Sensitive Incident Investigations. Digital Risk Management. Forensics Testing.

Size: px
Start display at page:

Download "Sensitive Incident Investigations. Digital Risk Management. Forensics Testing."

Transcription

1

2 Sensitive Incident Investigations. Digital Risk Management. Forensics Testing.

3 2009 Innovation Award Winner Austin Chamber of Commerce

4 2010 Innovation Award Finalist Austin Chamber of Commerce

5 Only private laboratory in the world with same accreditation for digital forensics as FBI American Society of Crime Laboratory Directors 2010

6 Who We Are Since 2004, we ve provided sensitive incident response and investigation to clients around the world, including foreign governments, corporations, law firms, and state and federal agencies. Our digital forensics laboratory is ISO/IEC 17025:2005 compliant and accredited by the American Society of Crime Laboratory Directors under their International program (ASCLD/LAB International). Certificate ALI-113-T Field of Accreditation Forensic Science Testing Discipline 9.0 Digital and Multimedia Evidence

7 What We Do forensics. When corporations and foreign governments feel outstripped by technology, they call us. We provide 24-hour crisis support and computer incident response, including: Forensic Media Examination and Analysis crimes. disputes. corporate distress and investigations. Mobile Device Seizure and Investigation blackberrys. iphones. Evidence Preservation forensic collection. chains of custody. secure evidence storage. Data Recovery hardware failures. data reconstruction. advanced searching & processing. Expert Services Testimony. Affidavits. Reports.

8 What We Do Consulting. One of the things we do best is help clients cut us out of the process. FBD Global provides training and specialized advisory services to industry clients building their own internal forensics and data recovery labs, including: Strategic Consultation laboratory and clean room construction. staffing. toolkits. Regulatory Advisory Services risk assessment. audits. process and quality system development. Training forensic examination. data recovery. quality management. security. Our personnel have backgrounds in law, criminal investigation, intelligence, fraud examination, and information systems and security. We offer basic-to-advanced training on the techniques we use to provide digital forensics and data recovery support.

9 We Tell Stories. Computer Incident Autopsy Mobile Device Seizure and Analysis Lost or Fragmented Data Reconstruction User Profiling Internet History Analysis Event and Communication Analysis Deleted File Recovery Advanced Data Searching and Processing Google Search History Recovery and Analysis Social Networking Activity Forensic Evidence Collection Encryption Analysis We Keep Secrets.

10 These clients faced the same choice you do:

11 Case No CRIME A successful chain of retail businesses was acquired for a large sum of money. The day after the sale was announced the principal owner s 6-year old boy was kidnapped in a foreign country and held for ransom. The kidnappers negotiated an approximately $1M ransom. The money was dropped, and the kidnappers seized the ransom, murdered the boy, and vanished. Foreign law enforcement investigated and the case went cold after several months. We were engaged by the Attorney General for the country of incident. It was suspected that government employees may have masterminded the kidnapping. Within a week, forensic examination of agency computers developed evidence that identified the prime suspect in the case, a police officer. While in custody police discovered thesuspect was holding children from two other kidnappings. The case made national headlines and the rescued children were returned to their families. The suspect was killed in prison three weeks later.

12 Case No FRAUD Case No data breach Our client represented the wife in a complex divorce proceeding. Husband and wife had co-owned and sold an early stage company during their marriage for approximately $8M dollars. At the time divorce was filed, the marital estate was estimated to be approximately $2M dollars, and there was no accounting for the missing $6M dollars. Forensic examination of cell phones, personal computers, and financial activity uncovered data fragments which, upon analysis, were traceable to an undisclosed bank account that had been surreptitiously accessed by the husband. Following a subpoena to the bank, it was discovered that this undisclosed account contained about $6 million dollars. A settlement agreement was reached and greatly favored our client. We were retained by a government agency to respond to and investigate a breach incident that had resulted in data theft. The stolen data was sensitive and the client needed an emergency response. Our crisis support team responded in the middle of the night to assess the incident, analyze the technical landscape, and contain the breach. Progress was initially slow despite an all hands response. However, deep examination in our laboratory identified a small, almost insignificant string of malicious code intentionally obfuscated within other code. And further analysis traced the source to multiple internal employees. The breach was contained and criminal proceedings were instituted against the offenders, all software development engineers and programmers. Case No embezzlement We were engaged by a company to examine its technical infrastructure for suspected intrusion and/or monitoring. Investigation revealed an ongoing breach was in fact occurring, but the source was internal. We discovered multiple keyloggers and other monitoring software had been deployed to company computers. Further investigation determined the source was a trusted employee and that, in addition to monitoring, the employee had been embezzling money from the company for several years. It was later revealed her motive was to steal customer lists and spy on management in order to later separate from the company and form a competitor. Both civil and criminal proceedings were instituted against the suspect, who was ultimately convicted and imprisoned.

13 Case No ip theft Case No crime We were engaged by an online seller of nutritional supplements being sued in Federal Court for intellectual property theft. A motion was to be heard by the court regarding possible spoliation by our client. This motion was based upon a report generated by a national computer consulting and security firm hired by the plaintiffs. Our examination of the report revealed it contained multiple inaccurate statements and fundamental misunderstandings about computer forensics. We testified in court and advised our client during cross-examination of plaintiff s expert in a brutal challenge of his forensics expertise, which turned out to be rudimentary. Our client was a foreign government agency. We were engaged to investigate computer activity in connection with a suspected child exploitation ring. Forensic examination linked some computers to child pornography operations in Eastern Europe. The results of our investigation implicated multiple individuals, including a ranking member of the foreign ministry, as well as a local priest. The suspects were tried and imprisoned. The evidence we developed was instrumental in securing the conviction and sentence. Based on our work, the motions for sanctions and summary judgment were dismissed and a settlement between the parties was quickly reached. This was good news for our clients as they would have been personally bankrupted had they not prevailed on these motions. Case No e-forgery We were engaged to provide expert consulting and reports in connection with a complex lawsuit based on allegedly falsified contracts. A proud supporter of HTCIA high-tech crime investigation association An independent third party had been ordered by the court to handle document production and searching. Our forensic examination and analysis of the discovery provided by this third party indicated the contractsinquestionhadbeencreatedmore than two months after they were supposedly executed. Understandably, the judge in the case didn t have a sense of humor about the forgery, and our client prevailed on summary judgment.

14 Case No criminal defense Case No criminal defense Our client was charged with computer intrusion, aggravated identity theft and possession of contraband images. The case was investigated by the U.S. Secret Service in Dallas. Evidence comprised more than two million files spread across twelve computers and devices, many of them encrypted. Defendant filed a motion to suppress the evidence as seized outside the scope of the search warrant. Over the course of several months, both in our laboratory and at the U.S. Secret Service, we determined there were several misrepresentations in the government s responses to Defendant s motion. We further determined the government had no basis for searching encrypted files given the scope of its warrant. The District Judge granted the motion, calling the search an obvious case of deliberate overreaching by the government in an effort to seize data to which it lacked probable cause. Our client was charged with distribution of narcotics, counterfeiting, and possession of contraband images. The case was investigated by the U.S. Secret Service in Dallas. Defendant moved to suppress evidence claiming the computer was searched by police prior to obtaining a warrant. Our forensic examination determined (i) that local police had searched the computer for approximately two hours prior to seeking a warrant to search for evidence of counterfeiting, and (ii) the police exceeded the scope of that warrant for another three hours searching for contraband images. The court agreed that these and other actions were strong indicators of bad faith by the officers. The computer was suppressed and without it there was no evidence of counterfeiting or possession of contraband images. (And the narcotics alleged in the indictment which were found in a sugar bowl turned out to be sugar.) All charges against Defendant were dismissed with prejudice. Case No ip theft We were engaged by a multinational software firm being sued by its principal rival. Several employees had departed the rival firm and were employed by our client. The suit alleged sensitive confidential data had been taken without authorization. Examination of computers and cell phones determined that, while employees still possessed confidential data, no employee attempted to use or transfer the data, and there were no indications any data had been intentionally accessed. Member in good standing infragard association of certified fraud examiners The litigation had a potential loss for our client of $2 billion and was settled for a much more favorable sum.

15 Contact us today (U.S. and Canada) (all other countries)

16 Global Consulting Flashback Data FBD Management

Presentation Presented By FORENSIC INVESTIGATIVE TEAM

Presentation Presented By FORENSIC INVESTIGATIVE TEAM Presentation Presented By FORENSIC INVESTIGATIVE TEAM Proud of our Past - Focused on your Future! Our investigative team has received extensive training by the American Institute of CPA's, Association

More information

Conviction Integrity Unit Best Practices October 15, 2015

Conviction Integrity Unit Best Practices October 15, 2015 Conviction Integrity Unit Best Practices October 15, 2015 District Attorney s offices are increasingly creating Conviction Integrity Units (CIUs) to re examine questionable convictions and guard against

More information

Attorney General Balderas Criminal Affairs Update to Courts, Corrections & Justice Interim Committee

Attorney General Balderas Criminal Affairs Update to Courts, Corrections & Justice Interim Committee FOR IMMEDIATE RELEASE: Contact: James Hallinan September 24, 2015 (505) 660-2216 Attorney General Balderas Criminal Affairs Update to Courts, Corrections & Justice Interim Committee Albuquerque, NM Today,

More information

Chapter 15 Criminal Law and Procedures

Chapter 15 Criminal Law and Procedures Chapter 15 Criminal Law and Procedures Chapter Outline 1. Introduction 2. What Is a Crime? 3. Elements of Criminal Liability 4. Types of Crimes 5. Cyber Crime 6. Constitutional Safeguards 7. Criminal Procedures

More information

Glossary of Terms Acquittal Affidavit Allegation Appeal Arraignment Arrest Warrant Assistant District Attorney General Attachment Bail Bailiff Bench

Glossary of Terms Acquittal Affidavit Allegation Appeal Arraignment Arrest Warrant Assistant District Attorney General Attachment Bail Bailiff Bench Glossary of Terms The Glossary of Terms defines some of the most common legal terms in easy-tounderstand language. Terms are listed in alphabetical order. A B C D E F G H I J K L M N O P Q R S T U V W

More information

Decades of Successful Sex Crimes Defense Contact the Innocence Legal Team Now

Decades of Successful Sex Crimes Defense Contact the Innocence Legal Team Now Criminal Court Felonies The U.S. has the highest rate of felony conviction and imprisonment of any industrialized nation. A felony crime is more serious than a misdemeanor, but the same offense can be

More information

INDIANA FALSE CLAIMS AND WHISTLEBLOWER PROTECTION ACT. IC 5-11-5.5 Chapter 5.5. False Claims and Whistleblower Protection

INDIANA FALSE CLAIMS AND WHISTLEBLOWER PROTECTION ACT. IC 5-11-5.5 Chapter 5.5. False Claims and Whistleblower Protection As amended by P.L.79-2007. INDIANA FALSE CLAIMS AND WHISTLEBLOWER PROTECTION ACT IC 5-11-5.5 Chapter 5.5. False Claims and Whistleblower Protection IC 5-11-5.5-1 Definitions Sec. 1. The following definitions

More information

OFFICE OF THE DISTRICT ATTORNEY GEORGE H. BRAUCHLER, DISTRICT ATTORNEY 18TH JUDICIAL DISTRICT

OFFICE OF THE DISTRICT ATTORNEY GEORGE H. BRAUCHLER, DISTRICT ATTORNEY 18TH JUDICIAL DISTRICT OFFICE OF THE DISTRICT ATTORNEY GEORGE H. BRAUCHLER, DISTRICT ATTORNEY 18TH JUDICIAL DISTRICT SERVING ARAPAHOE, DOUGLAS, ELBERT AND LINCOLN COUNTIES 6450 S. REVERE PARKWAY CENTENNIAL, CO 80111 (720) 874-8500

More information

Digital Forensics & e-discovery Services

Digital Forensics & e-discovery Services Digital Forensics & e-discovery Services U.S. Security Associates Digital Forensics & e-discovery Services 21st century fraud investigations require expert digital forensics skills to deal with the complexities

More information

Digital Forensics & e-discovery Services

Digital Forensics & e-discovery Services Digital Forensics & e-discovery Services Andrews International Digital Forensics & e-discovery Services 21st century fraud investigations require expert digital forensics skills to deal with the complexities

More information

GOVERNMENT PROSECUTIONS AND QUI TAM ACTIONS

GOVERNMENT PROSECUTIONS AND QUI TAM ACTIONS GOVERNMENT PROSECUTIONS AND QUI TAM ACTIONS DISTRICT OF COLUMBIA OFFICIAL CODE DIVISION I. GOVERNMENT OF DISTRICT. TITLE 2. GOVERNMENT ADMINISTRATION. CHAPTER 3B. OTHER PROCUREMENT MATTERS. SUBCHAPTER

More information

Computer Forensics US-CERT

Computer Forensics US-CERT Computer Forensics US-CERT Overview This paper will discuss the need for computer forensics to be practiced in an effective and legal way, outline basic technical issues, and point to references for further

More information

A Federal Criminal Case Timeline

A Federal Criminal Case Timeline A Federal Criminal Case Timeline The following timeline is a very broad overview of the progress of a federal felony case. Many variables can change the speed or course of the case, including settlement

More information

General District Courts

General District Courts General District Courts To Understand Your Visit to Court You Should Know: It is the courts wish that you know your rights and duties. We want every person who comes here to receive fair treatment in accordance

More information

Lance Eliot Sloves. Computer Forensic Services, Inc. 2807 Allen St. #743 E-mail: lancesl@cfsiusa.com

Lance Eliot Sloves. Computer Forensic Services, Inc. 2807 Allen St. #743 E-mail: lancesl@cfsiusa.com Lance Eliot Sloves Certified Computer Examiner (CCE, EnCE) Licensed Private Investigator, TX Testifying Expert Independent Government Contractor Active Top Secret/SSBI US Government Clearance Computer

More information

PROTECTING THE COMPANY S CROWN JEWELS WHEN EMPLOYEES DEPART

PROTECTING THE COMPANY S CROWN JEWELS WHEN EMPLOYEES DEPART PROTECTING THE COMPANY S CROWN JEWELS WHEN EMPLOYEES DEPART Michael G. King, Esq. (mking@hgla.com) Paul T. Martin, Esq. (pmartin@hgla.com) 4640 Admiralty Way Suite 850 Marina del Rey, CA 90292 (310) 305-2100

More information

Services. Computer Forensic Investigations

Services. Computer Forensic Investigations DataTriangle, Inc. is uniquely structured to provide you with a high quality expert as expeditiously as possible. Charles Snipes has nearly 15 years of experience with criminal investigations in the areas

More information

Cybersecurity Opportunities. Presented to: National Professional Science Masters Association November 13, 2013

Cybersecurity Opportunities. Presented to: National Professional Science Masters Association November 13, 2013 Cybersecurity Opportunities Presented to: National Professional Science Masters Association November 13, 2013 Overall Themes For Discussion Advice for Grads Your Degree Is A Place To Start. It does not

More information

To do Justice, as no one is above the Law nor beneath its protection.

To do Justice, as no one is above the Law nor beneath its protection. Michael L. Ramsey, District Attorney District Attorney Department Summary Mission Statement To do Justice, as no one is above the Law nor beneath its protection. Department Description and Key Issues The

More information

A Whistleblowers Journey

A Whistleblowers Journey A Whistleblowers Journey John W Schilling EthicSolutions LLC Health Care Fraud Medicare spending in FY 2008 exceeded $450 billion According to Taxpayers Against Fraud (TAF), the U.S. Government estimates

More information

SECURITIES EXAMINER (ENTRY) 5670

SECURITIES EXAMINER (ENTRY) 5670 SECURITIES EXAMINER (ENTRY) 5670 GENERAL DESCRIPTION OF CLASS The SECURITIES EXAMINER (ENTRY), under the guidance of a Securities Examiner, analyzes and evaluates the activities of individuals and businesses

More information

CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak

CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak CSN08101 Digital Forensics Lecture 4A: Forensic Processes Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak Forensics Processes - objectives Investigation Process Forensic Ethics Issues Forensic

More information

United States Court of Appeals

United States Court of Appeals United States Court of Appeals FOR THE EIGHTH CIRCUIT No. 09-1408 United States of America, * * Appellee, * * Appeal from the United States v. * District Court for the * District of Minnesota. Aaron Jay

More information

The Legal System in the United States

The Legal System in the United States The Legal System in the United States At the conclusion of this chapter, students will be able to: 1. Understand how the legal system works; 2. Explain why laws are necessary; 3. Discuss how cases proceed

More information

trial court and Court of Appeals found that the Plaintiff's case was barred by the statute of limitations.

trial court and Court of Appeals found that the Plaintiff's case was barred by the statute of limitations. RESULTS Appellate Court upholds decision that malpractice action barred September 2, 2015 The South Carolina Court of Appeals recently upheld a summary judgment obtained by David Overstreet and Mike McCall

More information

SMALL CLAIMS COURT INFORMATION

SMALL CLAIMS COURT INFORMATION Clark County District Court SMALL CLAIMS COURT INFORMATION INTRODUCTION The Small Claims Department of District Court allows a person or business with a legal dispute to sue without hiring an attorney.

More information

Small Claims Court in Michigan

Small Claims Court in Michigan Dr. Donald J. Baranski, Attorney and Counselor at Law Small Claims Court in Michigan How to Bring and Defend Your Case in Court and Collect on Your Judgment Copyright 2011 by Dr. Donald J. Baranski Dr.

More information

White Collar Criminal Defense, Internal Investigations & Corporate Compliance

White Collar Criminal Defense, Internal Investigations & Corporate Compliance Butzel Long :: Practice :: Practice Teams :: White Collar Criminal Defense, Internal Investigations & Corporate Compliance Team Contacts David F. DuMouchel Related Lawyers George B. Donnini Damien DuMouchel

More information

Computer Forensics Preparation

Computer Forensics Preparation Computer Forensics Preparation This lesson covers Chapters 1 and 2 in Computer Forensics JumpStart, Second Edition. OBJECTIVES When you complete this lesson, you ll be able to Discuss computer forensics

More information

CONSTITUTIONAL RIGHTS

CONSTITUTIONAL RIGHTS RIGHTS OF THE CRIMINALLY ACCUSED GENERAL LEGAL RIGHTS CHAPTER 10 INTRODUCTION Constitutional rights relating to American criminal law are the same for all adult persons, whether they have a disability

More information

GENERAL INSTRUCTIONS For Use with All DOM REL Forms

GENERAL INSTRUCTIONS For Use with All DOM REL Forms Please read these instructions before you file your papers. These instructions may contain some legal words that are not familiar to you. A list of common legal words and their definitions is attached.

More information

Case Study: Hiring a licensed Security Provider

Case Study: Hiring a licensed Security Provider Case Study: Hiring a licensed Security Provider Company Profile McCann Investigations is a full service private investigation firm providing complete case solutions by employing cutting-edge computer forensics

More information

ANGIE SINGER KEATING CHIEF EXECUTIVE OFFICER, CO-FOUNDER

ANGIE SINGER KEATING CHIEF EXECUTIVE OFFICER, CO-FOUNDER CERTIFICATIONS ANGIE SINGER KEATING CHIEF EXECUTIVE OFFICER, CO-FOUNDER Certified Information Privacy Professional (CIPP) by the International Association of Privacy Professionals (IAPP) Certified Information

More information

C RIMINAL LAW O V E RVIEW OF T H E T E XAS C RIMINAL J USTICE P ROCESS

C RIMINAL LAW O V E RVIEW OF T H E T E XAS C RIMINAL J USTICE P ROCESS T E X A S Y O U N G L A W Y E R S A S S O C I A T I O N A N D S T A T E B A R O F T E X A S C RIMINAL LAW 1 0 1 : O V E RVIEW OF T H E T E XAS C RIMINAL J USTICE P ROCESS A C RIMINAL LAW 1 0 1 Prepared

More information

C O H E N, T O D D, K I T E & S T A N F O R D, L L C

C O H E N, T O D D, K I T E & S T A N F O R D, L L C C O H E N, T O D D, K I T E & S T A N F O R D, L L C John L. O Shea Member Direct: (513) 333-5227 Mobile: (513) 300-4012 Email: joshea@ctks.com visit superlawyers.com Top 50 Cincinnati Super Lawyer 2012,

More information

GUIDE TO SMALL CLAIMS COURT The Rural Law Center of New York, Inc.

GUIDE TO SMALL CLAIMS COURT The Rural Law Center of New York, Inc. This material is provided to answer general questions about the law in New York State. The information and forms were created to assist readers with general issues and not specific situations, and, as

More information

Arrests/Convictions/IFBs. First Half 2011 2013. The Insurance Frauds Bureau posted 215 arrests during the first half of 2013.

Arrests/Convictions/IFBs. First Half 2011 2013. The Insurance Frauds Bureau posted 215 arrests during the first half of 2013. Arrests/Convictions/IFBs First Half 2011 2013 The Insurance Frauds Bureau posted 215 arrests during the first half of 2013. Number of Arrests 400 350 300 250 200 150 100 50 0 356 377 215 The following

More information

HP0868, LD 1187, item 1, 123rd Maine State Legislature An Act To Recoup Health Care Funds through the Maine False Claims Act

HP0868, LD 1187, item 1, 123rd Maine State Legislature An Act To Recoup Health Care Funds through the Maine False Claims Act PLEASE NOTE: Legislative Information cannot perform research, provide legal advice, or interpret Maine law. For legal assistance, please contact a qualified attorney. Be it enacted by the People of the

More information

STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION

STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION TITLE GRADE EEO-4 CODE AG Deputy Chief Investigator 42 D 13.246 SERIES CONCEPT Criminal Investigators

More information

CHAPTER 124B COMPUTER MISUSE

CHAPTER 124B COMPUTER MISUSE 1 L.R.O. 2005 Computer Misuse CAP. 124B CHAPTER 124B COMPUTER MISUSE ARRANGEMENT OF SECTIONS SECTION PART I PRELIMINARY 1. Short title. 2. Application. 3. Interpretation. PART II PROHIBITED CONDUCT 4.

More information

Glossary of Court-related Terms

Glossary of Court-related Terms Glossary of Court-related Terms Acquittal Adjudication Appeal Arraignment Arrest Bail Bailiff Beyond a reasonable doubt Burden of proof Capital offense Certification Charge Circumstantial evidence Citation

More information

KIMMONS INVESTIGATIVE SERVICES, INC. Texas Largest & Most Experienced Investigative Firm

KIMMONS INVESTIGATIVE SERVICES, INC. Texas Largest & Most Experienced Investigative Firm KIMMONS INVESTIGATIVE SERVICES, INC. Texas Largest & Most Experienced Investigative Firm HOUSTON AUSTIN KIMMONS INVESTIGATIVE SERVICES, INC. HIGHLY RESPECTED, SKILLED TEAM OF INVESTIGATORS Rob Kimmons,

More information

18 U.S.C. 983. General rules for civil forfeiture proceedings

18 U.S.C. 983. General rules for civil forfeiture proceedings 18 U.S.C. 983. General rules for civil forfeiture proceedings (a) Notice; claim; complaint.-- (1)(A)(i) Except as provided in clauses (ii) through (v), in any nonjudicial civil forfeiture proceeding under

More information

KIMMONS INVESTIGATIVE SERVICES, INC.

KIMMONS INVESTIGATIVE SERVICES, INC. KIMMONS INVESTIGATIVE SERVICES, INC. Texas Largest & Most Experienced Investigative Firm HOUSTON AUSTIN National & Worldwide Affiliates KIMMONS INVESTIGATIVE SERVICES, INC. HIGHLY RESPECTED, SKILLED TEAM

More information

DISTRICT CODE: 211 CRIMINAL OR CIVIL ACTION AGAINST SCHOOL DISTRICT, SCHOOL BOARD MEMBER, EMPLOYEE, OR STUDENT

DISTRICT CODE: 211 CRIMINAL OR CIVIL ACTION AGAINST SCHOOL DISTRICT, SCHOOL BOARD MEMBER, EMPLOYEE, OR STUDENT SCHOOL POLICIES HOPKINS SCHOOL DISTRICT 270 1001 HIGHWAY 7 HOPKINS, MINNESOTA 55305 DISTRICT CODE: 211 CRIMINAL OR CIVIL ACTION AGAINST SCHOOL DISTRICT, SCHOOL BOARD MEMBER, EMPLOYEE, OR STUDENT I. PURPOSE

More information

GUIDANCE Implementing Section 176 of the Anti-social Behaviour, Crime and Policing Act 2014: Lowvalue

GUIDANCE Implementing Section 176 of the Anti-social Behaviour, Crime and Policing Act 2014: Lowvalue GUIDANCE Implementing Section 176 of the Anti-social Behaviour, Crime and Policing Act 2014: Lowvalue shoplifting Guidance for police in England and Wales First publication: June 2014 1 Introduction 1.

More information

C O H E N, T O D D, K I T E & S T A N F O R D, L L C

C O H E N, T O D D, K I T E & S T A N F O R D, L L C C O H E N, T O D D, K I T E & S T A N F O R D, L L C John L. O Shea Member Direct: (513) 333-5227 Mobile: (513) 300-4012 Email: joshea@ctks.com visit superlawyers.com Top 50 Cincinnati Super Lawyer 2012,

More information

What do an All-Pro center for the Pittsburgh Steelers...

What do an All-Pro center for the Pittsburgh Steelers... What do an All-Pro center for the Pittsburgh Steelers... A British accountant kidnapped off a busy street in Manila, the Philippines... And a bank which almost closed its doors after loans to an unscrupulous

More information

Case 2:13-cv-01431-RBS Document 1 Filed 03/19/13 Page 1 of 8 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA

Case 2:13-cv-01431-RBS Document 1 Filed 03/19/13 Page 1 of 8 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA Case 2:13-cv-01431-RBS Document 1 Filed 03/19/13 Page 1 of 8 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA DAVID GARCIA : 7427 Belden Street : Basement Apt. : PHILADELPHIA,

More information

IC 5-11-5.7 Chapter 5.7. Medicaid False Claims and Whistleblower Protection

IC 5-11-5.7 Chapter 5.7. Medicaid False Claims and Whistleblower Protection IC 5-11-5.7 Chapter 5.7. Medicaid False Claims and Whistleblower Protection IC 5-11-5.7-1 Application; definitions Sec. 1. (a) This chapter applies only to claims, requests, demands, statements, records,

More information

System Overview ~~~~~ Presented by: Darcie McElwee

System Overview ~~~~~ Presented by: Darcie McElwee System Overview ~~~~~ Presented by: Darcie McElwee SYSTEM OVERVIEW OBJECTIVES Upon conclusion of this module the participant will be able to: Describe the overall structure, case flow process, and roles

More information

CALIFORNIA FALSE CLAIMS ACT GOVERNMENT CODE SECTION 12650-12656

CALIFORNIA FALSE CLAIMS ACT GOVERNMENT CODE SECTION 12650-12656 CALIFORNIA FALSE CLAIMS ACT GOVERNMENT CODE SECTION 12650-12656 12650. (a) This article shall be known and may be cited as the False Claims Act. (b) For purposes of this article: (1) "Claim" includes any

More information

www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services

www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse Finland Who are we? Bring a robust forensics team to the table to support your organisation Our practice can

More information

ELD. Executive Liability Division. Directors, Officers & Employment Practices Liability Insurance

ELD. Executive Liability Division. Directors, Officers & Employment Practices Liability Insurance *Dir, Off, Nonprofit 2/21/07 10:38 AM Page 1 Directors, Officers & Employment Practices Liability Insurance A Guide for Non-profit Organizations ELD 1515 Woodfield Road Suite 500 Schaumburg, IL 60173 Phone:

More information

11 HB 87/CSFA A BILL TO BE ENTITLED AN ACT

11 HB 87/CSFA A BILL TO BE ENTITLED AN ACT House Bill 87 (COMMITTEE SUBSTITUTE) (AM) By: Representatives Ramsey of the 72 nd, Golick of the 34 th, Dempsey of the 13 th, Austin of the 10 th, Allison of the 8 th, and others A BILL TO BE ENTITLED

More information

BRYCE A. FETTER ORLANDO JUVENILE CHARGES ATTORNEY

BRYCE A. FETTER ORLANDO JUVENILE CHARGES ATTORNEY BRYCE A. FETTER ORLANDO JUVENILE CHARGES ATTORNEY People make mistakes, especially young people. Juvenile lawyer Bryce Fetter believes children should get a second chance through rehabilitation rather

More information

Department, Board, Or Commission Author Bill Number

Department, Board, Or Commission Author Bill Number BILL ANALYSIS Department, Board, Or Commission Author Bill Number Franchise Tax Board Leno SB 467 SUBJECT Privacy/Electronic Communication/Warrants SUMMARY The bill would require the department to obtain

More information

Information for Crime Victims and Witnesses

Information for Crime Victims and Witnesses Office of the Attorney General Information for Crime Victims and Witnesses MARCH 2009 LAWRENCE WASDEN Attorney General Criminal Law Division Special Prosecutions Unit Telephone: (208) 332-3096 Fax: (208)

More information

PARRY G. CAMERON, Senior Attorney

PARRY G. CAMERON, Senior Attorney Phone: 310.557.2009 Fax: 310.551.0283 Email: pcameron@tocounsel.com Parry Cameron has over twenty-three years experience in commercial and business litigation at both the trial and appellate levels. He

More information

CFF Content Specification Outline

CFF Content Specification Outline CFF Content Specification Outline The Pathway to the CFF Credential The American Institute of CPAs launched the Certified in Financial Forensic credential in June of 2008. The AICPA s CFF credential combines

More information

In a recent Southern District of California decision, the court sent a

In a recent Southern District of California decision, the court sent a The Qualcomm Decision: Ethics In Electronic Discovery VICTORIA E. BRIEANT AND DAMON COLANGELO A recent decision reinforces the importance of a comprehensive electronic document management plan. In a recent

More information

MASSACHUSETTS WARRANTLESS CELL PHONE SEARCHES CASE HEADS TO THE SUPREME COURT

MASSACHUSETTS WARRANTLESS CELL PHONE SEARCHES CASE HEADS TO THE SUPREME COURT MASSACHUSETTS WARRANTLESS CELL PHONE SEARCHES CASE HEADS TO THE SUPREME COURT The Fourth Amendment Guarantees a Right to Privacy and Protects Against Unreasonable Searches and Seizures; If Your Fourth

More information

Chapter 4 Legal Ethics

Chapter 4 Legal Ethics Chapter 4 Legal Ethics Yes. You read that right legal ethics. Har de har. Go ahead. Get it out of your system. How about this one? Why do scientists prefer using lawyers over lab rats? There are some things

More information

TESTIMONY OF CAROLINE CIRAOLO ACTING ASSISTANT ATTORNEY GENERAL TAX DIVISION U.S. DEPARTMENT OF JUSTICE BEFORE THE

TESTIMONY OF CAROLINE CIRAOLO ACTING ASSISTANT ATTORNEY GENERAL TAX DIVISION U.S. DEPARTMENT OF JUSTICE BEFORE THE TESTIMONY OF CAROLINE CIRAOLO ACTING ASSISTANT ATTORNEY GENERAL TAX DIVISION U.S. DEPARTMENT OF JUSTICE BEFORE THE COMMITTEE ON FINANCE UNITED STATES SENATE FOR A HEARING CONCERNING TAX SCHEMES AND SCAMS

More information

A Victim s Guide to Understanding the Criminal Justice System

A Victim s Guide to Understanding the Criminal Justice System A Victim s Guide to Understanding the Criminal Justice System The Bartholomew County Prosecutor s Office Victim Assistance Program Prosecutor: William Nash 234 Washington Street Columbus, IN 47201 Telephone:

More information

Spoliation of Evidence. Prepared for:

Spoliation of Evidence. Prepared for: Spoliation of Evidence Prepared for: Spoliation Nationwide anti-spoliation trend Cases can be thrown out of court Insurers can be denied subrogation claims An insured who destroys evidence of a claim can

More information

THE DIVORCE PROCESS: WHAT TO EXPECT

THE DIVORCE PROCESS: WHAT TO EXPECT THE DIVORCE PROCESS: WHAT TO EXPECT Contents What To Expect...1 Retaining an Attorney...2 Commencing the Divorce...3 The Uncontested Divorce...4 The Contested Divorce...5 Statement of Net Worth...6 The

More information

INTRODUCTION DO YOU NEED A LAWYER?

INTRODUCTION DO YOU NEED A LAWYER? INTRODUCTION The purpose of this handbook is to provide answers to some very basic questions that inmates or inmates families might have regarding the processes of the criminal justice system. In no way

More information

Connecting with clients through authentic interactions that not only satisfy their practical needs, but also their emotional

Connecting with clients through authentic interactions that not only satisfy their practical needs, but also their emotional THE FAMILY LAW PROCESS AND ITS REQUIREMENTS Connecting with clients through authentic interactions that not only satisfy their practical needs, but also their emotional wants.! 1. ARRAIGNMENT: Arraignment

More information

Questions You Should be Asking NOW to Protect Your Business!

Questions You Should be Asking NOW to Protect Your Business! Questions You Should be Asking NOW to Protect Your Business! Angi Farren, AAP Senior Director Jen Wasmund, AAP Compliance Services Specialist 31 st Annual Conference SHAPE YOUR FUTURE April 23, 2013 Regional

More information

GLOSSARY OF TERMS - CRIMINAL

GLOSSARY OF TERMS - CRIMINAL GLOSSARY OF TERMS - CRIMINAL Acquittal: A finding that the defendant is not guilty of the charges brought by the government. This finding may be reached by the trial judge in a case tried before a judge

More information

TAIWAN. Edgar Y. CHEN. Tsar & Tsai Law Firm G 8 th Fl., 245 DunHua S. Rd., Sec. 1. Taipei 106 TAIWAN

TAIWAN. Edgar Y. CHEN. Tsar & Tsai Law Firm G 8 th Fl., 245 DunHua S. Rd., Sec. 1. Taipei 106 TAIWAN TAIWAN Edgar Y. CHEN Tsar & Tsai Law Firm G 8 th Fl., 245 DunHua S. Rd., Sec. 1. Taipei 106 TAIWAN Phone: G 88-2-27814111 or 66386999 Fax : G 886-2-27213834 or 27315581 Email: G law@tsartsai.com.tw 1 1

More information

WILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM

WILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM WILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM SUMMARY OF QUALIFICATIONS Veteran investigator in a traditional and computer-related environment. A leader experienced in organizing, directing,

More information

SCREENING CHAPTER 24 JUSTICE, FREEDOM AND SECURITY AGENDA ITEM 7A: ORGANISED CRIME

SCREENING CHAPTER 24 JUSTICE, FREEDOM AND SECURITY AGENDA ITEM 7A: ORGANISED CRIME 1 SCREENING CHAPTER 24 JUSTICE, FREEDOM AND SECURITY Country Session: Republic of TURKEY 13-15 February 2006 CONTENT -LEGAL BASIS -ORGANISATION -COMBATTING INSTRUMENTS -EXPERTISE AND TRAINING -INTERNATIONAL

More information

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2011 SESSION LAW 2011-19 HOUSE BILL 27

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2011 SESSION LAW 2011-19 HOUSE BILL 27 GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2011 SESSION LAW 2011-19 HOUSE BILL 27 AN ACT TO (1) CREATE THE NORTH CAROLINA FORENSIC SCIENCE ADVISORY BOARD, (2) ENCOURAGE EFFORTS TO ELIMINATE SOURCES OF

More information

HOW TO REPRESENT YOURSELF IN CIVIL CASES IN JUSTICE COURT

HOW TO REPRESENT YOURSELF IN CIVIL CASES IN JUSTICE COURT HOW TO REPRESENT YOURSELF IN CIVIL CASES IN JUSTICE COURT If you are reading this you have either been sued in Justice Court, or you are thinking about suing someone in Justice Court. Following are the

More information

PRODOC FEDERAL CRIMINAL DEFENSE

PRODOC FEDERAL CRIMINAL DEFENSE PRODOC FEDERAL CRIMINAL DEFENSE Whether you practice criminal defense in federal court or want to expand in that area, the automated ProDoc Federal Criminal Defense volume is for you. You will find the

More information

Law Enforcement Legal Defense Plan

Law Enforcement Legal Defense Plan Law Enforcement Legal Defense Plan INTRODUCTION The Law Office of Keel and Nassour has been dedicated to representing law enforcement officers for over 20 years. During that time, Terry Keel and Jason

More information

Best Practices Series Document Retention and Best Practices

Best Practices Series Document Retention and Best Practices Best Practices Series Document Retention and Best Practices 1. Sarbanes Oxley Act provides guidance to businesses Sections 802 and 1102 of SOX make it a crime to alter, cover up, falsify, or destroy any

More information

Defendants charged with serious violent and sexual offences (including murder)

Defendants charged with serious violent and sexual offences (including murder) Bail Amendment Bill Q+A Defendants charged with serious violent and sexual offences (including murder) How is the Government changing bail rules for defendants charged murder? The Government thinks that

More information

Drug Offender in Georgia Prisons 1. Drug Offenders in Georgia State Prisons. Bobbie Cates. Valdosta State University

Drug Offender in Georgia Prisons 1. Drug Offenders in Georgia State Prisons. Bobbie Cates. Valdosta State University Drug Offender in Georgia Prisons 1 Drug Offenders in Georgia State Prisons Bobbie Cates Valdosta State University Drug Offenders in Georgia Prisons 2 Abstract In this paper I am going to point on drug

More information

Information Technologies and Fraud

Information Technologies and Fraud Information Technologies and Fraud Florin Gogoasa CISA, CFE, CGEIT, CRISC ACFE Romania - Founder and Board member Managing Partner Blue Lab Consulting Information Technologies for Fraud investigation A.

More information

Modalities for Forensic Review of Computer Related Frauds

Modalities for Forensic Review of Computer Related Frauds Modalities for Forensic Review of Computer Related Frauds Neneh Addico (CFE, CA), MTN Ghana Outline Recent Computer Crime Cases What is Computer Crime Forensics Types of Computer Related Crimes Relevance

More information

This opinion will be unpublished and may not be cited except as provided by Minn. Stat. 480A.08, subd. 3 (2008).

This opinion will be unpublished and may not be cited except as provided by Minn. Stat. 480A.08, subd. 3 (2008). This opinion will be unpublished and may not be cited except as provided by Minn. Stat. 480A.08, subd. 3 (2008). STATE OF MINNESOTA IN COURT OF APPEALS A09-1383 Diane L. Sheehan, Appellant, vs. Robert

More information

National Polygraph Institute Director - a certified polygraph school. Recent Excerpts

National Polygraph Institute Director - a certified polygraph school. Recent Excerpts LEONARD G. BIERMAN LEONARD BIERMAN & ASSOCIATES, INC. 300 South Broward Boulevard, Suite 260, Plantation, FL 33324 Phone (Broward) 954-476-9200 (Dade) 305-822-9395 FAX - 954-344-0830 Web Site lbierman.com

More information

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail. Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.com Why should we care about CYBER CRIME & CYBER SECURITY? Clarification

More information

STUDENT LEGAL SERVICES THEFT, FRAUD AND POSSESSION OF STOLEN PROPERTY A GUIDE TO THE LAW IN ALBERTA REGARDING OF EDMONTON COPYRIGHT AND DISCLAIMER

STUDENT LEGAL SERVICES THEFT, FRAUD AND POSSESSION OF STOLEN PROPERTY A GUIDE TO THE LAW IN ALBERTA REGARDING OF EDMONTON COPYRIGHT AND DISCLAIMER COPYRIGHT AND DISCLAIMER A GUIDE TO THE LAW IN ALBERTA REGARDING THEFT, FRAUD AND POSSESSION OF STOLEN PROPERTY version: 2008 STUDENT LEGAL SERVICES OF EDMONTON GENERAL All information is provided for

More information

INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES

INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES NOTICE: INSURING AGREEMENTS I.A., I.C. AND I.D. OF THIS POLICY PROVIDE COVERAGE ON A CLAIMS MADE AND REPORTED BASIS AND APPLY ONLY

More information

P.O. Box 2537 Chula Vista, CA 91912

P.O. Box 2537 Chula Vista, CA 91912 P.O. Box 2537 Chula Vista, CA 91912 Phone 619-934-0115 E-mail fulcrumpi@hotmail.com Jose L. Newman California Bureau of Security & Investigative Services License # PI 25803 Registered Process Server San

More information

What Is Small Claims Court? What Types Of Cases Can Be Filed In Small Claims Court? Should I Sue? Do I Have the Defendant s Address?

What Is Small Claims Court? What Types Of Cases Can Be Filed In Small Claims Court? Should I Sue? Do I Have the Defendant s Address? SMALL CLAIMS COURT What Is Small Claims Court? Nebraska law requires that every county court in the state have a division known as Small Claims Court (Nebraska Revised Statute 25-2801). Small Claims Court

More information

51ST LEGISLATURE - STATE OF NEW MEXICO - FIRST SESSION, 2013

51ST LEGISLATURE - STATE OF NEW MEXICO - FIRST SESSION, 2013 SENATE BILL 1ST LEGISLATURE - STATE OF NEW MEXICO - FIRST SESSION, INTRODUCED BY Joseph Cervantes 1 ENDORSED BY THE COURTS, CORRECTIONS AND JUSTICE COMMITTEE AN ACT RELATING TO CIVIL ACTIONS; CLARIFYING

More information

REPORTING INTELLECTUAL PROPERTY CRIME: A Guide for Victims of Copyright Infringement, Trademark Counterfeiting, and Trade Secret Theft

REPORTING INTELLECTUAL PROPERTY CRIME: A Guide for Victims of Copyright Infringement, Trademark Counterfeiting, and Trade Secret Theft REPORTING INTELLECTUAL PROPERTY CRIME: A Guide for Victims of Copyright Infringement, Trademark Counterfeiting, and Trade Secret Theft U.S. Department of Justice March 2013 REPORTING INTELLECTUAL PROPERTY

More information

98TH GENERAL ASSEMBLY State of Illinois 2013 and 2014 HB0074. Introduced 1/9/2013, by Rep. Michael J. Zalewski

98TH GENERAL ASSEMBLY State of Illinois 2013 and 2014 HB0074. Introduced 1/9/2013, by Rep. Michael J. Zalewski *LRB00HEPb* TH GENERAL ASSEMBLY State of Illinois 0 and 0 HB00 Introduced //0, by Rep. Michael J. Zalewski SYNOPSIS AS INTRODUCED: 0 ILCS 0/ from Ch., par.. 0 ILCS / from Ch., par. 0 0 ILCS /. new Amends

More information

DATA BREACH COVERAGE

DATA BREACH COVERAGE THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ THIS CAREFULLY. DATA BREACH COVERAGE SCHEDULE OF COVERAGE LIMITS Coverage Limits of Insurance Data Breach Coverage $50,000 Legal Expense Coverage $5,000

More information

FINANCIAL CRIMES. Lesson Plan and Course Outline. INSTRUCTOR EQUIPMENT/MATERIALS PowerPoint, LCD Projector, Computer, and Handouts

FINANCIAL CRIMES. Lesson Plan and Course Outline. INSTRUCTOR EQUIPMENT/MATERIALS PowerPoint, LCD Projector, Computer, and Handouts FINANCIAL CRIMES Lesson Plan and Course Outline Instructor Detective Kelly Smith Method of Presentation Lecture Duration 8 Hours Trainee Equipment/Materials Note taking material INSTRUCTOR EQUIPMENT/MATERIALS

More information

A White Paper from AccessData Group. The Future of Mobile E-Discovery

A White Paper from AccessData Group. The Future of Mobile E-Discovery A White Paper from AccessData Group The Future of Mobile E-Discovery Contents 1. The changing landscape of e-discovery 2. New expectations in the courtroom 3. Mobile discovery within corporations 4. MPE+

More information

Table of Contents 2016-17 Biennial Budget Attorney General

Table of Contents 2016-17 Biennial Budget Attorney General Table of Contents 2016-17 Biennial Budget Attorney General Agency Profile Attorney General... 1 Administrative Law Section... 2 State Services Section... 3 Public Services Section... 4 Regulatory Law Section...

More information

A White Paper from AccessData Group. The Future of Mobile E-Discovery

A White Paper from AccessData Group. The Future of Mobile E-Discovery A White Paper from AccessData Group The Future of Mobile E-Discovery Contents 1. The changing landscape of e-discovery 2. New expectations in the courtroom 3. Mobile discovery within corporations 4. MPE+

More information

Chapter 13: Repayment of All or Part of the Debts of an Individual with Regular Income ($235 filing fee, $39 administrative fee: Total fee $274)

Chapter 13: Repayment of All or Part of the Debts of an Individual with Regular Income ($235 filing fee, $39 administrative fee: Total fee $274) B 201A (Form 201A) (12/09) WARNING: Effective December 1, 2009, the 15-day deadline to file schedules and certain other documents under Bankruptcy Rule 1007(c) is shortened to 14 days. For further information,

More information

The Recover Report. It s business. But it s personal.

The Recover Report. It s business. But it s personal. The Recover Report It s business. But it s personal. Executive summary The Recover Report The perpetrators This report examines a sample of 150 data theft cases handled by Mishcon de Reya. Our research

More information