5/17/2011. The. Why Do You Rob Banks? Targeting and Reconnaissance. New Pathways. ACCGNY Compliance Seminar. We re Not In Kansas Any More

Size: px
Start display at page:

Download "5/17/2011. The. Why Do You Rob Banks? Targeting and Reconnaissance. New Pathways. ACCGNY Compliance Seminar. We re Not In Kansas Any More"

Transcription

1 The Emerging Technology Compliance Risks ACCGNY Compliance Seminar Alex Simpson Eric M. Friedberg May 19, 2011 Why Do You Rob Banks? We re Not In Kansas Any More Anonymous Ready To Dump More HBGary s, Launch AnonLeaks Why Anonymous is attacking Visa, Gawker, Amazon, MasterCard, and PayPal. And what will happen next! DoD, Major Private Contractor Potentially Vulnerable in Cyber Attack HBGary s: DuPont, Other Firms Hit In Aurora Attack Targeting and Reconnaissance New Pathways Law Firms Public Relations Firms Other Related Parties 1

2 Spearphishing SQL Injection Day One Likely Day One State of Play C&C, Exfiltration made to resemble legitimate traffic: common ports and protocols Zero day malware, vast majority not detected by antivirus Malware incorporates randomly-generated information, to evade identification by signature or hash APT traffic encrypted or obfuscated Malware regularly updated Host-based malware may be packed or unpacked Response - Reverse-Engineering/Unpacking Law Enforcement Liaison Fuzzy and segment hashing Heuristics Keywords Signatures Exfiltration path 2

3 Web 2.0 Explosion The Big Three Links to Other Users Public Messages Private Messages Chat Photos Biographical Information Affiliations File Sharing People v. Fielding, 2010 WL (Cal.App. 3rd Dist., June 18, 2010). Geolocation 3

4 Can Be Key in Criminal Cases Investigating Anonymous Comments Traditional Technique of Following the Subpoena Chain Web Forum ISP Internet Subscribers After Jessica Binkerddrove under the influence and was involved in a 2007 car crash that killed her passenger, she and her defense attorney were hoping for probation. After the prosecutor produced photos from Jessica s MySpace page showing her partying with friends and wearing an outfit with a liquor company s T-shirt and bandoleers of shot glasses, the judge was convinced that she had shown no remorse for the tragedy and sentenced her to 5 years and 4 months in prison. Identifiable Accounts that Escape Anonymizers Evidence Gathering Murder Conviction Reversed for Failure to Properly Authenticate MySpace Pages The Maryland Court of Appeals reversed and remanded for a new trial the defendant's murder conviction for failing to properly authenticate MySpace pages. In a lengthy opinion, the Court found the trial judge abused his discretion in attempting to authenticate the social networking site's web pages of defendant's girlfriend through the lead investigator's testimony only. On the girlfriend's web page it stated, "FREE BOOZY!!!! JUST REMEMBER SNITCHES GET STITCHES!! U KNOW WHO YOU ARE!!" The defendant argued that the State failed to offer any extrinsic evidence describing MySpace, as well as indicating how the lead investigator obtained the pages in question and adequately linking both the profile and a posting threatening a key State's witness to the girlfriend. The Court found that the picture of the girlfriend, coupled with her birth date and location, were not sufficient "distinctive characteristics" on a MySpace profile to authenticate its printout. Court of Appeals decision - Griffin v. State, 2011 Md. LEXIS 226, (Md. Apr. 28, 2011) 4

5 Commonwealth v. Williams, 456 Mass. 857, 867, 926 N.E.2d 1162, (Mass., 2010.) Admission of MySpace instant messages intimidating a witness from an anonymous MySpace page purporting to be the page of the defendant s brother were not properly authenticated. [W]hile the foundational testimony established that the messages were sent by someone with access to [defendant s brother's] MySpace Web page, it did not identify the person who actually sent the communication. Nor was there expert testimony that no one other than Williams could communicate from that Web page. People v. Beckley, 185 Cal.App.4th 509, , 110 Cal.Rptr.3d 362, 365 (Cal.App. 2 Dist., 2010) Admission of MySpace photograph of witness flashing gang signs (to rebut her claim that she was not gang-affiliated) was error, because (i) the detective who downloaded the photograph could not testify from his personal knowledge that the photograph truthfully portrayed Fulmoreflashing the gang sign and... no expert testified that the picture was not a composite or faked photograph. Recent experience shows that digital photographs can be changed to produce false images....indeed, with the advent of computer software programs such as Adobe Photoshop it does not always take skill, experience, or even cognizance to alter a digital photo.... Even the Attorney General recognizes the untrustworthiness of images downloaded from the internet, quoting the court's warning in St. Clair v. Johnny's Oyster & Shrimp, Inc. (S.D.Tex.1999) 76 F.Supp.2d 773, 775that [a]nyone can put anything on the Internet. No web-site is monitored for accuracy and nothingcontained therein is under oath or even subject to independent verification absent underlying documentation. Moreover, the Court holds no illusions that hackers can adulterate the content of any web-site from any location at any time. Laying A Foundation for Authentication People v. Clevenstine, 68 A.D.3d 1448, 1448, 891 N.Y.S.2d 511, 514 (N.Y.A.D. 3rd Dept.,2009). Sustaining in rape case admission of MySpace instant messages where [i] both victims testified that they had engaged in instant messaging about sexual activities with defendant through the social networking site MySpace, [ii] an investigator from the computer crime unit of the State Police related that he had retrieved such conversations from the hard drive of the computer used by the victims, [iii] a legal compliance officer for MySpace explained that the messages on the computer disk had been exchanged by users of accounts created by defendant and the victims, and [iv] defendant's wife recalled the sexually explicit conversations she viewed in defendant's MySpace account while on their computer. Trace originating IP back to subject s computer Obtain subscriber information for the subject account Tie sent items to a PDA Time-line communications to book-end subject communication Get data for timeline from on-line repository or forensic review of hard drive, PDA Establish password-protected nature of the account Party to a communication testifies as to authenticity ESI Compliance Cloud Computing 5

6 Cloud Computing & Cloud Storage PRESERVATION CHALLENGES LINKS LINKS LINKS COMMENTS 6

7 Cloud Stack Contact Information Eric Friedberg Co-President, Stroz Friedberg Alex Simpson Vice President, General Counsel & Corporate Secretary, Reis, Inc x326 7

Domestic Violence Victims in Virginia

Domestic Violence Victims in Virginia An Informational Guide for Domestic Violence Victims in Virginia Understanding The Legal Process Department of Criminal Justice Services Victims Services Section June 2004 THE AGENCY The Department of

More information

Authentication of Cell Phone Text Messages

Authentication of Cell Phone Text Messages Authentication of Cell Phone Text Messages By Pierre Grosdidier Parties seeking to admit cell phone text messages at trial face two authentication challenges. They must show that the documents they seek

More information

Social Media in Litigation and E Discovery: Risks and Rewards

Social Media in Litigation and E Discovery: Risks and Rewards Page 1 of 9 Social Media in Litigation and E Discovery: Risks and Rewards By Robert McHale Date: May 16, 2012 Return to the article Given the ubiquity of social media in the modern world, it is little

More information

CERTIFIED FOR PUBLICATION APPELLATE DIVISION SUPERIOR COURT OF CALIFORNIA COUNTY OF ORANGE. THE PEOPLE, CASE No. 30-2009-304893

CERTIFIED FOR PUBLICATION APPELLATE DIVISION SUPERIOR COURT OF CALIFORNIA COUNTY OF ORANGE. THE PEOPLE, CASE No. 30-2009-304893 Filed 5/21/10 CERTIFIED FOR PUBLICATION APPELLATE DIVISION SUPERIOR COURT OF CALIFORNIA COUNTY OF ORANGE THE PEOPLE, CASE No. 30-2009-304893 Plaintiff and JUDGMENT ON APPEAL Respondent, from the SUPERIOR

More information

Social Media: Cutting Edge Evidence Questions. Presented by: Lawrence Morales II The Morales Firm, P.C. San Antonio, Texas

Social Media: Cutting Edge Evidence Questions. Presented by: Lawrence Morales II The Morales Firm, P.C. San Antonio, Texas Social Media: Cutting Edge Evidence Questions Presented by: Lawrence Morales II The Morales Firm, P.C. San Antonio, Texas The Three Commandments of Social Media Evidence #1: Thou Shalt Not Underestimate

More information

HABERN, O'NEIL & BUCKLEY Attorneys at Law (Not a Partnership) William T. Habern David P. O'Neil Sean R. Buckley

HABERN, O'NEIL & BUCKLEY Attorneys at Law (Not a Partnership) William T. Habern David P. O'Neil Sean R. Buckley HABERN, O'NEIL & BUCKLEY Attorneys at Law (Not a Partnership) William T. Habern David P. O'Neil Sean R. Buckley Huntsville Area Office: Toll Free: (888) 942-2376 Houston Area Office: P.O. Box 627 4300

More information

County Court Restraining Orders

County Court Restraining Orders Answers to Your Questions About County Court Restraining Orders Excellence in Customer Service Colorado Judicial Branch http://www.courts.state.co.us June 2002 CIVIL LAW In a civil case, the person seeking

More information

DELAWARE COUNTY TREATMENT COURT APPLICATION

DELAWARE COUNTY TREATMENT COURT APPLICATION DELAWARE COUNTY TREATMENT COURT APPLICATION Please read each question carefully before answering. Failure to complete this form accurately will delay the processing of your application. False or misleading

More information

Cybercrime: Protecting Your Digital Assets in Today's Threat Landscape

Cybercrime: Protecting Your Digital Assets in Today's Threat Landscape Cybercrime: Protecting Your Digital Assets in Today's Threat Landscape Presented by Rachel Ratcliff OM03 Saturday, 10/5/2013 9:30 AM - 10:45 AM Cybercrime: Protecting Your Digital Assets in Today s Threat

More information

Being a witness in a criminal trial

Being a witness in a criminal trial Being a witness in a criminal trial If you have been the victim of an offence, or a witness to that offence, you may be asked to make a formal statement. The judge who hears the case can use your statement

More information

Digital Forensics for Attorneys Overview of Digital Forensics

Digital Forensics for Attorneys Overview of Digital Forensics Lars Daniel,, EnCE, ACE, CTNS Digital Forensic Examiner Digital Forensics for Attorneys Overview of Digital Forensics Digital Forensics For Attorneys Overview of Digital Forensics Types of Digital Evidence

More information

Decades of Successful Sex Crimes Defense Contact the Innocence Legal Team Now

Decades of Successful Sex Crimes Defense Contact the Innocence Legal Team Now Criminal Court Felonies The U.S. has the highest rate of felony conviction and imprisonment of any industrialized nation. A felony crime is more serious than a misdemeanor, but the same offense can be

More information

Admissibility of Writings (Emails, Text Messages, etc.) **************

Admissibility of Writings (Emails, Text Messages, etc.) ************** Admissibility of Writings (Emails, Text Messages, etc.) ************** John Rubin UNC School of Government Rev d May 19, 2011 Admissibility of Electronic Writings: Some Questions and Answers* The defendant

More information

Your Criminal Justice System

Your Criminal Justice System Your Criminal Justice System Helpful Information for the Victims and Witnesses of Crime Provided by Kansas Attorney General Derek Schmidt Victims Services Division 120 SW 10th Ave, 2nd Floor Topeka, KS

More information

court. However, without your testimony the defendant might go unpunished.

court. However, without your testimony the defendant might go unpunished. Office of State Attorney Michael J. Satz VICTIM RIGHTS BROCHURE YOUR RIGHTS AS A VICTIM OR WITNESS: CRIMINAL JUSTICE PROCESS The stages of the criminal justice system are as follows: We realize that for

More information

Morgan County Prosecuting Attorney Debra MH McLaughlin

Morgan County Prosecuting Attorney Debra MH McLaughlin Morgan County Prosecuting Attorney Debra MH McLaughlin Directions: From Fairfax Street Entrance, Enter Main Door, turn Right through door, up the narrow staircase. Office is at top of steps. (Old Circuit

More information

Title 15 CRIMINAL PROCEDURE -Chapter 23 ALABAMA CRIME VICTIMS Article 3 Crime Victims' Rights

Title 15 CRIMINAL PROCEDURE -Chapter 23 ALABAMA CRIME VICTIMS Article 3 Crime Victims' Rights Section 15-23-60 Definitions. As used in this article, the following words shall have the following meanings: (1) ACCUSED. A person who has been arrested for committing a criminal offense and who is held

More information

A Victim s Guide to Understanding the Criminal Justice System

A Victim s Guide to Understanding the Criminal Justice System A Victim s Guide to Understanding the Criminal Justice System The Bartholomew County Prosecutor s Office Victim Assistance Program Prosecutor: William Nash 234 Washington Street Columbus, IN 47201 Telephone:

More information

Information for Crime Victims and Witnesses

Information for Crime Victims and Witnesses Office of the Attorney General Information for Crime Victims and Witnesses MARCH 2009 LAWRENCE WASDEN Attorney General Criminal Law Division Special Prosecutions Unit Telephone: (208) 332-3096 Fax: (208)

More information

FINAL ORDER REVERSING TRIAL COURT. Appellant, Joseph Pabon (herein Appellant ), appeals the Orange County Court s

FINAL ORDER REVERSING TRIAL COURT. Appellant, Joseph Pabon (herein Appellant ), appeals the Orange County Court s IN THE CIRCUIT COURT OF THE NINTH JUDICIAL CIRCUIT, IN AND FOR ORANGE COUNTY, FLORIDA APPELLATE CASE NO: 2011-AP-32 LOWER COURT CASE NO: 48-2010-MM-12557 JOSEPH PABON, vs. Appellant, STATE OF FLORIDA,

More information

Where can I get help after a sexual assault?

Where can I get help after a sexual assault? Sexual Assault What is assault? Assault is when someone uses force to hurt you. Slapping, kicking and pushing can be assault. Sometimes touching can be an assault. Threatening or trying to hurt someone

More information

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal WHITE PAPER SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM Why Automated Analysis Tools are not Created Equal SECURITY REIMAGINED CONTENTS Executive Summary...3 Introduction: The Rise

More information

Social Networking Websites and the People Limiter

Social Networking Websites and the People Limiter How to Use Social Networking Sites for Investigative Research: The What, Why and How By Carole Levitt, JD MLS & Mark Rosch Internet For Lawyers Why Bother with Social Media Research Social networking sites

More information

FLORIDA STATE UNIVERSITY POLICE DEPARTMENT Chief David L. Perry

FLORIDA STATE UNIVERSITY POLICE DEPARTMENT Chief David L. Perry FLORIDA STATE UNIVERSITY POLICE DEPARTMENT Chief David L. Perry 830 West Jefferson Street 850-644-1234 VICTIMS' RIGHTS BROCHURE YOUR RIGHTS AS A VICTIM OR WITNESS: ------- We realize that for many persons,

More information

Spear Phishing Attacks Why They are Successful and How to Stop Them

Spear Phishing Attacks Why They are Successful and How to Stop Them White Paper Spear Phishing Attacks Why They are Successful and How to Stop Them Combating the Attack of Choice for Cybercriminals White Paper Contents Executive Summary 3 Introduction: The Rise of Spear

More information

The support you should get if you are a victim of crime

The support you should get if you are a victim of crime The support you should get if you are a victim of crime This is an EasyRead booklet showing you what to do. About this booklet The Ministry of Justice wrote this information. This is an EasyRead guide

More information

CITY OF SALINA MUNICIPAL COURT DIVERSION INFORMATION AND APPLICATION

CITY OF SALINA MUNICIPAL COURT DIVERSION INFORMATION AND APPLICATION CITY OF SALINA MUNICIPAL COURT DIVERSION INFORMATION AND APPLICATION A diversion is a written agreement between the City Prosecutor and the defendant. During the diversion period, the prosecutor agrees

More information

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying

More information

Discovery Services WHITE PAPER. Lorraine v. Markel: Electronic Evidence 101

Discovery Services WHITE PAPER. Lorraine v. Markel: Electronic Evidence 101 Common Types of Electronically Stored Information Email: Rules 901(b)(1) (person with personal knowledge); 901(b)(3) (expert testimony or comparison with authenticated example); 901(b)(4) (distinctive

More information

Advocates Role in the Criminal Justice System ~~~~~ Presented by: Sandi Matheson

Advocates Role in the Criminal Justice System ~~~~~ Presented by: Sandi Matheson Advocates Role in the Criminal Justice System ~~~~~ Presented by: Sandi Matheson Advocates Role in the Criminal Justice System OBJECTIVES: Upon completion of this module participant will be able to: Understand

More information

Sexual Assault & The Juvenile Court Process A Guide for Victims/Survivors & Their Families

Sexual Assault & The Juvenile Court Process A Guide for Victims/Survivors & Their Families Sexual Assault & The Juvenile Court Process A Guide for Victims/Survivors & Their Families A publication of Connecticut Sexual Assault Crisis Services, Inc. 96 Pitkin Street v East Hartford, CT v 06108

More information

About DCJS. table of ContentS. ACknowleDgmentS. Introduction...2. Domestic Violence Defined...3. Plan for Your Safety...3

About DCJS. table of ContentS. ACknowleDgmentS. Introduction...2. Domestic Violence Defined...3. Plan for Your Safety...3 About DCJS The Virginia Department of Criminal Justice Services (DCJS) is a state agency whose mission is to improve the criminal justice system in Virginia s communities through effective training, partnerships,

More information

GETTING TO KNOW THE CRIMINAL JUSTICE SYSTEM

GETTING TO KNOW THE CRIMINAL JUSTICE SYSTEM Patricia A. DeAngelis District Attorney GETTING TO KNOW THE CRIMINAL JUSTICE SYSTEM AN OFFENSE IS COMMITTED There are three types of offenses that can be committed in New York State: VIOLATION MISDEMEANOR

More information

MANDATORY MINIMUM REPORT FIELD INTERVIEW PROTOCOL FOR U.S. ATTORNEY REPRESENTATIVE

MANDATORY MINIMUM REPORT FIELD INTERVIEW PROTOCOL FOR U.S. ATTORNEY REPRESENTATIVE Appendix F MANDATORY MINIMUM REPORT FIELD INTERVIEW PROTOCOL FOR U.S. ATTORNEY REPRESENTATIVE Introductory Statement Hello, we are from the U.S. Sentencing Commission and are visiting your office today

More information

RULES OF SUPREME COURT OF VIRGINIA PART THREE A CRIMINAL PRACTICE AND PROCEDURE APPENDIX

RULES OF SUPREME COURT OF VIRGINIA PART THREE A CRIMINAL PRACTICE AND PROCEDURE APPENDIX RULES OF SUPREME COURT OF VIRGINIA PART THREE A CRIMINAL PRACTICE AND PROCEDURE APPENDIX Form 6. Suggested Questions to Be Put by the Court to an Accused Who Has Pleaded Guilty (Rule 3A:8). Before accepting

More information

The Witness and the Justice System in Alberta

The Witness and the Justice System in Alberta The Witness and the Justice System in Alberta Introduction This booklet provides basic information about appearing as a witness in the courts of Alberta. It is designed to explain your role as a witness,

More information

Understanding Consent to Sexual Activity. Public Legal Education and Information Service of New Brunswick

Understanding Consent to Sexual Activity. Public Legal Education and Information Service of New Brunswick Understanding Consent to Sexual Activity Public Legal Education and Information Service of New Brunswick NO means NO Understanding Consent to Sexual Activity This pamphlet provides information on what

More information

CRIME VICTIM ASSISTANCE STANDARDS

CRIME VICTIM ASSISTANCE STANDARDS V I C T I M S E R V I C E S D I V I S I O N Texas Department of Criminal Justice Victim Services Division CRIME VICTIM ASSISTANCE STANDARDS Developed and distributed by the The Texas Crime Victim Clearinghouse

More information

TOP TEN TIPS FOR WINNING YOUR CASE IN JURY SELECTION

TOP TEN TIPS FOR WINNING YOUR CASE IN JURY SELECTION TOP TEN TIPS FOR WINNING YOUR CASE IN JURY SELECTION PRESENTED BY JEFF KEARNEY KEARNEY & WESTFALL 2501 PARKVIEW STREET, SUITE 300 FORT WORTH, TEXAS 76102 (817) 336-5600 LUBBOCK CRIMINAL DEFENSE LAWYERS

More information

HOW TO OBTAIN AND POST AN IMMIGRATION BOND: A Guide for Non-Citizens in Detention

HOW TO OBTAIN AND POST AN IMMIGRATION BOND: A Guide for Non-Citizens in Detention HOW TO OBTAIN AND POST AN IMMIGRATION BOND: A Guide for Non-Citizens in Detention January 2011 1 AM I ELIGIBLE FOR A BOND? Figuring out whether or not you are eligible for a bond is a very complicated

More information

How will I know if I have to give evidence in court?

How will I know if I have to give evidence in court? Being a Witness What is a witness? A witness is a person who is required to come to court to answer questions about a case. The answers a witness gives in court are called evidence. Before giving evidence,

More information

A Summary of Virginia s Crime Victim and Witness Rights Act

A Summary of Virginia s Crime Victim and Witness Rights Act A Summary of Virginia s Crime Victim and Witness Rights Act Your Rights and Responsibilities Department of Criminal Justice Services Victims Services Section December 2008 www.dcjs.virginia.gov Table of

More information

IN THE IOWA DISTRICT COURT FOR WOODBURY COUNTY. WRITTEN PLEA OF GUILTY AND WAIVER OF RIGHTS (OWI First Offense)

IN THE IOWA DISTRICT COURT FOR WOODBURY COUNTY. WRITTEN PLEA OF GUILTY AND WAIVER OF RIGHTS (OWI First Offense) IN THE IOWA DISTRICT COURT FOR WOODBURY COUNTY THE STATE OF IOWA, Plaintiff, vs. Defendant. CRIMINAL NO. WRITTEN PLEA OF GUILTY AND WAIVER OF RIGHTS (OWI First Offense) COMES NOW the above-named Defendant

More information

BEADLE COUNTY PROCEDURES AND POLICIES FOR PROSECUTION OF SEXUAL ASSAULT CASES

BEADLE COUNTY PROCEDURES AND POLICIES FOR PROSECUTION OF SEXUAL ASSAULT CASES BEADLE COUNTY PROCEDURES AND POLICIES FOR PROSECUTION OF SEXUAL ASSAULT CASES I. Policy Statement A. Overview South Dakota prosecutors have made significant strides in the prosecution of sexual assault

More information

JUVENILES AND THE LAW

JUVENILES AND THE LAW JUVENILES AND THE LAW When Are You a Juvenile and When Are You an Adult? The answer to this question is complicated because, under Missouri law, when you are considered an adult and when you are considered

More information

The Rights of Crime Victims in Texas

The Rights of Crime Victims in Texas The Rights of Crime Victims in Texas 1 Housekeeping Please turn off cell phones and pagers or place in a silent mode. Questions can be answered in presentations or during break. 2 Constitutional Rights

More information

Confrontation in Domestic Violence Litigation: What Every New Attorney Should Know about the Necessity of Victim Participation

Confrontation in Domestic Violence Litigation: What Every New Attorney Should Know about the Necessity of Victim Participation Confrontation in Domestic Violence Litigation: What Every New Attorney Should Know about the Necessity of Victim Participation By: Michael D. Dean i Those experienced in domestic violence litigation are

More information

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015 Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders

More information

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent

More information

Information For Defendants About Getting A Court-Appointed Attorney

Information For Defendants About Getting A Court-Appointed Attorney Information For Defendants About Getting A Court-Appointed Attorney If you are charged with a criminal offense and cannot afford to hire an attorney, you are entitled to a court-appointed attorney. May

More information

When E-Discovery Becomes Evidence

When E-Discovery Becomes Evidence Monday, June 11, 2007 When E-Discovery Becomes Evidence Make sure that you can easily authenticate the information that was so costly to produce By Leonard Deutchman Special to the Law Weekly A federal

More information

Victim/Witness Security and Protection

Victim/Witness Security and Protection REFERENCE GUIDE ON PROTECTING THE RIGHTS OF CHILD VICTIMS OF TRAFFICKING IN EUROPE Chapter 13 Victim/Witness Security and Protection 13.1 General principles Child victims who agree to testify should be

More information

Information for witnesses going to court

Information for witnesses going to court Information for witnesses going to court Useful telephone numbers Witness Service...440496 Victim Support...440496 Women s Refuge...08007 356836 (freephone) Citizen s Advice Bureau...08007 350249 (freephone)

More information

Your Guide to Illinois Traffic Courts

Your Guide to Illinois Traffic Courts Consumer Legal Guide Your Guide to Illinois Traffic Courts Presented by the Illinois Judges Association and the Illinois State Bar Association Illinois Judges Association Traffic courts hear more cases

More information

AN INTRODUCTION COURT. Victim Services Department of Justice

AN INTRODUCTION COURT. Victim Services Department of Justice AN INTRODUCTION TO COURT Victim Services Department of Justice TABE OF CONTENTS 1. INTRODUCTION......1 2. FIING A POICE REPORT...1 3. COURT PROCESS......2 4. TESTIFYING IN COURT...5 5. COMMONY ASKED QUESTIONS...6

More information

Admissibility of Digital Photographs in Criminal Trials

Admissibility of Digital Photographs in Criminal Trials Admissibility of Digital Photographs in Criminal Trials Keith Hodges, Senior Instructor, Keith.Hodges@dhs.gov Federal Law Enforcement Training Center Glynco, GA 1 What we will discuss Digital photos captured

More information

The Indiana Coalition Against Domestic Violence

The Indiana Coalition Against Domestic Violence Evidentiary Issues in Domestic Cases: An Overview Introduction A. Importance of legal representation in cases that involve domestic violence. B. History of protection order laws and implications for evidence.

More information

Backoff: New Point of Sale Malware. 31 July 2014. National Cybersecurity and Communications Integration Center

Backoff: New Point of Sale Malware. 31 July 2014. National Cybersecurity and Communications Integration Center Backoff: New Point of Sale Malware 31 July 2014 National Cybersecurity and Communications Integration Center Contents: Executive Summary... 3 Analytic Overview... 3 Capabilities... 3 Variants... 4 Command

More information

23 A.3d 818 (Conn.App. 2011), 31581, State v. Eleck Page 818 23 A.3d 818 (Conn.App. 2011) 130 Conn.App. 632 STATE of Connecticut v. Robert ELECK. No.

23 A.3d 818 (Conn.App. 2011), 31581, State v. Eleck Page 818 23 A.3d 818 (Conn.App. 2011) 130 Conn.App. 632 STATE of Connecticut v. Robert ELECK. No. 23 A.3d 818 (Conn.App. 2011), 31581, State v. Eleck Page 818 23 A.3d 818 (Conn.App. 2011) 130 Conn.App. 632 STATE of Connecticut v. Robert ELECK. No. 31581. Court of Appeals of Connecticut. August 9, 2011

More information

10/11/2012. Digital Forensics for Attorneys - Part 2. Digital Forensics For Attorneys. Experts. Larry E. Daniel, EnCE, DFCP, BCE

10/11/2012. Digital Forensics for Attorneys - Part 2. Digital Forensics For Attorneys. Experts. Larry E. Daniel, EnCE, DFCP, BCE Larry E. Daniel, EnCE, DFCP, BCE Digital Forensics for Attorneys - Part 2 Experts, Analysis, Challenging Evidence Digital Forensics For Attorneys Part I Overview of Digital Forensics Types of Digital Evidence

More information

INFORMATION FOR CRIME VICTIMS AND WITNESSES CHARLES I. WADAMS PROSECUTING ATTORNEY

INFORMATION FOR CRIME VICTIMS AND WITNESSES CHARLES I. WADAMS PROSECUTING ATTORNEY INFORMATION FOR CRIME VICTIMS AND WITNESSES CHARLES I. WADAMS PROSECUTING ATTORNEY Garden City, Idaho 6015 Glenwood St., Garden City, ID 83714 (208) 472-2900 www.gardencityidaho.org A MESSAGE Garden City

More information

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail. Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.com Why should we care about CYBER CRIME & CYBER SECURITY? Clarification

More information

The National Criminal Justice Trial Competition Co-Sponsored By American Bar Association and The John Marshall Law School

The National Criminal Justice Trial Competition Co-Sponsored By American Bar Association and The John Marshall Law School The National Criminal Justice Trial Competition Co-Sponsored By American Bar Association and The John Marshall Law School 2016 QUESTIONS SUBMITTED WITH ANSWERS A 2016 Casefile (revised), exhibit 3 (a-e)

More information

Glossary of Terms Acquittal Affidavit Allegation Appeal Arraignment Arrest Warrant Assistant District Attorney General Attachment Bail Bailiff Bench

Glossary of Terms Acquittal Affidavit Allegation Appeal Arraignment Arrest Warrant Assistant District Attorney General Attachment Bail Bailiff Bench Glossary of Terms The Glossary of Terms defines some of the most common legal terms in easy-tounderstand language. Terms are listed in alphabetical order. A B C D E F G H I J K L M N O P Q R S T U V W

More information

Please Step Out of The Car

Please Step Out of The Car Urban Survival Guide: Please Step Out of The Car A Step by Step Guide Through The Los Angeles DUI & DMV Process MR DUI LA Attorney Mark Rosenfeld The Law Office of Mark Rosenfeld 800-9700-DUI (384) MRDUILA.com

More information

Overcoming Potential Legal Challenges to the Authentication of Social Media Evidence

Overcoming Potential Legal Challenges to the Authentication of Social Media Evidence Overcoming Potential Legal Challenges to the Authentication of Social Media Evidence Overcoming Potential Legal Challenges to the Authentication of Social Media Evidence By John Patzakis 1 Summary: Social

More information

ETHICAL USE OF EVIDENCE DERIVED FROM MULTIPLE SOCIAL MEDIA OUTLETS

ETHICAL USE OF EVIDENCE DERIVED FROM MULTIPLE SOCIAL MEDIA OUTLETS ETHICAL USE OF EVIDENCE DERIVED FROM MULTIPLE SOCIAL MEDIA OUTLETS ASSOCIATION OF CORPORATE COUNSEL PARALEGAL INSTITUTE OCTOBER 7, 2014 Presented by: Mitchell D. Dean, Esq. Heather E. Paradis, Esq. Daley

More information

Criminal Justice System Commonly Used Terms & Definitions

Criminal Justice System Commonly Used Terms & Definitions Criminal Justice System Commonly Used Terms & Definitions A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Accused: Acquittal: Adjudication: Admissible Evidence: Affidavit: Alford Doctrine: Appeal:

More information

GETTING THROUGH THE CRIMINAL JUSTICE SYSTEM

GETTING THROUGH THE CRIMINAL JUSTICE SYSTEM GETTING THROUGH THE CRIMINAL JUSTICE SYSTEM ARREST An ARREST starts the criminal justice process. It is called an arrest whether the police officer hands you a summons or puts handcuffs on you and takes

More information

Attending Court as a Witness

Attending Court as a Witness Attending Court as a Witness 2006 Attending Court as a Witness This booklet is also available in the following languages: - Arabic - French - Irish - Latvian - Lithuanian - Mandarin - Polish - Russian

More information

Incident Response. Six Best Practices for Managing Cyber Breaches. www.encase.com

Incident Response. Six Best Practices for Managing Cyber Breaches. www.encase.com Incident Response Six Best Practices for Managing Cyber Breaches www.encase.com What We ll Cover Your Challenges in Incident Response Six Best Practices for Managing a Cyber Breach In Depth: Best Practices

More information

Alert (TA14-212A) Backoff Point-of-Sale Malware

Alert (TA14-212A) Backoff Point-of-Sale Malware Alert (TA14-212A) Backoff Point-of-Sale Malware Original release date: July 31, 2014 Systems Affected Point-of-Sale Systems Overview This advisory was prepared in collaboration with the National Cybersecurity

More information

The Juvenile and Domestic Relations District Court

The Juvenile and Domestic Relations District Court The Juvenile and Domestic Relations District Court I. General Information The juvenile and domestic relations district court handles cases involving: Juveniles accused of delinquent acts, traffic infractions

More information

DOMESTIC VIOLENCE IN FLORIDA

DOMESTIC VIOLENCE IN FLORIDA DOMESTIC VIOLENCE IN FLORIDA The Petitioner may go to court on his/her own (without an attorney) to petition for an injunction to protect him/her against domestic violence (assault or battery by your spouse

More information

SUPERIOR COURT OF CALIFORNIA, COUNTY OF IMPERIAL. People v. Case No. Advisement of Rights, Waiver, and Plea Form

SUPERIOR COURT OF CALIFORNIA, COUNTY OF IMPERIAL. People v. Case No. Advisement of Rights, Waiver, and Plea Form SUPERIOR COURT OF CALIFORNIA, COUNTY OF IMPERIAL People v. Case No. Advisement of Rights, Waiver, and Plea Form Vehicle Code 23152 Fill out this form if you wish to plead guilty or no contest to the charges

More information

Information about the Criminal Justice System**

Information about the Criminal Justice System** 1 Victim s Guide to the Nebraska Criminal Justice System Information about the Criminal Justice System** ** Please note that the information contained in this booklet is only in relationship to felony

More information

Social Media and E-Discovery: New Tools and New Challenges

Social Media and E-Discovery: New Tools and New Challenges Social Media and E-Discovery: New Tools and New Challenges WHITE PAPER Social Media and E-Discovery: New Tools and New Challenges By Nadine R. Weiskopf According to a recent survey by Arbitron Inc., the

More information

Orders of Protection

Orders of Protection Orders of Protection Hotline: (212) 343-1122 www.liftonline.org This guide answers questions that you may have if an order of protection has been filed against you in Criminal Court or Family Court. The

More information

CHARGED with a CRIME What YOU

CHARGED with a CRIME What YOU YOU VE been CHARGED with a CRIME What YOU NEED to KNOW Visit the Alberta Justice website at: www.justice.alberta.ca This booklet is intended to provide general information only. If you require specific

More information

Enterprise Incident Response: Network Intrusion Case Studies and Countermeasures

Enterprise Incident Response: Network Intrusion Case Studies and Countermeasures Enterprise Incident Response: Network Intrusion Case Studies and Countermeasures Eric J. Eifert Vice President, Cyber Defense Division ManTech s Mission, Cyber, & Technology Solutions Presentation Overview

More information

This opinion will be unpublished and may not be cited except as provided by Minn. Stat. 480A.08, subd. 3 (2012).

This opinion will be unpublished and may not be cited except as provided by Minn. Stat. 480A.08, subd. 3 (2012). This opinion will be unpublished and may not be cited except as provided by Minn. Stat. 480A.08, subd. 3 (2012). STATE OF MINNESOTA IN COURT OF APPEALS A13-0397 Glenford Henry Williamson, II, petitioner,

More information

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms Overview Common Internet Threats Tom Chothia Computer Security, Lecture 19 Phishing Sites Trojans, Worms, Viruses, Drive-bydownloads Net Fast Flux Domain Flux Infiltration of a Net Underground economy.

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

Stages in a Capital Case from http://deathpenaltyinfo.msu.edu/

Stages in a Capital Case from http://deathpenaltyinfo.msu.edu/ Stages in a Capital Case from http://deathpenaltyinfo.msu.edu/ Note that not every case goes through all of the steps outlined here. Some states have different procedures. I. Pre-Trial Crimes that would

More information

YOU VE been CHARGED. with a CRIME What YOU. NEED to KNOW. Justice

YOU VE been CHARGED. with a CRIME What YOU. NEED to KNOW. Justice YOU VE been CHARGED with a CRIME What YOU NEED to KNOW Justice 1 This booklet is intended to provide general information only. If you require specific legal advice, please consult the appropriate legislation

More information

IN THE COURT OF APPEALS OF INDIANA

IN THE COURT OF APPEALS OF INDIANA Pursuant to Ind. Appellate Rule 65(D, this Memorandum Decision shall not be regarded as precedent or cited before any court except for the purpose of establishing the defense of res judicata, collateral

More information

U. S. Attorney Office Northern District of Texas March 2013

U. S. Attorney Office Northern District of Texas March 2013 U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate

More information

An Introduction to the Federal Public Defender=s Office and the Federal Court System

An Introduction to the Federal Public Defender=s Office and the Federal Court System Some Things You Should Know An Introduction to the Federal Public Defender=s Office and the Federal Court System Office of the Federal Public Defender Southern District of West Virginia 300 Virginia Street

More information

COMMUNITY PROTOCOL FOR DOMESTIC VIOLENCE CASES

COMMUNITY PROTOCOL FOR DOMESTIC VIOLENCE CASES COMMUNITY PROTOCOL FOR DOMESTIC VIOLENCE CASES PURPOSE: The County Attorney, Sheriff, Police Chief, Court Service Officer and DV Agency have mutually agreed upon this community protocol to encourage the

More information

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some

More information

FROM CHARGE TO TRIAL: A GUIDE TO CRIMINAL PROCEEDINGS

FROM CHARGE TO TRIAL: A GUIDE TO CRIMINAL PROCEEDINGS FROM CHARGE TO TRIAL: A GUIDE TO CRIMINAL PROCEEDINGS If you are experiencing, or have experienced, domestic violence and/or sexual violence there are a number of ways the law can protect you. This includes

More information

This opinion will be unpublished and may not be cited except as provided by Minn. Stat. 480A.08, subd. 3 (2014).

This opinion will be unpublished and may not be cited except as provided by Minn. Stat. 480A.08, subd. 3 (2014). This opinion will be unpublished and may not be cited except as provided by Minn. Stat. 480A.08, subd. 3 (2014). STATE OF MINNESOTA IN COURT OF APPEALS A14-0553 State of Minnesota, Respondent, vs. Darrell

More information

NORTH CAROLINA COURT OF APPEALS. Filed: 19 October 2004. v. Onslow County Nos. 02 CRS 56365-67, DALLAS EUGENE CLARK 56470

NORTH CAROLINA COURT OF APPEALS. Filed: 19 October 2004. v. Onslow County Nos. 02 CRS 56365-67, DALLAS EUGENE CLARK 56470 An unpublished opinion of the North Carolina Court of Appeals does not constitute controlling legal authority. Citation is disfavored, but may be permitted in accordance with the provisions of Rule 30(e)(3)

More information

YOUR CONTACT DETAILS (ADDRESS, PHONE, EMAIL etc.):

YOUR CONTACT DETAILS (ADDRESS, PHONE, EMAIL etc.): Justice WA YOUR NAME: YOUR CONTACT DETAILS (ADDRESS, PHONE, EMAIL etc.): TODAY S DATE: INDICATE WHO IS COMPLETING THIS FORM: Defendant Family Member of Defendant (Relationship : ) Friend of Defendant Other:

More information

Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation

Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation Computer Forensics and Digital Investigation Computer Security EDA263, lecture 14 Ulf Larson Lecture outline! Introduction to Computer Forensics! Digital investigation! Conducting a Digital Crime Scene

More information

2014 ANNUAL REPORT DISTRICT ATTORNEY WASHINGTON COUNTY

2014 ANNUAL REPORT DISTRICT ATTORNEY WASHINGTON COUNTY 2014 ANNUAL REPORT DISTRICT ATTORNEY WASHINGTON COUNTY 2014 Annual Report presented in April 2015 FUNCTIONS AND RESPONSIBILITIES The primary function of the Office of the District Attorney is to prosecute

More information

Going to Court as a Witness

Going to Court as a Witness Going to Court as a Witness - July 2010 Going to Court as a Witness 1 Introduction Going to court can be stressful for many victims and witnesses. If you need to give evidence in a criminal trial, we hope

More information

Subchapter 6.600 Criminal Procedure in District Court

Subchapter 6.600 Criminal Procedure in District Court Subchapter 6.600 Criminal Procedure in District Court Rule 6.610 Criminal Procedure Generally (A) Precedence. Criminal cases have precedence over civil actions. (B) Pretrial. The court, on its own initiative

More information

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop

More information