Department of Justice Journal of Federal Law and Practice

Total Page:16

File Type:pdf, Size:1020Kb

Department of Justice Journal of Federal Law and Practice DEPARTMENT OF JUSTICE JOURNAL OF FEDERAL LAW AND PRACTICE Volume 69 May 2021 Number 3 Director Monty Wilkinson Editor-in-Chief Christian A. Fisanick Managing Editor E. Addison Gantt Associate Editors Gurbani Saini Philip Schneider Law Clerks Rachel Buzhardt Joshua Garlick Rebekah Griggs Mary Harriet Moore Garrett Simpson United States The Department of Justice Journal of Department of Justice Federal Law and Practice is published by Executive Office for the Executive Office for United States United States Attorneys Attorneys Washington, DC 20530 Office of Legal Education 1620 Pendleton Street Contributors’ opinions and Columbia, SC 29201 statements should not be considered an endorsement by Cite as: EOUSA for any policy, 69 DOJ J. FED. L. & PRAC., no. 3, 2021. program, or service. Internet Address: The Department of Justice Journal https://www.justice.gov/usao/resources/ of Federal Law and Practice is journal-of-federal-law-and-practice published pursuant to 28 C.F.R. § 0.22(b). Page Intentionally Left Blank Technology & Law In This Issue Introduction ........................................................................................ 1 Puneet V. Kakkar & Joseph Wheatly Overcoming Technical Obfuscation: NITs and Remote Search Warrants ................................................................................. 3 Puneet V. Kakkar & Joseph Wheatly Introduction to the FinTech Ecosystem ...................................... 23 Jill Westmoreland Rose, Kelli Andrews, & Karyn Kenny Privilege in Data Breach Investigations ..................................... 39 Brian Mund & Leonard Bailey Using Blockchain Analysis From Investigation to Trial .......... 59 C. Alden Pelker, Christopher B. Brown, & Richard M. Tucker Prosecuting Sex Trafficking Cases in the Wake of the Backpage Takedown and the World of Cryptocurrency ........ 101 Jane Khodarkovsky, April N. Russo, & Lauren E. Britsch Finding Clarity in Crisis: How Technological Challenges Present Investigative Opportunities in the Time of a Pandemic .......................................................................................... 127 Denise O. Simpson & Nathaniel C. Kummerfeld From Beepers to Smartphones: Challenges in Applying Title III to Modern Communication Technology ..................... 141 Jeffrey S. Pollak, Douglas D. Guidorizzi, & Shanai T. Watson Carpenter’s Practical Implications for Law Enforcement and the Fourth Amendment ......................................................... 159 Annamartine Salick & Anil J. Antony Surfing the First Wave of Cryptocurrency Money Laundering ...................................................................................... 183 Alexandra D. Comolli & Michele R. Korver Know Before You Go: Navigating Double Jeopardy Issues When Your Investigation Heads to Europe .................. 237 Christen Gallagher Crime in the Sky—Prosecuting Drone Offenses ...................... 255 Matthew J. Cronin Technology & Law In This Issue DOJ and Drones: Protection, Policy, and Enforcement .......... 275 Colin T. Ross & Kevin M. Jinks Recent Case Law Developments Involving the Crime–Fraud Exception: The Attorney–Client Privilege, Filter Teams Protocols, and Other Privileges ........................... 289 Gretchen C. F. Shappert & Christopher J. Costantini Note From the Editor-in-Chief ..................................................... 355 Christian A. Fisanick Introduction Puneet V. Kakkar Deputy Chief, International Narcotics, Money Laundering, and Racketeering Section Central District of California on detail as the Resident Legal Advisor, Gulf Region Joseph Wheatley Former Deputy Director Joint Task Force Vulcan The Department of Justice (Department), since its establishment over 150 years ago, remains steadfast in its mission to “ensure [the] fair and impartial administration of justice for all Americans.”1 To carry out that mission, it must keep pace with the ever-changing landscape of criminal activity and the various ways that technology shapes that landscape—including the facilitation, prevention, investigation, and prosecution of criminal activity. Moreover, it must ensure that the nature and approach of its litigation manages such challenges. This issue of the Department of Justice Journal of Federal Law and Practice (DOJ Journal) addresses some of the dynamic technological challenges that federal prosecutors, agents, analysts, paralegals, and other personnel face on a regular basis around the country, from investigations to litigation. Building off the May 2020 issue of the DOJ Journal, which focused on developing eLitigation skills and proficiencies to keep pace with ever-advancing technology in the context of producing electronic discovery and the entire lifecycle of electronic evidence,2 this issue turns the perspective towards technology-based criminal activities and technology-based strategies and tools for investigating and prosecuting cases. Articles in this issue focus on, among other things, the impact that the fast-changing fields of cryptocurrency and FinTech have on our traditional understanding of best practices for prosecuting bad actors. Authors in this issue have also explored constitutional and statutory issues that lie at the heart of criminal investigations involving advanced technology, from remote search warrants to drones to 1 About DOJ, U.S. DEP’T OF JUST., https://www.justice.gov/about (last visited Apr. 26, 2021). 2 68 DOJ J. Fed. L & Prac., no 3, 2020. May 2021 DOJ Journal of Federal Law and Practice 1 interception of communications. Finally, this issue also covers some of the practical issues that arise in every litigation, but more so in the technological context, such as unique issues in extraditions and the attorney–client privilege. These articles, drawing from the institutional knowledge and experience of our colleagues, provide timely and valuable insights and guidance about dynamic technological issues that impact the Department and its mission every day. The articles reflect that the Department has successfully addressed new technological challenges in a variety of areas and is prepared to tackle new ones going forward. 2 DOJ Journal of Federal Law and Practice May 2021 Overcoming Technical Obfuscation: NITs and Remote Search Warrants Puneet V. Kakkar Deputy Chief, International Narcotics, Money Laundering, and Racketeering Section U.S. Attorney’s Office for the Central District of California on detail as the Resident Legal Advisor, Gulf Region Joseph Wheatley Former Deputy Director Joint Task Force Vulcan I. Introduction The Government’s efforts to contain child pornographers, terrorists and the like cannot remain frozen in time; the Government must be allowed to utilize its own advanced technology to keep pace with our world’s ever-advancing technology and novel criminal methods.1 With criminal activity increasingly leveraging technology—from the darknet to encrypted platforms of communication to cryptocurrency2— law enforcement has utilized more advanced measures of obtaining evidence and uncovering criminal activity that respects and remains consistent with the Fourth Amendment of the U.S. Constitution. In the past year alone, criminal actors have used advanced technology to 1 United States v. Matish, 193 F. Supp. 3d 585, 622 (E.D. Va. 2016). 2 See generally U.S. DEP’T OF JUST., OFF. OF THE DEPUTY ATT’Y GEN., REPORT OF THE ATTORNEY GENERAL’S CYBER-DIGITAL TASK FORCE (2020), https://www.justice.gov/ag/page/file/1326061/download. May 2021 DOJ Journal of Federal Law and Practice 3 further—and conceal their involvement in—child exploitation,3 cybercrime,4 drug trafficking,5 and terrorist finance.6 To unmask these criminal activities and actors, investigators and prosecutors have obtained search warrants in various scenarios for permission to deploy technological measures, known as network investigative techniques (“NIT warrants”) or “remote search warrants,” to remotely search computers or other accounts without the consent or knowledge of the users. This article provides a brief explanation about the practical applications of NIT warrants and remote search techniques; the venues where they may be obtained, made clear by a recent amendment of Rule 41; legal challenges before this amendment; recent applications of these techniques; and legal challenges they may face based on historical context.7 II. About NITs, remote search techniques, and their uses NIT warrants and remote searches are two recurring applications of Rule 41 in investigations where criminal actors attempt to obfuscate their identities and presence. NITs have been used over the past decade in significant criminal investigations. NITs allow investigators to ascertain more information about computers—and the individuals using computers—connected to a network by deploying a code or program to the computers. For example, NITs can obtain information about a computer’s IP address, 3 E.g., Press Release, U.S. Dep’t of Justice, South Korean National and Hundreds of Others Charged Worldwide in the Takedown of the Largest Darknet Child Pornography Website, Which was Funded by Bitcoin (Oct. 16, 2019). 4 E.g., Press Release, U.S. Dep’t of Justice, Six Russian GRU Officers Charged in Connection with Worldwide Deployment of Destructive Malware and Other Disruptive Actions in Cyberspace (Oct. 19, 2020). 5 E.g., Press Release, U.S. Dep’t of Justice, Alleged Southern California Narcotics Traffickers Among Those Charged in International Crackdown Targeting Darknet Dealers (Sept. 22, 2020). 6 E.g., Press Release, U.S. Dep’t of Justice,
Recommended publications
  • Federal Register/Vol. 86, No. 134/Friday, July 16, 2021/Rules
    37674 Federal Register / Vol. 86, No. 134 / Friday, July 16, 2021 / Rules and Regulations (Federalism), it is determined that this DEPARTMENT OF JUSTICE Pennsylvania Avenue NW, Washington, action does not have sufficient DC 20530. Comments received by mail federalism implications to warrant the 28 CFR Part 50 will be considered timely if they are preparation of a Federalism Assessment. [Docket No. OAG 174; AG Order No. 5077– postmarked on or before August 16, As noted above, this action is an 2021] 2021. The electronic Federal eRulemaking portal will accept order, not a rule. Accordingly, the RIN 1105–AB61 comments until Midnight Eastern Time Congressional Review Act (CRA) 3 is at the end of that day. inapplicable, as it applies only to rules. Processes and Procedures for FOR FURTHER INFORMATION CONTACT: 5 U.S.C. 801, 804(3). It is in the public Issuance and Use of Guidance Robert Hinchman, Senior Counsel, interest to maintain the temporary Documents Office of Legal Policy, U.S. Department placement of N-ethylhexedrone, a-PHP, AGENCY: Office of the Attorney General, of Justice, telephone (202) 514–8059 4-MEAP, MPHP, PV8, and 4-chloro-a- Department of Justice. (not a toll-free number). PVP in schedule I because they pose a ACTION: Interim final rule; request for SUPPLEMENTARY INFORMATION: public health risk, for the reasons comments. expressed in the temporary scheduling I. Posting of Public Comments order (84 FR 34291, July 18, 2019). The SUMMARY: This interim final rule Please note that all comments temporary scheduling action was taken (‘‘rule’’) implements Executive Order received are considered part of the pursuant to 21 U.S.C.
    [Show full text]
  • Pledged Asset Line® Wire Transfer Request and Authorization | 1-800-838-6573
    Pledged Asset Line® Wire Transfer Request and Authorization www.schwab.com/pal | 1-800-838-6573 • Wire forms received prior to 1:30 p.m. Eastern time (10:30 a.m. Pacific time) on a Business Day will be processed by the end of the following Business Day. • For your protection, we must contact you by phone to verify your identity before the wire transfer can be completed. • There is no fee associated with this wire request. • We do not process any wire transfers sent from or to international banks, even if the currency is in U.S. dollars (USD). • Submit this form via secure message on Schwab.com or fax to Charles Schwab Bank at 1-877-300-6933. • Your initial draw may require a minimum. • Please contact us if you have any questions regarding this information. You may not borrow money on a Pledged Asset Line to purchase securities or pay down margin loans, or deposit advances from the line into any brokerage account. 1. Account Holder Information Name (First) (Middle) (Last) Telephone Number* Address City State Zip Code Country *Please provide a number so you can be reached for call-back verification purposes. 2. Outgoing Wire Information Date Wire to Be Sent Amount of Wire (in USD only) $ Pledged Asset Line Account Number (12 digits) Account Title (owner name) 3. Receiving Beneficiary/Bank Information Beneficiary Name (First) (Middle) (Last) Beneficiary Account Number at Bank Beneficiary Address City State Zip Code Country Beneficiary Bank Name Beneficiary Bank ABA or Account Number at Send-Through Bank Beneficiary Bank Address (if available) City State Zip Code Country Additional Instructions (Attention to, Customer Reference, Phone Advice) Send-Through Bank Name Send-Through Bank ABA Number Send-Through Bank Address (if available) City State Zip Code Country 4.
    [Show full text]
  • BANKING FEES All Fees Include GCT ACCOUNT OPENING SAVINGS ACCOUNT
    JMMB BANK BANKING FEES All fees include GCT ACCOUNT OPENING SAVINGS ACCOUNT CURRENT ACCOUNT Cheque Leaves Acquisition (Retail) J$2912.50 Cheque Leaves Acquisition (SME) J$5825.00 Cheque Leaves Acquisition (Corporate) J$17,475.00 Monthly Service Charge FREE Cheque Writing J$50.00 Returned Cheque (Own Bank)/Chargeback Item J$873.75 J$450.00 Stop Payment (Own Bank) J$5000.00 maximum TRANSACTION RELATED CASH DEPOSITS 1% + GCT (1.17%) on investment/deposits equal to 1,500 units or above in each currency, subject to a per client limit of 500 units per business day Cash Deposits - Foreign Currency and 1,500 units per calendar month. Cash Deposits in excess of J$1M Free CHEQUE DEPOSITS Returned Cheque J$640.75 Cheque Deposit - Collection Item (US) US$6.99 + Other Bank Charge J$640.75 Foreign Cheque Returned + Other Bank Charge Foreign Cheque Stop Payment US$14.88+ Other Bank Charge Cheque Deposit - Same Day Value (JMMB Bank Cheques) Free CASH WITHDRAWALS Cash Withdrawals up to J$1,000,000.00 Free CHEQUE WITHDRAWALS TRANSFERS WITHIN JMMB BANK Transfer Between Own Accounts (Internal Transfer) Free TRANSFERS TO AND FROM LOCAL INSTITUTIONS Returned/Recalled Electronic Transfers (Local) J$500.00 Transfer to other financial institution/ Third party (Local ACH) J$25.00 Wire - Incoming and Outgoing RTGS Transfers J$250.00 TRANSFERS TO AND FROM INTERNATIONAL INSTITUTIONS International Wire Transfer -Inbound - USD US$23.30 International Wire Transfer -Inbound - GBP n/a International Wire Transfer -Inbound - CAD n/a International Wire Transfer -Inbound
    [Show full text]
  • News and Documentary Emmy Winners 2020
    NEWS RELEASE WINNERS IN TELEVISION NEWS PROGRAMMING FOR THE 41ST ANNUAL NEWS & DOCUMENTARY EMMY® AWARDS ANNOUNCED Katy Tur, MSNBC Anchor & NBC News Correspondent and Tony Dokoupil, “CBS This Morning” Co-Host, Anchor the First of Two Ceremonies NEW YORK, SEPTEMBER 21, 2020 – Winners in Television News Programming for the 41th Annual News and Documentary Emmy® Awards were announced today by The National Academy of Television Arts & Sciences (NATAS). The News & Documentary Emmy® Awards are being presented as two individual ceremonies this year: categories honoring the Television News Programming were presented tonight. Tomorrow evening, Tuesday, September 22nd, 2020 at 8 p.m. categories honoring Documentaries will be presented. Both ceremonies are live-streamed on our dedicated platform powered by Vimeo. “Tonight, we proudly honored the outstanding professionals that make up the Television News Programming categories of the 41st Annual News & Documentary Emmy® Awards,” said Adam Sharp, President & CEO, NATAS. “As we continue to rise to the challenge of presenting a ‘live’ ceremony during Covid-19 with hosts, presenters and accepters all coming from their homes via the ‘virtual technology’ of the day, we continue to honor those that provide us with the necessary tools and information we need to make the crucial decisions that these challenging and unprecedented times call for.” All programming is available on the web at Watch.TheEmmys.TV and via The Emmys® apps for iOS, tvOS, Android, FireTV, and Roku (full list at apps.theemmys.tv). Tonight’s show and many other Emmy® Award events can be watched anytime, anywhere on this new platform. In addition to MSNBC Anchor and NBC.
    [Show full text]
  • IGC Plenary 2005
    Agenda of the Annual Meeting of the FAI Gliding Commission To be held in Lausanne, Switzerland on 5th and 6th March 2010 Agenda for the IGC Plenary 2010 Day 1, Friday 5th March 2010 Session: Opening and Reports (Friday 09.15 – 10.45) 1. Opening (Bob Henderson) 1.1 Roll Call (Stéphane Desprez/Peter Eriksen) 1.2 Administrative matters (Peter Eriksen) 1.3 Declaration of Conflicts of Interest 2. Minutes of previous meeting, Lausanne, 6th-7th March 2009 (Peter Eriksen) 3. IGC President’s report (Bob Henderson) 4. FAI Matters (Mr.Stéphane Desprez) 4.1 Update by the Secretary General 5. Finance (Dick Bradley) 5.1 2009 Financial report 5.2 Financial statement and budget 6. Reports not requiring voting 6.1 OSTIV report (Loek Boermans) Please note that reports under Agenda items 6.2, 6.3 and 6.4 are made available on the IGC web-site, and will not necessarily be presented. The Committees and Specialists will be available for questions. 6.2 Standing Committees 6.2.1 Communications and PR Report (Bob Henderson) 6.2.2 Championship Management Committee Report (Eric Mozer) 6.2.3 Sporting Code Committee Report (Ross Macintyre) 6.2.4 Air Traffic, Navigation, Display Systems (ANDS) Report (Bernald Smith) 6.2.5 GNSS Flight Recorder Approval Committee (GFAC) Report (Ian Strachan) 6.2.6 FAI Commission on Airspace and Navigation Systems (CANS) Report (Ian Strachan) Session: Reports from Specialists and Competitions (Friday 11.15 – 12.45) 6.3 Working Groups 6.3.1 Country Development Report (Alexander Georgas) 6.3.2 Grand Prix Action Plan (Bob Henderson) 6.3.3 History Committee (Tor Johannessen) 6.3.4 Scoring Working Group (Visa-Matti Leinikki) 6.4 IGC Specialists 6.4.1 CASI Report (Air Sports Commissions) (Tor Johannessen) 6.4.2 EGU/EASA Report (Patrick Pauwels) 6.4.3 Environmental Commission Report (Bernald Smith) 6.4.4 Membership (John Roake) 6.4.5 On-Line Contest Report (Axel Reich) 6.4.6 Simulated Gliding Report (Roland Stuck) 6.4.7 Trophy Management Report (Marina Vigorita) 6.4.8 Web Management Report (Peter Ryder) 7.
    [Show full text]
  • Easy Access Rules for Standardised European Rules of the Air (SERA)
    Easy Access Rules for Standardised European Rules of the Air (SERA) EASA eRules: aviation rules for the 21st century Rules and regulations are the core of the European Union civil aviation system. The aim of the EASA eRules project is to make them accessible in an efficient and reliable way to stakeholders. EASA eRules will be a comprehensive, single system for the drafting, sharing and storing of rules. It will be the single source for all aviation safety rules applicable to European airspace users. It will offer easy (online) access to all rules and regulations as well as new and innovative applications such as rulemaking process automation, stakeholder consultation, cross-referencing, and comparison with ICAO and third countries’ standards. To achieve these ambitious objectives, the EASA eRules project is structured in ten modules to cover all aviation rules and innovative functionalities. The EASA eRules system is developed and implemented in close cooperation with Member States and aviation industry to ensure that all its capabilities are relevant and effective. Published December 20201 1 The published date represents the date when the consolidated version of the document was generated. Powered by EASA eRules Page 2 of 213| Dec 2020 Easy Access Rules for Standardised European Rules Disclaimer of the Air (SERA) DISCLAIMER This version is issued by the European Aviation Safety Agency (EASA) in order to provide its stakeholders with an updated and easy-to-read publication. It has been prepared by putting together the officially published regulations with the related acceptable means of compliance and guidance material (including the amendments) adopted so far.
    [Show full text]
  • ON the EFFECTIVE USE of PROXY WARFARE by Andrew Lewis Peek Baltimore, Maryland May 2021 © 2021 Andrew Peek All Rights Reserved
    ON THE EFFECTIVE USE OF PROXY WARFARE by Andrew Lewis Peek A dissertation submitted to Johns Hopkins University in conformity with the requirements for the degree of Doctor of Philosophy Baltimore, Maryland May 2021 2021 Andrew Peek All rights reserved Abstract This dissertation asks a simple question: how are states most effectively conducting proxy warfare in the modern international system? It answers this question by conducting a comparative study of the sponsorship of proxy forces. It uses process tracing to examine five cases of proxy warfare and predicts that the differentiation in support for each proxy impacts their utility. In particular, it proposes that increasing the principal-agent distance between sponsors and proxies might correlate with strategic effectiveness. That is, the less directly a proxy is supported and controlled by a sponsor, the more effective the proxy becomes. Strategic effectiveness here is conceptualized as consisting of two key parts: a proxy’s operational capability and a sponsor’s plausible deniability. These should be in inverse relation to each other: the greater and more overt a sponsor’s support is to a proxy, the more capable – better armed, better trained – its proxies should be on the battlefield. However, this close support to such proxies should also make the sponsor’s influence less deniable, and thus incur strategic costs against both it and the proxy. These costs primarily consist of external balancing by rival states, the same way such states would balance against conventional aggression. Conversely, the more deniable such support is – the more indirect and less overt – the less balancing occurs.
    [Show full text]
  • Singularityce User Guide Release 3.8
    SingularityCE User Guide Release 3.8 SingularityCE Project Contributors Aug 16, 2021 CONTENTS 1 Getting Started & Background Information3 1.1 Introduction to SingularityCE......................................3 1.2 Quick Start................................................5 1.3 Security in SingularityCE........................................ 15 2 Building Containers 19 2.1 Build a Container............................................. 19 2.2 Definition Files.............................................. 24 2.3 Build Environment............................................ 35 2.4 Support for Docker and OCI....................................... 39 2.5 Fakeroot feature............................................. 79 3 Signing & Encryption 83 3.1 Signing and Verifying Containers.................................... 83 3.2 Key commands.............................................. 88 3.3 Encrypted Containers.......................................... 90 4 Sharing & Online Services 95 4.1 Remote Endpoints............................................ 95 4.2 Cloud Library.............................................. 103 5 Advanced Usage 109 5.1 Bind Paths and Mounts.......................................... 109 5.2 Persistent Overlays............................................ 115 5.3 Running Services............................................. 118 5.4 Environment and Metadata........................................ 129 5.5 OCI Runtime Support.......................................... 140 5.6 Plugins.................................................
    [Show full text]
  • Iphone Text Messages Read Receipt
    Iphone Text Messages Read Receipt When Gabriel attune his manages double-talk not blankety-blank enough, is Morgan lengthening? Undulant Roscoe sideswiping, his Cinzano frap crumbling boundlessly. Dwain delete her pyracanth collectively, reviewable and remonstrant. Read by francis navarro, letting us about with or text messages to such content and hold down according to appear in the advantages of the only stub undefined methods can About Direct Messages Twitter Help Center. In a lot more timely manner as an iphone text messages read receipt does the message read on group conversation participants. How they Disable iMessage Read Receipts on iPhone. With iOS 10 you get to verify whether penalty not you'll sleep read receipts with each. How close Not Show When Text you Read write an iPhone. Received the message with an acknowledged DLR delivery receipt. How to surge Off Read Receipts on iPhone for iMessage. The Messages app on the iPhone is project of sending and. You have read receipts on your negativity iphone text messages read receipt? Why are iMessages being happy as SMS Text Messages. Or not aware has received or read your most recent message. I don't care much means people give I trash the message but didn't respond. If i send both text via iMessage to another iPhone you will inspire the. How to Secretly Open iMessages Without Triggering Read. This WhatsApp status trick involves 'Read receipt' log of the messenger These receipts are upcoming check marks that appear friendly to each message you list If raw Read receipts are enabled then the sender will swarm to cough when hisher message is read.
    [Show full text]
  • Fedwire® Funds Service Produc T Sheet
    Fedwire® Funds Service The Fedwire Funds Service is the premier wire-transfer service that financial institutions and businesses rely on to send and receive time-critical, same-day payments. When it absolutely matters, the Fedwire Funds Service is the one to trust to execute your individual payments with certainty and finality. As a Fedwire Funds Service participant, you can pricing and permits the Federal Reserve Banks to use this real-time, gross-settlement system to send take certain actions, including requiring collateral and and receive payments for your own account or on monitoring account positions in real time. Detailed behalf of corporate or individual clients to make information on the Federal Reserve’s daylight cash concentration payments, to settle commercial overdraft policies can be found in the Guide to payments, to settle positions with other financial the Federal Reserve’s Payment System Risk Policy, institutions or clearing arrangements, to submit available online at www.federalreserve.gov. federal tax payments or to buy and sell federal funds. Security and Reliability When sending a payment order to the Fedwire The Fedwire Funds Service is designed to deliver the Funds Service, a Fedwire participant authorizes its reliability and security you know and trust from the Federal Reserve Bank to debit its master account Federal Reserve Banks. Service resilience is enhanced for the amount of the transfer. If the payment order through out-of-region backup facilities for the is accepted, the Federal Reserve Bank holding the Fedwire Funds Service application, routine testing master account of the Fedwire participant that is of business continuity procedures across a variety of to receive the transfer will credit the same amount contingency situations and ongoing enhancements to that master account.
    [Show full text]
  • Inman Real Estate News - Web Tools Open New Lines of Communicat
    Inman Real Estate News - Web tools open new lines of communicat... http://www.inman.com/printer.aspx?ID=62929 Back Send to Printer Web tools open new lines of communication for agents Part 1: Real estate technology buzz Monday, April 23, 2007 By Glenn Roberts Jr. Inman News Editor's note: In an increasingly competitive marketplace, brokers and agents are trying new things to gain an edge. In this four-part series, Inman News offers a look at new tools available for Realtors, including online communication plug-ins, online video and single-property Web site marketing. Maybe you haven't used Jaxtr, Jott, Meebo, Pinger and Twitter. In fact, maybe you haven't heard of them. They are not: alien planets discovered on "Star Trek"; nicknames for illicit pharmaceuticals; new cable television networks; or Pokemon pals. They are: new ways to communicate. Instant-messaging, text-messaging, voice-messaging and e-mail-messaging technologies are a hotbed for communications mashups, and these companies among others are supplying the "always on" business of real estate with plenty of tools to instantly reach out and text, call, IM or e-mail someone at all hours. While these communication tools do offer more opportunities to generate leads and keep in touch with clients, some real estate professionals say that managing all of these communications channels can be a challenge and a time drain. Jim Duncan, a third-generation Realtor for Century 21 Manley in Charlottesville, Va., who maintains a blog at RealCentralVA.com and has amassed a collection of 13 e-mail addresses, four instant-messaging addresses and a voice-over-Internet account through Skype.
    [Show full text]
  • The 2016 Amendments to Criminal Rule 41: National Search Warrants to Seize Cyberspace, “Particularly” Speaking Devin M
    University of Richmond UR Scholarship Repository Law Student Publications School of Law 2017 The 2016 Amendments to Criminal Rule 41: National Search Warrants to Seize Cyberspace, “Particularly” Speaking Devin M. Adams University of Richmond Follow this and additional works at: http://scholarship.richmond.edu/law-student-publications Part of the Constitutional Law Commons, Criminal Procedure Commons, and the Fourth Amendment Commons Recommended Citation Devin M. Adams, Comment, The 2016 Amendments to Criminal Rule 41: National Search Warrants to Seize Cyberspace, “Particularly” Speaking, 51 U Rich L. Rev. 727 (2017). This Response or Comment is brought to you for free and open access by the School of Law at UR Scholarship Repository. It has been accepted for inclusion in Law Student Publications by an authorized administrator of UR Scholarship Repository. For more information, please contact [email protected]. THE 2016 AMENDMENTS TO CRIMINAL RULE 41: NATIONAL SEARCH WARRANTS TO SEIZE CYBERSPACE, "PARTICULARLY' SPEAKING INTRODUCTION "One may know how to conquer without being able to do it."' George Orwell's dystopia, with the ever-watchful Big Brother, has seemingly become a reality with the recently passed amend- ments to Rule 41 of the Federal Rules of Criminal Procedure.2 Rule 41, governing searches and seizures, now permits magis- trate judges to authorize agents-under a single warrant-to "remotely access," and simultaneously search, copy and seize in- formation from an infinite number of unknown electronic devices in multiple districts anywhere in the country.' The unlimited ju- risdiction provision is triggered when a device's location is ob- scured through "technological means," or if agents are investigat- ing computer crimes in five or more districts4-regardless of whether the locations of the innumerable search targets are known.
    [Show full text]