Phyllis Schneck's job as deputy undersecretary for cybersecurity at the Department of Homeland Security should get a bit easier when President Obama, as expected, signs FISMA reform legislation that passed Congress this week.
The popular file-sharing service Pirate Bay was taken down following a raid in Sweden by police...
Not long ago, mobile device forensics was a relatively straightforward process. Contact lists,...
More than 70 Chinese nationals have been detained by Kenyan police investigating allegations of cyber crime, operating private radio services and being in the country illegally, their lawyers have said.
The leader of the Justice Department's criminal division is expected to announce the creation of a new unit to prevent cybercrime and work alongside law enforcement, private sector companies and Congress.
A Turlock, California man who was the subject of a Homeland Security investigation involving a child pornography ring will be spending the next three decades behind bars.
The theft of trade secrets in U.S. businesses is increasing rapidly and is expected to double within the next decade, according to a recent report. These incidents and other suspicious behavior are the catalyst for lengthy, expensive forensic investigations. Digital forensic investigators will seek evidence from a wide array of devices and data sources, including mobile devices.
Newly discovered court documents from two federal criminal cases in New York and California that remain otherwise sealed suggest that the Department of Justice (DOJ) is pursuing an unusual legal strategy to compel cellphone makers to assist investigations.
Effective training in professional ethics doesn’t primarily consist of rote memorization of rules, but instead must prepare the examiner in the art of ethical issue spotting. Similarly, an effective code of ethics consists not only of certain static core principles, but also may consist of components that can be adapted over time to keep pace with the law and with professional norms.
We live in a world today where individuals’ movements and locations are being recorded in many different ways. These movements and locations are commonly being used as evidence in civil, criminal, and domestic litigation. It is of paramount importance that anyone who is involved in litigation that uses cellular location evidence understands the appropriate and inappropriate use of this type of location data.
We live in a world today where individuals’ movements and locations are being recorded in many different ways. These movements and locations are commonly being used as evidence in civil, criminal and domestic litigation. It is of paramount importance that anyone who is involved in litigation that uses cellular location evidence understands the appropriate and inappropriate use of this type of location data.
The Senate on Tuesday blocked a bill to end bulk collection of Americans' phone records by the National Security Agency. The legislation would have ended the NSA's collection of domestic calling records, instead requiring the agency to obtain a court order each time it wanted to analyze the records in terrorism cases, and query records held by the telephone companies.
Cocaine dealers, bank robbers and carjackers converge at Manchester Federal Prison in rural Kentucky — and then there is Jeremy Hammond, a tousle-haired and talented hacker whose nimble fingers have clicked and tapped their way into the nation's computing systems. Once the FBI's most-wanted cyber criminal, Hammond is serving one of the longest sentences a U.S. hacker has received.
Most stories about child pornography focus on high-profile offenders such as priests and college professors or on attempts by victims to recover damages from offenders. Fewer stories focus on the people who voluntarily enter this world to catch the offenders and save some of the victims.
He reveled in tormenting members of the Bush family, Colin L. Powell and a host of other prominent Americans, and also in outfoxing the F.B.I. and the Secret Service, foiling their efforts to discover even his nationality, never mind his identity. Early this year, however, the elusive online outlaw known as Guccifer lost his cocky composure and began to panic.
It only took about one month from the time the Silk Road drug-dealing website was busted for a successor to be created. Silk Road 2.0 took steps beyond those of the first version of the website to remain anonymous, but those steps weren't enough to protect the site from old-fashioned human infiltration.
One of the founders of popular file-sharing website The Pirate Bay has been arrested under an Interpol warrant as he was crossing into Thailand from Laos, police said Tuesday.
A Virginia circuit court judge has ruled that smartphone users can be compelled to give up their fingerprint, but not their passcodes, allowing police to search their devices.
A Danish court has sentenced the Swedish founder of file-sharing site The Pirate Bay to 3½ years in prison after he was found guilty of hacking into a private company handling sensitive information for Danish authorities.
While revelations from Edward Snowden about the National Security Agency’s massive database of phone records have sparked a national debate about its constitutionality, another secretive database has gone largely unnoticed and without scrutiny.
The head of a sophisticated cybercrime ring which stole over $9 million from payment processor Worldpay back in 2008 has been sentenced to a hefty 11 years behind bars.
What happens when a lawyer inadvertently produces an attorney protected by the attorney-client privilege? A Magistrate Judges and District Court Judge orders the receiving party to destroy the inadvertently produced email.
There are no shortage of cases where the duty to preserve has gotten attorneys and parties a like in trouble. However, it is difficult to ask a Court to order a party to “follow the rules,” because the party already has a duty to so. However, if there is evidence of wrongdoing by the party that was subject to the duty to preserve, the outcome could be different.
The U.S. Justice Department has piled on more charges against alleged cybercrime kingpin Roman Seleznev, a Russian national who made headlines in July when it emerged that he’d been whisked away to Guam by U.S. federal agents while vacationing in the Maldives.
Calling him "a leader in the marketplace for stolen credit card numbers," federal prosecutors added 11 new charges against a Russian man they say hacked into U.S. businesses to steal information that he allegedly sold on Internet "carding" sites.
New court documents released this week by the U.S. government in its case against the alleged ringleader of the Silk Road online black market and drug bazaar suggest that the feds may have some ‘splaining to do.
Four members of an international computer hacking ring have been charged with breaking into computer networks of prominent technology companies and the U.S. Army and stealing more than $100 million in intellectual property and other proprietary data.
The United States Supreme Court’s ruling in Riley v. US may not have been much of a surprise to American law enforcement. Many agencies were already requiring officers to obtain search warrants before searching mobile devices. Ultimately, rather than limiting law enforcement, the Riley decision frees agencies to deploy mobile data extraction capabilities across a much wider field of officers.
- Page 1