California Extends Statute of Limitations for Revenge Porn

In 2013, California became one of the first states to outlaw revenge porn (also known as cyber exploitation or digital rape) in enacting Penal Code § 647(j)(4). Shortly thereafter, the Cyber Civil Rights Initiative published a study finding that: (i) 93% of victims suffered significant emotional distress as a result of their victimization; (ii) 82%…

Santa Ana Special Investigations Unit Nabs Serial Revenge Porn Suspect

Today the Santa Ana Police Department had the following announcement on the arrest of serial revenge porn suspect Dillon Nguyen (23) of Westminster who distributed “intimate images and videos involving his ex-girlfriends online after they broke-up”. The Internet Law Center represents one of Nguyen’s victims and applauds the Santa Ana Police Department (SAPD) and the…

Floppy disk containing the source code for the Morris Worm held at the Computer History Museum and Robert Morris on the right.

The Morris Worm, the First Indictment under the CFAA and Wake Up Call of a New Age

On November 2, 1988, Robert Tappan Morris, the son of a famous Bell Labs cryptographer, released and graduate student at Cornell University, released what became known as the “Morris worm” through Massachusetts Institute of Technology (MIT).  Morris stated that his intent was “to demonstrate the inadequacies of current security measures on computer networks by exploiting…

Photo of hacker and Tweet from Barack Obama.

Twitter Hacking Incidents Has Law Enforcement, Washington on Alert

On Wednesday, a hacker accessed 130 prominent Twitter accounts including that of Joe Biden, Mike Bloomberg, Jeff Bezos, Warren Buffett, Bill Gates, Kim Kardashian, Kanye West and the most followed Twitter account on the planet – Barack Obama – to promote a bitcoin scam.  This force Twitter to shut down verified Twitter users’ accounts for…

Photo of Bennet Kelley at Dulles Airport, logos of Department of Justice and Rand Corporation

Rand Issues Report on Countering Technology-Facilitated Abuse

Last year, I was fortunate enough to be invited to join ten other stellar participants that included other attorneys, prosecutors, law enforcement, academics and civil society representatives for a two-day brainstorming session sponsored by the Department of Justice’s National Institute of Justice (working with RTI International and the RAND Corporation) on combating Technologically Facilitated Abuse…

Christopher Painter

CLBR #310 – Cyber Diplomacy Under Trump with Christopher Painter

Cyber Diplomacy Under Trump with Christopher Painter LISTEN VIA THESE CHANNELS     WMR iTunes Podbay Spreaker Stitcher Chris Painter is a globally recognized leader and expert on cybersecurity, cyber policy, Cyber Diplomacy and combatting cybercrime. He has been on the vanguard of US and international cyber issues for over twenty-five years—first as a leading federal prosecutor of…

Women of Government

Bi-Partisan Congressional Coalition Offers ENOUGH Act to Criminalize Revenge Porn

As the problem of Cyber Exploitation or Revenge Porn has grown, state laws attempting to address the issue have multiplied.  Currently, thirty-eight (38) states and the District of Columbia have some form of law addressing the problem. In 2016, California Congresswoman Jackie Speier introduced the Intimate Privacy Protection Act to create a national ban on revenge…

Allen O'Rourke

CLBR #276: Allen O’Rourke on The Emerging Law of Cyber Defense

The Emerging Law of Cyber Defense   Listen At the 2017 Privacy + Security Forum at George Washington University, former Computer Hacking and Intellectual Property prosecutor and Assistant U.S. Attorney Allen O’Rourke led a panel on the issue of “active defense” techniques in responding to cyber attacks.  “Active defense” techniques may include honeypots, web beacons, “dark web” research, rescue…

Devices Communicating

Microsoft Calls for Int’l Body for Cyber Attack Attribution

Following its call earlier this year for a Digital Geneva Convention, to address the growing threat of state sponsored cyber attacks. Microsoft released a paper about cyber security norms for nation-states and the global information and communications technology (ICT) industry. Of particular note is the paper’s call for the equivalent of an International Atomic Energy Agency (IAEA)…

Combating Cyber Scams

CLBR #247: Battling Online Scammers with Wayne May of Scam Survivors

Battling Online Scammers with Wayne May of Scam Survivors Listen Live on Cranberry.fm Wayne May (@ScamSurvivors) is founder of the UK-based Scam Survivors Online, a volunteer staffed organization that focuses on: Making scammers’ lives harder by exposing their details and scripts to search engines. Educating the public, thus removing scammers’ sources of income as scams will continue…