NEXT

Peter A Crusco

Peter A Crusco

February 23, 2016 | New York Law Journal

Virtual Trespass Provides Fertile Ground for Litigation

In his Cyber Crime column, Peter A. Crusco discusses issues surrounding computer trespass and writes: Despite its routine inclusion in the various statutes, litigation continues concerning the meaning of the term "without authorization."

By Peter A. Crusco

14 minute read

December 22, 2015 | New York Law Journal

Confronting Smartphone Encryption

Peter A. Crusco of the Queens County District Attorney addresses the question of who may be legally responsible for decrypting smartphone devices when they are the subject of a criminal investigation, and what legal tools are available to the government to facilitate this endeavor.

By Peter A. Crusco

16 minute read

December 21, 2015 | New York Law Journal

Confronting Smartphone Encryption

Peter A. Crusco of the Queens County District Attorney addresses the question of who may be legally responsible for decrypting smartphone devices when they are the subject of a criminal investigation, and what legal tools are available to the government to facilitate this endeavor.

By Peter A. Crusco

16 minute read

October 27, 2015 | New York Law Journal

Bytes, Borders and Burdens: Tackling Digital Media Searches

In his Cyber Crime column, Peter A. Crusco discusses the holding in 'Riley v. California' and addresses the issue of what impact, if any, it has on the historical border search exception to the warrant requirement under the Fourth Amendment.

By Peter A. Crusco

15 minute read

October 26, 2015 | New York Law Journal

Bytes, Borders and Burdens: Tackling Digital Media Searches

In his Cyber Crime column, Peter A. Crusco discusses the holding in 'Riley v. California' and addresses the issue of what impact, if any, it has on the historical border search exception to the warrant requirement under the Fourth Amendment.

By Peter A. Crusco

15 minute read

August 25, 2015 | New York Law Journal

Evidentiary Consequences of Social Media Self-Adulation

In his Cyber Crime column, Peter A. Crusco writes: The law journals may be replete with accounts of the defense's deft use of social media evidence, but all of the clever and laborious research and investigation may be undone by a client's unbridled appetite for self-adulation in the cyber world. This article examines recent case law addressing the admissibility at trial of such self serving social media evidence.

By Peter A. Crusco

17 minute read

August 24, 2015 | New York Law Journal

Evidentiary Consequences of Social Media Self-Adulation

In his Cyber Crime column, Peter A. Crusco writes: The law journals may be replete with accounts of the defense's deft use of social media evidence, but all of the clever and laborious research and investigation may be undone by a client's unbridled appetite for self-adulation in the cyber world. This article examines recent case law addressing the admissibility at trial of such self serving social media evidence.

By Peter A. Crusco

17 minute read

June 23, 2015 | New York Law Journal

Mapp Hearings, ISP Terms of Service, and User Privacy

In his Cyber Crime column, Peter A. Crusco of the Office of the Queens County District Attorney writes: With the ubiquitous use of Internet-based communications, courts now face the question of whether an Internet service contract agreed to by a user with their Internet service provider constitutes sufficient legal basis for consent to search the customer's Internet account not only by the service provider but by government agents.

By Peter A. Crusco

15 minute read

June 22, 2015 | New York Law Journal

Mapp Hearings, ISP Terms of Service, and User Privacy

In his Cyber Crime column, Peter A. Crusco of the Office of the Queens County District Attorney writes: With the ubiquitous use of Internet-based communications, courts now face the question of whether an Internet service contract agreed to by a user with their Internet service provider constitutes sufficient legal basis for consent to search the customer's Internet account not only by the service provider but by government agents.

By Peter A. Crusco

15 minute read

April 28, 2015 | New York Law Journal

When Hashing, Silver Platters and Privacy Collide

In his Cyber Crime column, Peter A. Crusco addresses frequently raised questions concerning the legality and scope of a government search of a hard drive without a warrant and the lawfulness of the forensic examination subsequent to a hand-off of the drive by a private individual.

By Peter A. Crusco

14 minute read