Criminal Law Science, Computers & Technology

Read Criminal Law updates, alerts, news, and legal analysis from leading lawyers and law firms:
News & Analysis as of

“Hacking” Warrants: A Question of Procedure or Substance?

Typically, the process for amending the Federal Rules of Criminal Procedure is a sleepy affair. Proposed amendments wend their way through a series of judicial committees and, if approved by the Supreme Court, take effect...more

Safe or Good? We All Have Choices to Make

I planned to write about the inspired, better-than-sliced-bread security option of using fingerprint authentication to protect our mobile devices. That imploded. In 2014, and earlier this year, courts in Virginia and...more

Also In the News - Data, Privacy, & Security Practice Report - May 2016 #2

K&S Client Alert: Third Try Is A Charm: Defend Trade Secrets Act Of 2015 Enacted Into Law—For the third consecutive year, Congress introduced legislation to create a federal civil cause of action for trade secret...more

An Addendum to the Scariest Hack So Far

Andy Johnson-Laird, President of Johnson-Laird, Inc., was kind enough to offer advice on three security techniques he recommends to detect and deny hackers, such as those we discussed in last week’s blog post....more

The Supreme Court - May 2016 #2

The Supreme Court of the United States issued decisions in six cases today: Spokeo, Inc. v. Robins, No. 13-1339: The Fair Credit Reporting Act of 1970 (“FCRA”) imposes a number of requirements regarding the creation and...more

ATM Skimmer pleads guilty in Rhode Island federal court

Skimming continues to be a problem for ATM machines and law enforcement continues to try to combat the problem. Skimming devices are attached to credit and debit card and ATM machines in order to intercept debit and credit...more

European Commission Publishes Proposal for Signing the EU-U.S. Umbrella Agreement

The EU-U.S. data protection Umbrella Agreement consists of a framework of principles and safeguards for trans-Atlantic transfers of personal data (such as criminal records, names and addresses) in relation to the prevention,...more

Sentencing of Keys, Responsible for 2010 LA Times Data Breach, Should Remind Companies to Fortify Cybersecurity and Plan Response...

A federal judge in California recently sentenced a former employee of KTXL Fox40, a Tribune Company-owned television station, to two years in prison for three felony convictions relating to his assistance to the “hacktivist”...more

Supreme Court Eases Limits On U.S. Government Hacking Authority

On April 28, 2016, the U.S. Supreme Court approved amendments to Rule 41 of the Federal Rules of Criminal Procedure that would allow federal judges to issue search warrants granting remote access to electronic devices outside...more

The Scariest Hack So Far

Hackers have upped the ante. Data controllers wax fondly about the good old days when data was outright stolen. Back then, in 2013, there was a sense of fair play. Trolls did troll things. Assuming the victim implemented and...more

The Proof Is in the Password!

Consider this scenario: A young couple entrusts you, an experienced real estate attorney, to assist them in the purchase of their first home. Days before closing, your unsecured email account gets hacked and your client...more

When Attorneys General Attack: Cybersecurity Investigations and Related Insurance Coverage Issues

Are criminal cyberattacks increasing in sophistication and frequency? Yes. Is every company, in every industry, that collects or stores sensitive customer, employee, or business data vulnerable to cyberattacks?...more

The Supreme Court - May 2016

The Supreme Court of the United States issued one decision on May 2, 2016: Ocasio v. United States, No. 14-361: Petitioner Samuel Ocasio, a former police officer, was tried and convicted under the Hobbs Act for...more

U.S. Supreme Court Proposes Change to Rules Applicable to Searches of Electronic Data

The United States Supreme Court — which establishes rules of civil and criminal procedure, subject to the objection of Congress — has proposed a significant amendment to the rules applicable to searches of electronic data...more

Hackers responsible for ruthless SpyEye Trojan sentenced to 24 1/2 years

The Department of Justice has announced that two hackers who built and sold the Trojan called SpyEye, that caused close to $1 billion in banking losses, have been sentenced for a combined 24 1/2 years in federal court in...more

In Case You Missed It: Launch Links - April 2016 #4

Some interesting links we found across the web this week: - House of Representatives approves bill requiring warrants for email searches - It was a productive week on the Hill, as the House passed the Email...more

Feds Open The Gates and Seize the Domain Names

Does the federal government have the right to seize a domain name without notice? With growing frequency, the feds have seized the domain names of thousands of websites for alleged criminal wrongdoing. The latest example is...more

FireEye report shows PoS attacks have compromised more than 20 million cards

FireEye recently issued a report that indicates that bank card data of over 20 million individuals has been compromised since 2014. According to the report, point of sale attacks that have affected the retail and hospitality...more

Expectations of Privacy: Location Matters

Sometimes law enforcement needs a warrant to access cellphone data, sometimes a court order. Sometimes nothing is required. Roaming while you roam. Depending on where you use your cell phone, law enforcement may...more

Need to Decrypt an iPhone? There’s an “Act” for That

A pair of recent cases pitted the U.S. Department of Justice (DOJ) against Apple, Inc. (Apple) in a Herculean struggle between asserted interests in national security and privacy. In both cases, the DOJ relied on the same...more

Federal Appeals Court Set to Issue One of the Most Important Privacy Rulings in a Generation

For months, the technology and business communities have been waiting anxiously for a Federal appeals court ruling on whether American companies can be forced to turn over customer information to U.S. law enforcement when...more

How to Avoid or Respond to Wire Transfer Fraud

Businesses are increasingly falling victim to wire fraud scams – sometimes referred to as “man-in-the-email” or “business email compromise” scams. Although there are multiple variants, a common situation involves an attacker...more

Expanding Horizons: Drone Regulations from a Prosecutorial Perspective

BB&K attorney Jordan Ferguson writes about the criminal side of drones for the California District Attorneys Association’s Prosecutor’s Brief. Over the next few years, the skies are likely to get much more crowded....more

Body-Worn Cameras, the Prosecutor, and the Question of Public Access

BB&K attorney Gary Schons examines police body cameras from a variety of angles for the California District Attorneys Association’s Prosecutor’s Brief. The use of body-worn cameras by law enforcement officials and what...more

Lessons from the Bangladesh Central Bank Heist

By now, you’ve probably heard about the massive cyber attack that hit Bangladesh’s central bank last month, resulting in the loss of $81 million through fraudulent transfers to accounts in the Philippines. Although the size...more

1,143 Results
|
View per page
Page: of 46

Follow Criminal Law Updates on:

JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×