Blog Posts Tagged with "Investigation"

69dafe8b58066478aea48f3d0f384820

Feds Want Supreme Court to Allow Warrantless GPS Tracking

April 20, 2011 Added by:Headlines

The court of appeals’ decision seriously impedes the government’s use of GPS devices at the beginning of an investigation when officers are gathering evidence to establish probable cause and provides no guidance on the circumstances under which officers must obtain a warrant...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hacker and Alleged Anonymous Member Arrested

April 13, 2011 Added by:Headlines

The charges stem from statements the hacker made April 1st on a French television program where he bragged about hacking into networks belonging to the French Army and defense contractor the Thales Group, and then claiming he also sold stolen information on Internet black markets...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NSA Joins Nasdaq Breach Investigation

March 30, 2011 Added by:Headlines

“By bringing in the NSA, that means they think they’re either dealing with a state-sponsored attack or it’s an extraordinarily capable criminal organization,” said the former head of U.S. counterintelligence Joel Brenner...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Judge Allows Access to WikiLeaker's Twitter Accounts

March 15, 2011 Added by:Headlines

US Magistrate Judge Theresa Buchanan has granted a Department of Justice request to access information in the Twitter accounts of WikiLeak's Julian Assange and several supporters in an ongoing criminal investigation of the whistleblower organization...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Palantir is on the Radar of Anonymous and Congress

March 02, 2011 Added by:Headlines

"A group of House Democrats is calling on Republican leaders to investigate a prominent Washington law firm and three federal technology contractors, who have been shown in hacked e-mails discussing a 'disinformation campaign' against foes of the U.S. Chamber of Commerce"...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Feds Employ Multiple Encryption Bypass Techniques

February 23, 2011 Added by:Headlines

"We believe we don't have the legal authority to force you to turn over your password unless we already know what the data is. It's a form of compulsory testimony that we can't do... Compelling people to turn over their passwords for the most part is a non-starter..."

Comments  (0)

972cda1e62b72640cb7ac702714a115f

Managing the Infosec Investigative Function

February 13, 2011 Added by:Kurt Aubuchon

Conducting effective investigations requires specialized knowledge, skills, and abilities. It is not necessarily the case that the Infosec analyst who can manage a tight network perimeter can also conduct a good investigation. Investigations are risky and politically sensitive affairs...

Comments  (0)

0c4ca84ec3f3f2d57194f8e0cbd5ba85

Case Management for Security Incident Investigators

January 20, 2011 Added by:Lindsay Walker

If 2010 was an indicator of the future of security related incidents in the workplace, something needs to change. It seems that, no matter how robust your corporate security program is, there's still no guarantee that information won't get leaked...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DOJ Gets Subpoenas for WikiLeaks Twitter Accounts

January 08, 2011 Added by:Headlines

The DOJ requested subpoenas to access the Twitter accounts of WikiLeaks and several supporters in an ongoing criminal investigation of the whistleblower organization. The information sought includes residential, email and IP addresses, session times, billing records, and bank account details...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

Five Important Fraud Investigation Interview Tips

December 03, 2010 Added by:Thomas Fox

A successful investigation interview isn’t just a question and answer period. Asking good questions is just a small piece of a very big puzzle. To get the most out of your fraud investigation interviews, remember these 5 important steps...

Comments  (0)

Page « < 1 - 2 - 3 > »