Call Now

215.222.3101
Hot Legal Issues. High-Tech Solutions.
215.222.3101
Contact Us Today

Blog Archives

Supreme Court Ruling of June 22, 2018 – Carpenter v. United States

In 2011, a group of individuals committed an armed robbery at several Radio Shacks in Detroit – and the FBI’s main suspect was a man named Timothy Carpenter.  Utilizing data that was provided by Carpenter’s cellphone service provider, Carpenter was linked to the scene of the crime and convicted of armed robbery. At the heart of the case, which ultimately landed in the Supreme Court, was the fact that the FBI’s request for Carpenter’s cell phone location data from the phone …

New York Blazes the Trail for Financial Sector Cybersecurity Requirements with 23 NYCRR Part 500

  On February 15, 2018, the New York Department of Financial Services (DFS) cybersecurity regulation’s first certification of compliance became officially due for all covered entities and licensed persons. New York is the first state in the U.S.A. to compel financial services companies to comply with a variety of cybersecurity standards, thereby leading the cybersecurity charge in the financial sector. The financial industry has constantly been a target for cyber criminals, as financial data (both payment card information and personally …

Just Text Me: Top 4 Questions Digital Forensics Experts Are Asked Regarding Text Message Evidence

The first text message was sent in 1994, at a time when phones did not have keyboards and the sender had to type the message on an actual computer.  Over the last twenty-three years, text messaging – texting, lol – has quickly become one of the most popular forms of communication. Whether for work or for personal communication, texting is easy, accessible, fast and efficient. Most people feel a wave of anxiety any time they mistakenly forget their phone at …

May 2017 Alert: Ransomware

To all clients and friends of Capsicum Group, LLC: On Friday, the world was hit with one of the most significant, widespread and coordinated ransomware attacks: “WannaCry” aka “WannaCrypt.” Ransomware is a malicious cyber hacker program that locks data up and encrypts data – making it inaccessible to the owner – until a ransom is paid or the data / system is restored. The ransom is typically requested in Bitcoin, an anonymized form of digital currency, and WannaCry is requesting …

How to Turn Digital Video into a Star Witness

We live in a world in which video surveillance is omnipresent. Nowadays, we hardly bat an eye at finding ourselves reflected in a closed-circuit television (CCTV) screen in a supermarket, or realizing a friend took a video from last week’s brunch and posted it to social media. Video security footage, as well as footage from casual observers, exists in nearly every dimension of society, from law enforcement to the office to the privacy of our own home webcams. When it …

Making Smart Decisions in the Early Stages of E-Discovery

In cases where digitally stored information offers definitive evidence, such as corporate fraud or intellectual property theft, the role of e-discovery is crucial. E-discovery is essentially the digital version of paper discovery, and involves the retrieval and review of electronically stored information (ESI). It is a complex and, at times, mundane task, requiring careful planning, data acquisition, review and analysis, secure storage to prevent spoliation, reliable data hosting and the production of documents that can be used in court. Typically, …

Think You Can Get Away Without a Code Review? Think Again.

When discussing security options with our clients, we frequently hear them dismiss code review as an unnecessary extra. However, that perception couldn’t be further from the truth. Code review, a process in which software code is inspected for vulnerabilities before, during and after its implementation, is a necessary part of any cybersecurity strategy, especially if your company is about to implement a new program.   Although code writers are often brilliant scientists and artists, they may not be security specialists, …

Cell Phone Encryption – What’s Your Call?

When you read a letter or post that starts… “A Message to Our Customers – This moment calls for public discussion, and we want our customers and people around the country to understand what is at stake” – as does the letter Apple’s CEO Tim Cook recently released urging consumer involvement in the discussion regarding privacy right – do you read on or move on? Capsicum Group urges you to read on, be informed, and render your opinion regarding this …

New Year, Same White Collar Fears

It’s that special time of year again! As we turn the page on the calendar from December 2015 to January 2016, New Years’ resolutions are made, encouraging us to act with good will towards humankind, to live life ethically. Sadly, however, just because this time of year warrants promises to be the best we can be, doesn’t mean that the world gets a reprieve from greed and deception. The calls that Capsicum Group has answered to investigate cases of white …

Capsicum Group, LLC Welcomes Bill Smead, Pam King and Maritza Chang

Capsicum Group is proud to announce the recent hire of Senior Consultants Bill Smead, Pam King and Maritza Chang. The addition of Smead, King and Chang to the team propels Capsicum Group, LLC further towards the cutting edge of solving high-tech issues for its clients.  Properly presented digital evidence is irrefutable, and in some cases, digital evidence may be the only existing evidence. Capsicum’s computer forensics team is experienced in all areas of digital forensics and investigations, and has recovered …