<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
     xmlns:georss="http://www.georss.org/georss"
     xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
     xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[Identity Theft - Conaway & Strickler]]></title>
        <atom:link href="https://www.conawayandstrickler.com/blog/categories/identity-theft/feed/" rel="self" type="application/rss+xml" />
        <link>https://www.conawayandstrickler.com/blog/categories/identity-theft/</link>
        <description><![CDATA[Conaway & Strickler's Website]]></description>
        <lastBuildDate>Tue, 25 Feb 2025 15:31:37 GMT</lastBuildDate>
        
        <language>en-us</language>
        
            <item>
                <title><![CDATA[Recent Computer Hacking Cases in the News]]></title>
                <link>https://www.conawayandstrickler.com/blog/recent-computer-hacking-cases-in-the-news/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/recent-computer-hacking-cases-in-the-news/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Sun, 24 Nov 2024 19:06:00 GMT</pubDate>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                    <category><![CDATA[Cyber Crime]]></category>
                
                    <category><![CDATA[data breach]]></category>
                
                    <category><![CDATA[Identity Theft]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                
                    <category><![CDATA[#bitcoin]]></category>
                
                    <category><![CDATA[#cryptocurrency]]></category>
                
                    <category><![CDATA[#moneylaundering]]></category>
                
                    <category><![CDATA[atlanta criminal lawyer]]></category>
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                
                
                <description><![CDATA[<p>Recently, Robert Purbeck of Idaho, also known as “Lifelock,” and “Studmaster,”  was sentenced to ten years after pleading guilty to federal charges of computer fraud and abuse.  He hacked into the computer servers of the City of Newnan, Georgia  and a Griffin, Georgia medical clinic, and then targeted at least 17 other victims across the&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>Recently, Robert Purbeck of Idaho, also known as “Lifelock,” and “Studmaster,”  was sentenced to ten years after pleading guilty to federal charges of computer fraud and abuse.  He <a href="https://www.11alive.com/article/news/local/city-of-newnan-experiences-data-breach/85-a76aa042-9758-4403-aad9-beba3976f401" target="_blank" rel="noreferrer noopener">hacked</a> into the computer servers of the City of Newnan, Georgia  and a Griffin, Georgia medical clinic, and then targeted at least 17 other victims across the United States – in the process stealing personal information of more than 132,000 individuals.  He also attempted to extort a Florida orthodontist for payment in Bitcoin, threatening to disclose stolen patient records and other personal information.</p>



<p>“Cyber extortion is unfortunately a rapidly growing threat and highlights the ever-growing need for corporations to remain vigilant in cybersecurity efforts,” <a href="https://www.justice.gov/usao-ndga/pr/idaho-man-sentenced-computer-hacking-and-extortion-scheme" target="_blank" rel="noreferrer noopener">said Sean Burke, Acting Special Agent in Charge of FBI Atlanta</a>. “This sentencing is just one example of the FBI working together to hold criminals that hide behind their computers accountable, regardless of their location.”</p>



<p>According to information presented in court, in June 2017, Purbeck purchased access to the computer server of a Griffin medical clinic on a darknet marketplace. He then used the stolen credentials to illegally access the computers of the medical clinic and removed records that contained the sensitive personal information of more than 43,000 individuals, including names, addresses, birth dates, and social security numbers.</p>



<p>In February 2018, Purbeck purchased access to a City of Newnan Police Department server on a darknet marketplace. Purbeck used the stolen credentials to hack into the City of Newnan’s computer systems and stole police reports and other documents, including personal information of more than 14,000 individuals.</p>



<p>Purbeck also attempted to extort a Florida orthodontist in July 2018, demanding a ransom payment in Bitcoin in return for his stolen patient files, threatening to sell the patient and personal information unless the orthodontist paid the ransom. Additionally, Purbeck threatened to sell the personal information of the orthodontist’s minor child. Purbeck harassed the orthodontist and his patients for 10 days with numerous threatening emails and text messages.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>Song Wu, Chinese national, was indicted in September 2024, on charges for wire fraud and aggravated identity theft arising from his efforts to fraudulently obtain computer software and source code created by the National Aeronautics and Space Administration (“NASA”), research universities, and private companies.</p>



<p>“Efforts to obtain our nation’s valuable research software pose a grave threat to our national security,” <a href="https://www.justice.gov/usao-ndga/pr/chinese-national-charged-multi-year-spear-phishing-campaign" target="_blank" rel="noreferrer noopener">said U.S. Attorney Ryan K. Buchanan</a>. “However, this indictment demonstrates that borders are not barriers to prosecuting bad actors who threaten our national security.” According to information presented in court, Song allegedly engaged in a multi-year “spear phishing” email campaign in which he created email accounts to impersonate U.S.-based researchers and engineers and then used those imposter accounts to obtain specialized restricted or proprietary software used for aerospace engineering and computational fluid dynamics. This specialized software could be used for industrial and military applications, such as development of advanced tactical missiles and aerodynamic design and assessment of weapons. In executing the scheme, Song allegedly sent spear phishing emails to individuals employed in positions with the United States government, including NASA, the U.S. Air Force, Navy, and Army, and the Federal Aviation Administration.  Song also sent spear phishing emails to individuals employed in positions with major research universities in Georgia, Michigan, Massachusetts, Pennsylvania, Indiana, and Ohio, and with private sector companies that work in the aerospace field. Song’s spear phishing emails appeared to the targeted victims as having been sent by a colleague, associate, friend, or other person in the research or engineering community. His emails requested that the targeted victim send or make available source code or software to which Song believed the targeted victim had access. According to the indictment, while conducting this spear phishing campaign, Song was employed as an engineer at Aviation Industry Corporation of China (“AVIC”), a Chinese state-owned aerospace and defense conglomerate headquartered in Beijing, China.  AVIC manufactures civilian and military aircrafts and is one of the largest defense contractors in the world.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>Ilya Lichtenstein, 35, of New York City, was sentenced recently to 60 months in federal prison for his involvement in a money laundering conspiracy arising from the hack and theft of approximately 120,000 bitcoin from Bitfinex, a global cryptocurrency exchange. According to information presented in court, Lichtenstein hacked into Bitfinex’s network in 2016, using advanced hacking tools and techniques. Once inside the network, Lichtenstein fraudulently authorized more than 2,000 transactions transferring 119,754 bitcoin from Bitfinex to a cryptocurrency wallet in Lichtenstein’s control. Lichtenstein then took steps to cover his tracks by deleting from Bitfinex’s network access credentials and other log files that could have revealed his conduct to law enforcement. Following the hack, Lichtenstein enlisted the help of his wife, Heather Morgan, in laundering the stolen funds. Lichtenstein, at times with Morgan’s assistance, employed numerous sophisticated laundering techniques, including using fictitious identities to set up online accounts; utilizing computer programs to automate transactions; depositing the stolen funds into accounts at a variety of darknet markets and cryptocurrency exchanges and then withdrawing the funds; converting bitcoin to other forms of cryptocurrency in a practice known as “chain hopping;” depositing a portion of the criminal proceeds into cryptocurrency mixing services; using U.S.-based business accounts to legitimize Lichtenstein’s and Morgan’s banking activity; and exchanging a portion of the stolen funds into gold coins. Additional information on this case is available on the United States Department of Justice’s website for large cases <a href="https://www.justice.gov/usao-dc/2016-bitfinex-hack">here</a>. &nbsp;</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[The New FINCEN Rule for Residential Real Estate: What it Means for Investors and Legal Compliance]]></title>
                <link>https://www.conawayandstrickler.com/blog/the-new-fincen-rule-for-residential-real-estate-what-it-means-for-investors-and-legal-compliance/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/the-new-fincen-rule-for-residential-real-estate-what-it-means-for-investors-and-legal-compliance/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Wed, 18 Sep 2024 13:24:34 GMT</pubDate>
                
                    <category><![CDATA[Blog]]></category>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Fraud]]></category>
                
                    <category><![CDATA[Identity Theft]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                
                    <category><![CDATA[Criminal Lawyer]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[real estate]]></category>
                
                    <category><![CDATA[white collar lawyer]]></category>
                
                    <category><![CDATA[wire fraud]]></category>
                
                
                
                <description><![CDATA[<p>Recently, the Financial Crimes Enforcement Network (FINCEN) issued a pivotal final rule aimed at tightening regulatory oversight in the residential real estate sector. This change marks a significant step towards enhancing transparency in an industry that has, until now, been relatively free from such regulatory scrutiny. Generally, the new rule requires certain real estate professionals&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>Recently, the <a href="https://www.fincen.gov/news/news-releases/fincen-issues-final-rules-safeguard-residential-real-estate-investment-adviser" rel="noopener noreferrer" target="_blank">Financial Crimes Enforcement Network (FINCEN) issued a pivotal final rule</a> aimed at tightening regulatory oversight in the residential real estate sector. This change marks a significant step towards enhancing transparency in an industry that has, until now, been relatively free from such regulatory scrutiny. Generally, the new rule requires certain real estate professionals to report information about non-financed transfers of residential real estate to legal entities or trusts.</p>


<p><strong>What Is the New FINCEN Rule?</strong></p>


<p>FINCEN’s new rule extends Anti-Money Laundering (AML) and Countering the Financing of Terrorism (CFT) obligations to investment advisers involved in residential real estate transactions. The aim is to prevent illicit financial activities in an industry known for large cash transactions that can serve as vehicles for <a href="https://www.law.cornell.edu/uscode/text/18/1956" rel="noopener noreferrer" target="_blank">money laundering</a>, <a href="https://www.law.cornell.edu/uscode/text/18/1343" rel="noopener noreferrer" target="_blank">fraud</a>, and other financial crimes.</p>


<p>Previously, residential real estate investments, particularly those conducted through shell companies or trusts, offered a level of anonymity that bad actors could exploit. This new rule eliminates some of that opacity by requiring reporting and disclosure obligations for entities and individuals involved in these transactions.</p>


<p>The final rule imposes several key requirements:</p>


<ol class="wp-block-list">
<li><strong>Increased Reporting and Disclosure:</strong> Individuals and firms engaged in residential real estate investments must now report detailed information regarding the identity of buyers and sellers, the source of funds, and other financial details. This includes both U.S. and foreign investors, adding an extra layer of scrutiny for cross-border transactions.</li>
<li><strong>Enhanced Due Diligence:</strong> Investment advisers and firms must now conduct thorough due diligence on clients and the source of their funds, ensuring that they comply with AML/CFT standards. This may involve verifying identities, examining financial records, and reporting suspicious activities to FINCEN.</li>
<li><strong>Penalties for Non-Compliance:</strong> The rule includes penalties for individuals and firms that fail to meet the new AML/CFT obligations. Non-compliance could lead to fines, sanctions, or even criminal charges depending on the severity of the infraction.</li>
</ol>


<p>For real estate investors, the new FINCEN rule adds a new layer of legal and financial oversight. While the intention is to weed out bad actors, the burden of proof is now on investors and their advisers to ensure compliance. This means that investors will need to be more transparent in their transactions, particularly regarding the source of their funds. Without proof of the funds coming from a legitimate source, criminal charges of money laundering and fraud can result.</p>


<p>As the FINCEN rule takes effect, compliance will be a critical concern for many in the real estate industry. Our firm is experienced in navigating the complex landscape of financial regulations, including defending clients against charges of money laundering and related financial crimes. We can help you understand your obligations under the new FINCEN rule and defend against any accusations of non-compliance or criminal misconduct.</p>


<p>This new regulation represents a major shift for the residential real estate industry. Whether you’re an investor or an adviser, staying compliant is no longer optional—it’s the law. The new FINCEN rule is set to take effect on December 1, 2025. If you have questions about the new rule and how it affects your business, <a href="/contact-us/">contact us</a>today for a consultation.</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Suspicious Activity Reports (SARs): What Triggers Them and How to Respond]]></title>
                <link>https://www.conawayandstrickler.com/blog/suspicious-activity-reports-sars-what-triggers-them-and-how-to-respond/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/suspicious-activity-reports-sars-what-triggers-them-and-how-to-respond/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Fri, 13 Sep 2024 16:36:56 GMT</pubDate>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Fraud]]></category>
                
                    <category><![CDATA[Identity Theft]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[PPP loan fraud]]></category>
                
                    <category><![CDATA[Theft Crimes]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                
                    <category><![CDATA[bank fraud]]></category>
                
                    <category><![CDATA[Criminal defense]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[fraud]]></category>
                
                    <category><![CDATA[identity theft]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[PPP Loan Fraud]]></category>
                
                    <category><![CDATA[wire fraud]]></category>
                
                
                
                <description><![CDATA[<p>In the world of banking and finance, the term “Suspicious Activity Report” (SAR) may sound intimidating—especially if you’ve been notified that a bank has filed one concerning your transactions. For individuals and businesses alike, it’s essential to understand what a SAR is, what activities can trigger these reports, and the potential legal consequences that may&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>In the world of banking and finance, the term “Suspicious Activity Report” (SAR) may sound intimidating—especially if you’ve been notified that a bank has filed one concerning your transactions. For individuals and businesses alike, it’s essential to understand what a SAR is, what activities can trigger these reports, and the potential legal consequences that may follow.</p>


<p><strong>What is a Suspicious Activity Report (SAR)?</strong></p>


<p>A Suspicious Activity Report (SAR) is a document that financial institutions are legally required to file with the <a href="https://www.fincen.gov/what-we-do" rel="noopener noreferrer" target="_blank">Financial Crimes Enforcement Network</a> (FinCEN) when they detect potentially suspicious behavior involving financial transactions. Once filed, these reports are sent to FinCEN, a division of the U.S. Department of the Treasury, which shares the information with law enforcement agencies for further investigation if necessary.</p>


<p><strong>Why Do Banks File SARs?</strong></p>


<p>Banks must comply with a variety of regulations designed to prevent financial crimes. One of the core elements of these regulations is monitoring customer transactions for anything that might indicate illegal or suspicious activity. A SAR is typically filed when a bank suspects that a transaction, or series of transactions, might involve:</p>


<ul class="wp-block-list">
<li><strong>Money laundering</strong>: Attempting to disguise the origins of illegally obtained money by passing it through a legitimate banking system.</li>
<li><strong>Fraud</strong>: Including wire fraud, identity theft, and other deceptive financial activities.</li>
<li><strong>Structuring</strong>: Breaking down large sums of money into smaller deposits to avoid triggering reporting requirements (also known as “smurfing”).</li>
<li><strong>Unexplained large transactions</strong>: Transactions that don’t align with an individual’s or business’s typical activity or appear inconsistent with known financial patterns.</li>
</ul>


<p><strong>Common Triggers for SARs</strong></p>


<p>Financial institutions are trained to spot red flags, and there are a number of scenarios that could trigger a SAR filing. Here are some of the most common:</p>


<ol class="wp-block-list">
<li><strong>Unusually Large Transactions</strong>: If an individual or business is suddenly moving unusually large amounts of money, especially in cash, this can raise red flags. Large deposits, withdrawals, or transfers that don’t align with normal activity patterns may prompt the bank to investigate further.</li>
<li><strong>Frequent Cash Deposits Below $10,000</strong>: To avoid the $10,000 threshold that triggers an automatic Currency Transaction Report (CTR), some individuals break down larger sums into smaller deposits (a practice called structuring). If a bank detects this behavior, it will likely file a SAR.</li>
<li><strong>Wire Transfers to High-Risk Countries</strong>: International wire transfers to or from countries that are known for terrorist activity, money laundering, or lacking robust financial regulations may result in a SAR filing.</li>
<li><strong>Multiple Accounts Under One Name</strong>: Using multiple accounts to shuffle money back and forth—especially if the accounts seem unrelated to legitimate business or personal activities—can appear suspicious.</li>
<li><strong>Account Activity Inconsistent with Known Business Practices</strong>: If a company typically processes small, regular transactions and suddenly starts handling large, irregular amounts, it might trigger suspicion. Likewise, if a personal account shows business-level activity, this could raise alarms.</li>
<li><strong>Use of Shell Companies</strong>: Banks scrutinize accounts associated with shell companies that lack a clear purpose or business activity, as they are often used in money laundering schemes.</li>
<li><strong>Unexplained Source of Funds</strong>: If the origin of deposited funds is unclear, or if large amounts of money are transferred without any legitimate explanation, the bank may file a SAR.</li>
</ol>


<p><strong>The Impact of a SAR Filing</strong></p>


<p>When a bank files a SAR, it is confidential. The individual or business subject to the report is not directly informed; However, the bank may decide to take action based on its findings, which can include:</p>


<ul class="wp-block-list">
<li><strong>Account closures</strong>: If the bank believes the activity is risky or potentially illegal, it may close your account or freeze any available funds.</li>
<li><strong>Increased monitoring</strong>: Your account may come under closer scrutiny, with more restrictions placed on transactions.</li>
<li><strong>Law enforcement involvement</strong>: If the behavior in question warrants it, the SAR could lead to a broader investigation by federal or state law enforcement agencies.</li>
</ul>


<p><strong>What to Do if You Believe a SAR Has Been Filed Against You</strong></p>


<p>While you won’t be directly informed if a SAR has been filed, you may suspect something is amiss if your bank account is frozen, closed, or you’re contacted by law enforcement regarding your financial activity. If you find yourself in this situation, here are some steps to take:</p>


<ol class="wp-block-list">
<li><strong>Seek Legal Counsel</strong>: The most important thing you can do is consult with an experienced criminal defense attorney. A SAR filing could be the beginning of a serious investigation, and you’ll want legal guidance to protect your rights and interests.</li>
<li><strong>Gather Financial Records</strong>: Be prepared to provide your attorney with all relevant financial records. This can help explain the nature of your transactions and demonstrate that they are legitimate.</li>
<li><strong>Do Not Attempt to Explain Yourself to the Bank</strong>: Anything you say to the bank could be misinterpreted or used against you in a later investigation. Your attorney will be able to navigate these communications appropriately.</li>
</ol>


<p>A Suspicious Activity Report can be a precursor to serious legal trouble, but it’s important to remember that it is not an accusation of a crime. Banks are required to report anything that appears suspicious, even if the behavior is ultimately lawful. If you find yourself facing consequences related to an SAR filing, don’t wait—<a href="/contact-us/">contact us</a> today for a consultation and take control of your situation before it escalates. If you are facing financial crime allegations, our skilled team of criminal defense attorneys is here to help.</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[The Truth Behind the TikTok “Free Money Hack” Trend: What You Need to Know]]></title>
                <link>https://www.conawayandstrickler.com/blog/the-truth-behind-the-tiktok-free-money-hack-trend-what-you-need-to-know/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/the-truth-behind-the-tiktok-free-money-hack-trend-what-you-need-to-know/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Fri, 13 Sep 2024 16:06:45 GMT</pubDate>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Fraud]]></category>
                
                    <category><![CDATA[Identity Theft]]></category>
                
                    <category><![CDATA[Theft Crimes]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                
                    <category><![CDATA[bank fraud]]></category>
                
                    <category><![CDATA[check fraud]]></category>
                
                    <category><![CDATA[Criminal defense]]></category>
                
                    <category><![CDATA[Criminal Lawyer]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[identity theft]]></category>
                
                    <category><![CDATA[mail fraud]]></category>
                
                    <category><![CDATA[theft by deception]]></category>
                
                    <category><![CDATA[wire fraud]]></category>
                
                
                
                <description><![CDATA[<p>In the age of social media, viral trends come and go at lightning speed. Some are harmless and fun, but others can lead people into serious legal trouble. One of the most alarming trends recently circulating on TikTok is the so-called “free money hack.” This trend falsely promises easy money through exploiting banking loopholes, but&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>In the age of social media, viral trends come and go at lightning speed. Some are harmless and fun, but others can lead people into serious legal trouble. One of the most alarming trends recently circulating on TikTok is the so-called “<a href="https://www.nbcnews.com/business/consumer/chase-bank-says-aware-viral-glitch-inviting-people-commit-check-fraud-rcna169339" rel="noopener noreferrer" target="_blank">free money hack</a>.” This trend falsely promises easy money through exploiting banking loopholes, but what many don’t realize is that following such advice could land you in serious legal trouble.</p>


<p><strong>What is the “Free Money Hack”?</strong></p>


<p>The trend usually involves TikTok users claiming they have found ways to manipulate the financial system, offering viewers methods to “hack” or exploit bank accounts, cash apps, or credit systems to obtain free money. Some of these schemes involve:</p>


<ul class="wp-block-list">
<li><strong>Overdraft exploits</strong>: Encouraging users to overdraw bank accounts and then supposedly avoid the consequences.</li>
<li><strong>Fake check schemes</strong>: Depositing fraudulent checks into accounts and withdrawing the funds before the bank detects the fraud.</li>
<li><strong>Refund fraud</strong>: Filing fake claims with companies to get refunds for purchases that were never made.</li>
</ul>


<p>These tactics promise fast cash with minimal effort, but what they really deliver is financial and legal disaster.</p>


<p><strong>Why Following the Trend is Illegal</strong></p>


<p>What these TikTok videos don’t explain is the serious legal consequences of participating in such schemes. Fraud, theft, and exploiting banking systems for personal gain are criminal acts, regardless of how trendy or harmless they may seem in a 60-second clip.</p>


<p><strong>Here are some common legal charges that can result from participating in these activities:</strong></p>


<ol class="wp-block-list">
<li><strong>Bank Fraud</strong>: This is a federal crime that can result in hefty fines and imprisonment. Intentionally defrauding a financial institution is illegal under U.S. law, and following these TikTok hacks can quickly escalate into a federal investigation.</li>
<li><strong>Wire Fraud</strong>: Many of these hacks involve electronic transfers or communications, which falls under wire fraud. This also carries severe penalties, including long prison sentences.</li>
<li><strong>Check Fraud</strong>: Depositing fake or altered checks with the intent to withdraw funds is considered check fraud. Even if you think you’re being clever by pulling out the money before the bank catches on, it’s still a criminal act.</li>
<li><strong>Identity Theft</strong>: Some of these schemes suggest using fake names or other people’s banking details, which could lead to identity theft charges. This is a serious offense with strict penalties.</li>
<li><strong>Theft by Deception</strong>: If you knowingly mislead a financial institution or another individual to gain money or assets, this is classified as theft by deception. Penalties can include jail time and significant fines.</li>
</ol>


<p>Participating in these “hacks” isn’t just risky from a financial perspective—it’s a direct pathway to legal repercussions that can follow you for the rest of your life. Depending on the scale of the fraud or theft, you could face:</p>


<ul class="wp-block-list">
<li><strong>Criminal Charges</strong>: These could range from misdemeanors to felonies, depending on the amount of money involved and the nature of the crime.</li>
<li><strong>Restitution</strong>: If convicted, you could be required to pay back any money that was wrongfully obtained, along with additional penalties.</li>
<li><strong>Permanent Criminal Record</strong>: A fraud conviction can make it difficult to secure future employment, housing, or loans, and can damage your reputation permanently.</li>
</ul>


<p><strong> </strong>The allure of easy money is tempting, but it’s important to remember that many social media trends, like the “free money hack,” come with significant risks. Engaging in these activities can lead to criminal charges that affect your financial future and personal freedom. Before following any advice from TikTok or other social media platforms, it’s vital to understand the full legal ramifications.</p>


<p>
If you’ve been accused of fraud or any criminal activity related to online schemes, our experienced legal team is here to help. Don’t hesitate to <a href="/contact-us/">contact us</a> today for a free consultation. The legal system can be complex and unforgiving, but with the right defense, you can navigate the process and work toward the best possible outcome</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[How is White Collar Crime Generally Prosecuted?]]></title>
                <link>https://www.conawayandstrickler.com/blog/how-is-white-collar-crime-generally-prosecuted/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/how-is-white-collar-crime-generally-prosecuted/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Mon, 10 Jul 2023 17:17:13 GMT</pubDate>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Federal Offenses]]></category>
                
                    <category><![CDATA[Identity Theft]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[SEC]]></category>
                
                    <category><![CDATA[Theft Crimes]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                    <category><![CDATA[White Collar Offenses]]></category>
                
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[embezzlement]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[fraud lawyer]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                    <category><![CDATA[white collar lawyer]]></category>
                
                
                
                    <media:thumbnail url="https://conawayandstrickler-com.justia.site/wp-content/uploads/sites/908/2023/07/IMG_4620-scaled-1.jpeg" />
                
                <description><![CDATA[<p>The Department of Justice investigates and prosecutes cases where large amounts of money is alleged to have been taken. Examples of white collar crimes are money laundering, bank, wire and mail fraud, tax evasion, insider trading, insurance fraud, mortgage fraud, bribery and embezzlement. Of course Homeland Security, the FBI, the IRS, Customs and Border Patrol&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>The Department of Justice investigates and prosecutes cases where large amounts of money is alleged to have been taken. Examples of white collar crimes are money laundering, bank, wire and mail fraud, tax evasion, insider trading, insurance fraud, mortgage fraud, bribery and embezzlement.  Of course Homeland Security, the FBI, the IRS, Customs and Border Patrol and SEC can also investigate and prosecute cases of fraud as well.  </p>



<p>The government has a special United States Guideline Chapter dedicated to <a href="https://guidelines.ussc.gov/gl/§2B1.1" rel="noopener noreferrer" target="_blank">“basic” economic offenses</a>.  For purposes of this blog, this chapter will be discussed in more detail below.  As with anything involving federal criminal litigation, nothing is crystal clear in the law. Therefore, there is also a chapter in the United States Guidelines dedicated to tax offenses, election fraud, gambling, and money laundering in the United States Sentencing Guidelines.  </p>



<p>This USSG chapter DOES cover extortion, bribery, kickbacks, counterfeiting, embezzlement, health care fraud, computer fraud, insurance fraud, securities fraud, mortgage fraud, identity fraud, bankruptcy fraud, etc.   What is most important in this chapter is the loss amount.   All charges start off with a base offense level of  6 or 7 depending on the statutory max of the offense charged. Then, you look at what the “loss amount” is using the below table.
</p>



<figure class="wp-block-table is-style-regular"><table class="has-light-background-color has-background has-fixed-layout"><thead><tr><th>Loss (apply the greatest)</th><th>Increase in Level</th></tr></thead><tbody><tr><td>(A) $6,500 or less</td><td>no increase</td></tr><tr><td>(B) More than $6,500</td><td>add 2</td></tr><tr><td>(C) More than $15,000</td><td>add 4</td></tr><tr><td>(D) More than $40,000</td><td>add 6</td></tr><tr><td>(E) More than $95,000</td><td>add 8</td></tr><tr><td>(F) More than $150,000</td><td>add 10</td></tr><tr><td>(G) More than $250,000</td><td>add 12</td></tr><tr><td>(H) More than $550,000</td><td>add 14</td></tr><tr><td>(I) More than $1,500,000</td><td>add 16</td></tr><tr><td>(J) More than $3,500,000</td><td>add 18</td></tr><tr><td>(K) More than $9,500,000</td><td>add 20</td></tr><tr><td>(L) More than $25,000,000</td><td>add 22</td></tr><tr><td>(M) More than $65,000,000</td><td>add 24</td></tr><tr><td>(N) More than $150,000,000</td><td>add 26</td></tr><tr><td>(O) More than $250,000,000</td><td>add 28</td></tr><tr><td>(P) More than $550,000,000</td><td>add 30.</td></tr></tbody></table></figure>



<p>
The loss amount is a pandora box of confusion and the government is able to add all kinds of <a href="https://www.ussc.gov/sites/default/files/pdf/training/primers/2018_Primer_Relevant_Conduct.pdf" rel="noopener noreferrer" target="_blank">relevant conduct</a> and <a href="https://www.ussc.gov/sites/default/files/pdf/training/primers/2022_Primer_Loss.pdf" rel="noopener noreferrer" target="_blank">intended loss</a> conduct to inflate these numbers.</p>



<p>To further make things complicated, there are enhancements in this section that permit the government to add levels for things such as the use of sophisticated means, role in the offense, number of victims, a defrauding a charity, mass marketing, among others.</p>



<p>Navigating the federal criminal system is a task that should not be endured alone. <a href="/contact-us/">Contact</a> our team today for more information about we can protect your rights and your freedom.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Covid Related Fraud Enforcement Update]]></title>
                <link>https://www.conawayandstrickler.com/blog/covid-related-fraud-enforcement-update/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/covid-related-fraud-enforcement-update/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Sun, 19 Feb 2023 18:32:46 GMT</pubDate>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[Cyber Crime]]></category>
                
                    <category><![CDATA[Cybercrime]]></category>
                
                    <category><![CDATA[EIDL fraud]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Identity Theft]]></category>
                
                    <category><![CDATA[PPP loan fraud]]></category>
                
                    <category><![CDATA[Uncategorized]]></category>
                
                
                    <category><![CDATA[EIDL fraud]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[Federal Criminal Lawyer]]></category>
                
                    <category><![CDATA[PPP Loan Fraud]]></category>
                
                
                
                <description><![CDATA[<p>On May 17, 2021, U.S. Attorney General Merrick Garland announced the establishment of the COVID-19 Fraud Enforcement Task Force. On March 10, 2022, Garland announced Associate Deputy Attorney General Kevin Chambers as the Director For Covid-19 Fraud Enforcement. In August, 2022, President Biden signed laws that give the Department of Justice and other federal agencies&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>On May 17, 2021, U.S. Attorney General Merrick Garland announced the establishment of the <a href="https://www.justice.gov/opa/pr/attorney-general-announces-task-force-combat-covid-19-fraud" rel="noopener noreferrer" target="_blank"><strong>COVID-19 Fraud Enforcement Task Force.</strong></a></p>


<p>On March 10, 2022, Garland <a href="https://www.justice.gov/opa/speech/attorney-general-merrick-b-garland-delivers-remarks-covid-19-fraud-enforcement-task-force" rel="noopener noreferrer" target="_blank">announced</a> Associate Deputy Attorney General Kevin Chambers as the Director For Covid-19 Fraud Enforcement.</p>


<p>In August, 2022, President Biden signed laws that give the Department of Justice and other federal agencies more time to investigate and prosecute Covid-19 fraud. It extended the statute of limitations for fraud charges involving PPP and EIDL fraud to<strong> ten years</strong>.</p>


<p>And on September 14, 2022, the DOJ <a href="https://www.oig.dhs.gov/sites/default/files/assets/pr/2022/dojpr-091422-justice-department-announces-covid-19-fraud-strike-force-teams.pdf" rel="noopener noreferrer" target="_blank">announced</a> the establishment of three Strike Force teams created to enhance the Department’s existing efforts to combat and prevent COVID-19 related fraud.  The Strike Force teams will operate out of U.S. Attorney’s Offices in the Southern District of Florida, the District of Maryland, and a joint effort between the Central and Eastern Districts of California.</p>


<p>Concerned about PPP loan or EIDL loan fraud investigations?  Our firm has represented both companies and individuals facing questions from the bank or investigators.  Please <a href="/contact-us/">contact us</a> before interacting with any investigators or agents.</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[How can I be charged with 18 U.S. Code § 1028A Aggravated Identity Theft?]]></title>
                <link>https://www.conawayandstrickler.com/blog/how-can-i-be-charged-with-18-u-s-code-1028a-aggravated-identity-theft/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/how-can-i-be-charged-with-18-u-s-code-1028a-aggravated-identity-theft/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Sun, 22 Jan 2023 23:42:03 GMT</pubDate>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                    <category><![CDATA[Cyber Crime]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Federal Offenses]]></category>
                
                    <category><![CDATA[Fraud]]></category>
                
                    <category><![CDATA[Identity Theft]]></category>
                
                
                    <category><![CDATA[aggravated identity theft]]></category>
                
                    <category><![CDATA[federal crimes]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                
                
                <description><![CDATA[<p>Here is the definition from the statute, cut directly from the 11th circuit’s jury instructions: It’s a Federal crime to commit aggravated identity theft. The Defendant can be found guilty of aggravated identity theft only if all the following facts are proved beyond a reasonable doubt: (1) the Defendant knowingly transferred, possessed, or used another&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>Here is the definition from the statute, cut directly from the 11th circuit’s jury instructions:</p>


<p>It’s a Federal crime to commit aggravated identity theft.</p>


<p>The Defendant can be found guilty of aggravated identity theft only if all the following facts are proved beyond a reasonable doubt:</p>


<p>(1) the Defendant knowingly transferred, possessed, or used another person’s [means of identification] [identification documents];</p>


<p>(2) without lawful authority; and</p>


<p>(3) during and in relation to [the eligible felony alleged in the indictment].</p>


<p>[A “means of identification” is any name or number used, alone or together with any other information, to identify a specific person, including a name, social security number, date of birth, officially issued driver’s license or identification number, alien registration number, passport number, employer or taxpayer identification number, or electronic identification number or routing code. It can also include a fingerprint, voice print or other biometric data.]</p>


<p>[An “identification document” is a document made or issued by or for the United States Government, a state or foreign government or political subdivision.]</p>


<p>The Government must prove that the Defendant knew that the [means of identification] [identification documents], in fact, belonged to another actual person, [living or dead,] and not a fictitious person.</p>


<p>The Government must prove that the Defendant knowingly transferred, possessed, or used another person’s identity “without lawful authority.” The Government does not have to prove that the Defendant stole the [means of identification] [identification documents]. The Government is required to prove the Defendant transferred, possessed, or used the other person’s [means of identification] [identification documents]<strong> for an unlawful or illegitimate purpose.</strong></p>


<p>The Government also must prove that the [means of identification] [identification document] was possessed “during and in relation to” the crime alleged in the indictment. The phrase “during and in relation to” means that there must be a firm connection between the Defendant, the [means of identification] [identification documents], and the crime alleged in the indictment. The [means of identification] [identification documents] must have helped with some important function or purpose of the crime, and not simply have been there accidentally or coincidentally. The [means of identification] [identification documents] at least must facilitate, or have the potential of facilitating, the crime alleged in the indictment.</p>


<p>We at Conaway & Strickler, PC know how to combat these type of charges.  Please feel free to access our blog for other entries <a href="/blog/categories/white-collar-crimes/">here</a></p>


<p>Please contact us to learn more should you be facing criminal charges.</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Covid-19 Fraud Enforcement Task Force established]]></title>
                <link>https://www.conawayandstrickler.com/blog/covid-19-fraud-enforcement-task-force-established/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/covid-19-fraud-enforcement-task-force-established/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Wed, 26 May 2021 17:02:25 GMT</pubDate>
                
                    <category><![CDATA[Blog]]></category>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Fraud]]></category>
                
                    <category><![CDATA[Identity Theft]]></category>
                
                    <category><![CDATA[PPP loan fraud]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                    <category><![CDATA[White Collar Offenses]]></category>
                
                
                    <category><![CDATA[#moneylaundering]]></category>
                
                    <category><![CDATA[covid 19 task force]]></category>
                
                    <category><![CDATA[doj]]></category>
                
                    <category><![CDATA[fraud]]></category>
                
                    <category><![CDATA[identity theft]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[PPP Loan Fraud]]></category>
                
                
                
                    <media:thumbnail url="https://conawayandstrickler-com.justia.site/wp-content/uploads/sites/908/2021/05/us-dept-of-justice-doj-fraud.jpg" />
                
                <description><![CDATA[<p>The Department of Justice just announced that U.S. Attorney General Merrick B. Garland created COVID-19 Fraud Enforcement Task Force to enhance enforcement efforts against COVID-19 related fraud. Cases have included: Offers to purchase COVID-19 vaccination cards Requiring payment for testing or vaccines. PPP loan fraud EIDL (Economic Injury Disaster Loans) fraud Unemployment fraud – weekly&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>The Department of Justice just announced that U.S. Attorney General Merrick B. Garland created COVID-19 Fraud Enforcement Task Force to enhance enforcement efforts against COVID-19 related fraud.</p>


<p>Cases have included:</p>


<ul class="wp-block-list">
<li>Offers to purchase COVID-19 vaccination cards</li>
<li>Requiring payment for testing or vaccines.</li>
<li>PPP loan fraud</li>
<li>EIDL (Economic Injury Disaster Loans) fraud</li>
<li>Unemployment fraud – weekly federal unemployment benefits worth $600 a week.   The Justice Department has charged more than 140 people so far for fraud related to the program.</li>
<li>Identity Fraud –  used stolen identities to try to file for benefits illegally</li>
<li>Purchase and resale of Personal Protective Equipment (PPE) to hospitals and retailers at a significant profit</li>
</ul>


<p>
“The Department of Justice will use every available federal tool—including criminal, civil, and administrative actions—to combat and prevent COVID-19 related fraud. We look forward to working with our federal government colleagues to bring to justice those who seek to profit unlawfully from the pandemic,” wrote Attorney General Garland in a memo announcing the Task Force.</p>


<p>Conaway & Strickler, PC has handled each type of case delineated above.  It is crucial to reach out to us early on in one of these type of investigations.  With a task force created, the DOJ and related ent</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Identity Theft: Two face insurance fraud charges in Georgia]]></title>
                <link>https://www.conawayandstrickler.com/blog/woman_and_brother_face_insurance_fraud_charges_in_georgia/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/woman_and_brother_face_insurance_fraud_charges_in_georgia/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Wed, 06 May 2015 14:20:10 GMT</pubDate>
                
                    <category><![CDATA[Identity Theft]]></category>
                
                
                
                
                <description><![CDATA[<p>Identity Theft: People do what they think they need to do to make ends meet. However, if a person commits a crime, even a non-violent crime, he or she may end up in serious legal trouble. This can even result in significant time behind bars. This is what one woman and her brother are facing&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>Identity Theft: People do what they think they need to do to make ends meet. However, if a person commits a crime, even a non-violent crime, he or she may end up in serious legal trouble. This can even result in significant time behind bars. This is what one woman and her brother are facing after being arrested for <a href="http://www.criminaldefensepros.com/federal-crimes/" rel="noopener noreferrer" target="_blank">insurance fraud</a> in Georgia.</p>


<p>The woman was working as an insurance claims adjuster and is being accused of abusing her position at the insurance company for which she was working. The Georgia Insurance Commissioner announced that the woman was arrested for allegedly stealing thousands of dollars from her former employer. The woman’s brother was also arrested for his role as a suspected accomplice.</p>


<p>Both of the suspects are charged with seven counts of theft, seven counts of insurance fraud and three criminal counts of identity theft. Apparently, the woman was producing fraudulent accident claims using her brother’s name and then issuing him settlement payments, according to the latest reports. Investigators claim that the woman’s brother received almost $80,000 between 2011 and 2012.</p>


<p>On the other hand, just because a person has been arrested does not mean he or she is guilty. The law in Georgia considers everyone innocent until proved guilty of a crime. In this case, the woman and her brother have the right to defend themselves in a court of law against the insurance fraud charges. However, in order to be successful, they will have to familiarize themselves with the rules of the court and relevant laws.</p>


<p><strong>Source: </strong>claimsjournal.com, “<a href="http://www.claimsjournal.com/news/southeast/2015/04/28/263030.htm" rel="noopener noreferrer" target="_blank">Former Allstate Adjuster Arrested for Insurance Fraud in Georgia</a>“, April 28, 2015</p>


<p>Please see <a href="http://www.criminaldefensepros.com/blog/2013/12/identity-theft-the-government-is-getting-aggressive.shtml" rel="noopener noreferrer" target="_blank">here</a> for additional blog entries on this topic.</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Identity Theft: The government is getting aggressive]]></title>
                <link>https://www.conawayandstrickler.com/blog/identity_theft_the_government_is_getting_aggressive/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/identity_theft_the_government_is_getting_aggressive/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Tue, 17 Dec 2013 20:12:38 GMT</pubDate>
                
                    <category><![CDATA[Identity Theft]]></category>
                
                
                
                
                <description><![CDATA[<p>The government is getting aggressive in its fight against fraud and identity theft cases. See Tax Return Preparer Convicted of Identity Theft as an example. At Conaway & Strickler, we have handled many identity theft and fraud cases. A criminal identity theft case can begin in many ways, such as being arrested trying to cash&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>The government is getting aggressive in its fight against fraud and identity theft cases.  See <a href="http://www.justice.gov/usao/gan/press/2013/12-12-13.html" rel="noopener noreferrer" target="_blank">Tax Return Preparer Convicted of Identity Theft</a> as an example.  At Conaway & Strickler, we have handled many identity theft and <a href="/criminal-defense-practice/federal-crimes/federal-white-collar-crimes/federal-fraud/">fraud</a> cases.  A criminal identity theft case can begin in many ways, such as being arrested trying to cash a fraudulent check at the bank.  Or, a person could be pulled over for a traffic infraction.  Once pulled over, a search by the police may turn up multiple IDs, multiple credit cards, etc. The arrest may begin at the state level, but the fe ds then work to build a federal case against you while they have you stuck under the conditions of a bond.  The biggest piece of advice we can offer if that person is you is DON’T SAY ANYTHING.  There are potential motions we could argue that could benefit your case.  The more statements one makes, the more information the government gains.  Contact Conaway & Strickler ASAP so that we can guide you to a positive resolution to your case.  </p>


<p>Another issue one could face is the concept of “relevant conduct”.  If you are involved only peripherally, you could face an indictment with all co-conspirators, and thus face the sentencing guidelines related to the TOTAL loss amount by each individual involved.  Once again, it is imperative that you contact a lawyer as soon as you can, to avoid the many pitfalls in navigating the criminal justice system.</p>


<p>As you can see in the example case cited above, that individual chose to use his constitutional right to a jury trial, and lost.  </p>


]]></content:encoded>
            </item>
        
    </channel>
</rss>