tools Speed Exploited Children Cases

August 28, 2014 10:29 am | by William Jackson, GCN | News | Comments

Digital devices have provided law enforcement agencies investigating child abuse and exploitation with an embarrassment of riches. The devices can hold thousands of images that can be used as evidence and as clues to help identify and find missing children. But the sheer volume of data being reviewed can slow an investigation to a crawl.

Federal Cybersecurity Director Found Guilty on Child Porn Charges

August 27, 2014 11:28 am | by Kim Zetter, Wired | News | Comments

As the acting cybersecurity chief of a federal agency, Timothy DeFoggi should have been well...

Silk Road Kingpin Faces Yet More Criminal Charges

August 27, 2014 10:28 am | by Tara Seals, Infosecurity Magazine | News | Comments

Alleged Silk Road mastermind Ross Ulbricht (aka, Dread Pirate Roberts), has been indicted on...

Aaron's Law Doomed

August 7, 2014 9:40 am | News | Comments

A bill named after the late internet activist Aaron Swartz that was supposed to update...

View Sample

SUBSCRIBE TO FREE DFI News EMAIL NEWSLETTER

Bill Would Allow Warrants to Be Issued by Telephone

August 7, 2014 9:16 am | News | Comments

Tennessee prosecutors want to move the way search warrants are issued out of the 20th century. At issue is a bill that would allow a magistrate or judge to issue a search warrant by telephone or “other reliable electronic means.”  

The prospect that classified capabilities could be revealed in a criminal case has meant that the most sophisticated surveillance technologies are not always available to law enforcement because they are classified, current and former.

How Spy Agencies Keep Their 'Toys' from Law Enforcement

July 28, 2014 10:05 am | by Ellen Nakashima, The Washington Post | News | Comments

The prospect that classified capabilities could be revealed in a criminal case has meant that the most sophisticated surveillance technologies are not always available to law enforcement because they are classified, current and former.    

Today we’ll discuss the challenges of testifying as an expert witness. As you work a case you must assume that you will be called to testify at trial.

Talk Forensics - Expert Witness Testimony

July 28, 2014 8:33 am | Videos | Comments

Today we’ll discuss the challenges of testifying as an expert witness. As you work a case you must assume that you will be called to testify at trial.                             

Advertisement
Some of the hottest tickets in town — to Broadway hits, Jay-Z and Justin Timberlake concerts, a New York Yankees-Boston Red Sox game — were snapped up by an international ring of cyber thieves who commandeered more than 1,000 StubHub users' accounts to ma

Cyber Thieves Sell $1.6M in StubHub Tickets

July 24, 2014 9:46 am | by Associated Press | News | Comments

Some of the hottest tickets in town — to Broadway hits, Jay-Z and Justin Timberlake concerts, a New York Yankees-Boston Red Sox game — were snapped up by an international ring of cyber thieves who commandeered more than 1,000 StubHub users' accounts to make big money by fraudulently buying tickets and reselling them, prosecutors said Wednesday.

Gmail Account is Fair Game, Says US Judge

July 22, 2014 9:49 am | by Lisa Vaas | Blogs | Comments

A New York court opened up our entire Gmail accounts to feds or cops with warrants, in spite of two recent decisions that went against similar requests.                           

New York Proposes Restrictive Bitcoin Regulations

July 18, 2014 8:05 am | by Michael Virtanen, Associated Press | News | Comments

New York regulators have proposed establishing rules for firms involved in receiving, transmitting and storing virtual currency, as well as retail conversions. The proposal by the Department of Financial Services would establish a so-called BitLicense.

Senate Hearing Looks to Cybercrime Law to Fight Botnets

July 17, 2014 10:19 am | by Sara Peters, Dark Reading | News | Comments

In the wake of Microsoft's seizure of No-IP servers and domains, private and public sector representatives met to discuss what can be done to address the problem of botnets.                     

Beware Keyloggers at Hotel Business Centers

July 14, 2014 11:12 am | by Editor | Blogs | Comments

U.S. Secret Service is advising the hospitality industry to inspect computers made available to guests in hotel business centers, warning that crooks have been compromising hotel business center PCs with keystroke-logging malware in a bid to steal personal and financial data from guests.

Advertisement

FBI Cyber Expert Fights Real-world Crime

July 14, 2014 10:51 am | by Joe Mankak, Associated Press | News | Comments

J. Keith Mularski's world has expanded greatly since he stopped selling discount furniture to join the FBI in 1998. Especially since he transferred from Washington, D.C., in 2005 to fill a vacancy in the Pittsburgh field office's cyber squad — which he now heads.

Moscow Accuses US of 'Kidnapping' Russian Hacker

July 9, 2014 10:08 am | by Reuters | News | Comments

Russia accused the United States on Tuesday of violating a bilateral treaty and "kidnapping" a Russian accused of hacking into U.S. retailers' computer systems to steal credit card data.                  

Smartphones Can Still Be Searched by Border Cops

July 7, 2014 9:57 am | News | Comments

The Supreme Court released a landmark unanimous ruling last Wednesday limiting the ability of police officers to search a suspect's cellphone. But don't expect the Supreme Court's limitations to impact all law enforcement, because, as Aaron Sankin detailed on the Daily Dot, the United States Customs and Border Protection (CBP) still don't need to consult with a judge before browsing through your smartphone.

Child Rape Case Leaves Mysteries

July 2, 2014 1:46 pm | by Mitch Weiss, Ray Henry and Kate Brumback, Associated Press | News | Comments

Matthew Coniglio's Georgia home held a trove of child pornography, more than 50,000 images and videos stored on laptops, external hard drives and thumb drives.                         

Physical Location of Data Will Become Increasingly Irrelevant

July 2, 2014 12:44 pm | by Gartner | News | Comments

The physical location of data still matters, but will become increasingly irrelevant and will be replaced by a combination of legal location, political location and logical location in most organizations by 2020, according to a report from Gartner, Inc.

Advertisement

Supreme Court Cites NIST Mobile Forensics Guide in Ruling on Cell Phone Searches

July 2, 2014 12:20 pm | by NIST | News | Comments

In considering the question of cell phone searches by police without a warrant, the Supreme Court ruling in Riley v California had to mesh established policy on search warrants together with an understanding of cell phone technology. To help with that challenge, the justices turned to a variety of sources, among them the NIST Guidelines on Mobile Device Forensics

When Does Virtual Crime Become An Actual Crime?

July 2, 2014 8:18 am | News | Comments

In his mind and online persona, Gilberto Valle left little doubt about the depths of his depravation: In communications over the Internet, he imagined subjecting women he knew to sex-related torture and, in some cases, murder and cannibalism. However, the judge concluded that Mr. Valle’s Internet plotting had been “fantasy role play” and was not evidence of an actual crime.

Microsoft Sues to Seize Domains Responsible for Malware Infections

July 1, 2014 11:40 am | by Ericka Chickowski, Dark Reading | News | Comments

After detecting more than 7.4 million infections among its customers by the Jenxcus and Bladabindi worms, Microsoft kicked off legal action to disrupt these pervasive malware threats.                   

In an emphatic defense of privacy in the digital age, a unanimous Supreme Court ruled Wednesday that police generally may not search the cellphones of people they arrest without first getting search warrants.

Police Need a Warrant to Search Cell Phones, Justices Say

June 25, 2014 3:24 pm | by Mark Sherman, Associated Press | News | Comments

In an emphatic defense of privacy in the digital age, a unanimous Supreme Court ruled Wednesday that police generally may not search the cellphones of people they arrest without first getting search warrants.            

U.K. Expert Witnesses Are Happy to Spin Their Expert Reports

June 23, 2014 10:23 am | by Sharon D. Nelson | Blogs | Comments

Of nine expert witnesses approached, only one refused to get involved in spinning expert reports according to a report from BBC News. It is downright depressing. Most of the time, we find that lawyers understand integrity and they are careful to make sure we are comfortable with the language in our reports and with how we will testify. But there are clearly "experts for hire" who are interested primarily in the money.

A Tennessee man was arrested and charged with federal computer hacking for allegedly conspiring to launch cyber attacks on two universities and three companies since last summer

NullCrew Hacker Arrested for Cyber Attacks on Companies and Universities

June 19, 2014 8:11 am | by DOJ | News | Comments

A Tennessee man was arrested and charged with federal computer hacking for allegedly conspiring to launch cyber attacks on two universities and three companies since last summer, federal law enforcement officials have announced. The defendant is allegedly associated with a group of individuals, known as “NullCrew."

Smartphones before the Court: Searchable Wallets or Pocket PCs?

June 16, 2014 10:16 am | by William Jackson, GCN | News | Comments

Smartphones contain a wealth of information that can translate into evidence in civil and criminal court cases, and law enforcement agencies increasingly are mining this data in their investigations. Which raises the question, how much access should police have to the personal data contained on smartphones?

Queen Proposes Life Sentences for Hackers

June 6, 2014 9:43 am | by Tom Brewster, the Guardian | News | Comments

The UK government has said it wants to hand out life sentences to anyone found guilty of a cyber attack that has a catastrophic effect, under plans announced in the Queen's speech.                   

US Marshals Seize Police Surveillance Records

June 5, 2014 9:13 am | by Kim Zetter, Wired | News | Comments

A routine request in Florida for public records regarding the use of a surveillance tool known as stingray took an extraordinary turn recently when federal authorities seized the documents before police could release them.       

LulzSec Sabu Gets Time Served

May 28, 2014 10:10 am | by Andy Greenberg, Wired | News | Comments

Hector Monsegur spent the last three years as a model law enforcement informant, quietly drawing out his fellow hackers and directly aiding in the arrest of members of the LulzSec hacking crew and Anonymous hacker Jeremy Hammond. His hard work was rewarded Tuesday, when a judge sentenced him to time served and released him.

Iran Denies It Summoned Facebook CEO to Court

May 28, 2014 9:12 am | by Associated Press | News | Comments

An Iranian prosecutor Wednesday denied reports that a local judge ordered Facebook founder and CEO Mark Zuckerberg to appear in court to answer complaints by individuals who say Facebook-owned applications Instagram and Whatsapp violate their privacy.

Hacker Helped Thwart 300 Cyber Attacks

May 27, 2014 9:07 am | by Tom Hays, Associated Press | News | Comments

A prolific computer hacker who infiltrated the servers of major corporations later switched sides and helped the U.S. government disrupt hundreds of cyber attacks on Congress, NASA and other sensitive targets, according to federal prosecutors. 

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading