We live in a world today where individuals’ movements and locations are being recorded in many different ways. These movements and locations are commonly being used as evidence in civil, criminal and domestic litigation. It is of paramount importance that anyone who is involved in litigation that uses cellular location evidence understands the appropriate and inappropriate use of this type of location data.
The Senate on Tuesday blocked a bill to end bulk collection of Americans' phone records by the...
Cocaine dealers, bank robbers and carjackers converge at Manchester Federal Prison in rural...
Most stories about child pornography focus on high-profile offenders such as priests and...
He reveled in tormenting members of the Bush family, Colin L. Powell and a host of other prominent Americans, and also in outfoxing the F.B.I. and the Secret Service, foiling their efforts to discover even his nationality, never mind his identity. Early this year, however, the elusive online outlaw known as Guccifer lost his cocky composure and began to panic.
It only took about one month from the time the Silk Road drug-dealing website was busted for a successor to be created. Silk Road 2.0 took steps beyond those of the first version of the website to remain anonymous, but those steps weren't enough to protect the site from old-fashioned human infiltration.
One of the founders of popular file-sharing website The Pirate Bay has been arrested under an Interpol warrant as he was crossing into Thailand from Laos, police said Tuesday.
A Virginia circuit court judge has ruled that smartphone users can be compelled to give up their fingerprint, but not their passcodes, allowing police to search their devices.
A Danish court has sentenced the Swedish founder of file-sharing site The Pirate Bay to 3½ years in prison after he was found guilty of hacking into a private company handling sensitive information for Danish authorities.
While revelations from Edward Snowden about the National Security Agency’s massive database of phone records have sparked a national debate about its constitutionality, another secretive database has gone largely unnoticed and without scrutiny.
The head of a sophisticated cybercrime ring which stole over $9 million from payment processor Worldpay back in 2008 has been sentenced to a hefty 11 years behind bars.
What happens when a lawyer inadvertently produces an attorney protected by the attorney-client privilege? A Magistrate Judges and District Court Judge orders the receiving party to destroy the inadvertently produced email.
There are no shortage of cases where the duty to preserve has gotten attorneys and parties a like in trouble. However, it is difficult to ask a Court to order a party to “follow the rules,” because the party already has a duty to so. However, if there is evidence of wrongdoing by the party that was subject to the duty to preserve, the outcome could be different.
The U.S. Justice Department has piled on more charges against alleged cybercrime kingpin Roman Seleznev, a Russian national who made headlines in July when it emerged that he’d been whisked away to Guam by U.S. federal agents while vacationing in the Maldives.
Calling him "a leader in the marketplace for stolen credit card numbers," federal prosecutors added 11 new charges against a Russian man they say hacked into U.S. businesses to steal information that he allegedly sold on Internet "carding" sites.
New court documents released this week by the U.S. government in its case against the alleged ringleader of the Silk Road online black market and drug bazaar suggest that the feds may have some ‘splaining to do.
Four members of an international computer hacking ring have been charged with breaking into computer networks of prominent technology companies and the U.S. Army and stealing more than $100 million in intellectual property and other proprietary data.
The United States Supreme Court’s ruling in Riley v. US may not have been much of a surprise to American law enforcement. Many agencies were already requiring officers to obtain search warrants before searching mobile devices. Ultimately, rather than limiting law enforcement, the Riley decision frees agencies to deploy mobile data extraction capabilities across a much wider field of officers.
A Pakistani man has been indicted in the Eastern District of Virginia for allegedly conspiring to advertise and sell StealthGenie, a spyware application (app) that could monitor calls, texts, videos and other communications on mobile phones without detection. This marks the first-ever criminal case concerning the advertisement and sale of a mobile device spyware app.
FBI Director James B. Comey sharply criticized Apple and Google recently for developing forms of smartphone encryption so secure that law enforcement officials cannot easily gain access to information stored on the devices — even when they have valid search warrants.
State v. Brown is a pending criminal case in Essex County, New Jersey involving allegations that the defendant tweeted a nude video of his former girlfriend. The defendant is charged with two counts of invasion of privacy for allegedly covertly videotaping the woman as she got ready to take a shower.
It goes without saying that the expert will understand the scientific basis of the testing that was done. However, even the most educated and experienced persons have gaps in their knowledge and experience. In most cases, what you don’t know will have no effect on the outcome of a trial.
When it comes to metadata as part of a litigation strategy, we mostly see it used as supporting information about the data. It is unusual, but not unheard of, to see metadata used directly as evidence. That is likely to change as more people understand the role metadata can have in developing legal strategy. With proper forensic analysis, metadata can help highlight patterns, establish timelines, and point to gaps in the data.
The US Department of Justice (DOJ) is proposing a power grab that would make it easier for domestic law enforcement to break into computers of people trying to protect their anonymity via Tor or other anonymizing technologies.
In many cases, the American judicial system doesn’t view an encrypted phone as an insurmountable privacy protection for those accused of a crime. Instead, it’s seen as an obstruction of the evidence-gathering process, and a stubborn defendant or witness can be held in contempt of court and jailed for failing to unlock a phone to provide that evidence.
Philippine authorities arrested 43 suspected members of a syndicate that runs a lucrative online cybersex operation catering to clients worldwide, officials said Thursday.
A federal appeals court said the US Navy's scanning of the public's computers for images of child pornography constituted "a profound lack of regard for the important limitations on the role of the military in our civilian society."
US government requests for access to Dropbox user content and account details rose in line with subscriber numbers over the first half of 2014, but several of the accounts requested didn’t actually exist, according to the firm.
Home improvement retailer Home Depot Inc (HD.N) has been sued over data breach by a customer, saying the company failed to properly safeguard customer data from hackers, a lawsuit filed in a Chicago federal court showed on Tuesday.
- Page 1