<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
     xmlns:georss="http://www.georss.org/georss"
     xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
     xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[aggravated identity theft - Conaway & Strickler]]></title>
        <atom:link href="https://www.conawayandstrickler.com/blog/tags/aggravated-identity-theft/feed/" rel="self" type="application/rss+xml" />
        <link>https://www.conawayandstrickler.com/blog/tags/aggravated-identity-theft/</link>
        <description><![CDATA[Conaway & Strickler's Website]]></description>
        <lastBuildDate>Thu, 14 Aug 2025 17:38:08 GMT</lastBuildDate>
        
        <language>en-us</language>
        
            <item>
                <title><![CDATA[Tax Evasion]]></title>
                <link>https://www.conawayandstrickler.com/blog/tax-evasion/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/tax-evasion/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Fri, 06 Jun 2025 13:35:00 GMT</pubDate>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Federal Sentencing]]></category>
                
                    <category><![CDATA[tax evasion]]></category>
                
                    <category><![CDATA[Tax Fraud]]></category>
                
                
                    <category><![CDATA[#moneylaundering]]></category>
                
                    <category><![CDATA[#taxevasion]]></category>
                
                    <category><![CDATA[#taxfraud]]></category>
                
                    <category><![CDATA[aggravated identity theft]]></category>
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[Criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[Federal Criminal Lawyer]]></category>
                
                    <category><![CDATA[PPP Loan Fraud]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                
                
                <description><![CDATA[<p>Tax evasion is a potential criminal charge. Tax avoidance is perfectly acceptable. 26 U.S.C. § 7201 defines what is tax evasion.&nbsp; It states in relevant part that any person who willfully attempts in any manner to evade or defeat any tax imposed by this title or the payment thereof shall, in addition to other penalties&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p><a href="https://www.law.cornell.edu/wex/tax_evasion">Tax evasion</a> is a potential criminal charge. <a href="https://apps.irs.gov/app/understandingTaxes/whys/thm01/les03/media/ws_ans_thm01_les03.pdf">Tax avoidance</a> is perfectly acceptable.</p>



<p>26 U.S.C. § 7201 defines what is <a href="https://www.justice.gov/tax/file/1293361/dl">tax evasion</a>.&nbsp; It states in relevant part that any person who willfully attempts in any manner to evade or defeat any tax imposed by this title or the payment thereof shall, in addition to other penalties provided by law, be guilty of a felony and, upon conviction thereof, shall be fined not more than $100,000 ($500,000 in the case of a corporation), or imprisoned not more than 5 years, or both, together with the costs of prosecution.</p>



<p>Federal prosecutors might also add additional charges beyond tax evasion. Those charges could include conspiracy charges, under 18 U.S.C. § 371, or tax fraud under 26 U.S.C. § 7206.&nbsp;&nbsp;The United States Sentencing Commission (USSC) recently released its <a href="https://www.ussc.gov/research/quick-facts/tax-fraud">Tax Fraud Report</a> for fiscal year 2023. It states that off the 64,124 cases reported to the Commission in fiscal year 2023, 363 involved tax fraud (down 27% since FY 2019).&nbsp; It is unclear if this downward trend will continue.</p>



<p>Recently, <a href="https://www.justice.gov/usao-nj/pr/new-jersey-man-pleads-guilty-tax-evasion">a man in New Jersey plead guilty to tax evasion</a>. According to the Department of Justice, “for tax years 2015 and 2016, Matthew Tucci, of West Long Branch, NJ, filed tax returns that stated he owed more than $2 million in taxes for both years. Despite admitting that he owed those taxes, Tucci did not fully pay them when they were due. Instead, Tucci purchased real estate and engaged in a series of transactions designed to conceal his interest in those properties.</p>



<p>In 2017, the IRS sent notices to Tucci that he owed taxes, interest, and penalties for 2015 and 2016. After receiving these notices, Tucci transferred multiple properties to an entity owned by another individual, but he continued to exert control over at least two of them. Of the two properties Tucci continued to control, he sold one and refinanced the other. Tucci used the proceeds from these transactions to pay his personal expenses rather than his tax debts. In 2019, Tucci submitted documents to the IRS that falsely claimed that he had no connection to the entity that owned the 12 properties.</p>



<p>He faces a maximum penalty of five years in prison as well as a period of supervised release, restitution, and monetary penalties. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.”</p>



<p>In another case, <a href="https://www.justice.gov/opa/pr/florida-businessman-sentenced-prison-tax-evasion">a Florida businessman was sentenced to prison for tax evasion</a>.&nbsp; According to the&nbsp; Department of Justice, “David Albert Fletcher, of Deltona, Florida owned and operated furniture liquidations businesses, including Century Liquidators. For tax years 2004 through 2013, Fletcher did not timely file his federal income tax returns or pay the taxes he owed. After an audit, the IRS assessed a total of $1.7 million in taxes, interest, and penalties against him.</p>



<p>To evade collection of these taxes, Fletcher concealed his income and assets from the IRS. For example, Fletcher used nominees to hide his purchases of luxury vehicles, including Rolls Royces. Fletcher also filed false income tax returns that understated his income by several million dollars, and when an IRS special agent interviewed him, Fletcher falsely represented the amount of income he earned.</p>



<p>In addition to his prison sentence, U.S. District Judge Wendy Berger for the Middle District of Florida ordered Fletcher to serve three years of supervised release and to pay approximately $7,112,689 in restitution to the United States.”</p>



<p>Recently, <a href="/lawyers/meg-strickler/">Meg Strickler</a> was able to ensure that no tax evasion charges were filed against her client.  <a href="/contact-us/">Contact us</a> if you think you might be facing tax evasion or tax fraud charges.  We are here to help.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[When Can Law Enforcement Search my Cell Phone?]]></title>
                <link>https://www.conawayandstrickler.com/blog/when-can-law-enforcement-search-my-cell-phone/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/when-can-law-enforcement-search-my-cell-phone/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Sat, 14 Sep 2024 14:38:34 GMT</pubDate>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Federal Offenses]]></category>
                
                
                    <category><![CDATA[aggravated identity theft]]></category>
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[Criminal defense]]></category>
                
                    <category><![CDATA[drug trafficking]]></category>
                
                    <category><![CDATA[federal crimes]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[wire fraud]]></category>
                
                
                
                <description><![CDATA[<p>Cell phones are everywhere today and thus play a significant role in criminal investigations. What reports are generated from my devices? Cellebrite reports provide information about phone calls and text messages; but now it also provides a report on the data stored on these devices such as voicemails, images, and browsing history. From GPS location&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>Cell phones are everywhere today and thus play a significant role in criminal investigations.</p>


<p>
<strong>What reports are generated from my devices? </strong>
</p>


<p><a href="https://cellebrite.com/en/reader/" rel="noopener noreferrer" target="_blank">Cellebrite</a> reports provide information about phone calls and text messages; but now it also provides a report on the data stored on these devices such as voicemails, images, and browsing history.  From GPS location data to social media activity, cell phones can provide a treasure trove for law enforcement agencies to use to build their cases.</p>


<p>
<strong>What protections do I have to prevent law enforcement from searching my devices?</strong>
</p>


<p>Laws on the admission and use of this evidence in court are still evolving.  In the Georgia Supreme Court case <a href="https://caselaw.findlaw.com/court/ga-supreme-court/2189282.html" rel="noopener noreferrer" target="_blank">State v. Wilson,</a> the court ruled search warrants for cell phone contents must <em>specify</em> the items being sought. This is to prevent a general search of a person’s belongings, which is prohibited by the Fourth Amendment.</p>


<p>
<strong>Do I have the same legal rights at the border that I would elsewhere in the United </strong><strong>States?</strong></p>


<p>The Supreme Court ruled that the police must get a warrant before searching someone’s cell phone in <a href="https://supreme.justia.com/cases/federal/us/573/373/" rel="noopener noreferrer" target="_blank">Riley v. California</a>. The Supreme Court held that a warrant is generally required before a search of a cell phone seized incident to arrest.  BUT, at the border, there is less protection.  According to <a href="https://www.cbp.gov/sites/default/files/documents/inspectionelectronic-devices-tearsheet.pdf)" rel="noopener noreferrer" target="_blank">US Customs and Border Protection</a> a person may be chosen for inspection for many different random reasons and thus there is less protections when crossing the border in or out of the US.  What this means – you can be pulled for a secondary inspection and all of your devices can be searched without a warrant.  They can also get an image from the hard drive of these devices and / or seize the devices at the border.</p>


<p><strong>What do I do if I am asked to give my cell phone to law enforcement?</strong></p>


<p>If you know your rights, you can comply when necessary.  So, for example, if you are traveling internationally – do not travel with
devices that you would not want searched.  Furthermore, if you are driving and pulled over with drugs or a high amount of currency in your car, etc, your cell phone and / or other devices WILL be seized and analyzed.</p>


<p>And, please remember <em>anything</em> uploaded to the cloud is fair game for law enforcement.   That’s a broad statement – but when you signed up for Instagram, Whats App, Google, TikTok, Facebook, Signal, Twitter/X, etc, you signed away any privacy rights.  Those companies are fast to comply with law enforcement subpoenas giving whatever you posted/uploaded immediately to them.</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[How can I be charged with 18 U.S. Code § 1028A Aggravated Identity Theft?]]></title>
                <link>https://www.conawayandstrickler.com/blog/how-can-i-be-charged-with-18-u-s-code-1028a-aggravated-identity-theft/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/how-can-i-be-charged-with-18-u-s-code-1028a-aggravated-identity-theft/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Sun, 22 Jan 2023 23:42:03 GMT</pubDate>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                    <category><![CDATA[Cyber Crime]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Federal Offenses]]></category>
                
                    <category><![CDATA[Fraud]]></category>
                
                    <category><![CDATA[Identity Theft]]></category>
                
                
                    <category><![CDATA[aggravated identity theft]]></category>
                
                    <category><![CDATA[federal crimes]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                
                
                <description><![CDATA[<p>Here is the definition from the statute, cut directly from the 11th circuit’s jury instructions: It’s a Federal crime to commit aggravated identity theft. The Defendant can be found guilty of aggravated identity theft only if all the following facts are proved beyond a reasonable doubt: (1) the Defendant knowingly transferred, possessed, or used another&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>Here is the definition from the statute, cut directly from the 11th circuit’s jury instructions:</p>


<p>It’s a Federal crime to commit aggravated identity theft.</p>


<p>The Defendant can be found guilty of aggravated identity theft only if all the following facts are proved beyond a reasonable doubt:</p>


<p>(1) the Defendant knowingly transferred, possessed, or used another person’s [means of identification] [identification documents];</p>


<p>(2) without lawful authority; and</p>


<p>(3) during and in relation to [the eligible felony alleged in the indictment].</p>


<p>[A “means of identification” is any name or number used, alone or together with any other information, to identify a specific person, including a name, social security number, date of birth, officially issued driver’s license or identification number, alien registration number, passport number, employer or taxpayer identification number, or electronic identification number or routing code. It can also include a fingerprint, voice print or other biometric data.]</p>


<p>[An “identification document” is a document made or issued by or for the United States Government, a state or foreign government or political subdivision.]</p>


<p>The Government must prove that the Defendant knew that the [means of identification] [identification documents], in fact, belonged to another actual person, [living or dead,] and not a fictitious person.</p>


<p>The Government must prove that the Defendant knowingly transferred, possessed, or used another person’s identity “without lawful authority.” The Government does not have to prove that the Defendant stole the [means of identification] [identification documents]. The Government is required to prove the Defendant transferred, possessed, or used the other person’s [means of identification] [identification documents]<strong> for an unlawful or illegitimate purpose.</strong></p>


<p>The Government also must prove that the [means of identification] [identification document] was possessed “during and in relation to” the crime alleged in the indictment. The phrase “during and in relation to” means that there must be a firm connection between the Defendant, the [means of identification] [identification documents], and the crime alleged in the indictment. The [means of identification] [identification documents] must have helped with some important function or purpose of the crime, and not simply have been there accidentally or coincidentally. The [means of identification] [identification documents] at least must facilitate, or have the potential of facilitating, the crime alleged in the indictment.</p>


<p>We at Conaway & Strickler, PC know how to combat these type of charges.  Please feel free to access our blog for other entries <a href="/blog/categories/white-collar-crimes/">here</a></p>


<p>Please contact us to learn more should you be facing criminal charges.</p>


]]></content:encoded>
            </item>
        
    </channel>
</rss>