Advertisement
Legal Process
Subscribe to Legal Process

The Lead

Phyllis Schneck's job as deputy undersecretary for cybersecurity at the Department of Homeland Security should get a bit easier when President Obama, as expected, signs FISMA reform legislation that passed Congress this week.

DHS Wins in Congressional Cybersecurity Vote

December 12, 2014 11:25 am | by Eric Chabrow, Gov Info Security | News | Comments

Phyllis Schneck's job as deputy undersecretary for cybersecurity at the Department of Homeland Security should get a bit easier when President Obama, as expected, signs FISMA reform legislation that passed Congress this week.       

Pirate Bay Taken Down Again

December 10, 2014 10:44 am | by Kim Zetter, Wired | News | Comments

The popular file-sharing service Pirate Bay was taken down following a raid in Sweden by police...

5 Key Challenges for Keeping Up with Advancements in Mobile

December 10, 2014 10:24 am | by Lee Reiber | Articles | Comments

Not long ago, mobile device forensics was a relatively straightforward process. Contact lists,...

EC3 Head Paints Bleak Cybercrime Picture

December 8, 2014 10:39 am | by Editor | Blogs | Comments

Everyone has the right to privacy, said Troels Oerting, head of the Europol’s European...

View Sample

SUBSCRIBE TO FREE DFI News EMAIL NEWSLETTER

Dozens of Chinese Held in Kenyan Cybercrime Investigation

December 8, 2014 10:29 am | by Reuters | News | Comments

More than 70 Chinese nationals have been detained by Kenyan police investigating allegations of cyber crime, operating private radio services and being in the country illegally, their lawyers have said.             

The leader of the Justice Department's criminal division is expected to announce the creation of a new unit to prevent cybercrime and work alongside law enforcement, private sector companies and Congress.

Justice Department Plans New Cybercrime Team

December 4, 2014 12:55 pm | by Carrie Johnson, NPR | News | Comments

The leader of the Justice Department's criminal division is expected to announce the creation of a new unit to prevent cybercrime and work alongside law enforcement, private sector companies and Congress.             

A Turlock, California man who was the subject of a Homeland Security investigation involving a child pornography ring will be spending the next three decades behind bars.

Child Pornographer Gets 30-year Sentence

December 4, 2014 12:47 pm | by Sabra Stafford, Turlock Journal | News | Comments

A Turlock, California man who was the subject of a Homeland Security investigation involving a child pornography ring will be spending the next three decades behind bars.                       

Advertisement
The theft of trade secrets in U.S. businesses is increasing rapidly and is expected to double within the next decade, according to a recent report. These incidents and other suspicious behavior are the catalyst for lengthy, expensive forensic investigatio

Digital Forensics Can Use Facebook to Solve Cases

December 4, 2014 9:44 am | by Brett Harrison and Chad McDonnell, Baseline | News | Comments

The theft of trade secrets in U.S. businesses is increasing rapidly and is expected to double within the next decade, according to a recent report. These incidents and other suspicious behavior are the catalyst for lengthy, expensive forensic investigations. Digital forensic investigators will seek evidence from a wide array of devices and data sources, including mobile devices.

Newly discovered court documents from two federal criminal cases in New York and California that remain otherwise sealed suggest that the Department of Justice (DOJ) is pursuing an unusual legal strategy to compel cellphone makers to assist investigations

Gov Seeks Apple's Help with Encrypted Phones

December 1, 2014 11:26 am | by Cyrus Farivar, Ars Technica | News | Comments

Newly discovered court documents from two federal criminal cases in New York and California that remain otherwise sealed suggest that the Department of Justice (DOJ) is pursuing an unusual legal strategy to compel cellphone makers to assist investigations.

Ethical Decision Making

November 26, 2014 8:13 am | by Sean Harrington | Articles | Comments

Effective training in professional ethics doesn’t primarily consist of rote memorization of rules, but instead must prepare the examiner in the art of ethical issue spotting. Similarly, an effective code of ethics consists not only of certain static core principles, but also may consist of components that can be adapted over time to keep pace with the law and with professional norms.

Cell Phone Tracking via Call Detail Records

November 25, 2014 7:07 am | by Larry E. Daniel | Blogs | Comments

We live in a world today where individuals’ movements and locations are being recorded in many different ways. These movements and locations are commonly being used as evidence in civil, criminal, and domestic litigation. It is of paramount importance that anyone who is involved in litigation that uses cellular location evidence understands the appropriate and inappropriate use of this type of location data.

We live in a world today where individuals’ movements and locations are being recorded in many different ways. These movements and locations are commonly being used as evidence in civil, criminal and domestic litigation. It is of paramount importance that

Cell Phone Tracking via Call Detail Records

November 19, 2014 10:34 am | by Larry E. Daniel | Blogs | Comments

We live in a world today where individuals’ movements and locations are being recorded in many different ways. These movements and locations are commonly being used as evidence in civil, criminal and domestic litigation. It is of paramount importance that anyone who is involved in litigation that uses cellular location evidence understands the appropriate and inappropriate use of this type of location data.

Advertisement
The Senate on Tuesday blocked a bill to end bulk collection of Americans' phone records by the National Security Agency. The legislation would have ended the NSA's collection of domestic calling records, instead requiring the agency to obtain a court orde

Senate Blocks Shutdown of NSA Phone Records Collection

November 19, 2014 9:06 am | by Ken Dilanian, Associated Press | News | Comments

The Senate on Tuesday blocked a bill to end bulk collection of Americans' phone records by the National Security Agency. The legislation would have ended the NSA's collection of domestic calling records, instead requiring the agency to obtain a court order each time it wanted to analyze the records in terrorism cases, and query records held by the telephone companies.

Cocaine dealers, bank robbers and carjackers converge at Manchester Federal Prison in rural Kentucky — and then there is Jeremy Hammond, a tousle-haired and talented hacker whose nimble fingers have clicked and tapped their way into the nation's computing

FBI Breeched Hacktivist with His Own Weak Password

November 13, 2014 9:33 am | by Martha Mendoza, Associated Press | News | Comments

Cocaine dealers, bank robbers and carjackers converge at Manchester Federal Prison in rural Kentucky — and then there is Jeremy Hammond, a tousle-haired and talented hacker whose nimble fingers have clicked and tapped their way into the nation's computing systems. Once the FBI's most-wanted cyber criminal, Hammond is serving one of the longest sentences a U.S. hacker has received.

Most stories about child pornography focus on high-profile offenders such as priests and college professors or on attempts by victims to recover damages from offenders. Fewer stories focus on the people who voluntarily enter this world to catch the offend

Pa AG's Agents Wage Battle against Child Pornographers

November 12, 2014 10:34 am | by Brian Bowling, TribLive | News | Comments

Most stories about child pornography focus on high-profile offenders such as priests and college professors or on attempts by victims to recover damages from offenders. Fewer stories focus on the people who voluntarily enter this world to catch the offenders and save some of the victims. 

He reveled in tormenting members of the Bush family, Colin Powell and a   host of other prominent Americans, and also in outfoxing the F.B.I. and the   Secret Service, foiling their efforts to discover even his nationality, never   mind his identity. Earl

For Guccifer, Hacking Was Easy. Prison is Hard.

November 11, 2014 10:47 am | by Andrew Higgins, The New York Times | News | Comments

He reveled in tormenting members of the Bush family, Colin L. Powell and a host of other prominent Americans, and also in outfoxing the F.B.I. and the Secret Service, foiling their efforts to discover even his nationality, never mind his identity. Early this year, however, the elusive online outlaw known as Guccifer lost his cocky composure and began to panic.

It only took about one month from the time the Silk Road drug-dealing website   was busted for a successor to be created. Silk Road 2.0 took steps beyond   those of the first version of the website to remain anonymous, but those   steps weren't enough to

Silk Road 2.0 Had Someone Inside from the Start

November 7, 2014 11:33 am | by Joe Mullin, Ars Technica | News | Comments

It only took about one month from the time the Silk Road drug-dealing website was busted for a successor to be created. Silk Road 2.0 took steps beyond those of the first version of the website to remain anonymous, but those steps weren't enough to protect the site from old-fashioned human infiltration.

Advertisement
One of the founders of popular file-sharing website The Pirate Bay has been arrested under an Interpol warrant as he was crossing into Thailand from Laos, police said Tuesday.

Pirate Bay Co-founder Arrested at Thai-Lao Border

November 5, 2014 9:43 am | by Thanyarat Diksone, Associated Press | News | Comments

One of the founders of popular file-sharing website The Pirate Bay has been arrested under an Interpol warrant as he was crossing into Thailand from Laos, police said Tuesday.                     

A Virginia circuit court judge has ruled that smartphone users can be compelled to give up their fingerprint, but not their passcodes, allowing police to search their devices.

Va Police Can Now Force Smartphones to be Unlocked with a Fingerprint

November 3, 2014 8:53 am | by Zack Whittaker | Blogs | Comments

A Virginia circuit court judge has ruled that smartphone users can be compelled to give up their fingerprint, but not their passcodes, allowing police to search their devices.                     

A Danish court has sentenced the Swedish founder of file-sharing site The Pirate Bay to 3½ years in prison after he was found guilty of hacking into a private company handling sensitive information for Danish authorities.

Pirate Bay Founder Sentenced for Hacking Danish Data

October 31, 2014 10:45 am | by Associated Press | News | Comments

A Danish court has sentenced the Swedish founder of file-sharing site The Pirate Bay to 3½ years in prison after he was found guilty of hacking into a private company handling sensitive information for Danish authorities.        

While revelations from Edward Snowden about the National Security Agency’s massive database of phone records have sparked a national debate about its constitutionality, another secretive database has gone largely unnoticed and without scrutiny.

Va Police Agencies Stockpile Private Phone Records

October 27, 2014 11:20 am | by G.W. Schulz, The Center for Investigative Reporting | News | Comments

While revelations from Edward Snowden about the National Security Agency’s massive database of phone records have sparked a national debate about its constitutionality, another secretive database has gone largely unnoticed and without scrutiny.

The head of a sophisticated cybercrime ring which stole over $9 million from payment processor Worldpay back in 2008 has been sentenced to a hefty 11 years behind bars.

Estonian Ringleader Gets 11 Years for ATM Hack

October 27, 2014 10:56 am | by Infosecurity Magazine | News | Comments

The head of a sophisticated cybercrime ring which stole over $9 million from payment processor Worldpay back in 2008 has been sentenced to a hefty 11 years behind bars.                        

Contact Opposing Counsel After Inadvertent Disclosure

October 24, 2014 9:53 am | by Joshua Gilliland, Esq. | Blogs | Comments

What happens when a lawyer inadvertently produces an attorney protected by the attorney-client privilege? A Magistrate Judges and District Court Judge orders the receiving party to destroy the inadvertently produced email.  

Can You Ask the Court to Order a Party to Follow the Duty to Preserve?

October 21, 2014 8:52 am | by Joshua Gilliland, Esq. | Blogs | Comments

There are no shortage of cases where the duty to preserve has gotten attorneys and parties a like in trouble. However, it is difficult to ask a Court to order a party to “follow the rules,” because the party already has a duty to so. However, if there is evidence of wrongdoing by the party that was subject to the duty to preserve, the outcome could be different.

The U.S. Justice Department has piled on more charges against alleged cybercrime kingpin Roman Seleznev, a Russian national who made headlines in July when it emerged that he’d been whisked away to Guam by U.S. federal agents while vacationing in the Mald

Seleznev Arrest Explains '2Pac' Downtime

October 16, 2014 11:03 am | by Editor | Blogs | Comments

The U.S. Justice Department has piled on more charges against alleged cybercrime kingpin Roman Seleznev, a Russian national who made headlines in July when it emerged that he’d been whisked away to Guam by U.S. federal agents while vacationing in the Maldives.

Calling him "a leader in the marketplace for stolen credit card numbers," federal prosecutors added 11 new charges against a Russian man they say hacked into U.S. businesses to steal information that he allegedly sold on Internet "carding" sites.

Russian Hacker Gets More Charges Added to Indictment

October 10, 2014 9:37 am | by Martha Bellisle, Associated Press | News | Comments

Calling him "a leader in the marketplace for stolen credit card numbers," federal prosecutors added 11 new charges against a Russian man they say hacked into U.S. businesses to steal information that he allegedly sold on Internet "carding" sites.

New court documents released this week by the U.S. government in its case against the alleged ringleader of the Silk Road online black market and drug bazaar suggest that the feds may have some ‘splaining to do.

Silk Road Lawyers Poke Holes in FBI's Story

October 3, 2014 9:28 am | by Editor | Blogs | Comments

New court documents released this week by the U.S. government in its case against the alleged ringleader of the Silk Road online black market and drug bazaar suggest that the feds may have some ‘splaining to do.           

Four members of an international computer hacking ring have been charged with breaking into computer networks of prominent technology companies and the U.S. Army and stealing more than $100 million in intellectual property and other proprietary data.

Four Hackers Indicted for Stealing Gaming Technology, Army Software

October 1, 2014 9:41 am | by DoJ | News | Comments

Four members of an international computer hacking ring have been charged with breaking into computer networks of prominent technology companies and the U.S. Army and stealing more than $100 million in intellectual property and other proprietary data.

The United States Supreme Court’s ruling in Riley v. US may not have been much of a surprise to American law enforcement. Many agencies were already requiring officers to obtain search warrants before searching mobile devices. Ultimately, rather than limi

Mobile Device Search and Seizure in a Post-Riley World

October 1, 2014 8:26 am | by Christa Miller | Cellebrite USA, Inc. | Articles | Comments

The United States Supreme Court’s ruling in Riley v. US may not have been much of a surprise to American law enforcement. Many agencies were already requiring officers to obtain search warrants before searching mobile devices. Ultimately, rather than limiting law enforcement, the Riley decision frees agencies to deploy mobile data extraction capabilities across a much wider field of officers.

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading