The FBI on Economic Espionage
The Justice Insiders Podcast: Varsity Blues Reversals Turn DOJ Red
[Podcast] Cyber Spotlight: Wiley Tackles White House’s National Cybersecurity Strategy and Other Developments
No Password Required: An FBI Special Agent's Journey from Submarines to Anti-Corruption to Cybersecurity
The New Cold War: Risk, Sanctions, Compliance Episode 23: "Former FBI Acting Director Andrew McCabe”
The Latest from the DOJ Antitrust Division
The Presumption of Innocence Podcast: Episode 7 - Investigative Insights: A Conversation with a Former FBI Agent
DE Under 3: OFCCP AAP Verification Portal 'Rules of Behavior', Vaccination Injunction Updates, & Recent Job Scam Alerts
Cybersecurity: Headlines, Best Practices and Its Evolving Role
Digging Deeper, Episode 1: The Con Queen of Hollywood
Devil in the Details: Gilbert King on Truth and Transparency in the Judicial Process
Compliance Perspectives: The FBI on Why and How to Work with the Office of the Private Sector
This Week in FCPA-Episode 54, the Rubber Match Edition
As we wrote in a note back in December 2020, the border search exception to the Fourth Amendment is a powerful investigative tool relied on by law enforcement to gather critical physical and digital evidence because it allows...more
The Securities and Exchange Commission (SEC) recently adopted rules requiring public companies to quickly disclose “material cybersecurity incidents” and to annually disclose material information regarding a company’s...more
Report on Patient Privacy Volume 23, no 2 (February 2023) DCH Health Systems, based in Tuscaloosa, Ala., said it fired an employee in December after a routine privacy audit revealed evidence that the worker had accessed some...more
Hosted by CI, the inaugural Police Tech Conference & Expo provides the unique opportunity to experience hands-on the latest technology solutions specifically tailored for law enforcement. Learn how new devices and services...more
Looking for compliance training and networking in your area? HCCA’s Regional Healthcare Compliance Conferences offer practitioners convenient, local compliance training, including updates on the latest news in regulatory...more
Several federal agencies rely on search warrants to gather evidence in support of their law enforcement efforts. If you have received a search warrant from the Federal Bureau of Investigation (FBI), Drug Enforcement...more
If you want to keep tabs on criminals, build them a clubhouse. Provide them a comfortable place to relax and discuss their business, and you can learn about their contacts and activities. The strategy is not new....more
On August 20, 2020, former Uber Chief Security Officer Joe Sullivan was charged with obstruction of justice and misprision of a felony for knowingly concealing a hack of Uber in 2016. Based on Sullivan’s complaint,...more
How much of the Paycheck Protection Program (“PPP”) will end up in the hands of bad actors? With several hundreds of billions of dollars in the PPP bucket, fraud, misuse, and misdirection of funds is already being identified...more
Attorney David Karp and Pulitzer Prize-winning journalist Gilbert King, author of Devil in the Grove: Thurgood Marshall, the Groveland Boys, and the Dawn of a New America, discuss the importance of access to historically...more
Facial recognition is a rapidly evolving area of technology with myriad potential commercial uses. Reflecting the rapid growth in this area, regulations related to facial recognition are changing across all levels of...more
The Ninth Circuit recently heard an appeal that challenges a common tool of law enforcement: “f” letters. Under section 2703(f) of the Stored Communications Act, law enforcement may compel providers of “electronic...more
This article is the second in a series analyzing the Sourcebook of Federal Sentencing Statistics for Fiscal Year 2018, recently released by the United States Sentencing Commission. As discussed in our first article, the...more
For most of us, the concept of facial recognition – like so much technology of the last decade – began as a sci-fi detail we accepted on the big screen but didn’t give much thought to in our day-to-day lives. Then one day,...more
Sometimes what folks label a “new idea” is not so much of a new idea as the application of an old solution to a new discipline. I do not mean to be cryptic, but I am going to explain my point by referring to an area where I...more
After a security incident is identified organizations often consider whether to share information concerning the incident with government agencies. If the incident involved criminal conduct, federal law enforcement agencies –...more
The best way for a company to handle a data breach is to be prepared. As we discuss in our data breach readiness handbook, preparation includes, among other things, drafting an incident response plan, reviewing...more
The nation’s largest police union recently suffered a data breach enabling hackers to steal hundreds of private internal documents including bargaining contracts, the names and addresses of several police officers, and...more
The guidance states that drones recently “have emerged as a viable law enforcement tool.” In addition to affirming DOJ’s commitment to civil rights and privacy laws, the guidance imposes rules on who can order drone support...more
Last week, the U.S. Department of Justice (DOJ) published guidelines for the use of unmanned aerial vehicles (UAVs) or, as more commonly called, drones, by federal law enforcement. Currently, the FBI is the only agency using...more
The FBI's much anticipated study of active shooter incidents in the United States between 2000 and 2013 was released at the end of 2014. This federal study is the first of its kind and its findings are eye-opening, dispelling...more
The Ober|Kaler Health Care General Counsel Institute presented this webinar discussion of key considerations in addressing an active shooter situation, including specific considerations within health care facilities. Not only...more
Fake-out stakeout. For several months now, we’ve been covering the increasingly prevalent use of social media by law enforcement agencies conducting criminal investigations. In one such instance, the FBI sent a link to a...more
..Bad chords. A European musician’s attempt to stop a negative concert review from continuing to appear in Internet search results is raising questions about whether the EU’s “right to be forgotten” ruling could prevent the...more
You are general counsel to a company, and your CEO steps into your office, clutching his iPhone in one hand and wiping sweat from his brow with the other, and tells you that a compromising photograph of him was stolen from...more