Just Press "Play"
Podcast - “I Lied Like a Dog!”
Sittenfeld v. United States – Campaign Contributions as Crimes?
Podcast - Persistence and Determination
Episode 377 -- Refocusing Due Diligence on Cartels and TCOs
10 For 10: Top Compliance Stories For the Week Ending, July 12, 2025
RICO Section 1962(b): Acquisition or Maintenance of Control Over Legitimate Enterprises — RICO Report Podcast
Podcast - The Seeds of Corruption
False Claims Act Insights - Bitter Pills: DOJ Targets Pharmacies for FCA Enforcement
Episode 374 -- Justice Department Resumes FCPA Enforcement with New, Focused Guidance
Daily Compliance News: June 16, 2025, The Golden Share Edition
The JustPod: Defending the "Evil Genius:" A Conversation with Leonard Ambrose
The Presumption of Innocence Podcast: Episode 62 - The Tragic Toll of Conspiracy Theories: The Seth Rich Story
SBR-Author’s Podcast: The Unseen Life of an Undercover Agent: A Conversation with Charlie Spillers
Podcast - "Ready for Trial?"
Podcast - The Law as a Force for Change
The JustPod: A Discussion with Defense Counsel Rocco Cipparone and Angie Levy on January 6 Prosecutions
False Claims Act Insights - Trump DOJ Sharpens Its Focus on Healthcare Fraud
The JustPod: A murder-for-hire allegation, public corruption trial, and notable acquittal
While data from mobile devices is more frequently responsive in civil litigation than ever before, “true crime” aficionados know it’s routinely useful in criminal investigations. We take our devices with us and use them...more
Understanding what is the chain of suspicion in a legal setting is extremely important, especially when it comes to a digital forensic examiner. The chain of custody is suspicion for things like criminal defense work,...more
When I reflect on the relationship that our firm has with our clients, I’m most proud of the fact that you can always count on us. That often means defending complex litigation, steering you through regulatory threats,...more
In today’s world of cyber threats, many companies have fallen victim to ransomware attacks. Corporate boards and senior executives face serious issues when their companies are attacked. The payment of ransom is not only...more
Report on Patient Privacy 22, no. 6 (June, 2022) - A report from the HHS Health Sector Cybersecurity Coordination Center (HC3) found that in early 2022, ransomware groups increasingly turned to legitimate software during...more
Dr. Melissa Dark is the Founder of DARK Enterprises, a non-profit organization dedicated to developing and supporting cybersecurity education at the secondary level. Before that, Dr. Dark worked in graduate and college...more
Federal authorities have recently described the threat of economic espionage from foreign entities as one of the greatest threats to the economic vitality of the United States, and this has led to an increase in...more
One of the more dramatic privacy law developments in China in 2014 was the August criminal conviction of foreign nationals Peter Humphrey and Yu Yingzeng for their violation of Article 253 of the Criminal Law (??) associated...more
Last week, (July 15, 2015), the Department of Justice (DOJ) announced that the coordinated law enforcement efforts of 20 countries, including the U.S. effectively dismantled the computer hacking forum Darkode with criminal...more