To protect your safety in response to the threat of COVID-19, we are offering our clients the ability to meet with us in person, via telephone or through video conferencing. Please call our office to discuss your options.

Articles Posted in Cyber Crime


The IRS has just announced that Operation Hidden Treasure will seek to find taxpayers with unreported income from currency transactions.  Did you notice the new question on page 1 of the Tax Form 1040?  It states, “At any time during 2020 did you receive any financial interest in virtual currency?”  Last year this question was only on Schedule 1.

The IRS Criminal Investigation Division (“CID”) will look for typical “flags” in money transactions.  That may include “structuring” (transactions in increments of less than $10,000 to avoid reporting requirements), “the use of nominees, shell corps” (entities used solely for moving money around) or “getting on and off the chain.” (On chain transactions – blockchain is modified to reflect the transaction on a public ledger. Off chain transactions are those that that go off the blockchain.  They work by swapping private keys to an existing wallet instead of transferring funds.)

The IRS identifies and investigates these tax evasion flags.  Operation Hidden Treasure is “all about finding, tracing, and attributing crypto to U.S. Taxpayers.” Do not be fooled into thinking that since it’s cryptocurrency the government does not have the know how to investigate.   Charges for tax evasion, false information on a tax return or even money laundering or structuring can be forthcoming.  Call Conaway & Strickler, PC if you have had a friendly visit from an IRS CID Agent or if you think you might be facing some issues with the IRS.  Carolyn Schenck, national fraud counsel in the IRS Office of Chief Counsel states, “Operation Hidden Treasure is designed to find, trace and attribute such transactions to taxpayers. These transactions are not anonymous.  We see you.”

After the Hack: A Data Breach Post Game Show

As chair of the Cyber Crime committee at iTechlaw, Meg Strickler gives her insight on data breaches from various perspectives on an iTechlaw webinar this week.  She and the other panelists discuss:

  1. The criminal charge of BEC (Business email compromise) fraud

Cyber extortion threats are on the rise. The threat the hacker uses is that if a certain amount of money is not paid, then information of some sort will be exposed. Hackers gain access through a digital break in. Cyber extortion is different then ransomware attacks. Ransomware will render a hard drive/server/file unreadable/unaccessible until a ransom is paid. Extornists threaten to expose sensitive material and people are paying them. But, in some cases the threats are just that – threats, and the hackers are bluffing.

Cyber extortion can take many forms. The below, is by no means, an exhaustive list.

*Denial-of-Service attacks – attack happens, and then hackers demand money to stop the attack.

Cyber Crime: Bitcoin is fast becoming a player in the online marketplace. People are starting to make investments in electronic currency in hopes of cashing in on its wealth-building opportunities. Criminals seeking to scam others out of hard earned cash are also in the mix because Bitcoin’s blockchain technology lends itself to anonymous transactions.

Cyber Crime: WannaCrypt hackers malware ransom scheme 

What’s new in cyber crime? In May, 2017, hackers stole private data in a large malware attack affecting more than 300,000 computers and taking down systems all over the world. In order to receive a code to “decrypt” their scrambled data, users were asked to send ransom money through Bitcoin.

The rise of “big data” has been one of the most important developments in the internet era.  What exactly is big data? It has been defined as a “term describing the storage and analysis of large and or complex data sets using a series of techniques”.  And big data is infiltrating every aspect of our lives.  The number of things now connected to the internet has reached at least 8.7 billion in 2012.

One result of the vast reach of the Internet is that law enforcement is now attempting to combat cyber crime globally.  Law enforcement agencies in many countries hope to utilize a coordinated and collaborative cross-border approach in order to respond to growing cyber threats. This means that multi-national corporations and law enforcement are attepting to cooperate with one another on a greater basis to achieve this goal.

With the increased cooperation between the corporate world and law enforcement, privacy rights are being eroded, especially by United States corporations as recent revelations by Edward J. Snowden show.  How can the benefits derived from cooperation between corporations and government be balanced with the individual’s interest in keeping their personal and financial lives private?  Where is the line between cyber security and individual privacy and what role do governments and corporations play in maintaining this delicate balance? The United States is not taking into account the far-reaching negative impact the changing definition of privacy is having on other states around the globe. Some countries are responding by considering data localization laws, and there is also a movement to give control of the Internet to the United Nations or to individual governments.  There are also calls for reform to the Electronic Communications Privacy Act (ECPA).  T

Contact Information