Criminal Law Privacy

Read Criminal Law updates, alerts, news, and legal analysis from leading lawyers and law firms:
News & Analysis as of

FireEye report shows PoS attacks have compromised more than 20 million cards

FireEye recently issued a report that indicates that bank card data of over 20 million individuals has been compromised since 2014. According to the report, point of sale attacks that have affected the retail and hospitality...more

Florida Law Mandates Police Body Camera Policies—Then Lets Agencies Fend for Themselves

Police body cameras are the hot new item on the procurement “wish lists” of law enforcement agencies at all levels of government. Following well-publicized police encounters with citizens throughout the United States,...more

Expectations of Privacy: Location Matters

Sometimes law enforcement needs a warrant to access cellphone data, sometimes a court order. Sometimes nothing is required. Roaming while you roam. Depending on where you use your cell phone, law enforcement may...more

Are Changes in Store for the Stored Communications Act?

Last week saw action on two fronts regarding the Stored Communications Act (SCA) – the US federal statute regulating government searches of online accounts in criminal investigations. In Congress, a proposal to reform the SCA...more

Need to Decrypt an iPhone? There’s an “Act” for That

A pair of recent cases pitted the U.S. Department of Justice (DOJ) against Apple, Inc. (Apple) in a Herculean struggle between asserted interests in national security and privacy. In both cases, the DOJ relied on the same...more

Expanding Horizons: Drone Regulations from a Prosecutorial Perspective

BB&K attorney Jordan Ferguson writes about the criminal side of drones for the California District Attorneys Association’s Prosecutor’s Brief. Over the next few years, the skies are likely to get much more crowded....more

Phishing Season Opens for 2016 Tax Filings – Beware of “W-2 Phishing Scams”

Tax season brings many headaches, but none as miserable as sophisticated scammer efforts to steal employee W-2 information. Using social engineering and modest technological tools, a “spear phishing” attack seeks to trick...more

Chinese national hacker pleads guilty to sending U.S. military data to China

The FBI and DOJ continue their effort to bring cyber hackers to justice. Last week, Chinese national Su Bin pled guilty to stealing data related to Boeing’s C-17 military cargo plane and of trying to steal information...more

The Panama Papers & The Tempo of International Corruption Cases  [Video]

An interview on CNBC Powerlunch (April 4th, 2016) where I discuss the implications of the recent Panama Papers leaks. What does this mean for the future of tax havens? Also, will be the appetite for local enforcement in those...more

Practical Tips to Avoid Being Caught in an IRS Phishing Trap

As a follow-up to our recent discussion of IRS-related phishing attempts, here are a few quick tips to stay out of the phishing traps: ..In general, the IRS does not communicate with taxpayers via e-mail, so any time...more

Cyber prosecutions update

The feds have been busy on the cyber prosecutions front. First, on March 18, 2016, the FBI announced that a multi-agency collaborative effort blew up an identity theft ring whose leader was an inmate in a Georgia prison. The...more

Chinese National Pleads Guilty To Conspiracy To Commit Cyber Theft Of Export-Controlled Technology

On March 23, 2016, U.S. law enforcement authorities announced that Su Bin, a citizen of the People's Republic of China and a resident of Canada, pleaded guilty to conspiracy to violate the Arms Export Control Act, the...more

Seventh Circuit Eliminates “Consent Once Removed” Doctrine

If a business invites an employee, customer, or business associate onto its premises, has it consented to a search by government agents? Under the “consent once removed” doctrine, the answer may be yes if the invited...more

Ninth Circuit Addresses Probationers’ Cell Phone Searches by Police

The centrality of cell phones to our daily lives, and the wide array of sensitive information those phones may carry, creates a complex and ever-evolving series of issues over the amount of privacy we can expect to be...more

iWon’t: Apple’s Face-Off with the DOJ

In what is quickly becoming one of the closest-watched cases in the country, Apple is now at loggerheads with the Department of Justice and FBI over its refusal to unlock the iPhone of one of the San Bernardino shooters....more

National Debate on Digital Privacy Shows No Signs of Slowing

The Justice Department’s dispute with Apple related to encryption on the iPhone used by one of the San Bernardino shooters has reinvigorated the national debate on digital privacy. Though it is not clear how the California...more

Apple vs. FBI: The House Judiciary Committee Hearing and Takeaways

Among the major headlines dominating not only the recent news cycle, but also this week’s RSA Conference in San Francisco, has been Apple’s challenge to the federal government’s request that Apple assist in unlocking the...more

Rival Court Decisions Reflect Shifting Views on Privacy in Public

With the spotlight on one high-profile battle that pits privacy rights against public safety interests, another crucial, similar dispute is making its way through the courts. How to evaluate new technology and its potential...more

Should Apple Always Have a Key to All iPhone Data? To Some iPhone Data?

On February 16, 2016, U.S. Magistrate Judge Sheri Pym of the U.S. District Court for the Central District of California issued an Order under the All Writs Act directing Apple Inc. to cooperate with efforts by the Federal...more

Police Make iPhone Public Enemy No. 1

FBI Director James Comey took a rare break from the posturing typical of investigators and prosecutors in the current showdown between Apple and the FBI. While prosecutors argue that Apple’s privacy concerns are a smokescreen...more

Apple vs. FBI- What’s Really at Stake?

The Apple vs. FBi case has sparked fireworks in recent days and for good reason. The FBI is relying on a 227-year-old statute called the All Writs Act to support its request for Apple to hack the San Bernadino iPhone that...more

Backdooring Investment Security (On the Apple Case)

There's lots of talk about information security with the Apple case. But, perhaps just as important, the case also raises important concerns relating to investment security and to the predictability of our markets and laws. ...more

U.S. v. Microsoft – What you need to know about one of the most important privacy cases of the decade

The U.S. Court of Appeals for the Second Circuit has in its hands one of the most closely-watched privacy cases in recent memory. U.S. v. Microsoft addresses an issue of critical importance to U.S. businesses — whether...more

FBI Recruits Apple to Help Unlock Your iPhone

It is a well-known maxim that “bad facts make bad law.” And as anybody even casually browsing social media this week likely has seen, the incredibly tragic facts surrounding the San Bernadino attacks last December have led...more

FBI v Apple: Using a 1789 Law in a 21st Century Privacy Fight

Earlier this week Apple CEO Tim Cook announced to Apple customers that the company would oppose a federal court order (the “Order”) issued on February 16, 2016 that the company believes “threatens the security of our...more

741 Results
|
View per page
Page: of 30

Follow Criminal Law Updates on:

JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×