<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
     xmlns:georss="http://www.georss.org/georss"
     xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
     xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[Federal Crimes - Conaway & Strickler]]></title>
        <atom:link href="https://www.conawayandstrickler.com/blog/categories/federal-crimes/feed/" rel="self" type="application/rss+xml" />
        <link>https://www.conawayandstrickler.com/blog/categories/federal-crimes/</link>
        <description><![CDATA[Conaway & Strickler's Website]]></description>
        <lastBuildDate>Sat, 14 Mar 2026 15:04:46 GMT</lastBuildDate>
        
        <language>en-us</language>
        
            <item>
                <title><![CDATA[AI Generated CSAM – What to Know]]></title>
                <link>https://www.conawayandstrickler.com/blog/ai-generated-csam-what-to-know/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/ai-generated-csam-what-to-know/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Sat, 14 Mar 2026 15:03:41 GMT</pubDate>
                
                    <category><![CDATA[child pornography]]></category>
                
                    <category><![CDATA[CSAM charges]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Sex Crimes]]></category>
                
                
                    <category><![CDATA[csam charges]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[Federal Criminal Lawyer]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                
                
                <description><![CDATA[<p>What is AI-Generated CSAM? Synthetic child sexual abuse material (CSAM) may not involve a camera or physical contact but it will depicts a child in a sexual context and thus is subject to regulation. Artificial intelligence is used to create realistic images or videos of children in sexual situations. Sometimes, these materials depict completely fabricated&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p><strong>What is AI-Generated CSAM?</strong></p>



<p>Synthetic child sexual abuse material (CSAM) may not involve a camera or physical contact but it will depicts a child in a sexual context and thus is subject to regulation.  Artificial intelligence is used to create realistic images or videos of children in sexual situations. Sometimes, these materials depict completely fabricated children or the face or likeness of a real child, placing them into sexualized content without their knowledge or consent.  When it is the face or likeness of a real child, there is a higher likelihood of charges being imminent.  </p>



<p><strong>Can I be Charged with Synthetic CSAM? </strong></p>



<p>It is possible to be charged criminally when in possession of AI generated child sex abuse material.  There has been some movement in this area to <a href="https://www.techpolicy.press/court-rules-that-constitution-protects-private-possession-of-aigenerated-csam/">litigate the legality</a> of charging such activity criminally and only time will tell what that means for how the Supreme Court will rule as recent cases move through the system. <a href="https://www.wdbj7.com/2026/03/04/reports-ai-generated-child-sexual-abuse-material-surge/">  News </a>continues to state that AI – Generated CSAM is on the rise and “a growing concern” which will in turn result in additional federal and state criminal charges for AI-Generated CSAM.  </p>



<p>Regulation of AI-created intimate images, often referred to as “deep fakes” has been broadly adopted by most states and the federal government.  In the state of Georgia, there have been <a href="https://www.ossoff.senate.gov/press-releases/sens-ossoff-blackburn-launch-bipartisan-inquiry-to-address-ai-generated-child-sex-abuse-material-online/">several attempts to change legislation</a> including this recent <a href="https://www.ossoff.senate.gov/wp-content/uploads/2023/07/23.07.17_DOJ-Letter-re-AI-CSAM-FINAL-1.pdf">letter </a>written by Jon Ossoff.  There are also <a href="https://www.dekalbda.org/news_detail_T6_R369.php">recent prosecutions </a>including a man in KY who was sentenced to five years for <a href="https://www.justice.gov/usao-wdky/pr/bowling-green-man-sentenced-5-years-federal-prison-followed-20-years-supervised">using AI to create child sexual abuse material.</a>  <a href="https://www.justice.gov/psc/press-room">Prosecutions at the federal level for CSAM </a>is on the rise as well.   </p>



<p>If you learn that you are under investigation for offenses related to CSAM, you should <a href="https://www.conawayandstrickler.com/contact-us/">contact us </a>immediately. <a href="https://www.conawayandstrickler.com/lawyers/meg-strickler/">We </a>are here to help and have <a href="https://www.conawayandstrickler.com/blog/categories/sex-crimes/">experience</a> to fight these cases.  </p>



<p></p>



<p></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Charged with a Federal Crime?]]></title>
                <link>https://www.conawayandstrickler.com/blog/charged-with-a-federal-crime/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/charged-with-a-federal-crime/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Thu, 29 Jan 2026 16:08:46 GMT</pubDate>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                
                    <category><![CDATA[Criminal defense]]></category>
                
                    <category><![CDATA[Criminal Lawyer]]></category>
                
                    <category><![CDATA[federal crime]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[Federal Criminal Lawyer]]></category>
                
                
                
                <description><![CDATA[<p>Being charged with a federal crime can result from allegations of violating a federal criminal statute. All cases are prosecuted by the Department of Justice prosecuted by a “AUSA” – Assistant United States Attorney. All cases are investigated by agencies like the FBI, ATF, or DEA. STEPS IN THE FEDERAL CRIMINAL PROCESS (Note: this blog&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>Being charged with a federal crime can result from allegations of violating a <a href="https://www.congress.gov/crs-product/R48177">federal criminal statute.</a> All cases are prosecuted by the Department of Justice prosecuted by a “AUSA” – Assistant United States Attorney. All cases are investigated by agencies like the FBI, ATF, or DEA.</p>



<p><a href="https://www.justice.gov/usao/justice-101/steps-federal-criminal-process">STEPS IN THE FEDERAL CRIMINAL PROCESS</a> (Note: this blog will discuss the procedure for a plea. For more information on what to expect at federal criminal trial, read more <a href="https://www.conawayandstrickler.com/blog/what-to-expect-in-a-federal-criminal-trial/">here</a>.)</p>



<p><strong>Initial Appearance</strong></p>



<p>Generally, after an <a href="https://www.justice.gov/usao/justice-101/investigation">investigation</a>, charges are brought via a federal criminal indictment. Hiring a <a href="https://www.conawayandstrickler.com/lawyers/meg-strickler/">federal criminal defense attorney</a> as soon as possible results in a better resolution.</p>



<p>Once an indictment is filed, and you are arrested and processed, you are brought before a magistrate judge for an initial hearing on the case. At that time, you learn more about your rights and the charges against you, and the judge decides whether to grant you pretrial release  or order you be detained.</p>



<p><strong>Arraignment</strong></p>



<p>This hearing can occur at the same time as the initial appearance.  You are asked if you have read and understood the charges against you and you formally enter a plea of “Not Guilty”. </p>



<p><strong>Discovery</strong></p>



<p>Federal criminal discovery is governed by three sources of law: <a href="https://www.federalrulesofcriminalprocedure.org/title-iv/rule-16-discovery-and-inspection/">Rule 16 of the Federal Rules of Criminal Procedure</a>, the Supreme Court cases of <em>Brady </em>and <em>Giglio</em>, and the Jencks Act.</p>



<p><strong>Plea Negotiations</strong></p>



<p>The plea bargain itself, called a “<a href="https://www.justice.gov/archives/jm/criminal-resource-manual-623-pleas-federal-rule-criminal-procedure-11">Rule 11</a>” plea in the Federal Criminal Justice system, generally is memorialized in a 15-20 page document called the “<a href="https://www.justice.gov/usao-ndil/file/788886/dl?inline=">plea agreement</a>“.</p>



<p><strong>Change of Plea Hearing</strong></p>



<p>A change of plea hearing in federal court is scheduled when a defendant decides to plead guilty to a federal offense.  During the hearing, the judge will ask questions to ensure that the plea is entered freely and voluntarily.  </p>



<p><strong>Preparation of Pre-Sentence Report</strong></p>



<p>After you enter a plea of guilty to a federal offense or is convicted by trial, you will meet with a probation officer. The probation officer will conduct an interview you to get more information about the entire case and then submits a report for the judge to determine the proper sentence. The following information is gathered during this interview and pre sentence investigation: family history, community ties, education background, employment history, military history, physical health, mental and emotional health, history of substance abuse, financial condition, and willingness to accept responsibility for the offense. Learn more about the <a href="https://www.conawayandstrickler.com/blog/what-is-a-presentence-investigation-report-psr/">pre-sentence report</a> and the <a href="https://www.conawayandstrickler.com/blog/what-is-a-psr-interview/">pre-sentence report interview</a>.</p>



<p><strong>United States Sentencing Guidelines</strong></p>



<p>The <a href="https://www.ussc.gov/guidelines/2025-guidelines-manual">United States Federal Sentencing Guidelines</a> are what the judge uses to decide an appropriate sentence for each case.</p>



<p><strong>Sentencing Hearing</strong></p>



<p>A federal sentencing hearing is when final arguments are presented and a judge hands down the sentence.</p>



<p></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Recent Investment Fraud case in Georgia]]></title>
                <link>https://www.conawayandstrickler.com/blog/recent-investment-fraud-case-in-georgia/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/recent-investment-fraud-case-in-georgia/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Sat, 03 Jan 2026 18:04:54 GMT</pubDate>
                
                    <category><![CDATA[Cyber Crime]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[investment fraud]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                
                    <category><![CDATA[federal criminal defense attorney]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[investment fraud]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                    <category><![CDATA[white collar crime]]></category>
                
                    <category><![CDATA[wire fraud]]></category>
                
                
                
                    <media:thumbnail url="https://conawayandstrickler-com.justia.site/wp-content/uploads/sites/908/2023/10/IMG_7855-scaled-1.jpeg" />
                
                <description><![CDATA[<p>David Bradford, the former Chief Operating Officer of Drive Planning LLC (“Drive Planning”), pled guilty last month to conspiracy to commit wire fraud arising from a multi-year Ponzi investment fraud case that defrauded investors out of millions of dollars. A SEC complaint was also filed against Jacqueline and Russell Todd Burkhalter. The SEC complaint details&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>David Bradford, the former Chief Operating Officer of Drive Planning LLC (“Drive Planning”), <a href="https://www.justice.gov/usao-ndga/pr/former-financial-advisory-group-executive-pleads-guilty-4-million-ponzi-scheme">pled guilty</a> last month to conspiracy to commit wire fraud arising from a multi-year Ponzi investment fraud case that defrauded investors out of millions of dollars. A <a href="https://storage.courtlistener.com/recap/gov.uscourts.gand.332795/gov.uscourts.gand.332795.1.0.pdf">SEC complaint </a>was also filed against <a href="/blog/unregistered-securities-and-allegations-of-operating-a-ponzi-scheme/">Jacqueline and Russell Todd Burkhalter</a>. The SEC complaint details that promises of investment gains were built on lies. Drive Planning and its officers did not have any legitimate business operations capable of generating the returns they touted. Instead, they used new investor funds to pay earlier investors in classic Ponzi scheme fashion. The defendants in the case, it was alleged, used the funds to fund an extravagant lifestyle, including purchasing a $3.1 million yacht, spending $4.6 million on private jets and luxury car services, and acquiring a $2 million luxury condo.</p>



<p>An Indianapolis broker<a href="https://www.sec.gov/enforcement-litigation/litigation-releases/lr-26456"> is also being charged</a> with <a href="https://www.occ.gov/topics/consumers-and-communities/consumer-protection/fraud-resources/financial-and-investment-fraud-.html">securities fraud</a> and investment fraud by the SEC in relation to Drive Planning LLC, and its alleged $300 million Ponzi scheme. Gerardo “Gerry” Linarducci, a former Managing Partner of Drive Planning and head of its Indiana branch office, was charged on Dec. 19. </p>



<p>It is alleged that from late 2021 until in or about June 2024, Drive Planning, a Georgia based financial advisory group, marketed several investments, including the “Cash Out Real Estate Fund,” or “CORE Fund,” as “easy and simple,” advising prospective investors that the fund provided “100% Passive Income from Tax Liens.” Drive Planning guaranteed investors a return of 10% every six months or a 22% return per year for up to three years. Drive Planning further materially misrepresented that investors’ contributions to the CORE Fund were pooled together, government-protected, and fully collateralized. As part of the scheme, Bradford created a marketing brochure to promote the CORE Fund, which was shared with Drive Planning’s sales agents to solicit investors.&nbsp;</p>



<p>In actuality, the investors’ monies were being used for other purposes, including to pay off other Drive Planning investors, make commission payments to Drive Planning’s agents, and pay for personal expenditures. Bradford and others at Drive Planning further concealed the scheme to defraud by failing to disclose that Drive Planning did not invest any funds in the CORE Fund after approximately December 9, 2022. To the contrary, even after the Securities and Exchange Commission (SEC) began investigating Drive Planning in approximately March 2024, Bradford and others continued to solicit investments for the CORE Fund. In total, Drive Planning received at least $4.1 million from CORE Fund investors.</p>



<p>In August 2024, the SEC obtained a temporary restraining order against Drive Planning and filed separate civil enforcement actions against Drive Planning and others in the U.S. District Court for the Northern District of Georgia related to the above-described scheme.&nbsp;</p>



<h2 class="wp-block-heading" id="h-we-can-help">We Can Help</h2>



<p>Conaway & Strickler, PC has vast experience representing those who are facing charges from the SEC and the DOJ and we are equally adept at representing victims of <a href="https://www.conawayandstrickler.com/blog/what-is-a-pig-butchering-scam/">investment fraud</a>.  We pursue all available legal avenues to recover your lost investments.  <a href="https://www.conawayandstrickler.com/contact-us/">Contact us</a> should you need representation.  </p>



<p></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[What is Money Laundering?]]></title>
                <link>https://www.conawayandstrickler.com/blog/charged-with-money-laundering/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/charged-with-money-laundering/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Wed, 26 Nov 2025 02:14:54 GMT</pubDate>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[RICO]]></category>
                
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[wire fraud]]></category>
                
                
                
                <description><![CDATA[<p>I. What charges can the government use to allege money laundering? 18 U.S.C. § 1956: This is for laundering monetary instruments and carries a penalty of up to 20 years in prison and fines of up to $500,000 or twice the value of the funds involved, whichever is greater 18 U.S.C. § 1957: This applies&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p></p>



<p></p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="1024" height="768" src="/static/2025/11/lsa-downtown-view-.jpg" alt="" class="wp-image-1429" srcset="/static/2025/11/lsa-downtown-view-.jpg 1024w, /static/2025/11/lsa-downtown-view--300x225.jpg 300w, /static/2025/11/lsa-downtown-view--768x576.jpg 768w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>I. What charges can the government use to allege money laundering?</p>



<p>18 U.S.C. § 1956: This is for laundering monetary instruments and carries a penalty of up to 20 years in prison and fines of up to $500,000 or twice the value of the funds involved, whichever is greater</p>



<p>18 U.S.C. § 1957: This applies to engaging in monetary transactions in property derived from specified unlawful activity and can result in up to 10 years in prison and fines up to twice the value of the property involved.</p>



<p>18 U.S.C. § 1956(h): criminalizes conspiracy to commit money laundering. It makes it illegal for two or more people to agree to conduct or attempt to conduct a financial transaction involving the proceeds of specified unlawful activity (money laundering). The crime is the agreement itself, regardless of whether the money laundering was ultimately successful.</p>



<p>Bulk cash smuggling (31 U.S.C. § 5332): knowingly concealing more than $10,000 in currency or other monetary instruments on the person of such individual or in any conveyance, article of luggage, merchandise, or other container, and transports or transfers or attempts to transport or transfer such currency or monetary instruments from a place within the United States to a place outside of the United States, or from a place outside the United States to a place within the United States</p>



<p>RICO Act- the Racketeer Influenced and Corrupt Organizations (RICO)</p>



<p>II. Drug traffickers are purported to utilize some of the following tactics to money launder</p>



<p>-Purchase and or title assets in fictitious names, aliases, or in the names of friends or relatives </p>



<p>-Create and maintain Bitcoin and other cryptocurrency accounts. These are utilized because of the anonymity associated with the use of Bitcoin and other cryptocurrency accounts and because cryptocurrency is decentralized.</p>



<p>III. Dark Net Explanation </p>



<p>The darknet is a part of the internet that requires special software, like the <a href="https://www.torproject.org/">Tor browser</a>, to access, and is not indexed by standard search engines. It uses layered encryption to make user activity anonymous</p>



<p>IV. Cryptocurrency </p>



<p>This is a type of virtual currency, that is a decentralized, peer to peer network based medium of value or exchange that may be used as a substitute for fiat to buy goods or services or exchanged for fiat currency or other cryptocurrencies.  <a href="https://coinmarketcap.com/all/views/all/">Examples</a> of cryptocurrency are <a href="/blog/bitcoin-cryptocurrency-money-laundering/">Bitcoin</a>, Ethereum, Litecoin, Dogecoin, Monero, among others.  </p>



<p>Most cryptocurrencies have a blockchain which is a distributed public ledger, run by the decentralized network, containing an immutable and historical record of every transaction.  It is still difficult for a number of reasons for law enforcement to track.  </p>



<p>Cryptocurrency is stored in a virtual account called a <a href="https://www.coinbase.com/learn/crypto-basics/what-is-a-crypto-wallet">wallet</a>.  Crypto wallets are designed to store your private key, keeping your crypto accessible at all times. They also allow you to send, receive, and spend cryptocurrencies like Bitcoin and Ethereum.  Crypto wallets keep your private keys – the passwords that give you access to your cryptocurrencies – protected and accessible, allowing you to send and receive cryptocurrencies like Bitcoin and Ethereum.</p>



<p>The Financial Crimes Enforcement Network (“FinCEN”) has issued many notices discussing the various issues with cryptocurrency including recent concerns over regulatory risks related to convertible virtual currency <a href="https://www.fincen.gov/system/files/shared/FinCEN-Notice-CVCKIOSK.pdf">kiosks</a>.  This <a href="https://www.fincen.gov/system/files/advisory/2019-05-10/FinCEN%20Advisory%20CVC%20FINAL%20508.pdf">notice </a>dates back to 2019!  It’s worth a read as it describes dark net marketplaces and cryptocurrency really well.  </p>



<p>V. Recent cases in the news </p>



<p>The recent “<a href="https://manhattanda.org/d-a-bragg-announces-guilty-pleas-in-dark-web-cryptocurrency-drug-trafficking-ring-that-laundered-7-2-million/">Fire bunny</a>” case was a case that operated on the darknet from January 2019 to August 2022. It operated on multiple dark web marketplaces and described itself as an “old vendor with the best in QUALITY SPEED OF DELIVERY and STEALTH.”  In total, the defendants allegedly received nearly $8 million in Bitcoin proceeds and investigators found nearly $900,00 worth of cryptocurrency on one of the defendant’s phone. Some of the money received was laundered by converting Monero – a form of anonymized cryptocurrency that is extremely difficult to trace or monitor – into Bitcoin. The Bitcoin would then enter cryptocurrency exchange accounts controlled by the defendants and others.  At least $2.4 million in Bitcoin was sent to a foreign based cryptocurrency exchange and laundered in the form of Chinese Yuan.</p>



<p><a href="https://www.justice.gov/usao-sdny/pr/founders-samourai-wallet-cryptocurrency-mixing-service-sentenced-five-and-four-years">Samourai</a> CEO Keonne Rodriguez and Samourai CTO William Lonergan Hill were recently sentenced for knowingly transmitting over $237 million in alleged criminal proceeds, coming from, among other things, drug trafficking, darknet marketplaces, cyber-intrusions, frauds, sanctioned jurisdictions, murder-for-hire schemes, and a child pornography (“CSAM”) website.</p>



<p>It utilized a Bitcoin mixing service known as “Whirlpool,” and coordinated batches of Bitcoin exchanges between groups of Samourai users. Through this process, the original source of particular Bitcoin holdings became obscured within the blockchain’s transactional record, effectively preventing law enforcement agencies and cryptocurrency exchanges from tracing funds back to their origins. </p>



<p>The second service, called “Ricochet,” enabled users to introduce additional and unnecessary intermediate transactions—known as “hops”—between sending and receiving addresses. This feature served a similar obfuscation purpose, making it substantially more difficult for monitoring entities to establish connections between cryptocurrency transfers and potential illicit activities. The scale of these operations was considerable: from Ricochet’s launch in 2017 and Whirlpool’s inception in 2019, more than 80,000 Bitcoin—valued at over $2 billion at the time—passed through these services. Samourai collected fees for both services, estimated to have a total value of more than $6 million.</p>



<p>Finally, in <a href="https://www.justice.gov/opa/pr/law-enforcement-seize-record-amounts-illegal-drugs-firearms-and-drug-trafficking-proceeds">Operation RapTor</a>, participating law enforcement agencies in the U.S., Europe, South America, and Asia arrested 270 darknet vendors, buyers, and administrators.  Recently, as part of that large takedown, in the Southern District of New York (which is a district we are licensed to practice in) Incognito Market owner <a href="https://www.justice.gov/usao-sdny/pr/incognito-market-owner-pleads-guilty-operating-one-largest-illegal-narcotics">Rui-Siang Lin pled guilty</a> for operating an online narcotics bazaar that existed on the dark web.  It is alleged that Incognito Market sold more than $100 million of narcotics to anyone using the Tor web browser on the “dark web” or “darknet.”</p>



<p>Conaway & Strickler, PC is licensed to practice in NY, GA and CA. We can “pro hac” into any federal district in the country and have represented clients in New Hampshire, Vermont, Georgia, New Jersey, New York, California, Iowa, Texas, Tennessee, Florida, Pennsylvania, among others.  We have “first chaired” many jury trials and have represented clients charged with RICO, drug trafficking and cryptocurrency money laundering cases.  Please <a href="https://www.conawayandstrickler.com/contact-us/">contact us</a> for additional information or if you have a case you want to discuss with us.   Please see <a href="/criminal-defense-practice/federal-crimes/federal-white-collar-crimes/money-laundering/">here</a> for additional blogs on this subject.  </p>



<p></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Trends in Healthcare Fraud Enforcement]]></title>
                <link>https://www.conawayandstrickler.com/blog/trends-in-healthcare-fraud-enforcement/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/trends-in-healthcare-fraud-enforcement/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Wed, 09 Jul 2025 13:52:00 GMT</pubDate>
                
                    <category><![CDATA[Blog]]></category>
                
                    <category><![CDATA[Bribery/Kick backs]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Health Care]]></category>
                
                    <category><![CDATA[Physician License Defense]]></category>
                
                
                    <category><![CDATA[Criminal defense]]></category>
                
                    <category><![CDATA[doj]]></category>
                
                    <category><![CDATA[False Claims Act]]></category>
                
                    <category><![CDATA[federal crimes]]></category>
                
                    <category><![CDATA[health care fraud]]></category>
                
                    <category><![CDATA[healthcare professional defense]]></category>
                
                    <category><![CDATA[identity theft]]></category>
                
                    <category><![CDATA[kickbacks]]></category>
                
                    <category><![CDATA[medicaid fraud]]></category>
                
                    <category><![CDATA[Medicare Fraud]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[Professional License Defense]]></category>
                
                    <category><![CDATA[white collar lawyer]]></category>
                
                    <category><![CDATA[wire fraud]]></category>
                
                
                
                <description><![CDATA[<p>The DOJ boasted their record-breaking 2025 healthcare fraud take down in a recent press release that we discussed more generally in another blog post. This post focuses on some of the specific actions taken by the government and highlights the trends across enforcement. DME Fraud Durable Medical Equipment (DME) fraud remains a cornerstone of federal&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>The DOJ boasted their record-breaking 2025 healthcare fraud take down in a recent press release that we discussed more generally in <a href="https://www.conawayandstrickler.com/blog/largest-u-s-health-care-fraud-takedown-324-charged-14-6-b-alleged-loss/">another blog post</a>. This post focuses on some of the specific actions taken by the government and highlights the trends across enforcement.</p>



<p><strong>DME Fraud</strong></p>



<p>Durable Medical Equipment (DME) fraud remains a cornerstone of federal enforcement as seen in the recent takedown. An <a href="https://www.justice.gov/criminal/media/1405361/dl?inline">indictment in the Western District of New York</a> charges a medical doctor with billing roughly $29.6 million for fictious DME and $5.6 million for audio-only telehealth visits, which were brief or never occurred. That doctor produced and maintained false and fictitious medical records and fraudulently certified orders for braces without regard to medical necessity. The doctor now faces federal criminal charges of conspiracy to commit health care fraud, health care fraud, and false statements relating to health care matters.</p>



<p>In <a href="https://www.justice.gov/usao-edny/pr/11-defendants-indicted-multi-billion-health-care-fraud-scheme-largest-case-loss-amount">“Operation Gold Rush,”</a> prosecutors in the Eastern District of New York indicted 11 defendants, including two pharmacists, members of a transnational criminal organization based in Russia and Eastern Europe. These individuals allegedly orchestrated a massive Medicare fraud and money-laundering scheme that billed over $10.6 billion to federal health programs—making it the <em>largest case by loss amount ever charged</em> by the DOJ. The group used foreign straw owners to acquire dozens of U.S.-based DME suppliers, then submitted fraudulent claims for equipment such as urinary catheters and glucose monitors that never delivered, exploiting stolen identities and confidential patient data. To date, 19 defendants have been charged in the case, including multiple arrests abroad (Estonia) and at U.S. entry points.</p>



<p><strong>COVID-19 Testing Kickbacks</strong></p>



<p>COVID-19 testing kickback schemes typically involve health care providers or marketers billing Medicare for over-the-counter or lab-based COVID-19 tests that were unnecessary, never provided, or obtained through illicit referrals. These cases often rely on the same core tactics as DME fraud: using stolen or misused patient information, paying illegal kickbacks for referrals, and submitting inflated or false claims to federal programs. In both types of fraud, the perpetrators exploit gaps in oversight during high-demand periods—such as the pandemic or public health emergencies—to rapidly bill large amounts to Medicare, often with little or no patient interaction or verification.</p>



<p>These 2025 takedown includes <a href="https://www.justice.gov/criminal/criminal-fraud/health-care-fraud-unit/2025-national-hcf-court-documents">criminal indictments and civil settlement agreements</a> targeting this type of COVID-19 fraud. An indictment out of Illinois charged multiple individuals, including a physician, for their roles in a kickback scheme. According to the <a href="https://www.justice.gov/criminal/media/1405076/dl?inline">indictment</a>, the defendants caused laboratories in Illinois and Texas to submit fraudulent claims to the HRSA COVID-19 Uninsured Program, ultimately receiving over $293 million in payments. The physician involved allegedly misused patient information—including data from a former hospital employer—to falsely claim that uninsured individuals had submitted samples for COVID-19 testing. In reality, many of the patients had not submitted samples at all. Defendants submitted claims through Texas labs they owned, despite those labs being non-operational. The proceeds were then laundered through various financial accounts to disguise the funds’ origin. Charges include wire fraud, conspiracy to commit money laundering, HIPAA violations, and conspiracy to defraud the United States. Authorities have seized a Rolls Royce Phantom and more than $104 million in assets linked to the fraud.</p>



<p>The charges being brought by the federal government in these cases carry significant criminal penalties and collateral consequences, especially for licensed medical professionals. At Conaway & Strickler, we are highly experienced in defending against these types of claims. <a href="/contact-us/">Contact us</a> to schedule a consultation and discuss your case.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Tax Evasion]]></title>
                <link>https://www.conawayandstrickler.com/blog/tax-evasion/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/tax-evasion/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Fri, 06 Jun 2025 13:35:00 GMT</pubDate>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Federal Sentencing]]></category>
                
                    <category><![CDATA[tax evasion]]></category>
                
                    <category><![CDATA[Tax Fraud]]></category>
                
                
                    <category><![CDATA[#moneylaundering]]></category>
                
                    <category><![CDATA[#taxevasion]]></category>
                
                    <category><![CDATA[#taxfraud]]></category>
                
                    <category><![CDATA[aggravated identity theft]]></category>
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[Criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[Federal Criminal Lawyer]]></category>
                
                    <category><![CDATA[PPP Loan Fraud]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                
                
                <description><![CDATA[<p>Tax evasion is a potential criminal charge. Tax avoidance is perfectly acceptable. 26 U.S.C. § 7201 defines what is tax evasion.&nbsp; It states in relevant part that any person who willfully attempts in any manner to evade or defeat any tax imposed by this title or the payment thereof shall, in addition to other penalties&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p><a href="https://www.law.cornell.edu/wex/tax_evasion">Tax evasion</a> is a potential criminal charge. <a href="https://apps.irs.gov/app/understandingTaxes/whys/thm01/les03/media/ws_ans_thm01_les03.pdf">Tax avoidance</a> is perfectly acceptable.</p>



<p>26 U.S.C. § 7201 defines what is <a href="https://www.justice.gov/tax/file/1293361/dl">tax evasion</a>.&nbsp; It states in relevant part that any person who willfully attempts in any manner to evade or defeat any tax imposed by this title or the payment thereof shall, in addition to other penalties provided by law, be guilty of a felony and, upon conviction thereof, shall be fined not more than $100,000 ($500,000 in the case of a corporation), or imprisoned not more than 5 years, or both, together with the costs of prosecution.</p>



<p>Federal prosecutors might also add additional charges beyond tax evasion. Those charges could include conspiracy charges, under 18 U.S.C. § 371, or tax fraud under 26 U.S.C. § 7206.&nbsp;&nbsp;The United States Sentencing Commission (USSC) recently released its <a href="https://www.ussc.gov/research/quick-facts/tax-fraud">Tax Fraud Report</a> for fiscal year 2023. It states that off the 64,124 cases reported to the Commission in fiscal year 2023, 363 involved tax fraud (down 27% since FY 2019).&nbsp; It is unclear if this downward trend will continue.</p>



<p>Recently, <a href="https://www.justice.gov/usao-nj/pr/new-jersey-man-pleads-guilty-tax-evasion">a man in New Jersey plead guilty to tax evasion</a>. According to the Department of Justice, “for tax years 2015 and 2016, Matthew Tucci, of West Long Branch, NJ, filed tax returns that stated he owed more than $2 million in taxes for both years. Despite admitting that he owed those taxes, Tucci did not fully pay them when they were due. Instead, Tucci purchased real estate and engaged in a series of transactions designed to conceal his interest in those properties.</p>



<p>In 2017, the IRS sent notices to Tucci that he owed taxes, interest, and penalties for 2015 and 2016. After receiving these notices, Tucci transferred multiple properties to an entity owned by another individual, but he continued to exert control over at least two of them. Of the two properties Tucci continued to control, he sold one and refinanced the other. Tucci used the proceeds from these transactions to pay his personal expenses rather than his tax debts. In 2019, Tucci submitted documents to the IRS that falsely claimed that he had no connection to the entity that owned the 12 properties.</p>



<p>He faces a maximum penalty of five years in prison as well as a period of supervised release, restitution, and monetary penalties. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.”</p>



<p>In another case, <a href="https://www.justice.gov/opa/pr/florida-businessman-sentenced-prison-tax-evasion">a Florida businessman was sentenced to prison for tax evasion</a>.&nbsp; According to the&nbsp; Department of Justice, “David Albert Fletcher, of Deltona, Florida owned and operated furniture liquidations businesses, including Century Liquidators. For tax years 2004 through 2013, Fletcher did not timely file his federal income tax returns or pay the taxes he owed. After an audit, the IRS assessed a total of $1.7 million in taxes, interest, and penalties against him.</p>



<p>To evade collection of these taxes, Fletcher concealed his income and assets from the IRS. For example, Fletcher used nominees to hide his purchases of luxury vehicles, including Rolls Royces. Fletcher also filed false income tax returns that understated his income by several million dollars, and when an IRS special agent interviewed him, Fletcher falsely represented the amount of income he earned.</p>



<p>In addition to his prison sentence, U.S. District Judge Wendy Berger for the Middle District of Florida ordered Fletcher to serve three years of supervised release and to pay approximately $7,112,689 in restitution to the United States.”</p>



<p>Recently, <a href="/lawyers/meg-strickler/">Meg Strickler</a> was able to ensure that no tax evasion charges were filed against her client.  <a href="/contact-us/">Contact us</a> if you think you might be facing tax evasion or tax fraud charges.  We are here to help.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Department of Justice Fraud Prosecutions]]></title>
                <link>https://www.conawayandstrickler.com/blog/department-of-justice-fraud-prosecutions/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/department-of-justice-fraud-prosecutions/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Wed, 28 May 2025 13:28:00 GMT</pubDate>
                
                    <category><![CDATA[Blog]]></category>
                
                    <category><![CDATA[EIDL fraud]]></category>
                
                    <category><![CDATA[False Claims Act]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Fraud]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                    <category><![CDATA[White Collar Offenses]]></category>
                
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[EIDL fraud]]></category>
                
                    <category><![CDATA[federal crimes]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[Federal Criminal Lawyer]]></category>
                
                    <category><![CDATA[health care fraud]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                    <category><![CDATA[white collar lawyer]]></category>
                
                
                
                <description><![CDATA[<p>Fraud is a concept that has been in the criminal justice system forever.&nbsp; Google defines it as an intentional deception used to gain an unfair advantage or benefit, often involving financial gains.&nbsp; How does the Department of Justice prosecute fraud?&nbsp; Below is a non exhaustive list of charges that the DOJ can bring. The FBI&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>Fraud is a concept that has been in the criminal justice system forever.&nbsp; Google defines it as an intentional deception used to gain an unfair advantage or benefit, often involving financial gains.&nbsp; How does the Department of Justice prosecute fraud?&nbsp; Below is a non exhaustive list of charges that the DOJ can bring.</p>



<ul class="wp-block-list">
<li>Wire fraud</li>



<li>Mail fraud</li>



<li>Bank fraud</li>



<li>Tax fraud (tax evasion or false statements)</li>



<li>Healthcare fraud/FCA</li>



<li>Medicare/Medicaid fraud</li>



<li>PPP loan or COVID relief fraud</li>



<li>Securities fraud</li>



<li>Mortgage fraud</li>



<li>Immigration or visa fraud</li>



<li>Government contract fraud</li>



<li>Identity theft or benefits fraud</li>



<li>Trafficking in Counterfeit Goods or Services</li>



<li>Anti kickbacks</li>



<li>AML</li>
</ul>



<p>The FBI gives this <a href="https://www.fbi.gov/how-we-can-help-you/scams-and-safety/common-frauds-and-scams">list</a> of frauds and the DOJ publishes some of their cases <a href="https://www.justice.gov/criminal/criminal-fraud-cases">here</a>.</p>



<p>Fraud investigations can begin in a number of ways. In many cases, they are triggered by:</p>



<ul class="wp-block-list">
<li>A whistleblower or former employee</li>



<li>A suspicious activity report</li>



<li><a href="https://www.fbi.gov/how-we-can-help-you/scams-and-safety/common-frauds-and-scams">A suspicious activity report (SAR)</a> from a bank or financial institution</li>



<li>Data flagged by automated fraud detection software</li>



<li>A referral from another federal agency (e.g., IRS, SBA, USPS, HHS)</li>



<li>A civil audit or regulatory review that uncovers irregularities</li>



<li>Investigative journalism or public tips</li>



<li><a href="https://www.conawayandstrickler.com/blog/the-new-fincen-rule-for-residential-real-estate-what-it-means-for-investors-and-legal-compliance/">Problems in real estate transactions</a>.  (FINCEN’s new rule extends Anti-Money Laundering (AML) and Countering the Financing of Terrorism (CFT) obligations to investment advisers involved in these transactions)</li>
</ul>



<p>Once red flags are detected, the matter is referred to a federal investigative agency. These can include:</p>



<ul class="wp-block-list">
<li><strong>Federal Bureau of Investigation (FBI)</strong></li>



<li><strong>Internal Revenue Service – Criminal Investigation (IRS-CI)</strong></li>



<li><strong>Office of Inspector General (OIG)</strong></li>



<li><strong>Postal Inspection Service (USPIS)</strong></li>



<li><strong>Securities and Exchange Commission (SEC)</strong></li>



<li><strong>Health and Human Services (HHS)</strong></li>



<li><strong>Small Business Administration (SBA)</strong></li>
</ul>



<p>If you have been contacted by federal agents FOR ANY REASON, contact a federal criminal defense attorney immediately.&nbsp; Do not speak period.&nbsp; If you have received a grand jury subpoena, contact a federal criminal defense attorney immediately.&nbsp; If you have received a target letter, contact a federal criminal defense attorney immediately.&nbsp; If you are being audited by the IRS, SBA, HHS or another agency, contact a federal criminal defense attorney immediately. It never hurts in this&nbsp; last instance to have sage advice before the investigation goes any further.</p>



<p>At Conaway & Strickler, PC, we are here to help. <a href="/contact-us/">Contact us</a> to discuss your options.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[What to Expect in a Federal Criminal Trial]]></title>
                <link>https://www.conawayandstrickler.com/blog/what-to-expect-in-a-federal-criminal-trial/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/what-to-expect-in-a-federal-criminal-trial/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Sun, 12 Jan 2025 20:22:00 GMT</pubDate>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[Federal Criminal Lawyer]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                    <category><![CDATA[white collar lawyer]]></category>
                
                
                
                <description><![CDATA[<p>A federal criminal trial consists of several different stages.&nbsp; &nbsp;The below will analyze a ONE defendant trial.&nbsp; But, more often than not, trials can consist of multiple defendants at trial.&nbsp; This just augments the time needed for each stage. Jury Selection also known as Voir Dire Jury selection is one of the most important parts&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>A federal criminal trial consists of several different stages.&nbsp; &nbsp;The below will analyze a ONE defendant trial.&nbsp; But, more often than not, trials can consist of multiple defendants at trial.&nbsp; This just augments the time needed for each stage.</p>



<p><strong>Jury Selection also known as Voir Dire</strong></p>



<p>Jury selection is one of the most important parts of a federal criminal trial.&nbsp; It will start with about 40 potential jurors brought in. Usually we move our chairs to the other side of the table to face them. We ask general questions, then individual questions. Then, we deliberate on who to choose. Then, the court asks us to do our strikes, and then a jury is empaneled.</p>



<p>This usually takes a full day.</p>



<p><strong>Opening Statement</strong></p>



<p>After the jury has been empaneled and sworn, and loads of logistical information is given to the jurors by the judge, then&nbsp;the federal district court judge will invite the AUSA to give their opening statement. Like the jury selection, the opening statement is a critical part of a federal criminal trial.</p>



<p>The purpose of the opening statement is to allow the parties to explain to the jury what the case is about. While the parties may discuss the evidence, and explain what they believe it will show, they are not allowed to make arguments about what they think the evidence means.</p>



<p>After the AUSA has given their opening statement, which they are required to do because they have the burden of proof, the federal district court judge will ask the defense attorney if (s)he wishes to give an opening statement. The judge asks this in the form of a question because the defense attorney is not required to give an opening statement.</p>



<p>In a criminal case, the federal criminal defense lawyer may either give an opening statement, waive the opening statement, or waive the opening statement at that time, instead giving their opening statement at the close of the AUSA’s case.&nbsp; If this was a multi defendant trial, the judge usually will go in order as it is depicted on the most recent indictment.</p>



<p><strong>Direct Examination</strong> begins after we are done with the opening statements.&nbsp; The AUSA will begin calling their witnesses.&nbsp; Federal criminal defense attorney teaches <a href="https://law.gsu.edu/profile/meg-strickler/">advanced evidence</a> to LLM and JD students and GSU law and <a href="https://law.emory.edu/news-and-events/releases/2024/05/2024-05-20-keptt-kessler-eidson-trial-techniques-emory-law.html">trial techniques</a> at Emory Law.&nbsp; She literally teaches the <a href="https://www.uscourts.gov/sites/default/files/evidence_federal_rules_pamphlet_dec_1_2023.pdf">Federal Rules of Evidence</a> on what comes in at trial and how to do direct and cross examinations to law students.</p>



<p>Most direct examinations include three stages: </p>



<p>1. Introduction and background of the witness. <br>2. Laying the foundation of their relation to the case<br>3. Substantive questions about the case.</p>



<p>Like all criminal cases, in a federal criminal trial, the entire burden of proof is on the AUSA. In thinking how to proceed, an AUSA will consider all elements of the crimes alleged. This is because every crime is made up of parts, or elements. The elements are set forth in the instructions to the jury. To prevail, the AUSA must prove each and every element of the crime. Consequently, the AUSA will call witnesses that have information they believe will help persuade the jury that an element has been satisfied.</p>



<p>Because this is direct examination, the AUSA may only ask open ended questions. This is often as simple as, “what happened next?” A question used for direct examination may not suggest an answer. Therefore, it would not be appropriate for the AUSA to tell the witness what they think happened, and then ask the witness to agree. Thus, the AUSA cannot properly say “and the next thing that happened was….do you agree?” This leading question would constitute cross-examination. The party who called the witness may not “lead” the witness and may only ask direct examination questions. Such a leading question would likely prompt the objection of any of us federal criminal defense lawyers.</p>



<p>There are some exceptions to this rule, however, and some leading questions are allowed during direct examination. For example, Rule 611 of the Federal Rules of Evidence suggests that an AUSA may use cross-examination as necessary to “develop the witnesses testimony.” Leading questions may also be used with a “hostile witness.”</p>



<p>Once the witness has testified on direct, the defense lawyer will get to conduct <strong>Cross-Examination</strong> of the government’s witnesses.</p>



<p>We may ask questions of the government’s witness after the AUSA has completed their direct examination. Again, the defense attorney is not required to ask questions because they have no burden of proof. While there may be strategic reasons for waiving a witness, in some instances, we will engage in extensive and detailed questioning or cross-examination of the government witness.</p>



<p>Most cross-examination questions include the following:</p>



<p>1. We draft question to elicit any positive information from the witness. <br>2. We work to limit the damage done by the cross-examination. <br>3. We will impeach the witness where appropriate.</p>



<p>The defense attorney’s questioning can proceed by either direct or leading questions. A leading question is one that suggests the answer. This is called cross-examination. The purpose of cross-examination is to expand on the witness’s testimony, and possibly to show that the witness lacks credibility or that their fact statements are wrong or misleading.</p>



<p>Cross-examination may also be used by us&nbsp;defense attorneys to show the jury that the government witness lacks actual knowledge, or that their knowledge is limited. This is especially true for expert witnesses. To expand on the above example, a defense attorney may cross-examine a forensic computer expert by asking them questions to show that they lack credentials. A cross-examination like this might be a simple statement to the witness such as “you don’t have a computer science degree?”</p>



<p>At the end of the government’s case, when there are no more witnesses or evidence, the AUSA will tell the judge that they “rest.” This means the AUSA’s case is completed.</p>



<p>At this juncture, we will all orally ask for a&nbsp;<strong>Motion for Directed Verdict</strong></p>



<p>In a federal criminal case, a motion for directed verdict is a motion requesting the judge to acquit the defendant as a matter of law. If the motion is granted, the case is done, and the defendant is declared the winner. A motion for directed verdict is also called a judgment as a matter of law.</p>



<p>While a motion for judgment as a matter of law may be made at any time before the case is submitted to the jury, the first opportunity for a federal criminal defense attorney to make such a motion is after the government has rested its case. In the attorney’s motion, we&nbsp;will offer to the judge any applicable law and explain why, based on this law, the facts of the case entitle the defendant to be found not guilty. An AUSA may not make a motion for directed verdict after the defense has rested.</p>



<p>In a typical federal criminal trial, once the AUSA has indicated that the government has rested its case, the district court judge will instruct the bailiff to escort the jury out of the courtroom. The judge will then ask the defense attorney if they have a motion for directed verdict. If the answer is no, then the jury will be brought back into the courtroom and the case will continue. Motions for directed verdict are always made outside the presence of the jury.</p>



<p>A federal criminal defense attorney may also make a motion for directed verdict at the end of the attorney’s case; meaning, after the defense has indicated to the court that they rest. This is because, as indicated, Rule 50 of the Federal Rules of Procedure allow a motion as a matter of law to be made any time before the jury has reached its verdict.</p>



<p><strong>DEFENSE:&nbsp;</strong></p>



<p>The defendant in a criminal case enjoys a presumption of innocence. One of the benefits of this presumption is that a person accused of a crime does not have an obligation to prove their innocence to the jury. This means there is no obligation to call any witnesses or produce any evidence. However, depending on the facts and circumstances of a case, it may be in the your best interest to call witness or provide evidence.</p>



<p>So, should any of us federal criminal defense attorneys call a witnesses, just as when the AUSA calls witnesses, the attorney may only ask this witness direct examination question, and the AUSA may cross-examine this witness using leading questions.</p>



<p>One of the witnesses that is available only to the defense attorney is the defendant. In a criminal case the accused has the right to remain silent. Therefore, only the defense attorney can call the accused to the stand. Whether to call the accused as a witness is often one of the most difficult questions for a federal criminal defense attorney. However, the final answer to this question resides completely with YOU. The decision must not be made by the lawyer.</p>



<p>Once all of&nbsp;the defense attorneys call all of&nbsp;their witnesses (if any), they will indicate to the court that “the defense rests.”</p>



<p>Next, we move to The <strong>Government’s Rebuttal Witnesses</strong></p>



<p>The defense may call rebuttal witnesses after it has rested because the government has the burden of proof. Rebuttal witnesses serve largely the same function as cross-examination in that they are used as part of an attempt, in this case by the government, to disprove evidence submitted by the defendant or to disprove what the defense witnesses said. It is rare, but possible, for the federal district court judge to allow what is called surrebuttal on the part of the defense. A surrebuttal witness is called by a party to respond to the opposing party’s rebuttal.</p>



<p><strong>Closing Arguments</strong></p>



<p>Once all the witnesses have been called, both the AUSA and we, the federal defense criminal defense attorneys, have presented all their evidence, and both have indicated to the court that they have rested, the next step is closing argument.</p>



<p>According to the <a href="https://www.uscourts.gov/sites/default/files/criminal_federal_rules_pamphlet_dec_1_2023.pdf">Federal Rules of Criminal Procedure</a>, the government goes first, the defense attorneys goes next, then the government gets another opportunity to rebut what the defense attorney has argued. The government gets to go first, and last, because they have the burden of proof.</p>



<p>Unlike the opening statement, in their final arguments, the AUSA and the federal criminal defense attorney may not only summarize the evidence presented but may also forcefully argue why the jury should find in their favor.</p>



<p>It is important to note, that district court judges will typically deny us the time, at the end of the trial, to leave and prepare our closing arguments.&nbsp; It is typical to move right into closing arguments after all the evidence has been received by the jury, and any directed verdict motions made and denied.</p>



<p>The Jury is then instructed as to the applicable law through what is known as jury charges.</p>



<p>The main purpose of a jury is to resolve issues of fact. A jury will reach its verdict by taking the law as provided to them by the judge and applying to this law to the facts as they find them. In this way they will arrive at their verdict. This law is set forth in the jury instructions.</p>



<p>Judges routinely state they will rely mainly on the pattern instructions prepared by the Circuit Committee on Pattern Criminal Jury instructions.&nbsp; We certainly research notable and useful jury charges and file such if we determine the pattern charges are not sufficient.</p>



<p><strong>Deliberations and Verdict</strong></p>



<p>The final stage in a federal criminal trial will be jury deliberations and verdict. The first thing the jury will do is select, often by voting, who will be their foreperson. Pattern jury instruction for the 11th circuit provides that the foreperson’s job is to do two things: (1) guide the jury’s deliberations and (2) be a liaison for communications with the court.</p>



<p>If the jury has questions, then normally, the foreperson will write it down, give it to the court officer who then gives the question to the judge. The jury may not tell anyone outside the jury where their “vote” stands or anything else about their deliberations. There is, however, no rule that says that only the foreperson may write down questions or give them to the court officer. In this way all jurors are “equal”.</p>



<p>In a criminal case the verdict must be unanimous in favor of acquittal or conviction. In a federal criminal case, a jury will be instructed they are to continue their deliberations until they have reached a unanimous decision. Pattern Jury Instructions on this issue provide that to find a defendant guilty in a federal criminal trial, the jury must unanimously agree that the government has overcome the presumption of innocence as to every element of the crime alleged and have done so with evidence that proves the defendant is guilty beyond a reasonable doubt.</p>



<p>As set forth in another&nbsp;Pattern Jury Instruction, the jury will be told that they are not to consider punishment in their deliberations. Punishment is solely the province of the judge presiding over the case.</p>



<p>Once the jury has reached its verdict, another&nbsp;Pattern Jury Instruction provides that the foreperson mark the appropriate place for guilty or not guilty, have each member sign the form, then give it to the court officer, who will then give the form to the judge.</p>



<p>Upon learning that the jury has reached its verdict, the judge will resume the trial, making sure the defendant is in the courtroom. Finally, the verdict will be read in court.</p>



<p>Once the verdict is read, if you are found guilty, the deputies (who have moved in to position for this moment) will come forward and ask you to put your hands behind your back and take off shoe laces, jewelry, etc in order to go in to custody.&nbsp; The federal criminal defense attorney immediately asks that the defendant remain out on an appeal bond, and the judge decides on whether or not to take the defendant in to custody at this time.</p>



<p>If you are found not guilty on all charges, then the case is over and closed.</p>



<p>Should you have any further questions about federal criminal defense trials please&nbsp;<a href="https://www.conawayandstrickler.com/contact-us.html">contact us</a>.&nbsp; We are here to help.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[White Collar Crime at a Crossroads: The Implications of Kousisis on Federal Fraud]]></title>
                <link>https://www.conawayandstrickler.com/blog/white-collar-crime-at-a-crossroads-the-implications-of-kousisis-on-federal-fraud/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/white-collar-crime-at-a-crossroads-the-implications-of-kousisis-on-federal-fraud/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Mon, 16 Dec 2024 19:32:00 GMT</pubDate>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                
                    <category><![CDATA[Criminal defense]]></category>
                
                    <category><![CDATA[criminal defense attorney]]></category>
                
                    <category><![CDATA[Criminal Lawyer]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[fraud]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                    <category><![CDATA[white collar lawyer]]></category>
                
                    <category><![CDATA[wire fraud]]></category>
                
                
                
                <description><![CDATA[<p>This month, the Supreme Court heard oral arguments in Kousisis v. United States, a case that could have significant implications on the future of federal white-collar prosecutions. Specifically, the Court is considering the boundaries of federal fraud statutes in scenarios where deceptive practices are employed without causing direct financial harm to the victim. Kousisis comes&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>This month, the Supreme Court heard <a href="https://www.supremecourt.gov/oral_arguments/audio/2024/23-909" target="_blank" rel="noreferrer noopener">oral arguments</a> in <em><a href="https://www.scotusblog.com/case-files/cases/kousisis-v-united-states/" target="_blank" rel="noreferrer noopener">Kousisis v. United States</a></em>, a case that could have significant implications on the future of federal white-collar prosecutions. Specifically, the Court is considering the boundaries of federal fraud statutes in scenarios where deceptive practices are employed without causing direct financial harm to the victim.</p>



<p><em>Kousisis </em>comes before the Court after a Philadelphia-area government contractor was found guilty of fraud after it failed to comply with a contract provision intended to promote diversity. Stamatios Kousisis and Alpha Painting and Construction Co., Inc. (Alpha) secured two substantial contracts with the Pennsylvania Department of Transportation (PennDOT). These contracts mandated a certain percentage of work to be allocated to Disadvantaged Business Enterprises (DBEs). Kousisis and his company misrepresented their compliance with this requirement by using a DBE as a mere pass-through entity, thereby falsely claiming adherence to the DBE participation goals. Despite this deception, the contracted work was completed to PennDOT’s satisfaction, and no direct financial loss was incurred by the department.</p>



<p>Federal prosecutors charged Kousisis and Alpha with wire fraud, conspiracy to commit wire fraud, and making false statements. The prosecution’s argument was based on the “fraudulent inducement” theory, suggesting that the defendants obtained the contracts through deceptive promises, even though PennDOT did not suffer a financial loss. Ultimately, <a href="https://www.justice.gov/usao-edpa/pr/downingtown-man-sentenced-nearly-six-years-prison-defrauding-penndot-disadvantaged" target="_blank" rel="noreferrer noopener">Kousisis was sentenced</a> to 70 months’ imprisonment for the multi-million dollar fraud he perpetrated following a jury trial in 2018.</p>



<p>However, the defense has argued that for a fraud conviction, there must be an intent to cause economic harm, which they claim was absent in this case. During oral arguments, Justice Ketanji Brown Jackson posed the question, “Why isn’t this a classic scheme to obtain property under false pretenses?” For years in federal white-collar cases, the “scheme” itself has always been recognized as the “harm” that triggers application of the federal fraud statutes. Despite that precedent, defense argued: “If there’s no harm that occurs in those transactions, there is no fraud.”</p>



<p>It seems that conservative justices were receptive to the defendant’s argument. Chief Justice John Roberts suggested that “such crimes were better handled by state prosecutors.” Justice Samuel Alito expressed that “the court really doesn’t like the federalization of white-collar prosecutions and wants that to be done in state court and is really hostile to this whole enterprise.”</p>



<p>The outcome of <em>Kousisis v. United States</em> holds the potential to redefine the scope of federal white-collar prosecutions. A decision favoring the defendants could lead to a substantial shift in prosecutorial responsibilities from federal to state authorities. A ruling that limits federal jurisdiction in such cases would compel companies to adapt by focusing more on state-level compliance and legal frameworks. Engaging with experienced legal counsel will be essential for businesses to remain compliant and mitigate risks in this evolving legal landscape.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Gautam Adani and 5 others charged with Bribery and SEC fraud in the EDNY]]></title>
                <link>https://www.conawayandstrickler.com/blog/gautam-adani-and-5-others-charged-with-bribery-and-sec-fraud-in-the-edny/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/gautam-adani-and-5-others-charged-with-bribery-and-sec-fraud-in-the-edny/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Sat, 30 Nov 2024 17:28:00 GMT</pubDate>
                
                    <category><![CDATA[Bribery/Kick backs]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Federal Sentencing]]></category>
                
                
                    <category><![CDATA[Adani]]></category>
                
                    <category><![CDATA[Bribery]]></category>
                
                    <category><![CDATA[FCPA]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[kickbacks]]></category>
                
                
                
                <description><![CDATA[<p>A five count indictment was unsealed this past week in the United States District Court of the Eastern District of New York.  The federal court in Brooklyn charged Gautam S. Adani, Sagar R. Adani and Vneet S. Jaain, executives of an Indian renewable-energy company, with conspiracies to commit securities and wire fraud and Securities Fraud&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p><a href="https://www.justice.gov/usao-edny/media/1377806/dl?inline">A five count indictment</a> was unsealed this past week in the United States District Court of the Eastern District of New York.  The federal court in Brooklyn charged Gautam S. Adani, Sagar R. Adani and Vneet S. Jaain, executives of an Indian renewable-energy company, with conspiracies to commit securities and wire fraud and Securities Fraud for their roles in a billion dollar scheme to obtain funds from U.S. investors and global financial institutions on the basis of false and misleading statements. </p>



<p>The indictment also charges Ranjit Gupta and Rupesh Agarwal, former executives of a renewable-energy company with securities that had traded on the New York Stock Exchange, and Cyril Cabanes, Saurabh Agarwal and Deepak Malhotra, former employees of a Canadian institutional investor, with conspiracy to violate the Foreign Corrupt Practices Act in connection with a bribery scheme also perpetrated by Gautam S. Adani, Sagar R. Adani and Vneet S. Jaain, involving one of the world’s largest solar energy projects. </p>



<p>The indictment alleges that more than $250 Million in bribes were promised to secure solar enery contracts worth 2 billion dollars over two decades. </p>



<p>The SEC also unveiled a <a href="https://www.sec.gov/files/litigation/complaints/2024/comp-pr2024-181.pdf" target="_blank" rel="noreferrer noopener">complaint</a> charging Gautam Adani and Sagar Adani, executives of Adani Green Energy Ltd., and Cyril Cabanes, an executive of Azure Power Global Ltd., for conduct arising out of the same massive bribery scheme discussed in the EDNY. complaint. The SEC also alleges that the bribery scheme was orchestrated to enable the two renewable energy companies to capitalize on a multi-billion-dollar solar energy project that the companies had been awarded by the Indian government. During the alleged scheme, Adani Green raised more than $175 million from U.S. investors and Azure Power’s stock was traded on the New York Stock Exchange. </p>



<p>The indictment alleges, among other things:</p>



<ol class="wp-block-list">
<li>There was a FBI raid in March 2023.   Gautam Adani failed to inform SEBI and the Indian stock exchange of this FBI raid and the DOJ investigation, which he was required to do. But he also thereafter lied when he denied that either had happened.</li>



<li>False statements in the annual reports. Guatam Adani emailed himself photographs of the search warrant of his nephew in March 2023.  He will be unable to say he was not aware of being investigation at that time.</li>



<li>False statements to US investors</li>



<li>When the search was executed on the nephew, Sagar Adani, electronic devices were seized.  This will be a treasure trove of data for the government to use in their prosecution.  The government cites “bribe notes” that Sagar kept on his phone to track specific details of bribes offered and promised to government officials.  It may very well be possible as this case proceeds that a superceding indictment is forthcoming and both Gautam and Sagar Adani will be charged with FCPA violations as well.</li>



<li>Co-Conspirator #1 and #2 may have cooperated with the government, and thus they may help corroborate what “numero uno” and other code names meant when texting amongst themselves about the conspiracy.</li>
</ol>



<p>The defendants do not live in the United States, and it appears only one has dual citizenship in the US.  So, should any of these defendants enter US soil, they will be immediately detained and transferred to the EDNY for processing. Both Gautam and Sagar Adani have not been arrested yet and US prosecutors would need to ask the Indian government to extradite them under the terms of the countries’ extradition treaty.  India would need to consider whether the crime he was charged with in the US is also a crime in India, whether the charges are politically motivated or whether he could face inhumane treatment in the US.  As <a href="https://www.conawayandstrickler.com/meg-strickler.html">Meg Strickler</a> stated in <a href="https://www.thequint.com/explainers/gautam-adani-us-indictment-conspiracy-to-bribe-what-lies-ahead-deep-dive">The Quint</a>, there probably will be a superceding indictment that will include more charges.</p>



<p>Conaway & Strickler, PC handles many bribery cases.  <a href="https://www.conawayandstrickler.com/contact-us.html">Contact us</a> if you need more information or are facing such charges.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[P2P Applications and Child Pornography]]></title>
                <link>https://www.conawayandstrickler.com/blog/p2p-applications-and-child-pornography/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/p2p-applications-and-child-pornography/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Sat, 02 Nov 2024 14:16:00 GMT</pubDate>
                
                    <category><![CDATA[child pornography]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Sex Crimes]]></category>
                
                
                    <category><![CDATA[CSAM]]></category>
                
                    <category><![CDATA[federal child pornography charges]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                
                
                <description><![CDATA[<p>As we explained in our prior post about federal child pornography laws, the consequences of a child pornography or CSAM (“Child Sexual Abuse Material”) conviction are severe and life-altering. And the collateral consequence of being on the sex offender registry can be devastating. Early on, Conaway & Strickler defended cases that stemmed from activity on&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>As we explained in our prior post about <a href="https://www.conawayandstrickler.com/blog/federal-child-pornography-laws-in-a-nutshell/">federal child pornography laws</a>, the consequences of a child pornography or CSAM (“Child Sexual Abuse Material”) conviction are severe and life-altering. And the collateral consequence of being on the sex offender registry can be devastating.</p>



<p>Early on, Conaway & Strickler defended cases that stemmed from activity on classic peer-to-peer applications like Limewire.&nbsp; These type of networks were simply software applications that provided a central hub for various computers to connect.&nbsp; Napster, for example, was a peer-to-peer (P2P) file-sharing service that allowed users to share and download music files from other users’ computers.&nbsp; These types of programs were utilized to distribute music, movies and child pornography.&nbsp; Law enforcement was able to track those cases more easily.</p>



<p>Today, however, the government has also become well versed in programs like <a href="https://www.bittorrent.com/">BitTorrent</a>, Limewire and <a href="https://www.devx.com/terms/edonkey-network/">e-Donkey</a>, among others.&nbsp; When a hard drive or device is analyzed by the government, they now will produce a report detailing their forensic examination.&nbsp; They will detail all of the evidence found on the device showing evidence of P2P Networking, search history, bookmarks&nbsp; and they even cite images or image fragments found in cache locations.&nbsp; Here is a recent example of a <a href="https://www.justice.gov/usao-vi/pr/st-croix-man-who-downloaded-images-bittorrent-network-pleads-guilty-possession-child">federal criminal prosecution</a> of someone who downloaded images from the BitTorrent Network.</p>



<p>The P2P software programs allow the P2P networks to break large files into smaller segments that are then shared independently. The original purpose of this was to only optimize the download process by balancing the load among multiple users but it also increased the overall download speeds, as users can simultaneously download multiple segments from different sources.&nbsp; BUT, in early prosecutions of federal child pornography cases using P2P applications, the government was unable to show the actual images on the devices anymore.&nbsp; &nbsp;But, as described above, it is rare for a sophisticated user to have any actual images of CSAM on their devices.&nbsp; So, today, the government’s forensic report will draws a picture of all activities on the device to show that the user <em>intentionally</em> downloaded child pornography.&nbsp; We, at Conaway & Strickler, are well versed on the technicalities of defending a complex case like this and have years of experience of defending federal child pornography cases nationwide.&nbsp; We also have a variety of top notch experts ready to assist us to mirror images these devices in order to do our forensics to mount the proper defense to any federal criminal charges lodged.</p>



<p><a href="https://www.conawayandstrickler.com/contact-us.html">Contact us</a> anytime if you have any questions. We are here to help.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Paycheck Protection Program Enforcement Continues]]></title>
                <link>https://www.conawayandstrickler.com/blog/paycheck-protection-program-enforcement-continues/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/paycheck-protection-program-enforcement-continues/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Fri, 25 Oct 2024 13:36:00 GMT</pubDate>
                
                    <category><![CDATA[EIDL fraud]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Federal Offenses]]></category>
                
                    <category><![CDATA[Fraud]]></category>
                
                    <category><![CDATA[PPP loan fraud]]></category>
                
                    <category><![CDATA[White Collar Offenses]]></category>
                
                
                    <category><![CDATA[bank fraud]]></category>
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[EIDL fraud]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[IRS]]></category>
                
                    <category><![CDATA[PPP Loan Fraud]]></category>
                
                    <category><![CDATA[SBA-OIG]]></category>
                
                
                
                <description><![CDATA[<p>As discussed in our prior blogs, the Department of Justice has already&nbsp;been&nbsp;prosecuting&nbsp;cases of larger-scale, outright PPP fraud.&nbsp; In August 2022, President Biden signed two bills into law that give the Department of Justice and other federal agencies more time to investigate and prosecute Paycheck Protection Program (“PPP”) and COVID-19 Economic Injury Disaster Loan (“EIDL”) cases.&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>As discussed in our prior <a href="https://www.conawayandstrickler.com/blog/ppp-loan-fraud-prosecutions-continue/">blogs</a>, the Department of Justice has already&nbsp;been&nbsp;prosecuting&nbsp;cases of <a href="https://wsvn.com/news/special-reports/the-great-scam-federal-prosecutors-take-us-inside-south-floridas-most-shocking-cases-of-covid-relief-fraud/">larger-scale, outright PPP fraud</a>.&nbsp; In August 2022, President Biden signed two bills into law that give the Department of Justice and other federal agencies more time to investigate and prosecute Paycheck Protection Program (“PPP”) and COVID-19 Economic Injury Disaster Loan (“EIDL”) cases. H.R. 7352, the “PPP and Bank Fraud Enforcement Harmonization Act of 2022” and H.R. 7334, the “COVID-19 EIDL Fraud Statute of Limitations Act of 2022” extend the statute of limitations for fraud charges involving PPP and EIDL fraud to <strong>ten years.&nbsp;&nbsp;</strong>This has allowed the government more time to prosecute these cases.&nbsp; And they continue to do so with increasing frequency.&nbsp; Recently the government was involved in prosecuting this <a href="https://www.irs.gov/compliance/criminal-investigation/over-20-defendants-sentenced-to-prison-in-multimillion-dollar-national-covid-19-fraud-scheme">covid-19 related schemes</a>,</p>



<p>In investigating PPP loan fraud, the government first looks at the application itself.&nbsp; How many employees does the company have?&nbsp; Does that number match their payroll tax filings?&nbsp; Are the <a href="https://www.irs.gov/forms-pubs/about-form-941">941</a>‘s the same as what is on file at the IRS?&nbsp; Has the owner(s) been convicted of or pled guilty to a felony with the past 5 years?&nbsp; Do the bank statements submitted on the PPP loan application match the actual bank statements? Are there business expenses on the bank statements?&nbsp; Was the bank account in a business checking account? When was the entity created?&nbsp; Did the company apply for more than one loan?&nbsp; Does the individual owner have multiple entities and apply for multiple loans?&nbsp; Any inaccurate statements on the application can result in a charge under Under <a href="https://www.law.cornell.edu/uscode/text/18/1344">18 U.S.C. § 1344</a> (bank fraud) – making false statements to an FDIC-insured financial institution, or making false statements to the SBA.&nbsp; In addition, the CARES Act also has requirements for how companies <em>use</em>, and account for the use of, PPP loan funds.&nbsp; Some of the more outrageous PPP loan fraud prosecutions have resulted due to individuals buying&nbsp;<a href="https://krdo.com/news/2021/12/08/man-sentenced-for-162k-in-ppp-fraud-used-money-to-buy-range-rover/">Range Rovers</a>, <a href="https://www.justice.gov/opa/pr/florida-man-sentenced-after-fraudulently-obtaining-39-million-ppp-loans">Lamborghinis</a> and&nbsp;<a href="https://www.cnn.com/2021/11/30/us/covid-loan-texas-man-sentenced-fraud-trnd/index.html">rolex watches</a> with PPP loan proeeeds, i.e. converting PPP loan funds for personal use.&nbsp; Also, when seeking forgiveness for loans, companies must be very careful in what they submit.&nbsp; Any false documentation submitted can result in prosecution.</p>



<p>So, should the government be inquiring about your PPP loan(s) or EIDL loans or any disaster relief funds, it is important to&nbsp;<a href="https://www.conawayandstrickler.com/contact-us.html">contact us</a> immediately.&nbsp; Being evasive or being unable to produce documentation of PPP Compliance will only increase issues that you will be facing.&nbsp; Allow Conaway & Strickler, PC to help you with expert advice from experienced federal counsel. We are very familiar with the federal criminal investigative process with the SBA-OIG, IRS and the DOJ.</p>



<p>Conaway & Strickler, PC handles PPP loans nationwide. <a href="https://profiles.superlawyers.com/georgia/atlanta/lawyer/meg-strickler/7f97386c-4637-4dc1-9ed0-0d95f41dda56.html">Meg Strickler</a> has 25 plus years experience fighting federal criminal cases in the district courts across the country.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Criminal Consequences for Unruly Airline Passengers: The FAA’s Push for Prosecution]]></title>
                <link>https://www.conawayandstrickler.com/blog/criminal-consequences-for-unruly-airline-passengers-the-faas-push-for-prosecution/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/criminal-consequences-for-unruly-airline-passengers-the-faas-push-for-prosecution/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Sat, 05 Oct 2024 17:45:04 GMT</pubDate>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Sex Crimes]]></category>
                
                
                    <category><![CDATA[Criminal defense]]></category>
                
                    <category><![CDATA[FAA complaint]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[violent crimes]]></category>
                
                    <category><![CDATA[white collar lawyer]]></category>
                
                    <category><![CDATA[zero tolerance]]></category>
                
                
                
                <description><![CDATA[<p>In recent years, unruly behavior on flights has become a growing concern, prompting the Federal Aviation Administration (FAA) to escalate its enforcement efforts. Since 2021, the FAA has referred over 310 cases of severe incidents to the FBI for criminal prosecution. These cases involve dangerous acts like physical assaults, attempts to breach the cockpit, and&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>In recent years, unruly behavior on flights has become a growing concern, prompting the Federal Aviation Administration (FAA) to escalate its enforcement efforts. Since 2021, the FAA has referred over 310 cases of severe incidents to the FBI for criminal prosecution. These cases involve dangerous acts like physical assaults, attempts to breach the cockpit, and sexual misconduct, all of which have serious legal consequences.</p>


<p>The <strong>FAA’s zero-tolerance policy</strong>, implemented in 2021, marked a shift from warnings to immediate enforcement. With incidents like physical assaults on passengers and crew members, the FAA has consistently referred the most egregious cases to the FBI. The FAA can impose civil penalties up to $37,000 per violation, but when these cases are referred for criminal prosecution, offenders face much harsher outcomes.</p>


<p><a href="https://www.faa.gov/newsroom/faa-refers-more-unruly-passenger-cases-fbi" rel="noopener noreferrer" target="_blank">In 2023</a>, over 1,240 incidents of unruly passenger behavior were reported. Of those, 43 cases were referred to the FBI for criminal prosecution due to their severity. These cases often involve physical altercations or inappropriate behavior that pose a threat to the safety of everyone on board. The FAA’s clear stance on holding individuals accountable shows that passengers who engage in such behavior will face serious repercussions.You can read more about the FAA’s referral process and efforts in their <a href="https://www.faa.gov/newsroom/faa-refers-more-unruly-passenger-cases-fbi-0" rel="noopener noreferrer" target="_blank">official statement</a> and in further detail from <a href="https://www.faa.gov/unruly" rel="noopener noreferrer" target="_blank">FAA’s unruly passenger policy page</a>.</p>


<p>Once referred to the FBI, many unruly passenger cases lead to federal charges, especially when sexual misconduct or violence is involved. These cases often involve unwanted touching, and allegations of individuals under the influence of alcohol or medication. Federal prison time and long-term consequences await those convicted of these serious crimes. For more information about how the FBI and federal prosecutors handle these cases, you can review <a href="https://www.justice.gov/usao-wdwa/pr/federal-prosecutors-fbi-and-port-seattle-detail-disturbing-increase-sexual-assaults" rel="noopener noreferrer" target="_blank">this detailed account from the Department of Justice</a>.</p>


<p>Beyond hefty fines, individuals charged with federal crimes for unruly behavior aboard a flight face significant prison time. Sexual misconduct in particular is treated severely, with offenders often sentenced to years in federal prison. The FAA and FBI are clear in their mission: passengers who pose a threat will be prosecuted to the fullest extent of the law.</p>


<p>For those facing such charges, it is crucial to seek legal representation immediately. At our firm, we are experienced in defending against federal charges related to in-flight incidents and can provide the guidance needed to navigate these complex cases. <a href="/contact-us/">Contact us</a> today for a consultation.</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[The New FINCEN Rule for Residential Real Estate: What it Means for Investors and Legal Compliance]]></title>
                <link>https://www.conawayandstrickler.com/blog/the-new-fincen-rule-for-residential-real-estate-what-it-means-for-investors-and-legal-compliance/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/the-new-fincen-rule-for-residential-real-estate-what-it-means-for-investors-and-legal-compliance/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Wed, 18 Sep 2024 13:24:34 GMT</pubDate>
                
                    <category><![CDATA[Blog]]></category>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Fraud]]></category>
                
                    <category><![CDATA[Identity Theft]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                
                    <category><![CDATA[Criminal Lawyer]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[real estate]]></category>
                
                    <category><![CDATA[white collar lawyer]]></category>
                
                    <category><![CDATA[wire fraud]]></category>
                
                
                
                <description><![CDATA[<p>Recently, the Financial Crimes Enforcement Network (FINCEN) issued a pivotal final rule aimed at tightening regulatory oversight in the residential real estate sector. This change marks a significant step towards enhancing transparency in an industry that has, until now, been relatively free from such regulatory scrutiny. Generally, the new rule requires certain real estate professionals&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>Recently, the <a href="https://www.fincen.gov/news/news-releases/fincen-issues-final-rules-safeguard-residential-real-estate-investment-adviser" rel="noopener noreferrer" target="_blank">Financial Crimes Enforcement Network (FINCEN) issued a pivotal final rule</a> aimed at tightening regulatory oversight in the residential real estate sector. This change marks a significant step towards enhancing transparency in an industry that has, until now, been relatively free from such regulatory scrutiny. Generally, the new rule requires certain real estate professionals to report information about non-financed transfers of residential real estate to legal entities or trusts.</p>


<p><strong>What Is the New FINCEN Rule?</strong></p>


<p>FINCEN’s new rule extends Anti-Money Laundering (AML) and Countering the Financing of Terrorism (CFT) obligations to investment advisers involved in residential real estate transactions. The aim is to prevent illicit financial activities in an industry known for large cash transactions that can serve as vehicles for <a href="https://www.law.cornell.edu/uscode/text/18/1956" rel="noopener noreferrer" target="_blank">money laundering</a>, <a href="https://www.law.cornell.edu/uscode/text/18/1343" rel="noopener noreferrer" target="_blank">fraud</a>, and other financial crimes.</p>


<p>Previously, residential real estate investments, particularly those conducted through shell companies or trusts, offered a level of anonymity that bad actors could exploit. This new rule eliminates some of that opacity by requiring reporting and disclosure obligations for entities and individuals involved in these transactions.</p>


<p>The final rule imposes several key requirements:</p>


<ol class="wp-block-list">
<li><strong>Increased Reporting and Disclosure:</strong> Individuals and firms engaged in residential real estate investments must now report detailed information regarding the identity of buyers and sellers, the source of funds, and other financial details. This includes both U.S. and foreign investors, adding an extra layer of scrutiny for cross-border transactions.</li>
<li><strong>Enhanced Due Diligence:</strong> Investment advisers and firms must now conduct thorough due diligence on clients and the source of their funds, ensuring that they comply with AML/CFT standards. This may involve verifying identities, examining financial records, and reporting suspicious activities to FINCEN.</li>
<li><strong>Penalties for Non-Compliance:</strong> The rule includes penalties for individuals and firms that fail to meet the new AML/CFT obligations. Non-compliance could lead to fines, sanctions, or even criminal charges depending on the severity of the infraction.</li>
</ol>


<p>For real estate investors, the new FINCEN rule adds a new layer of legal and financial oversight. While the intention is to weed out bad actors, the burden of proof is now on investors and their advisers to ensure compliance. This means that investors will need to be more transparent in their transactions, particularly regarding the source of their funds. Without proof of the funds coming from a legitimate source, criminal charges of money laundering and fraud can result.</p>


<p>As the FINCEN rule takes effect, compliance will be a critical concern for many in the real estate industry. Our firm is experienced in navigating the complex landscape of financial regulations, including defending clients against charges of money laundering and related financial crimes. We can help you understand your obligations under the new FINCEN rule and defend against any accusations of non-compliance or criminal misconduct.</p>


<p>This new regulation represents a major shift for the residential real estate industry. Whether you’re an investor or an adviser, staying compliant is no longer optional—it’s the law. The new FINCEN rule is set to take effect on December 1, 2025. If you have questions about the new rule and how it affects your business, <a href="/contact-us/">contact us</a>today for a consultation.</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[When Can Law Enforcement Search my Cell Phone?]]></title>
                <link>https://www.conawayandstrickler.com/blog/when-can-law-enforcement-search-my-cell-phone/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/when-can-law-enforcement-search-my-cell-phone/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Sat, 14 Sep 2024 14:38:34 GMT</pubDate>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Federal Offenses]]></category>
                
                
                    <category><![CDATA[aggravated identity theft]]></category>
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[Criminal defense]]></category>
                
                    <category><![CDATA[drug trafficking]]></category>
                
                    <category><![CDATA[federal crimes]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[wire fraud]]></category>
                
                
                
                <description><![CDATA[<p>Cell phones are everywhere today and thus play a significant role in criminal investigations. What reports are generated from my devices? Cellebrite reports provide information about phone calls and text messages; but now it also provides a report on the data stored on these devices such as voicemails, images, and browsing history. From GPS location&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>Cell phones are everywhere today and thus play a significant role in criminal investigations.</p>


<p>
<strong>What reports are generated from my devices? </strong>
</p>


<p><a href="https://cellebrite.com/en/reader/" rel="noopener noreferrer" target="_blank">Cellebrite</a> reports provide information about phone calls and text messages; but now it also provides a report on the data stored on these devices such as voicemails, images, and browsing history.  From GPS location data to social media activity, cell phones can provide a treasure trove for law enforcement agencies to use to build their cases.</p>


<p>
<strong>What protections do I have to prevent law enforcement from searching my devices?</strong>
</p>


<p>Laws on the admission and use of this evidence in court are still evolving.  In the Georgia Supreme Court case <a href="https://caselaw.findlaw.com/court/ga-supreme-court/2189282.html" rel="noopener noreferrer" target="_blank">State v. Wilson,</a> the court ruled search warrants for cell phone contents must <em>specify</em> the items being sought. This is to prevent a general search of a person’s belongings, which is prohibited by the Fourth Amendment.</p>


<p>
<strong>Do I have the same legal rights at the border that I would elsewhere in the United </strong><strong>States?</strong></p>


<p>The Supreme Court ruled that the police must get a warrant before searching someone’s cell phone in <a href="https://supreme.justia.com/cases/federal/us/573/373/" rel="noopener noreferrer" target="_blank">Riley v. California</a>. The Supreme Court held that a warrant is generally required before a search of a cell phone seized incident to arrest.  BUT, at the border, there is less protection.  According to <a href="https://www.cbp.gov/sites/default/files/documents/inspectionelectronic-devices-tearsheet.pdf)" rel="noopener noreferrer" target="_blank">US Customs and Border Protection</a> a person may be chosen for inspection for many different random reasons and thus there is less protections when crossing the border in or out of the US.  What this means – you can be pulled for a secondary inspection and all of your devices can be searched without a warrant.  They can also get an image from the hard drive of these devices and / or seize the devices at the border.</p>


<p><strong>What do I do if I am asked to give my cell phone to law enforcement?</strong></p>


<p>If you know your rights, you can comply when necessary.  So, for example, if you are traveling internationally – do not travel with
devices that you would not want searched.  Furthermore, if you are driving and pulled over with drugs or a high amount of currency in your car, etc, your cell phone and / or other devices WILL be seized and analyzed.</p>


<p>And, please remember <em>anything</em> uploaded to the cloud is fair game for law enforcement.   That’s a broad statement – but when you signed up for Instagram, Whats App, Google, TikTok, Facebook, Signal, Twitter/X, etc, you signed away any privacy rights.  Those companies are fast to comply with law enforcement subpoenas giving whatever you posted/uploaded immediately to them.</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Suspicious Activity Reports (SARs): What Triggers Them and How to Respond]]></title>
                <link>https://www.conawayandstrickler.com/blog/suspicious-activity-reports-sars-what-triggers-them-and-how-to-respond/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/suspicious-activity-reports-sars-what-triggers-them-and-how-to-respond/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Fri, 13 Sep 2024 16:36:56 GMT</pubDate>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Fraud]]></category>
                
                    <category><![CDATA[Identity Theft]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[PPP loan fraud]]></category>
                
                    <category><![CDATA[Theft Crimes]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                
                    <category><![CDATA[bank fraud]]></category>
                
                    <category><![CDATA[Criminal defense]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[fraud]]></category>
                
                    <category><![CDATA[identity theft]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[PPP Loan Fraud]]></category>
                
                    <category><![CDATA[wire fraud]]></category>
                
                
                
                <description><![CDATA[<p>In the world of banking and finance, the term “Suspicious Activity Report” (SAR) may sound intimidating—especially if you’ve been notified that a bank has filed one concerning your transactions. For individuals and businesses alike, it’s essential to understand what a SAR is, what activities can trigger these reports, and the potential legal consequences that may&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>In the world of banking and finance, the term “Suspicious Activity Report” (SAR) may sound intimidating—especially if you’ve been notified that a bank has filed one concerning your transactions. For individuals and businesses alike, it’s essential to understand what a SAR is, what activities can trigger these reports, and the potential legal consequences that may follow.</p>


<p><strong>What is a Suspicious Activity Report (SAR)?</strong></p>


<p>A Suspicious Activity Report (SAR) is a document that financial institutions are legally required to file with the <a href="https://www.fincen.gov/what-we-do" rel="noopener noreferrer" target="_blank">Financial Crimes Enforcement Network</a> (FinCEN) when they detect potentially suspicious behavior involving financial transactions. Once filed, these reports are sent to FinCEN, a division of the U.S. Department of the Treasury, which shares the information with law enforcement agencies for further investigation if necessary.</p>


<p><strong>Why Do Banks File SARs?</strong></p>


<p>Banks must comply with a variety of regulations designed to prevent financial crimes. One of the core elements of these regulations is monitoring customer transactions for anything that might indicate illegal or suspicious activity. A SAR is typically filed when a bank suspects that a transaction, or series of transactions, might involve:</p>


<ul class="wp-block-list">
<li><strong>Money laundering</strong>: Attempting to disguise the origins of illegally obtained money by passing it through a legitimate banking system.</li>
<li><strong>Fraud</strong>: Including wire fraud, identity theft, and other deceptive financial activities.</li>
<li><strong>Structuring</strong>: Breaking down large sums of money into smaller deposits to avoid triggering reporting requirements (also known as “smurfing”).</li>
<li><strong>Unexplained large transactions</strong>: Transactions that don’t align with an individual’s or business’s typical activity or appear inconsistent with known financial patterns.</li>
</ul>


<p><strong>Common Triggers for SARs</strong></p>


<p>Financial institutions are trained to spot red flags, and there are a number of scenarios that could trigger a SAR filing. Here are some of the most common:</p>


<ol class="wp-block-list">
<li><strong>Unusually Large Transactions</strong>: If an individual or business is suddenly moving unusually large amounts of money, especially in cash, this can raise red flags. Large deposits, withdrawals, or transfers that don’t align with normal activity patterns may prompt the bank to investigate further.</li>
<li><strong>Frequent Cash Deposits Below $10,000</strong>: To avoid the $10,000 threshold that triggers an automatic Currency Transaction Report (CTR), some individuals break down larger sums into smaller deposits (a practice called structuring). If a bank detects this behavior, it will likely file a SAR.</li>
<li><strong>Wire Transfers to High-Risk Countries</strong>: International wire transfers to or from countries that are known for terrorist activity, money laundering, or lacking robust financial regulations may result in a SAR filing.</li>
<li><strong>Multiple Accounts Under One Name</strong>: Using multiple accounts to shuffle money back and forth—especially if the accounts seem unrelated to legitimate business or personal activities—can appear suspicious.</li>
<li><strong>Account Activity Inconsistent with Known Business Practices</strong>: If a company typically processes small, regular transactions and suddenly starts handling large, irregular amounts, it might trigger suspicion. Likewise, if a personal account shows business-level activity, this could raise alarms.</li>
<li><strong>Use of Shell Companies</strong>: Banks scrutinize accounts associated with shell companies that lack a clear purpose or business activity, as they are often used in money laundering schemes.</li>
<li><strong>Unexplained Source of Funds</strong>: If the origin of deposited funds is unclear, or if large amounts of money are transferred without any legitimate explanation, the bank may file a SAR.</li>
</ol>


<p><strong>The Impact of a SAR Filing</strong></p>


<p>When a bank files a SAR, it is confidential. The individual or business subject to the report is not directly informed; However, the bank may decide to take action based on its findings, which can include:</p>


<ul class="wp-block-list">
<li><strong>Account closures</strong>: If the bank believes the activity is risky or potentially illegal, it may close your account or freeze any available funds.</li>
<li><strong>Increased monitoring</strong>: Your account may come under closer scrutiny, with more restrictions placed on transactions.</li>
<li><strong>Law enforcement involvement</strong>: If the behavior in question warrants it, the SAR could lead to a broader investigation by federal or state law enforcement agencies.</li>
</ul>


<p><strong>What to Do if You Believe a SAR Has Been Filed Against You</strong></p>


<p>While you won’t be directly informed if a SAR has been filed, you may suspect something is amiss if your bank account is frozen, closed, or you’re contacted by law enforcement regarding your financial activity. If you find yourself in this situation, here are some steps to take:</p>


<ol class="wp-block-list">
<li><strong>Seek Legal Counsel</strong>: The most important thing you can do is consult with an experienced criminal defense attorney. A SAR filing could be the beginning of a serious investigation, and you’ll want legal guidance to protect your rights and interests.</li>
<li><strong>Gather Financial Records</strong>: Be prepared to provide your attorney with all relevant financial records. This can help explain the nature of your transactions and demonstrate that they are legitimate.</li>
<li><strong>Do Not Attempt to Explain Yourself to the Bank</strong>: Anything you say to the bank could be misinterpreted or used against you in a later investigation. Your attorney will be able to navigate these communications appropriately.</li>
</ol>


<p>A Suspicious Activity Report can be a precursor to serious legal trouble, but it’s important to remember that it is not an accusation of a crime. Banks are required to report anything that appears suspicious, even if the behavior is ultimately lawful. If you find yourself facing consequences related to an SAR filing, don’t wait—<a href="/contact-us/">contact us</a> today for a consultation and take control of your situation before it escalates. If you are facing financial crime allegations, our skilled team of criminal defense attorneys is here to help.</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[The Truth Behind the TikTok “Free Money Hack” Trend: What You Need to Know]]></title>
                <link>https://www.conawayandstrickler.com/blog/the-truth-behind-the-tiktok-free-money-hack-trend-what-you-need-to-know/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/the-truth-behind-the-tiktok-free-money-hack-trend-what-you-need-to-know/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Fri, 13 Sep 2024 16:06:45 GMT</pubDate>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Fraud]]></category>
                
                    <category><![CDATA[Identity Theft]]></category>
                
                    <category><![CDATA[Theft Crimes]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                
                    <category><![CDATA[bank fraud]]></category>
                
                    <category><![CDATA[check fraud]]></category>
                
                    <category><![CDATA[Criminal defense]]></category>
                
                    <category><![CDATA[Criminal Lawyer]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[identity theft]]></category>
                
                    <category><![CDATA[mail fraud]]></category>
                
                    <category><![CDATA[theft by deception]]></category>
                
                    <category><![CDATA[wire fraud]]></category>
                
                
                
                <description><![CDATA[<p>In the age of social media, viral trends come and go at lightning speed. Some are harmless and fun, but others can lead people into serious legal trouble. One of the most alarming trends recently circulating on TikTok is the so-called “free money hack.” This trend falsely promises easy money through exploiting banking loopholes, but&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>In the age of social media, viral trends come and go at lightning speed. Some are harmless and fun, but others can lead people into serious legal trouble. One of the most alarming trends recently circulating on TikTok is the so-called “<a href="https://www.nbcnews.com/business/consumer/chase-bank-says-aware-viral-glitch-inviting-people-commit-check-fraud-rcna169339" rel="noopener noreferrer" target="_blank">free money hack</a>.” This trend falsely promises easy money through exploiting banking loopholes, but what many don’t realize is that following such advice could land you in serious legal trouble.</p>


<p><strong>What is the “Free Money Hack”?</strong></p>


<p>The trend usually involves TikTok users claiming they have found ways to manipulate the financial system, offering viewers methods to “hack” or exploit bank accounts, cash apps, or credit systems to obtain free money. Some of these schemes involve:</p>


<ul class="wp-block-list">
<li><strong>Overdraft exploits</strong>: Encouraging users to overdraw bank accounts and then supposedly avoid the consequences.</li>
<li><strong>Fake check schemes</strong>: Depositing fraudulent checks into accounts and withdrawing the funds before the bank detects the fraud.</li>
<li><strong>Refund fraud</strong>: Filing fake claims with companies to get refunds for purchases that were never made.</li>
</ul>


<p>These tactics promise fast cash with minimal effort, but what they really deliver is financial and legal disaster.</p>


<p><strong>Why Following the Trend is Illegal</strong></p>


<p>What these TikTok videos don’t explain is the serious legal consequences of participating in such schemes. Fraud, theft, and exploiting banking systems for personal gain are criminal acts, regardless of how trendy or harmless they may seem in a 60-second clip.</p>


<p><strong>Here are some common legal charges that can result from participating in these activities:</strong></p>


<ol class="wp-block-list">
<li><strong>Bank Fraud</strong>: This is a federal crime that can result in hefty fines and imprisonment. Intentionally defrauding a financial institution is illegal under U.S. law, and following these TikTok hacks can quickly escalate into a federal investigation.</li>
<li><strong>Wire Fraud</strong>: Many of these hacks involve electronic transfers or communications, which falls under wire fraud. This also carries severe penalties, including long prison sentences.</li>
<li><strong>Check Fraud</strong>: Depositing fake or altered checks with the intent to withdraw funds is considered check fraud. Even if you think you’re being clever by pulling out the money before the bank catches on, it’s still a criminal act.</li>
<li><strong>Identity Theft</strong>: Some of these schemes suggest using fake names or other people’s banking details, which could lead to identity theft charges. This is a serious offense with strict penalties.</li>
<li><strong>Theft by Deception</strong>: If you knowingly mislead a financial institution or another individual to gain money or assets, this is classified as theft by deception. Penalties can include jail time and significant fines.</li>
</ol>


<p>Participating in these “hacks” isn’t just risky from a financial perspective—it’s a direct pathway to legal repercussions that can follow you for the rest of your life. Depending on the scale of the fraud or theft, you could face:</p>


<ul class="wp-block-list">
<li><strong>Criminal Charges</strong>: These could range from misdemeanors to felonies, depending on the amount of money involved and the nature of the crime.</li>
<li><strong>Restitution</strong>: If convicted, you could be required to pay back any money that was wrongfully obtained, along with additional penalties.</li>
<li><strong>Permanent Criminal Record</strong>: A fraud conviction can make it difficult to secure future employment, housing, or loans, and can damage your reputation permanently.</li>
</ul>


<p><strong> </strong>The allure of easy money is tempting, but it’s important to remember that many social media trends, like the “free money hack,” come with significant risks. Engaging in these activities can lead to criminal charges that affect your financial future and personal freedom. Before following any advice from TikTok or other social media platforms, it’s vital to understand the full legal ramifications.</p>


<p>
If you’ve been accused of fraud or any criminal activity related to online schemes, our experienced legal team is here to help. Don’t hesitate to <a href="/contact-us/">contact us</a> today for a free consultation. The legal system can be complex and unforgiving, but with the right defense, you can navigate the process and work toward the best possible outcome</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Unregistered Securities and Allegations of Operating a Ponzi scheme]]></title>
                <link>https://www.conawayandstrickler.com/blog/unregistered-securities-and-allegations-of-operating-a-ponzi-scheme/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/unregistered-securities-and-allegations-of-operating-a-ponzi-scheme/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Sat, 24 Aug 2024 14:53:44 GMT</pubDate>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[SEC]]></category>
                
                    <category><![CDATA[SEC complaint]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                
                    <category><![CDATA[insider trading]]></category>
                
                    <category><![CDATA[SEC Complaint]]></category>
                
                    <category><![CDATA[SEC litigation]]></category>
                
                    <category><![CDATA[securities violations]]></category>
                
                
                
                <description><![CDATA[<p>The SEC recently filed a complaint against Todd Burkhalter and Atlanta-based Drive Planning LLC. It alleges that from 2020 through June 2024, $300 million was raised for purported real estate investments from over 2000 investors. It is alleged that the the money was instead misappropriated to fund Burkhalter’s “lavish lifestyle” (including a $3 million yacht)&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>The SEC recently filed a <a href="https://www.sec.gov/files/litigation/complaints/2024/comp-pr2024-97.pdf" rel="noopener noreferrer" target="_blank">complaint</a> against Todd Burkhalter and Atlanta-based Drive Planning LLC.  It alleges that from 2020 through June 2024, $300 million was raised for purported real estate investments from over 2000 investors.  It is alleged that the the money was instead misappropriated to fund Burkhalter’s “lavish lifestyle” (including a $3 million yacht) and to make Ponzi-lie payments.</p>


<p>He is charged with violating antifraud provisions of federal securities law. He may soon face DOJ charges as well.  The antifraud provisions of the federal securities laws prohibit the use of fraudulent statements or schemes in connection with the purchase or sale of securities. These provisions apply to all securities transactions, including exempt transactions, and to statements made orally or in writing.</p>


<p>The primary anti-fraud statutory provision is Section 10(b) of the Securities Exchange Act of 1934, which is codified in 15 U.S.C. § 78j. The SEC enforces this provision primarily through Rule 10b-5, which prohibits the use of any “device, scheme, or artifice to defraud”. Rule 10b-5 also imposes liability for any misstatement or omission of a material fact, or one that investors would think was important to their decision to buy or sell a security. A fact is considered material if there is a substantial likelihood that the information would have been viewed by a reasonable investor as having significantly altered the total mix of information available.</p>


<p>The U.S. Securities and Exchange Commission (“SEC”) and Department of Justice (“DOJ”) have been working together more often to combat unlawful tactics.  They have thus strengthened their enforcement capabilities, leading to more effective identification and prosecution of insider trading and other securities violations.</p>


<p>If you have questions about whether or not you or your company are facing an investigation, <a href="/contact-us/">contact us</a> for further information. Our attorneys have represented many clients in SEC litigation and also when subsequent DOJ charges follow.</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Arrested at the Airport: What’s Next?]]></title>
                <link>https://www.conawayandstrickler.com/blog/arrested-at-the-airport-whats-next/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/arrested-at-the-airport-whats-next/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Mon, 18 Mar 2024 19:44:27 GMT</pubDate>
                
                    <category><![CDATA[Blog]]></category>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[Drug Charges]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Sex Crimes]]></category>
                
                    <category><![CDATA[Theft Crimes]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                
                    <category><![CDATA[Criminal defense]]></category>
                
                    <category><![CDATA[Criminal Lawyer]]></category>
                
                    <category><![CDATA[doj]]></category>
                
                    <category><![CDATA[federal crimes]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[fraud]]></category>
                
                    <category><![CDATA[sex crimes]]></category>
                
                    <category><![CDATA[white collar lawyer]]></category>
                
                
                
                <description><![CDATA[<p>Airports are high security environments with strict rules enforced through law enforcement, federal agents, TSA checkpoints, drug-sniffing dogs, US Marshals aboard flights, and more. Being arrested at an airport is overwhelming, scary, and often times, completely unexpected. However, the consequences of these arrest can be serious and long-lasting. An arrest at an airport could lead&hellip;</p>
]]></description>
                <content:encoded><![CDATA[<div class="wp-block-image alignleft">
<figure class="size-large is-resized"><img loading="lazy" decoding="async" width="768" height="1024" src="/static/2024/03/IMG_1293-scaled-1-768x1024.jpg" alt="A white and black dog" class="wp-image-848" style="width:768px;height:1024px" srcset="/static/2024/03/IMG_1293-scaled-1-768x1024.jpg 768w, /static/2024/03/IMG_1293-scaled-1-225x300.jpg 225w, /static/2024/03/IMG_1293-scaled-1-1152x1536.jpg 1152w, /static/2024/03/IMG_1293-scaled-1-1536x2048.jpg 1536w, /static/2024/03/IMG_1293-scaled-1.jpg 1920w" sizes="auto, (max-width: 768px) 100vw, 768px" /></figure>
</div>


<p> Airports are high security environments with strict rules enforced through law enforcement, federal agents, TSA checkpoints, drug-sniffing dogs, US Marshals aboard flights, and more. Being arrested at an airport is overwhelming, scary, and often times, completely unexpected. However, the consequences of these arrest can be serious and long-lasting. An arrest at an airport could lead to detention by law enforcement, criminal charges, and the need to retain legal representation.
</p>



<p>If you are arrested at an airport, you may be taken into custody and transported to a detention center or police station where you will be held and processed until further legal proceedings. However, this does not always happen at the airport – you may leave the airport and later have a warrant issued for your arrest. In that case, you would still need to turn yourself in for processing with law enforcement. In either circumstance, it is essential to remember your rights, including the right to remain silent and the right to legal counsel. Contacting an experienced criminal defense attorney will help you navigate that distressing process with an advocate by your side.</p>



<p>Airport arrests can lead to severe criminal charges depending on the circumstances of your case. Common criminal charges in this context cover a broad range including <a href="https://www.justice.gov/usao-ndga/pr/five-men-sentenced-federal-prison-international-drug-and-money-laundering-operation" rel="noopener noreferrer" target="_blank">drug offenses</a>, <a href="https://www.justice.gov/usao-ndga/pr/passenger-sentenced-groping-nurse-during-flight" rel="noopener noreferrer" target="_blank">sexual offenses</a>, <a href="https://www.justice.gov/usao-ndga/pr/passenger-who-discharged-firearm-airport-during-thanksgiving-holiday-travel-season" rel="noopener noreferrer" target="_blank">firearm offenses</a>, DUIs, disorderly conduct, battery, theft, trafficking, and fraud. You could also be arrested at the airport for entirely unrelated criminal charges if you are simply identified and apprehended pursuant to an active arrest warrant, such as this <a href="https://www.wsbtv.com/news/local/atlanta/tsa-official-arrested-atlanta-warrant-out-florida/F6WHJOUEU5HYDC52TM6ZMAJM3E/" rel="noopener noreferrer" target="_blank">recent arrest in Atlanta</a>. Committing crimes while aboard an aircraft (like <a href="//C7E65F34-6458-4A49-A38C-71AD01F4647E/aboard%20(like%20interfering%20with%20the%20performance%20of%20the%20duties%20of%20a%20flight%20crew)" rel="noopener noreferrer" target="_blank">interfering with the performance of the duties of a flight crew</a>) can lead to federal criminal charges and even more severe penalties. Many of these charges carry significant terms of imprisonment and hefty fines.</p>



<p>A strong legal defense is crucial if you have been arrested at an airport or are under investigation for alleged conduct at an airport. A skilled criminal defense attorney will guide you through the process, explain the charges against you, and evaluate the evidence to develop a defense strategy tailored to your case.</p>



<p>At Conaway and Strickler, we craft a defense based on the unique circumstances of each case and work closely with our clients to pursue favorable resolutions. If you have been arrested or detained at an airport, it is important to hire an attorney that is experienced in this area of law and can safeguard your rights throughout each step of the process. <a href="/contact-us/">Contact us</a> for a free consultation regarding your case.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[The Intersection of Crime and Non-Fungible Tokens (NFTs)]]></title>
                <link>https://www.conawayandstrickler.com/blog/the-intersection-of-crime-and-non-fungible-tokens-nfts/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/the-intersection-of-crime-and-non-fungible-tokens-nfts/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Tue, 14 Nov 2023 16:23:31 GMT</pubDate>
                
                    <category><![CDATA[Blog]]></category>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                    <category><![CDATA[Cyber Crime]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Fraud]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                
                    <category><![CDATA[#bitcoin]]></category>
                
                    <category><![CDATA[#cryptocurrency]]></category>
                
                    <category><![CDATA[#moneylaundering]]></category>
                
                    <category><![CDATA[Criminal defense]]></category>
                
                    <category><![CDATA[Criminal Lawyer]]></category>
                
                    <category><![CDATA[doj]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[fraud]]></category>
                
                    <category><![CDATA[fraud lawyer]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[NFTs]]></category>
                
                    <category><![CDATA[white collar lawyer]]></category>
                
                    <category><![CDATA[wire fraud]]></category>
                
                
                
                <description><![CDATA[<p>An NFT, or Non-Fungible Token, is a digital asset representing ownership or proof of authenticity of a unique item or piece of content using blockchain technology. Unlike cryptocurrencies such as Bitcoin or Ethereum, which are fungible and can be exchanged on a one-to-one basis, NFTs are non-interchangeable and one-of-a-kind. As long as you’re following copyright&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>An NFT, or Non-Fungible Token, is a digital asset representing ownership or proof of authenticity of a unique item or piece of content using blockchain technology. Unlike cryptocurrencies such as Bitcoin or Ethereum, which are fungible and can be exchanged on a one-to-one basis, NFTs are non-interchangeable and one-of-a-kind. As long as you’re following copyright laws and selling legitimate assets, creating, selling, and reselling NFTs is legal. However, due to the decentralized and anonymous nature of the crypto world, NFTs come with a host of legal issues. Like with most digital innovations, regulatory legislation has been slow to catch up and establish clear guidelines; still, wrongful use of NFTs can implicate an array of criminal charges.</p>


<p><strong>Money Laundering</strong> refers to the illegal process of concealing the origins of money obtained through criminal activities, making it appear as if it comes from a legitimate source. This is criminalized under 18 U.S.C. § 1956. Money laundering using NFTs involves the illicit use of these digital assets to disguise the origins of illegally obtained funds. In this context, individuals create a fake record of sales on the blockchain by selling NFTs to themselves using different accounts. Once finished, they sell the NFT to an unsuspecting buyer and repeat the process.</p>


<p><strong>Fraud</strong> has grown increasingly common in the crypto landscape due to its anonymous and decentralized nature. Fraud involving NFTs can manifest in various ways due to the unique characteristics of these digital assets. This is mostly being prosecuted as wire fraud under 18 U.S.C. § 1343. Some common forms of fraud associated with NFTs include:</p>


<ol class="wp-block-list">
<li><strong>Fake or Stolen NFTs</strong>: Fraudsters might create counterfeit NFTs by copying digital content and attempting to sell them as original or rare pieces. Additionally, they might steal someone else’s artwork or content and mint NFTs to sell without the creator’s consent.</li>
<li><strong>False Representation</strong>: Individuals might misrepresent the ownership or authenticity of an NFT by falsely claiming it is associated with a particular creator or source, leading buyers to believe they are purchasing something of higher value or legitimacy than it actually holds.</li>
<li><strong>Pump-and-Dump Schemes</strong>: Similar to traditional financial markets, some individuals may engage in pump-and-dump schemes within the NFT market. This involves artificially inflating the value of certain NFTs through false hype or manipulation, only to sell them off at a high price, leaving unsuspecting buyers with devalued assets.</li>
<li><strong>Phishing and Scams:</strong> Scammers may use phishing techniques to trick NFT owners into providing their private keys or access to their digital wallets, allowing the fraudster to steal the NFTs. Additionally, fraudulent schemes and fake NFT marketplaces can deceive buyers and sellers into making transactions for non-existent or misrepresented NFTs.</li>
<li><strong>Rug-Pull Scheme:</strong> As the term suggests, a “rug pull” refers to a scenario where the creator of an NFT and/or gaming project solicits investments and then abruptly abandons a project and fraudulently retains the project investors’ funds.</li>
</ol>


<p>Law enforcement is continuing to prosecute these types of NFT schemes across the nation, in cases that allege millions of dollars being defrauded. Two defendants were charged for executing a <a href="https://www.justice.gov/usao-sdny/pr/two-defendants-charged-non-fungible-token-nft-fraud-and-money-laundering-scheme-0" rel="noopener noreferrer" target="_blank">$1 million NFT money laundering and fraud scheme</a> in January 2022. In another NFT rug-pull, Aurelien Michel was charged for diverting <a href="https://www.justice.gov/usao-edny/pr/non-fungible-token-nft-developer-charged-multi-million-dollar-international-fraud" rel="noopener noreferrer" target="_blank">$2.9 million dollars in an international fraud scheme</a>.</p>


]]></content:encoded>
            </item>
        
    </channel>
</rss>