Tag Archives: NSA

Beware of Ransomware

Ransomware is malware that enters your computer and renders all your data useless by virtue of very sophisticated encryption. Then the victim sees a pop-up with with a ransom demand to be paid in bit coin currency. It is very real as I learned last week when the client of firm I do work for was hit by this menace to the tune of $750.00 worth of bit currency. The link below takes you to a very informative NPR piece that will explain the phenomenon far better than I can.

http://www.npr.org/blogs/alltechconsidered/2014/11/18/364730954/how-a-feud-between-two-russian-companies-fueled-a-spam-nation

Advertisements

Leave a comment

Filed under Uncategorized

Your internet activity

What goes on in process of mining of data.  Yahoo Chief Marissa Mayer discusses her concerns about going to prison should she decide to defy NSA requests for data.

http://news.yahoo.com/yahoo-ceo-fears-defying-nsa-could-mean-prison-013254457.html

Leave a comment

September 12, 2013 · 11:55 AM

Stuff I sometimes wish I had, but I’m glad I don’t.

The Huffington Post reports in this article http://www.huffingtonpost.com/2013/08/05/dea-surveillance-cover-up_n_3706207.html?ir=Politics&utm_campaign=080513&utm_medium=email&utm_source=Alert-politics&utm_content=Title that the DEA has a Special Operations Division (SOD) that collects tons of information into a database of roughly one billion items to establish and share tips and evidence among other agencies, including the NSA.  Read the article to get all the details because on summary on my part will not do it justice.

One of the things the article discusses is the creation of “parallel construction.”  According to the article,

“It’s just like laundering money – you work it backwards to make it clean,” said Finn Selander, a DEA agent from 1991 to 2008 and now a member of a group called Law Enforcement Against Prohibition, which advocates legalizing and regulating narcotics.

Some defense lawyers and former prosecutors said that using “parallel construction” may be legal to establish probable cause for an arrest. But they said employing the practice as a means of disguising how an investigation began may violate pretrial discovery rules by burying evidence that could prove useful to criminal defendants. 

Burying the source of evidence means that defendants may not be able to investigate its veracity.  If the source is an informant, a defendant cannot delve into the motivation of the informant.  I can tell you that from the standpoint of someone working on the defense side of things this can be a real problem.

There are many days when I wish I could access phone records with just a few key strokes.  However, I can get something through public records, a witness volunteering information or the issuance of a subpoena, I can’t violate someone’s rights and when you score that tidbit of information that has meaning in a case you get a tremendous sense of accomplishment.

Leave a comment

Filed under Uncategorized