• Home
  • About Me
  • Disclaimer

The Researching Paralegal

~ Articles and Research for Legal Professionals

The Researching Paralegal

Category Archives: Fraud

“Smart” Cars and Hackers – We Should Have Seen This One Coming.

06 Wednesday Apr 2016

Posted by Celia C. Elwell, RP in Computer Forensics, Computer Fraud and Abuse Act, Cybersecurity, Identity Theft

≈ Comments Off on “Smart” Cars and Hackers – We Should Have Seen This One Coming.

Tags

Automobile Security, beSpacific Blog., Hackers, Priivacy, Sabrina I. Pacifici

Markey Report Reveals Automobile Security and Privacy Vulnerabilities, by Sabrina I. Pacifici, BeSpacific Blog

http://www.bespacific.com/markey-report-reveals-automobile-security-privacy-vulnerabilities/

New standards are needed to plug security and privacy gaps in our cars and trucks, according to a report released today by Senator Edward J. Markey (D-Mass.). The report, called Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk and first reported on by CBS News’ 60 Minutes, reveals how sixteen major automobile manufacturers responded to questions from Senator Markey in 2014 about how vehicles may be vulnerable to hackers, and how driver information is collected and protected. . . .

Continue reading →

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

10 Top Law-Related TED Videos.

20 Sunday Jul 2014

Posted by Celia C. Elwell, RP in Bad Legal Writing, Computer Forensics, Computer Fraud and Abuse Act, Computer Virus, Copyright, Criminal Law, Cybersecurity, Digital Millenium Copyright Act, Discovery, Encryption, Evidence, Finance and Banking Law, Fraud, Google, Government, Identity Theft, Intellectual Property, Law Office Management, Legal Technology, Legal Writing, Legalese, Malware, Management, Patent Law, PC Computers, Plain Language, Presentations, Search Engines, Trial Tips and Techniques, Trojans, Video

≈ Comments Off on 10 Top Law-Related TED Videos.

Tags

Copyright, Crime, Eyewitness, Fashion Industry, Government, Internet, Legal Productivity Blog, Legalese, Patent Troll, Plain Language, TED, Tim Baran

Top 10 Legal TED Talks, by Tim Baran, Legal Productivity Blog

http://www.legalproductivity.com/op-ed/top-10-legal-ted-talks/

Have you heard of TED? It began in 1984 as a conference and now covers a wide range of topics in more than 100 languages.  Think of it as a massive brain trust that shares great ideas and information.

Each of the law-related TED talks listed in this article are worthwhile on their own: (1) four ways to fix a broken legal system; (2) eliminate legalese by using plain English; (3) how to beat a patent troll; (4) how the Internet will change government; (5) laws that choke creativity; (6) copyright law; (7) why eyewitnesses get it wrong; (8) how technology could make crime worse; (9) the Internet and anonymity online; and (10) how great leaders inspire. -CCE

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

The Hole In Mobile Security Making Your Phone An Easy Target.

15 Sunday Jun 2014

Posted by Celia C. Elwell, RP in Android Phones, Cell Phones, Cybersecurity, Encryption, Fraud, Identity Theft, iPad, iPhones, Legal Technology, Malware, Tablets

≈ Comments Off on The Hole In Mobile Security Making Your Phone An Easy Target.

Tags

All Tech Considered, Apple, AT&T, Comcast, Dave Porcello, Encryption, Facebook, Google, Hackers, Internet, Mobile Phones, NPR, Pwn Plug, Sean Gallagher, Security, Starbucks, Steve Henn, Twitter, Wi-Fi, Yahoo

Here’s One Big Way Your Mobile Phone Could Be Open To Hackers, by Steve Henn, All Tech Considered, NPR

http://tinyurl.com/l2re8ll

Despite the fact that every major Internet provider has added some kind of encryption to its services over the past year, tracking your online traffic is easier than you think.

And you don’t have to be the target of the hacker or the NSA for your traffic to be intercepted. There is a hole in mobile security that could make tens of millions of Americans vulnerable.

Unsecure Wi-Fi networks have been a well-known vulnerability in the tech industry for years. They can let even the most unsophisticated hacker capture your traffic and possibly steal your identity. . . .

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

A Double Treat – Two-Part Posts On Cybersecurity and Outsourcing From Ralph Losey.

19 Monday May 2014

Posted by Celia C. Elwell, RP in Computer Fraud and Abuse Act, Computer Virus, Confidentiality, Document Retention, Emails, Encryption, Heartbleed, Law Office Management, Legal Ethics, Legal Technology, Malpractice, Malware, Technology, Technology, Trojans

≈ Comments Off on A Double Treat – Two-Part Posts On Cybersecurity and Outsourcing From Ralph Losey.

Tags

Cybersecurity, Data Breach, e-Discovery Team®, ESI, Legal Ethics, Legal Technology, Outsourcing, Ralph Losey

The Importance of Cybersecurity to the Legal Profession and Outsourcing as a Best Practice – Part One, by Ralph Losey, e-Discovery Team®

http://tinyurl.com/oalblet

and,

The Importance of Cybersecurity to the Legal Profession and Outsourcing as a Best Practice – Part Two, by Ralph Losey, e-Discovery Team®

http://tinyurl.com/mjek896

It is worth taking the time to read the Comments for both Part One and Part Two. -CCE

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

How Target Missed Malware Alarms and Blew It.

14 Friday Mar 2014

Posted by Celia C. Elwell, RP in Computer Fraud and Abuse Act, Consumer Law, Credit Repair, Criminal Law, Finance and Banking Law, Identity Theft

≈ Comments Off on How Target Missed Malware Alarms and Blew It.

Tags

Bangalore, Bloomberg Businessweek, FireEye, Gregg Steinhafel, Hackers, Internet Security, Jim Walter. McAfee, Malware, Nieman Marcus, Target, Technology, U.S. Department of Justice, Verizon Enterprise Solutions

Missed Alarms and 40 Million Stolen Credit Card Numbers: How Target Blew It, by Michael Riley, Ben Elgin, Dune Lawrence, and Carol Matlack, Bloomberg  Businessweek Technology

http://tinyurl.com/njsy4rm

The biggest retail hack in U.S. history wasn’t particularly inventive, nor did it appear destined for success. In the days prior to Thanksgiving 2013, someone installed malware in Target’s (TGT) security and payments system designed to steal every credit card used at the company’s 1,797 U.S. stores. At the critical moment—when the Christmas gifts had been scanned and bagged and the cashier asked for a swipe—the malware would step in, capture the shopper’s credit card number, and store it on a Target server commandeered by the hackers.

It’s a measure of how common these crimes have become, and how conventional the hackers’ approach in this case, that Target was prepared for such an attack. . . .

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Federal Government Is On Board The Eight Pending Lawsuits Against Health Management Associates Inc.

03 Monday Feb 2014

Posted by Celia C. Elwell, RP in False Claims Act, Fraud, Health Law

≈ Comments Off on Federal Government Is On Board The Eight Pending Lawsuits Against Health Management Associates Inc.

Tags

Alabama, Arkansas, Emergency Room, ER, False Claims Act, Federal Health Care, Florida, Fraud, Gary Newsome, Georgia, Health Management Associates Inc., HMA, Hospitals, Inpatient Admissions, Kentucky, Kickbacks, Mississippi, Missouri, North Carolina Supreme Court, Oklahoma, Pennsylvania, South Carolina, Tennessee, Texas Supreme Court, Washington, West Virginia

Government Intervenes in Lawsuits Against Health Management Associates Inc. Hospital Chain Alleging Unnecessary Inpatient Admissions and Payment of Kickbacks, by Department of Justice, Office of Public Affairs

http://www.justice.gov/opa/pr/2014/January/14-civ-037.html

The government has intervened in eight False Claims Act lawsuits against Health Management Associates Inc. (HMA) alleging that HMA billed federal health care programs for medically unnecessary inpatient admissions from the emergency departments at HMA hospitals and paid remuneration to physicians in exchange for patient referrals, the Justice Department announced today.  The government also has joined in the allegations in one of these lawsuits that Gary Newsome, HMA’s former CEO, directed HMA’s corporate practice of pressuring emergency department physicians and hospital administrators to raise inpatient admission rates, regardless of medical necessity.  HMA operates 71 hospitals in 15 states: Alabama, Arkansas, Florida, Georgia, Kentucky, Mississippi, Missouri, North Carolina, Oklahoma, Pennsylvania, South Carolina, Tennessee, Texas, Washington and West Virginia.

*     *     *

The lawsuits allege that HMA’s corporate officers, at the direction of Newsome, exerted significant pressure on doctors in the emergency department to admit patients who could have been placed in observation, treated as outpatients or discharged, and that this resulted in the submission of inflated or false claims to federal health care programs.  One lawsuit also alleges that patients were improperly admitted for scheduled surgical procedures that should have been done on an outpatient basis.  The complaints further allege that HMA paid kickbacks, either in the form of bonuses or awarded contracts, to physician groups staffing HMA emergency rooms to induce the physicians to admit patients unnecessarily. . . .  [Emphasis added.]

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

IRS Service Is Going From Bad To Worse.

20 Monday Jan 2014

Posted by Celia C. Elwell, RP in Fraud, Government, Identity Theft, Internal Revenue Service

≈ Comments Off on IRS Service Is Going From Bad To Worse.

Tags

Allison Linn, CNBC, Fraud Alert, Identity Theft, Identity theft fraud alert, Internal Revenue Service, IRS, National Taxpayer Advocate Nina E. Olson, Taxpayer

Why IRS Customer Service Is Bad (And May Get Worse), by Allison Linn, CNBC

http://www.cnbc.com/id/101339980

[G]iven its limited resources, the IRS said that in 2014 it will stop preparing tax returns for people who need help, such as those who are elderly or disabled. The agency also plans to answer only “basic” tax law questions, and only during the normal filing season through April 15. Instead, it will direct people to the website and other automated sources of information.  . . .

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

LinkedIn’s Lawsuit Alerts Users To Be Pickier Accepting Invitations.

18 Saturday Jan 2014

Posted by Celia C. Elwell, RP in Computer Fraud and Abuse Act, Digital Millenium Copyright Act

≈ Comments Off on LinkedIn’s Lawsuit Alerts Users To Be Pickier Accepting Invitations.

Tags

Bots, Computer Fraud and Abuse Act, Digital Millenium Copyright Act, GigaOM, Jeff John Roberts, LinkedIn, Profiles, Scraping

Linkedin Sues To Stop Bots That Are Stealing Its User Profiles, by Jeff John Roberts, Gigaom

http://tinyurl.com/kqrmr9h

LinkedIn has filed a lawsuit to stop competitors that are scraping its servers and gathering hundreds of thousands of LinkedIn’s users’ profiles. The competitors use bots that use the information stolen from LinkedIn to create false profiles that attempt to interact with LinkedIn’s users. LinkedIn’s Complaint is included in Mr. Roberts’ post. -CCE

[I]t’s not immediately clear if LinkedIn has a clear-cut legal case since it is not necessarily illegal to copy information from a website. In its complaint, the company is relying on its own terms of services that forbid scraping as well as the Computer Fraud and Abuse Act and the Digital Millenium Copyright Act.

In the meantime, LinkedIn users may wish to be wary about which invitations to connect they accept.

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

How To Protect Yourself Against Identity Theft.

13 Monday Jan 2014

Posted by Celia C. Elwell, RP in Fraud, Identity Theft

≈ Comments Off on How To Protect Yourself Against Identity Theft.

Tax Identity Theft Awareness Week, Consumer Information, Federal Trade Commission

http://tinyurl.com/o4wt6c9

As more news about the personal information stolen from Target, identity theft is a valid concern. -CCE

Tax identity theft happens when someone uses your Social Security number to get a tax refund or a job. Find out what you can do about it, and how you can help others during Tax Identity Theft Awareness Week.

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Billionaire Hedge Fund Titan Stumbles Over Questions About Insider Trading in Video Deposition

06 Wednesday Nov 2013

Posted by Celia C. Elwell, RP in Corporate Law, Depositions, Discovery, Evidence, Fraud, SEC, Trial Tips and Techniques

≈ Comments Off on Billionaire Hedge Fund Titan Stumbles Over Questions About Insider Trading in Video Deposition

Tags

FRONTLINE, Hedge Funds, Insider trading, Securities and Exchange Commission, Steven Cohen

Seal of the U.S. Securities and Exchange Commi...

Exclusive: Watch Billionaire Steven Cohen Stumble Over Insider Trading Rules, by Nick Verbitsky, Martin Smith, and Dan Sugarman, FRONTLINE

http://to.pbs.org/188ekb9

In a never-before-published video, hedge fund titan Steven A. Cohen, whose firm this week agreed to plead guilty to securities fraud, describes federal securities laws as “vague,” and asks for an explanation of the basic Securities and Exchange Commission rule that prohibits insider trading.

*         *        *

The video offers a rare glimpse of the secretive billionaire investor at the center of the biggest insider trading prosecution in U.S. history talking about the very issues that have put him and his firm under such intense scrutiny.

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Resources from the Offices of the United States Attorney . . . and more.

02 Saturday Nov 2013

Posted by Celia C. Elwell, RP in Criminal Law, Discovery, Federal Law, Fraud, References, Research, Trial Tips and Techniques

≈ Comments Off on Resources from the Offices of the United States Attorney . . . and more.

Tags

Bullying, DOJ, FOIA, Fraud, Freedom of Information Act, National Security, Prescription Drug Abuse, United States Attorney, United States Department of Justice, Victim's Rights

Resources, Offices of the United States Attorney
http://perma.cc/0pU5ocUruhw

FOIA/Privacy Act Requests – “How to” submit FOIA requests
http://perma.cc/0xyPEK7KcCN

FOIA Library – Available to public about office’s operations
http://perma.cc/07JeT6GjPPp

Annual Statistical Reports – Accomplishments for each fiscal year
http://perma.cc/09vkJheop6X

Victim’s Rights Ombudsman – Complaints filed against DOJ employees
http://perma.cc/07fbNaXZcka

United States Attorney’s Bulletin – Legal or technical topics
http://perma.cc/0QdV5c8XtUK

United States Attorney’s Manual – The official handbook
http://perma.cc/0djGLTsgpwy

This is a sample of the great information at this website. See more at Priority Areas (http://perma.cc/0ssbcTres9kl) and Justice 101 (http://perma.cc/0B27rPGVtMV). CCE

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Divorce and Hidden Assets

17 Thursday Oct 2013

Posted by Celia C. Elwell, RP in Divorce, Family Law, Finding Assets, Fraud, White Collar Crime

≈ Comments Off on Divorce and Hidden Assets

Tags

Assets, Divorce, Financial Institutions, Fraud, Fred Abrams, Money Laundering, White Collar Crime

Divorce & Hidden Assets: Alaskan Plastic Surgeon Accused Of Concealing Millions In Central America, by Fred Abrams, Asset Search Blog
(The first post in the Abram’s “Divorce & Hidden Assets” Series)
http://bit.ly/1gLpR72

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...
Follow The Researching Paralegal on WordPress.com

Enter your email address to follow this blog and receive notifications of new posts by email.

Search

Sign In/Register

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.com

Categories

Archives

  • March 2022
  • January 2022
  • November 2021
  • October 2021
  • January 2021
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • June 2020
  • May 2020
  • April 2020
  • January 2020
  • December 2019
  • October 2019
  • August 2019
  • July 2019
  • May 2019
  • March 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014
  • October 2014
  • September 2014
  • August 2014
  • July 2014
  • June 2014
  • May 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013

Recent Comments

Eric Voigt on Top 20 Paralegal Blogs, Websit…
profvoigt on Research Guides in Focus – Mun…
Make Your PDF Docume… on Make Your PDF Document Edit-Pr…
madlaw291282999 on Using Hyperbole -Are You Riski…
How to Treat Bad Cli… on Why Do Bad Clients Deserve The…

Recent Comments

Eric Voigt on Top 20 Paralegal Blogs, Websit…
profvoigt on Research Guides in Focus – Mun…
Make Your PDF Docume… on Make Your PDF Document Edit-Pr…
madlaw291282999 on Using Hyperbole -Are You Riski…
How to Treat Bad Cli… on Why Do Bad Clients Deserve The…
  • RSS - Posts
  • RSS - Comments

Blog at WordPress.com.

  • Follow Following
    • The Researching Paralegal
    • Join 455 other followers
    • Already have a WordPress.com account? Log in now.
    • The Researching Paralegal
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...
 

You must be logged in to post a comment.

    %d bloggers like this: