The Presumption of Innocence Podcast: Episode 62 - The Tragic Toll of Conspiracy Theories: The Seth Rich Story
SBR-Author’s Podcast: The Unseen Life of an Undercover Agent: A Conversation with Charlie Spillers
Podcast - "Ready for Trial?"
Podcast - The Law as a Force for Change
The JustPod: A Discussion with Defense Counsel Rocco Cipparone and Angie Levy on January 6 Prosecutions
False Claims Act Insights - Trump DOJ Sharpens Its Focus on Healthcare Fraud
The JustPod: A murder-for-hire allegation, public corruption trial, and notable acquittal
Podcast - Every Case Is a New World
Brooklyn District Attorney Eric Gonzalez – Innovative Approach to Safety
The JustPod: The State of Prosecutorial Independence and Prosecutorial Discretion
Bar Exam Toolbox Podcast Episode 308: Listen and Learn -- Crimes Against the Person (Part 2)
The JustPod: Lawyer, Gentleman, and Counsel to the Stars: A Discussion with Brian McMonagle
Criminal Health Care Fraud Enforcement: Projections for 2025 and Beyond – Diagnosing Health Care Video Podcast
An Ounce of Prevention Podcast | Preparing for the UK Failure to Prevent Fraud Offence
The JustPod: The King of Cross: A Discussion with Larry Pozner, a Leading Expert on Cross-Examination
There Is No Right Path
The JustPod: The Murder of a Wonderful Law School Professor, and Our Discussion with his Mother, Ruth Markel: In Memory of Professor Dan Markel
The Presumption of Innocence Podcast: Episode 57 - Wired for Truth: The Art & Science of Polygraphs
Against All Odds- Part Four
Against All Odds- Part Two
What happens when online harassment crosses the digital divide? For a decade, the practice of swatting has been on the rise, and featured in news stories the world over. Swatting is a weaponized form of harassment that turns...more
Unfortunately, I’ve had unpleasant dealings with the Phobos ransomware group. My interactions with Phobos have been fodder for a good story when I educate client employees on recent cyber-attacks to prevent them from becoming...more
Five individuals who are alleged to be members of the Scattered Spider cybercrime group have been charged with multiple crimes after a federal investigation into an advanced social engineering attacks that targeted at least...more
The recent indictment of Maksim Silnikau, a Belarusian and Ukrainian national, is a clear reminder that cybercriminals are becoming more sophisticated and bold....more
Join Warner Norcross + Judd LLP attorneys Madelaine Lane, Kelly Hollingsworth and Nate Steed for a webinar focused on preventing and mitigating wire transfer fraud. Cyber criminals are utilizing phishing emails and other...more
On October 5, 2022, a federal jury found Joseph Sullivan, Uber’s former chief security officer, guilty of obstruction of justice and misprision of a felony in connection with his role in responding to a 2016 data breach...more
Takeaway: The DOJ’s recent revisions to their internal policy promote the Department’s goals that the CFAA is applied consistently by government attorneys and better understood by the public. These goals ensure that the law...more
In a significant development in anti-hacking criminal enforcement, the Department of Justice last week released new guidance for charging violations of the Computer Fraud and Abuse Act (“CFAA”), the nation’s premier computer...more
The Justice Department continues to attack and dismantle global ransomware extortion organizations. Business surveys often confirm that executives are hyper-focused on the risk of ransomware attacks against businesses....more
Cybercrime has been on the rise in recent years. In response, the federal government has shown an increased interest in prosecuting cybercrime offenses. The Computer Fraud and Abuse Act, codified at 18 U.S.C. Section 1030, is...more
Last week, the Department of Justice (“DOJ”) announced the launch of its Civil Cyber-Fraud Initiative (“the Initiative”) aimed at combating “new and emerging cyber threats to the security of sensitive information and critical...more
The Computer Fraud and Abuse Act (CFAA), codified at 18 U.S.C. Section 1030, is one of the U.S. Department of Justice’s most potent weapons in its fight against cybercrimes. It outlines numerous offenses, and it imposes...more
Organization Excels at Niche Branding but Stumbles in Avoiding Enforcement - The first paragraph of the press release sums it up: Today the U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) took action...more
On March 27, 2019, the German Federal Ministry of the Interior (GMI) proposed a new bill (the "Draft Bill") for a so-called IT Security Act 2.0 (IT-SiG 2.0). In an effort to take a front-runner role in Europe, Germany has...more
The fallout from the Yahoo data breaches continues to illustrate how cyberattacks thrust companies into the competing roles of crime victim, regulatory enforcement target and civil litigant. ...more
The United States Department of Justice (“DOJ”) recently indicted thirty-six individuals leading a global cybercrime ring for allegedly trafficking in stolen personal and financial information....more
An Alabama man has been sentenced to spend six months in prison for illegally accessing the personal information of over fifty women. For over two years, Kevin Maldonado engaged in a hacking technique called “phishing,”...more
The Supreme Court in Shaw v. United States recently held that the federal bank fraud statute does not require that defendants cause, or intend to cause, an actual financial loss to the financial institutions they seek to...more
On October 7, 2015, former Tribune Company employee Matthew Keys was convicted of three felonies stemming in part from assistance he provided to the hacking collective Anonymous to alter content on the LA Times’ website. ...more
The Department of Justice (DOJ) recently announced the largest coordinated international law enforcement effort ever directed at an online cyber-criminal forum. Financial institutions and other companies should consider...more
Last week, (July 15, 2015), the Department of Justice (DOJ) announced that the coordinated law enforcement efforts of 20 countries, including the U.S. effectively dismantled the computer hacking forum Darkode with criminal...more