BLOG

Road to Nowhere
Computer Law
Tor Ekeland

In Liminae: The Road to Nowhere

It takes us about six hours to drive to the rural state jail (that’s owned by two judges) the Feds contracted with to hold our client. Accused of computer crimes, he can’t effectively review evidence in jail – there’s no practical access to computers in the gulag. They’ve seized all his assets claiming they’re the ill-gotten gains of crimes the government can’t identify, and their computer forensics – if you can call them that – have no scientific basis and are full of basic errors and typos. In my decade as a federal criminal defense lawyer doing computer cases across the country, I’ve never come across a case where the government was so completely off.

Read More »

Guilty Until Proven Innocent

A defendant’s view from the trenches of federal criminal court This post is originally published to Substack. You can read and follow us there. https://torekeland.substack.com/p/guilty-until-proven-innocent “Everywhere you turn there’s some caveat that’s biased against the defendant,” says the Firm’s new Associate Michael Hassard. This isn’t news to criminal defense lawyers, this moment strikes us all. Mike was learning about one

Read More »

Breaking: The Douglass Mackey Motion for a Bill of Particulars

Donate to Douglass Mackey’s Legal Defense Fund here: https://givesendgo.com/douglassmackey This case is a direct threat to free speech on the Internet. No matter what your political persuasion, you should be concerned that the Government is attempting to criminally censor speech on the internet through a partisan prosecution that lacks any basis in law or fact. Normally we don’t file a

Read More »
CFAA 2021 Year in review
Computer Law
Tor Ekeland

2021 CFAA Year in Review

In 2021 the United States Supreme Court finally considered what constitutes unauthorized access under the Computer Fraud and Abuse Act. It put a bullet in the head of the terms of service theory of unauthorized access. United States v. Van Buren involved a similar fact pattern as the Second Circuit’s “cannibal cop” CFAA unauthorized access case United States v. Valle.

Read More »

The Cybersecurity 202: A fight in Missouri shows the damage of overbroad hacking laws

Tor was interviewed by the Washington Post as part of their Cybersecurity 202 column. “The governor’s office is trying to divert attention from the fact they left people’s Social Security numbers exposed and they’re criminalizing good reporting,” Tor Ekeland, an attorney who specializes in defending people accused of computer crimes, told me.  Washington Post, Cyber Security 202 Read the article here!

Read More »

Blackstone 8: Sexism & the Common Law

It’s common to criticize Blackstone for embracing the Common Law’s sexism. But a passage I read the other day made me critical of this attitude towards his work. It made me wonder if it is more a product of confusing what Blackstone wrote with such clarity about – the Common Law  – with his personal views. A passage where he

Read More »

Tor Ekeland Law, PLLC focuses on Computer Law and Criminal Defense.

30 WALL STREET, 8TH FLOOR • NEW YORK, NY 10005

©2022 Tor Ekeland Law, PLLC   •  info@torekeland.com

Attorney Advertising   •   Past results do not guarantee future results   •   Licensed in New York and California