A Cybercrime Flashback: The Morris Worm Case Read more

A Cybercrime Flashback: The Morris Worm Case

Going back on a trip down memory lane… back when cyber criminals did short jail sentences followed by lucrative consulting gigs.  Times have changed and now hackers that are caught generally get longer sentences and are banned from working with computers.  In any event, Mr. Morris was convicted under the Computer Fraud and Abuse Act […]

Cybersecurity: Stuck Between Advanced Hackers, Government  Regulators, and Liability Read more

Cybersecurity: Stuck Between Advanced Hackers, Government Regulators, and Liability

Cyber attacks occur every second of every day. The frequency and sophistication of the attacks
continues to rise. With the increased sophistication and the proliferation of corporate espionage and nation-state actors, the days of curious teen hackers trying to prove their worth are behind us.
Now the threat is bigger and better financed, the stakes are higher, and government intervention changes the landscape. Cybersecurity
is now a top priority for businesses and government.

We start with a brief summary of some of the recent major cyber attacks. This list is purposely kept short as to show only the more “elite” type of attacks that are shaping the new cyber landscape.
Given their level of sophistication, these attacks frequently require in-depth analysis by computer forensics
experts
. Here, we are focusing on the legal aspects only.

Timeline of Advanced Cyber Attacks

Advanced Cyber Attacks of 2010: One Word: STUXNET

Stuxnet makes clear that cyber attacks have escalated to new heights. The Stuxnet worm damaged Iranian uranium enrichment centrifuges. Stuxnet temporarily knocked out some of the
centrifuges at Iran’s Natanz nuclear facility. This caused a delay to Iran’s uranium enrichment program. This attack was very effective and stealthy, giving birth to the new cyber warfare.

Advanced Attacks of 2011

China: Its “Comment Group” penetrated the Diablo Canyon nuclear plant operated by Pacific Gas & Electric Co. The breach was reportedly facilitated through a breach of a senior nuclear
planner’s computer. There is no indication of intent to damage the target. Reconnaissance is …

Attorney Domingo J. Rivera wins Summary Judgment in Computer Trespass Case Read more

Attorney Domingo J. Rivera wins Summary Judgment in Computer Trespass Case

In another pioneer decision, attorney Domingo J. Rivera obtained summary judgment in a case involving an ex-husband accessing his
wife’s email and social network accounts without authorization.

There has been some discussion in the news about a Michigan man that
criminally charged with with accessing his wife’s computer accounts.  Some commentators have argued that utilizing the computer hacking statutes to prosecute these acts is overreaching, but so
far, the courts have provided little guidance on this issue.

Many Federal and State computer crime statutes provide not only criminal, but also civil remedies for the victims. Recently,
attorney Domingo Rivera handled one of these civil cases.  As is the case for many pioneering cases handled by attorney Domingo Rivera, this was a case that other attorneys expressed doubt about and that opposing counsel openly
minimized.

In this case, the opposing party claimed that the divorce property settlement agreement barred our client’s claims and filed a counterclaim against our client for breach of the agreement. We also
obtained summary judgment dismissing this claim against our client.

The Court not only agreed with the legal argument advance by attorney Domingo Rivera, but also granted summary judgment. 
Obtaining summary judgment means that we prevailed as a matter of law and that a trial to establish liability was not necessary.   The Court expertly discussed the standard for summary judgment:

In determining whether summary judgment is appropriate, the burden is placed on the …

U.S. v. Cassim: Domingo Rivera obtains first Federal “music piracy” jury trial defense victory Read more

U.S. v. Cassim: Domingo Rivera obtains first Federal “music piracy” jury trial defense victory

Today, a federal jury acquitted Adil Cassim who was represented by Domingo J. Rivera.  The United States Department of Justice had alleged that Adil Cassim was the leader of Rabid Neurosis (“RNS”).  On the DOJ website, the press release alleged that “according to the indictment, the defendants, led by Cassim for a period of time, […]

Computer Hacking and Unauthorized Access to Computer Networks: Curiosity Can Kill the Cat Read more

Computer Hacking and Unauthorized Access to Computer Networks: Curiosity Can Kill the Cat

Recently, we have encountered many instances of the following scenario… Often out of curiosity, an Internet website visitor may exceed his authorized access under his access login or
under the website’s terms of use.  Website access scripts are easily available online. Their use, however, may generate serious accusations of computer crime, specifically hacking and
unauthorized access.  Under cybercrime and computer laws, a conviction for computer hacking can carry 20 years to life in prison.

If you are accused of computer hacking or unauthorized access to a computer network a cyber crime and hacking  our computer hacking defense attorneys understand …

Cybercrime basics… Read more

Cybercrime basics…

The term “Cybercrime” is broadly defined to include any criminal activity committed on the internet.  Almost everyone has at least a basic understanding about online identity theft, probably the most common cybercrime.  However, there appears to be considerable confusion regarding some of the other basic cybercrimes and their definitions.  I recently visited the website of a firm where the terms phishing and spoofing were incorrectly used interchangeably! 

Some of the most common cybercrimes are: 

Email spoofing – The forgery of an e-mail header in a manner that the message appears to have originated from somewhere other …