<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
     xmlns:georss="http://www.georss.org/georss"
     xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
     xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[Cybercrime - Conaway & Strickler]]></title>
        <atom:link href="https://www.conawayandstrickler.com/blog/categories/cybercrime/feed/" rel="self" type="application/rss+xml" />
        <link>https://www.conawayandstrickler.com/blog/categories/cybercrime/</link>
        <description><![CDATA[Conaway & Strickler's Website]]></description>
        <lastBuildDate>Mon, 27 Apr 2026 17:54:28 GMT</lastBuildDate>
        
        <language>en-us</language>
        
            <item>
                <title><![CDATA[Digital Privacy – Fourth Amendment Case Law Update]]></title>
                <link>https://www.conawayandstrickler.com/blog/digital-privacy-fourth-amendment-case-law-update/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/digital-privacy-fourth-amendment-case-law-update/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Mon, 27 Apr 2026 12:53:32 GMT</pubDate>
                
                    <category><![CDATA[Cyber Crime]]></category>
                
                    <category><![CDATA[Cybercrime]]></category>
                
                    <category><![CDATA[Drug Crimes]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[federal criminal appeal]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                    <category><![CDATA[White Collar Offenses]]></category>
                
                
                    <category><![CDATA[Criminal defense]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[Federal Criminal Lawyer]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                
                
                <description><![CDATA[<p>This week, the U.S. Supreme Court will decide if law enforcement needs to be more specific in their applications for search warrants for phones. At issue this week specifically is whether law enforcement can use broad geofence warrants to gather information about an alleged crime. In the case before the Supreme Court, the issue is&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>This week, the U.S. Supreme Court will decide if law enforcement needs to be more specific in their applications for search warrants for phones. At issue this week specifically is whether law enforcement can use broad <a href="https://en.wikipedia.org/wiki/Geofence" id="https://en.wikipedia.org/wiki/Geofence">geofence</a> warrants to gather information about an alleged crime. In the <a href="https://www.scotusblog.com/cases/chatrie-v-united-states/" id="https://www.scotusblog.com/cases/chatrie-v-united-states/">case </a>before the Supreme Court, the issue is whether the government can use cell phone location data at a crime scene without knowing who is holding the phone. They are gathering data based on the Global Positioning System, Bluetooth beacons, cell phone towers and local wi-fi networks.</p>



<p>To understand the specifics of this case, below we have quoted directly from the <a href="https://www.nacdl.org/getattachment/77ca2722-b0fa-49c8-88e7-8b88ee8752c5/chatrie-v-us-opening-brief.pdf" id="https://www.nacdl.org/getattachment/77ca2722-b0fa-49c8-88e7-8b88ee8752c5/chatrie-v-us-opening-brief.pdf">Petitioner’s Brief:</a> </p>



<p><em>This case concerns the constitutionality of geofence warrants. For cell phone users to use certain services, their cell phones must continuously transmit their exact locations to their service providers. A geofence warrant allows law enforcement to obtain, from the service provider, the identities of users who were in the vicinity of a particular location at a particular time. In this case, law enforcement obtained, and served on Google, a geofence warrant seeking anonymized location data for every device within 150 meters of the location of a bank robbery within one hour of the robbery. After Google returned an initial list, law enforcement sought— without seeking an additional warrant—information about the movements of certain devices for a longer, two-hour period, and Google complied with that request as well. Then—again without seeking an additional warrant—law enforcement requested de anonymized subscriber information for three devices. One of those devices belonged to petitioner Okello Chatrie. Based on the evidence derived from the geofence warrant, petitioner was convicted of armed robbery.</em></p>



<p>The last time the Supreme Court wrestled with cell phone privacy issues was in <a href="https://www.supremecourt.gov/opinions/17pdf/16-402_h315.pdf" id="https://www.supremecourt.gov/opinions/17pdf/16-402_h315.pdf">Carpenter v. United States, 585 U.S. 296 (2018)</a>, which is a landmark United States Supreme Court case concerning the privacy of historical cell site location information. The Court held in that case that the government violates the Fourth Amendment when accessing historical cell phone Iocation records containing the physical locations of cellphones without a search warrant. That case, however, was <em>after</em> a suspect was identified, making it unlike the current case before the Supreme Court.</p>



<p>We receive terabytes of data in discovery for our <a href="https://www.conawayandstrickler.com/criminal-defense-practice/white-collar-crimes/" id="https://www.conawayandstrickler.com/criminal-defense-practice/white-collar-crimes/">cases</a>. Motions to suppress can be filed for all of the data seized from search warrants of phones. We are cognizant of the ever changing landscape of Fourth Amendment case law. We ensure that law enforcement follows the appropriate procedures for every single case. <a href="https://www.conawayandstrickler.com/contact-us/" id="https://www.conawayandstrickler.com/contact-us/">Contact us </a>now if you have a case you would like to discuss.</p>



<p></p>



<p></p>



<p></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Recent Fraud Cases Highlighted by the DOJ include Cryptocurrency and Civil Forfeiture Complaints]]></title>
                <link>https://www.conawayandstrickler.com/blog/recent-fraud-cases-highlighted-by-the-doj-include-cryptocurrency-and-civil-forfeiture-complaints/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/recent-fraud-cases-highlighted-by-the-doj-include-cryptocurrency-and-civil-forfeiture-complaints/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Sun, 03 Aug 2025 13:54:00 GMT</pubDate>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                    <category><![CDATA[Cybercrime]]></category>
                
                
                    <category><![CDATA[#cryptocurrency]]></category>
                
                    <category><![CDATA[#moneylaundering]]></category>
                
                    <category><![CDATA[atlanta criminal lawyer]]></category>
                
                    <category><![CDATA[atlanta federal criminal attorney]]></category>
                
                    <category><![CDATA[atlanta internet crime attorney]]></category>
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[cryptocurrency fraud charges]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                    <category><![CDATA[white collar lawyer]]></category>
                
                
                
                <description><![CDATA[<p>As we enter the 8th month of 2025, it is clear that federal agencies have ramped up enforcement of federal crimes, leading to substantial financial penalties and lengthy prison sentences. Recently, the Department of Justice highlighted enforcement efforts that allegedly aimed at protecting&nbsp; Americans from transnational fraud schemes.&nbsp; Here are some of the cases discussed:&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>As we enter the 8th month of 2025, it is clear that federal agencies have ramped up enforcement of federal crimes, leading to substantial financial penalties and lengthy prison sentences.</p>



<p>Recently, the Department of Justice highlighted enforcement efforts that allegedly aimed at protecting&nbsp; Americans from transnational fraud schemes.&nbsp; Here are some of the cases discussed:</p>



<p><a href="https://www.pacermonitor.com/public/case/58513717/USA_v_Murray">United States v. Troy Murray</a> and <a href="https://www.pacermonitor.com/public/case/58513715/USA_v_Murray">United States v. Cutter Murray</a>. On June 11, 2025, DOJ’s Consumer Protection Branch filed an Information in SDFL charging Troy Murray also known as “Steve Dixson” with conspiracy to commit wire fraud. According to court documents, Troy Murray sold to lottery fraud scammers, including Jamaicans, his lead list database containing the names, and personal information of over seven million elderly American consumers. These lists were allegedly then used to defraud elderly victims. Additionally, Cutter Murray, Troy Murray’s son, will plead guilty to one count of money laundering for receiving and then laundering $1.6 million of the fraudulent funds Troy Murray obtained.</p>



<p><a href="https://www.justice.gov/usao-ct/pr/georgia-man-charged-operating-sweepstakes-scam">United States v. Jimmy Smith</a>. On April 1, 2025 the U.S. Attorney’s Office for the District of Connecticut announced charges against Jimmy Smith, 30, a citizen of Jamaica, who resided in Hinesville, Georgia. According to court documents, Smith and others defrauded at least four victims residing in Connecticut, New York, Texas, and California, by telling them they had won a Publishers Clearing House Sweepstakes and needed to pay taxes or money to claim the prize.</p>



<p>United States v. <a href="https://www.justice.gov/usao-ma/pr/nigerian-national-pleads-guilty-role-romance-scam-and-money-laundering-scheme">Charles Uchenna Nwadavid</a>. On April 9, the U.S. Attorney’s Office (USAO) for the District of Massachusetts announced charges against Charles Uchenna Nwadavid, a citizen of Nigeria who was arrested after landing at the Dallas-Fort Worth Airport. In January 2024, a grand jury indicted Nawadavid on one count of mail fraud and two counts of money laundering. Between approximately 2016 to September 2019, Nwadavid allegedly participated in romance scams that tricked victims into sending money abroad.&nbsp; He plead guilty to mail fraud, aiding and abetting money laundering and money laundering on June 26, 2025.&nbsp; The DOJ states “romance schemes” &nbsp;generally begin when the “bad actors” recruit victims through advertisements for online relationships on dating or social media websites. Individuals perpetuating romance scams often create fictitious profiles and then use them to gain victims’ trust through a purported romantic relationship. Perpetrators then direct their victims to send money or to conduct financial transactions involving other victims’ money under false pretenses, such as an urgent need for money to secure a multi-million dollar inheritance or to pay for an unexpected hospitalization.</p>



<p>Another romance scheme can involve investing in cryptocurrency. The United States Attorney’s Office for the Northern District of Ohio (USAO) has filed a <a href="https://www.justice.gov/usao-ndoh/media/1391461/dl?inline">civil complaint in forfeiture</a> against 8,207,578 Tether (USDT) cryptocurrency, valued at more than $8.2 million in February, 2025.&nbsp; &nbsp;In that case, investigators found that scammers initially contacted the victims through seemingly misdirected, or “wrong number,” text messages. The fraudster then gained the victim’s trust and affection using various manipulative tactics. Once trust was established with the victim, the fraudster would share how much success they, or someone they knew, had with investing in cryptocurrency. This personal testimonial lessened any uncertainties the victims may have had about virtual currencies and eventually had the intended effect to persuade the victim to proceed with the investment.</p>



<p>The fraudster would then guide the victim, step-by-step, on how to open a legitimate cryptocurrency account, most often with a U.S. based virtual currency exchange such as Crypto.com or Coinbase. The scammer would walk the victim through the entire process of transferring money from their bank to the newly created cryptocurrency account. Next, the victim received instructions on how to transfer the purchased cryptocurrency assets to an online “investment platform,” which would turn out to be a fake site created by the fraudsters to look like a legitimate company. Information on the platforms promised lucrative returns which encouraged victims to invest further. However, once the victim transferred their funds to the “investment platform” they unknowingly handed over complete control and ownership of their funds to the scammer.&nbsp; These fake cryptocurrency trading platforms or fake versions of official crypto wallets to trick unsuspecting victims. These fake websites usually have similar but slightly different domain names from the sites they attempt to mimic.</p>



<p>The complaint also outlines that the perpetrators of such investment fraud schemes often allow victims to withdraw a portion of their “profits” early on in the scheme to build trust and reinforce their belief that the “investment platform” was legitimate. But as the scheme progressed, victims were unable to withdraw their funds and given excuses as to why they could not access their funds. For example, the fraudsters referred to a fake “tax” requirement, stating that taxes must be paid on the proceeds generated from the investment platform. Knowing that the scam would run its course soon, the fraudsters used last-ditch efforts to lie to victims that they had to pay a tax. Ultimately, victims were locked out of their account on the investment platform and lost their funds.</p>



<p>A woman in Lake County, Ohio became the target of such a scam when she responded to a text on her phone from an unknown number in November 2023. She began sharing information via text with the person and the two bonded over topics such as hobbies and religion. Over a period of time, the victim followed instructions from her new “friend” and opened an account at Crypto.com and then transferred funds into the account. When the victim wanted to withdraw funds, her “friend,” relented and said additional payments were needed and she complied. When the victim no longer had any funds left after making additional payments, her “friend” began to threaten her that he would send his friends to “take care of” her friends and family. Having lost her entire life savings of approximately $663,352, including funds from her Roth IRA, the victim filed a complaint with the FBI’s Internet Crime Complaint Center to report the losses in June 2024. The FBI Cleveland Division subsequently initiated an investigation.</p>



<p><a href="https://www.justice.gov/usao-ndoh/media/1402451/dl?inline">United States v. 679,981.22 Tether, et al</a>. On June 3, the U.S. Attorney’s Office for the Northern District of Ohio announced the filing of a civil forfeiture complaint against 679,981.22 in the Tether cryptocurrency suspected of being fraudulently obtained as part of a romance/investment scam. According to court documents, one victim was targeted via LinkedIn and another victim was targeted though the dating App “Coffee Meets Bagel.”</p>



<p>The experienced federal criminal defense attorneys at <a href="/lawyers/">Conaway & Strickler, PC</a> are here to protect your rights, reputation, and future should you be under investigation. With decades of experience in defending traditional financial fraud paired with a deep understanding of the newer world of cryptocurrency, our firm possesses the skills and expertise to assist those accused of any type of fraud.  Call or <a href="/contact-us/">contact us online for a confidential consultation</a>.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Covid Related Fraud Enforcement Update]]></title>
                <link>https://www.conawayandstrickler.com/blog/covid-related-fraud-enforcement-update/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/covid-related-fraud-enforcement-update/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Sun, 19 Feb 2023 18:32:46 GMT</pubDate>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[Cyber Crime]]></category>
                
                    <category><![CDATA[Cybercrime]]></category>
                
                    <category><![CDATA[EIDL fraud]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Identity Theft]]></category>
                
                    <category><![CDATA[PPP loan fraud]]></category>
                
                    <category><![CDATA[Uncategorized]]></category>
                
                
                    <category><![CDATA[EIDL fraud]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[Federal Criminal Lawyer]]></category>
                
                    <category><![CDATA[PPP Loan Fraud]]></category>
                
                
                
                <description><![CDATA[<p>On May 17, 2021, U.S. Attorney General Merrick Garland announced the establishment of the COVID-19 Fraud Enforcement Task Force. On March 10, 2022, Garland announced Associate Deputy Attorney General Kevin Chambers as the Director For Covid-19 Fraud Enforcement. In August, 2022, President Biden signed laws that give the Department of Justice and other federal agencies&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>On May 17, 2021, U.S. Attorney General Merrick Garland announced the establishment of the <a href="https://www.justice.gov/opa/pr/attorney-general-announces-task-force-combat-covid-19-fraud" rel="noopener noreferrer" target="_blank"><strong>COVID-19 Fraud Enforcement Task Force.</strong></a></p>


<p>On March 10, 2022, Garland <a href="https://www.justice.gov/opa/speech/attorney-general-merrick-b-garland-delivers-remarks-covid-19-fraud-enforcement-task-force" rel="noopener noreferrer" target="_blank">announced</a> Associate Deputy Attorney General Kevin Chambers as the Director For Covid-19 Fraud Enforcement.</p>


<p>In August, 2022, President Biden signed laws that give the Department of Justice and other federal agencies more time to investigate and prosecute Covid-19 fraud. It extended the statute of limitations for fraud charges involving PPP and EIDL fraud to<strong> ten years</strong>.</p>


<p>And on September 14, 2022, the DOJ <a href="https://www.oig.dhs.gov/sites/default/files/assets/pr/2022/dojpr-091422-justice-department-announces-covid-19-fraud-strike-force-teams.pdf" rel="noopener noreferrer" target="_blank">announced</a> the establishment of three Strike Force teams created to enhance the Department’s existing efforts to combat and prevent COVID-19 related fraud.  The Strike Force teams will operate out of U.S. Attorney’s Offices in the Southern District of Florida, the District of Maryland, and a joint effort between the Central and Eastern Districts of California.</p>


<p>Concerned about PPP loan or EIDL loan fraud investigations?  Our firm has represented both companies and individuals facing questions from the bank or investigators.  Please <a href="/contact-us/">contact us</a> before interacting with any investigators or agents.</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Experience a Data Breach?  What to do]]></title>
                <link>https://www.conawayandstrickler.com/blog/experience-a-data-breach-what-to-do/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/experience-a-data-breach-what-to-do/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Thu, 16 Feb 2023 20:16:57 GMT</pubDate>
                
                    <category><![CDATA[Cyber Crime]]></category>
                
                    <category><![CDATA[Cybercrime]]></category>
                
                    <category><![CDATA[data breach]]></category>
                
                
                    <category><![CDATA[atlanta criminal lawyer]]></category>
                
                    <category><![CDATA[atlanta cyber crime attorney]]></category>
                
                    <category><![CDATA[atlanta internet crime attorney]]></category>
                
                    <category><![CDATA[data breach]]></category>
                
                
                
                <description><![CDATA[<p>The International Bar Association created a “President’s Task force on Cybersecurity”. Meg Strickler was appointed to serve on this prestigious task force and helped draft Cybersecurity Guidelines. Today, it is all the more important to be weary of a data breach if you own and operate a small business. Data breaches can interrupt operations, cause&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>The International Bar Association created a “President’s Task force on Cybersecurity”.  Meg Strickler was appointed to serve on this prestigious task force and helped draft <a href="https://www.ibanet.org/MediaHandler?id=2F9FA5D6-6E9D-413C-AF80-681BAFD300B0" rel="noopener noreferrer" target="_blank">Cybersecurity Guidelines</a>.  Today, it is all the more important to be weary of a data breach if you own and operate a small business. Data breaches can interrupt operations, cause chaos and most importantly impact the bottom line severely. Just this month, Atlanta based law firm Hall Booth Smith experienced a data breach.  Meg Strickler was quoted in the Fulton County Daily Report in discussing this breach, stating that the most important thing for law firms to do is educate their employees on how to stay safe online. One of the biggest issues she’s seen recently is data breaches resulting from Trojan emails, when employees click on links from unfamiliar senders. She also advised other precautionary measures, such as making sure bookkeepers don’t transfer money without protections in place and establishing safeguards to prevent disgruntled employees from internally dismantling a system.  Please see <a href="https://www.law.com/dailyreportonline/2023/02/09/hall-booth-smith-experiences-data-breach-heres-what-you-need-to-know-to-protect-your-firms-data/" rel="noopener noreferrer" target="_blank">here</a> for the full article.</p>


<p>So what to do to prepare?  Some obvious first steps are educating employees on cyber safety measures, making sure emails are encrypted, ensuring cyber insurance is up to date and becoming familiar with your company’s assets. You want to have a procedure and plan written ahead of time.</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[SEC Complaint, RICO, Securities Fraud – biggest case against financial crime in SDNY in a long time]]></title>
                <link>https://www.conawayandstrickler.com/blog/sec-complaint-rico-securities-fraud-biggest-case-against-financial-crime-in-sdny-in-a-long-time/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/sec-complaint-rico-securities-fraud-biggest-case-against-financial-crime-in-sdny-in-a-long-time/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Thu, 28 Apr 2022 14:37:35 GMT</pubDate>
                
                    <category><![CDATA[Cyber Crime]]></category>
                
                    <category><![CDATA[Cybercrime]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Federal Offenses]]></category>
                
                    <category><![CDATA[SEC]]></category>
                
                    <category><![CDATA[SEC complaint]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                    <category><![CDATA[White Collar Offenses]]></category>
                
                
                    <category><![CDATA[Archegos]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[hwang]]></category>
                
                    <category><![CDATA[SEC]]></category>
                
                    <category><![CDATA[SEC Complaint]]></category>
                
                    <category><![CDATA[White collar]]></category>
                
                
                
                    <media:thumbnail url="https://conawayandstrickler-com.justia.site/wp-content/uploads/sites/908/2021/05/us-dept-of-justice-doj-fraud.jpg" />
                
                <description><![CDATA[<p>Manhattan federal agents arrested Archegos Capital Management founder Sung Kook “Bill” Hwang on April 27, 2022 on fraud charges, roughly one year after the investment firm’s huge losses back in March 2021. Department of Justice prosecutors are charging both Hwang and Patrick Halligan, the firm’s chief financial officer, with racketeering conspiracy, securities fraud and wire&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p data-act-id="paragraph_0" data-paragraph-id="paragraph_CB36688F-270B-040E-7B5D-6B453323A446">Manhattan federal agents arrested Archegos Capital Management founder Sung Kook “Bill” Hwang on April 27, 2022 on fraud charges, roughly one year after the investment firm’s huge losses back in March 2021.  Department of Justice prosecutors are charging both Hwang and Patrick Halligan, the firm’s chief financial officer, with racketeering conspiracy, securities fraud and wire fraud offenses as part of schemes allegedly designed to “unlawfully manipulate” the price of publicly traded securities.</p>


<p>The 59-page indictment, filed in federal court in Manhattan, alleges the men and others at Archegos sometimes timed their trades to drum up the interest of other investors, while borrowing money to make bigger and bigger bets. The Department of Justice <a href="https://www.justice.gov/usao-sdny/pr/four-charged-connection-multi-billion-dollar-collapse-archegos-capital-management" rel="noopener noreferrer" target="_blank">states</a>, “Hwang and his co-conspirators invested in stocks mostly through special contracts with banks and brokers called “swaps.” As alleged, these swaps allowed Hwang to cause massive buying of certain stocks, including at carefully selected days and times, to artificially pump up stock prices. Hwang, Halligan, and their co-conspirators lied to banks and used a series of manipulative trading techniques to keep those prices high and prevent them from falling. The lies fed the inflation, and the inflation led to more lies. The scale of this alleged fraud was stunning.  In one year, Hwang turned a $1.5 billion portfolio and fraudulently pumped it up into a $35 billion portfolio.” The effective size of the firm’s stock positions swelled to $160 billion — rivaling some of the biggest hedge funds in the world.  The case marks the biggest financial-crime charges to come out of the Southern District of New York under the leadership of Mr. Damian Williams, who was sworn in October 10, 2021.</p>


<p>



The SEC has also filed a civil <a href="https://www.sec.gov/litigation/complaints/2022/comp-pr2022-70.pdf" rel="noopener noreferrer" target="_blank">complaint</a> stating that Mr. Becker, the former chief risk officer at Archegos, and Mr. Tomita, the firm’s former top trader, had led discussions with the banks about the firm’s trading positions but that Mr. Hwang and Mr. Halligan had directed and set the tone for those discussions.


For more background on this case, please click <a href="https://www.wsj.com/articles/who-is-archegos-fund-manager-bill-hwang-11651070393" rel="noopener noreferrer" target="_blank">here.</a>
</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[What are the current DOJ priorities?]]></title>
                <link>https://www.conawayandstrickler.com/blog/what-are-the-current-doj-priorities/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/what-are-the-current-doj-priorities/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Fri, 01 Apr 2022 15:03:29 GMT</pubDate>
                
                    <category><![CDATA[Blog]]></category>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[Cyber Crime]]></category>
                
                    <category><![CDATA[Cybercrime]]></category>
                
                    <category><![CDATA[False Claims Act]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Federal Offenses]]></category>
                
                    <category><![CDATA[Fraud]]></category>
                
                    <category><![CDATA[PPP loan fraud]]></category>
                
                    <category><![CDATA[Tax Fraud]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                    <category><![CDATA[White Collar Offenses]]></category>
                
                
                    <category><![CDATA[#taxevasion]]></category>
                
                    <category><![CDATA[#taxfraud]]></category>
                
                    <category><![CDATA[covid 19 task force]]></category>
                
                    <category><![CDATA[Criminal Lawyer]]></category>
                
                    <category><![CDATA[doj]]></category>
                
                    <category><![CDATA[False Claims Act]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[Federal Criminal Lawyer]]></category>
                
                    <category><![CDATA[health care fraud]]></category>
                
                    <category><![CDATA[kickbacks]]></category>
                
                    <category><![CDATA[Medicare Fraud]]></category>
                
                    <category><![CDATA[PPP Loan Fraud]]></category>
                
                    <category><![CDATA[Qui Tam]]></category>
                
                    <category><![CDATA[SEC]]></category>
                
                    <category><![CDATA[wire fraud]]></category>
                
                
                
                <description><![CDATA[<p>Attorney General Merrick Garland made recent comments about what he considered to be the Department of Justice’s top priorities for 2022. Since taking office in March 2021, Garland has tried to combat crime in a tumultuous time. He has been criticized for his handling of January 6 investigation and has stated it’s the most urgent&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>Attorney General Merrick Garland made recent <a href="https://www.justice.gov/opa/speech/attorney-general-merrick-b-garland-delivers-remarks-aba-institute-white-collar-crime" rel="noopener noreferrer" target="_blank">comments </a>about what he considered to be the Department of Justice’s top priorities for 2022.  Since taking office in March 2021, Garland has tried to combat crime in a tumultuous time.  He has been criticized for his handling of January 6 investigation and has stated it’s the <a href="https://www.newsweek.com/merrick-garland-jan6-doj-investigation-capitol-rnc-1686802" rel="noopener noreferrer" target="_blank">most urgent probe in history.</a></p>


<p>With all of this going on, the US Attorney’s office <em>increased</em> its prosecutions of individuals of white collar crimes in the year 2021.  White collar charges like fraud, theft, corruption, bribery, environmental crime, tax fraud, health care fraud, procurement fraud, money laundering, PPP loan fraud, etc will continue to get more attention from the Department of Justice.</p>


<p>What does this mean?  It means that investigations of any sort need to be taken seriously and that you should contact a lawyer immediately if any wrongdoing is alleged.</p>


<p>Conaway & Strickler, PC has a long history of handling fraud cases of all varieties and is well equipped at fighting the DOJ in their overzealous prosecutions.  Please feel free to contact us so that we can help you avoid future headaches.</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[After a Data Breach, What to Do?]]></title>
                <link>https://www.conawayandstrickler.com/blog/after-a-data-breach-what-to-do/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/after-a-data-breach-what-to-do/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Thu, 14 May 2020 19:47:43 GMT</pubDate>
                
                    <category><![CDATA[Cyber Crime]]></category>
                
                    <category><![CDATA[Cybercrime]]></category>
                
                    <category><![CDATA[Fraud]]></category>
                
                    <category><![CDATA[Uncategorized]]></category>
                
                    <category><![CDATA[Victim Of Crime]]></category>
                
                
                
                
                <description><![CDATA[<p>After the Hack: A Data Breach Post Game Show As chair of the Cyber Crime committee at iTechlaw, Meg Strickler gives her insight on data breaches from various perspectives on an iTechlaw webinar this week. She and the other panelists discuss: Please watch here: https://lnkd.in/gjHgVWt</p>
]]></description>
                <content:encoded><![CDATA[
<h2 class="wp-block-heading" id="h-after-the-hack-a-data-breach-post-game-show">After the Hack: A Data Breach Post Game Show</h2>



<p>As chair of the Cyber Crime committee at iTechlaw, Meg Strickler gives her insight on data breaches from various perspectives on an iTechlaw webinar this week.  She and the other panelists discuss:</p>



<ol class="wp-block-list">
<li>The criminal charge of BEC (Business email compromise) fraud</li>



<li>Representing a victim of BEC</li>



<li>Theft of trade secrets</li>



<li>Representing a victim of theft of trade secrets by a disgruntled employee or insider</li>



<li>Protecting small companies from potential hacks/ data breaches</li>



<li>Contacting law enforcement after a hack/breach</li>



<li>Commencing civil litigation in an attempt at restitution</li>



<li>Aggravated identity theft</li>



<li>Protection of PII</li>



<li>Cyber insurance</li>
</ol>



<p>Please watch here: <a href="https://lnkd.in/gjHgVWt" rel="noopener noreferrer" target="_blank">https://lnkd.in/gjHgVWt</a></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Economic losses prompt GBI to crack down on cybercrimes]]></title>
                <link>https://www.conawayandstrickler.com/blog/economic-losses-prompt-gbi-to-crack-down-on-cybercrimes/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/economic-losses-prompt-gbi-to-crack-down-on-cybercrimes/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Thu, 16 Apr 2020 17:00:26 GMT</pubDate>
                
                    <category><![CDATA[Cybercrime]]></category>
                
                
                
                
                <description><![CDATA[<p>In late 2018, the Georgia Bureau of Investigations opened a new cyber center, training a new unit of investigators to take on cases of alleged cybercrime. The move was an attempt to stem the tide of theft, fraud and other offenses committed electronically. According to a special agent in charge of the new investigation unit,&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>In late 2018, the Georgia Bureau of Investigations opened a new cyber center, training a new unit of investigators to take on cases of alleged cybercrime. The move was an attempt to stem the tide of theft, fraud and other <a href="/criminal-defense-practice/white-collar-crimes/computer-internet-crimes/cybercrime/" rel="noopener noreferrer" target="_blank">offenses committed electronically</a>. </p>


<p>According to a special agent in charge of the new investigation unit, cybercrime <a href="https://www.wrdw.com/content/news/Georgia-loses-millions-from-cyber-crimes-498727411.html" rel="noopener noreferrer" target="_blank">costs the state of Georgia</a> at least $38 million per year. However, that estimate could be severely low. </p>


<p><strong>Misleading numbers</strong> </p>


<p>The GBI special agent explains that reports of cybercrime statewide represent only a fraction of offenses that actually occur. There were 461 reported cybercrimes in 2017, including phishing, pharming, smishing and vishing. </p>


<p>However, if GBI estimates are accurate, for every one of those crimes for which the Bureau receives a report and conducts an investigation, there are at least six that go unreported. If this is true, then the $38 million figure for losses to the state due to cybercrime could be seven times too small. </p>


<p><strong>Most common crime</strong> </p>


<p>Many of the offenses that the new cyber unit is investigating involve the alleged theft of business or personal information related to finances. About 90% of those cases involve a phishing scheme via email. The alleged victim receives an email with the appearance of a legitimate communication from a trusted source. </p>


<p>Sometimes, the emails contain malicious software that sends information about the victim back to the sender. Other times, the alleged victim, lulled into a false sense of security by the email’s professional appearance, enters the requested information by hand, unwittingly providing financial data to an alleged thief. </p>


<p>Many times, the phishing email will use the logos and branding of a real company with which the alleged victim already does business. Therefore, the alleged offense goes by the name of business email compromise and represents some of the costliest cybercrimes in the state. </p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Investigating the investigators]]></title>
                <link>https://www.conawayandstrickler.com/blog/investigating_the_investigators/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/investigating_the_investigators/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Fri, 13 Sep 2019 21:49:39 GMT</pubDate>
                
                    <category><![CDATA[Cybercrime]]></category>
                
                
                
                
                <description><![CDATA[<p>Right now, in Georgia and throughout the United States, investigators are watching people and keeping track of their activities on the internet. There is a great deal of information out there, however, and these investigators do not always get everything right. Additionally, law enforcement officers sometimes overstep their bounds. At Conaway and Strickler, P.C., we&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>Right now, in Georgia and throughout the United States, investigators are watching people and keeping track of their activities on the internet. There is a great deal of information out there, however, and these investigators do not always get everything right.</p>


<p>Additionally, law enforcement officers sometimes overstep their bounds. At Conaway and Strickler, P.C., we make it our mission to ensure that our clients’ rights are protected. One of the ways we do this is by performing our own investigations.</p>


<p>There is an old saying it goes something along the lines of “what is good for one is good for the other.” We make a point of employing equal or superior techniques to state and federal agencies during <a href="/criminal-defense-practice/white-collar-crimes/computer-internet-crimes/cybercrime/">our own examinations of the facts</a>. We see this as the minimum requirement for a successful case. </p>


<p>Investigations are important because, by the time online stalking, child pornography, cyber warfare or other cybercrime arrests happen, the state usually already has a significant head start. Many arrests are the result of extended surveillance and investigation.</p>


<p>We believe that the court deserves to know exactly how any evidence was gathered and if those methods put our clients’ rights in danger. Investigations often risk heading into gray areas of civil rights and criminal law by misleading people or collecting evidence in unconventional manners. </p>


<p>Your arrest would be a serious wake-up call, but you should think twice if anyone tells you that it is the end of the road. Police officers, federal investigators and state attorneys often provide a pessimistic perspective that suits their goals: getting you the maximum penalty available. Only a thorough review of all the evidence — not someone’s biased prediction — will provide a realistic outlook.</p>


<p>Cybercrime charges are serious, but you should not let them intimidate you. Get the facts first. For more information, please continue reading on our main website.</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[When a selfie turns into child pornography]]></title>
                <link>https://www.conawayandstrickler.com/blog/when_a_selfie_turns_into_child_pornography/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/when_a_selfie_turns_into_child_pornography/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Fri, 23 Aug 2019 14:48:03 GMT</pubDate>
                
                    <category><![CDATA[Cybercrime]]></category>
                
                
                
                
                <description><![CDATA[<p>Taking a selfie is a common and popular phenomenon for people in Georgia and throughout the country. While many selfies are fun, they can be illegal if they contain sexual images and/or nudity of someone who is underage. If obtained in the wrong hands, a well-intentioned selfie can be the subject of a child pornography&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>Taking a selfie is a common and popular phenomenon for people in Georgia and throughout the country. While many selfies are fun, they can be illegal if they contain sexual images and/or nudity of someone who is underage. If obtained in the wrong hands, a well-intentioned selfie can be the subject of a child pornography charge.</p>


<p>FindLaw discusses how teenagers, especially, <a href="https://criminal.findlaw.com/criminal-charges/child-pornography-and-selfies--what-you-need-to-know.html" rel="noopener noreferrer" target="_blank">participate in producing, possessing and distributing</a> child pornography without even realizing it. Both teenage girls and boys take selfies of a sexual nature and send it to their boyfriend/girlfriend. This, in and of itself, in many states constitutes child pornography. If the receiver of the picture then forwards it on to others, this can become an even bigger issue. Once a sexually explicit picture passes state or international borders, it becomes a federal offense. Every person who is in possession of the selfie can potentially face charges for child pornography. </p>


<p>Some may argue that purposely taking a naked photo of oneself and sending it to someone else is anyone’s right and it falls under the First Amendment. However, the United States Department of Justice reports that there is <a href="https://www.justice.gov/criminal-ceos/citizens-guide-us-federal-law-child-pornography" rel="noopener noreferrer" target="_blank">not protection regarding child pornography</a> images and that they are illegal. In contrast to what some may believe, child pornography pictures do not have to depict a minor participating in sexual activity or acting against his or her will.</p>


<p>The United States takes cases of child pornography seriously, and convicted offenders can face numerous consequences such as mandatory prison time and fines. This is in addition to any possible state convictions. Due to the severity of the crime, children and minors need to think twice before taking an incriminating selfie and sending it to someone else.</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[A look at what the future of cybersecurity looks like]]></title>
                <link>https://www.conawayandstrickler.com/blog/a_look_at_what_the_future_of_cybersecurity_looks_like/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/a_look_at_what_the_future_of_cybersecurity_looks_like/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Sat, 13 Jul 2019 22:00:05 GMT</pubDate>
                
                    <category><![CDATA[Cybercrime]]></category>
                
                
                
                
                <description><![CDATA[<p>A lot has changed since the internet was first created and the profound innovation of such an incredible technology took the world by storm. In today’s world, an ever-growing technological challenge is the growing danger of cybercrime. For many industries in Georgia, protecting their intellectual property is not simply a matter of restricting access to&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>A lot has changed since the internet was first created and the profound innovation of such an incredible technology took the world by storm. In today’s world, an ever-growing technological challenge is the growing danger of cybercrime. For many industries in Georgia, protecting their intellectual property is not simply a matter of restricting access to its accessibility, but carefully crafting strategic methods for keeping unwanted viruses and criminals from exposing confidential information. </p>


<p>Some interesting research that examined what the <a href="/criminal-defense-practice/white-collar-crimes/computer-internet-crimes/cybercrime/">future of cybersecurity</a> is going to look like, uncovered some interesting facts that may help people to better understand the risks they are facing. One development that businesses may notice is the incorporation of highly trained, often-retired military members who have experience in working with cybersecurity, being hired to take leading roles in providing security in the virtual world. They may also notice an increase in roles such as that of a security data scientist who will analyze data and its utilization in discovering ways to protect it without constricting its use. </p>


<p>In an ever-growing business world, applications as a resource for optimizing transactions between consumers and companies, as well as between business-to-business, will continue to provide assistance in revolutionizing how business is done. However, thoroughly implemented security measures will be critical so long as applications are in use. Another development will be the way that social contracts are leveraged. While they will still be widely used, they may begin to include cybersecurity agreements as a way to solidify promises between data systems and humans. </p>


<p>Because cybercrime will never go away, businesses will benefit from implementing measures that will better protect information that is important to them. An attorney may be able to provide support as businesses strive to keep confidential information out of the wrong hands. </p>


<p><strong>Source: </strong>Forbes, “<a href="https://www.forbes.com/sites/forbestechcouncil/2019/07/10/cybersecuritys-evolution-how-it-may-look-over-the-next-few-years/#68b7e9a17605" rel="noopener noreferrer" target="_blank">Cybersecurity’s Evolution: How It May Look Over The Next Few Years,</a>” Joseph Feiman, Jul. 10, 2019</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Smartphones and cybercrime charges]]></title>
                <link>https://www.conawayandstrickler.com/blog/smartphones_and_cybercrime_charges/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/smartphones_and_cybercrime_charges/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Sun, 19 May 2019 14:47:22 GMT</pubDate>
                
                    <category><![CDATA[Cybercrime]]></category>
                
                
                
                
                <description><![CDATA[<p>When some people envision a cybercrime, they may picture someone huddled over a computer. However, people may also be accused of an online offense as a result of activities that were carried out on a smartphone. For example, someone may be charged with sharing or possessing unlawful material with their phone or harassing another person&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>When some people envision a cybercrime, they may picture someone huddled over a computer. However, people may also be accused of an online offense as a result of activities that were carried out on a smartphone. For example, someone may be charged with sharing or possessing unlawful material with their phone or harassing another person through an app that they accessed on their smartphone. When it comes to cybercrime charges, the consequences can be just as serious if the offense was carried out using a smartphone, so it is crucial to realize that unlawful activity on a smartphone can be just as serious.</p>


<p>Unfortunately, some people may not realize that certain behaviors on their phone constitute an illegal offense. Moreover, someone may find themselves in this position even though they were not aware of any wrongdoing. For example, someone may let their friend borrow their phone, or another person may use their phone to carry out an illegal act without their knowledge. After all, it can be difficult to keep track of a phone at all times, and many people bring their phones with them to restaurants, bars and other settings.</p>


<p>Whether you have been accused of an <a href="/criminal-defense-practice/white-collar-crimes/computer-internet-crimes/cybercrime/">online offense</a> involving your phone or a personal computer, it is crucial to prepare for your case and realize how much may be at stake. These charges could disrupt your future in many different ways and completely shatter your reputation. We cover all sorts of issues related to cybercrime charges across our website.</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[The consequences of revenge porn charges]]></title>
                <link>https://www.conawayandstrickler.com/blog/the_consequences_of_revenge_porn_charges/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/the_consequences_of_revenge_porn_charges/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Sun, 21 Apr 2019 14:29:19 GMT</pubDate>
                
                    <category><![CDATA[Cybercrime]]></category>
                
                
                
                
                <description><![CDATA[<p>Cases that involve unlawful pornography can be tough for a plethora of reasons. First, these cases carry a harsh stigma, and those who are accused of wrongdoing may feel too ashamed to stand up for themselves (even when details have been exaggerated or they are falsely accused of unlawful behavior). Moreover, some people may not&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>Cases that involve unlawful pornography can be tough for a plethora of reasons. First, these cases carry a harsh stigma, and those who are accused of wrongdoing may feel too ashamed to stand up for themselves (even when details have been exaggerated or they are falsely accused of unlawful behavior). Moreover, some people may not be aware that certain types of behavior are against the law, especially since laws involving pornography have changed in recent years. In Georgia, for example, it is against the law for people to share nude images of their ex without their consent (this is known as revenge porn).</p>


<p>Revenge porn charges can lead to a number of harsh consequences. Those charged with breaking this law may face financial penalties and even time behind bars. For example, someone who is accused of sharing revenge porn again after they have been charged with this offense in the past may be sentenced to prison. Aside from the legal repercussions of revenge porn charges, one’s reputation may be completely destroyed. This could cause problems for them in regard to their career, and it may also cause personal relationships to fall apart.</p>


<p>If you have been accused of illegally sharing revenge porn, it is important to have a solid understanding of your legal options and figure out how to move forward. You should be aware of the potentially serious consequences you could face and try to identify the best way to handle this situation. Our cybercrime page has more related to <a href="/criminal-defense-practice/white-collar-crimes/computer-internet-crimes/cybercrime/">revenge porn charges</a>.</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Handling false allegations of online harassment]]></title>
                <link>https://www.conawayandstrickler.com/blog/handling_false_allegations_of_online_harassment/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/handling_false_allegations_of_online_harassment/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Sat, 06 Apr 2019 14:20:27 GMT</pubDate>
                
                    <category><![CDATA[Cybercrime]]></category>
                
                
                
                
                <description><![CDATA[<p>Online crime charges take many forms, but harassment is an especially tricky issue to deal with in many instances. People may be charged with harassment for a number of reasons, whether they were unaware that their behavior was against the law or they are even falsely accused of online harassment. For example, someone may break&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>Online crime charges take many forms, but harassment is an especially tricky issue to deal with in many instances. People may be charged with harassment for a number of reasons, whether they were unaware that their behavior was against the law or they are even falsely accused of online harassment. For example, someone may break up with a spouse or partner and their ex may try to shatter their reputation and bring legal consequences by falsely accusing them of harassing them over the internet. We know how challenging these cases can be and it is pivotal to protect your interests.</p>


<p>If you have been accused of online harassment, it is pivotal to immediately go over your legal options, the ins and outs of the alleged incident(s) and the best course of action. Your future may be at stake, whether you run the risk of losing your job as a result of these allegations or you face serious penalties. If you are the parent of a teen who has been accused of cyber harassment, for example, it is equally important to protect their future by carefully examining the situation and exploring the legal options that may be on the table. Many teens have been falsely accused of harassment by a former friend or an enemy at school.</p>


<p>The consequences of these charges are not to be taken lightly and the outcome of an <a href="/criminal-defense-practice/white-collar-crimes/computer-internet-crimes/cybercrime/">online harassment case</a> could have a significant impact on your future. We cover other issues concerning this area of law on our blog.</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Georgia’s view on cyberbullying]]></title>
                <link>https://www.conawayandstrickler.com/blog/georgias_view_on_cyberbullying/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/georgias_view_on_cyberbullying/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Mon, 01 Apr 2019 02:51:09 GMT</pubDate>
                
                    <category><![CDATA[Cybercrime]]></category>
                
                
                
                
                <description><![CDATA[<p>People in Atlanta tend to view cybercrime is hacking attacks launched by sophisticated “tech-heads” to either steal information or interfere with an organization’s online activities. Yet the actual definition of cybercrime is criminal activities out with computers or via the Internet. Applying this definition could make cause cybercrime to hit closer to people’s homes in&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>People in Atlanta tend to view cybercrime is hacking attacks launched by sophisticated “tech-heads” to either steal information or interfere with an organization’s online activities. Yet the actual definition of cybercrime is criminal activities out with computers or via the Internet. Applying this definition could make cause cybercrime to hit closer to people’s homes <a href="/criminal-defense-practice/white-collar-crimes/computer-internet-crimes/cybercrime/">in the form of cyberbullying</a>. Bullying itself is an age-old issue, yet cyberbullying is a relatively new problem. While the perceived impersonal nature of the Internet may cause some to believe that their online actions are viewed differently than by those they engage in person, the law often does not differentiate. </p>


<p>Cyberbullying is a perfect example of this. While there certainly instances of adults bullying other adults online, cyberbullying is a problem typically associated with children and teens. Indeed, information compiled by the U.S. <a href="https://www.stopbullying.gov/media/facts/index.html#stats" rel="noopener noreferrer" target="_blank">Department of Health and Human Services</a> shows that 15 percent of high school students report being bullied via electronic media. Teens and tweens might mistakenly believe that whatever they post on social media platforms, send through emails or communicate through instant or text messages is always viewed as being perfectly innocent given that disconnectedness of the medium of the Internet empowers them to say things that they do not actually mean. </p>


<p>Yet from the perspective of the state of Georgia, cyberbullying is akin to stalking. Section 16.5.90 of the state’s <a href="https://codes.findlaw.com/ga/title-16-crimes-and-offenses/ga-code-sect-16-5-90.html" rel="noopener noreferrer" target="_blank">Crimes and Offenses Code</a> classifies stalking as “follows, places under surveillance, or contacts another person at or about a place or places without the consent of the other person for the purpose of harassing and intimidating the other person.” Recent years have seen the state include communications via computer to qualify as “contact” under this statute. Youths who face cyberbullying charges must prove a lack of harassing intent in their online communications. </p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[The current state of cybercrime defense]]></title>
                <link>https://www.conawayandstrickler.com/blog/the_current_state_of_cybercrime_defense/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/the_current_state_of_cybercrime_defense/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Sat, 23 Feb 2019 21:08:04 GMT</pubDate>
                
                    <category><![CDATA[Cybercrime]]></category>
                
                
                
                
                <description><![CDATA[<p>Internet crime is a relatively new frontier in criminal justice. The topics are related to previous legal matters, but the tools of communication are diverse and novel. Additionally, the way people interact with web-based communications is always changing. Here is a brief look at the current status of cybercrime defense in this context. As stated&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>Internet crime is a relatively new frontier in criminal justice. The topics are related to previous legal matters, but the tools of communication are diverse and novel. Additionally, the way people interact with web-based communications is always changing. Here is a brief look at the current status of cybercrime defense in this context.</p>


<p>As stated on its official site, the FBI sees national and international <a href="https://www.fbi.gov/file-repository/addressing-threats-to-the-nations-cybersecurity-1.pdf/view" rel="noopener noreferrer" target="_blank">cybersecurity investigations</a> as falling within its jurisdiction. This wide focus, combined with the various federal laws governing interstate crime, often means that prosecutors may attempt to direct cybercrime cases to federal courts.</p>


<p>For more blog entries, click here</p>


<p>However, there are various specific situations surrounding actual internet crime allegations. There are also many different categories of crimes. Here is a selection of different offenses that might occur over the internet.</p>


<p>One common cyber-crime allegation involves the production of non-consensual or child pornography. Prosecutors often bring this particular charge in association with cases of extortion. In addition to sensitive photos, private information may also be a factor. As indicated in the Cyber Misbehavior Report from the Department of Justice, this type of accusation may also be linked to <a href="https://www.justice.gov/usao/file/851856/download" rel="noopener noreferrer" target="_blank">charges of domestic violence</a> due to alleged psychological harm.</p>


<p>The DOJ also lists several other types of misbehavior, including cyber threats stalking and harassment. The federal statute on various crimes, including cyberstalking, threats, and computer hacking may apply in various situations.</p>


<p>Investigations into these matters by the FBI and joint state task forces often uncover a great deal of highly technical evidence. Where, how and if this information is applicable to a certain situation depends on the location of the alleged actions, on the way the evidence was collected and on various other factors. Therefore almost all details, including venue charges and potential consequences, should typically be considered on a case-by-case basis.</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[The stigma surrounding cybercrime charges]]></title>
                <link>https://www.conawayandstrickler.com/blog/the_stigma_surrounding_cybercrime_charges/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/the_stigma_surrounding_cybercrime_charges/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Fri, 01 Feb 2019 17:55:38 GMT</pubDate>
                
                    <category><![CDATA[Cybercrime]]></category>
                
                
                
                
                <description><![CDATA[<p>In a recent post, we looked into how challenging it can be for some people who have been charged with a white collar offense due to the stigma associated with these charges (career problems, etc.). While some people may think that offenses carried out over the internet have less of a stigma and softer consequences,&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>In a recent post, we looked into how challenging it can be for some people who have been charged with a white collar offense due to the stigma associated with these charges (career problems, etc.). While some people may think that offenses carried out over the internet have less of a stigma and softer consequences, it is crucial to remember that cybercrime charges can also be very damaging in this regard (if not more so, in some cases). There are many different cybercrime charges that people face, from those which are financial to offenses which are sexual in nature.</p>


<p>Someone who has been accused of an online offense may lose their job as a result of the allegations, or their spouse may decide to leave them. Their standing in the community may be tarnished and they may even find that some of their friends have abandoned them as well. Unfortunately, even some people who have been falsely accused of these offenses have to endure these hardships due to the harsh stigma of cybercrimes.</p>


<p>From online crimes that involve theft and fraud to those which involve unlawful pornography, there are many different offenses carried out through technology. In the digital age, people are especially familiar with some of these offenses and they can be very damaging to one’s reputation. If you have been accused of any type of online or <a href="/criminal-defense-practice/white-collar-crimes/computer-internet-crimes/cybercrime/">computer-related offense</a>, it is crucial to protect your rights. You should realize the different ways in which your life may be impacted in the present and future.</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[False allegations of cybercrime and your career]]></title>
                <link>https://www.conawayandstrickler.com/blog/false_allegations_of_cybercrime_and_your_career/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/false_allegations_of_cybercrime_and_your_career/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Fri, 28 Dec 2018 15:03:00 GMT</pubDate>
                
                    <category><![CDATA[Cybercrime]]></category>
                
                
                
                
                <description><![CDATA[<p>People are accused of various offenses related to the internet, from computer fraud to cyberstalking and even cyberterrorism. However, these cases may be based on completely fabricated allegations in some instances. Regardless of whether the claims are true or not, the damage to one’s reputation can be irreparable and may affect their life in various&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>People are accused of various offenses related to the internet, from computer fraud to cyberstalking and even cyberterrorism. However, these cases may be based on completely fabricated allegations in some instances. Regardless of whether the claims are true or not, the damage to one’s reputation can be irreparable and may affect their life in various ways. Not only are financial penalties and even prison time part of the picture in many cases, but some people may have their career thrown off course and suffer other negative consequences. If you are facing false accusations related to some type of cybercrime, make sure that you stand up for your rights.</p>


<p>Your career could be adversely affected by a cybercrime case in many different ways. First of all, you may be unable to find work in a particular field, especially if it involves technology or anything related to your case. For example, if the crime was financial in nature, you may be unable to work in the finance sector in certain capacities. Not only can you lose your current job but finding a new position may be impossible, which underlines the importance of figuring out how to approach your cybercrime case correctly.</p>


<p>Some people are unsure of where to begin when they are struggling with a <a href="/criminal-defense-practice/white-collar-crimes/computer-internet-crimes/cybercrime/">cybercrime case</a>, and they may have little hope that their side of the story will be taken seriously. However, the consequences of an unfavorable end result can be devastating, and it is imperative to have a comprehensive understanding of all your options before moving forward.</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[What qualifies as an online invasion of privacy?]]></title>
                <link>https://www.conawayandstrickler.com/blog/what_qualifies_as_an_online_invasion_of_privacy/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/what_qualifies_as_an_online_invasion_of_privacy/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Fri, 14 Dec 2018 18:35:40 GMT</pubDate>
                
                    <category><![CDATA[Cybercrime]]></category>
                
                
                
                
                <description><![CDATA[<p>The internet is largely driven by the exchange of information. Thus, if you spend a significant portion of time online (either for your own personal fulfillment or for business purposes), the chances of your receiving information and content from others both inside and outside of Atlanta may be high. Such information is often shared with&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>The internet is largely driven by the exchange of information. Thus, if you spend a significant portion of time online (either for your own personal fulfillment or for business purposes), the chances of your receiving information and content from others both inside and outside of Atlanta may be high. Such information is often shared with the expectation that it will be kept private. The question then becomes what are the restraints on its use? </p>


<p>Online invasion of privacy is recognized as being a serious form of cybercrime. Indeed, in Section 19-9-91 of <a href="https://codes.findlaw.com/ga/title-16-crimes-and-offenses/ga-code-sect-16-9-91.html" rel="noopener noreferrer" target="_blank">Georgia’s Code of Crimes and Offenses</a>, it is recognized that internet crime can have a far deeper and more damaging impact than other forms of white collar criminal activity. Because of this potential, authorities may be more apt to apply invasion of privacy reasoning in justification for bringing criminal charges against you. Your best answer to such claims may be to cite the specific examples of such activity to see if your actions qualify. </p>


<p>The most obvious form of <a href="/criminal-defense-practice/white-collar-crimes/computer-internet-crimes/cybercrime/">online invasion of privacy</a> is an intrusion of solitude. This occurs when one invades one’s privacy when there is a reasonable expectation of solitude (such as you observing another on a camera or video feed). Other less common examples include: </p>


<ul class="wp-block-list">
<li>The appropriation of one’s name or likeness</li>
<li>The public disclosure of private fact</li>
<li>Portraying someone in a false light</li>
</ul>


<p>The common thread amongst these crimes is a lack of consent on the part of an alleged victim to have their information shared. Thus, should you stand accused of such a crime, having a detailed record showing the agreement on the use of such information between you and your accuser can help you in answering claims if misuse. </p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Facing cyberbullying charges as an adult]]></title>
                <link>https://www.conawayandstrickler.com/blog/facing_cyberbullying_charges_as_an_adult/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/facing_cyberbullying_charges_as_an_adult/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Sat, 27 Oct 2018 20:45:00 GMT</pubDate>
                
                    <category><![CDATA[Cybercrime]]></category>
                
                
                
                
                <description><![CDATA[<p>We have looked into various issues related to cyberbullying in some of our blog posts, such as the consequences that may come from these charges. It is also important to point out that some people do not realize that many adults have faced charges as a result of cyberbullying as well. For an adult charged&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>We have looked into various issues related to cyberbullying in some of our blog posts, such as the consequences that may come from these charges. It is also important to point out that some people do not realize that many adults have faced charges as a result of cyberbullying as well. For an adult charged with this offense, multiple challenges may arise and we will review some in this post. Moreover, the allegations may be completely basis and the result of someone who wants to get even with another person by shattering their reputation and dragging them through the legal system.</p>


<p>When an adult faces charges over allegedly harassing another person over the internet, their good reputation could be damaged, sometimes beyond repair (at least in certain circles). They may have a great deal of anxiety over legal matters and be completely unaware of their legal rights. Worse, some of these cases are the result of completely baseless allegations, which may be the result of a former boyfriend or girlfriend trying to get even or some other situation which involves revenge.</p>


<p>Some people may also feel that they have been bullied or harassed in a way which violates the law even though no laws were even broken. There are all sorts of different legal aspects of a case to consider and every single one is different. As a result, if you have been <a href="/criminal-defense-practice/white-collar-crimes/computer-internet-crimes/cybercrime/">charged with cyberbullying</a> as an adult, it is vital to go over your case from an individualized perspective.</p>


]]></content:encoded>
            </item>
        
    </channel>
</rss>