Blog Posts Tagged with "Search and Seizure"
May 02, 2012 Added by:Electronic Frontier Foundation
Most troubling is the collateral damage. The search warrant authorized seizure of emails, communications, and files on the server, and records of IP addresses connected to the server. And the server was used by a wide range of people who had nothing to do with the bomb threats...
April 05, 2012 Added by:Electronic Frontier Foundation
When it comes to the government's ability to search your electronic devices, we've always maintained that the border is not an "anything goes" zone. Recently, the Ninth Circuit Court of Appeals agreed to rehear a case that gave the government carte blanche...
February 02, 2012 Added by:Suzanne Widup
FDA whistleblowers allege their emails were monitored once they told Congress the agency was approving risky medical devices, violating their Constitutional rights. The FDA said that employees are warned they may be monitored, and should not have an expectation of privacy...
September 28, 2011 Added by:Headlines
It appears ICE targeted the sites because they contained links to live sport video streams, but the domain seizures impeded access to all of the content on the websites, including obviously non-infringing content like user-created forums, discussions, and technical tutorials...
July 19, 2011 Added by:Headlines
"Authorities have arrested 14 people today in the United States in connection with hacking attacks by the Anonymous group of online activists, sources said. The arrests follow raids earlier in the day on homes in New York, California, New Jersey, and Florida..."
June 28, 2011 Added by:Headlines
"Sometimes police can search your computer whether you like it or not, but sometimes they can't. We wrote this guide to help you tell the difference and to empower you to assert your rights when the police come knocking..."
June 20, 2011 Added by:Headlines
The Electronic Frontier Foundation (EFF), along with the American Civil Liberties Union (ACLU) and ACLU Vermont, urged the Vermont Supreme Court to reject prosecutors' demands to override a judge's instructions and allow a limitless warrant for a computer search...
June 01, 2011 Added by:Headlines
"The continual evolution in how people use electronic devices in their everyday lives creates growing tension between the Fourth Amendment guarantees and what historically has been viewed as a narrow exception to the requirements for probable cause and a warrant..."
April 25, 2011 Added by:Infosec Island Admin
They have the ability to conduct warrantless searches per the courts since the loosening of the laws on search and seizure in places like California and Michigan where electronic media is concerned. The net effect is that our due process rights are being eroded in an ever rapid pace...
April 21, 2011 Added by:Headlines
Infosec Island received a Twitter message from the Michigan State Police regarding an article about the MSP using data extraction devices to collect information from cell phones of motorists detained for minor traffic infractions. The official statement from the MSP is as follows...
April 20, 2011 Added by:Headlines
Complete extraction of existing, hidden, and deleted data, including call history, text messages, contacts, images, and allows visualization of existing and deleted locations on Google Earth. Location information from GPS devices and image geotags can be mapped on Google Maps...
April 07, 2011 Added by:Headlines
The U.S. Court of Appeals for the Ninth Circuit has ruled that electronic devices may be seized at the border, confiscated, searched, and even transported to a separate facility for forensic examination - all without need for a warrant demonstrating of due cause...
December 02, 2010 Added by:Anthony M. Freed
The Jester was angry enough with militants recruiting for jihad and about the WikiLeaks disclosures to launch a DoS attacks on their sites, so why was he not very peeved about an impostor using his name to scam money? The logical conclusion might be that The Jester himself is the hoaxer...
December 01, 2010 Added by:Headlines
There are unconfirmed reports that infamous anti-jihadi hacker The Jester (th3j35t3r), who earlier this week claimed responsibility for a denial of service attack that temporarily disabled the WikiLeaks website, was the subject of a search and equipment seizure by law enforcement...
November 29, 2010 Added by:Robert Gezelter
TSA has a mission to create a safe environment in the air; at the same time, passengers, flight crew, and airport personnel have a reasonable expectation that their short-term and long-term well-being, physical and psychological, will not be sacrificed in the process...
Wireless Home Technologies Create Security R... abdul bari Chanessra on 01-27-2015
Don’t Let Your Guard Down: Tragedies Pave ... Bryan Parker on 01-27-2015
The State of Obama Cybercare... Eden Connie on 01-26-2015