<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
     xmlns:georss="http://www.georss.org/georss"
     xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
     xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[#cryptocurrency - Conaway & Strickler]]></title>
        <atom:link href="https://www.conawayandstrickler.com/blog/tags/cryptocurrency/feed/" rel="self" type="application/rss+xml" />
        <link>https://www.conawayandstrickler.com/blog/tags/cryptocurrency/</link>
        <description><![CDATA[Conaway & Strickler's Website]]></description>
        <lastBuildDate>Sun, 29 Mar 2026 17:33:35 GMT</lastBuildDate>
        
        <language>en-us</language>
        
            <item>
                <title><![CDATA[Cryptocurrency Investment Fraud Cases]]></title>
                <link>https://www.conawayandstrickler.com/blog/cryptocurrency-investment-fraud-cases/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/cryptocurrency-investment-fraud-cases/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Sun, 29 Mar 2026 17:33:34 GMT</pubDate>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                
                    <category><![CDATA[#crypto]]></category>
                
                    <category><![CDATA[#cryptocurrency]]></category>
                
                    <category><![CDATA[cryptocurrency fraud charges]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                
                
                <description><![CDATA[<p>Conaway & Strickler, PC recently tried a case in federal court that involved cryptocurrency investment fraud, money laundering, and wire fraud. Through the years, the firm has taken on an increasing number of cryptocurrency fraud cases as the popularity of digital currency continues to grow. We are well versed on defended anyone charged with the&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>Conaway & Strickler, PC recently tried a case in federal court that involved cryptocurrency investment fraud, <a href="/criminal-defense-practice/federal-crimes/federal-white-collar-crimes/money-laundering/">money laundering</a>, and wire fraud.  Through the years, the firm has taken on an increasing number of cryptocurrency fraud cases as the popularity of digital currency continues to grow.  We are well versed on defended anyone charged with the types of cases like the below.  </p>



<p>For example, the <a href="https://www.sec.gov/files/litigation/complaints/2025/comp-pr2025-144.pdf">SEC recently filed charges </a>against purported crypto asset trading platforms Morocoin Tech Corp., Berge Blockchain Technology Co. Ltd., and Cirkor Inc. and investment clubs AI Wealth Inc., Lane Wealth Inc., AI Investment Education Foundation Ltd., and Zenith Asset Tech Foundation alleging that they defrauded retail investors out of more than $14 million in an elaborate investment confidence scam.  </p>



<p>“AI Wealth, Lane Wealth, AIIEF, and Zenith operated so-called investment clubs using WhatsApp and solicited investors to join the clubs with ads on social media. The clubs gained investors’ confidence with supposedly AI-generated investment tips before luring investors to open and fund accounts on purported crypto asset trading platforms Morocoin, Berge, and Cirkor, which falsely claimed to have government licenses, as alleged. The investment clubs and platforms then allegedly offered “Security Token Offerings” that were purportedly issued by legitimate businesses. In reality, no trading took place on the trading platforms, which were fake, and the Security Token Offerings and their purported issuing companies did not exist, according to the complaint. When investors tried to withdraw their funds, the complaint alleges that the defendants further defrauded victims by demanding that they pay advance fees. In all, the defendants misappropriated at least $14 million from U.S.-based retail investors and funneled those funds overseas through a web of bank accounts and crypto asset wallets, as alleged.”</p>



<p>In another recent <a href="https://www.justice.gov/usao-ct/pr/wolcott-man-indicted-cryptocurrency-fraud-scheme">case</a>, a young man, Elmin Redzepagic was charged in a 21-count indictment offenses related to an alleged cryptocurrency fraud scheme.  As alleged in the indictment, Redzepagic “held himself out to investors as a cryptocurrency investor who earned high rates of return. Once Redzepagic had victims’ initial investment, he told them they had earned a substantial profit but had to pay additional fees (“gas fees”) to withdraw it. Redzepagic claimed to work as part of a team that included someone known as “The Chef,” who supposedly led the operation and determined who, how, and when investors would receive their profits. In fact, Redzepagic did not invest victims’ funds in cryptocurrency but instead transferred the funds to Stake.com, an offshore gambling platform that Redzepagic used to receive and hold proceeds of the scheme, to generate cryptocurrency addresses for victims to use to transfer Bitcoin to him, and to make large “lulling” payments to victims throughout the course of the scheme.”</p>



<p>Finally, in another <a href="https://www.justice.gov/usao-mdfl/pr/goliath-ventures-ceo-arrested-wire-fraud-and-money-laundering">case,</a> Goliath Ventures founder Christopher Alexander Delgado has been arrested on a criminal complaint charging him with wire fraud and money laundering. It is alleged that this “was a “Ponzi scheme,” which is a form of investment fraud that involves the payment of purported returns to existing investors from funds contributed by new investors. Delgado’s scheme involved soliciting victims to invest substantial sums of money under false and fraudulent promises of monthly returns generated through cryptocurrency “liquidity pools.” Victims were induced to give money to Goliath through personal referrals, professional marketing materials, luxury events, charitable sponsorships, and some monthly payments of purported returns, all of which were designed to establish Goliath’s bona fides with investors. Based on these false and fraudulent representations, Goliath obtained at least $328 million from victim investors.</p>



<p>Although Goliath represented that it would place the victim investors’ funds in cryptocurrency liquidity pools, in reality, the funds were primarily used to pay purported returns to earlier investors, to return principal to investors who requested it, and for Goliath’s extravagant business gatherings, holiday parties, and luxury travel accommodations. With victim investors’ funds, Delgado purchased four residential properties each worth between $1.15 million and $8.5 million.”</p>



<p>The FBI has <a href="https://www.fbi.gov/how-we-can-help-you/victim-services/national-crimes-and-victim-resources/cryptocurrency-investment-fraud">recently stated</a> that “cryptocurrency investment fraud, which the media commonly describes as “<a href="https://www.conawayandstrickler.com/blog/what-is-a-pig-butchering-scam/">pig butchering</a>,” is one of the most prevalent and damaging fraud schemes today.”  As a result, more and more DOJ prosecutions are happening.  Please <a href="https://www.conawayandstrickler.com/contact-us/">contact us </a>if you have received any sort of indication that you are under federal investigation.  </p>



<p></p>



<p></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Recent Fraud Cases Highlighted by the DOJ include Cryptocurrency and Civil Forfeiture Complaints]]></title>
                <link>https://www.conawayandstrickler.com/blog/recent-fraud-cases-highlighted-by-the-doj-include-cryptocurrency-and-civil-forfeiture-complaints/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/recent-fraud-cases-highlighted-by-the-doj-include-cryptocurrency-and-civil-forfeiture-complaints/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Sun, 03 Aug 2025 13:54:00 GMT</pubDate>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                    <category><![CDATA[Cybercrime]]></category>
                
                
                    <category><![CDATA[#cryptocurrency]]></category>
                
                    <category><![CDATA[#moneylaundering]]></category>
                
                    <category><![CDATA[atlanta criminal lawyer]]></category>
                
                    <category><![CDATA[atlanta federal criminal attorney]]></category>
                
                    <category><![CDATA[atlanta internet crime attorney]]></category>
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[cryptocurrency fraud charges]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                    <category><![CDATA[white collar lawyer]]></category>
                
                
                
                <description><![CDATA[<p>As we enter the 8th month of 2025, it is clear that federal agencies have ramped up enforcement of federal crimes, leading to substantial financial penalties and lengthy prison sentences. Recently, the Department of Justice highlighted enforcement efforts that allegedly aimed at protecting&nbsp; Americans from transnational fraud schemes.&nbsp; Here are some of the cases discussed:&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>As we enter the 8th month of 2025, it is clear that federal agencies have ramped up enforcement of federal crimes, leading to substantial financial penalties and lengthy prison sentences.</p>



<p>Recently, the Department of Justice highlighted enforcement efforts that allegedly aimed at protecting&nbsp; Americans from transnational fraud schemes.&nbsp; Here are some of the cases discussed:</p>



<p><a href="https://www.pacermonitor.com/public/case/58513717/USA_v_Murray">United States v. Troy Murray</a> and <a href="https://www.pacermonitor.com/public/case/58513715/USA_v_Murray">United States v. Cutter Murray</a>. On June 11, 2025, DOJ’s Consumer Protection Branch filed an Information in SDFL charging Troy Murray also known as “Steve Dixson” with conspiracy to commit wire fraud. According to court documents, Troy Murray sold to lottery fraud scammers, including Jamaicans, his lead list database containing the names, and personal information of over seven million elderly American consumers. These lists were allegedly then used to defraud elderly victims. Additionally, Cutter Murray, Troy Murray’s son, will plead guilty to one count of money laundering for receiving and then laundering $1.6 million of the fraudulent funds Troy Murray obtained.</p>



<p><a href="https://www.justice.gov/usao-ct/pr/georgia-man-charged-operating-sweepstakes-scam">United States v. Jimmy Smith</a>. On April 1, 2025 the U.S. Attorney’s Office for the District of Connecticut announced charges against Jimmy Smith, 30, a citizen of Jamaica, who resided in Hinesville, Georgia. According to court documents, Smith and others defrauded at least four victims residing in Connecticut, New York, Texas, and California, by telling them they had won a Publishers Clearing House Sweepstakes and needed to pay taxes or money to claim the prize.</p>



<p>United States v. <a href="https://www.justice.gov/usao-ma/pr/nigerian-national-pleads-guilty-role-romance-scam-and-money-laundering-scheme">Charles Uchenna Nwadavid</a>. On April 9, the U.S. Attorney’s Office (USAO) for the District of Massachusetts announced charges against Charles Uchenna Nwadavid, a citizen of Nigeria who was arrested after landing at the Dallas-Fort Worth Airport. In January 2024, a grand jury indicted Nawadavid on one count of mail fraud and two counts of money laundering. Between approximately 2016 to September 2019, Nwadavid allegedly participated in romance scams that tricked victims into sending money abroad.&nbsp; He plead guilty to mail fraud, aiding and abetting money laundering and money laundering on June 26, 2025.&nbsp; The DOJ states “romance schemes” &nbsp;generally begin when the “bad actors” recruit victims through advertisements for online relationships on dating or social media websites. Individuals perpetuating romance scams often create fictitious profiles and then use them to gain victims’ trust through a purported romantic relationship. Perpetrators then direct their victims to send money or to conduct financial transactions involving other victims’ money under false pretenses, such as an urgent need for money to secure a multi-million dollar inheritance or to pay for an unexpected hospitalization.</p>



<p>Another romance scheme can involve investing in cryptocurrency. The United States Attorney’s Office for the Northern District of Ohio (USAO) has filed a <a href="https://www.justice.gov/usao-ndoh/media/1391461/dl?inline">civil complaint in forfeiture</a> against 8,207,578 Tether (USDT) cryptocurrency, valued at more than $8.2 million in February, 2025.&nbsp; &nbsp;In that case, investigators found that scammers initially contacted the victims through seemingly misdirected, or “wrong number,” text messages. The fraudster then gained the victim’s trust and affection using various manipulative tactics. Once trust was established with the victim, the fraudster would share how much success they, or someone they knew, had with investing in cryptocurrency. This personal testimonial lessened any uncertainties the victims may have had about virtual currencies and eventually had the intended effect to persuade the victim to proceed with the investment.</p>



<p>The fraudster would then guide the victim, step-by-step, on how to open a legitimate cryptocurrency account, most often with a U.S. based virtual currency exchange such as Crypto.com or Coinbase. The scammer would walk the victim through the entire process of transferring money from their bank to the newly created cryptocurrency account. Next, the victim received instructions on how to transfer the purchased cryptocurrency assets to an online “investment platform,” which would turn out to be a fake site created by the fraudsters to look like a legitimate company. Information on the platforms promised lucrative returns which encouraged victims to invest further. However, once the victim transferred their funds to the “investment platform” they unknowingly handed over complete control and ownership of their funds to the scammer.&nbsp; These fake cryptocurrency trading platforms or fake versions of official crypto wallets to trick unsuspecting victims. These fake websites usually have similar but slightly different domain names from the sites they attempt to mimic.</p>



<p>The complaint also outlines that the perpetrators of such investment fraud schemes often allow victims to withdraw a portion of their “profits” early on in the scheme to build trust and reinforce their belief that the “investment platform” was legitimate. But as the scheme progressed, victims were unable to withdraw their funds and given excuses as to why they could not access their funds. For example, the fraudsters referred to a fake “tax” requirement, stating that taxes must be paid on the proceeds generated from the investment platform. Knowing that the scam would run its course soon, the fraudsters used last-ditch efforts to lie to victims that they had to pay a tax. Ultimately, victims were locked out of their account on the investment platform and lost their funds.</p>



<p>A woman in Lake County, Ohio became the target of such a scam when she responded to a text on her phone from an unknown number in November 2023. She began sharing information via text with the person and the two bonded over topics such as hobbies and religion. Over a period of time, the victim followed instructions from her new “friend” and opened an account at Crypto.com and then transferred funds into the account. When the victim wanted to withdraw funds, her “friend,” relented and said additional payments were needed and she complied. When the victim no longer had any funds left after making additional payments, her “friend” began to threaten her that he would send his friends to “take care of” her friends and family. Having lost her entire life savings of approximately $663,352, including funds from her Roth IRA, the victim filed a complaint with the FBI’s Internet Crime Complaint Center to report the losses in June 2024. The FBI Cleveland Division subsequently initiated an investigation.</p>



<p><a href="https://www.justice.gov/usao-ndoh/media/1402451/dl?inline">United States v. 679,981.22 Tether, et al</a>. On June 3, the U.S. Attorney’s Office for the Northern District of Ohio announced the filing of a civil forfeiture complaint against 679,981.22 in the Tether cryptocurrency suspected of being fraudulently obtained as part of a romance/investment scam. According to court documents, one victim was targeted via LinkedIn and another victim was targeted though the dating App “Coffee Meets Bagel.”</p>



<p>The experienced federal criminal defense attorneys at <a href="/lawyers/">Conaway & Strickler, PC</a> are here to protect your rights, reputation, and future should you be under investigation. With decades of experience in defending traditional financial fraud paired with a deep understanding of the newer world of cryptocurrency, our firm possesses the skills and expertise to assist those accused of any type of fraud.  Call or <a href="/contact-us/">contact us online for a confidential consultation</a>.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Cryptocurrency Money Laundering]]></title>
                <link>https://www.conawayandstrickler.com/blog/cryptocurrency-money-laundering/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/cryptocurrency-money-laundering/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Mon, 24 Mar 2025 13:22:00 GMT</pubDate>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                    <category><![CDATA[Cyber Crime]]></category>
                
                
                    <category><![CDATA[#crypto]]></category>
                
                    <category><![CDATA[#cryptocurrency]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[money mule]]></category>
                
                    <category><![CDATA[white collar lawyer]]></category>
                
                    <category><![CDATA[wire fraud]]></category>
                
                
                
                <description><![CDATA[<p>Cryptocurrency fraud has become increasingly prevalent in recent years. The lack of a centralized authority governing crypto along with the relative anonymity of transactions has contributed to this rise in digital financial crime. Specifically, cryptocurrency money laundering has grown significantly in recent years with billions of dollars stolen through hacks, Ponzi schemes, mixers. A recent&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>Cryptocurrency fraud has become increasingly prevalent in recent years. The lack of a centralized authority governing crypto along with the relative anonymity of transactions has contributed to this rise in digital financial crime. Specifically, cryptocurrency money laundering has grown significantly in recent years with billions of dollars stolen through hacks, Ponzi schemes, mixers. A <a href="https://www.chainalysis.com/blog/2025-crypto-crime-report-introduction/">recent report from Chainalysis</a> estimates illicit cryptocurrency addresses received more than 50 billion dollars in 2024.&nbsp;</p>



<p>Crypto money laundering follows the same pattern used for fiat (government-issued) currencies by “cleaning” funds gained through illicit means, before exchanging or withdrawing them for cash. Traditionally, money laundering involves disguising financial assets so they can be used without detection of the illegal activity that produced them. In the context of crypto, tokens are moved through various digital addresses to obscure their illegal origin and make them more difficult to trace. &nbsp;</p>



<p>The privacy-preserving nature of crypto has opened the door for criminals to conceal the origin of illicitly gained funds through a variety of methods. Cybercriminals ultimately funnel assets through several businesses and online addresses to hide the money trail before transferring the funds to a seemingly legitimate source.&nbsp;</p>



<p>There are several methods that criminals will use when engaging in cryptocurrency money laundering, including:&nbsp;</p>



<ul class="wp-block-list">
<li>Smurfing:&nbsp;Splitting up large sums of money into smaller amounts so they can be sent via multiple transactions.&nbsp;&nbsp;</li>



<li>Exchange Hopping:&nbsp;Using multiple cryptocurrency exchanges to transfer funds across several platforms and obscure the money trail.&nbsp;&nbsp;</li>



<li>Crypto Swaps: Using multiple cryptocurrency wallet addresses to directly convert funds without an intermediary or a centralized exchange.&nbsp;</li>



<li>Offshore Transactions:&nbsp;Creating offshore accounts to hide the origin of funds.&nbsp;</li>



<li>Mixing:&nbsp;Blending together the crypto assets of multiple users, making it difficult to determine who owns what.&nbsp;&nbsp;&nbsp;</li>



<li>Gambling Platforms:&nbsp;Depositing tokens into online gambling websites to be either withdrawn as cash or used to place coordinated bets.&nbsp;&nbsp;</li>
</ul>



<p>Cybercriminals require other actors (individuals and sometimes shell companies) to facilitate this crypto money laundering. Like traditional money laundering, criminals recruit “money mules” to move or launder the illicit funds, often unknowingly. In the context of crypto, this is often done under the guise of a cryptocurrency investment scheme. &nbsp;</p>



<p>Just as traditional money laundering can be federally prosecuted under <a href="https://www.law.cornell.edu/uscode/text/18/1956">18 U.S.C. § 1956</a>, crypto money laundering is a crime under that same law. In addition to money laundering charges, involvement in a cryptocurrency scam can lead to charges including conspiracy, wire fraud, mail fraud, and more. Further, individuals at all levels of these schemes can face prosecution, including those who may have unwittingly played the role of a money mule.&nbsp;</p>



<p>With decades of experience in defending traditional financial fraud paired with a deep understanding of the newer world of cryptocurrency, our firm possesses the skills and expertise to assist those accused of crypto fraud. <a href="/contact-us/">Contact us</a> for a free consultation.  </p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Recent Computer Hacking Cases in the News]]></title>
                <link>https://www.conawayandstrickler.com/blog/recent-computer-hacking-cases-in-the-news/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/recent-computer-hacking-cases-in-the-news/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Sun, 24 Nov 2024 19:06:00 GMT</pubDate>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                    <category><![CDATA[Cyber Crime]]></category>
                
                    <category><![CDATA[data breach]]></category>
                
                    <category><![CDATA[Identity Theft]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                
                    <category><![CDATA[#bitcoin]]></category>
                
                    <category><![CDATA[#cryptocurrency]]></category>
                
                    <category><![CDATA[#moneylaundering]]></category>
                
                    <category><![CDATA[atlanta criminal lawyer]]></category>
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                
                
                <description><![CDATA[<p>Recently, Robert Purbeck of Idaho, also known as “Lifelock,” and “Studmaster,”  was sentenced to ten years after pleading guilty to federal charges of computer fraud and abuse.  He hacked into the computer servers of the City of Newnan, Georgia  and a Griffin, Georgia medical clinic, and then targeted at least 17 other victims across the&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>Recently, Robert Purbeck of Idaho, also known as “Lifelock,” and “Studmaster,”  was sentenced to ten years after pleading guilty to federal charges of computer fraud and abuse.  He <a href="https://www.11alive.com/article/news/local/city-of-newnan-experiences-data-breach/85-a76aa042-9758-4403-aad9-beba3976f401" target="_blank" rel="noreferrer noopener">hacked</a> into the computer servers of the City of Newnan, Georgia  and a Griffin, Georgia medical clinic, and then targeted at least 17 other victims across the United States – in the process stealing personal information of more than 132,000 individuals.  He also attempted to extort a Florida orthodontist for payment in Bitcoin, threatening to disclose stolen patient records and other personal information.</p>



<p>“Cyber extortion is unfortunately a rapidly growing threat and highlights the ever-growing need for corporations to remain vigilant in cybersecurity efforts,” <a href="https://www.justice.gov/usao-ndga/pr/idaho-man-sentenced-computer-hacking-and-extortion-scheme" target="_blank" rel="noreferrer noopener">said Sean Burke, Acting Special Agent in Charge of FBI Atlanta</a>. “This sentencing is just one example of the FBI working together to hold criminals that hide behind their computers accountable, regardless of their location.”</p>



<p>According to information presented in court, in June 2017, Purbeck purchased access to the computer server of a Griffin medical clinic on a darknet marketplace. He then used the stolen credentials to illegally access the computers of the medical clinic and removed records that contained the sensitive personal information of more than 43,000 individuals, including names, addresses, birth dates, and social security numbers.</p>



<p>In February 2018, Purbeck purchased access to a City of Newnan Police Department server on a darknet marketplace. Purbeck used the stolen credentials to hack into the City of Newnan’s computer systems and stole police reports and other documents, including personal information of more than 14,000 individuals.</p>



<p>Purbeck also attempted to extort a Florida orthodontist in July 2018, demanding a ransom payment in Bitcoin in return for his stolen patient files, threatening to sell the patient and personal information unless the orthodontist paid the ransom. Additionally, Purbeck threatened to sell the personal information of the orthodontist’s minor child. Purbeck harassed the orthodontist and his patients for 10 days with numerous threatening emails and text messages.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>Song Wu, Chinese national, was indicted in September 2024, on charges for wire fraud and aggravated identity theft arising from his efforts to fraudulently obtain computer software and source code created by the National Aeronautics and Space Administration (“NASA”), research universities, and private companies.</p>



<p>“Efforts to obtain our nation’s valuable research software pose a grave threat to our national security,” <a href="https://www.justice.gov/usao-ndga/pr/chinese-national-charged-multi-year-spear-phishing-campaign" target="_blank" rel="noreferrer noopener">said U.S. Attorney Ryan K. Buchanan</a>. “However, this indictment demonstrates that borders are not barriers to prosecuting bad actors who threaten our national security.” According to information presented in court, Song allegedly engaged in a multi-year “spear phishing” email campaign in which he created email accounts to impersonate U.S.-based researchers and engineers and then used those imposter accounts to obtain specialized restricted or proprietary software used for aerospace engineering and computational fluid dynamics. This specialized software could be used for industrial and military applications, such as development of advanced tactical missiles and aerodynamic design and assessment of weapons. In executing the scheme, Song allegedly sent spear phishing emails to individuals employed in positions with the United States government, including NASA, the U.S. Air Force, Navy, and Army, and the Federal Aviation Administration.  Song also sent spear phishing emails to individuals employed in positions with major research universities in Georgia, Michigan, Massachusetts, Pennsylvania, Indiana, and Ohio, and with private sector companies that work in the aerospace field. Song’s spear phishing emails appeared to the targeted victims as having been sent by a colleague, associate, friend, or other person in the research or engineering community. His emails requested that the targeted victim send or make available source code or software to which Song believed the targeted victim had access. According to the indictment, while conducting this spear phishing campaign, Song was employed as an engineer at Aviation Industry Corporation of China (“AVIC”), a Chinese state-owned aerospace and defense conglomerate headquartered in Beijing, China.  AVIC manufactures civilian and military aircrafts and is one of the largest defense contractors in the world.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>Ilya Lichtenstein, 35, of New York City, was sentenced recently to 60 months in federal prison for his involvement in a money laundering conspiracy arising from the hack and theft of approximately 120,000 bitcoin from Bitfinex, a global cryptocurrency exchange. According to information presented in court, Lichtenstein hacked into Bitfinex’s network in 2016, using advanced hacking tools and techniques. Once inside the network, Lichtenstein fraudulently authorized more than 2,000 transactions transferring 119,754 bitcoin from Bitfinex to a cryptocurrency wallet in Lichtenstein’s control. Lichtenstein then took steps to cover his tracks by deleting from Bitfinex’s network access credentials and other log files that could have revealed his conduct to law enforcement. Following the hack, Lichtenstein enlisted the help of his wife, Heather Morgan, in laundering the stolen funds. Lichtenstein, at times with Morgan’s assistance, employed numerous sophisticated laundering techniques, including using fictitious identities to set up online accounts; utilizing computer programs to automate transactions; depositing the stolen funds into accounts at a variety of darknet markets and cryptocurrency exchanges and then withdrawing the funds; converting bitcoin to other forms of cryptocurrency in a practice known as “chain hopping;” depositing a portion of the criminal proceeds into cryptocurrency mixing services; using U.S.-based business accounts to legitimize Lichtenstein’s and Morgan’s banking activity; and exchanging a portion of the stolen funds into gold coins. Additional information on this case is available on the United States Department of Justice’s website for large cases <a href="https://www.justice.gov/usao-dc/2016-bitfinex-hack">here</a>. &nbsp;</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[What is a “Pig Butchering” Scam?]]></title>
                <link>https://www.conawayandstrickler.com/blog/what-is-a-pig-butchering-scam/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/what-is-a-pig-butchering-scam/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Mon, 11 Mar 2024 17:12:54 GMT</pubDate>
                
                    <category><![CDATA[Blog]]></category>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                    <category><![CDATA[Cyber Crime]]></category>
                
                    <category><![CDATA[Fraud]]></category>
                
                
                    <category><![CDATA[#cryptocurrency]]></category>
                
                    <category><![CDATA[fraud]]></category>
                
                
                
                <description><![CDATA[<p>A new type of fraudulent online investment scheme has led to thousands of victims worldwide and significant financial losses. In a pig butchering scam, victims are gradually lured into making financial contributions to a seemingly sound investment only to have the person they are dealing with subsequently disappear with the funds. These types of schemes&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>A new type of fraudulent online investment scheme has led to thousands of victims worldwide and significant financial losses. In a pig butchering scam, victims are gradually lured into making financial contributions to a seemingly sound investment only to have the person they are dealing with subsequently disappear with the funds.</p>


<p>These types of schemes originated in 2020 and have gained international momentum through the use of social media platforms and online dating applications. In a departure from conventional financial scams, these fraudsters focus on psychological manipulation of victims by crafting elaborate fake identities to establish romantic or emotional connections with their targets.</p>


<p>After the scammer creates a fake online persona, the scam begins by initiating contact with a target. Often, the scammer will pretend to have stumbled across a “wrong number” as they contacted the victim. The next step is starting a conversation with a potential victim to gain their trust. The scammers often initiate benign chats about life, family, and work, and they’ll fabricate details about their own life that make them seem similar to you. Once the scammer gains trust, they will eventually pivot the conversation to investing and making claims about their own purported success with investments.</p>


<p>Once the target agrees to accept “help” with the investment process, the scammer typically explains how to wire money from their bank account to a crypto wallet and eventually to a “brokerage.” The scammer may initially encourage a modest investment and allow the victim to withdraw “returns” on their investment as proof the investment is legit. From there, the scammer will only continue to manipulate their victim into investing more and more. Once the fraudster is unable to convince the victim to continue making deposits, they will disappear and sever all contact.</p>


<p>A key feature that distinguishes pig butchering scams is the human aspect that shows a pattern of coercion and exploitation. Often times the low-level operators of these scams are victims themselves who may have been coerced into participating in these crimes under the guise of employment opportunities. Many of the perpetrators are lured from abroad then forced to commit the fraud by organized crime syndicates. The effects of pig butchering scams extend beyond the significant financial losses to encompass human rights issues tied to trafficking and coercion.</p>


<p>Perpetrators of pig butchering scams have been charged across the country by federal prosecutors working alongside the Computer Crime and Intellectual Property Section’s (<a href="https://www.justice.gov/criminal/criminal-ccips/about-ccips" rel="noopener noreferrer" target="_blank">CCIPS</a>) National Cryptocurrency Enforcement Team (NCET), which was established to combat the growing illicit use of cryptocurrencies and digital assets. In California, four defendants were charged with conspiracy to commit money laundering, concealment money laundering, and international money laundering for their involvement in a <a href="https://www.justice.gov/opa/pr/four-individuals-charged-laundering-millions-cryptocurrency-investment-scams#:~:text=According%20to%20court%20documents%2C%20%E2%80%9Cpig,masquerading%20as%20a%20wrong%20number." rel="noopener noreferrer" target="_blank">$20 million dollar pig butchering scheme</a>.</p>


<p>
Pig butchering scams were discussed in a recent episode of <a href="https://www.youtube.com/watch?v=pLPpl2ISKTg" rel="noopener noreferrer" target="_blank">Last Week Tonight with John Oliver</a>. As the episode highlights, these scams are increasingly common and the losses to victims can be devastating.</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[The Intersection of Crime and Non-Fungible Tokens (NFTs)]]></title>
                <link>https://www.conawayandstrickler.com/blog/the-intersection-of-crime-and-non-fungible-tokens-nfts/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/the-intersection-of-crime-and-non-fungible-tokens-nfts/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Tue, 14 Nov 2023 16:23:31 GMT</pubDate>
                
                    <category><![CDATA[Blog]]></category>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                    <category><![CDATA[Cyber Crime]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Fraud]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                
                    <category><![CDATA[#bitcoin]]></category>
                
                    <category><![CDATA[#cryptocurrency]]></category>
                
                    <category><![CDATA[#moneylaundering]]></category>
                
                    <category><![CDATA[Criminal defense]]></category>
                
                    <category><![CDATA[Criminal Lawyer]]></category>
                
                    <category><![CDATA[doj]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[fraud]]></category>
                
                    <category><![CDATA[fraud lawyer]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[NFTs]]></category>
                
                    <category><![CDATA[white collar lawyer]]></category>
                
                    <category><![CDATA[wire fraud]]></category>
                
                
                
                <description><![CDATA[<p>An NFT, or Non-Fungible Token, is a digital asset representing ownership or proof of authenticity of a unique item or piece of content using blockchain technology. Unlike cryptocurrencies such as Bitcoin or Ethereum, which are fungible and can be exchanged on a one-to-one basis, NFTs are non-interchangeable and one-of-a-kind. As long as you’re following copyright&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>An NFT, or Non-Fungible Token, is a digital asset representing ownership or proof of authenticity of a unique item or piece of content using blockchain technology. Unlike cryptocurrencies such as Bitcoin or Ethereum, which are fungible and can be exchanged on a one-to-one basis, NFTs are non-interchangeable and one-of-a-kind. As long as you’re following copyright laws and selling legitimate assets, creating, selling, and reselling NFTs is legal. However, due to the decentralized and anonymous nature of the crypto world, NFTs come with a host of legal issues. Like with most digital innovations, regulatory legislation has been slow to catch up and establish clear guidelines; still, wrongful use of NFTs can implicate an array of criminal charges.</p>


<p><strong>Money Laundering</strong> refers to the illegal process of concealing the origins of money obtained through criminal activities, making it appear as if it comes from a legitimate source. This is criminalized under 18 U.S.C. § 1956. Money laundering using NFTs involves the illicit use of these digital assets to disguise the origins of illegally obtained funds. In this context, individuals create a fake record of sales on the blockchain by selling NFTs to themselves using different accounts. Once finished, they sell the NFT to an unsuspecting buyer and repeat the process.</p>


<p><strong>Fraud</strong> has grown increasingly common in the crypto landscape due to its anonymous and decentralized nature. Fraud involving NFTs can manifest in various ways due to the unique characteristics of these digital assets. This is mostly being prosecuted as wire fraud under 18 U.S.C. § 1343. Some common forms of fraud associated with NFTs include:</p>


<ol class="wp-block-list">
<li><strong>Fake or Stolen NFTs</strong>: Fraudsters might create counterfeit NFTs by copying digital content and attempting to sell them as original or rare pieces. Additionally, they might steal someone else’s artwork or content and mint NFTs to sell without the creator’s consent.</li>
<li><strong>False Representation</strong>: Individuals might misrepresent the ownership or authenticity of an NFT by falsely claiming it is associated with a particular creator or source, leading buyers to believe they are purchasing something of higher value or legitimacy than it actually holds.</li>
<li><strong>Pump-and-Dump Schemes</strong>: Similar to traditional financial markets, some individuals may engage in pump-and-dump schemes within the NFT market. This involves artificially inflating the value of certain NFTs through false hype or manipulation, only to sell them off at a high price, leaving unsuspecting buyers with devalued assets.</li>
<li><strong>Phishing and Scams:</strong> Scammers may use phishing techniques to trick NFT owners into providing their private keys or access to their digital wallets, allowing the fraudster to steal the NFTs. Additionally, fraudulent schemes and fake NFT marketplaces can deceive buyers and sellers into making transactions for non-existent or misrepresented NFTs.</li>
<li><strong>Rug-Pull Scheme:</strong> As the term suggests, a “rug pull” refers to a scenario where the creator of an NFT and/or gaming project solicits investments and then abruptly abandons a project and fraudulently retains the project investors’ funds.</li>
</ol>


<p>Law enforcement is continuing to prosecute these types of NFT schemes across the nation, in cases that allege millions of dollars being defrauded. Two defendants were charged for executing a <a href="https://www.justice.gov/usao-sdny/pr/two-defendants-charged-non-fungible-token-nft-fraud-and-money-laundering-scheme-0" rel="noopener noreferrer" target="_blank">$1 million NFT money laundering and fraud scheme</a> in January 2022. In another NFT rug-pull, Aurelien Michel was charged for diverting <a href="https://www.justice.gov/usao-edny/pr/non-fungible-token-nft-developer-charged-multi-million-dollar-international-fraud" rel="noopener noreferrer" target="_blank">$2.9 million dollars in an international fraud scheme</a>.</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Bitcoin/Cryptocurrency Money Laundering]]></title>
                <link>https://www.conawayandstrickler.com/blog/bitcoin-cryptocurrency-money-laundering/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/bitcoin-cryptocurrency-money-laundering/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Wed, 12 Apr 2023 15:30:15 GMT</pubDate>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                    <category><![CDATA[Cyber Crime]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[Victim Of Crime]]></category>
                
                
                    <category><![CDATA[#bitcoin]]></category>
                
                    <category><![CDATA[#cryptocurrency]]></category>
                
                    <category><![CDATA[Federal Criminal Lawyer]]></category>
                
                
                
                <description><![CDATA[<p>What is Bitcoin money laundering? Bitcoin money laundering is the process of using Bitcoin to conceal the origins of illegally obtained money. This can be done by transferring the Bitcoin to multiple accounts, mixing it with other Bitcoin, or using it to purchase goods or services. Some believe that Bitcoin transactions are anonymous. There are,&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>What is Bitcoin money laundering? Bitcoin money laundering is the process of using Bitcoin to conceal the origins of illegally obtained money. This can be done by transferring the Bitcoin to multiple accounts, mixing it with other Bitcoin, or using it to purchase goods or services.  Some believe that Bitcoin transactions are anonymous.  There are, however, transaction records that are stored in the blockchain and publicly visible.  The FBI recently <a href="https://www.justice.gov/opa/pr/two-arrested-alleged-conspiracy-launder-45-billion-stolen-cryptocurrency" rel="noopener noreferrer" target="_blank">stated </a>“Criminals always leave tracks, and …[this] is a reminder that the FBI has the tools to follow the digital trail, wherever it may lead” .</p>


<p>Bitcoin is definitely attractive to money launderers because it is a decentralized currency that is not subject to government regulation. This makes it difficult, but not impossible, to track and trace Bitcoin transactions. Additionally, Bitcoin is often used in online transactions, which makes it easy to conceal the identity of the sender and receiver.</p>


<p>There are a number of ways to launder money using Bitcoin. One common method is to use a mixer, which is a service that mixes Bitcoin from multiple sources together. This makes it difficult to trace the original source of the Bitcoin. Another method is to use a tumbler, which is a service that breaks up Bitcoin transactions into smaller pieces and then reassembles them. This makes it difficult to track the individual transactions.</p>


<p>Bitcoin can also be used to purchase goods or services that are difficult to trace, such as drugs or weapons. This can make it difficult to identify the source of the funds used to purchase the goods or services.</p>


<p>Money laundering is a serious crime that can have a significant impact on the economy. It can also be used to finance terrorism and other criminal activities. Conaway & Strickler can help if the government is questioning you about or charging you with money laundering /wire fraud /bank fraud charges.</p>


<p>A lot of the times a money mule is utilized in money laundering schemes.  A money mule is a person who transfers money on behalf of someone else, often without knowing that they are involved in a criminal activity. Money mules are typically recruited through online job scams, romance scams, or other fraudulent schemes. They are then asked to receive money from criminals, often through wire transfers or cryptocurrency transactions. The money is then transferred to other accounts, or used to purchase goods or services.</p>


<p>Money mules are often unaware that they are involved in a criminal activity. They may be promised a share of the money, or they may be led to believe that they are helping someone in need. However, money mules are always at risk of being caught and prosecuted. They may also face financial losses, as they may be held responsible for any money that is stolen from the criminals.  The government often goes after these low end cases and prosecutes them federally.</p>


<p>Again, <a href="/contact-us/">contact us</a> immediately if you are being questioned by a federal agent about any of these issues.</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[IRS Increased Focus on Cryptocurrency in Operation Hidden Treasure]]></title>
                <link>https://www.conawayandstrickler.com/blog/irs-increased-focus-on-cryptocurrency-in-operation-hidden-treasure/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/irs-increased-focus-on-cryptocurrency-in-operation-hidden-treasure/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Sat, 01 May 2021 13:41:12 GMT</pubDate>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                    <category><![CDATA[Cyber Crime]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Tax Fraud]]></category>
                
                
                    <category><![CDATA[#bitcoin]]></category>
                
                    <category><![CDATA[#crypto]]></category>
                
                    <category><![CDATA[#cryptocurrency]]></category>
                
                    <category><![CDATA[#cryptocurrencytaxguidance]]></category>
                
                    <category><![CDATA[#IRSCID]]></category>
                
                    <category><![CDATA[#moneylaundering]]></category>
                
                    <category><![CDATA[#operationhiddentreasure]]></category>
                
                    <category><![CDATA[#taxevasion]]></category>
                
                    <category><![CDATA[#taxfraud]]></category>
                
                    <category><![CDATA[Federal Criminal Lawyer]]></category>
                
                    <category><![CDATA[wire fraud]]></category>
                
                
                
                    <media:thumbnail url="https://conawayandstrickler-com.justia.site/wp-content/uploads/sites/908/2021/05/image.jpeg" />
                
                <description><![CDATA[<p>The IRS has just announced that Operation Hidden Treasure will seek to find taxpayers with unreported income from currency transactions. Did you notice the new question on page 1 of the Tax Form 1040? It states, “At any time during 2020 did you receive any financial interest in virtual currency?” Last year this question was&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>The IRS has just announced that Operation Hidden Treasure will seek to find taxpayers with unreported income from currency transactions.  Did you notice the new question on page 1 of the Tax Form 1040?  It states, “At any time during 2020 did you receive any financial interest in virtual currency?”  Last year this question was only on Schedule 1.</p>


<p>The IRS Criminal Investigation Division (“CID”) will look for typical “flags” in money transactions.  That may include “structuring” (transactions in increments of less than $10,000 to avoid reporting requirements), “the use of nominees, shell corps” (entities used solely for moving money around) or “getting on and off the chain.” (On chain transactions – blockchain is modified to reflect the transaction on a public ledger. Off chain transactions are those that that go off the blockchain.  They work by swapping private keys to an existing wallet instead of transferring funds.)</p>


<p>The IRS identifies and investigates these tax evasion flags.  Operation Hidden Treasure is “all about finding, tracing, and attributing crypto to U.S. Taxpayers.” Do not be fooled into thinking that since it’s cryptocurrency the government does not have the know how to investigate.   Charges for tax evasion, false information on a tax return or even money laundering or structuring can be forthcoming.  Call Conaway & Strickler, PC if you have had a friendly visit from an IRS CID Agent or if you think you might be facing some issues with the IRS.  Carolyn Schenck, national fraud counsel in the IRS Office of Chief Counsel states, “Operation Hidden Treasure is designed to find, trace and attribute such transactions to taxpayers. These transactions are not anonymous.  We see you.”</p>


]]></content:encoded>
            </item>
        
    </channel>
</rss>