Search for: "DOUGLAS A HACKER" Results 41 - 60 of 114
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
23 May 2012, 10:00 am by McNabb Associates, P.C.
"We would expect that capabilities like CIPAV would be an example" of what the DCAC will create, says Steve Bock, president of Colorado-based Subsentio, referring to the FBI's remotely-installed spyware that it has used to identify extortionists, database-deleting hackers, child molesters, and hitmen. [read post]
23 May 2012, 10:00 am by McNabb Associates, P.C.
"We would expect that capabilities like CIPAV would be an example" of what the DCAC will create, says Steve Bock, president of Colorado-based Subsentio, referring to the FBI's remotely-installed spyware that it has used to identify extortionists, database-deleting hackers, child molesters, and hitmen. [read post]
7 Mar 2012, 5:54 am by Rob Robinson
Not So Easy - bit.ly/z5GZUe (Tam Harbert) Hacker Points to Weakness in LexisNexis Concordance - bit.ly/zjdXby (Evan Koblentz) Landmark E-Discovery Decision Recognizes the Appropriateness of Predictive Coding Review - bit.ly/yiwBVk (Squire Sanders) Electronic Medical Records: Legal Risks of Going Paperless - bit.ly/yLrr5x (Alicia Gallegos) Employment Discrimination Protocols for Discovery: They’re Coming - bit.ly/ycL6GF (Daniel… [read post]