<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
     xmlns:georss="http://www.georss.org/georss"
     xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
     xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[cryptocurrency - Conaway & Strickler]]></title>
        <atom:link href="https://www.conawayandstrickler.com/blog/categories/cryptocurrency/feed/" rel="self" type="application/rss+xml" />
        <link>https://www.conawayandstrickler.com/blog/categories/cryptocurrency/</link>
        <description><![CDATA[Conaway & Strickler's Website]]></description>
        <lastBuildDate>Sun, 29 Mar 2026 17:33:35 GMT</lastBuildDate>
        
        <language>en-us</language>
        
            <item>
                <title><![CDATA[Cryptocurrency Investment Fraud Cases]]></title>
                <link>https://www.conawayandstrickler.com/blog/cryptocurrency-investment-fraud-cases/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/cryptocurrency-investment-fraud-cases/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Sun, 29 Mar 2026 17:33:34 GMT</pubDate>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                
                    <category><![CDATA[#crypto]]></category>
                
                    <category><![CDATA[#cryptocurrency]]></category>
                
                    <category><![CDATA[cryptocurrency fraud charges]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                
                
                <description><![CDATA[<p>Conaway & Strickler, PC recently tried a case in federal court that involved cryptocurrency investment fraud, money laundering, and wire fraud. Through the years, the firm has taken on an increasing number of cryptocurrency fraud cases as the popularity of digital currency continues to grow. We are well versed on defended anyone charged with the&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>Conaway & Strickler, PC recently tried a case in federal court that involved cryptocurrency investment fraud, <a href="/criminal-defense-practice/federal-crimes/federal-white-collar-crimes/money-laundering/">money laundering</a>, and wire fraud.  Through the years, the firm has taken on an increasing number of cryptocurrency fraud cases as the popularity of digital currency continues to grow.  We are well versed on defended anyone charged with the types of cases like the below.  </p>



<p>For example, the <a href="https://www.sec.gov/files/litigation/complaints/2025/comp-pr2025-144.pdf">SEC recently filed charges </a>against purported crypto asset trading platforms Morocoin Tech Corp., Berge Blockchain Technology Co. Ltd., and Cirkor Inc. and investment clubs AI Wealth Inc., Lane Wealth Inc., AI Investment Education Foundation Ltd., and Zenith Asset Tech Foundation alleging that they defrauded retail investors out of more than $14 million in an elaborate investment confidence scam.  </p>



<p>“AI Wealth, Lane Wealth, AIIEF, and Zenith operated so-called investment clubs using WhatsApp and solicited investors to join the clubs with ads on social media. The clubs gained investors’ confidence with supposedly AI-generated investment tips before luring investors to open and fund accounts on purported crypto asset trading platforms Morocoin, Berge, and Cirkor, which falsely claimed to have government licenses, as alleged. The investment clubs and platforms then allegedly offered “Security Token Offerings” that were purportedly issued by legitimate businesses. In reality, no trading took place on the trading platforms, which were fake, and the Security Token Offerings and their purported issuing companies did not exist, according to the complaint. When investors tried to withdraw their funds, the complaint alleges that the defendants further defrauded victims by demanding that they pay advance fees. In all, the defendants misappropriated at least $14 million from U.S.-based retail investors and funneled those funds overseas through a web of bank accounts and crypto asset wallets, as alleged.”</p>



<p>In another recent <a href="https://www.justice.gov/usao-ct/pr/wolcott-man-indicted-cryptocurrency-fraud-scheme">case</a>, a young man, Elmin Redzepagic was charged in a 21-count indictment offenses related to an alleged cryptocurrency fraud scheme.  As alleged in the indictment, Redzepagic “held himself out to investors as a cryptocurrency investor who earned high rates of return. Once Redzepagic had victims’ initial investment, he told them they had earned a substantial profit but had to pay additional fees (“gas fees”) to withdraw it. Redzepagic claimed to work as part of a team that included someone known as “The Chef,” who supposedly led the operation and determined who, how, and when investors would receive their profits. In fact, Redzepagic did not invest victims’ funds in cryptocurrency but instead transferred the funds to Stake.com, an offshore gambling platform that Redzepagic used to receive and hold proceeds of the scheme, to generate cryptocurrency addresses for victims to use to transfer Bitcoin to him, and to make large “lulling” payments to victims throughout the course of the scheme.”</p>



<p>Finally, in another <a href="https://www.justice.gov/usao-mdfl/pr/goliath-ventures-ceo-arrested-wire-fraud-and-money-laundering">case,</a> Goliath Ventures founder Christopher Alexander Delgado has been arrested on a criminal complaint charging him with wire fraud and money laundering. It is alleged that this “was a “Ponzi scheme,” which is a form of investment fraud that involves the payment of purported returns to existing investors from funds contributed by new investors. Delgado’s scheme involved soliciting victims to invest substantial sums of money under false and fraudulent promises of monthly returns generated through cryptocurrency “liquidity pools.” Victims were induced to give money to Goliath through personal referrals, professional marketing materials, luxury events, charitable sponsorships, and some monthly payments of purported returns, all of which were designed to establish Goliath’s bona fides with investors. Based on these false and fraudulent representations, Goliath obtained at least $328 million from victim investors.</p>



<p>Although Goliath represented that it would place the victim investors’ funds in cryptocurrency liquidity pools, in reality, the funds were primarily used to pay purported returns to earlier investors, to return principal to investors who requested it, and for Goliath’s extravagant business gatherings, holiday parties, and luxury travel accommodations. With victim investors’ funds, Delgado purchased four residential properties each worth between $1.15 million and $8.5 million.”</p>



<p>The FBI has <a href="https://www.fbi.gov/how-we-can-help-you/victim-services/national-crimes-and-victim-resources/cryptocurrency-investment-fraud">recently stated</a> that “cryptocurrency investment fraud, which the media commonly describes as “<a href="https://www.conawayandstrickler.com/blog/what-is-a-pig-butchering-scam/">pig butchering</a>,” is one of the most prevalent and damaging fraud schemes today.”  As a result, more and more DOJ prosecutions are happening.  Please <a href="https://www.conawayandstrickler.com/contact-us/">contact us </a>if you have received any sort of indication that you are under federal investigation.  </p>



<p></p>



<p></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[What is Money Laundering?]]></title>
                <link>https://www.conawayandstrickler.com/blog/charged-with-money-laundering/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/charged-with-money-laundering/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Wed, 26 Nov 2025 02:14:54 GMT</pubDate>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[RICO]]></category>
                
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[wire fraud]]></category>
                
                
                
                <description><![CDATA[<p>I. What charges can the government use to allege money laundering? 18 U.S.C. § 1956: This is for laundering monetary instruments and carries a penalty of up to 20 years in prison and fines of up to $500,000 or twice the value of the funds involved, whichever is greater 18 U.S.C. § 1957: This applies&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p></p>



<p></p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="1024" height="768" src="/static/2025/11/lsa-downtown-view-.jpg" alt="" class="wp-image-1429" srcset="/static/2025/11/lsa-downtown-view-.jpg 1024w, /static/2025/11/lsa-downtown-view--300x225.jpg 300w, /static/2025/11/lsa-downtown-view--768x576.jpg 768w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>I. What charges can the government use to allege money laundering?</p>



<p>18 U.S.C. § 1956: This is for laundering monetary instruments and carries a penalty of up to 20 years in prison and fines of up to $500,000 or twice the value of the funds involved, whichever is greater</p>



<p>18 U.S.C. § 1957: This applies to engaging in monetary transactions in property derived from specified unlawful activity and can result in up to 10 years in prison and fines up to twice the value of the property involved.</p>



<p>18 U.S.C. § 1956(h): criminalizes conspiracy to commit money laundering. It makes it illegal for two or more people to agree to conduct or attempt to conduct a financial transaction involving the proceeds of specified unlawful activity (money laundering). The crime is the agreement itself, regardless of whether the money laundering was ultimately successful.</p>



<p>Bulk cash smuggling (31 U.S.C. § 5332): knowingly concealing more than $10,000 in currency or other monetary instruments on the person of such individual or in any conveyance, article of luggage, merchandise, or other container, and transports or transfers or attempts to transport or transfer such currency or monetary instruments from a place within the United States to a place outside of the United States, or from a place outside the United States to a place within the United States</p>



<p>RICO Act- the Racketeer Influenced and Corrupt Organizations (RICO)</p>



<p>II. Drug traffickers are purported to utilize some of the following tactics to money launder</p>



<p>-Purchase and or title assets in fictitious names, aliases, or in the names of friends or relatives </p>



<p>-Create and maintain Bitcoin and other cryptocurrency accounts. These are utilized because of the anonymity associated with the use of Bitcoin and other cryptocurrency accounts and because cryptocurrency is decentralized.</p>



<p>III. Dark Net Explanation </p>



<p>The darknet is a part of the internet that requires special software, like the <a href="https://www.torproject.org/">Tor browser</a>, to access, and is not indexed by standard search engines. It uses layered encryption to make user activity anonymous</p>



<p>IV. Cryptocurrency </p>



<p>This is a type of virtual currency, that is a decentralized, peer to peer network based medium of value or exchange that may be used as a substitute for fiat to buy goods or services or exchanged for fiat currency or other cryptocurrencies.  <a href="https://coinmarketcap.com/all/views/all/">Examples</a> of cryptocurrency are <a href="/blog/bitcoin-cryptocurrency-money-laundering/">Bitcoin</a>, Ethereum, Litecoin, Dogecoin, Monero, among others.  </p>



<p>Most cryptocurrencies have a blockchain which is a distributed public ledger, run by the decentralized network, containing an immutable and historical record of every transaction.  It is still difficult for a number of reasons for law enforcement to track.  </p>



<p>Cryptocurrency is stored in a virtual account called a <a href="https://www.coinbase.com/learn/crypto-basics/what-is-a-crypto-wallet">wallet</a>.  Crypto wallets are designed to store your private key, keeping your crypto accessible at all times. They also allow you to send, receive, and spend cryptocurrencies like Bitcoin and Ethereum.  Crypto wallets keep your private keys – the passwords that give you access to your cryptocurrencies – protected and accessible, allowing you to send and receive cryptocurrencies like Bitcoin and Ethereum.</p>



<p>The Financial Crimes Enforcement Network (“FinCEN”) has issued many notices discussing the various issues with cryptocurrency including recent concerns over regulatory risks related to convertible virtual currency <a href="https://www.fincen.gov/system/files/shared/FinCEN-Notice-CVCKIOSK.pdf">kiosks</a>.  This <a href="https://www.fincen.gov/system/files/advisory/2019-05-10/FinCEN%20Advisory%20CVC%20FINAL%20508.pdf">notice </a>dates back to 2019!  It’s worth a read as it describes dark net marketplaces and cryptocurrency really well.  </p>



<p>V. Recent cases in the news </p>



<p>The recent “<a href="https://manhattanda.org/d-a-bragg-announces-guilty-pleas-in-dark-web-cryptocurrency-drug-trafficking-ring-that-laundered-7-2-million/">Fire bunny</a>” case was a case that operated on the darknet from January 2019 to August 2022. It operated on multiple dark web marketplaces and described itself as an “old vendor with the best in QUALITY SPEED OF DELIVERY and STEALTH.”  In total, the defendants allegedly received nearly $8 million in Bitcoin proceeds and investigators found nearly $900,00 worth of cryptocurrency on one of the defendant’s phone. Some of the money received was laundered by converting Monero – a form of anonymized cryptocurrency that is extremely difficult to trace or monitor – into Bitcoin. The Bitcoin would then enter cryptocurrency exchange accounts controlled by the defendants and others.  At least $2.4 million in Bitcoin was sent to a foreign based cryptocurrency exchange and laundered in the form of Chinese Yuan.</p>



<p><a href="https://www.justice.gov/usao-sdny/pr/founders-samourai-wallet-cryptocurrency-mixing-service-sentenced-five-and-four-years">Samourai</a> CEO Keonne Rodriguez and Samourai CTO William Lonergan Hill were recently sentenced for knowingly transmitting over $237 million in alleged criminal proceeds, coming from, among other things, drug trafficking, darknet marketplaces, cyber-intrusions, frauds, sanctioned jurisdictions, murder-for-hire schemes, and a child pornography (“CSAM”) website.</p>



<p>It utilized a Bitcoin mixing service known as “Whirlpool,” and coordinated batches of Bitcoin exchanges between groups of Samourai users. Through this process, the original source of particular Bitcoin holdings became obscured within the blockchain’s transactional record, effectively preventing law enforcement agencies and cryptocurrency exchanges from tracing funds back to their origins. </p>



<p>The second service, called “Ricochet,” enabled users to introduce additional and unnecessary intermediate transactions—known as “hops”—between sending and receiving addresses. This feature served a similar obfuscation purpose, making it substantially more difficult for monitoring entities to establish connections between cryptocurrency transfers and potential illicit activities. The scale of these operations was considerable: from Ricochet’s launch in 2017 and Whirlpool’s inception in 2019, more than 80,000 Bitcoin—valued at over $2 billion at the time—passed through these services. Samourai collected fees for both services, estimated to have a total value of more than $6 million.</p>



<p>Finally, in <a href="https://www.justice.gov/opa/pr/law-enforcement-seize-record-amounts-illegal-drugs-firearms-and-drug-trafficking-proceeds">Operation RapTor</a>, participating law enforcement agencies in the U.S., Europe, South America, and Asia arrested 270 darknet vendors, buyers, and administrators.  Recently, as part of that large takedown, in the Southern District of New York (which is a district we are licensed to practice in) Incognito Market owner <a href="https://www.justice.gov/usao-sdny/pr/incognito-market-owner-pleads-guilty-operating-one-largest-illegal-narcotics">Rui-Siang Lin pled guilty</a> for operating an online narcotics bazaar that existed on the dark web.  It is alleged that Incognito Market sold more than $100 million of narcotics to anyone using the Tor web browser on the “dark web” or “darknet.”</p>



<p>Conaway & Strickler, PC is licensed to practice in NY, GA and CA. We can “pro hac” into any federal district in the country and have represented clients in New Hampshire, Vermont, Georgia, New Jersey, New York, California, Iowa, Texas, Tennessee, Florida, Pennsylvania, among others.  We have “first chaired” many jury trials and have represented clients charged with RICO, drug trafficking and cryptocurrency money laundering cases.  Please <a href="https://www.conawayandstrickler.com/contact-us/">contact us</a> for additional information or if you have a case you want to discuss with us.   Please see <a href="/criminal-defense-practice/federal-crimes/federal-white-collar-crimes/money-laundering/">here</a> for additional blogs on this subject.  </p>



<p></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Recent Fraud Cases Highlighted by the DOJ include Cryptocurrency and Civil Forfeiture Complaints]]></title>
                <link>https://www.conawayandstrickler.com/blog/recent-fraud-cases-highlighted-by-the-doj-include-cryptocurrency-and-civil-forfeiture-complaints/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/recent-fraud-cases-highlighted-by-the-doj-include-cryptocurrency-and-civil-forfeiture-complaints/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Sun, 03 Aug 2025 13:54:00 GMT</pubDate>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                    <category><![CDATA[Cybercrime]]></category>
                
                
                    <category><![CDATA[#cryptocurrency]]></category>
                
                    <category><![CDATA[#moneylaundering]]></category>
                
                    <category><![CDATA[atlanta criminal lawyer]]></category>
                
                    <category><![CDATA[atlanta federal criminal attorney]]></category>
                
                    <category><![CDATA[atlanta internet crime attorney]]></category>
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[cryptocurrency fraud charges]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                    <category><![CDATA[white collar lawyer]]></category>
                
                
                
                <description><![CDATA[<p>As we enter the 8th month of 2025, it is clear that federal agencies have ramped up enforcement of federal crimes, leading to substantial financial penalties and lengthy prison sentences. Recently, the Department of Justice highlighted enforcement efforts that allegedly aimed at protecting&nbsp; Americans from transnational fraud schemes.&nbsp; Here are some of the cases discussed:&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>As we enter the 8th month of 2025, it is clear that federal agencies have ramped up enforcement of federal crimes, leading to substantial financial penalties and lengthy prison sentences.</p>



<p>Recently, the Department of Justice highlighted enforcement efforts that allegedly aimed at protecting&nbsp; Americans from transnational fraud schemes.&nbsp; Here are some of the cases discussed:</p>



<p><a href="https://www.pacermonitor.com/public/case/58513717/USA_v_Murray">United States v. Troy Murray</a> and <a href="https://www.pacermonitor.com/public/case/58513715/USA_v_Murray">United States v. Cutter Murray</a>. On June 11, 2025, DOJ’s Consumer Protection Branch filed an Information in SDFL charging Troy Murray also known as “Steve Dixson” with conspiracy to commit wire fraud. According to court documents, Troy Murray sold to lottery fraud scammers, including Jamaicans, his lead list database containing the names, and personal information of over seven million elderly American consumers. These lists were allegedly then used to defraud elderly victims. Additionally, Cutter Murray, Troy Murray’s son, will plead guilty to one count of money laundering for receiving and then laundering $1.6 million of the fraudulent funds Troy Murray obtained.</p>



<p><a href="https://www.justice.gov/usao-ct/pr/georgia-man-charged-operating-sweepstakes-scam">United States v. Jimmy Smith</a>. On April 1, 2025 the U.S. Attorney’s Office for the District of Connecticut announced charges against Jimmy Smith, 30, a citizen of Jamaica, who resided in Hinesville, Georgia. According to court documents, Smith and others defrauded at least four victims residing in Connecticut, New York, Texas, and California, by telling them they had won a Publishers Clearing House Sweepstakes and needed to pay taxes or money to claim the prize.</p>



<p>United States v. <a href="https://www.justice.gov/usao-ma/pr/nigerian-national-pleads-guilty-role-romance-scam-and-money-laundering-scheme">Charles Uchenna Nwadavid</a>. On April 9, the U.S. Attorney’s Office (USAO) for the District of Massachusetts announced charges against Charles Uchenna Nwadavid, a citizen of Nigeria who was arrested after landing at the Dallas-Fort Worth Airport. In January 2024, a grand jury indicted Nawadavid on one count of mail fraud and two counts of money laundering. Between approximately 2016 to September 2019, Nwadavid allegedly participated in romance scams that tricked victims into sending money abroad.&nbsp; He plead guilty to mail fraud, aiding and abetting money laundering and money laundering on June 26, 2025.&nbsp; The DOJ states “romance schemes” &nbsp;generally begin when the “bad actors” recruit victims through advertisements for online relationships on dating or social media websites. Individuals perpetuating romance scams often create fictitious profiles and then use them to gain victims’ trust through a purported romantic relationship. Perpetrators then direct their victims to send money or to conduct financial transactions involving other victims’ money under false pretenses, such as an urgent need for money to secure a multi-million dollar inheritance or to pay for an unexpected hospitalization.</p>



<p>Another romance scheme can involve investing in cryptocurrency. The United States Attorney’s Office for the Northern District of Ohio (USAO) has filed a <a href="https://www.justice.gov/usao-ndoh/media/1391461/dl?inline">civil complaint in forfeiture</a> against 8,207,578 Tether (USDT) cryptocurrency, valued at more than $8.2 million in February, 2025.&nbsp; &nbsp;In that case, investigators found that scammers initially contacted the victims through seemingly misdirected, or “wrong number,” text messages. The fraudster then gained the victim’s trust and affection using various manipulative tactics. Once trust was established with the victim, the fraudster would share how much success they, or someone they knew, had with investing in cryptocurrency. This personal testimonial lessened any uncertainties the victims may have had about virtual currencies and eventually had the intended effect to persuade the victim to proceed with the investment.</p>



<p>The fraudster would then guide the victim, step-by-step, on how to open a legitimate cryptocurrency account, most often with a U.S. based virtual currency exchange such as Crypto.com or Coinbase. The scammer would walk the victim through the entire process of transferring money from their bank to the newly created cryptocurrency account. Next, the victim received instructions on how to transfer the purchased cryptocurrency assets to an online “investment platform,” which would turn out to be a fake site created by the fraudsters to look like a legitimate company. Information on the platforms promised lucrative returns which encouraged victims to invest further. However, once the victim transferred their funds to the “investment platform” they unknowingly handed over complete control and ownership of their funds to the scammer.&nbsp; These fake cryptocurrency trading platforms or fake versions of official crypto wallets to trick unsuspecting victims. These fake websites usually have similar but slightly different domain names from the sites they attempt to mimic.</p>



<p>The complaint also outlines that the perpetrators of such investment fraud schemes often allow victims to withdraw a portion of their “profits” early on in the scheme to build trust and reinforce their belief that the “investment platform” was legitimate. But as the scheme progressed, victims were unable to withdraw their funds and given excuses as to why they could not access their funds. For example, the fraudsters referred to a fake “tax” requirement, stating that taxes must be paid on the proceeds generated from the investment platform. Knowing that the scam would run its course soon, the fraudsters used last-ditch efforts to lie to victims that they had to pay a tax. Ultimately, victims were locked out of their account on the investment platform and lost their funds.</p>



<p>A woman in Lake County, Ohio became the target of such a scam when she responded to a text on her phone from an unknown number in November 2023. She began sharing information via text with the person and the two bonded over topics such as hobbies and religion. Over a period of time, the victim followed instructions from her new “friend” and opened an account at Crypto.com and then transferred funds into the account. When the victim wanted to withdraw funds, her “friend,” relented and said additional payments were needed and she complied. When the victim no longer had any funds left after making additional payments, her “friend” began to threaten her that he would send his friends to “take care of” her friends and family. Having lost her entire life savings of approximately $663,352, including funds from her Roth IRA, the victim filed a complaint with the FBI’s Internet Crime Complaint Center to report the losses in June 2024. The FBI Cleveland Division subsequently initiated an investigation.</p>



<p><a href="https://www.justice.gov/usao-ndoh/media/1402451/dl?inline">United States v. 679,981.22 Tether, et al</a>. On June 3, the U.S. Attorney’s Office for the Northern District of Ohio announced the filing of a civil forfeiture complaint against 679,981.22 in the Tether cryptocurrency suspected of being fraudulently obtained as part of a romance/investment scam. According to court documents, one victim was targeted via LinkedIn and another victim was targeted though the dating App “Coffee Meets Bagel.”</p>



<p>The experienced federal criminal defense attorneys at <a href="/lawyers/">Conaway & Strickler, PC</a> are here to protect your rights, reputation, and future should you be under investigation. With decades of experience in defending traditional financial fraud paired with a deep understanding of the newer world of cryptocurrency, our firm possesses the skills and expertise to assist those accused of any type of fraud.  Call or <a href="/contact-us/">contact us online for a confidential consultation</a>.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Tax Crimes in Cryptocurrency]]></title>
                <link>https://www.conawayandstrickler.com/blog/tax-crimes-in-cryptocurrency/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/tax-crimes-in-cryptocurrency/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Sun, 01 Jun 2025 13:32:00 GMT</pubDate>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                    <category><![CDATA[tax evasion]]></category>
                
                    <category><![CDATA[Tax Fraud]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[cryptocurrency tax]]></category>
                
                    <category><![CDATA[federal criminal defense attorney]]></category>
                
                    <category><![CDATA[federal criminal tax attorney]]></category>
                
                    <category><![CDATA[federal tax indictment]]></category>
                
                    <category><![CDATA[tax crimes]]></category>
                
                    <category><![CDATA[tax fraud]]></category>
                
                
                
                <description><![CDATA[<p>Leona Helmsley, Jim Thorpe, Webster Hubbell,&nbsp; Alphonse Capone, and Peter Madoff are among many convicted of tax crimes such as&nbsp; tax evasion and tax fraud. The government generally targets groups like tax preparation firms and entities that are mainly cash based.&nbsp; But, the criminal division of the IRS has begun a more targeted approach to&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p><a href="https://www.history.com/this-day-in-history/december-12/the-queen-of-mean-is-sentenced-to-the-slammer">Leona Helmsley</a>, <a href="https://www.nbcsports.com/golf/news/article-associated-press-jim-thorpe-pleads-guilty-tax-evasion">Jim Thorpe</a>, <a href="https://www.washingtonpost.com/archive/politics/2000/06/06/hubbells-tax-conviction-is-thrown-out/2dd8f89a-75eb-4b44-92a6-ffe47238ef35/">Webster Hubbell</a>,&nbsp; <a href="https://www.fbi.gov/history/famous-cases/al-capone">Alphonse Capone</a>, and <a href="https://archives.fbi.gov/archives/newyork/press-releases/2012/peter-madoff-former-chief-compliance-officer-and-senior-managing-director-at-bernard-l.-madoff-investment-securities-llc-pleads-guilty-to-securities-fraud-and-tax-fraud-conspiracy-in-manhattan-federal-court">Peter Madoff</a> are among many convicted of tax crimes such as&nbsp; <a href="https://www.conawayandstrickler.com/blog/basics-of-tax-evasion/">tax evasion</a> and<a href="https://apps.irs.gov/app/understandingTaxes/whys/thm01/les03/media/ws_ans_thm01_les03.pdf"> tax fraud</a>. The government generally targets groups like tax preparation firms and entities that are mainly cash based.&nbsp; But, the criminal division of the IRS has begun a more targeted approach to investigate and prosecute tax crimes in the <a href="https://www.conawayandstrickler.com/blog/irs-increased-focus-on-cryptocurrency-in-operation-hidden-treasure/">cryptocurrency</a> arena.&nbsp; Crypto investment schemes, for example, require investors to produce cash, but then convert the fraud proceeds to cryptocurrency to purposefully circumvent financial reporting requirements.&nbsp; These type of cases thus also involve potential money laundering, wire fraud and structuring charges,</p>



<p>The “newer” question on page 1 of the Tax Form 1040 now has a question that states, “At any time during the past year did you receive any financial interest in virtual currency?” In 2019, this question was only on Schedule 1.&nbsp; As of 2020, it is on page 1 of the Tax Form 1040.&nbsp; This is specifically targeted to combat cryptocurrency tax evasion.</p>



<p>Under 26 U.S.C § 7206(1), it is a criminal offense to file a tax return the filer knows is materially false.&nbsp; So, if you do not check that box on that first page, AND have substantial income in crypto, you might be targeted by the IRS.&nbsp; Remember cryptocurrencies are essentially similar to common stocks.&nbsp; This means a taxpayer <strong>must</strong> report their gains in cryptocurrencies on Form 8949.&nbsp; These gains are passed through to Schedule D on personal returns.&nbsp; The filer is responsible for paying capital gains tax on the net gain for the year.&nbsp; The government is long since versed in understanding the intricacies of the market like the role of hardware wallets, the use of DEXs, on-chain information, and how to track crypto movement across distributed ledgers.&nbsp; &nbsp;Please see <a href="https://www.irs.gov/compliance/criminal-investigation/non-payment-of-federal-income-tax-on-cryptocurrency-earnings-leads-to-conviction-for-south-florida-resident">here</a> for a recent&nbsp; example of a case where non-payment of federal income tax on cryptocurrency earnings led to a conviction.</p>



<p><a href="/contact-us/">Contact Conaway & Strickler, PC</a> if you have any questions on these complex federal criminal tax issues.  Our experienced federal criminal defense attorneys are here to help.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Cryptocurrency Money Laundering]]></title>
                <link>https://www.conawayandstrickler.com/blog/cryptocurrency-money-laundering/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/cryptocurrency-money-laundering/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Mon, 24 Mar 2025 13:22:00 GMT</pubDate>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                    <category><![CDATA[Cyber Crime]]></category>
                
                
                    <category><![CDATA[#crypto]]></category>
                
                    <category><![CDATA[#cryptocurrency]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[money mule]]></category>
                
                    <category><![CDATA[white collar lawyer]]></category>
                
                    <category><![CDATA[wire fraud]]></category>
                
                
                
                <description><![CDATA[<p>Cryptocurrency fraud has become increasingly prevalent in recent years. The lack of a centralized authority governing crypto along with the relative anonymity of transactions has contributed to this rise in digital financial crime. Specifically, cryptocurrency money laundering has grown significantly in recent years with billions of dollars stolen through hacks, Ponzi schemes, mixers. A recent&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>Cryptocurrency fraud has become increasingly prevalent in recent years. The lack of a centralized authority governing crypto along with the relative anonymity of transactions has contributed to this rise in digital financial crime. Specifically, cryptocurrency money laundering has grown significantly in recent years with billions of dollars stolen through hacks, Ponzi schemes, mixers. A <a href="https://www.chainalysis.com/blog/2025-crypto-crime-report-introduction/">recent report from Chainalysis</a> estimates illicit cryptocurrency addresses received more than 50 billion dollars in 2024.&nbsp;</p>



<p>Crypto money laundering follows the same pattern used for fiat (government-issued) currencies by “cleaning” funds gained through illicit means, before exchanging or withdrawing them for cash. Traditionally, money laundering involves disguising financial assets so they can be used without detection of the illegal activity that produced them. In the context of crypto, tokens are moved through various digital addresses to obscure their illegal origin and make them more difficult to trace. &nbsp;</p>



<p>The privacy-preserving nature of crypto has opened the door for criminals to conceal the origin of illicitly gained funds through a variety of methods. Cybercriminals ultimately funnel assets through several businesses and online addresses to hide the money trail before transferring the funds to a seemingly legitimate source.&nbsp;</p>



<p>There are several methods that criminals will use when engaging in cryptocurrency money laundering, including:&nbsp;</p>



<ul class="wp-block-list">
<li>Smurfing:&nbsp;Splitting up large sums of money into smaller amounts so they can be sent via multiple transactions.&nbsp;&nbsp;</li>



<li>Exchange Hopping:&nbsp;Using multiple cryptocurrency exchanges to transfer funds across several platforms and obscure the money trail.&nbsp;&nbsp;</li>



<li>Crypto Swaps: Using multiple cryptocurrency wallet addresses to directly convert funds without an intermediary or a centralized exchange.&nbsp;</li>



<li>Offshore Transactions:&nbsp;Creating offshore accounts to hide the origin of funds.&nbsp;</li>



<li>Mixing:&nbsp;Blending together the crypto assets of multiple users, making it difficult to determine who owns what.&nbsp;&nbsp;&nbsp;</li>



<li>Gambling Platforms:&nbsp;Depositing tokens into online gambling websites to be either withdrawn as cash or used to place coordinated bets.&nbsp;&nbsp;</li>
</ul>



<p>Cybercriminals require other actors (individuals and sometimes shell companies) to facilitate this crypto money laundering. Like traditional money laundering, criminals recruit “money mules” to move or launder the illicit funds, often unknowingly. In the context of crypto, this is often done under the guise of a cryptocurrency investment scheme. &nbsp;</p>



<p>Just as traditional money laundering can be federally prosecuted under <a href="https://www.law.cornell.edu/uscode/text/18/1956">18 U.S.C. § 1956</a>, crypto money laundering is a crime under that same law. In addition to money laundering charges, involvement in a cryptocurrency scam can lead to charges including conspiracy, wire fraud, mail fraud, and more. Further, individuals at all levels of these schemes can face prosecution, including those who may have unwittingly played the role of a money mule.&nbsp;</p>



<p>With decades of experience in defending traditional financial fraud paired with a deep understanding of the newer world of cryptocurrency, our firm possesses the skills and expertise to assist those accused of crypto fraud. <a href="/contact-us/">Contact us</a> for a free consultation.  </p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Recent Computer Hacking Cases in the News]]></title>
                <link>https://www.conawayandstrickler.com/blog/recent-computer-hacking-cases-in-the-news/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/recent-computer-hacking-cases-in-the-news/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Sun, 24 Nov 2024 19:06:00 GMT</pubDate>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                    <category><![CDATA[Cyber Crime]]></category>
                
                    <category><![CDATA[data breach]]></category>
                
                    <category><![CDATA[Identity Theft]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                
                    <category><![CDATA[#bitcoin]]></category>
                
                    <category><![CDATA[#cryptocurrency]]></category>
                
                    <category><![CDATA[#moneylaundering]]></category>
                
                    <category><![CDATA[atlanta criminal lawyer]]></category>
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                
                
                <description><![CDATA[<p>Recently, Robert Purbeck of Idaho, also known as “Lifelock,” and “Studmaster,”  was sentenced to ten years after pleading guilty to federal charges of computer fraud and abuse.  He hacked into the computer servers of the City of Newnan, Georgia  and a Griffin, Georgia medical clinic, and then targeted at least 17 other victims across the&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>Recently, Robert Purbeck of Idaho, also known as “Lifelock,” and “Studmaster,”  was sentenced to ten years after pleading guilty to federal charges of computer fraud and abuse.  He <a href="https://www.11alive.com/article/news/local/city-of-newnan-experiences-data-breach/85-a76aa042-9758-4403-aad9-beba3976f401" target="_blank" rel="noreferrer noopener">hacked</a> into the computer servers of the City of Newnan, Georgia  and a Griffin, Georgia medical clinic, and then targeted at least 17 other victims across the United States – in the process stealing personal information of more than 132,000 individuals.  He also attempted to extort a Florida orthodontist for payment in Bitcoin, threatening to disclose stolen patient records and other personal information.</p>



<p>“Cyber extortion is unfortunately a rapidly growing threat and highlights the ever-growing need for corporations to remain vigilant in cybersecurity efforts,” <a href="https://www.justice.gov/usao-ndga/pr/idaho-man-sentenced-computer-hacking-and-extortion-scheme" target="_blank" rel="noreferrer noopener">said Sean Burke, Acting Special Agent in Charge of FBI Atlanta</a>. “This sentencing is just one example of the FBI working together to hold criminals that hide behind their computers accountable, regardless of their location.”</p>



<p>According to information presented in court, in June 2017, Purbeck purchased access to the computer server of a Griffin medical clinic on a darknet marketplace. He then used the stolen credentials to illegally access the computers of the medical clinic and removed records that contained the sensitive personal information of more than 43,000 individuals, including names, addresses, birth dates, and social security numbers.</p>



<p>In February 2018, Purbeck purchased access to a City of Newnan Police Department server on a darknet marketplace. Purbeck used the stolen credentials to hack into the City of Newnan’s computer systems and stole police reports and other documents, including personal information of more than 14,000 individuals.</p>



<p>Purbeck also attempted to extort a Florida orthodontist in July 2018, demanding a ransom payment in Bitcoin in return for his stolen patient files, threatening to sell the patient and personal information unless the orthodontist paid the ransom. Additionally, Purbeck threatened to sell the personal information of the orthodontist’s minor child. Purbeck harassed the orthodontist and his patients for 10 days with numerous threatening emails and text messages.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>Song Wu, Chinese national, was indicted in September 2024, on charges for wire fraud and aggravated identity theft arising from his efforts to fraudulently obtain computer software and source code created by the National Aeronautics and Space Administration (“NASA”), research universities, and private companies.</p>



<p>“Efforts to obtain our nation’s valuable research software pose a grave threat to our national security,” <a href="https://www.justice.gov/usao-ndga/pr/chinese-national-charged-multi-year-spear-phishing-campaign" target="_blank" rel="noreferrer noopener">said U.S. Attorney Ryan K. Buchanan</a>. “However, this indictment demonstrates that borders are not barriers to prosecuting bad actors who threaten our national security.” According to information presented in court, Song allegedly engaged in a multi-year “spear phishing” email campaign in which he created email accounts to impersonate U.S.-based researchers and engineers and then used those imposter accounts to obtain specialized restricted or proprietary software used for aerospace engineering and computational fluid dynamics. This specialized software could be used for industrial and military applications, such as development of advanced tactical missiles and aerodynamic design and assessment of weapons. In executing the scheme, Song allegedly sent spear phishing emails to individuals employed in positions with the United States government, including NASA, the U.S. Air Force, Navy, and Army, and the Federal Aviation Administration.  Song also sent spear phishing emails to individuals employed in positions with major research universities in Georgia, Michigan, Massachusetts, Pennsylvania, Indiana, and Ohio, and with private sector companies that work in the aerospace field. Song’s spear phishing emails appeared to the targeted victims as having been sent by a colleague, associate, friend, or other person in the research or engineering community. His emails requested that the targeted victim send or make available source code or software to which Song believed the targeted victim had access. According to the indictment, while conducting this spear phishing campaign, Song was employed as an engineer at Aviation Industry Corporation of China (“AVIC”), a Chinese state-owned aerospace and defense conglomerate headquartered in Beijing, China.  AVIC manufactures civilian and military aircrafts and is one of the largest defense contractors in the world.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>Ilya Lichtenstein, 35, of New York City, was sentenced recently to 60 months in federal prison for his involvement in a money laundering conspiracy arising from the hack and theft of approximately 120,000 bitcoin from Bitfinex, a global cryptocurrency exchange. According to information presented in court, Lichtenstein hacked into Bitfinex’s network in 2016, using advanced hacking tools and techniques. Once inside the network, Lichtenstein fraudulently authorized more than 2,000 transactions transferring 119,754 bitcoin from Bitfinex to a cryptocurrency wallet in Lichtenstein’s control. Lichtenstein then took steps to cover his tracks by deleting from Bitfinex’s network access credentials and other log files that could have revealed his conduct to law enforcement. Following the hack, Lichtenstein enlisted the help of his wife, Heather Morgan, in laundering the stolen funds. Lichtenstein, at times with Morgan’s assistance, employed numerous sophisticated laundering techniques, including using fictitious identities to set up online accounts; utilizing computer programs to automate transactions; depositing the stolen funds into accounts at a variety of darknet markets and cryptocurrency exchanges and then withdrawing the funds; converting bitcoin to other forms of cryptocurrency in a practice known as “chain hopping;” depositing a portion of the criminal proceeds into cryptocurrency mixing services; using U.S.-based business accounts to legitimize Lichtenstein’s and Morgan’s banking activity; and exchanging a portion of the stolen funds into gold coins. Additional information on this case is available on the United States Department of Justice’s website for large cases <a href="https://www.justice.gov/usao-dc/2016-bitfinex-hack">here</a>. &nbsp;</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[What is a “Pig Butchering” Scam?]]></title>
                <link>https://www.conawayandstrickler.com/blog/what-is-a-pig-butchering-scam/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/what-is-a-pig-butchering-scam/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Mon, 11 Mar 2024 17:12:54 GMT</pubDate>
                
                    <category><![CDATA[Blog]]></category>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                    <category><![CDATA[Cyber Crime]]></category>
                
                    <category><![CDATA[Fraud]]></category>
                
                
                    <category><![CDATA[#cryptocurrency]]></category>
                
                    <category><![CDATA[fraud]]></category>
                
                
                
                <description><![CDATA[<p>A new type of fraudulent online investment scheme has led to thousands of victims worldwide and significant financial losses. In a pig butchering scam, victims are gradually lured into making financial contributions to a seemingly sound investment only to have the person they are dealing with subsequently disappear with the funds. These types of schemes&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>A new type of fraudulent online investment scheme has led to thousands of victims worldwide and significant financial losses. In a pig butchering scam, victims are gradually lured into making financial contributions to a seemingly sound investment only to have the person they are dealing with subsequently disappear with the funds.</p>


<p>These types of schemes originated in 2020 and have gained international momentum through the use of social media platforms and online dating applications. In a departure from conventional financial scams, these fraudsters focus on psychological manipulation of victims by crafting elaborate fake identities to establish romantic or emotional connections with their targets.</p>


<p>After the scammer creates a fake online persona, the scam begins by initiating contact with a target. Often, the scammer will pretend to have stumbled across a “wrong number” as they contacted the victim. The next step is starting a conversation with a potential victim to gain their trust. The scammers often initiate benign chats about life, family, and work, and they’ll fabricate details about their own life that make them seem similar to you. Once the scammer gains trust, they will eventually pivot the conversation to investing and making claims about their own purported success with investments.</p>


<p>Once the target agrees to accept “help” with the investment process, the scammer typically explains how to wire money from their bank account to a crypto wallet and eventually to a “brokerage.” The scammer may initially encourage a modest investment and allow the victim to withdraw “returns” on their investment as proof the investment is legit. From there, the scammer will only continue to manipulate their victim into investing more and more. Once the fraudster is unable to convince the victim to continue making deposits, they will disappear and sever all contact.</p>


<p>A key feature that distinguishes pig butchering scams is the human aspect that shows a pattern of coercion and exploitation. Often times the low-level operators of these scams are victims themselves who may have been coerced into participating in these crimes under the guise of employment opportunities. Many of the perpetrators are lured from abroad then forced to commit the fraud by organized crime syndicates. The effects of pig butchering scams extend beyond the significant financial losses to encompass human rights issues tied to trafficking and coercion.</p>


<p>Perpetrators of pig butchering scams have been charged across the country by federal prosecutors working alongside the Computer Crime and Intellectual Property Section’s (<a href="https://www.justice.gov/criminal/criminal-ccips/about-ccips" rel="noopener noreferrer" target="_blank">CCIPS</a>) National Cryptocurrency Enforcement Team (NCET), which was established to combat the growing illicit use of cryptocurrencies and digital assets. In California, four defendants were charged with conspiracy to commit money laundering, concealment money laundering, and international money laundering for their involvement in a <a href="https://www.justice.gov/opa/pr/four-individuals-charged-laundering-millions-cryptocurrency-investment-scams#:~:text=According%20to%20court%20documents%2C%20%E2%80%9Cpig,masquerading%20as%20a%20wrong%20number." rel="noopener noreferrer" target="_blank">$20 million dollar pig butchering scheme</a>.</p>


<p>
Pig butchering scams were discussed in a recent episode of <a href="https://www.youtube.com/watch?v=pLPpl2ISKTg" rel="noopener noreferrer" target="_blank">Last Week Tonight with John Oliver</a>. As the episode highlights, these scams are increasingly common and the losses to victims can be devastating.</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[The Intersection of Crime and Non-Fungible Tokens (NFTs)]]></title>
                <link>https://www.conawayandstrickler.com/blog/the-intersection-of-crime-and-non-fungible-tokens-nfts/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/the-intersection-of-crime-and-non-fungible-tokens-nfts/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Tue, 14 Nov 2023 16:23:31 GMT</pubDate>
                
                    <category><![CDATA[Blog]]></category>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                    <category><![CDATA[Cyber Crime]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Fraud]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                
                    <category><![CDATA[#bitcoin]]></category>
                
                    <category><![CDATA[#cryptocurrency]]></category>
                
                    <category><![CDATA[#moneylaundering]]></category>
                
                    <category><![CDATA[Criminal defense]]></category>
                
                    <category><![CDATA[Criminal Lawyer]]></category>
                
                    <category><![CDATA[doj]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[fraud]]></category>
                
                    <category><![CDATA[fraud lawyer]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[NFTs]]></category>
                
                    <category><![CDATA[white collar lawyer]]></category>
                
                    <category><![CDATA[wire fraud]]></category>
                
                
                
                <description><![CDATA[<p>An NFT, or Non-Fungible Token, is a digital asset representing ownership or proof of authenticity of a unique item or piece of content using blockchain technology. Unlike cryptocurrencies such as Bitcoin or Ethereum, which are fungible and can be exchanged on a one-to-one basis, NFTs are non-interchangeable and one-of-a-kind. As long as you’re following copyright&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>An NFT, or Non-Fungible Token, is a digital asset representing ownership or proof of authenticity of a unique item or piece of content using blockchain technology. Unlike cryptocurrencies such as Bitcoin or Ethereum, which are fungible and can be exchanged on a one-to-one basis, NFTs are non-interchangeable and one-of-a-kind. As long as you’re following copyright laws and selling legitimate assets, creating, selling, and reselling NFTs is legal. However, due to the decentralized and anonymous nature of the crypto world, NFTs come with a host of legal issues. Like with most digital innovations, regulatory legislation has been slow to catch up and establish clear guidelines; still, wrongful use of NFTs can implicate an array of criminal charges.</p>


<p><strong>Money Laundering</strong> refers to the illegal process of concealing the origins of money obtained through criminal activities, making it appear as if it comes from a legitimate source. This is criminalized under 18 U.S.C. § 1956. Money laundering using NFTs involves the illicit use of these digital assets to disguise the origins of illegally obtained funds. In this context, individuals create a fake record of sales on the blockchain by selling NFTs to themselves using different accounts. Once finished, they sell the NFT to an unsuspecting buyer and repeat the process.</p>


<p><strong>Fraud</strong> has grown increasingly common in the crypto landscape due to its anonymous and decentralized nature. Fraud involving NFTs can manifest in various ways due to the unique characteristics of these digital assets. This is mostly being prosecuted as wire fraud under 18 U.S.C. § 1343. Some common forms of fraud associated with NFTs include:</p>


<ol class="wp-block-list">
<li><strong>Fake or Stolen NFTs</strong>: Fraudsters might create counterfeit NFTs by copying digital content and attempting to sell them as original or rare pieces. Additionally, they might steal someone else’s artwork or content and mint NFTs to sell without the creator’s consent.</li>
<li><strong>False Representation</strong>: Individuals might misrepresent the ownership or authenticity of an NFT by falsely claiming it is associated with a particular creator or source, leading buyers to believe they are purchasing something of higher value or legitimacy than it actually holds.</li>
<li><strong>Pump-and-Dump Schemes</strong>: Similar to traditional financial markets, some individuals may engage in pump-and-dump schemes within the NFT market. This involves artificially inflating the value of certain NFTs through false hype or manipulation, only to sell them off at a high price, leaving unsuspecting buyers with devalued assets.</li>
<li><strong>Phishing and Scams:</strong> Scammers may use phishing techniques to trick NFT owners into providing their private keys or access to their digital wallets, allowing the fraudster to steal the NFTs. Additionally, fraudulent schemes and fake NFT marketplaces can deceive buyers and sellers into making transactions for non-existent or misrepresented NFTs.</li>
<li><strong>Rug-Pull Scheme:</strong> As the term suggests, a “rug pull” refers to a scenario where the creator of an NFT and/or gaming project solicits investments and then abruptly abandons a project and fraudulently retains the project investors’ funds.</li>
</ol>


<p>Law enforcement is continuing to prosecute these types of NFT schemes across the nation, in cases that allege millions of dollars being defrauded. Two defendants were charged for executing a <a href="https://www.justice.gov/usao-sdny/pr/two-defendants-charged-non-fungible-token-nft-fraud-and-money-laundering-scheme-0" rel="noopener noreferrer" target="_blank">$1 million NFT money laundering and fraud scheme</a> in January 2022. In another NFT rug-pull, Aurelien Michel was charged for diverting <a href="https://www.justice.gov/usao-edny/pr/non-fungible-token-nft-developer-charged-multi-million-dollar-international-fraud" rel="noopener noreferrer" target="_blank">$2.9 million dollars in an international fraud scheme</a>.</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Bitcoin/Cryptocurrency Money Laundering]]></title>
                <link>https://www.conawayandstrickler.com/blog/bitcoin-cryptocurrency-money-laundering/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/bitcoin-cryptocurrency-money-laundering/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Wed, 12 Apr 2023 15:30:15 GMT</pubDate>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                    <category><![CDATA[Cyber Crime]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[Victim Of Crime]]></category>
                
                
                    <category><![CDATA[#bitcoin]]></category>
                
                    <category><![CDATA[#cryptocurrency]]></category>
                
                    <category><![CDATA[Federal Criminal Lawyer]]></category>
                
                
                
                <description><![CDATA[<p>What is Bitcoin money laundering? Bitcoin money laundering is the process of using Bitcoin to conceal the origins of illegally obtained money. This can be done by transferring the Bitcoin to multiple accounts, mixing it with other Bitcoin, or using it to purchase goods or services. Some believe that Bitcoin transactions are anonymous. There are,&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>What is Bitcoin money laundering? Bitcoin money laundering is the process of using Bitcoin to conceal the origins of illegally obtained money. This can be done by transferring the Bitcoin to multiple accounts, mixing it with other Bitcoin, or using it to purchase goods or services.  Some believe that Bitcoin transactions are anonymous.  There are, however, transaction records that are stored in the blockchain and publicly visible.  The FBI recently <a href="https://www.justice.gov/opa/pr/two-arrested-alleged-conspiracy-launder-45-billion-stolen-cryptocurrency" rel="noopener noreferrer" target="_blank">stated </a>“Criminals always leave tracks, and …[this] is a reminder that the FBI has the tools to follow the digital trail, wherever it may lead” .</p>


<p>Bitcoin is definitely attractive to money launderers because it is a decentralized currency that is not subject to government regulation. This makes it difficult, but not impossible, to track and trace Bitcoin transactions. Additionally, Bitcoin is often used in online transactions, which makes it easy to conceal the identity of the sender and receiver.</p>


<p>There are a number of ways to launder money using Bitcoin. One common method is to use a mixer, which is a service that mixes Bitcoin from multiple sources together. This makes it difficult to trace the original source of the Bitcoin. Another method is to use a tumbler, which is a service that breaks up Bitcoin transactions into smaller pieces and then reassembles them. This makes it difficult to track the individual transactions.</p>


<p>Bitcoin can also be used to purchase goods or services that are difficult to trace, such as drugs or weapons. This can make it difficult to identify the source of the funds used to purchase the goods or services.</p>


<p>Money laundering is a serious crime that can have a significant impact on the economy. It can also be used to finance terrorism and other criminal activities. Conaway & Strickler can help if the government is questioning you about or charging you with money laundering /wire fraud /bank fraud charges.</p>


<p>A lot of the times a money mule is utilized in money laundering schemes.  A money mule is a person who transfers money on behalf of someone else, often without knowing that they are involved in a criminal activity. Money mules are typically recruited through online job scams, romance scams, or other fraudulent schemes. They are then asked to receive money from criminals, often through wire transfers or cryptocurrency transactions. The money is then transferred to other accounts, or used to purchase goods or services.</p>


<p>Money mules are often unaware that they are involved in a criminal activity. They may be promised a share of the money, or they may be led to believe that they are helping someone in need. However, money mules are always at risk of being caught and prosecuted. They may also face financial losses, as they may be held responsible for any money that is stolen from the criminals.  The government often goes after these low end cases and prosecutes them federally.</p>


<p>Again, <a href="/contact-us/">contact us</a> immediately if you are being questioned by a federal agent about any of these issues.</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Cryptocurrency Fraud]]></title>
                <link>https://www.conawayandstrickler.com/blog/cryptocurrency-fraud/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/cryptocurrency-fraud/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Thu, 30 Mar 2023 21:32:21 GMT</pubDate>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                    <category><![CDATA[Cyber Crime]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                
                
                
                <description><![CDATA[<p>We posed some questions about cryptocurrency using Bard (Google’s version of Chat GPT), First we asked, WHAT IS CRYPTOCURRENCY? Its response: Cryptocurrency is a digital or virtual currency that uses cryptography for security. A cryptocurrency is difficult to counterfeit because of this security feature. A defining feature of a cryptocurrency, and arguably its most endearing&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>We posed some questions about cryptocurrency using <a href="https://blog.google/technology/ai/bard-google-ai-search-updates/" rel="noopener noreferrer" target="_blank">Bard</a> (Google’s version of Chat GPT),</p>


<p>First we asked, WHAT IS CRYPTOCURRENCY?</p>


<p>Its response:
</p>


<p>Cryptocurrency is a digital or virtual currency that uses cryptography for security. A cryptocurrency is difficult to counterfeit because of this security feature. A defining feature of a cryptocurrency, and arguably its most endearing allure, is its organic nature. It is not issued by any central authority, rendering it theoretically immune to government interference or manipulation.</p>


<p>Cryptocurrencies are systems that allow for secure payments online which are denominated in terms of virtual “tokens.” These tokens are created using cryptographic techniques that allow them to be transferred between users without the need for a central authority. Bitcoin, the first and most well-known cryptocurrency, was created in 2009.</p>


<p>Cryptocurrencies have been gaining in popularity in recent years, as more and more people become aware of their potential benefits. These benefits include:
</p>


<ul class="wp-block-list">
<li><strong>Security:</strong> Cryptocurrencies are secured by cryptography, which makes them difficult to counterfeit or double-spend.</li>
<li><strong>Transparency:</strong> Cryptocurrencies are transparent and decentralized, which means that there is no central authority that controls them.</li>
<li><strong>Efficiency:</strong> Cryptocurrencies can be used to make secure, efficient, and low-cost payments.</li>
</ul>


<p>
However, there are also some risks associated with cryptocurrencies, such as:
</p>


<ul class="wp-block-list">
<li><strong>Volatility:</strong> The value of cryptocurrencies can be volatile, which means that they can lose value quickly.</li>
<li><strong>Hacking:</strong> Cryptocurrencies are vulnerable to hacking, as they are stored on digital platforms.</li>
<li><strong>Regulation:</strong> Cryptocurrencies are not currently regulated by governments, which means that there is no protection for consumers if they lose money investing in them.</li>
</ul>


<p>
Overall, cryptocurrencies are a new and innovative technology that has the potential to revolutionize the way we pay for goods and services. However, there are also some risks associated with them, so it is important to do your research before investing.</p>


<p>

Second, we asked, WHAT IS CRYPTOCURRENCY CRIME?
</p>


<p>Its response:Cryptocurrency crime is any crime that involves the use of cryptocurrency. This includes crimes such as money laundering, fraud, and theft.</p>


<p>Cryptocurrency crime is a growing problem, as the value of cryptocurrencies continues to rise. In 2021, cryptocurrency crime was estimated to be worth $14 billion. This is a significant increase from the $7.8 billion worth of cryptocurrency crime in 2020.</p>


<p>There are a number of factors that contribute to the growth of cryptocurrency crime. One factor is the anonymity of cryptocurrencies. Cryptocurrency transactions are typically recorded on a blockchain, but the identities of the participants are not always known. This makes it difficult for law enforcement to track down and prosecute criminals.</p>


<p>Another factor is the growing popularity of cryptocurrency exchanges. These exchanges allow users to buy and sell cryptocurrencies, and they often have poor security measures in place. This makes them easy targets for criminals.</p>


<p>Finally, the lack of regulation in the cryptocurrency industry makes it difficult for law enforcement to crack down on crime. There are currently no laws in many countries that specifically regulate cryptocurrencies. This means that criminals can often operate without fear of being caught.</p>


<p>Finally, we asked, WHAT IS CRYPTOCURRENCY FRAUD?</p>


<p>Its response:


</p>


<p>Cryptocurrency fraud is a type of fraud that involves the use of cryptocurrencies to deceive or defraud people. Cryptocurrency fraud can take many forms, including:
</p>


<ul class="wp-block-list">
<li><strong>Pump-and-dump schemes:</strong> In a pump-and-dump scheme, fraudsters artificially inflate the price of a cryptocurrency by buying it in large quantities and then selling it to unsuspecting investors. Once the price has increased, the fraudsters sell their holdings and the price plummets, leaving investors with worthless tokens.</li>
<li><strong>Fake cryptocurrency exchanges:</strong> Fraudsters often set up fake cryptocurrency exchanges to trick people into investing in cryptocurrencies that do not exist. Once the fraudsters have collected money from victims, they disappear without a trace.</li>
<li><strong>Fake cryptocurrency wallets:</strong> Fraudsters often set up fake cryptocurrency wallets to steal people’s cryptocurrency. Once the fraudsters have stolen the cryptocurrency, they disappear without a trace.</li>
<li><strong>Cryptocurrency mining scams:</strong> Fraudsters often set up cryptocurrency mining scams to trick people into investing in fake cryptocurrency mining schemes. Once the fraudsters have collected money from victims, they disappear without a trace.</li>
<li><strong>Cryptocurrency investment scams:</strong> Fraudsters often set up cryptocurrency investment scams to trick people into investing in fake cryptocurrency investment schemes. Once the fraudsters have collected money from victims, they disappear without a trace.</li>
</ul>


<p>
——–</p>


<p>ChatGPT and now Bard are becoming more and more mainstream and law firms like Conaway & Strickler are finding ways to incorporate AI in to better representing our clients. In addition, it seems only natural to discuss new technologies at the same time as discussion cryptocurrency.</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[How can I be charged with 18 U.S. Code § 1028A Aggravated Identity Theft?]]></title>
                <link>https://www.conawayandstrickler.com/blog/how-can-i-be-charged-with-18-u-s-code-1028a-aggravated-identity-theft/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/how-can-i-be-charged-with-18-u-s-code-1028a-aggravated-identity-theft/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Sun, 22 Jan 2023 23:42:03 GMT</pubDate>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                    <category><![CDATA[Cyber Crime]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Federal Offenses]]></category>
                
                    <category><![CDATA[Fraud]]></category>
                
                    <category><![CDATA[Identity Theft]]></category>
                
                
                    <category><![CDATA[aggravated identity theft]]></category>
                
                    <category><![CDATA[federal crimes]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                
                
                <description><![CDATA[<p>Here is the definition from the statute, cut directly from the 11th circuit’s jury instructions: It’s a Federal crime to commit aggravated identity theft. The Defendant can be found guilty of aggravated identity theft only if all the following facts are proved beyond a reasonable doubt: (1) the Defendant knowingly transferred, possessed, or used another&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>Here is the definition from the statute, cut directly from the 11th circuit’s jury instructions:</p>


<p>It’s a Federal crime to commit aggravated identity theft.</p>


<p>The Defendant can be found guilty of aggravated identity theft only if all the following facts are proved beyond a reasonable doubt:</p>


<p>(1) the Defendant knowingly transferred, possessed, or used another person’s [means of identification] [identification documents];</p>


<p>(2) without lawful authority; and</p>


<p>(3) during and in relation to [the eligible felony alleged in the indictment].</p>


<p>[A “means of identification” is any name or number used, alone or together with any other information, to identify a specific person, including a name, social security number, date of birth, officially issued driver’s license or identification number, alien registration number, passport number, employer or taxpayer identification number, or electronic identification number or routing code. It can also include a fingerprint, voice print or other biometric data.]</p>


<p>[An “identification document” is a document made or issued by or for the United States Government, a state or foreign government or political subdivision.]</p>


<p>The Government must prove that the Defendant knew that the [means of identification] [identification documents], in fact, belonged to another actual person, [living or dead,] and not a fictitious person.</p>


<p>The Government must prove that the Defendant knowingly transferred, possessed, or used another person’s identity “without lawful authority.” The Government does not have to prove that the Defendant stole the [means of identification] [identification documents]. The Government is required to prove the Defendant transferred, possessed, or used the other person’s [means of identification] [identification documents]<strong> for an unlawful or illegitimate purpose.</strong></p>


<p>The Government also must prove that the [means of identification] [identification document] was possessed “during and in relation to” the crime alleged in the indictment. The phrase “during and in relation to” means that there must be a firm connection between the Defendant, the [means of identification] [identification documents], and the crime alleged in the indictment. The [means of identification] [identification documents] must have helped with some important function or purpose of the crime, and not simply have been there accidentally or coincidentally. The [means of identification] [identification documents] at least must facilitate, or have the potential of facilitating, the crime alleged in the indictment.</p>


<p>We at Conaway & Strickler, PC know how to combat these type of charges.  Please feel free to access our blog for other entries <a href="/blog/categories/white-collar-crimes/">here</a></p>


<p>Please contact us to learn more should you be facing criminal charges.</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[IRS Increased Focus on Cryptocurrency in Operation Hidden Treasure]]></title>
                <link>https://www.conawayandstrickler.com/blog/irs-increased-focus-on-cryptocurrency-in-operation-hidden-treasure/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/irs-increased-focus-on-cryptocurrency-in-operation-hidden-treasure/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Sat, 01 May 2021 13:41:12 GMT</pubDate>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                    <category><![CDATA[Cyber Crime]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Tax Fraud]]></category>
                
                
                    <category><![CDATA[#bitcoin]]></category>
                
                    <category><![CDATA[#crypto]]></category>
                
                    <category><![CDATA[#cryptocurrency]]></category>
                
                    <category><![CDATA[#cryptocurrencytaxguidance]]></category>
                
                    <category><![CDATA[#IRSCID]]></category>
                
                    <category><![CDATA[#moneylaundering]]></category>
                
                    <category><![CDATA[#operationhiddentreasure]]></category>
                
                    <category><![CDATA[#taxevasion]]></category>
                
                    <category><![CDATA[#taxfraud]]></category>
                
                    <category><![CDATA[Federal Criminal Lawyer]]></category>
                
                    <category><![CDATA[wire fraud]]></category>
                
                
                
                    <media:thumbnail url="https://conawayandstrickler-com.justia.site/wp-content/uploads/sites/908/2021/05/image.jpeg" />
                
                <description><![CDATA[<p>The IRS has just announced that Operation Hidden Treasure will seek to find taxpayers with unreported income from currency transactions. Did you notice the new question on page 1 of the Tax Form 1040? It states, “At any time during 2020 did you receive any financial interest in virtual currency?” Last year this question was&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>The IRS has just announced that Operation Hidden Treasure will seek to find taxpayers with unreported income from currency transactions.  Did you notice the new question on page 1 of the Tax Form 1040?  It states, “At any time during 2020 did you receive any financial interest in virtual currency?”  Last year this question was only on Schedule 1.</p>


<p>The IRS Criminal Investigation Division (“CID”) will look for typical “flags” in money transactions.  That may include “structuring” (transactions in increments of less than $10,000 to avoid reporting requirements), “the use of nominees, shell corps” (entities used solely for moving money around) or “getting on and off the chain.” (On chain transactions – blockchain is modified to reflect the transaction on a public ledger. Off chain transactions are those that that go off the blockchain.  They work by swapping private keys to an existing wallet instead of transferring funds.)</p>


<p>The IRS identifies and investigates these tax evasion flags.  Operation Hidden Treasure is “all about finding, tracing, and attributing crypto to U.S. Taxpayers.” Do not be fooled into thinking that since it’s cryptocurrency the government does not have the know how to investigate.   Charges for tax evasion, false information on a tax return or even money laundering or structuring can be forthcoming.  Call Conaway & Strickler, PC if you have had a friendly visit from an IRS CID Agent or if you think you might be facing some issues with the IRS.  Carolyn Schenck, national fraud counsel in the IRS Office of Chief Counsel states, “Operation Hidden Treasure is designed to find, trace and attribute such transactions to taxpayers. These transactions are not anonymous.  We see you.”</p>


]]></content:encoded>
            </item>
        
    </channel>
</rss>