Podcast - “I Lied Like a Dog!”
Sittenfeld v. United States – Campaign Contributions as Crimes?
Podcast - Persistence and Determination
Episode 377 -- Refocusing Due Diligence on Cartels and TCOs
10 For 10: Top Compliance Stories For the Week Ending, July 12, 2025
RICO Section 1962(b): Acquisition or Maintenance of Control Over Legitimate Enterprises — RICO Report Podcast
Podcast - The Seeds of Corruption
False Claims Act Insights - Bitter Pills: DOJ Targets Pharmacies for FCA Enforcement
Episode 374 -- Justice Department Resumes FCPA Enforcement with New, Focused Guidance
Daily Compliance News: June 16, 2025, The Golden Share Edition
The JustPod: Defending the "Evil Genius:" A Conversation with Leonard Ambrose
The Presumption of Innocence Podcast: Episode 62 - The Tragic Toll of Conspiracy Theories: The Seth Rich Story
SBR-Author’s Podcast: The Unseen Life of an Undercover Agent: A Conversation with Charlie Spillers
Podcast - "Ready for Trial?"
Podcast - The Law as a Force for Change
The JustPod: A Discussion with Defense Counsel Rocco Cipparone and Angie Levy on January 6 Prosecutions
False Claims Act Insights - Trump DOJ Sharpens Its Focus on Healthcare Fraud
The JustPod: A murder-for-hire allegation, public corruption trial, and notable acquittal
Podcast - Every Case Is a New World
While data from mobile devices is more frequently responsive in civil litigation than ever before, “true crime” aficionados know it’s routinely useful in criminal investigations. We take our devices with us and use them...more
Understanding what is the chain of suspicion in a legal setting is extremely important, especially when it comes to a digital forensic examiner. The chain of custody is suspicion for things like criminal defense work,...more
In Angelyn A. Olson et al. v. The Consilio LLC, et al. filed in Tarrant County, Texas, plaintiff Angelyn Olson alleged that she was involved in other litigation during which an e-discovery service provider (Consilio) was...more
AI has the potential to transform the criminal justice system through its ability to process vast datasets, recognize patterns, and predict outcomes. However, this potential comes with a profound responsibility: ensuring that...more
Electronic information in various forms is now a common feature in the investigation and prosecution of crimes. The search for and use of that information presents issues under the Fourth, Fifth, and Sixth Amendments as well...more
Once a company or individual learns they are a target of a Federal Trade Commission investigation, they need to quickly make a series of decisions, then take action. After being notified that the FTC has begun an...more
In a recent case decided by the Appellate Division in New Jersey, Facebook, Inc. v. State of New Jersey, the court considered whether communication data wire warrants (“CDWs”) or wiretap orders had to be served on Facebook...more
Something identified in the course of normal eDiscovery often turns a case into a forensics investigation. In a recent webinar, we examined several case studies, and here we dive a little deeper into one of the examples...more
Several federal agencies rely on search warrants to gather evidence in support of their law enforcement efforts. If you have received a search warrant from the Federal Bureau of Investigation (FBI), Drug Enforcement...more
The Georgia Supreme Court ruled that the retrieval of electronic automobile data from an electronic data recording device (e.g., airbag control modules) without a warrant at the scene of a fatal collision was a search and...more
Yesterday, the Georgia Supreme Court is set to hear oral argument in an appeal brought by a defendant convicted of vehicular homicide and other charges related to a fatal car crash. (Mobley v. State, No. S18C1546). The...more
Here’s a scenario that might be common enough in your day-to-day life: imagine that you’ve misplaced your wallet. (Apparently, Americans do this a lot. Statistics show we spend two and a half days each year looking for...more
Recently, Amazon refused (registration required) to provide data from an Amazon Echo device in a case involving the a double homicide in response to an order issued by a New Hampshire state judge. Prosecutors believe that the...more
For many legal practitioners, Asia remains a legal challenge, “whether it’s the different data sources, the lack of familiarity with case law or an understanding of the legal landscape in different countries, from Hong Kong...more
Just over four years ago, in January 2014, a court sentenced former Korn/Ferry regional director David Nosal to one year and one day in prison for violations of the federal Computer Fraud and Abuse Act and the Espionage Act. ...more
Can deleting information, even personal information, from your work computer land you in prison? That was the central question posed in USA v. Zeng, Case No. 4:16-cr-00172 in the Northern District of California. Mr. Zeng...more
The U.S. Supreme Court, which just began a new term on Monday with a full complement of nine justices, is expected to soon decide whether it will hear the appeal of David Nosal, the former Korn Ferry executive whose...more
The warrant that led to the arrest of a husband for the alleged murder of his wife weaves a web of electronic evidence. Based in large part on Fitbit fitness tracker data, Connecticut authorities have charged Richard Debate...more
Police in Bentonville, Arkansas are seeking records from an Amazon Echo device (for the second time) which may contain records in connection with a murder investigation in the home of James Andrew Bates where Victor Collins...more
On October 14, the US Department of Justice's Antitrust Division announced that Ralph Groen, a former information technology executive of the bus operator Coach USA Inc., had pleaded guilty to criminally obstructing justice...more
Last month, the Ninth Circuit affirmed the criminal conviction of an individual for accessing a computer “without authorization” in violation of the Computer Fraud and Abuse Act (“CFAA”). U.S. v. Nosal (9th Cir., July 5,...more
In United States v. Nosal, 676 F.3d 854 (9th Cir. 2012) (en banc), the court held that the Computer Fraud and Abuse Act, 18 U.S.C. § 1030, prohibits unlawful access to a computer but not unauthorized use of computerized...more