NetSecLaw: Dedicated to events, news and trends in technology law. XML Feed

31.8.06

Suit to Proceed Against Law Firm for Hacking Into Internet Archive - Archive.org is a useful way to track what may have been published or altered on different dates and times

The Dread Pirate Bin Laden - How thinking of terrorists as pirates can help win the war on terror.

30.8.06

American Lawyer looks at the media outrage that bad publicity blanket C&D letters gather

29.8.06

Live View is a Java-based graphical forensics tool that creates a VMware virtual machine out of a raw (dd-style) disk image or physical disk. This allows the forensic examiner to "boot up" the image or disk and gain an interactive, user-level perspective of the environment, all without modifying the underlying image or disk. Because all changes made to the disk are written to a separate file, the examiner can instantly revert all of his or her changes back to the original pristine state of the disk.

The Foreign Intelligence Surveillance Act (FISA) can be used to monitor U.S. persons who engage in unlawful collection of classified or controlled information even if they are not acting on behalf of a foreign power - United States V Rosen & Weissman Decision

27.8.06

Man Gets 3 Years for 'Botnet' Attack from Jersey Dave

25.8.06

Investigator urges companies to report cybercrime

DFRWS 2006 - File Carving Challenge Results - Organized by Brian Carrier, Eoghan Casey and Wietse Venema

SSdeep: a tool for Identifying almost identical files using context triggered piecewise hashing by Jesse Kornblum - Jesse speaks on the issue in the CyberSpeak podcast

17.8.06

NSA eavesdropping program ruled unconstitutional - More from Daniel Solove

A recent (Aug. 1) holding from the U.S. District Court for the Middle District of Florida says that an employee who copies computer files prior to departing for a rival firm has not "exceed[ed] authorized access" as that key phrase is defined under the Computer Fraud and Abuse Act (CFAA). The court granted the defendant Speed's motion to dismiss the complaint, but gave Lockheed leave to amend. Lockheed Martin Corp. v. Speed, M.D. Fla., Case No. 6:05-cv-1580, 8/1/06

15.8.06

Dwayne Campbell v. Woodard Photographic, Inc., et al. - A computer usage policy advising employees that computer activities on a office system are monitored may trump any reasonable expectation of privacy that the employee may have even in third party services. In this case, the employer logged in to an employees password protected eBay account using an intercepted password.