The FBI on Economic Espionage
The Justice Insiders Podcast: Varsity Blues Reversals Turn DOJ Red
[Podcast] Cyber Spotlight: Wiley Tackles White House’s National Cybersecurity Strategy and Other Developments
No Password Required: An FBI Special Agent's Journey from Submarines to Anti-Corruption to Cybersecurity
The New Cold War: Risk, Sanctions, Compliance Episode 23: "Former FBI Acting Director Andrew McCabe”
The Latest from the DOJ Antitrust Division
The Presumption of Innocence Podcast: Episode 7 - Investigative Insights: A Conversation with a Former FBI Agent
DE Under 3: OFCCP AAP Verification Portal 'Rules of Behavior', Vaccination Injunction Updates, & Recent Job Scam Alerts
Cybersecurity: Headlines, Best Practices and Its Evolving Role
Digging Deeper, Episode 1: The Con Queen of Hollywood
Devil in the Details: Gilbert King on Truth and Transparency in the Judicial Process
Compliance Perspectives: The FBI on Why and How to Work with the Office of the Private Sector
This Week in FCPA-Episode 54, the Rubber Match Edition
As we wrote in a note back in December 2020, the border search exception to the Fourth Amendment is a powerful investigative tool relied on by law enforcement to gather critical physical and digital evidence because it allows...more
The headlines scream: “FBI made 3.4M warrantless U.S. data searches,” claiming that the FBI carried out nearly 3.4 million warrantless searches of Americans’ electronic data that was collected as part of the government’s...more
Several federal agencies rely on search warrants to gather evidence in support of their law enforcement efforts. If you have received a search warrant from the Federal Bureau of Investigation (FBI), Drug Enforcement...more
Eliminating the risk of business email compromise (BEC) attacks requires all parties to a financial transaction to pay close attention to email security, financial controls, and communication protocols. Key Points: ...more
The Ninth Circuit recently heard an appeal that challenges a common tool of law enforcement: “f” letters. Under section 2703(f) of the Stored Communications Act, law enforcement may compel providers of “electronic...more
For most of us, the concept of facial recognition – like so much technology of the last decade – began as a sci-fi detail we accepted on the big screen but didn’t give much thought to in our day-to-day lives. Then one day,...more
With 2019 just upon us, it is a great time to look back on last year’s most influential eDiscovery cases. Part three of this four-part series discusses impactful decisions concerning search and retrieval....more
The rules defining privacy rights in the digital ether just became more complicated – and many didn’t believe that was possible. In a decision issued late Friday by a federal magistrate in Philadelphia, Google Inc. was...more
After the terrorist attack in Orlando, Florida, early this month, the Electronic Communications Privacy Act (ECPA) has been discussed quite a bit. The ECPA, a law which took effect in 1986, limits the government’s access to...more
Some interesting links we found across the web this week: - House of Representatives approves bill requiring warrants for email searches - It was a productive week on the Hill, as the House passed the Email...more
Apple must help the FBI unlock an iPhone used by one of the attackers in the San Bernardino, Calif. assault in December, a federal magistrate judge ruled this week. The ruling handed the government an important victory in an...more