Federal Bureau of Investigation

News & Analysis as of

How to Protect and Secure Your Connected Devices

The Federal Bureau of Investigation is warning companies and the public to be aware of vulnerabilities that cybercriminals could exploit in connected devices, otherwise known as Internet of Things devices....more

Expect Focus – International, Summer 2015

In This Issue: - TTIP’s Impact on U.S. and EU Trade Relations - Proposed Innovation Box Legislation - Justice Department Recovers Nearly $6 Billion From False Claims Act Cases in 2014 - Rules...more

Don’t Get Locked Out: Is Ransomware a Threat to Your Business?

Ransomware is a type of malware that locks access to a computer and its drives. Many forms of ransomware take complete control of the computer system, encrypt all of the files, and deny access to the system and any files...more

Crime Doesn’t Pay (as much as it used to) – FBI Cracks Down on Trade of Looted Syrian and Iraqi Cultural Artifacts

In support of the international crackdown on the black market trade of looted cultural artifacts, the FBI recently announced that art dealers may be prosecuted for engaging in the trade of stolen Iraqi and Syrian antiquities....more

Reflections on the Hitachi FCPA Enforcement Action

Earlier this week, the Securities and Exchange Commission (SEC) announced resolution of a Foreign Corrupt Practices Act (FCPA) enforcement action involving the Hitachi Ltd (Hitachi). There were several interesting aspects to...more

OPM admits 5.6 million fingerprints stolen during breach

The Office of Personnel Management (OPM) reported yesterday that fingerprint data stolen during the breach of almost 22 million Americans’ data is estimated to be 5.6 million instead of the original estimate of 1.1 million....more

DOJ’s first prosecution for campaign finance coordination — a sign of things to come?

With the 2016 presidential campaign in full swing, pundits, reformers and the media are once again shining a light on the role of independent-expenditure-only committees, aka “super PACs,” in the American political process....more

Religious Institutions: September 2015

Respondeat superior (literally, "let the master answer" in Latin) is a doctrine that applies when an employer or principal has the ability and authority to direct and control the pertinent acts of the employee. Put otherwise,...more

New York v. Aleynikov: New York State’s Penal Code (Like Federal Criminal Law) Does Not Cover Electronic Reproduction of Source...

In 2009, Sergey Aleynikov was a computer programmer employed by Goldman Sachs to write high-frequency trading code. He accepted an offer to join a new Chicago-based company, Teza Technologies. Before he left Goldman Sachs,...more

DOJ Focuses on Individuals in Corporate Wrongdoing

United States Deputy Attorney General Sally Q. Yates issued a September 9 memo directing increased focus on individual culpability in matters of corporate wrongdoing. The memo highlights six policy directives – some existing,...more

Hackers Continue to Perpetrate Wire Transfer Fraud Scams on a Global Scale

An increasing number of businesses continue to be targeted by very sophisticated email scams designed to convince company employees responsible for executing financial transactions to wire funds to overseas accounts...more

Highway 61 Revisited Week – Highway 61 and IRS Involvement in FCPA Enforcement

One of the most difficult stories of the Bible for me was always that of God and Abraham. But somehow this song explained it for me as it deals with some unusual problems that can be solved out on Highway 61, which is a...more

Business E-mail Compromise Scam v2.0

In March, we reported on the Business E-mail Compromise (BEC) scam where criminals target employees responsible for wiring company money, and trick them into wiring money under false pretenses to fraudulent accounts...more

Business E-mail Compromise Scam v2.0

In March, we reported on the Business E-mail Compromise (BEC) scam where criminals target employees responsible for wiring company money, and trick them into wiring money under false pretenses to fraudulent accounts...more

Throwback Thursday: Why Trade Secret Theft Isn’t Just a Digital Problem And What Businesses Can Do About It

With stories of cyberattacks and data breaches on a seemingly endless loop, businesses and governments have been doubling down on their efforts to protect digital information and assets.  But, in some industries, the greatest...more

Cybersecurity as a Regulatory Issue: The NAIC Considers The Anthem Breach And Weighs a “Cybersecurity Bill of Rights”

The Cybersecurity Task Force of the National Association of Insurance Commissioners (the “NAIC”) met last month, as part of on the NAIC’s 2015 Summer National Meeting in Chicago. The Task Force focused on two issues: the...more

Red Notice Newsletter - August 2015

Welcome to the August 2015 edition of Red Notice, a publication of Akin Gump Strauss Hauer & Feld LLP. This month on the anticorruption front, the U.S. Department of Justice (DOJ) and the U.S. Securities and Exchange...more

When the Government Comes Knocking

This article will provide an outline of some of the most significant points for hospitals to use when confronted with a formal government investigation under the Criminal or Civil False Claims Act. As noted below, you should...more

Data Detecting Dogs: The FBI’s Newest Tool in Fighting Cyber-Crime

The FBI’s latest weapon in locating electronic evidence is not a computer program, it’s a dog.  The FBI is using data-sniffing dogs in raids to cut down on the time it takes agents to locate small hidden data storage devices....more

Florida Nursing Home Pays Record Settlement to Resolve Federal Anti-Kickback Case

In a recent case Hebrew Homes Health Network, Inc. and its former president and executive Director agreed to pay $17 million to settle allegations that Hebrew Homes violated the federal anti-kickback statute. According to the...more

The Justice Department Has Some Things to Tell You about Cybersecurity

In April the Justice Department’s Computer Crime and Intellectual Property Section issued its Best Practices for Victim Response and Reporting of Cyber Incidents. It is an excellent guide for a business organization to...more

The Fifth Letter and Expansion of the Brazilian Corruption Scandal into the Private Sector

I recently received a review copy of the book The Fifth Letter by fellow University of Michigan grad Vivian L. Carpenter. It is a rollicking good read which touches on areas of constitutional law, inalienable rights in the...more

Does Sharing Work Product with the Government Always Waive that Protection?

For decades, companies trying to cooperate with the government have hoped for a change in the general rule that disclosing privileged communications and/or work product to the government waives those protections. In nearly...more

DOJ Announces Charges Against Two Florida Men for Operating Underground Bitcoin Exchange

On July 21, U.S. Attorney for the Southern District of New York Preet Bharara, along with the Assistant Director-in-Charge of the New York Field Office of the FBI and the Special Agent-in-Charge of the New York Field Office...more

Bitcoin Week in Review 07.20.15 – 07.24.15

Domestic Developments - Florida. Anthony Murgio and Yuri Lebedev, operators of bitcoin exchange service Coin.mx were arrested on July 21, 2015 for operating the exchange without a money transmission license. The U.S....more

127 Results
View per page
Page: of 6

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.