QuickBooks, Falsifying Business Records and Unanimity
After a jury convicted Karen S. White of one count of theft in the second degree in violation of Alaska Statutes § 11.46.130(a)(1) and one count of falsifying business records in violation of Alaska...
View ArticleWoW, Child Abuse and Murder
After a jury convicted her of “second-degree federal murder” and child abuse, and the judge sentenced her to twenty-five years in prison, Rebecca Christie appealed. U.S. v. Christie, __ F.3d __, 2013...
View ArticleThe Electronics Store, Burglary and the Laptops
After he was convicted of burglary in violation of California Penal Code § 459 and sentenced to four years in prison, Hoang V. Nguyen appealed. People v. Nguyen, __ Cal.Rptr.3d __, 2013 WL 3013535...
View ArticleRestitution, Retail Value and the Vet Clinic
After a jury convicted her of “computer crime and theft” in violation of Kansas law and was sentenced to a term of probation, Pamela Sue Hall appealed, on one particular issue. State v. Hall, __ P.3d...
View ArticleWiretaps, Real Estate and the Police Databases
This post examines a recent decision from the U.S. Court of Appeals for the 7th Circuit in a civil case: Seitz v. City of Elgin, __ F.3d __, 2013 WL 3176502 (2013). Debra Seitz and Greg Welter...
View ArticleFacebook, Arbitration and Miss Universe
This post examines an opinion a federal district court judgerecently issued in a civil case: Miss Universe, LLP v. Monnin, 2013 WL 3328241 (U.S. District Court for the Southern District of New York...
View ArticlePrivate Searches, the 4th Amendment and the Cell Phone
U.S. Air Force Technical Sergeant (E–6) Samuel A. Wicks is charged (in what I assume is a court-martial) withviolating a lawful general regulation by wrongfully attempting to develop and conduct...
View ArticleThe White House, the Cell Phone and Consent
Christine Wright–Darrisaw was, and presumably still is, charged with threatening “to kill the President of the United States in violation of 18 U.S. Code § 371” and making “false statements to a...
View ArticleFraud, Bolstering and the Laptop
After a jury convicted him “on all counts of a seventeen-count indictment charging mail fraud, wire fraud, bank fraud, and aggravated identity theft”, Steve Soto appealed his conviction to the...
View ArticleThe Police Officer, NCJIS and Exceeding Authorized Access
A superseding indictment returned by a federal grand jurycharges Kevin Cave “with intentionally exceeding authorized access to a protected computer for private financial gain in violation of §...
View ArticleUnauthorized Access, Email and Team Viewer
As I have noted in earlier posts, the general federal cybercrime statute – 18 U.S. Code § 1030– not only defines criminal offenses, it also, in 18 U.S. Code § 1030(g), creates a civil cause of action...
View ArticleConstructive Possession, Child Pornography and the .rar Files
Faiz Al–Khayyal was charged with with “49 counts of sexual exploitation of children in violation of [Georgia Code] §16–12–100(b)(8)], based upon allegations that he possessed and controlled child...
View ArticleMurder, Text Messages and the Motion in Limine
After he was “indicted on one count of Murder in the First Degree, two counts of Attempted Robbery in the First Degree, one count of Conspiracy in the Second Degree, and two counts of Possession of a...
View Article
More Pages to Explore .....