<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
     xmlns:georss="http://www.georss.org/georss"
     xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
     xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[#bitcoin - Conaway & Strickler]]></title>
        <atom:link href="https://www.conawayandstrickler.com/blog/tags/bitcoin/feed/" rel="self" type="application/rss+xml" />
        <link>https://www.conawayandstrickler.com/blog/tags/bitcoin/</link>
        <description><![CDATA[Conaway & Strickler's Website]]></description>
        <lastBuildDate>Tue, 25 Feb 2025 15:31:37 GMT</lastBuildDate>
        
        <language>en-us</language>
        
            <item>
                <title><![CDATA[Recent Computer Hacking Cases in the News]]></title>
                <link>https://www.conawayandstrickler.com/blog/recent-computer-hacking-cases-in-the-news/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/recent-computer-hacking-cases-in-the-news/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Sun, 24 Nov 2024 19:06:00 GMT</pubDate>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                    <category><![CDATA[Cyber Crime]]></category>
                
                    <category><![CDATA[data breach]]></category>
                
                    <category><![CDATA[Identity Theft]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                
                    <category><![CDATA[#bitcoin]]></category>
                
                    <category><![CDATA[#cryptocurrency]]></category>
                
                    <category><![CDATA[#moneylaundering]]></category>
                
                    <category><![CDATA[atlanta criminal lawyer]]></category>
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                
                
                <description><![CDATA[<p>Recently, Robert Purbeck of Idaho, also known as “Lifelock,” and “Studmaster,”  was sentenced to ten years after pleading guilty to federal charges of computer fraud and abuse.  He hacked into the computer servers of the City of Newnan, Georgia  and a Griffin, Georgia medical clinic, and then targeted at least 17 other victims across the&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>Recently, Robert Purbeck of Idaho, also known as “Lifelock,” and “Studmaster,”  was sentenced to ten years after pleading guilty to federal charges of computer fraud and abuse.  He <a href="https://www.11alive.com/article/news/local/city-of-newnan-experiences-data-breach/85-a76aa042-9758-4403-aad9-beba3976f401" target="_blank" rel="noreferrer noopener">hacked</a> into the computer servers of the City of Newnan, Georgia  and a Griffin, Georgia medical clinic, and then targeted at least 17 other victims across the United States – in the process stealing personal information of more than 132,000 individuals.  He also attempted to extort a Florida orthodontist for payment in Bitcoin, threatening to disclose stolen patient records and other personal information.</p>



<p>“Cyber extortion is unfortunately a rapidly growing threat and highlights the ever-growing need for corporations to remain vigilant in cybersecurity efforts,” <a href="https://www.justice.gov/usao-ndga/pr/idaho-man-sentenced-computer-hacking-and-extortion-scheme" target="_blank" rel="noreferrer noopener">said Sean Burke, Acting Special Agent in Charge of FBI Atlanta</a>. “This sentencing is just one example of the FBI working together to hold criminals that hide behind their computers accountable, regardless of their location.”</p>



<p>According to information presented in court, in June 2017, Purbeck purchased access to the computer server of a Griffin medical clinic on a darknet marketplace. He then used the stolen credentials to illegally access the computers of the medical clinic and removed records that contained the sensitive personal information of more than 43,000 individuals, including names, addresses, birth dates, and social security numbers.</p>



<p>In February 2018, Purbeck purchased access to a City of Newnan Police Department server on a darknet marketplace. Purbeck used the stolen credentials to hack into the City of Newnan’s computer systems and stole police reports and other documents, including personal information of more than 14,000 individuals.</p>



<p>Purbeck also attempted to extort a Florida orthodontist in July 2018, demanding a ransom payment in Bitcoin in return for his stolen patient files, threatening to sell the patient and personal information unless the orthodontist paid the ransom. Additionally, Purbeck threatened to sell the personal information of the orthodontist’s minor child. Purbeck harassed the orthodontist and his patients for 10 days with numerous threatening emails and text messages.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>Song Wu, Chinese national, was indicted in September 2024, on charges for wire fraud and aggravated identity theft arising from his efforts to fraudulently obtain computer software and source code created by the National Aeronautics and Space Administration (“NASA”), research universities, and private companies.</p>



<p>“Efforts to obtain our nation’s valuable research software pose a grave threat to our national security,” <a href="https://www.justice.gov/usao-ndga/pr/chinese-national-charged-multi-year-spear-phishing-campaign" target="_blank" rel="noreferrer noopener">said U.S. Attorney Ryan K. Buchanan</a>. “However, this indictment demonstrates that borders are not barriers to prosecuting bad actors who threaten our national security.” According to information presented in court, Song allegedly engaged in a multi-year “spear phishing” email campaign in which he created email accounts to impersonate U.S.-based researchers and engineers and then used those imposter accounts to obtain specialized restricted or proprietary software used for aerospace engineering and computational fluid dynamics. This specialized software could be used for industrial and military applications, such as development of advanced tactical missiles and aerodynamic design and assessment of weapons. In executing the scheme, Song allegedly sent spear phishing emails to individuals employed in positions with the United States government, including NASA, the U.S. Air Force, Navy, and Army, and the Federal Aviation Administration.  Song also sent spear phishing emails to individuals employed in positions with major research universities in Georgia, Michigan, Massachusetts, Pennsylvania, Indiana, and Ohio, and with private sector companies that work in the aerospace field. Song’s spear phishing emails appeared to the targeted victims as having been sent by a colleague, associate, friend, or other person in the research or engineering community. His emails requested that the targeted victim send or make available source code or software to which Song believed the targeted victim had access. According to the indictment, while conducting this spear phishing campaign, Song was employed as an engineer at Aviation Industry Corporation of China (“AVIC”), a Chinese state-owned aerospace and defense conglomerate headquartered in Beijing, China.  AVIC manufactures civilian and military aircrafts and is one of the largest defense contractors in the world.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>Ilya Lichtenstein, 35, of New York City, was sentenced recently to 60 months in federal prison for his involvement in a money laundering conspiracy arising from the hack and theft of approximately 120,000 bitcoin from Bitfinex, a global cryptocurrency exchange. According to information presented in court, Lichtenstein hacked into Bitfinex’s network in 2016, using advanced hacking tools and techniques. Once inside the network, Lichtenstein fraudulently authorized more than 2,000 transactions transferring 119,754 bitcoin from Bitfinex to a cryptocurrency wallet in Lichtenstein’s control. Lichtenstein then took steps to cover his tracks by deleting from Bitfinex’s network access credentials and other log files that could have revealed his conduct to law enforcement. Following the hack, Lichtenstein enlisted the help of his wife, Heather Morgan, in laundering the stolen funds. Lichtenstein, at times with Morgan’s assistance, employed numerous sophisticated laundering techniques, including using fictitious identities to set up online accounts; utilizing computer programs to automate transactions; depositing the stolen funds into accounts at a variety of darknet markets and cryptocurrency exchanges and then withdrawing the funds; converting bitcoin to other forms of cryptocurrency in a practice known as “chain hopping;” depositing a portion of the criminal proceeds into cryptocurrency mixing services; using U.S.-based business accounts to legitimize Lichtenstein’s and Morgan’s banking activity; and exchanging a portion of the stolen funds into gold coins. Additional information on this case is available on the United States Department of Justice’s website for large cases <a href="https://www.justice.gov/usao-dc/2016-bitfinex-hack">here</a>. &nbsp;</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[The Intersection of Crime and Non-Fungible Tokens (NFTs)]]></title>
                <link>https://www.conawayandstrickler.com/blog/the-intersection-of-crime-and-non-fungible-tokens-nfts/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/the-intersection-of-crime-and-non-fungible-tokens-nfts/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Tue, 14 Nov 2023 16:23:31 GMT</pubDate>
                
                    <category><![CDATA[Blog]]></category>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                    <category><![CDATA[Cyber Crime]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Fraud]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                
                    <category><![CDATA[#bitcoin]]></category>
                
                    <category><![CDATA[#cryptocurrency]]></category>
                
                    <category><![CDATA[#moneylaundering]]></category>
                
                    <category><![CDATA[Criminal defense]]></category>
                
                    <category><![CDATA[Criminal Lawyer]]></category>
                
                    <category><![CDATA[doj]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[fraud]]></category>
                
                    <category><![CDATA[fraud lawyer]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[NFTs]]></category>
                
                    <category><![CDATA[white collar lawyer]]></category>
                
                    <category><![CDATA[wire fraud]]></category>
                
                
                
                <description><![CDATA[<p>An NFT, or Non-Fungible Token, is a digital asset representing ownership or proof of authenticity of a unique item or piece of content using blockchain technology. Unlike cryptocurrencies such as Bitcoin or Ethereum, which are fungible and can be exchanged on a one-to-one basis, NFTs are non-interchangeable and one-of-a-kind. As long as you’re following copyright&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>An NFT, or Non-Fungible Token, is a digital asset representing ownership or proof of authenticity of a unique item or piece of content using blockchain technology. Unlike cryptocurrencies such as Bitcoin or Ethereum, which are fungible and can be exchanged on a one-to-one basis, NFTs are non-interchangeable and one-of-a-kind. As long as you’re following copyright laws and selling legitimate assets, creating, selling, and reselling NFTs is legal. However, due to the decentralized and anonymous nature of the crypto world, NFTs come with a host of legal issues. Like with most digital innovations, regulatory legislation has been slow to catch up and establish clear guidelines; still, wrongful use of NFTs can implicate an array of criminal charges.</p>


<p><strong>Money Laundering</strong> refers to the illegal process of concealing the origins of money obtained through criminal activities, making it appear as if it comes from a legitimate source. This is criminalized under 18 U.S.C. § 1956. Money laundering using NFTs involves the illicit use of these digital assets to disguise the origins of illegally obtained funds. In this context, individuals create a fake record of sales on the blockchain by selling NFTs to themselves using different accounts. Once finished, they sell the NFT to an unsuspecting buyer and repeat the process.</p>


<p><strong>Fraud</strong> has grown increasingly common in the crypto landscape due to its anonymous and decentralized nature. Fraud involving NFTs can manifest in various ways due to the unique characteristics of these digital assets. This is mostly being prosecuted as wire fraud under 18 U.S.C. § 1343. Some common forms of fraud associated with NFTs include:</p>


<ol class="wp-block-list">
<li><strong>Fake or Stolen NFTs</strong>: Fraudsters might create counterfeit NFTs by copying digital content and attempting to sell them as original or rare pieces. Additionally, they might steal someone else’s artwork or content and mint NFTs to sell without the creator’s consent.</li>
<li><strong>False Representation</strong>: Individuals might misrepresent the ownership or authenticity of an NFT by falsely claiming it is associated with a particular creator or source, leading buyers to believe they are purchasing something of higher value or legitimacy than it actually holds.</li>
<li><strong>Pump-and-Dump Schemes</strong>: Similar to traditional financial markets, some individuals may engage in pump-and-dump schemes within the NFT market. This involves artificially inflating the value of certain NFTs through false hype or manipulation, only to sell them off at a high price, leaving unsuspecting buyers with devalued assets.</li>
<li><strong>Phishing and Scams:</strong> Scammers may use phishing techniques to trick NFT owners into providing their private keys or access to their digital wallets, allowing the fraudster to steal the NFTs. Additionally, fraudulent schemes and fake NFT marketplaces can deceive buyers and sellers into making transactions for non-existent or misrepresented NFTs.</li>
<li><strong>Rug-Pull Scheme:</strong> As the term suggests, a “rug pull” refers to a scenario where the creator of an NFT and/or gaming project solicits investments and then abruptly abandons a project and fraudulently retains the project investors’ funds.</li>
</ol>


<p>Law enforcement is continuing to prosecute these types of NFT schemes across the nation, in cases that allege millions of dollars being defrauded. Two defendants were charged for executing a <a href="https://www.justice.gov/usao-sdny/pr/two-defendants-charged-non-fungible-token-nft-fraud-and-money-laundering-scheme-0" rel="noopener noreferrer" target="_blank">$1 million NFT money laundering and fraud scheme</a> in January 2022. In another NFT rug-pull, Aurelien Michel was charged for diverting <a href="https://www.justice.gov/usao-edny/pr/non-fungible-token-nft-developer-charged-multi-million-dollar-international-fraud" rel="noopener noreferrer" target="_blank">$2.9 million dollars in an international fraud scheme</a>.</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Bitcoin/Cryptocurrency Money Laundering]]></title>
                <link>https://www.conawayandstrickler.com/blog/bitcoin-cryptocurrency-money-laundering/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/bitcoin-cryptocurrency-money-laundering/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Wed, 12 Apr 2023 15:30:15 GMT</pubDate>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                    <category><![CDATA[Cyber Crime]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[Victim Of Crime]]></category>
                
                
                    <category><![CDATA[#bitcoin]]></category>
                
                    <category><![CDATA[#cryptocurrency]]></category>
                
                    <category><![CDATA[Federal Criminal Lawyer]]></category>
                
                
                
                <description><![CDATA[<p>What is Bitcoin money laundering? Bitcoin money laundering is the process of using Bitcoin to conceal the origins of illegally obtained money. This can be done by transferring the Bitcoin to multiple accounts, mixing it with other Bitcoin, or using it to purchase goods or services. Some believe that Bitcoin transactions are anonymous. There are,&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>What is Bitcoin money laundering? Bitcoin money laundering is the process of using Bitcoin to conceal the origins of illegally obtained money. This can be done by transferring the Bitcoin to multiple accounts, mixing it with other Bitcoin, or using it to purchase goods or services.  Some believe that Bitcoin transactions are anonymous.  There are, however, transaction records that are stored in the blockchain and publicly visible.  The FBI recently <a href="https://www.justice.gov/opa/pr/two-arrested-alleged-conspiracy-launder-45-billion-stolen-cryptocurrency" rel="noopener noreferrer" target="_blank">stated </a>“Criminals always leave tracks, and …[this] is a reminder that the FBI has the tools to follow the digital trail, wherever it may lead” .</p>


<p>Bitcoin is definitely attractive to money launderers because it is a decentralized currency that is not subject to government regulation. This makes it difficult, but not impossible, to track and trace Bitcoin transactions. Additionally, Bitcoin is often used in online transactions, which makes it easy to conceal the identity of the sender and receiver.</p>


<p>There are a number of ways to launder money using Bitcoin. One common method is to use a mixer, which is a service that mixes Bitcoin from multiple sources together. This makes it difficult to trace the original source of the Bitcoin. Another method is to use a tumbler, which is a service that breaks up Bitcoin transactions into smaller pieces and then reassembles them. This makes it difficult to track the individual transactions.</p>


<p>Bitcoin can also be used to purchase goods or services that are difficult to trace, such as drugs or weapons. This can make it difficult to identify the source of the funds used to purchase the goods or services.</p>


<p>Money laundering is a serious crime that can have a significant impact on the economy. It can also be used to finance terrorism and other criminal activities. Conaway & Strickler can help if the government is questioning you about or charging you with money laundering /wire fraud /bank fraud charges.</p>


<p>A lot of the times a money mule is utilized in money laundering schemes.  A money mule is a person who transfers money on behalf of someone else, often without knowing that they are involved in a criminal activity. Money mules are typically recruited through online job scams, romance scams, or other fraudulent schemes. They are then asked to receive money from criminals, often through wire transfers or cryptocurrency transactions. The money is then transferred to other accounts, or used to purchase goods or services.</p>


<p>Money mules are often unaware that they are involved in a criminal activity. They may be promised a share of the money, or they may be led to believe that they are helping someone in need. However, money mules are always at risk of being caught and prosecuted. They may also face financial losses, as they may be held responsible for any money that is stolen from the criminals.  The government often goes after these low end cases and prosecutes them federally.</p>


<p>Again, <a href="/contact-us/">contact us</a> immediately if you are being questioned by a federal agent about any of these issues.</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[IRS Increased Focus on Cryptocurrency in Operation Hidden Treasure]]></title>
                <link>https://www.conawayandstrickler.com/blog/irs-increased-focus-on-cryptocurrency-in-operation-hidden-treasure/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/irs-increased-focus-on-cryptocurrency-in-operation-hidden-treasure/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Sat, 01 May 2021 13:41:12 GMT</pubDate>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                    <category><![CDATA[Cyber Crime]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Tax Fraud]]></category>
                
                
                    <category><![CDATA[#bitcoin]]></category>
                
                    <category><![CDATA[#crypto]]></category>
                
                    <category><![CDATA[#cryptocurrency]]></category>
                
                    <category><![CDATA[#cryptocurrencytaxguidance]]></category>
                
                    <category><![CDATA[#IRSCID]]></category>
                
                    <category><![CDATA[#moneylaundering]]></category>
                
                    <category><![CDATA[#operationhiddentreasure]]></category>
                
                    <category><![CDATA[#taxevasion]]></category>
                
                    <category><![CDATA[#taxfraud]]></category>
                
                    <category><![CDATA[Federal Criminal Lawyer]]></category>
                
                    <category><![CDATA[wire fraud]]></category>
                
                
                
                    <media:thumbnail url="https://conawayandstrickler-com.justia.site/wp-content/uploads/sites/908/2021/05/image.jpeg" />
                
                <description><![CDATA[<p>The IRS has just announced that Operation Hidden Treasure will seek to find taxpayers with unreported income from currency transactions. Did you notice the new question on page 1 of the Tax Form 1040? It states, “At any time during 2020 did you receive any financial interest in virtual currency?” Last year this question was&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>The IRS has just announced that Operation Hidden Treasure will seek to find taxpayers with unreported income from currency transactions.  Did you notice the new question on page 1 of the Tax Form 1040?  It states, “At any time during 2020 did you receive any financial interest in virtual currency?”  Last year this question was only on Schedule 1.</p>


<p>The IRS Criminal Investigation Division (“CID”) will look for typical “flags” in money transactions.  That may include “structuring” (transactions in increments of less than $10,000 to avoid reporting requirements), “the use of nominees, shell corps” (entities used solely for moving money around) or “getting on and off the chain.” (On chain transactions – blockchain is modified to reflect the transaction on a public ledger. Off chain transactions are those that that go off the blockchain.  They work by swapping private keys to an existing wallet instead of transferring funds.)</p>


<p>The IRS identifies and investigates these tax evasion flags.  Operation Hidden Treasure is “all about finding, tracing, and attributing crypto to U.S. Taxpayers.” Do not be fooled into thinking that since it’s cryptocurrency the government does not have the know how to investigate.   Charges for tax evasion, false information on a tax return or even money laundering or structuring can be forthcoming.  Call Conaway & Strickler, PC if you have had a friendly visit from an IRS CID Agent or if you think you might be facing some issues with the IRS.  Carolyn Schenck, national fraud counsel in the IRS Office of Chief Counsel states, “Operation Hidden Treasure is designed to find, trace and attribute such transactions to taxpayers. These transactions are not anonymous.  We see you.”</p>


]]></content:encoded>
            </item>
        
    </channel>
</rss>