February 23, 2016 | New York Law Journal
Virtual Trespass Provides Fertile Ground for LitigationIn his Cyber Crime column, Peter A. Crusco discusses issues surrounding computer trespass and writes: Despite its routine inclusion in the various statutes, litigation continues concerning the meaning of the term "without authorization."
By Peter A. Crusco
14 minute read
December 22, 2015 | New York Law Journal
Confronting Smartphone EncryptionPeter A. Crusco of the Queens County District Attorney addresses the question of who may be legally responsible for decrypting smartphone devices when they are the subject of a criminal investigation, and what legal tools are available to the government to facilitate this endeavor.
By Peter A. Crusco
16 minute read
December 21, 2015 | New York Law Journal
Confronting Smartphone EncryptionPeter A. Crusco of the Queens County District Attorney addresses the question of who may be legally responsible for decrypting smartphone devices when they are the subject of a criminal investigation, and what legal tools are available to the government to facilitate this endeavor.
By Peter A. Crusco
16 minute read
October 27, 2015 | New York Law Journal
Bytes, Borders and Burdens: Tackling Digital Media SearchesIn his Cyber Crime column, Peter A. Crusco discusses the holding in 'Riley v. California' and addresses the issue of what impact, if any, it has on the historical border search exception to the warrant requirement under the Fourth Amendment.
By Peter A. Crusco
15 minute read
October 26, 2015 | New York Law Journal
Bytes, Borders and Burdens: Tackling Digital Media SearchesIn his Cyber Crime column, Peter A. Crusco discusses the holding in 'Riley v. California' and addresses the issue of what impact, if any, it has on the historical border search exception to the warrant requirement under the Fourth Amendment.
By Peter A. Crusco
15 minute read
August 25, 2015 | New York Law Journal
Evidentiary Consequences of Social Media Self-AdulationIn his Cyber Crime column, Peter A. Crusco writes: The law journals may be replete with accounts of the defense's deft use of social media evidence, but all of the clever and laborious research and investigation may be undone by a client's unbridled appetite for self-adulation in the cyber world. This article examines recent case law addressing the admissibility at trial of such self serving social media evidence.
By Peter A. Crusco
17 minute read
August 24, 2015 | New York Law Journal
Evidentiary Consequences of Social Media Self-AdulationIn his Cyber Crime column, Peter A. Crusco writes: The law journals may be replete with accounts of the defense's deft use of social media evidence, but all of the clever and laborious research and investigation may be undone by a client's unbridled appetite for self-adulation in the cyber world. This article examines recent case law addressing the admissibility at trial of such self serving social media evidence.
By Peter A. Crusco
17 minute read
June 23, 2015 | New York Law Journal
Mapp Hearings, ISP Terms of Service, and User PrivacyIn his Cyber Crime column, Peter A. Crusco of the Office of the Queens County District Attorney writes: With the ubiquitous use of Internet-based communications, courts now face the question of whether an Internet service contract agreed to by a user with their Internet service provider constitutes sufficient legal basis for consent to search the customer's Internet account not only by the service provider but by government agents.
By Peter A. Crusco
15 minute read
June 22, 2015 | New York Law Journal
Mapp Hearings, ISP Terms of Service, and User PrivacyIn his Cyber Crime column, Peter A. Crusco of the Office of the Queens County District Attorney writes: With the ubiquitous use of Internet-based communications, courts now face the question of whether an Internet service contract agreed to by a user with their Internet service provider constitutes sufficient legal basis for consent to search the customer's Internet account not only by the service provider but by government agents.
By Peter A. Crusco
15 minute read
April 28, 2015 | New York Law Journal
When Hashing, Silver Platters and Privacy CollideIn his Cyber Crime column, Peter A. Crusco addresses frequently raised questions concerning the legality and scope of a government search of a hard drive without a warrant and the lawfulness of the forensic examination subsequent to a hand-off of the drive by a private individual.
By Peter A. Crusco
14 minute read