Clifford Chance Warn of Scam Emails

16 September 2011 – Illegal use of our name and names of individual lawyers at our firm
2011

We have become aware that our name, and sometimes also the names of individual lawyers within our firm, have been used in a number of unsolicited scam emails. These emails typically seek to attract the victim by suggesting that they are (or can be) the beneficiary of a substantial sum of money. Another variant relates to the offer of overseas employment, often with a firm called Dyncorp being mentioned.

Would anyone who receives any such communication including a reference to Clifford Chance and/or a Clifford Chance lawyer please note that neither this firm nor any of our lawyers have any involvement whatsoever in the subject matter of those emails, and that such references are unauthorised and unlawful. There is a well documented history of these sorts of scams seeking to prey on unwitting victims, commonly offering substantial sums but, in reality, resulting only in the victim parting with their own money, which is never seen again.

Scarlett Johansson, Mila Kulis Hacking Scandal – Will It Lead To Increased Lawsuits?

LawFuel.com – The growing propensity for celebrities and others to have their phones hacked is creating increasing alarm among the celebrity and political community as the law needs to keep pace with the growing ability of sophisticated telephone and other devices to record and transmit the most intimate audio and visual content around the Net.

Apart from legal concerns generally and an almost certain increase in lawsuits relating to privacy and other issues, the law is able to protect private material that is illegally obtained, the real issue is how to set up effective enforcement measures that will protect celebrities and even perfectly normal people from having their most private lives “hacked.”

The FBI are already investigating the Johansson and Kulis hacking situation, but around 50 A-listers are already on the hacking list, according to reports.

The FBI believe they can identify the hackers in this case, but the real question is how to protect ourselves from future hacking ‘events’ as technology becomes even more sophisticated and intrusive.

Scroll to Top