Forensic Update

Reflections on information management within the legal and regulatory arena

Archive for the ‘Information Security’ Category

Today’s #GoodGuysPrevail Update…

Posted by Johnny Lee on August 8, 2022

The U.S. Department of Justice recently charged six defendants in four separate crypto-related fraud cases:

  • the largest known #NFT scheme charged to date;
  • a global #Ponzi scheme involving unregistered securities;
  • a fraudulent #ICO; and
  • a fraudulent investment fund.

Like prior #GGP updates, these cases reflect the herculean efforts of coordinated #lawenforcement and #digitalforensic efforts. Kudos to the Federal Bureau of Investigation (FBI), the United States Attorneys’​ Offices, the Department of Homeland Security, Office of Inspector General.

If you believe that you are a victim of the Baller Ape Club, EmpiresX, TBIS, and Circle Society schemes, please visit the DOJ website for details on how to submit your “Victim Impact Statement” (and thereby register as a victim).

#ruleoflaw #fraudinvestigations #cybercrime #cryptoassets #digitalassettracing #digitalassetrecovery #forensicinvestigation #forensicaccounting #karma #AisA #digitalassets

Posted in Computer Forensics, cryptocurrency, Digital Assets, eDiscovery, Forensic Accounting, Information Security, Investigations, Privacy | Tagged: | Leave a Comment »

Today’s #GoodGuysPrevail Update…

Posted by Johnny Lee on August 4, 2022

The U.S. Department of Justice seized assets worth $500k USD from North Korean hackers targeting U.S.-based #healthcare organizations. The seized North Korean assets were either monies directly extorted from companies or monies used in laundering #ransomware payments.

In addition to the general #karma of this action, there was an object lesson about public-private sector collaborations as well. The prompt reporting by one healthcare victim allowed the Federal Bureau of Investigation (FBI) to identify a new strand of North Korean ransomware.

Of course, $500k is a pittance compared against the hundreds of millions of dollars stolen by North Korean cyber actors in recent years. Just the same, it’s important to trumpet the “wins” wherever we can find them.

justice #cyberfraud #statesponsored #northkorea #digitalforensics #lawenforcement #ruleoflaw #forensicinvestigation #cyber

Posted in Computer Forensics, cryptocurrency, CyberSecurity, Data Breach, Fraud, Information Security, Privacy, ransomware | Leave a Comment »

Today’s #GoodGuysPrevail Update…

Posted by Johnny Lee on April 13, 2022

While the use of the verb “forfeit” in the headline of this story may seem confusing, it’s a GREAT turn of events. Simply put, U.S. Department of Justice, Criminal Division prosecutors in the Southern District of Florida have secured one of the largest #cryptocurrency #forfeiture actions ever filed in this country.

0

This story really resonates with me, as it represents a rather elegant intersection of #cyber and #crypto. The forfeiture action netted about $34M in cryptocurrency, all tied to the illegal #darkweb activity of a South Florida resident — specifically, the sale of online account credentials.

Of additional interest is the method by which this case was brought. In yet another example of inter-agency collaboration among federal, state, and local #lawenforcement, the investigators “followed the money” through a tortuous path, owing to the target’s use of cryptocurrency “tumblers”, “chain hopping”, and other (failed) #moneylaundering techniques.

Kudos to the Internal Revenue Service‘s Criminal Investigation group, the Federal Bureau of Investigation (FBI), the U.S. Department of Homeland Security, the United States Postal Service Inspection Service, and the Drug Enforcement Administration for its combined investigative efforts here.

#ruleoflaw #digitalforensics #digitalassets #assettracing #assetrecovery #forensicinvestigation #justice #karma #AisA

Posted in Computer Forensics, CyberSecurity, Data Breach, eDiscovery, Forensic Accounting, Fraud, Information Security, Investigations | Comments Off on Today’s #GoodGuysPrevail Update…

Today’s #GoodGuysPrevail Update…

Posted by Johnny Lee on March 17, 2022

A mere 8 months after his (alleged) involvement in the Kaseya #ransomware attacks, a Ukrainian national has been extradited to the United States and been formally indicted in a Dallas courtroom. This is the way…

0

#ruleoflaw #justice #revil #cybercrime #fraud #extortion #lawenforcement #cyberfraud #digitalforensics #dfir #incidentresponse #cybersecurity #crimedoesntpay

Posted in Computer Forensics, CyberSecurity, Data Breach, Information Security, Investigations, Privacy | Comments Off on Today’s #GoodGuysPrevail Update…

Today’s #GoodGuysPrevail Update…

Posted by Johnny Lee on February 3, 2021

In yet another example of a globally coordinated #lawenforcement takedown, the #infrastructure of world’s “most dangerous malware” (#EMOTET) was disrupted last week.


#cybersecurity #computermalware #fraud #seizurelaw #ruleoflaw #dataprivacy #investigations #fraudinvestigations #dfir #digitalforensics #investigations

Posted in Computer Forensics, CyberSecurity, Data Breach, eDiscovery, Fraud, Information Security, Investigations | Comments Off on Today’s #GoodGuysPrevail Update…

Podcast Appearance…

Posted by Johnny Lee on January 29, 2021

I had a great deal of fun talking shop with my friends, Jodi & Justin Daniels, on their podcast: “She Said Privacy, He Said Security”…check it out if you have a few minutes.

Posted in Computer Forensics, CyberSecurity, Data Breach, Data Governance, ECM, eDiscovery, Fraud, Information Security, Investigations, Privacy | Comments Off on Podcast Appearance…

Today’s #GoodGuysPrevail Update…

Posted by Johnny Lee on November 5, 2020

Late last week, the U.S. Department of Justice and U.S. Secret Service secured the eigToday’s #GoodGuysPrevail Updateht-year conviction for a Russian national involved in a decade-long scheme to compromise computer devices, to broker in stolen #PII and banking credentials, and to defraud individuals at scale.

With calculated losses in excess of $100M USD, this conviction marks another example of the lengths that U.S. federal law enforcement will go to bring to justice criminal actors who victimize American citizens.

#fraud #privacy #fraudinvestigations #dataprivacy #digitalforensics #forensics #investigations #crimeandjustice #darkweb #ruleoflaw #cyberespionage #lawenforcement #consumerprotection #innovation #security #crime #cybersecurity #justice

Posted in Computer Forensics, CyberSecurity, Data Breach, Data Governance, eDiscovery, Fraud, Information Security, Investigations, Privacy | Comments Off on Today’s #GoodGuysPrevail Update…

Proud to join an august panel @ LegalTech 2018…

Posted by Johnny Lee on January 23, 2018

I am thrilled to be sharing the stage with Chris Dale, Meribeth Banischek, David Horrigan, and Rachi Messing to discuss cross-border data issues in investigations and compliance at #Legalweek18 … come join us for a lively discussion!

Details can be found here

Posted in CyberSecurity, Data Breach, Data Governance, ECM, eDiscovery, Forensic Accounting, Information Security, Investigations, Privacy, Records Retention | Comments Off on Proud to join an august panel @ LegalTech 2018…

Privacy + Security Forum…

Posted by Johnny Lee on August 31, 2017

Excited to represent Grant Thornton LLP and join Daniel Solove, Edward R. McNicholas, Jon Neiditz, Mauricio Paez, Liisa Thomas, Amanda Witt and a host of other luminaries and all-stars at the 2017 Privacy+Security Forum in Washington DC…

https://privacyandsecurityforum.com/

Posted in Computer Forensics, CyberSecurity, Data Breach, Data Governance, ECM, eDiscovery, Information Security, Privacy | Comments Off on Privacy + Security Forum…

Minimize Business Email Compromise risk in 6 steps…

Posted by Johnny Lee on December 11, 2016

…a mix of training, process & technology to strengthen controls.gt_logo

ow.ly/Gqzx304SvS0

Posted in CyberSecurity, Data Breach, Data Governance, ECM, Information Security, Investigations, Privacy, Records Retention | Comments Off on Minimize Business Email Compromise risk in 6 steps…

 
%d bloggers like this: