Go to Top

Tag Archives

Tag Archives: Fraud

Mobile Phone Metadata Proves Insurance Claim for $32K Rolex was Fraud

An inconvenient truth: Photo of “stolen” Rolex was taken 8 days after the alleged theft   The background One of our recent mobile phone forensics cases illustrates how photo metadata can be an important source of evidence in a wide-array of matters, including insurance fraud cases. The fraudster (let’s call him “Jim”) filed a claim with his insurance company, alleging that his $32K Rolex was stolen from him when he …Read More

W-2 Fraud: Are Your Clients Prepared for a W-2 “Phishing” Attack?

Tax Season Creates a Spike in These Catastrophic Incidents The Background Your HR Director walks into your office: her face ashen, her voice trembling. Earlier that day, she received an email from the company CFO asking her to email all employee W-2 forms to him. In her typical efficient manner, she complied immediately. The email from the CFO, however, was a phony. It was a “spoof” email sent from a …Read More

Phishing Update: The Bad Guys Are Getting More Sophisticated – And Losses Are Way Up

More Bad News…Your Loss From Phishing Fraud May Not Be Covered By Insurance Phishing scams are not new, but losses from these social engineering ploys are increasing dramatically as the fraudsters become more convincing in their techniques.  Indeed, this was one of the primary themes of this year’s Net Diligence Cyber Insurance conference in Santa Monica, California. It’s Getting Ugly Out There… The FBI estimates phishing attacks have cost organizations …Read More

New York Man Convicted for Hacking, Crashing Former Employer’s Network

The “trusted insider” remains the most significant threat to company networks The United States Attorney’s Office for the Middle District of Pennsylvania announced last week that Dariusz J. Prugar, age 32, of Syracuse, New York, was convicted after a week-long trial before a federal jury in Harrisburg, Pennsylvania, of computer fraud and wire fraud. Prugar was the network administrator for Pa Online, an internet service provider in Enola, Pennsylvania.  Kruger …Read More

Mobile Phone Porting Fraud: The Risk Goes Far Beyond Consumers

Businesses are increasingly targeted by phone porting scams Much has been written and reported about the risk of mobile phone “Porting” and related financial scams against consumers.  A 90 year old grandfather, for example, recently had his identity stolen by a fraudulent caller that advised the old man that she was conducting a “phone interview.”  When the grandfather gladly offered his personal information over the phone to the scammer, the …Read More

Deepwater Horizon Revisited: Computer Fraud & Abuse is One of the Few Criminal Convictions in This Case

Engineer’s Guilty Plea for Deleting Text Messages Stands Out in a Series of Not Guilty Findings In the months following the 2010 BP Deepwater Horizon oil rig disaster, 52 criminal counts were filed against 5 men that prosecutors believed were criminally responsible for the explosion and resulting deaths of 11 people.  Of those 52 charges, 23 were withdrawn, 23 were dismissed, and jurors acquitted on three counts.  Last week the …Read More

Boston Marathon Bomber’s Friend Sentenced to 2 1/2 Years

His Crime?  Deleting His Browser History After pleading guilty to obstruction of justice in March, the friend of Boston Marathon bombers, Khairullozhon Matanov, was sentenced last week to 30 months in prison.  His crime?  “Destroying, altering, and falsifying records, documents, and tangible objects in a federal investigation, specifically information on his computer.” Yes, that is right.  Matanov was slapped with a version of an old Sarbanes-Oxley Act statute signed into …Read More

4Discovery and CES Selected to Conduct Homeland Security Training

State of Vermont Division of Emergency Management and Homeland Security and CRA Selects Team Consisting of Experts from 4Discovery and CES In today’s world, the critical evidence required to investigate criminal or terrorist activity is increasingly found on laptops, tablets, smart phones, and social media.  Given that, when the State of Vermont with contractor CRA, selected a team to train a group of their Homeland Security officers recently, they turned …Read More

Think Social Media eDiscovery is A Waste of Time? Ask the Guy with the Fish!

Photos from Social Media & Websites Play Prominent Role in Ex-Cops, Firefighter’s Disability Fraud Case in New York [1] In our business we often witness people engaged in the most stupid, repulsive, and often illegal activity.  Rarely has this fact been more dramatically illustrated than in the example of the recently exposed fraud related to a number of social security disability claims in New York. The Background Who will ever …Read More

The Computer Fraud and Abuse Act: Are Changes Necessary?

4Discovery’s Jeffrey Hartman featured in debate article in the October issue of SC Magazine Intellectual property theft and cyber breaches have a significant impact on our fragile economy, causing $250 billion in damages to countless artists, technology developers and companies last year. The CFAA is a necessary tool for combating these offenses. The law is a unique deterrent against those who trespass into a computer system to steal property or cause damage. …Read More