How Law Enforcement Uses ANOM and Other Encrypted Devices

Anom, which was advertised as “designed by criminals for criminals,” was supposed to be the newest encrypted device service of the criminal underworld. What it turned out of be, however, was a device the FBI used to monitor, investigate, and understand criminal enterprises around the globe at a level never seen before. In an investigation…

Read Full Article

Money Laundering and “Cybercrime” Charges Brought Against QQAAZZ

The Department of Justice recently announced the unsealing of indictments in the Western District of Pennsylvania against 20 individuals for conspiring to launder money and commit computer fraud. The defendants located throughout 5 European countries allegedly laundered or attempted to launder tens of millions of dollars stolen from victims of cybercrime as members of the QQAAZZ organization. …

Read Full Article

What is a Geofence Warrant and is it Constitutional?

Based on a recent federal district court decision, “geofence search warrants” for Google location data are subject to being challenged as an unconstitutional violation of privacy. The judge in that case refused to grant the warrant because it was too broad and violated the Fourth Amendment protection against unreasonable government searches and seizures. What is…

Read Full Article

Operation Wire Wire is an aggressive move against federal computer crimes

This week, the Department of Justice announced in a press release that an international law enforcement operation, Operation Wire Wire, resulted in the arrest of 74 individuals, including 42 people in the United States. The government is accusing these people of committing “cyber-enabled fraud” by sending misleading emails to businesses and individuals that trick them…

Read Full Article

Some computer searches may be unconstitutional

In today’s electronic world, law enforcement officials investigating crimes often seek warrants to search and seize electronic devices that they believe contain incriminating evidence. However, people also store highly personal information on their electronic devices, from memories to entire conversations. Most of this electronically stored information is often irrelevant to the crimes being investigated, but…

Read Full Article
Our Blog