Tag Archive for: case

Pasadena police banking on phone-hacking tool to solve cold case murder


An engineer shows devices and explains the technology developed by the Israeli firm Cellebrite's technology on November 9, 2016 in the Israeli city of Petah Tikva. It only takes a few seconds for an employee of Cellebrite's technology, one of the world's leading hacking companies, to take a locked smartphone and pull the data from it. / AFP / JACK GUEZ (Photo credit should read JACK GUEZ/AFP via Getty Images)

An engineer displays devices developed by the Israeli firm Cellebrite in 2016. It takes only a few seconds for an employee of Cellebrite, one of the world’s leading hacking companies, to take a locked smartphone and pull the data from it. (Jack Guez/ AFP via Getty Images)

For years, a locked cellphone belonging to the suspect in a Pasadena homicide sat in an evidence room as investigators sought a way to get around the device’s security measures.

Police might have finally caught a break.

Israeli mobile forensics firm Cellebrite has released a software update with a “Lock Bypass” feature that could allow police to access the suspect’s locked Samsung g550t phone and retrieve any evidence about the December 2015 slaying, according to a recently filed search warrant application.

As smartphones have become ubiquitous, law enforcement agencies across the U.S. have recognized their potential usefulness in criminal investigations — a vast trove of personal information about whom the users communicate with, where they shop and where they travel.

But police departments’ attempts to access phones have often put them at odds with companies such as Apple and Samsung, which market their devices’ built-in security and privacy to digital-savvy users.

It’s not clear from the warrant in the Pasadena case if investigators were able to bypass the phone’s passcode lock using the Cellebrite program or what, if any, data they extracted. But in an affidavit supporting the warrant, a Pasadena homicide detective wrote that he learned about the update in mid-January from a computer forensic examiner assigned to the Verdugo Regional Crime Laboratory.

“In January 2023, the Cellebrite program successfully bypassed the lock on a Samsung cellular telephone, for an unrelated investigation, with the new software update,” said the warrant, which seeks records from a month before the incident through Nov. 18, 2015, the date of the suspect’s arrest. “This search warrant seeks permission to search and seize records that may be found on [the suspect’s] cellular telephone in whatever form they are found as it relates to this homicide investigation.”

The simmering debate over cellphone privacy first spilled into the…

Source…

Feds close case of Kremlin-connected Russian tech businessman accused of hacking non-public reports of U.S. companies


The fate of a Kremlin-connected Russian tech businessman accused of directing an $82 million hacking scheme of non-public reports of U.S. companies and then illegally trading off this information is now in the hands of a federal jury.

Attorneys made their closing arguments Friday following the two-week trial of Vladislav Klyushin in federal court in Boston’s Seaport District.

The defense argued that the case was politically motivated and built on “predetermined conclusions.” The prosecution argued that Klyushin’s trading activities had only a “one-in-a-trillion chance” of being coincidental and unconnected to the hacking.

Klyushin was a director of Moscow, Russia-based M-13, a company, according to court documents, which provided services including the “monitoring and analytics of media and social media messages” and penetration testing — a service in which a company tests for security vulnerabilities in IT infrastructure. The company claimed it was used by Russian government agencies and even by President Vladimir Putin’s office.

He was arrested while on a ski trip in Switzerland in March 2021 and then extradited to the U.S. to face four counts related to conspiracy and wire and securities fraud.

Klyushin was indicted alongside alleged co-conspirators Ivan Ermakov and Nikolai Rumiantcev on April 6, 2020. Two others, Mikhail Irzak and Igor Sladkov, have also been charged in the case. All of the alleged conspirators, excepting Klyushin, remain at large.

Ermakov, the alleged lead hacker, is a former officer in the Russian Main Intelligence Directorate (GRU) also wanted by the FBI after he and 11 others were indicted by a federal grand jury in Washington D.C. in July 2018 for allegedly interfering in the 2016 presidential election.

“What’s not in dispute is that the hackers were sophisticated, they were experts,” said Assistant U.S. Attorney Stephen Frank during the prosecution’s rebuttal, the last of the arguments heard before the jurors were given instructions by Judge Patti B. Saris.

Prosecutors allege Klyushin directed a scheme in which hackers at his company obtained quarterly and annual reports of major companies before they were made public by…

Source…

Additional charges filed in hacking case against Former Mount Laurel police officer – Trentonian


Burlington County Prosecutor LaChia L. Bradshaw and Evesham Township Police Chief Walt Miller have announced that a former Mount Laurel police officer who was charged in October with hacking into the social media accounts of an Evesham woman and distributing her nude pictures has been charged with victimizing multiple other women in a similar manner.

Ayron Taylor, 22, of Delran, was taken into custody on Nov. 30 and released Dec. 2 following a first appearance in Superior Court in Mount Holly. The case will now be prepared for presentation to a grand jury for possible indictment.

Taylor faces 87 new charges that accuse him of illegally accessing the social media and email accounts of 18 additional women and in several instances distributing their nude photos to people on their contact lists. The complaints allege 28 counts of second-degree crimes that include Computer Criminal Activity and Distribution of Child Pornography, which was brought against him because some of the photos he accessed were taken before the victims became legal adults. The remaining 59 counts are third degree charges including Elements of Computer Theft and other cyber-related crimes.

The investigation began in September after the initial victim contacted Evesham Township police to report that her Snapchat and Facebook accounts had been hacked by an unknown person who then sent nude photos she had taken of herself to her Snapchat contacts, messaged them to her Facebook friends, and posted them on her Facebook wall.

The investigation determined the commonality among all victims was that each one had a student email account through Rowan College of Burlington County (RCBC). The investigation further determined that Taylor illegally accessed more than 2,800 RCBC email accounts. Some of this activity occurred while he was on duty and sitting in his patrol car, utilizing personal electronic devices.

Taylor became a full-time officer in Mount Laurel after graduating from the police academy in October 2021. The department suspended him following the initial charges and began measures to terminate his employment. He has since resigned from the force.

RCBC officials have been cooperative with law enforcement…

Source…

Patent Case Summaries – November 2022 #2 | Alston & Bird


A weekly summary of the precedential patent-related opinions issued by the Court of Appeals for the Federal Circuit and the opinions designated precedential or informative by the Patent Trial and Appeal Board.


American National Manufacturing Inc. v. Sleep Number Corp., et al., Nos. 2021-1321, -1323, -1379, -1382 (Fed. Cir. (PTAB) Nov. 14, 2022). Opinion by Stoll, joined by Schall and Cunningham.

Sleep Number owns two patents directed to systems and methods for adjusting the pressure in an air mattress. American National filed IPR petitions challenging multiple claims of the patents, and the Patent Trial and Appeal Board issued final written decisions finding some, but not all, of the challenged claims unpatentable. During the IPRs, the Board permitted Sleep Number to present proposed amended claims.

On appeal, American National challenged various aspects of the Board’s determinations. First, American National argued that the Board erred in permitting Sleep Number to present proposed amended claims that both responded to a ground of unpatentability and made other changes not responsive to an unpatentability ground. The Federal Circuit explained that “nothing in the America Invents Act (AIA) or the Board’s regulations precludes a patent owner from amending a claim to both overcome an instituted ground and correct other perceived issues in the claim.” The court continued that, “so long as a proposed claim amendment does not enlarge the scope of the claims, does not add new matter, and responds to a ground of unpatentability in the proceeding, the patent owner may also make additional amendments to a claim without running afoul of the relevant statutes and regulation.” Here, because Sleep Number’s proposed substitute claims included a responsive narrowing limitation, “Sleep Number was free to include other amendments, including any addressing perceived §§ 101 and 112 issues.”

Second, American National argued that an admitted error in the priority application’s specification necessarily meant that the proposed amended claims were not enabled. The Federal Circuit disagreed. The specification itself made clear that the error was “obvious.” Also, Sleep…

Source…