Search /
Docfinder:
Advanced search  |  Help  |  Site map
RESEARCH CENTERS
SITE RESOURCES
Click for Layer 8! No, really, click NOW!
Networking for Small Business
TODAY'S NEWS
Where's my gigabit Internet, anyway?
Americans cool with lab-grown organs, but not designer babies
IE6: Retired but not dead yet
Enterprise who? Google says little about Apps, business cloud services in Q1 report
DDoS Attackers Change Techniques To Wallop Sites
Can we talk? Internet of Things vendors face a communications 'mess'
AMD's profitability streak ends at two quarters
Michaels says breach at its stores affected nearly 3M payment cards
Exclusive: Google's Project Loon tests move to LTE band in Nevada
H-1B loophole may help California utility offshore IT jobs
How a cyber cop patrols the underworld of e-commerce
For Red Hat, it's RHEL and then…?
Will the Internet of Things Become the Internet of Broken Things?
Kill switches coming to iPhone, Android, Windows devices in 2015
Israeli start-up, working with GE, out to detect Stuxnet-like attacks
Galaxy S5 deep-dive review: Long on hype, short on delivery
Google revenue jumps 19 percent but still disappoints
Windows XP's retirement turns into major security project for Chinese firm
Teen arrested in Heartbleed attack against Canadian tax site
Still deploying 11n Wi-Fi?  You might want to think again
Collaboration 2.0: Old meets new
9 Things You Need to Know Before You Store Data in the Cloud
Can Heartbleed be used in DDoS attacks?
Secure browsers offer alternatives to Chrome, IE and Firefox
Linksys WRT1900AC Wi-Fi router: Faster than anything we've tested
/

Legal system gears up for computer crime cases

Related linksToday's breaking news
Send to a friendFeedback

With computer crimes expected to increase in both frequency and destructive power, the legal system will have to beef up its technical savvy to deal with the coming onslaught, according to industry and legal watchers.

Criminal investigators and prosecutors say the Tim Lloyd case is just the tip of the iceberg, calling computer attacks the crime of the future. That means law enforcement agents, lawyers and judges increasingly will be bombarded with technical issues - whether they be related to corporate sabotage, destructive viruses or hacker attacks.


The Omega files, our main feature
G-men target e-crime
How to protect your network
The Tim Lloyd saga


In whatever form the crime is packaged, the result will be the same - the legal system will have to learn a whole new language, understand technology as well as organized crime or tax law, and possibly even rethink the way it deals with jurors.

"Technology is creeping into the courtroom," says Assistant U.S. Attorney V. Grady O'Malley, who prosecuted Lloyd. "Clearly, this was a test run… It tells people that we're capable. These people are no longer invulnerable. It shows that we can track down the evidence, understand it and logically present it to a jury."

And while O'Malley was able to put together a case and make the jury understand the technical details and nuances, it wasn't an easy task.

"I had to go from zero to 60," says O'Malley. "I had to be force fed. Even if I had computers as a hobby of mine, it still would have been a learning curve. I don't think too many people have an idea of NetWare and how data is stored."

Many people in the legal system are looking at the same kind of ramp up, according to industry analysts, who say the Lloyd case was simply the first one to spill out of Pandora's Box.

"This shows that the legal side is starting to catch up with the abilities of the [techies]," says Pete Hammes, director of engineering for Alexandria, Va.-based ParaProtect Services, Inc. and a former information security technician for the U.S. Department of Defense. "I think this will be another type of specialization within the law community. Now there will be more focus on technical law. There's a tremendous amount of skill and specialization to be able to understand the law and technical issues, as well."

And understanding the technical issues isn't enough.

Attorneys need to understand it well enough to explain it to a jury, which is made up of people with a varying range of technical knowledge.

"You're going to have to be more attuned to the types of jurors you're getting in these cases," notes O'Malley. "The issue here is that every walk of life is touched by computers. It's a part of life now… If I'm going to have a jury with computer literate people, I'm going to try [the case] one way. If I have a jury of people inexperienced with computers, that will be different. You'll have to find out the nature and extent of their computer literacy."

Greg Olson, director of World Wide Data Recovery Services for Eden Prairie, Minn.-based Ontrack Data International, Inc. and the expert witness for the prosecution in the Lloyd case, was responsible for explaining to the jury how Novell, Inc.'s NetWare operating system functions and how it stores data. Not a simple subject.

"Everyone understands a gun," says Olson, who says he practiced his technical explanations for days in front of Ontrack's non-technical managers. "Not everyone understands the technology. My main goal was to make sure the jury understands what I'm talking about… The pressure was all on me. It could quickly get confusing."

But the fact that the prosecution won its computer sabotage case last month sends out a good message, according to Ed Lugo, a special agent in the U.S. Secret Service's Electronic Crimes Branch.

"We are available. We can do it," says Lugo. "We can gather the evidence and show the jury how this happened. We can do that. The gate is open now."

Related links

The Omega files
Our main feature story.

G-men target e-crime
The Tim Lloyd computer sabotage trial may be the first of its kind, but agents at the U.S. Secret Service expect it won't be the last.

How to protect your network
Here 's a list of tips culled from industry analysts, security experts, corporate executives and agents of the U.S. Secret Service.

The Tim Lloyd saga
Timeline of events.


NWFusion offers more than 40 FREE technology-specific email newsletters in key network technology areas such as NSM, VPNs, Convergence, Security and more.
Click here to sign up!
New Event - WANs: Optimizing Your Network Now.
Hear from the experts about the innovations that are already starting to shake up the WAN world. Free Network World Technology Tour and Expo in Dallas, San Francisco, Washington DC, and New York.
Attend FREE
Your FREE Network World subscription will also include breaking news and information on wireless, storage, infrastructure, carriers and SPs, enterprise applications, videoconferencing, plus product reviews, technology insiders, management surveys and technology updates - GET IT NOW.