Close

Articles Posted in federal criminal attorney

Updated:

Know Your Rights

When you’re approached or arrested by law enforcement, it’s natural to feel scared, overwhelmed, or tempted to explain your side. But one of the most powerful tools you have is silence. Under the 5th Amendment of the U.S. Constitution, you have the right to remain silent and avoid self-incrimination. This…

Updated:

Department of Justice Fraud Prosecutions

Fraud is a concept that has been in the criminal justice system forever.  Google defines it as an intentional deception used to gain an unfair advantage or benefit, often involving financial gains.  How does the Department of Justice prosecute fraud?  Below is a non exhaustive list of charges that the…

Updated:

Deferred Prosecution Agreements in the Health Care Field

The federal government may target organizations and businesses as well as individuals for violations of federal criminal statutes.  For example, in the health care realm, cases can include office managers, practitioners from doctors, nurses to pharmacists to all other aspects of the medical industry.  Recent federal investigations have targeted pill…

Updated:

What to Expect in a Federal Criminal Trial

A federal criminal trial consists of several different stages.   The below will analyze a ONE defendant trial.  But, more often than not, trials can consist of multiple defendants at trial.  This just augments the time needed for each stage. Jury Selection also known as Voir Dire Jury selection is one…

Updated:

White Collar Crime at a Crossroads: The Implications of Kousisis on Federal Fraud

This month, the Supreme Court heard oral arguments in Kousisis v. United States, a case that could have significant implications on the future of federal white-collar prosecutions. Specifically, the Court is considering the boundaries of federal fraud statutes in scenarios where deceptive practices are employed without causing direct financial harm…

Updated:

Recent Computer Hacking Cases in the News

Recently, Robert Purbeck of Idaho, also known as “Lifelock,” and “Studmaster,”  was sentenced to ten years after pleading guilty to federal charges of computer fraud and abuse.  He hacked into the computer servers of the City of Newnan, Georgia  and a Griffin, Georgia medical clinic, and then targeted at least…

Updated:

P2P Applications and Child Pornography

As we explained in our prior post about federal child pornography laws, the consequences of a child pornography or CSAM (“Child Sexual Abuse Material”) conviction are severe and life-altering. And the collateral consequence of being on the sex offender registry can be devastating. Early on, Conaway & Strickler defended cases…

Updated:

Criminal Consequences for Unruly Airline Passengers: The FAA’s Push for Prosecution

In recent years, unruly behavior on flights has become a growing concern, prompting the Federal Aviation Administration (FAA) to escalate its enforcement efforts. Since 2021, the FAA has referred over 310 cases of severe incidents to the FBI for criminal prosecution. These cases involve dangerous acts like physical assaults, attempts…

Updated:

When Can Law Enforcement Search my Cell Phone?

Cell phones are everywhere today and thus play a significant role in criminal investigations. What reports are generated from my devices?  Cellebrite reports provide information about phone calls and text messages; but now it also provides a report on the data stored on these devices such as voicemails, images, and…

Updated:

Suspicious Activity Reports (SARs): What Triggers Them and How to Respond

In the world of banking and finance, the term “Suspicious Activity Report” (SAR) may sound intimidating—especially if you’ve been notified that a bank has filed one concerning your transactions. For individuals and businesses alike, it’s essential to understand what a SAR is, what activities can trigger these reports, and the…

Contact Us